Network tomography via network coding

G. Sharma, S. Jaggi, B. K. Dey

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

24 Citations (Scopus)

Abstract

In this work we show how existing network coding algorithms can be used to perform network tomography, i.e., estimate network topology. We first examine a simple variant of the popular distributed random network codes proposed by Ho et al. [14], and show how it can enable each network node to passively estimate the network topology upstream of it at no cost to throughput. The delays introduced by each upstream node and link can also be similarly estimated. We then consider the scenario wherein an adversary hidden in the network wishes to disrupt the estimation of network topology. We show how network error-correcting codes can be used to reliably perform network tomography if the network has sufficient connectivity, and demonstrate that network tomography is impossible otherwise.

Original languageEnglish
Title of host publication2008 Information Theory and Applications Workshop - Conference Proceedings, ITA
Pages151-157
Number of pages7
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event2008 Information Theory and Applications Workshop - ITA - San Diego, CA, United States
Duration: 27 Jan 20081 Feb 2008

Publication series

Name2008 Information Theory and Applications Workshop - Conference Proceedings, ITA

Conference

Conference2008 Information Theory and Applications Workshop - ITA
Country/TerritoryUnited States
CitySan Diego, CA
Period27/01/081/02/08

Keywords

  • Byzantine adversaries
  • Network coding
  • Network tomography
  • Topological identification

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Network tomography via network coding'. Together they form a unique fingerprint.

Cite this