Ethernet Topology Detection from a Single Host without Assistance of Network Nodes or Other Hosts

نویسندگان

  • Yohei Hasegawa
  • Masahiro Jibiki
چکیده

Topology information has become more important for management of LANs due to the increasing number of hosts attached to a LAN. We describe three Ethernet topology discovery techniques that can be used even in LANs with Ethernet switches that have no management functionality. Our “Shared Switch Detection (SSD)” technique detects the Ethernet tree topology by testing whether two paths in the network share a switch. SSD uses only general MAC address learning. By borrowing MAC addresses from hosts, SSD can be run from a single host. The second technique determines whether two paths between two pairs of hosts contain a switch. The third reduces the number of shared switch detections. Simulation showed that these techniques can be used to detect the Ethernet topology with a reasonable search cost. Examination on a real-world testbed showed that they could detect an Ethernet topology consisting of six hosts and two switches within one second. key words: Ethernet, topology detection, network probing

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

The Impact of Topoloy and Link Aggregation on PC Cluster with Ethernet

Ethernet has been used for connecting hosts in the area of high-performance computing, besides its use in local area networks. In this paper, we investigate the impact of topology and link aggregation on a large-scale PC cluster with Ethernet. Ethernet topology that allows loops and its routing can be implemented by the VLAN routing method without creating broadcast storms. To simplify the syst...

متن کامل

BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...

متن کامل

Topology Control in Wireless Sensor Network using Fuzzy Logic

Network sensors consist of sensor nodes in which every node covers a limited area. The most common use ofthese networks is in unreachable fields.Sink is a node that collects data from other nodes.One of the main challenges in these networks is the limitation of nodes battery (power supply). Therefore, the use oftopology control is required to decrease power consumption and increase network acce...

متن کامل

Vegetative compatibility and rep-PCR DNA fingerprinting groups of Fusarium solani isolates obtained from different hosts and their pathogenicity

Fusarium solain is the most important pathogen of huge range of plant hosts, especially potato in the word, which causes tuber rot in storage and root rot of potato plants in fields. Fifty four isolates from potato, bean, chickpea and cucurbit (melon, watermelon and cucumber) was subjected in a study through analysis of vegetative compatibility groups (VCGs) and rep-PCR DNA fingerprinting. Nit ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEICE Transactions

دوره 92-B  شماره 

صفحات  -

تاریخ انتشار 2009