CN105490834B - A kind of probe deployment method based on vertex covering and weak vertex cover - Google Patents

A kind of probe deployment method based on vertex covering and weak vertex cover Download PDF

Info

Publication number
CN105490834B
CN105490834B CN201510807537.3A CN201510807537A CN105490834B CN 105490834 B CN105490834 B CN 105490834B CN 201510807537 A CN201510807537 A CN 201510807537A CN 105490834 B CN105490834 B CN 105490834B
Authority
CN
China
Prior art keywords
node
vertex
probe
network
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510807537.3A
Other languages
Chinese (zh)
Other versions
CN105490834A (en
Inventor
刘宇明
田丰
刘彤
何林宏
李辉
苏进
李晓耕
李朝广
韩熙媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
YUNNAN ELECTRIC POWER DISPATCH CONTROL CENTER
Original Assignee
YUNNAN ELECTRIC POWER DISPATCH CONTROL CENTER
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YUNNAN ELECTRIC POWER DISPATCH CONTROL CENTER filed Critical YUNNAN ELECTRIC POWER DISPATCH CONTROL CENTER
Priority to CN201510807537.3A priority Critical patent/CN105490834B/en
Publication of CN105490834A publication Critical patent/CN105490834A/en
Application granted granted Critical
Publication of CN105490834B publication Critical patent/CN105490834B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a kind of probe deployment method based on vertex covering and weak vertex cover, including:Determine the deployed position of the quantity and the test probe of test probe in a network.The present invention proposes a kind of probe deployment technology based on vertex covering and weak vertex cover, it the advantage is that, the technology is improved based on the greedy algorithm to minimal covering problem on the basis of the algorithm, it is proposed that the probe deployment algorithm based on vertex covering and weak vertex cover.Minimum Vertex Covering is used first so that under conditions of it can obtain each link flow, required flow monitor number is minimum.It is improved to minimum weak vertex cover later.Emulation shows that compared with the deployment scheme based on Minimum Vertex Covering the number of probes that this programme uses is less, and algorithm is simpler, time-consuming shorter, is a kind of more excellent Network Traffic Monitoring probe deployment scheme.

Description

A kind of probe deployment method based on vertex covering and weak vertex cover
Technical field
The invention belongs to the network flow detection techniques based on probe, are a kind of network layers that can be realized to data network The probe deployment method of complete detection.
Background technology
For the business demand of Network Traffic Monitoring, the detection mode of NetFlow can be used.A certain node in a network Setting probe can obtain the flow of all chain roads being connected with this node.Therefore, all links in network in order to obtain Network flow, generally can by certain switching nodes (router) be configured monitor realize, we will consider the problems of It is:Monitor is set on network which node, could be caused under conditions of it can obtain each link flow, required stream It is minimum to measure monitor number.
By probe, the comprehensive monitoring to business to the network layer of data network is realized.It is not only of high cost if all standing, And big amount measurement data can be also generated when measuring, cause noise.In the network of n network element composition, between k network element of measurement Traffic characteristic, need to choose k network element from n, furthermore, it is contemplated that flowing to problem, also need the arrangement group of k node of consideration It closes, measurement scheme just needs C (n, k) P (k, k).It is if complicated according to the time caused by the measurement method and scheme of this all standing It spends for factorial grade, space complexity is also very huge.Needs around business monitoring set out, and how research disposes suitable spy Needle is to meet different business monitoring requirements, to solve the problems, such as deployed position and deployment capacity.
To understand the state of development of the prior art, retrieval is carried out to existing paper and patent, has compared and analyzes, has been screened Go out the higher technical information of following degree related to the present invention:
Technical solution 1:Patent No. CN103138833A's《Network code pairing relationship in PON based on flow monitoring Management method》Patent is related to field of communication technology, is mainly completed by three steps:First, OLT set up that there are bi-directional data biographies The network code connection relation of defeated ONU pairs, after OLT detects the interaction of this ONU pairs bidirectional traffic, you can start network Cataloged procedure;Second, OLT use certain calculation based on all ONU pairs there are bidirectional data transfers of ONU identifiers statistics Bi-directional data flow size is converted into corresponding impact factor by method;Third, OLT monitor the situation of change of impact factor in real time, If when the impact factor IFn for having neither part nor lot in ONU pairs of network code is more than the impact factor IFp for participating in ONU pairs of network code, The corresponding network codes pair of IFp are removed, while are connected for the corresponding ONU of IFn to establishing network code.
Technical solution 2:Patent No. CN102781014A's《Intelligent flow based on wireless sensor network and 3G network Monitoring method》Patent, be related to the data on flows of sensor acquisition and the nowhere seamless link technology of sensor network information, 802.15.4 protocol conversion technology between agreement and ICP/IP protocol.Data collecting module collected different fluid medium, caliber etc. The parameter of dynamic change, the parameter value of acquisition are sent to the ZigBee channel radios of wireless sensor network by Asynchronous Transfer Mode Believe module, then be transmitted to processing and operation that microprocessor module carries out parameter, host computer prison is transmitted to finally by 3G gateways Remote flow monitoring, management are realized in control center.
Technical solution 3:Patent No. CN103036741A's《The determining method and device of flow monitoring baseline》Patent relates to And a kind of determining method and device of flow monitoring baseline, the historical traffic number in predetermined period is determined in rectangular coordinate plane According to figure, the first reference axis in the rectangular coordinate plane represents the time in the predetermined period, the rectangular coordinate plane The second interior reference axis represents the historical traffic data;According to the historical traffic data figure and first reference axis and institute The region that the second reference axis surrounds is stated, baseline drawing area is determined in the coordinate plane;In the baseline drawing area, Receive the mouse event that user triggers according to the historical traffic data figure;Area is drawn in the baseline according to the mouse event Coordinate position in domain determines flow monitoring baseline value.The device includes:First processing module, receives mould at Second processing module Block and third processing module.
Technical solution 1 can determine whether to be suitble to participate in network code according to ONU uninterrupted features in real time, so as to find The optimum network coding pair of network code is participated in, improves the utilization rate of network bandwidth, further reduces the congestion of network.Only It is encoded on the basis of flow monitoring, how there is no primary studies carries out flow monitoring.Technical solution 2 using it is wired with The mode being wirelessly combined saves the manpower and materials for being largely used to tour, meter reading, improves the degree of automation management level, Realize low-power consumption, low cost, automation, networking, the intelligence of flow monitoring.But the intelligent flow monitoring side of the program Method is based on wireless sensor network and 3G network, and cost is higher, and be easy to cause data congestion, and there is no consider optimization problem. Technical solution 3 can accurately determine flow monitoring baseline value, avoid reporting by mistake and fail to report.Focus on studying flow detection limiting value Determine, there is no the methods of specific research flow monitoring.
Invention content
The present invention is precisely in order to a kind of probe based on vertex covering and weak vertex cover for overcoming drawbacks described above and providing Dispositions method.It is an object of the invention to study the probe deployment method based on Greedy strategy, by asking Minimum Vertex Covering The greedy algorithm of topic is improved, and the Greedy strategy that method is limited by branch realizes probe deployment problem.It can ensure algorithm more Simplicity takes shorter and less using number of probes.
Present invention firstly provides the probe deployment scheme based on Minimum Vertex Covering, experiment shows that the algorithm can acquire most The optimal solution of small vertex covering, but its computation complexity is high, spends the time long, can not be applied in extensive problem.And The optimal solution of the optimal solution of Minimum Vertex Covering not necessarily Network Traffic Monitoring probe deployment.Thus in Minimum Vertex Covering Probe deployment scheme on the basis of improved, it is proposed that the probe deployment scheme based on minimum weak vertex cover, with based on The deployment scheme of Minimum Vertex Covering is compared, and the number of probes that this programme uses is less, and algorithm is simpler, time-consuming shorter, is A kind of more excellent Network Traffic Monitoring probe deployment scheme.
The present invention is achieved by the following technical solution:
A kind of probe deployment method based on vertex covering and weak vertex cover, the invention is characterised in that, including:It determines to survey Sound out the deployed position of the quantity and the test probe of needle in a network.
In the probe deployment method based on fixed point covering, determine to test the quantity of probe and the test probe in network In deployed position the step of be:
S1. it sorts to the degree of nodes all in network, is met the degree of preceding k-1 node simultaneously and less than number of links With degree and more than link said conditions the k of preceding k node;
S2., artwork data is configured to the node of a solution space tree, solution is judged whether there is using strategy is delimited, if nothing K is added 1 by solution, reenters S2, if there is that may have solution to be then inserted into Priority Queues;
S3. if Priority Queues is not sky, then first feasible node is just taken out from Priority Queues, into S4, such as K is then added 1 by fruit Priority Queues for sky, reenters S2;
S4. judge whether present node meets the condition of solution, exited if meeting just output solution, if being unsatisfactory for just entering S5;
S5. check whether present node can extend, it is impossible to it is just continued cycling through if extension into S3, if can extend Words then extend, and then verification expands to whether left and right node has solution, the expanding node for having solution is inserted into Priority Queues, then It is continued cycling through into S3.
In the probe deployment method based on minimum weak vertex cover, the quantity of test probe and the test probe are determined The step of deployed position in a network is:
S1. all degree are first deleted as 1 node, that is, delete the row that the sum of all row elements are 1 in incidence matrix;
S2. the most node of a number of links included is chosen, is denoted as vi
S3. leave out v in incidence matrixiRow where corresponding row and the element that the row intermediate value is 1;Then in remaining pass Other rows of the sum of all row elements no more than 1 and these row intermediate values are deleted in connection matrix successively again as corresponding to 1 element Row, until cannot delete new row and column again;
S4. S2, the operation of S3, until all links are all incorporated into are repeated.
Before the deployed position of the quantity and the probe of test probe in a network is determined, the method further includes: Model is established using optimal queue and space tree;After model is established, the quantity and the probe that determine test probe exist Deployed position in network model.
In the present invention, model is established using optimal queue and space tree, including:
Safeguard that the node of present feasible, each node maintenance are also an option that in the case of the node with a Priority Queues Vertex number k1, need the remaining number of edges e covered, the state state on vertex, vertex the information such as number of edges Degree, these Node sorts from big to small by the number of edges on vertex, wherein for the state on vertex, state there are three types of vertex in the strategy, respectively State s1, unselected state s2, the state s3 that can be selected having selected for, wherein, s1 pairs of the state having selected for The left sibling in solution space tree number is answered, selects the node, then which is set for state s1 has been selected;Unselected state Right node in s2 homographic solution space trees, does not select the node, then sets the node not select state s2;It can select Father node in state s3 homographic solution space trees, selects the node, then sets the node as that can select state s3;S1 and s2 All it is the state having determined, the selection of node can only be chosen from s3.
Before the deployed position of the quantity and the probe of test probe in a network is determined, the method further includes: Establish the detection model based on minimum weak vertex cover;After model is established, the quantity of test probe and the probe are determined Deployed position in network detection model.
In the present invention, the detection model based on minimum weak vertex cover is established, including:
The incidence matrix of a node and link is established, the matrix is using link as row, using node as row, if the link includes The node, then for value for 1, be otherwise 0.
By probe, the comprehensive monitoring to business to the network layer of data network is realized.It is not only of high cost if all standing, And big amount measurement data can be also generated when measuring, cause noise.In the network of n network element composition, between k network element of measurement Traffic characteristic, need to choose k network element from n, furthermore, it is contemplated that flowing to problem, also need the arrangement group of k node of consideration It closes, measurement scheme just needs C (n, k) P (k, k).It is if complicated according to the time caused by the measurement method and scheme of this all standing It spends for factorial grade, space complexity is also very huge.
Needs around business monitoring set out, and how research disposes suitable probe monitors need to meet different business It asks, to solve the problems, such as deployed position and deployment capacity.It is required that the deployment examples solved are " certain data network topological diagram ".
1. the link metric in data network in hypothesis problem is all equal, it is assumed that is 1;
2. the communication routing rule in hypothesis problem between network element uses shortest path algorithm;
3. in minimum weak vertex cover model, it is assumed that a network element can monitor directly relevant all links Flow, and meet flow conservation;
4. in minimal set cover model, it is assumed that arbitrary two network element can pass through all chains on its path of communication monitoring The state on road, network monitor order are happened between probe and probe;
5. the number of degrees due to network edge node are usually smaller, if the position of detection site is selected in the edge of network Place, then the number of the detection sent out from the detection site and the ability of detection will receive corresponding limitation, thus false If probe location will not be at the edge of network.
For the business demand of Network Traffic Monitoring, the detection mode of NetFlow can be used.A certain node in a network Setting probe can obtain the flow of all chain roads being connected with this node;Therefore, all links in network in order to obtain Network flow, generally can by certain switching nodes (router) be configured monitor realize, we will consider the problems of It is:Monitor is set on network which node, could be caused under conditions of it can obtain each link flow, required stream It is minimum to measure monitor number.
This can be solved the problems, such as using Minimum Vertex Covering.It is complete that vertex cover problem has proved to be NP, can only Approximate optimal solution is calculated with approximate data.We are herein improved the greedy algorithm of minimal covering problem, pass through The Greedy strategy that branch limits method realizes probe deployment problem.
While in view of network monitor mode, in addition the constraint of flow conservation, it can using minimum weak vertex cover Less probe is disposed to realize the Network Traffic Monitoring of whole network.Similary minimum weak vertex cover problem also has proved to be NP is complete and can only seek approximate optimal solution using approximate data.We realize probe deployment used here as Greedy strategy Problem.
For the evaluation index of flow monitoring test:
1. the number of the probe of deployment;
2. link coverage rate.
We need the network for needing to dispose probe to be converted into non-directed graph G (V, E), wherein V=(v1,v2,…,vn) For network node collection (router can be seen as in an ip network), E=(e1,e2,…,em) for the link set in network.Its In, n=| V |, m=| E | the number of G interior joints and link is represented respectively.Use ek=(vi,vj) representekIt is connecting nodeviAnd vj A link.
The degree of the number of links, i.e. node v of node v is represented with Degree (v).
Sequence label equipment such as the all-router of primitive network figure, interchangers according to 1,2 ... ..., then counts The figure is converted into non-directed graph by all link informations.The network has 160 nodes, 185 links.It is a sparse graph (side Item number m be much smaller than n2Figure), non-directed graph can be represented with corresponding adjacent chained list, it is contemplated that ordinary circumstance, in order to solve Various figures represents non-directed graph using adjacency matrix.
The probe deployment scheme based on Minimum Vertex Covering is introduced first:
According to being defined below, problem model can very easily be described
Define 1:Given non-directed graph G (V, E), wherein V is vertex set, and E is side collection, and S is the subset of V, if according to being pushed up in S The flow on the associated each side of point, it may be determined that the flow of any limit in E, then it is measurement sets of the figure G about flow to claim S.
The target for effectively measuring problem is exactly the minimum measurement set for seeking given figure G about flow.It can be converted to and ask definition 2 The minimal covering problem of middle figure G.
Define 2 (minimal covering problems):A fixed non-directed graph G (V, E) is showed, asks a most boy of vertex set V Collect S so that e=(u, v) ∈ E, and the point that any side in u ∈ S or v ∈ S, i.e. E at least contains in this subset is used as top Point, that is to say, that vertex covering in S side collection E.
Its mathematical description is:
Min cx wherein xi∈S
Wherein c=[1,1 ..., 1] and x=[x1,x2,…,xn] be all a length of n vector, (aij)n×nIt is the adjoining square of figure Battle array, and
It is complete that minimal covering problem has proved to be NP, up to the present there is not yet polynomial time algorithm Solve, we can remove to be obtained with greedy algorithm approximate optimal solution, i.e., the nodes of each iteration all degree of selection maximums as probe, Then all coupled nodes can exclude, and meet the optimal situation for choosing that probe is all situation instantly every time, but Allow for it is each it is optimal may not be able to obtain on the whole optimal, in order to find smaller solution, pass through following restriction Strategy, we are improved greed, and more excellent solution is obtained by branch-bound method.
It sorts from big to small to the degree of all nodes, k node before taking meets
When, it is the boundary that possible meet vertex covering.
By above-mentioned constraint, we are first obtained a smallest possible optimal solution k, will ask before greedy algorithm is used Topic is converted into judgement non-directed graph meets Minimum Vertex Covering with the presence or absence of k node.It is gone by Greedy strategy and limiting policy Judgement, k is optimal solution if meeting, if being unsatisfactory for k adding 1, continues to judge.
Before specific decision process is introduced, model is established using optimal queue and space tree first, it is excellent with one The node of first queue maintenance present feasible, each node maintenance the vertex number k being also an option that in the case of the node1, need The remaining number of edges e to be covered, the state state on vertex, vertex the information such as number of edges Degree, the sequences of these nodes follows greedy Heart strategy sorts from big to small by the number of edges on vertex.For the state on vertex.State there are three types of vertex in the strategy, respectively The state S1, unselected state S2, the state S3 that can be selected having selected for.Wherein, S1 pairs of the state having selected for The left sibling in solution space tree number is answered, selects the node, then which is set for state S1 has been selected;Unselected state Right node in S2 homographic solution space trees, does not select the node, then sets the node not select state S2.It can select Father node in state S3 homographic solution space trees, selects the node, then sets the node as that can select state S3.S1 and S2 All it is the state having determined, the selection of node can only be chosen from S3.
First in optimal queue node is taken out to be extended:
The node is set as S1, while the information of the node is changed according to formula 4, the node is then put into space tree Left sibling;The node is set as S2 again, the right node of space tree is directly placed into without changing other nodal informations.
k1=k1- 1, e=e-Degree, Degree=0 4
Pass through constraintsFirst right node is judged, if satisfied, the point is inserted into optimal queue; It chooses left sibling again to be judged, if satisfied, the node is inserted into optimal queue.
Iteration to previous step is exactly specific decision process.
Corresponding flow chart is as shown in Figure 1.
It is improved on the basis of the probe deployment algorithm based on Minimum Vertex Covering, it is proposed that based on minimum weak vertex The probe deployment algorithm of covering:
On the basis of defining 1, since probe is arranged on the switching equipment such as router or interchanger, kept according to flow It is permanent, then figure G also meets following two constraints:
1. the arbitrary vertex v in the vertex set V of couple figure G, degree Degree (v) >=2;
2. the arbitrary vertex v in the vertex set V of couple figure G, meets stream conservation equation, that is, flows into=flow out.
Although the distortion that following reason can will lead to stream conservation equation, such as:Switching equipment is source or the remittance of data, and not only Only it is headend;Multicast causes the data of output port to replicate;Switching equipment packet delay in itself or loss.But Several studies have shown that relative error possessed by stream conservation equation is less than 0.05%.
Define 3 (weak vertex covers):It is assumed that non-directed graph G (V, E) mesh satisfaction there are Degree (v) >=2 to arbitrary v ∈ V, claimIt is the weak vertex cover collection of figure G, can makes side all in E that can be labeled and if only if performing following operation:
(1) all sides associated with vertex in S are marked;
(2) if oneself is labeled on the associated sides of Degree (v) -1 of some vertex v, that remaining correlation is marked The side of connection;
(3) (2) step is repeated, until cannot mark new side again.
Obviously, thus weak vertex cover S can be obtained by the flow of each link in figure G.The general of incidence matrix is utilized herein The model established and solve weak vertex cover problem is read, is first provided thus defined below.
4 (incidence relations) are defined in non-directed graph G (V, E), if v ∈ V are one of vertex of e ∈ E, claim to deposit between v and e In incidence relation, it is denoted as vRe
Define the incidence matrix A=(a of 5 (incidence matrix) figure G (V, E)ij) be
Refer to the n × m matrixes being defined as below:
According to the definition of incidence matrix, it is known that a subset of V forms a covering of figure G, is included and if only if at it Node corresponding to incidence matrix row in each column at least there are one 1.
According to above analysis, weak vertex cover problem can be solved using greedy algorithm, it should be noted that our net Boundary point degree in network figure is 1, and is unsatisfactory for constraint 1, so we need to pre-process non-directed graph.
The vertex v for being 1 for degree under initial situationi, only exist there are one side with the point and be associated with, which is denoted as ej, ejIt is another One vertex is denoted as vj
Work as vjOnly there are one the adjacent vertices v that degree is 1iAs long as obtain vjThe flow information of other dependence edges just can be according to flow Calculate eijFlow.That is vjMeet minimum weak vertex cover, only calculating the degree on the side needs eijIn addition;Or vjIt is probe Also e can be directly monitored during deployed positionijFlow.
Work as vjHave more (k | k > 1) a degree for 1 adjacent vertices, if not node vjProbe is set as, then at least needs to set k Probe, so only by node vjProbe is set as, just can guarantee that deployment probe mesh number is minimum.
According to being analyzed above, it is known that the node that initial situation degree is 1 can not set probe, can directly be rejected, but When a node spent for 1 is given up in pretreatment, the degree of other coupled nodes is not subtracted 1.
In view of the above-mentioned flow monitoring model based on minimum weak vertex cover, it is as follows to design its algorithm flow:
Step1:All degree are first deleted as 1 node, that is, delete the row that the sum of all row elements are 1 in incidence matrix;
Step2:The most node of a number of links included is chosen, is denoted as vi
Step3:Leave out v in incidence matrixiRow where corresponding row and the element that the row intermediate value is 1;Then remaining Incidence matrix in delete successively again the sum of all row elements no more than 1 other rows and these row intermediate values it is right for 1 element The row answered, until cannot delete new row and column again;
Step4:Repeat Step2, the operation of Step3, until all links are all incorporated into.
Corresponding algorithm flow chart is as shown in Figure 2.
The key problem in technology point of the present invention is:
1st, this algorithm is improved the greedy algorithm of minimal covering problem, and the Greedy strategy of method is limited by branch Realize probe deployment problem;
2nd, while in view of network monitor mode, in addition the constraint of flow conservation, uses minimum weak vertex cover energy Less probe is enough disposed to realize the Network Traffic Monitoring of whole network.
Beneficial effects of the present invention:This patent proposes a kind of probe deployment skill based on vertex covering and weak vertex cover Art the advantage is that the technology is changed based on the greedy algorithm to minimal covering problem on the basis of the algorithm Into, it is proposed that the probe deployment algorithm based on vertex covering and weak vertex cover.Minimum Vertex Covering is used first so that can Under conditions of obtaining each link flow, required flow monitor number is minimum.It is improved to minimum weak vertex cover later. Emulation shows that compared with the deployment scheme based on Minimum Vertex Covering the number of probes that this programme uses is less, and algorithm is simpler It is single, it is time-consuming shorter, it is a kind of more excellent Network Traffic Monitoring probe deployment scheme.
Description of the drawings
Fig. 1 is the probe deployment algorithm flow chart based on Minimum Vertex Covering;
Fig. 2 is the algorithm flow chart based on minimum weak vertex cover.
Specific embodiment
A kind of probe deployment method based on vertex covering and weak vertex cover, the invention is characterised in that, including:It determines to survey Sound out the deployed position of the quantity and the test probe of needle in a network.
In the probe deployment method based on fixed point covering, determine to test the quantity of probe and the test probe in network In deployed position the step of be:
S1. it sorts to the degree of nodes all in network, is met the degree of preceding k-1 node simultaneously and less than number of links With degree and more than link said conditions the k of preceding k node;
S2., artwork data is configured to the node of a solution space tree, solution is judged whether there is using strategy is delimited, if nothing K is added 1 by solution, reenters S2, if there is that may have solution to be then inserted into Priority Queues;
S3. if Priority Queues is not sky, then first feasible node is just taken out from Priority Queues, into S4, such as K is then added 1 by fruit Priority Queues for sky, reenters S2;
S4. judge whether present node meets the condition of solution, exited if meeting just output solution, if being unsatisfactory for just entering S5;
S5. check whether present node can extend, it is impossible to it is just continued cycling through if extension into S3, if can extend Words then extend, and then verification expands to whether left and right node has solution, the expanding node for having solution is inserted into Priority Queues, then It is continued cycling through into S3.
In the probe deployment method based on minimum weak vertex cover, the quantity of test probe and the test probe are determined The step of deployed position in a network is:
S1. all degree are first deleted as 1 node, that is, delete the row that the sum of all row elements are 1 in incidence matrix;
S2. the most node of a number of links included is chosen, is denoted as vi
S3. leave out v in incidence matrixiRow where corresponding row and the element that the row intermediate value is 1;Then in remaining pass Other rows of the sum of all row elements no more than 1 and these row intermediate values are deleted in connection matrix successively again as corresponding to 1 element Row, until cannot delete new row and column again;
S4. S2, the operation of S3, until all links are all incorporated into are repeated.
Before the deployed position of the quantity and the probe of test probe in a network is determined, the method further includes: Model is established using optimal queue and space tree;After model is established, the quantity and the probe that determine test probe exist Deployed position in network model.
In the present invention, model is established using optimal queue and space tree, including:
Safeguard that the node of present feasible, each node maintenance are also an option that in the case of the node with a Priority Queues Vertex number k1, need the remaining number of edges e covered, the state state on vertex, vertex the information such as number of edges Degree, these Node sorts from big to small by the number of edges on vertex, wherein for the state on vertex, state there are three types of vertex in the strategy, respectively State s1, unselected state s2, the state s3 that can be selected having selected for, wherein, s1 pairs of the state having selected for The left sibling in solution space tree number is answered, selects the node, then which is set for state s1 has been selected;Unselected state Right node in s2 homographic solution space trees, does not select the node, then sets the node not select state s2;It can select Father node in state s3 homographic solution space trees, selects the node, then sets the node as that can select state s3;S1 and s2 All it is the state having determined, the selection of node can only be chosen from s3.
Before the deployed position of the quantity and the probe of test probe in a network is determined, the method further includes: Establish the detection model based on minimum weak vertex cover;After model is established, the quantity of test probe and the probe are determined Deployed position in network detection model.
In the present invention, the detection model based on minimum weak vertex cover is established, including:
The incidence matrix of a node and link is established, the matrix is using link as row, using node as row, if the link includes The node, then for value for 1, be otherwise 0.
As shown in table 1, the Minimum Vertex Covering model for method being limited by using branch disposes the network, only need to dispose 43 Probe can be realized as the traffic monitoring network coverage 100%, i.e., the probe deployment plan implementation 43 based on Minimum Vertex Covering A probe can realize the flow monitoring on each side of network full figure.
1 evaluation index of table
Network node number Probe number The traffic monitoring network coverage
160 43 100%
It should be pointed out that although branch limits method and can acquire the optimal solution of Minimum Vertex Covering, computation complexity Height spends the time long, can not be applied in extensive problem.And the optimal solution of Minimum Vertex Covering not necessarily network The optimal solution of flow monitoring probe deployment, so easier in order to find algorithm, time-consuming shorter and less using number of probes Deployment scheme disposes probe below in conjunction with the property of network flow conservation by minimum weak vertex cover.
As shown in table 2, by using the method for minimum weak fixed point covering, only need to dispose 32 probes can be realized as flow Monitor the network coverage 100%.In this kind of method, the network flow of part path is calculated by flow conservation 's.
2 evaluation index of table
Network node number Probe number The traffic monitoring network coverage
160 32 100%
Compared with the deployment scheme based on Minimum Vertex Covering, the number of probes that this programme uses is less, and algorithm is simpler It is single, it is time-consuming shorter, it is a kind of more excellent Network Traffic Monitoring probe deployment scheme.
But the anti-case of both probe deployments is all Passive Test, can utilize Port Mirroring, multichannel forwarding is with link The data packet of itself transmission in the modes collection networks such as concatenation, including business data packet, signaling data bag and management information data Packet etc. analyzes network performance, passively monitoring network performance, and having does not increase added flow, on the advantages of network influence very little.

Claims (5)

  1. A kind of 1. probe deployment method based on vertex covering and weak vertex cover, which is characterized in that including:Determine test probe Quantity and the test probe deployed position in a network;Wherein,
    The step of determining the quantity of test probe and the test probe deployed position in a network be:
    S1. it sorts to the degree of nodes all in network, is met the degree of preceding k-1 node simultaneously and less than number of links with before Degree and more than link said conditions the k of k node;
    S2., artwork data is configured to the node of a solution space tree, solution is judged whether there is using strategy is delimited, if will without solution K adds 1, reenters S2, if there is that may have solution to be then inserted into Priority Queues;
    S3. if Priority Queues is not sky, then first feasible node is just taken out from Priority Queues, into S4, if excellent K is then added 1 by first queue for sky, reenters S2;
    S4. judge whether present node meets the condition of solution, exited if meeting just output solution, if being unsatisfactory for just entering S5;
    S5. check present node whether can extend, it is impossible to just continued cycling through if extension into S3, if it can extend if Extension, then verification expand to whether left and right node has solution, the expanding node for having solution are inserted into Priority Queues, subsequently into S3 is continued cycling through;
    The step of determining the quantity of test probe and the test probe deployed position in a network be:
    S1. all degree are first deleted as 1 node, that is, delete the row that the sum of all row elements are 1 in incidence matrix;
    S2. the most node of a number of links included is chosen, is denoted as vi
    S3. leave out v in incidence matrixiRow where corresponding row and the element that the row intermediate value is 1;Then in remaining association square Other rows of the sum of all row elements no more than 1 and these row intermediate values are deleted in battle array successively again as the row corresponding to 1 element, directly Until it cannot delete new row and column again;
    S4. S2, the operation of S3, until all links are all incorporated into are repeated.
  2. 2. a kind of probe deployment method based on vertex covering and weak vertex cover according to claim 1, feature exist In before the deployed position of the quantity and the probe of test probe in a network is determined, the method further includes:
    Model is established using optimal queue and space tree;
    After model is established, the deployed position of the quantity and the probe of test probe in network model is determined.
  3. 3. a kind of probe deployment method based on vertex covering and weak vertex cover according to claim 2, feature exist In, model is established using optimal queue and space tree, including:
    The node of present feasible is safeguarded with a Priority Queues, each node maintenance the top being also an option that in the case of the node Count out k1, need the remaining number of edges e covered, the state state on vertex, vertex number of edges Degree information, these nodes press The number of edges on vertex sorts from big to small, wherein for the state on vertex, there are three types of states on vertex in the strategy, have respectively selected State s1, unselected state s2, the state s3 that can be selected selected, wherein, the state s1 homographic solutions having selected for are empty Between left sibling in tree number, select the node, then which be set for state s1 has been selected;Unselected state s2 is corresponded to Right node in solution space tree, does not select the node, then sets the node not select state s2;The state s3 that can be selected Father node in homographic solution space tree, selects the node, then sets the node as that can select state s3;S1 and s2 is Through determining state, the selection of node can only be chosen from s3.
  4. 4. a kind of probe deployment method based on vertex covering and weak vertex cover according to claims 1 or 2 or 3, It is characterized in that, before the deployed position of the quantity and the probe of test probe in a network is determined, the method further includes:
    Establish the detection model based on minimum weak vertex cover;
    After model is established, the deployed position of the quantity and the probe of test probe in network detection model is determined.
  5. 5. a kind of probe deployment method based on vertex covering and weak vertex cover according to claim 4, feature exist In, the detection model based on minimum weak vertex cover is established, including:
    The incidence matrix of a node and link is established, the matrix is using link as row, using node as row, if the link includes the section Point, then corresponding value is 1, is otherwise 0.
CN201510807537.3A 2015-11-19 2015-11-19 A kind of probe deployment method based on vertex covering and weak vertex cover Expired - Fee Related CN105490834B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510807537.3A CN105490834B (en) 2015-11-19 2015-11-19 A kind of probe deployment method based on vertex covering and weak vertex cover

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510807537.3A CN105490834B (en) 2015-11-19 2015-11-19 A kind of probe deployment method based on vertex covering and weak vertex cover

Publications (2)

Publication Number Publication Date
CN105490834A CN105490834A (en) 2016-04-13
CN105490834B true CN105490834B (en) 2018-06-26

Family

ID=55677578

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510807537.3A Expired - Fee Related CN105490834B (en) 2015-11-19 2015-11-19 A kind of probe deployment method based on vertex covering and weak vertex cover

Country Status (1)

Country Link
CN (1) CN105490834B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737455B (en) * 2017-04-13 2020-12-25 国家电网有限公司 Network service identification device and method
CN107147534A (en) * 2017-05-31 2017-09-08 国家电网公司 A kind of probe deployment method of quantity optimization for power telecom network fault detect
CN107483309B (en) * 2017-07-24 2020-10-23 中国空间技术研究院 Distributed network system minimum weight vertex coverage solving method based on game theory
CN109714220B (en) * 2017-10-25 2020-11-13 中国电信股份有限公司 Network quality detection method and device
CN108198414A (en) * 2017-12-27 2018-06-22 北斗七星(重庆)物联网技术有限公司 A kind of method, apparatus, equipment and the storage medium of road monitoring point position distribution
CN109041071A (en) * 2018-07-27 2018-12-18 北京国电通网络技术有限公司 A kind of electric power wireless private network probe deployment method and apparatus
CN109299443B (en) * 2018-09-04 2023-04-14 中山大学 News text duplication eliminating method based on minimum vertex coverage
CN112422322A (en) * 2020-10-28 2021-02-26 北京邮电大学 Multi-objective optimization method based on probe scheduling and related equipment
CN113965400B (en) * 2021-11-01 2023-06-30 电子科技大学长三角研究院(衢州) Method for determining flow key points in communication network
CN116232956B (en) * 2023-05-06 2023-07-18 国网智能电网研究院有限公司 Network time delay in-band telemetry method, device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546319A (en) * 2013-10-18 2014-01-29 中国南方电网有限责任公司 Flow alarming method and system of network equipment
EP2882141A1 (en) * 2013-12-04 2015-06-10 Exfo Inc. Network test system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546319A (en) * 2013-10-18 2014-01-29 中国南方电网有限责任公司 Flow alarming method and system of network equipment
EP2882141A1 (en) * 2013-12-04 2015-06-10 Exfo Inc. Network test system

Also Published As

Publication number Publication date
CN105490834A (en) 2016-04-13

Similar Documents

Publication Publication Date Title
CN105490834B (en) A kind of probe deployment method based on vertex covering and weak vertex cover
Yoon et al. Exploiting spatial correlation towards an energy efficient clustered aggregation technique (cag)[wireless sensor network applications]
CN104125153B (en) Method for discovering network topology and equipment
CN108366386B (en) Method for realizing wireless network fault detection by using neural network
CN104468192B (en) The method for routing that a kind of multiple dimensioned many weight link-qualities are assessed
CN107483487B (en) TOPSIS-based multi-dimensional network security measurement method
CN104935476B (en) A kind of network traffics matrix measuring method based on SDN
CN107332631A (en) A kind of method of use multi-attribute group decision making theoretical evaluation link-quality assessment models
CN103281256B (en) The end-to-end path packet loss detection method of chromatography Network Based
CN105120477B (en) A kind of mobile network optimization method and system
CN103747537A (en) Wireless sensor network outlier data self-adaption detecting method based on entropy measurement
CN110049528A (en) Mobile trust data collection method based on trust value effectiveness in a kind of Sensor Network
CN105357132A (en) Multi-domain ASON damage perception multicast routing method based on hypergraph model
CN102883359A (en) Method, device and system for measuring key nodes of wireless sensor network
CN101610246B (en) Method for inferring source-target flow component of link layer of local area network
Qi et al. Distributed combat system of systems network modeling
CN106850253A (en) A kind of method of the transmission time reliability measurement based on multimode network
CN104093182A (en) Method for acquiring a plurality of reliable communication paths based on field intensity in multi-layer wireless network
CN106603294B (en) A kind of synthesis vulnerability assessment method based on power communication web frame and state
CN113411766A (en) Intelligent Internet of things comprehensive sensing system and method
Chen et al. Using node clustering and genetic programming to estimate missing data for marine environmental monitoring
CN111654413B (en) Method, equipment and storage medium for selecting effective measurement points of network flow
Zhao et al. MPIDA: A sensor network topology inference algorithm
Torres et al. Modeling, analysis and simulation of ant-based network routing protocols
Wan et al. Capturing Spatial-Temporal Correlations with Attention Based Graph Convolutional Networks for Network Traffic Prediction

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180626

Termination date: 20181119