Notation |
|
ix | |
Introduction |
|
1 | (2) |
|
|
3 | (7) |
|
|
3 | (3) |
|
1.1.1 Graph-Theoretic Definitions |
|
|
3 | (1) |
|
|
4 | (2) |
|
1.2 Background on Linear Algebra |
|
|
6 | (1) |
|
1.3 Background on Parameter Estimation |
|
|
6 | (2) |
|
1.3.1 Fisher Information Matrix and the Cramer-Rao Bound |
|
|
7 | (1) |
|
1.3.2 Maximum Likelihood Estimator |
|
|
7 | (1) |
|
1.4 Background on Routing Mechanisms |
|
|
8 | (1) |
|
|
8 | (2) |
|
2 Fundamental Conditions for Additive Network Tomography |
|
|
10 | (33) |
|
|
10 | (1) |
|
2.2 Algebraic Condition for General Measurements |
|
|
11 | (2) |
|
2.2.1 Illustrative Example |
|
|
12 | (1) |
|
2.2.2 Limitations of Algebraic Conditions |
|
|
13 | (1) |
|
2.3 Topological Condition under Arbitrarily Controllable Routing |
|
|
13 | (1) |
|
2.4 Topological Condition under Controllable Cycle-Based Routing |
|
|
14 | (6) |
|
2.4.1 Identifiability with One Monitor |
|
|
14 | (2) |
|
2.4.2 Identifiability with Multiple Monitors |
|
|
16 | (1) |
|
2.4.3 Robust Identifiability |
|
|
17 | (3) |
|
2.5 Topological Condition under Controllable Cycle-Free Routing |
|
|
20 | (21) |
|
2.5.1 Unidentifiability with Two Monitors |
|
|
20 | (3) |
|
2.5.2 Identifiability of Interior Links with Two Monitors |
|
|
23 | (6) |
|
2.5.3 Complete Identifiability Condition |
|
|
29 | (4) |
|
2.5.4 Determination of Partial Identifiability |
|
|
33 | (8) |
|
|
41 | (2) |
|
3 Monitor Placement for Additive Network Tomography |
|
|
43 | (35) |
|
3.1 Monitor Placement under Controllable Cycle-Based Routing |
|
|
43 | (7) |
|
3.1.1 Monitor Placement for Complete Identifiability |
|
|
43 | (2) |
|
3.1.2 Robust Monitor Placement |
|
|
45 | (5) |
|
3.2 Monitor Placements under Controllable Cycle-Free Routing |
|
|
50 | (26) |
|
3.2.1 Monitor Placement for Complete Identifiability |
|
|
50 | (6) |
|
3.2.2 Monitor Placement for Maximal Identifiability |
|
|
56 | (8) |
|
3.2.3 Preferential Monitor Placement |
|
|
64 | (8) |
|
3.2.4 Robust Monitor Placement |
|
|
72 | (4) |
|
|
76 | (2) |
|
4 Measurement Path Construction for Additive Network Tomography |
|
|
78 | (24) |
|
4.1 Path Construction for Cycle-Based Measurements |
|
|
78 | (3) |
|
4.2 Path Construction for Cycle-Free Measurements |
|
|
81 | (12) |
|
|
81 | (2) |
|
4.2.2 Spanning Tree-Based Path Construction |
|
|
83 | (3) |
|
4.2.3 Spanning Tree-Based Link Identification |
|
|
86 | (1) |
|
4.2.4 Complexity Analysis |
|
|
87 | (1) |
|
|
88 | (1) |
|
4.2.6 Performance Evaluation |
|
|
89 | (4) |
|
4.3 Robust Path Construction |
|
|
93 | (7) |
|
4.3.1 Problem Formulation |
|
|
94 | (1) |
|
4.3.2 Properties and Algorithm |
|
|
95 | (2) |
|
4.3.3 Conditions for Optimality of RoMe |
|
|
97 | (1) |
|
4.3.4 Approximating the Expected Rank |
|
|
97 | (1) |
|
4.3.5 Performance Evaluation |
|
|
98 | (2) |
|
|
100 | (1) |
|
|
101 | (1) |
|
5 Fundamental Conditions for Boolean Network Tomography |
|
|
102 | (36) |
|
|
103 | (2) |
|
5.2 Conditions for k-Identifiability |
|
|
105 | (11) |
|
5.2.1 Abstract Conditions for k-Identifiability |
|
|
105 | (1) |
|
5.2.2 Verifiable Conditions for k-Identifiability |
|
|
106 | (10) |
|
5.3 Measure of Maximum Identifiability |
|
|
116 | (4) |
|
5.3.1 Abstract Bounds on Maximum Identifiability |
|
|
116 | (1) |
|
5.3.2 Computable Bounds on Maximum Identifiability |
|
|
117 | (2) |
|
5.3.3 Evaluation of Maximum Identifiability |
|
|
119 | (1) |
|
5.4 Generalization to Preferential Boolean Network Tomography |
|
|
120 | (12) |
|
5.4.1 Generalized Identifiability Measures |
|
|
120 | (3) |
|
5.4.2 Generalized k-Identifiability Conditions |
|
|
123 | (5) |
|
5.4.3 Generalized Maximum Identifiability Bounds |
|
|
128 | (3) |
|
5.4.4 Evaluation of Generalized Maximum Identihability |
|
|
131 | (1) |
|
5.5 Other Types of Failures |
|
|
132 | (5) |
|
5.5.1 Node and Link Failures |
|
|
132 | (1) |
|
|
133 | (4) |
|
|
137 | (1) |
|
6 Measurement Design for Boolean Network Tomography |
|
|
138 | (36) |
|
6.1 Monitor Placement Problem |
|
|
138 | (11) |
|
6.1.1 Monitor Placement for Link Failure Localization |
|
|
139 | (4) |
|
6.1.2 Monitor Placement for Node Failure Localization |
|
|
143 | (6) |
|
6.2 Beacon Placement Problem |
|
|
149 | (5) |
|
6.2.1 Routing Assumptions |
|
|
149 | (1) |
|
6.2.2 Beacon Placement under Single-Link Failures |
|
|
150 | (3) |
|
6.2.3 Beacon Placement under Arbitrary-Link Failures |
|
|
153 | (1) |
|
6.3 Path Construction Problem |
|
|
154 | (11) |
|
6.3.1 Path Selection under Uncontrollable Routing |
|
|
154 | (4) |
|
6.3.2 Path Construction under Controllable Routing |
|
|
158 | (7) |
|
6.3.3 Bounds on Number of Paths |
|
|
165 | (1) |
|
6.4 Service Placement Problem |
|
|
165 | (7) |
|
6.4.1 Monitoring-Aware Service Placement |
|
|
166 | (2) |
|
6.4.2 Hardness and Approximation Algorithms |
|
|
168 | (3) |
|
6.4.3 Performance Evaluation |
|
|
171 | (1) |
|
|
172 | (2) |
|
7 Stochastic Network Tomography Using Unicast Measurements |
|
|
174 | (27) |
|
|
175 | (2) |
|
|
175 | (1) |
|
7.1.2 Stochastic Link Metric Tomography |
|
|
175 | (1) |
|
7.1.3 Loss Tomography Using Unicast Measurements |
|
|
175 | (1) |
|
7.1.4 Packet Delay Variation Tomography |
|
|
176 | (1) |
|
|
176 | (1) |
|
7.2 Identihability and Invertibility of Fisher Information Matrix |
|
|
177 | (1) |
|
7.3 Link Parameter Estimation |
|
|
178 | (2) |
|
7.3.1 Maximum Likelihood Estimator for Packet Loss Tomography |
|
|
178 | (1) |
|
7.3.2 Maximum Likelihood Estimator for Packet Delay Variation Tomography |
|
|
179 | (1) |
|
|
180 | (7) |
|
|
180 | (3) |
|
|
183 | (1) |
|
7.4.3 Weighted A-Optimal Design |
|
|
184 | (1) |
|
7.4.4 Application to Loss/PDV Tomography |
|
|
185 | (2) |
|
7.5 Experiment Design Algorithms |
|
|
187 | (4) |
|
7.5.1 Closed-Form Solutions for |P| = |L| |
|
|
188 | (1) |
|
7.5.2 Heuristic Solution for |P| > |L| |
|
|
188 | (1) |
|
7.5.3 Iterative Design Algorithm |
|
|
189 | (2) |
|
7.6 Performance Evaluation |
|
|
191 | (8) |
|
7.6.1 Dataset for Evaluation |
|
|
192 | (1) |
|
7.6.2 Evaluation of Loss Tomography |
|
|
192 | (5) |
|
7.6.3 Evaluation of Packet Delay Variation Tomography |
|
|
197 | (2) |
|
|
199 | (1) |
|
|
200 | (1) |
|
8 Stochastic Network Tomography Using Multicast Measurements |
|
|
201 | (17) |
|
8.1 Loss Tomography Using Multicast Measurements |
|
|
202 | (2) |
|
|
203 | (1) |
|
8.1.2 Data, Likelihood, and Inference |
|
|
203 | (1) |
|
8.2 The Maximum Likelihood Estimator |
|
|
204 | (2) |
|
|
205 | (1) |
|
8.3 Multicast versus Unicast for Link Loss Tomography |
|
|
206 | (4) |
|
|
208 | (1) |
|
|
208 | (2) |
|
|
210 | (1) |
|
8.4 Inference of Multicast Trees |
|
|
210 | (6) |
|
|
214 | (2) |
|
|
216 | (1) |
|
|
217 | (1) |
|
9 Other Applications and Miscellaneous Techniques |
|
|
218 | (8) |
|
9.1 Network Topology Tomography |
|
|
218 | (2) |
|
9.1.1 Techniques Based on Multicast Probing |
|
|
218 | (1) |
|
9.1.2 Techniques Based on Unicast Probing |
|
|
219 | (1) |
|
9.1.3 Techniques for Non-tree Topologies |
|
|
219 | (1) |
|
|
219 | (1) |
|
9.2 Traffic Matrix Tomography |
|
|
220 | (1) |
|
9.3 Miscellaneous Techniques |
|
|
221 | (1) |
|
9.3.1 Range-Based or Bound-Based Network Tomography |
|
|
221 | (1) |
|
9.3.2 Network Coding-Based Network Tomography |
|
|
221 | (1) |
|
9.4 Practical Issues and Future Directions |
|
|
222 | (1) |
|
|
223 | (3) |
Appendix Datasets for Evaluations |
|
226 | (4) |
Index |
|
230 | |