2011
DOI: 10.1007/978-3-642-17679-1_22
|View full text |Cite
|
Sign up to set email alerts
|

On the Hardness of Topology Inference

Abstract: Abstract. Many systems require information about the topology of networks on the Internet, for purposes like management, efficiency, testing of new protocols and so on. However, ISPs usually do not share the actual topology maps with outsiders; thus, in order to obtain the topology of a network on the Internet, a system must reconstruct it from publicly observable data. The standard method employs traceroute to obtain paths between nodes; next, a topology is generated such that the observed paths occur in the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…DICT maintains the invariant that there are never two nodes u, v which are not kconnected in the currently requested graph H while they are k-connected in H; no path relevant for the connectivity of the current component is overlooked and needs to be found later. Subsequently, nodes and edges which are not contributing to the connectivity of the current component can then be discovered by (1) edge expansion where additional nodes of degree two are added along a motif edge, and by (2) adding sequences of motifs to the nodes iteratively with the same process. Figure 2 gives a simplified overview of our discovery strategy: in a first phase, we seek to discover the highly connected parts of the physical network (and reserve the corresponding resources, see Lemma 4); this is achieved by trying to embed sequences of so-called "motifs" of the highest connectivity and subsequently shifting toward less connected motifs.…”
Section: Motif Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…DICT maintains the invariant that there are never two nodes u, v which are not kconnected in the currently requested graph H while they are k-connected in H; no path relevant for the connectivity of the current component is overlooked and needs to be found later. Subsequently, nodes and edges which are not contributing to the connectivity of the current component can then be discovered by (1) edge expansion where additional nodes of degree two are added along a motif edge, and by (2) adding sequences of motifs to the nodes iteratively with the same process. Figure 2 gives a simplified overview of our discovery strategy: in a first phase, we seek to discover the highly connected parts of the physical network (and reserve the corresponding resources, see Lemma 4); this is achieved by trying to embed sequences of so-called "motifs" of the highest connectivity and subsequently shifting toward less connected motifs.…”
Section: Motif Frameworkmentioning
confidence: 99%
“…The classic instrument to discover Internet topologies is traceroute [7], but the tool has several problems which renders the problem challenging. One complication of traceroute stems from the fact that routers may appear as stars (i.e., anonymous nodes), which renders the accurate characterization of Internet topologies difficult [1,23,30]. Network tomography is another important field of topology discovery.…”
Section: Related Workmentioning
confidence: 99%
“…In [1], hardness results are derived for this model. However, as pointed out by the authors themselves, the irregular node model-where nodes are anonymous due to high loads-is less relevant in practice and hence they consider strictly anonymous nodes in their follow-up studies [2]. As proved in [2], the problem is still hard (in the sense that there are many minimal networks corresponding to a trace set), even with only two anonymous nodes, symmetric routing and without aliasing.…”
Section: Related Workmentioning
confidence: 99%
“…The classic instrument to discover Internet topologies is traceroute [4], but the tool has several problems which makes the problem challenging. One complication of traceroute stems from the fact that routers may appear as stars (i.e., anonymous nodes), which renders the accurate characterization of Internet topologies difficult [1,10,13]. Network tomography is another important field of topology discovery.…”
Section: Introductionmentioning
confidence: 99%