The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traffic management is the adaptation of source rates and routing to efficiently utilize network resources. Recently, the complicated interactions between different Internet traffic management modules have been elegantly modeled by distributed primal-dual utility maximization, which sheds new light for developing effective management protocols. For single-path routing with given routes, the dual is...
Constructing a router-level topology map of an IPv6 network is important for understanding the internal properties of IPv6 networks, building new applications, network management, etc. However, the well-known topology discovery tool, traceroute6, can only obtain interface-level topology information, which creates a significant problem known as IPv6 alias resolution. Though the inaccuracy and incompleteness...
Recently, the characteristics of traceroute probe have been widely studied in the field of Internet topology discovery, which helps researchers to understand the role of Traceroute tool better, such as sampling bias, marginal utility and so on. In this paper, we study three raw datasets of traceroute probe of different platforms and observe an interesting phenomenon: in the process of one probe, every...
In the past few years, P2P file distribution applications (e.g., Bit Torrent) are becoming so popular that they are the dominating source of Internet traffic. This brings significant problems not only because the increasing P2P traffic costs most of network bandwidth, but also the overmuch P2P connections increase the burden on the end-users. In this paper we present a peers' popularity model that...
Considerable effort has been spent on collecting all the information of routers by using traceroute-like probes in the router-level topology measurements. This method has been argued to introduce uncontrolled sampling biases on statistical properties of the sample graph and heavy load to the network being measured. In order to improve the quality of the maps induced by the method, researchers are...
With the rapid development of IPv6 network, constructing a router-level topology of IPv6 is helpful for network management, network simulation, protocol design, etc. As same as IPv4, the well-known IPv6 topology discovery tool, traceroute6, also brings an important problem named alias resolution. In this paper, we present one novel heuristic method, called Route Positional Method (RPM), for IPv6 alias...
Internet topology plays a vital role in studying network's internal structure and properties. Currently traceroute-based topology discovery is the main approach to map the network. However, the deployments of probing sources are usually quite costly and complex. Even if the total numbers of sources are the same, the overall coverage of the sampled network may vary significantly for different sources...
An accurate map of the Internet is very important for studying the network??s internal structure and network management. The main approach to map the Internet is to collect information from a set of sources by using traceroute-like probes. In a typical mapping project, active measurement sources are relatively scarce while traceroute destinations are plentiful, which makes the sampled graph quite...
Building a multicast tree in an overlay network is the major problem in application layer multicast. In a selfish overlay network, the end hosts may not be cooperative. They are willing to maximize their own benefits instead of being loyal to the protocol or altruistically contributing to the benefits of the whole overlay network. In this paper, we design a strategyproof mechanism in building a truthful...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.