Font Size: a A A

Techniques Of Unauthorized Target Computer Network Topology Discovery

Posted on:2009-08-26Degree:MasterType:Thesis
Country:ChinaCandidate:H Z ShiFull Text:PDF
GTID:2178360278457105Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of computer science and network technologies, the structure of computer network is more and more complicated due to the increasing nodes and links. Different kinds of nodes in computer network, such as Autonomous Systems, Internet Service Providers, routers, switches, hosts, and so on, and various links make the discovery of computer network topology much more difficult than before. At the same time, as the bases of network building, maintenance and research, network topology discovery is studied by many researchers.Most of researchers are not the network administrators, so it is not an easy thing for them to get the topology information of target network directly. What these researchers can do is making it possible in unauthorized target computer network. However, there are some problems in the recent techniques and systems, for example the router alias resolution and anonymous router processing.This dissertation, aiming at the problems in AS topology and router topology discovery techniques and procedures, proposes several critical techniques to solve these problems, and develops a Tool named as TopDisc to discovery the topology of unauthorized target network. The main work of this paper is given as follows.(1) Introduce and analyze the recent techniques of discovery AS topology and router topology and their disadvantages.(2) Distinguish between the topology discovery in authorized and unauthorized target network, and propose a procedure and a set of techniques in unauthorized target network topology discovery.(3) Propose a new router alias resolution technique, named as Neighbors-Subnet Resolution, which is much better than the existing methods. (4) Propose a new anonymous router processing method, named as Maximal Anonymous Router Processing.(5) Enhance the existing Spring Magnetic model, and make it more suitable for drawing the topologies of computer network.(6) Develop a system, named as TopDisc, which is an autonomous topology discovery system for unauthorized network. TopDisc also can provide visualization of the topologies.By using the techniques of topology discovery proposed in this paper, TopDisc gets larger topology range and less time consumption, and the topologies are more accurate and complete.
Keywords/Search Tags:Computer Network, Internet, Topology Discovery, Autonomous System, Router Topology
PDF Full Text Request
Related items