2014 IFIP Networking Conference 2014
DOI: 10.1109/ifipnetworking.2014.6857118
|View full text |Cite
|
Sign up to set email alerts
|

A study on traceroute potentiality in revealing the Internet AS-level topology

Abstract: Several works over the past few years have shown that the Internet AS-level topology is partially hidden from the current Internet measurement infrastructures. Most have focused on the incompleteness of the connectivity extracted from BGP data. A few have analysed the connectivity collected by traceroute measurement infrastructures showing the amount of connections introduced by traceroute campaigns. None, however, have investigated in detail the underlying rationale, i.e. the economic nature of the Internet. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…Thus, we group measurements by pairs of ASes. To obtain a reasonably wide coverage in terms of ASes and geographic spread, we choose to rely on RIPE Atlas [42], which is characterized by a significant presence in all the regions of the world [43]. The coverage of the collected dataset, in terms of address space, networks, 2 Some mechanisms could lead to different IP-level paths for (s 1 , d 1 ) and (s 2 , d 2 ), even when s 1 and s 2 belong to the same subnetwork s, and d 1 and d 2 belong to the same subnetwork d. Examples of such mechanisms include traffic engineering policies and load balancing.…”
Section: Computing Path Locality In the Real Worldmentioning
confidence: 99%
“…Thus, we group measurements by pairs of ASes. To obtain a reasonably wide coverage in terms of ASes and geographic spread, we choose to rely on RIPE Atlas [42], which is characterized by a significant presence in all the regions of the world [43]. The coverage of the collected dataset, in terms of address space, networks, 2 Some mechanisms could lead to different IP-level paths for (s 1 , d 1 ) and (s 2 , d 2 ), even when s 1 and s 2 belong to the same subnetwork s, and d 1 and d 2 belong to the same subnetwork d. Examples of such mechanisms include traffic engineering policies and load balancing.…”
Section: Computing Path Locality In the Real Worldmentioning
confidence: 99%
“…The number of hops in Fog computing is one, but in case of Cloud computing, the number varies as it is in the WAN. Different Cloud servers are tested for their distance by the number of hops and by using "tracert" command [49][50][51]. It is shown in Table 4.…”
Section: Transmission Delaymentioning
confidence: 99%
“…Future work will focus on trying to complement existing data with a more exhaustive model of the infrastructure, drawing from different data sources. Several research initiatives have been recently started in this direction [85], [88], [89].…”
Section: Partial Information Is a Security Issuementioning
confidence: 99%