Detection of Node Failure Localization in Communication Networks
Keywords:Routing Protocol, failure localization, network topology, monitor
We explore the capability of localizing node failures in communication networks from binary states (normal/failed) of end-to-end paths. Certain a set of nodes of importance, individually localizing failures inside this set necessitates that dissimilar noticeable path states connect with dissimilar node malfunction events. However, this circumstance is easier said than done to test on huge networks due to the requirement to itemise all promising node failures. Our first donation is a set of satisfactory/compulsory conditions for classifying a restricted numeral of failures within an uninformed node set that can be experienced in polynomial time. In adding up to network topology and positions of monitors, our circumstances also include restrictions forced by the penetrating mechanism used. We are here considering three probing mechanisms basically which differ according as to whether dimension paths are: (i) arbitrarily controllable; (ii) controllable but cycle-free; or (iii) uncontrollable (which are dogged by the evasion routing protocol). Our second donation is to calculate the potential of malfunction localization from beginning to end: 1) the utmost number of failures (wherever in the network) such that malfunctions inside a given node set can be exceptionally localized and 2) the major node set inside which failures can be exclusively localized underneath a given vault on the total amount of failures. Here both the methods in 1) and 2) can be transformed into the functions of a per-node property, which can be computed resourcefully based on the above satisfactory/compulsory conditions. We reveal how process 1) and 2) projected for enumerating malfunction localization capability can be used to calculate the collision of various parameters which includes topology, number of monitors, and probing mechanisms.
 Ramana Rao Kompella, Jennifer Yates, Albert Greenberg, and Alex C. Snoeren â€œDetection and Localization of Network Black Holesâ€ DOI: 10.1109/INFCOM.2007.252, ISBN: 1-4244-1047-9, 2007
 Mahdi Cheraghchi, Amin Karbasi, Soheil Mohajer and Venkatesh Saligrama,â€œGraph-Constrained Group Testingâ€ DOI: 10.1109/TIT. 2011.2169535, 2012
 Mark Coates, Alfred Hero, Robert Nowak, Bin Yu, â€œInternet Tomographyâ€DOI: 10.1109/79.998081, ISSN: 1053-5888, 2002
 Yiyi Huang, Nick Feamster and Renata Teixeira, â€œPractical Issues with Using Network Tomography for Fault Diagnosisâ€ DOI:http://doi.acm.org/10.1145/1452335.1452343, 2008
 Sajjad Zarifzadeh, Madhwaraj G K and Constantine Dovrolis, â€œRange Tomographyâ€DOI:10.1145/2398776.2398817,2008
 Denisa Ghita, Katerina Argyraki, Patrick Thiran, â€œNetwork Tomography on Correlated Linksâ€ Melbourne, Australia- November 01, 2010 ACM New York, NY, USA Â©2010
table of contents DOI:10.1145/1879141.1879170, ISBN: 978-1-4503-0483-2
 Hongyi Zeng, Peyman Kazemian, George Varghese and Nick McKeown , â€œAutomatic Test Packet Generation â€DOI: 10.1109/ TNET.2013.2253121, ISSN: 1063-6692Electronic ISSN: 1558-2566
 Nick Duffield, â€œNetwork Tomography of Binary Network Performance Characteristics â€DOI: 10.1109/TIT.2006.885460, ISSN: 0018-9448, Electronic ISSN: 1557-9654
 Yigal Bejerano and Rajeev Rastogi, â€œRobust Monitoring of Link Delays and Faults in IP Networksâ€ DOI: 10.1109/TNET. 2006.882907, PrintISSN: 1063-6692Electronic ISSN: 1558-2566
 Denisa Ghita, Can Karakus, Katerina Argyraki, Patrick Thiran, â€œShifting Network Tomography Toward A Practical Goalâ€ DOI:10.1145/2[i]079296.2079320 ISBN: 978-1-4503-1041-3
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).