Which command is used to trace path from one node to another in network?
Answers from top 17 papers
More filters
Papers (17) | Insight |
---|---|
And worm detection at network level is one possible detecting path, especially for Network Intrusion Detection Systems(NIDS). | |
11 Nov 2010 | If the path fail we still have alternate path can be used for reducing the overhead of route discovery for the network. |
14 Apr 2013 | In particular, if one monitors only the network boundary and records the first boundary node hit by a random walk, this distribution can be related to the location of the source node. |
This triangular network topology provides us with an efficient way to find a path from any source node to the destination node or area, and to process spatial queries. | |
05 Nov 2007 70 Citations | Based on our analytical model, we propose a novel routing metric that can be used to discover high throughput path in a congested network. |
As a result, a source node can discover a trustworthy path to the destination node and each intermediate node can also detect its neighbor nodes. | |
We propose and analyze an algorithm which inserts edges by ordering each trace into a path according to which pairs of nodes in the path co-occur most frequently in the observations. | |
We propose that network path caching can provide an efficient way to eliminate, whenever possible, the expensive path computation algorithm that has to be performed in setting up a network connection. | |
20 Apr 2010 56 Citations | This provides an assured path from any node to the sink node. |
31 Citations | The method is also applicable to network trace data characterizing communication patterns between pairs of computers. |
This paper proposes that the nodes which are not participating in multi-path routing generates an alarm message during delay and then detects and isolate the malicious node from network. | |
33 Citations | It finds one near to shortest path per iteration and can be performed repeatedly iteration to find more on-demand shortest node-disjoint routing paths. |
To the best of our knowledge, ParaCon is the first attempt that utilizes node parallelism in SDN path computation. | |
28 Citations | In addition, it is more straightforward to realize the permutation networks path history unit than the trace-forward unit. |
21 Citations | It is important to note that this technique will always found out minimum path and even alternate path are also saved in case of node failure. |
This approach allows a node to verify that another node is a physical next-hop neighbour, and also detects legitimate neighbours who make dishonest claims as to who their neighbours are. | |
18 Dec 2009 | In this paper, we propose an algorithm in which every node in the network self-detects whether it is a boundary node or an inner node by utilizing the available connectivity information and making no assumptions about the location awareness. |
Related Questions
How does transfer path analysis works?5 answersTransfer path analysis (TPA) is a method used to identify critical sound paths in a system. It involves dividing the system into an active component (source) and a passive component (structure) and analyzing their respective behaviors. The excitation behavior of the source is characterized, and the transmission behavior of the structure is assessed. The two systems are then compared to determine if any changes to the source or structure are needed. TPA can be combined with neural network techniques, where operational data is used to train the neural network model. This reduces the need for additional measurements and costs associated with identifying noise propagation paths. TPA can also be applied to agricultural tractors to analyze noise and vibration contributions and derive excitation forces for virtual models. While TPA is commonly used in the automotive field, it is being explored for application in naval architecture to identify vibration and noise sources and paths on ships. Wind turbine models can also benefit from TPA to optimize individual transfer paths and improve vibration transmission.
What are control systems for path tracking?5 answersControl systems for path tracking are essential for improving vehicle performance, ensuring safety, and enabling autonomous driving technology. Various control methods have been proposed in the literature. Li and Nan developed a path planning and tracking control method for parafoil systems, incorporating sliding mode control to enhance accuracy and robustness. Chen studied path tracking control for unmanned vehicles, emphasizing the need for a joint simulation platform to investigate control performance under different conditions. Duan focused on path tracking control for mobile robots, proposing a controller based on optimization theory that demonstrated strong tracking and navigation abilities. Zhang et al. addressed the issue of delays in the control loop of autonomous vehicles and presented a model predictive control method with delay compensation, improving system robustness and stability. These studies highlight the importance of control systems in achieving accurate and reliable path tracking in various applications.
Where have path signatures been used?5 answersPath signatures have been used in various applications such as non-intrusive load monitoring (NILM), repetition detection with period variations, optimal double-execution trading strategy, time series analysis for Lie group-valued data, and feature generation for identifying Alzheimer's disease.
What is the method of nodes in bridges?4 answersThe method of nodes in bridges involves identifying and selecting specific nodes within a network based on various metrics and calculations. This method is used to determine the most critical nodes in a bridge structure. The selection process includes evaluating global and local metrics, such as total traffic flow and traffic flow between nodes, to calculate combinations that determine the bridge node. This method is implemented using specially programmed computers and can be applied to networks with multiple nodes.
Which command is used to query for the network round trip between any two nodes?8 answers
Which command is used to retrieve information on a particular Unix command or system call?9 answers