The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, we propose techniques to attain visibility into an arbitrary Internet subnetwork that is responsive to indirect probes but not to direct probes. By probing the network from a small number of selected vantage points, we are able to collect information about network-layer topology which would otherwise be hidden from measurement due to rate limiting practices, security mechanisms, and...
In a stub network which is connected to Internet via more than one edge routers to Internet Service Providers, the users are classified into groups where each group is connected to one edge router. Each edge link of the stub network has its own maximum available bandwidth provided by the ISP. If the group of users assigned to an edge link downloads a total inbound traffic which exceeds the maximum...
The self-interest of agents in strategic networks, i.e. networks where self-interested agents interact, leads to intrinsic incentive problems which impact the stability and efficiency of such networks. This paper propose the first game-theoretic framework for analyzing and understanding how strategic networks are formed endogenously, driven by the self-interested decisions of individual agents aiming...
Inferring the Autonomous System (AS) level end-to-end paths is valuable for both network operators and researchers. It has been widely researched by scholars. Many algorithms are based on the AS topology with labeling AS business relationships, and give the path sets which satisfied for the shortest valley-free property. However, they all consider the paths in the candidate paths set undifferentiated,...
This paper presents an economic perspective on traffic attraction and countermeasures. The results demonstrate that tier-1, tier-2, and tier-3 networks have significant financial incentives to attract traffic. In comparison to ASes from the lower tiers, the tier-1 networks are in a stronger position to benefit from traffic attraction with respect to: (a) the degree of the attainable gain, (b) impact...
OpenFlow is a new protocol which enables researchers to run experimental protocols in a network without changing the network topology. In the paper, we analyze and test OpenFlow based on a formal method, such as CPN (colored Petri net). To avoid state exploration, we mainly focus on testing the interaction property of OpenFlow. According to the latest OpenFlow specification, we construct its hierarchy...
The Peer-to-Peer (P2P) file sharing system, most notably BitTorrent (BT), have achieved tremendous success among Internet users. Recent studies suggest that the long-term relationships among BitTorrent peers can be explored to enhance the downloading performance. In such systems, The mechanisms like tit-for-tat, optimistic unchoking, anti-snubbing, various piece and selection strategy have been working...
The virtualization trend in today's Internet decouples services from the constraints of the underlying physical infrastructure. This decoupling facilitates more flexible and efficient resource allocations: the service can be realized at any place in the substrate network which fulfills the service specification requirements.
Prefix deaggregation is recognized as a steady long-lived phenomenon at the interdomain level, despite its well-known negative effects for the community. The advertisement of more-specific prefixes provides network operators with a fine-grained method to control the interdomain ingress traffic. Moreover, customer networks combining this mechanism with selective advertisements may decrease their monthly...
The Internet topology has been studied extensively for decades. However, the emphasis of Internet topology research has been on logical level topologies. On the other hand, physical level topologies are necessary to study the resilience of networks realistically. In this paper, we analyse the structure of synthetic geographic topologies whose node locations are given by those of actual physical level...
In this paper we propose an efficient scheme for supporting multi-path based in-network content caching by leveraging Loop-Free Alternate (LFA) in IP routing. The purpose is to enable clustered distribution of cached content chunks at en-route routers between the content source and the requester. In order to achieve caching localization, we also introduce policies that limit the maximum allowable...
The Named Data Networking (NDN) is proposed recently as a promising paradigm for the future Internet due to its built-in caching and name-based routing for ef??cient content distribution. For the time being, the research on NDN caching is still a preliminary topic, especially for the scenario of an ISP with multiple gateways. For more in-depth excavation, we have studied the effective intra-ISP caching...
The current technology of Internet provides an acceptable level of resilience in normal operation. However, the Internet may get catastrophic impacts when unexpected disasters such as earthquakes, tsunami, etc. happen. Specifically, the Internet infrastructure including Wide Area Networks (WANs) face many challenges to normal operation including power outage, link, device failures, rerouting packets,...
The Internet has become a primary means of communication, even though it currently does not guarantee Quality of Service (QoS). In order to tackle with this problem, companies establish Service Level Agreements (SLA) with their providers, including the reliability of services. This paper shows an algorithm for virtual network allocation in a reliability context, where some techniques of disjoint path...
While making the Internet totally trustworthy is intractable, making as trustworthy as possible is a crucial problem. Within this landscape, authentication of the IP source address remains one important topic in need of further study. However, most source address validation methods are difficult to implement in practice because of deployment difficulties. This research designs an efficient inter-domain...
Botnets have contributed to the significant part of the increasing malicious activities such as Distributed Denial of Service (DDoS), spam, and click fraud. Based on the analysis on the basic and essential characters of botnet, this paper deals with the botnet in two aspects: formal definition and general framework, covering various types of botnets overall. Through the formal definition and the general...
The Future Internet architecture would be advanced and flexible depending on service requirements by program. The concept of Software-Defined Network (SDN) has a possibility to enable innovation while hiding much of the complexity on the networking design. SDN is mainly used by OpenFlow in real scenario, which can use up to layer-4. In this paper, we propose SDN which consider up to layer-7. To maintain...
Overlay communication networks create logical structures at the top of the Internet. Such a concept is also an efficient approach in the context of multicast applications. Moreover, the overlay multicast has actually outperformed network layer-based multicast provided by the IP protocol and attracted developers of multimedia systems, recently. In this paper, we take a look at modeling techniques and...
We present the design and evaluation of ITMgen, a tool for generating synthetic but representative Interdomain Traffic Matrices (ITMs). ITMgen is motivated by the observation that gravity-based models do not reflect application level or regional characteristics of Internet traffic. ITMgen works at the level of connections, taking into account the relative sizes of ASes, their popularity with respect...
The market for multiplayer online games is rapidly growing in concert with the growth in broadband Internet connection services. Since such games share a virtual space among many players, it is important to match players to a group so that they share low-latency connections with each other. This is because the latency between them affects the perceived quality of their experience. In this paper, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.