• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

K.: Estimating network layer subnet characteristics via statistical sampling (2012)

by M E Tozal, Sarac
Venue:In: Proc. IFIP Networking
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

Internet topology discovery

by Benoit Donnet - asurvey.IEEE Communications Surveys and Tutorials , 2007
"... Abstract. Since the nineties, the Internet has seen an impressive growth, in terms of users, intermediate systems (such as routers), autonomous systems, or applications. In parallel to this growth, the research commu-nity has been looking for obtaining and modeling the Internet topology, i.e., how t ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract. Since the nineties, the Internet has seen an impressive growth, in terms of users, intermediate systems (such as routers), autonomous systems, or applications. In parallel to this growth, the research commu-nity has been looking for obtaining and modeling the Internet topology, i.e., how the various elements of the network interconnect between them-selves. An impressive amount of work has been done regarding how to collect data and how to analyse and model it. This chapter reviews main approaches for gathering Internet topology data. We first focus on hop limited probing, i.e., traceroute-like prob-ing. We review large-scale tracerouting projects and discuss traceroute limitations and how they are mitigated by new techniques or extensions. Hop limited probing can reveal an IP interface vision of the Internet. We next focus on techniques for aggregating several IP interfaces of a given router into a single identifier. This leads to a router level vision of the topology. The aggregation can be done through a process called alias resolution. We also review a technique based on IGMP probing that silently collect all multicast interfaces of a router into a single probe. We next refine the router level topology by adding subnet information. We finish this chapter by discussing the AS level topology, in particular the relationships between ASes and the induced hierarchy.
(Show Context)

Citation Context

...n end-to-end path. exploreNET also presents techniques for sampling subnets in the target domain and their global characteristics (such as mean subnet degree, subnet prefix length distribution, etc.) =-=[7]-=-. 4.1.2 Passive Methods Although it is not its primary goal, IGMP probing (see Sec. 3.2) allows one to detect subnets [14]. The subnet inference requires to post-process the collected data by followin...

Internet Topology Research Redux

by Walter Willinger, Matthew Roughan
"... Internet topology research is concerned with the study of the various types of connectivity structures that are enabled by the layered architecture of the Internet. More than a decade of Internet topology research has produced a number of high-profile "discoveries " that continue to fascin ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Internet topology research is concerned with the study of the various types of connectivity structures that are enabled by the layered architecture of the Internet. More than a decade of Internet topology research has produced a number of high-profile "discoveries " that continue to fascinate the scientific community, even though (or, especially because) they have been simultaneously touted by different
(Show Context)

Citation Context

...rate nodes [19], but that is rarely what is useful for network operations or research. We could also add at layer 3, in addition to interface-level topology described above, the subnet-level topology =-=[19, 67, 81, 148, 149]-=-, describing the interconnectivity of logical subnets (often described by an IP-level prefix), but here we focus on the more commonly considered router level. The router-level graph shows a range of i...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University