Network Discovery and Verification
read more
Citations
Random graphs
On the Metric Dimension of Cartesian Products of Graphs
Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)
Improved low-degree testing and its applications
Extremal graph theory for metric dimension and diameter
References
Computers and Intractability: A Guide to the Theory of NP-Completeness
Emergence of Scaling in Random Networks
Approximation Algorithms
Probabilistic computations: Toward a unified measure of complexity
On inferring autonomous system relationships in the internet
Related Papers (5)
Frequently Asked Questions (12)
Q2. What is the purpose of the query model?
In real networks, routing is not necessarily along shortest paths, but may be affected by routing policies, link qualities, or link capacities.
Q3. What is the common technique used to create a map of the Internet?
In order to create maps of the Internet, a commonly used technique is to obtain local views of the network from various locations (vantage points) and combine them into a map that is hopefully a good approximation of the real network [1,2].
Q4. What is the purpose of the study?
The subject of their study can be seen as one example of a family of problem settings in which the goal is to discover or verify information about a graph using certain kindsof queries.
Q5. What is the goal of network discovery?
In this paper, the authors formalize network discovery as a combinatorial optimization problem whose goal is to minimize the number of queries required to discover all edges and non-edges of the network.
Q6. What is the motivation for the research?
As mentioned above, the motivation for their research comes from the problem of discovering information about the topology of communication networks such as the Internet or peer-to-peer networks.
Q7. What is the main topic of this paper?
In recent years, there has been an increasing interest in the study of networks whose structure has not been imposed by a central authority but arisen from local and distributed processes.
Q8. What is the name of the paper?
Dagstuhl Seminar Proceedings 05031 Algorithms for Optimization with Incomplete Information http://drops.dagstuhl.de/opus/volltexte/2005/59an unknown network by using a certain type of queries—a query corresponds to asking for the local view of the network from one specific vantage point.
Q9. How can the authors prove that the network verification problem is possible?
For the network verification problem, the authors prove that it cannot be approximated within a factor of o(log n) unless P = NP , thus showing that the approximation algorithm from [4] is best possible (up to constant factors).
Q10. What is the main idea of the paper?
In this paper, the authors consider a query model in which the answer to a query at a vertex v consists of all edges and non-edges whose endpoints have different (graph-theoretic) distance from v.
Q11. What is the motivation for placing landmarks in graphs?
the motivation is to place landmarks in as few vertices of the graph as possible in such a way that each vertex of the graph is uniquely identified by the vector of its distances to the landmarks.
Q12. How many landmarks can be placed in graphs?
For network discovery, the authors give a lower bound showing that no deterministic on-line algorithm can have competitive ratio better than 3, and the authors present a randomized online algorithm with competitive ratio O( √ n log n) for networks with n nodes.