2010
DOI: 10.1007/978-3-642-12334-4_11
|View full text |Cite
|
Sign up to set email alerts
|

Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers

Abstract: Abstract. To describe, analyze, and model the topological and structural characteristics of the Internet, researchers use Internet maps constructed at the router or autonomous system (AS) level. Although progress has been made on each front individually, a dual graph representing connectivity of routers with AS labels remains an elusive goal. We take steps toward merging the router-level and ASlevel views of the Internet. We start from a collection of traces, i.e. sequences of IP addresses obtained with large-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
27
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(28 citation statements)
references
References 20 publications
1
27
0
Order By: Relevance
“…This is because in Opt-Cover(), all paths from ingress to egress routers have to cover the bits that should be checked, thus more paths lead to more constraints on the optimal solution. However, according to [9], most networks have less than 10 border routers, thus our conclusion is the same as Fig. 5.…”
Section: B Simulation Resultssupporting
confidence: 61%
See 1 more Smart Citation
“…This is because in Opt-Cover(), all paths from ingress to egress routers have to cover the bits that should be checked, thus more paths lead to more constraints on the optimal solution. However, according to [9], most networks have less than 10 border routers, thus our conclusion is the same as Fig. 5.…”
Section: B Simulation Resultssupporting
confidence: 61%
“…On each router, we set the capacity constraint to be 4 to 64. According to [9][5], we set the number of border routers to be 2 to 20. Among the border routers, we randomly select one as ingress router, and others as egress routers.…”
Section: Performance Evaluation a Simulation Setupmentioning
confidence: 99%
“…With this determination, we then scan through the traces a second time, looking for where the ECT codepoint is cleared. In the future, we will perform a more thorough procedure to determine border routers [13].…”
Section: As's Where the Ect Codepoint Is Clearedmentioning
confidence: 99%
“…To reenforce our mapping, it verifies, at each step, the consistency of the assignment returned by each rule. A subset of those rules are also used in [34].…”
Section: Methodsmentioning
confidence: 99%