On the placement of traceroute-like topology discovery instrumentation

Size: px
Start display at page:

Download "On the placement of traceroute-like topology discovery instrumentation"

Transcription

1 On the placement of traceroute-like topology discovery instrumentation Wei Han, Ke Xu State Key Lab. of Software Develop Environment Beihang University Beijing, P. R. China Abstract An accurate map of the Internet is very important for studying the network s internal structure and network management. The main approach to map the Internet is to collect information from a set of sources by using traceroutelike probes. In a typical mapping project, active measurement sources are relatively scarce while traceroute destinations are plentiful, which makes the sampled graph quite different from the original one. So, it becomes very important to determine how to place these sources such that the sampled graph can be closer to the original one, especially in the case that the number of sources is limited. In this paper, we investigate the relationship between the placement of traceroute sources and their sampled result, which, to our knowledge, has not been systematically studied before. Based on the relationship, we propose a method on how to place the traceroute sources. We show that the graph sampled from sources selected by our method is more accurate than the ones randomly selected. We also validate our conclusion using the raw trace data of skitter project. (Abstract) Keywords- topology discovery; traceroute sources; placement I. INTRODUCTION A highly accurate map of the Internet topology is a prerequisite to model, analyze and test the Internet. It is also very important for studying the network s internal structure and network management. Now, the main approach to map the Internet is to use traceroute, which can report the interfaces along the IP path from a source to a destination. Typically, a traceroute mapping project has several distributed sources and a large number of destinations. The topology graph can be obtained by merging the traceroute results of each source. Note that the sampled graph is an interface-level topology graph in which each node corresponds to an interface and each link corresponds to the connection between interfaces. We can also get the AS-level topology by converting each interface to its AS number, which can be acquired using whois[1]. Traceroute-like sampling of the Internet has been widely used in a lot of topology discovery systems [2, 3, 4, 5, 6]. Traceroute sources require deployment of dedicated measurement infrastructure, so they are always very scarce compared with the destinations. For example, skitter[2], a very famous project of topology discovery and analysis, sends traceroute probes from 25 sources deployed in America, Europe, Japan and Australia to more than destinations. The subgraph induced by a single source can be regarded as a spanning tree whose root is the source. And the overall graph is obtained by merging these subgraphs. Due to the limitation of the number of sources, the merged graph can be considerably different from the original one [13]. Lakhina et al. [7] find that traceroute probes are more likely to find nodes and links very close to the source. Nodes and links far from the source have a very low possibility to be explored. DIMES[8] implements the idea of traceroute@home[9] proposed by Donnet et al. and calls for volunteers to download the agent and become a participant. Up to Feb, 2006, there are probing agents for DIMES. Shavitt and Shir [10] analyze the result of DIMES and show that by adding traceroute sources placed at the periphery of the network, DIMES can find many peering links between small ISPs, while these links can hardly be found by other projects with limited sources. While more traceroute sources are needed in order to get an accurate topology graph, deployment of the instrumentation can be quite costly and more sources would result in sending excessive redundant probes into the Internet [9], which may affect the usual use of Internet. Therefore, when the number of sources is fixed, determining how to place these sources so that the sampled graphs can be closer to the original ones becomes a critical problem. Most topology discovery projects only consider the factor of geography when placing their sources and make them geographically distributed in the Internet. The main contribution of this paper is a method to place the traceroute sources based on the analysis of the features of traceroute. We show that the graph sampled from sources selected using our method is more accurate than the ones randomly selected. We also validate our method using the raw trace data of skitter. The rest of the paper is organized as follows. First, we present some related work on the placement of Internet instrumentation in section Ⅱ. In section Ⅲ, we establish some basic definitions for the topology discovery problem.

2 In section Ⅳ, we analyze the features of traceroute-like probes. Based on this, we derive the relationship between the placement of the traceroute sources and the graphs sampled from the sources in section Ⅴ, and validate the relationship using both the trace data of a simulated network and the raw data of skitter[2]. Then, we propose a method on the placement of traceroute sources in section Ⅵ. Finally, we summarize, conclude and discuss future work in section Ⅶ. II. RELATED WORK Barford et al. [11] study the marginal utility of adding traceroute sources and destinations. They find that the marginal utility of adding traceroute sources beyond the second source diminishes quickly and it is more important to add destinations than sources. They also argue that the diminishing marginal utility does not imply that the overall coverage obtained is high. However, they can not analyze the coverage of the sampled graph because the work is based on the trace data of skitter[2]. We will verify their point in a simulated network and work out how the low coverage of the sampled graph relates to the features of traceroute probes. Dall'Asta et al. [12] show that the probability that a node or an edge can be detected by traceroute probes depends on the betweenness centrality of the element and the density of traceroute sources and destinations. They also point out that placing the sources and destinations on low-betweenness nodes can increase the coverage of the sampled graph. But this strategy is not applicable in real traceroute probes because determining the betweenness of vertices is hard unless the whole topology graph is known. They recommend that sources should be placed on the low-connectivity vertices because of the correlation between connectivity and betweenness. However, this method is not verified by any experiment. In section Ⅵ, we will perform an experiment with this method and compare it with the method we propose. Jamin et al. [13] study the algorithms for the placement of Internet instrumentation in the context of the IDMaps project[14]. Their work focuses on how to place a fixed set of measurement on generated topologies to minimize the maximum distance between a node and the nearest center. Thus this algorithm can not be applied to traceroute probes. III. DEFINITIONS The Internet topology can be naturally modeled as an undirected graph G= (V, E), where V denotes the set of vertexes (nodes) and E is the set of edges (links). The sampled graph induced by sources S is a subgraph of G and we will use G S = (V S, E S ) to denote it. The fraction of nodes and links detected by a traceroute exploration is defined as follows: Definition 1: Given a graph G= (V, E) and the subgraph G S = (V S, E S ) induced by S, the node coverage of G by G S is the ratio VS ES. Similarly, the edge coverage is the ratio. V E Since this paper focuses on the placement of traceroute sources, we always need to compare the subgraphs induced by different sources. Given two sources S1 and S2 with the subgraphs G S1 and G S2 induced by each one, we define the intersection, union and subtraction of the two subgraphs as follows: Definition 2: GS1 GS2=(( VS1 VS2),( ES1 ES2)) GS1 GS2=(( VS1 VS2),( ES1 ES2)) GS1 GS2=(( VS1 VS2),( ES1 ES2)) Breadth-first search (BFS) is a simple algorithm to explore a graph, in which we start exploring from a node s in all possible directions, adding nodes one layer at a time. We will use L(s,v) to denote the layer in which v is explored in the BFS started from s. Definition 3: 0, if ( v= s) Lsv (, )= L(, sv') + 1,if ( v'v, ) E Using above definitions, we can define the number of nodes on each layer. Let N(s,l) denote the number of nodes on layer l. Definition 4: { } Ns,l ( )= vv VLs,v, ( )= l We use LMN(s) to denote the layer that contains the maximum number of nodes, i.e. the layer l that maximize N(s,l). IV. THE FEATURES OF TRACEROUTE PROBES In order to investigate the traceroute-like exploration process, we generate a graph based on the EBA model [17]. Then we analyze the features of traceroute and classify the nodes and edges that can not be detected by traceroute probes into two categories. A. The graph used for simulation A graph whose topological properties are close to the Internet is needed in order to simulate the traceroute probes. Faloutsos et al.[16] propose the power-law relationship of the Internet topology, which is widely believed to be the most important feature of many complex networks. The EBA model[17] proposed by Albert and Barab asi follows the power-law relationship. We choose EBA model to generate the graph for our simulation and use the typical parameters of EBA model. The main properties of the graph are summarized in table Ⅰ. 2

3 TABLE I. parameters of EBA model characteristics of the graph PARAMETERS OF EBA MODEL USED AND MAIN CHARACTERISTICS OF THE GRAPH m0 3 m 2 p 0.6 q 0.1 nodes 2000 edges average degree maximum degree 128 The routing policy has to be decided to simulate the traceroute process. In the real Internet, there are many applied routing protocols, e.g. BGP and OSPF. The principle of routing protocols is to make packets in the network reach their destinations as soon as possible, but the actual routing path can be different from the shortest path due to commercial and political factors. Despite these factors, a reasonable approximation of the route traversed by traceroute-like probes is the shortest path between the source and the destination. In the case where there are equivalent shortest paths between two nodes, Dall'Asta et al.[12] define three routing selection mechanisms: USP(Unique Shortest Path), RSP(Random Shortest Path) and ASP(All Shortest Path). Actual traceroute probes may contain a mixture of these three mechanisms. However, we choose USP policy for our simulation because the USP procedure is the closest to the one time running of traceroute probes and represents the worst case scenario. In section 2.3, we will show how the USP policy affects the sampled result of traceroute probes. B. Marginal utility of adding traceroute sources It is shown in [11] that the marginal utility diminishes quickly when sources are added in a traceroute-like process. The authors also point out that the diminishing marginal utility does not imply that the coverage of nodes and edges is high. Since their experiments are based on the real trace data of skitter [2], whose exact topology graph is unknown, they are not able to analyze the coverage of traceroute process. We tackle this problem by simulation on the graph generated in the previous subsection. Fig. 1 shows the results of the marginal utility of adding sources. The sources and destinations of the simulation are randomly selected from the graph. Fig. 1(a) demonstrates the diminishing marginal utility when 1000 nodes are selected as destinations. In the case of 15 sources, 1054 nodes and 4136 edges are discovered, and the node and edge coverage is 52.7% and 37.6%, respectively. To eliminate the factor of destination selection, we perform the simulation in which all nodes in the network are regarded as destinations. The result is shown in Fig. 1(b). When there are 50 sources, the edge coverage is 57.5%, which is still a low percentage. This verifies the conclusion that the overall coverage can still be low even if the marginal utility diminishes quickly. In next subsection, we will investigate the reason of the low coverage by analyzing the features of traceroute probes. C. The features of traceroute probes Dall'Asta et al.[12] show that the probability of a node or an edge being detected depends on the betweenness centrality of the element and the density of sources and destinations. Since we focus on the placement of sources, we will assume that the destinations are plentiful and widely distributed in the graph. In fig. 1(b), we can see that the edge coverage of a single source exploration is only 26.6%, i.e. 73.4% of the edges are invisible from a single measurement source even if the destinations are plentiful. In the following subsections, we will investigate the invisible part of the graph and find out the reasons for the low coverage. 1) Cross-link The subgraph induced by a single source can be regarded as a spanning tree rooted at the source. If all the traceroute probes are started simultaneously, the traceroute process can be abstracted as the breadth-first search of the spanning tree and layer in the breadth-first search corresponds to hop in traceroute. Cross-link[18] is a link joining two nodes of the same layer, and thus can not be detected by the breadthfirst traverse of the spanning tree. For example, in fig. 2, the nodes and edges connecting H and D can not be detected by traceroute from source to dest1 and dest2 because H and D are on the same layer of the spanning tree. This problem is called cross-link. The usual way to fix the problem is to add sources. For example, these nodes and edges can be detected if H is also a traceroute source. 2) Equivalent shortest paths Besides cross-link, nodes and edges may also be undetected by traceroute probes for the existence of equivalent shortest paths. This is shown in fig. 3, where there are 4 equivalent shortest paths from source to dest1, but only one of them can be detected in one time exploration of traceroute. This corresponds to the USP policy. Although ASP may happen in a long time exploration, it is hard to detect all the equivalent shortest paths in one time or shortperiod exploration. Even in a long time exploration, many paths may not be detected because of backup routes, which is pervasive in real Internet. Adding sources is an efficient way to fix this problem. In fig. 3, if a source is placed on node D, more edges can be detected when D traceroute to dest2. We present the traceroute exploration result of a single source in table Ⅱ. In the case that all the nodes in the graph are destinations, the edges detected by a single source is only 22.7% compared with the original graph. We can see that the edge coverage of single-source traceroute exploration is very low even if the destinations are plentiful. This is an important feature of traceroute exploration. Cross-links and equivalent shortest paths both contribute to the low coverage. 3

4 (a) Number of destinations = 1000 (b) All nodes are destinations Figure 1. Number of nodes and edges detected as sources are added source source A B C Figure 2. Illustration of cross-link A B C D E F G H D E F G H dest1 dest2 dest1 dest2 Figure 3. Illustration of traceroute probes with equivalent shortest paths TABLE II. THE EDGES OF THE SAMPLED GRAPH INDUCED FROM A SINGLE SOURCE total edges percentage edges discovered % edges invisible due to crosslink % edges invisible due to % equivalent shortest paths V. THE RELATIONSHIP BETWEEN PLACEMENT OF TRACEROUTE SOURCES AND THEIR SAMPLED RESULT As mentioned in the previous section, the subgraph induced by a single source is actually a spanning tree rooted at the source. The overall topology graph is obtained by merging the sampled results of each source. Work by [7] show that there is not much difference among the coverage of the subgraphs induced by each source. So, if the number of sources is fixed, the coverage of the merged graph actually lies on the size of the intersection of every pairs of the subgraphs. For example, given two sources S1 and S2 with the subgraphs G S1 and G S2, if S1 and S2 are exactly the same, the merged graph of S1 and S2( GS1 GS2 ) is the same as S1 or S2; on the contrary, if S1 is entirely different from S2 ( GS1 GS2= ), the size of merged graph is the sum of S1 and S2. In this section, we will first examine how to minimize the intersection of two sampled graphs based on the feature of traceroute probes, and then we will validate our method using both the simulated graph and the trace data of skitter[2]. A. Minimize the intersection of two sampled graphs This subsection is devoted to the following problem: Given a traceroute source S1 and the subgraph G S1 induced by it, how to place the second source S2 so that the intersection of G S1 and G S2 can be as small as possible, i.e. S2 can detect more nodes and edges which are invisible from S1. It is known that a graph consists of nodes and edges. Usually the coverage of nodes is proportional to the coverage of edges, so we only take the coverage of edges into account and assume that all nodes in the original graph are destinations. From the previous section, we know that the two origins of the undetected edges are cross links and equivalent shortest paths. We will analyze them respectively. 1) Cross-link Cross-link is the link joining two nodes of the same layer and thus can not be detected by the source. If S2 is placed on layer N, cross-links on layer N can be detected by the 4

5 exploration from S2 to the other nodes on layer N. Since the number of cross-links on a certain layer is proportional to the number of nodes on the layer, we can place S2 on the layer that contains the maximum number of nodes, i.e. LMN (S1). 2) Equivalent shortest paths Edges of a network can be divided into two sets: edge joining two nodes of the same layer and edge joining two nodes belonging to adjacent layers. The former one is actually the set of cross-links and none of these edges can be detected by traceroute probes. Edges in the latter set can partly be detected. If more than one node in the same layer are joined to a node in the next layer, there will be equivalent shortest paths to the node and only one of these paths can be detected by traceroute probes. In fig. 3, node A and B in layer 1 are both connected to D in layer 2, so there are two equivalent shortest paths from source to D. The statistic of the latter set on each layer in fig. 4 demonstrates that the undetected edges of each layer are proportional to the total edges. Lakhina et al. [7] show that traceroute probes are more likely to find edges very close to the source. So if S2 is placed on the layer that has maximum number of connections to its adjacent layer, more edges could be detected. 3) How to place S2 From the analysis of the previous subsections, we can conclude that in order to detect more cross-links, S2 should be placed on layer LMN (S1), while if S2 is placed on the layer that has the maximum number of connections to its adjacent layer, it can detect more edges that are invisible from S1 due to the existence of equivalent shortest paths. Fortunately, the two layers are always the same, which we demonstrate in fig. 5. Therefore, S2 should be placed on the layer LMN (S1) so that S2 can detect more edges that are invisible from S1. To validate our conclusion, we randomly select four sources as S2 from each layer and run traceroute explorations from them. Fig. 6 plots the comparison results between S1 and S2. Note that the source S1 in fig. 6 is exactly the same one as in fig. 4 and 5. We can observe that sources in layer 3, which contains the maximum number of nodes (shown in fig. 5), can always detect more links that can not be detected by S1. Until now, we have made the assumption that all the nodes in the original graph are destinations in the traceroute exploration process. We also validate our conclusion in the case that only parts of the nodes are destinations. Fig. 7 demonstrates that sources on the layer with the maximum number of nodes can also detect more nodes that S1 can not detect. B. Analysis of raw trace data of skitter We have made the conclusion that the second source S2 should be placed on layer LMN (S1). In this section, we will validate our conclusion by analyzing the raw trace data of skitter. There are 25 sources of skitter running independent probes to more than destinations. Each source needs two or three days to complete a probe cycle, so the start time of a cycle is different among all sources. We choose 11 sources which started a new cycle on Nov 2, 2006 and list the exploration result of each source in table Ⅲ. It can be observed that there is not much difference among the numbers of nodes and edges discovered by different sources except some abnormal ones, e.g. the source named h-root. To eliminate the factors that affect the comparison between sources, we will exclude those abnormal sources (cdgrssac,h-root,i-root,uoregon). The comparisons between the other sources are shown in fig. 8. Each graph plots the comparison result between a certain source S1 (in a, b and c, the source S1 is cdg-rssac, champagne and f-root, respectively) and the other ones (S2). The four curves represents nodes or links detected on layer L(M1,M2), and additional nodes or links detected by M2. We can see that the four curves exhibit the same trend in all graphs. Fig. 8 thus supports the conclusion made by us. VI. THE METHOD TO PLACE SOURCES A. The method From the analysis and experiments in section 3, we conclude that given a source S, another source should be placed on the layer LMN(S) such that it can detect more nodes and edges that can not be detected by S, and the intersection of their sampled results can be smaller. Based on this conclusion, we propose an iterative method to select sources. The key idea of the method is: whenever adding a new source, the intersections of the sampled results of the new source and each existing source should be as small as possible. The detailed procedure is: Initialization. Randomly select a node from the original graph as the first source S and run a traceroute exploration from S. Sort all the nodes detected according to their path length from S, i.e. their layers. Initialize set M to include all the nodes in layer LMN(S). If M is not empty, randomly select a node S from M as the next source, and erase the node from M; else, terminate. Use the source S selected in step 2 to run a traceroute exploration and sort all nodes detected. Initialize set M to include all the nodes in layer LMN(S ) Set M to be the intersection of M and M. Go to step 2. 5

6 Figure 7. Comparison of number of nodes detected between S1 and S2, number of destinations=1000 Figure 4. Edges of the layer represents the total number of connections to adjacent layer; edges undetected represents the number of undetected connections to adjacent layer Figure 5. Correlation between nodes and edges on each layer. edges detected by S2 but not detected by S layer Figure 6. Comparison of number of links detected between S1 and S2 nodes detected by S2 but not detected by S layer Figure 8. Comparison results between sources. The four curves represent the nodes/links on layer L(M1,M2) and the nodes/links detected by M2 but not by M1. The first source S is randomly selected in step 1 and set M is initialized to contain all the nodes on layer LMN(S). The other steps ensure that whenever adding a new source, the intersection of the subgraph induced by the new source and each existing source should be as small as possible. 6

7 TABLE III. EXPLORATION RESULT OF EACH SOURCE OF SKITTER Source Nodes detected Edges detected cdg-rssac f-root h-root i-root champagne uoregon arin sjc riesling mwest lhr B. Simulation on the modeled graph We simulate the traceroute exploration using the sources generated by the method proposed in the previous section and compare it with sources randomly selected. Dall'Asta et al. [12] suggest that traceroute sources should be placed on low-connectivity nodes, i.e. nodes with low degrees. So we also simulate the exploration by sources with lowest degrees in the graph. The comparison results are plotted in fig. 9 and 10, showing that our method is better than the other two. In case of 15 sources and 1000 destinations (fig. 9), the sources generated by our methods can detect 57 (2.8% of the original graph) additional nodes and 1630(14.8% of the original graph) additional links compared with the ones randomly selected. While in the case of all the nodes as destinations (fig. 10), our method can detect 1986 additional links (18% of the original graph). We can also find that the sources with lowest degrees can only slightly increase the node and edge coverage compared with sources randomly selected. We also perform the above experiments on graphs generated by other models and topology generators, e.g. the GL model[19], the inet topology generator[20], even ER random graphs[21]. Most of the comparison results are similar except the one of MR model[22], which we demonstrate in Fig. 11. Unlike the other graphs, our method shows similar performance with the other two selection methods. This is because the marginal utility of adding sources on this graph is very high. Actually, 19 sources randomly selected can detect nearly 90% of all links. This is a big surprise due to the analysis of MR models in [13]. However, we assume this is an extreme and very unusual phenomenon. Further studies should focus on how the characteristics of graph affect the performance of our method. From the above experiments, we conclude that in most cases, our method can increase the coverage of the traceroute exploration, especially the link coverage. Note that, the improved node coverage in fig. 9 is only 2.8%, which is very low compared with the link coverage. That is because the marginal utility of node coverage decreases very quickly (shown in fig. 1) due to the low density of destinations. It also demonstrates that the number of destinations should be increased in order to obtain a high coverage of nodes. VII. CONCLUSION We analyze the features of traceroute probes in this paper. Based on the features, we identify the two reasons that contribute to the low coverage of traceroute-like explorations. By analyzing the relationship between the placement of traceroute sources and the intersection between the subgraphs induced by the sources, we propose an iterative method on how to place the traceroute sources such that the overall coverage of the exploration can be as higher as possible, i.e. the exploration process can detect as more nodes and edges as possible. We also validate our method on graphs generated by different models. We hope that the method we proposed can provide helpful guidance to the deployment of traceroute sources in real Internet topology discovery and other projects using traceroute-like probes. We have validated the relationship between the placement of sources and the subgraphs induced by them using the raw trace data of skitter. The result shows that the relative location between sources can affect the results of the merged graph. So, whenever adding a new source, we should make sure that the new source can detect more nodes and edges that are invisible from the existing sources. ACKNOWLEDGMENT The raw trace data of skitter in this research help us validate our conclusion and analyze the real Internet topology discovery process. We would like to thank the operators of skitter project. References [1] Whois tool. [2] Cooperative Association for Internet Data Analysis Skitter tool. [3] The National Laboratory for Applied Network Research (NLANR). [4] Topology project. [5] SCAN project. [6] Internet mapping project at Lucent Bell Labs. [7] A Lakhina, JW Byers, M Crovella, and P Xie. Sampling biases in IP topology measurements. In IEEE INFOCOM, [8] DIMES project. [9] B Donnet, P Raoult, T Friedman, M Crovella. Efficient algorithms for large-scale topology discovery. ACM SIGMETRICS Performance Evaluation Review, [10] Shavitt, E Shir. DIMES: Let the Internet Measure Itself. ACM SIGCOMM Computer Communication Review, 2005 [11] P Barford, A Bestavros, J Byers, M Crovella. On the Marginal Utility of Network Topology Measurements. Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement,

8 (a) Number of destinations = 1000 (b) All nodes are destinations Figure 9. Comparison between three methods of selecting sources, number of desinations=1000 Figure 10. Comparison between three methods of selecting sources, all nodes are destinations [12] L. Dall'Asta, I. Alvarez-Hamelin, A. Barrat, A. Vázquez, and A. Vespignani. Exploring networks with traceroute-like probes: Theory and imulations. Theoretical Computer Science, Special Issue on Complex Networks, [13] JL Guillaume, M Latapy. Relevance of massively distributed explorations of the internet topology: Simulation results. In IEEE INFOCOM, [14] S Jamin, C Jin, Y Jin, D Raz, Y Shavitt, L Zhang. On the placement of Internet Instrumentation. In IEEE INFOCOM, [15] Paul Francis, Sugih Jamin, Vern Paxson, Lixia Zhang, Daniel Gryniewicz, and Yixin Jin. An architecture for a global internet host distance estimation service. In IEEE INFOCOM, [16] C. Faloutsos, P. Faloutsos, and M. Faloutsos. On Power-Law Relationships of the Internet Topology. In Proceedings of the ACM SIGCOMM, [17] R eka Albert and Albert-L aszl o Barab asi. Topology of Evolving Networks: Local Events and Universality. Physical Review Letters, 2000 [18] R Siamwalla, R Sharma, S Keshav. Discovering Internet Topology. In IEEE INFOCOM, [19] JL Guillaume, M Latapy. Bipartite graphs as models of complex networks. Physica A. [20] Inet, currently at version 3.0, is an Autonomous System (AS) level Internet topology generator. topology.eecs.umich.edu/inet. [21] P Erdös, A RényiOn random graphs I. Publ. Math. Debrecen, 6:290ñ297, [22] M. Molloy and B. Reed. The size of the giant component of a random graph with a given degree sequence. Combin. Probab. Comput., pages295ñ305, Figure 11. Comparison between three methods of selecting sources, on MR graph 8

Network Delay Model for Overlay Network Application

Network Delay Model for Overlay Network Application , 2009, 5, 400-406 doi:10.4236/ijcns.2009.25045 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Network Delay Model for Overlay Network Application Tian JIN, Haiyan JIN School of Electronics

More information

Complex networks: A mixture of power-law and Weibull distributions

Complex networks: A mixture of power-law and Weibull distributions Complex networks: A mixture of power-law and Weibull distributions Ke Xu, Liandong Liu, Xiao Liang State Key Laboratory of Software Development Environment Beihang University, Beijing 100191, China Abstract:

More information

Analysis and Comparison of Internet Topology Generators

Analysis and Comparison of Internet Topology Generators Analysis and Comparison of Internet Topology Generators Damien Magoni and Jean-Jacques Pansiot Université Louis Pasteur LSIIT Pôle API, Boulevard Sébastien Brant, 67400 Illkirch, France {magoni, pansiot}@dpt-info.u-strasbg.fr

More information

DOLPHIN: THE MEASUREMENT SYSTEM FOR THE NEXT GENERATION INTERNET

DOLPHIN: THE MEASUREMENT SYSTEM FOR THE NEXT GENERATION INTERNET DOLPHIN: THE MEASUREMENT SYSTEM FOR THE NEXT GENERATION INTERNET Xinpei Lang, Gang Zhou, Chen Gong, Wei Han National Lab of Software Development Environment Department of Computer Science Beihang University,

More information

AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies

AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 28 Table of Contents 1 Introduction

More information

Relevance of Massively Distributed Explorations of the Internet Topology: Qualitative Results

Relevance of Massively Distributed Explorations of the Internet Topology: Qualitative Results Relevance of Massively Distributed Explorations of the Internet Topology: Qualitative Results Jean-Loup Guillaume, Matthieu Latapy, Damien Magoni To cite this version: Jean-Loup Guillaume, Matthieu Latapy,

More information

Complex Network Metrology

Complex Network Metrology Complex Network Metrology Jean-Loup Guillaume Matthieu Latapy LIAFA CNRS Université Paris 7, 2 place Jussieu, 755 Paris, France In order to study complex networks like the Internet, the World Wide Web,

More information

Complex Network Metrology

Complex Network Metrology Complex Network Metrology Jean-Loup Guillaume and Matthieu Latapy liafa cnrs Université Paris 7 2 place Jussieu, 755 Paris, France. (guillaume,latapy)@liafa.jussieu.fr Abstract In order to study some complex

More information

BOSAM: A Tool for Visualizing Topological Structures Based on the Bitmap of Sorted Adjacent Matrix

BOSAM: A Tool for Visualizing Topological Structures Based on the Bitmap of Sorted Adjacent Matrix BOSAM: A Tool for Visualizing Topological Structures Based on the Bitmap of Sorted Adjacent Matrix Yuchun Guo and Changjia Chen School of Electrical and Information Engineering Beijing Jiaotong University

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

The Beacon Number Problem in a Fully Distributed Topology Discovery Service

The Beacon Number Problem in a Fully Distributed Topology Discovery Service The Beacon Number Problem in a Fully Distributed Topology Discovery Service D. Ficara, F. Paolucci, L. Valcarenghi, F. Cugini, P. Castoldi, S. Giordano Scuola Superiore Sant Anna, Pisa, Italy Email: {fr.paolucci,

More information

Robustness of Centrality Measures for Small-World Networks Containing Systematic Error

Robustness of Centrality Measures for Small-World Networks Containing Systematic Error Robustness of Centrality Measures for Small-World Networks Containing Systematic Error Amanda Lannie Analytical Systems Branch, Air Force Research Laboratory, NY, USA Abstract Social network analysis is

More information

An Empirical Study of Routing Bias in Variable-Degree Networks

An Empirical Study of Routing Bias in Variable-Degree Networks An Empirical Study of Routing Bias in Variable-Degree Networks Shudong Jin Department of Electrical Engineering and Computer Science, Case Western Reserve University Cleveland, OH 4406 jins@cwru.edu Azer

More information

Deployment of an Algorithm for Large-Scale Topology Discovery

Deployment of an Algorithm for Large-Scale Topology Discovery 1 Deployment of an Algorithm for Large-Scale Topology Discovery Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella Abstract Topology discovery systems are starting to be introduced in the form

More information

On Routing Table Growth

On Routing Table Growth 1 On Routing Table Growth Tian Bu 1, Lixin Gao, and Don Towsley 1 1 Department of Computer Science University of Massachusetts Amherst ftbu,towsleyg@cs.umass.edu Department of Electrical and Computer Engineering

More information

arxiv:cs/ v1 [cs.ni] 29 May 2006

arxiv:cs/ v1 [cs.ni] 29 May 2006 Efficient Route Tracing from a Single Source Benoit Donnet, Philippe Raoult, Timur Friedman Université Pierre & Marie Curie, Laboratoire LIP6 CNRS, UMR 7606, Paris, France arxiv:cs/060133v1 [cs.ni] 29

More information

A Radar for the Internet

A Radar for the Internet A Radar for the Internet Matthieu Latapy 1, Clémence Magnien 1 and Frédéric Ouédraogo 1,2 Abstract. Mapping the internet s topology is a challenge in itself, and studying its dynamics is even more difficult.

More information

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes Commun. Theor. Phys. (Beijing, China) 45 (2006) pp. 950 954 c International Academic Publishers Vol. 45, No. 5, May 15, 2006 Small World Properties Generated by a New Algorithm Under Same Degree of All

More information

The missing links in the BGP-based AS connectivity maps

The missing links in the BGP-based AS connectivity maps The missing links in the BGP-based AS connectivity maps Zhou, S; Mondragon, RJ http://arxiv.org/abs/cs/0303028 For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/handle/123456789/13070

More information

UDP PING: a dedicated tool for improving measurements of the Internet topology

UDP PING: a dedicated tool for improving measurements of the Internet topology UDP PING: a dedicated tool for improving measurements of the Internet topology Fabien Tarissan, Elie Rotenberg, Matthieu Latapy, Christophe Crespelle To cite this version: Fabien Tarissan, Elie Rotenberg,

More information

AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies

AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 62 Table of Contents 1 Introduction

More information

Science foundation under Grant No , DARPA award N , TCS Inc., and DIMI matching fund DIM

Science foundation under Grant No , DARPA award N , TCS Inc., and DIMI matching fund DIM A Simple Conceptual Model for the Internet Topology Sudhir L. Tauro Christopher Palmer Georgos Siganos Michalis Faloutsos U.C. Riverside C.M.U. U.C.Riverside U.C.Riverside Dept. of Comp. Science Dept.

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

Deployment of an Algorithm for Large-Scale Topology Discovery

Deployment of an Algorithm for Large-Scale Topology Discovery SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, OCTOBER 2006 1 Deployment of an Algorithm for Large-Scale Topology Discovery Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella

More information

On the Utility of Inference Mechanisms

On the Utility of Inference Mechanisms On the Utility of Inference Mechanisms Ethan Blanton Sonia Fahmy Greg N. Frederickson June 23, 2009 On the Utility of Inference Mechanisms We present an algorithm for determining when and if an inference

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

Sampling Biases in IP Topology Measurements

Sampling Biases in IP Topology Measurements Sampling Biases in IP Topology Measurements Anukool Lakhina John W. Byers Mark Crovella Peng Xie Department of Computer Science Boston University {anukool, byers, crovella, xp}@cs.bu.edu Abstract Considerable

More information

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University

More information

Population size estimation and Internet link structure

Population size estimation and Internet link structure Population size estimation and Internet link structure Stephen E. Fienberg Department of Statistics, Machine Learning Department, Cylab, and i-lab Carnegie Mellon University Pittsburgh, PA 15213-3890 fienberg@stat.cmu.edu

More information

Memory Placement in Network Compression: Line and Grid Topologies

Memory Placement in Network Compression: Line and Grid Topologies ISITA212, Honolulu, Hawaii, USA, October 28-31, 212 Memory Placement in Network Compression: Line and Grid Topologies Mohsen Sardari, Ahmad Beirami, Faramarz Fekri School of Electrical and Computer Engineering,

More information

On Pairwise Connectivity of Wireless Multihop Networks

On Pairwise Connectivity of Wireless Multihop Networks On Pairwise Connectivity of Wireless Multihop Networks Fangting Sun and Mark Shayman Department of Electrical and Computer Engineering University of Maryland, College Park, MD 2742 {ftsun, shayman}@eng.umd.edu

More information

An Internet router level topology automatically discovering system

An Internet router level topology automatically discovering system 2002 12 Vol.23 No.12 23 12 JOURNAL OF CHINA INSTITUTE OF COMMUNICATIONS October 2002 1 Internet 1,2 1,2 1,2,3 1,2 (1. 150001 2. 150001 3., 100031) Internet CERNET IP Internet Internet TP393.02 B 1000-436X(2002)12-0054-09

More information

On characterizing BGP routing table growth

On characterizing BGP routing table growth University of Massachusetts Amherst From the SelectedWorks of Lixin Gao 00 On characterizing BGP routing table growth T Bu LX Gao D Towsley Available at: https://works.bepress.com/lixin_gao/66/ On Characterizing

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Clustering the Internet Topology at the AS-level

Clustering the Internet Topology at the AS-level Clustering the Internet Topology at the AS-level BILL ANDREOPOULOS 1, AIJUN AN 1, XIAOGANG WANG 2 1 Department of Computer Science and Engineering, York University 2 Department of Mathematics and Statistics,

More information

Non-zero disjoint cycles in highly connected group labelled graphs

Non-zero disjoint cycles in highly connected group labelled graphs Non-zero disjoint cycles in highly connected group labelled graphs Ken-ichi Kawarabayashi Paul Wollan Abstract Let G = (V, E) be an oriented graph whose edges are labelled by the elements of a group Γ.

More information

Sampling Biases in IP Topology Measurements

Sampling Biases in IP Topology Measurements Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 22-75 Sampling Biases in IP Topology Measurements Lakhina, Anukool Boston University Computer Science

More information

Network Maps beyond Connectivity

Network Maps beyond Connectivity Network Maps beyond Connectivity Cheng Jin Zhiheng Wang Sugih Jamin {chengjin, zhihengw, jamin}@eecs.umich.edu December 1, 24 Abstract Knowing network topology is becoming increasingly important for a

More information

Complementary Graph Coloring

Complementary Graph Coloring International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,

More information

On the Diversity, Stability and Symmetry of End-to-End Internet Routes

On the Diversity, Stability and Symmetry of End-to-End Internet Routes On the Diversity, Stability and Symmetry of End-to-End Internet Routes Yaron Schwartz School of Electrical Engineering Tel-Aviv University, Israel Yuval Shavitt School of Electrical Engineering Tel-Aviv

More information

Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks

Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Damien Magoni Université Louis Pasteur LSIIT magoni@dpt-info.u-strasbg.fr Abstract. Although distributed

More information

DESIGN AND ANALYSIS OF ALGORITHMS GREEDY METHOD

DESIGN AND ANALYSIS OF ALGORITHMS GREEDY METHOD 1 DESIGN AND ANALYSIS OF ALGORITHMS UNIT II Objectives GREEDY METHOD Explain and detail about greedy method Explain the concept of knapsack problem and solve the problems in knapsack Discuss the applications

More information

Characterizing and Modelling Clustering Features in AS-Level Internet Topology

Characterizing and Modelling Clustering Features in AS-Level Internet Topology Characterizing and Modelling Clustering Features in AS-Level Topology Yan Li, Jun-Hong Cui, Dario Maggiorini and Michalis Faloutsos UCONN CSE Technical Report: UbiNet-TR07-02 Last Update: July 2007 Abstract

More information

Fundamental Properties of Graphs

Fundamental Properties of Graphs Chapter three In many real-life situations we need to know how robust a graph that represents a certain network is, how edges or vertices can be removed without completely destroying the overall connectivity,

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

An Efficient Algorithm for AS Path Inferring

An Efficient Algorithm for AS Path Inferring An Efficient Algorithm for AS Path Inferring Yang Guoqiang and Dou Wenhua National Univernity of Defence Technololy, China yanggq@nudt.edu.cn Abstract Discovering the AS paths between two ASes are invaluable

More information

A Topological Analysis of Monitor Placement

A Topological Analysis of Monitor Placement A Topological Analysis of Monitor Placement Alden W. Jackson, Walter Milliken, César A. Santiváñez, Matthew Condell and W. Timothy Strayer BBN Technologies 10 Mouton Street Cambridge, MA 02138 {awjacks,

More information

The Internet Structure

The Internet Structure DIMES DIMES Distributed Internet MEasurement and Simulation Yuval Shavitt shavitt@eng.tau.ac.il http://www.netdimes.org The Internet Structure routers 1 The Internet Structure The AS graph The Internet

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures 3 Definitions an undirected graph G = (V, E) is a

More information

On Reshaping of Clustering Coefficients in Degreebased Topology Generators

On Reshaping of Clustering Coefficients in Degreebased Topology Generators On Reshaping of Clustering Coefficients in Degreebased Topology Generators Xiafeng Li, Derek Leonard, and Dmitri Loguinov Texas A&M University Presented by Derek Leonard Agenda Motivation Statement of

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

LECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS

LECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS Department of Computer Science University of Babylon LECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS By Faculty of Science for Women( SCIW), University of Babylon, Iraq Samaher@uobabylon.edu.iq

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Behavioral Graph Analysis of Internet Applications

Behavioral Graph Analysis of Internet Applications Behavioral Graph Analysis of Internet Applications Kuai Xu, Feng Wang Arizona State University Email: {kuai.xu, fwang5}@asu.edu Abstract Recent years have witnessed rapid growth of innovative and disruptive

More information

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems Yunhao Liu, Zhenyun Zhuang, Li Xiao Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 3 Definitions an undirected graph G = (V, E)

More information

11/22/2016. Chapter 9 Graph Algorithms. Introduction. Definitions. Definitions. Definitions. Definitions

11/22/2016. Chapter 9 Graph Algorithms. Introduction. Definitions. Definitions. Definitions. Definitions Introduction Chapter 9 Graph Algorithms graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 2 Definitions an undirected graph G = (V, E) is

More information

Measuring the Degree Distribution of Routers in the Core Internet

Measuring the Degree Distribution of Routers in the Core Internet Measuring the Degree Distribution of Routers in the Core Internet Matthieu Latapy 1 Élie Rotenberg 1,2 Christophe Crespelle 2 Fabien Tarissan 1 1. Sorbonne Universités, UPMC Université Paris 6 and CNRS,

More information

Efficient Counting of Network Motifs

Efficient Counting of Network Motifs Efficient Counting of Network Motifs Dror Marcus School of Computer Science Tel-Aviv University, Israel Email: drormarc@post.tau.ac.il Yuval Shavitt School of Electrical Engineering Tel-Aviv University,

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures Chapter 9 Graph s 2 Definitions Definitions an undirected graph is a finite set

More information

CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018

CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018 1 CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018 Shortest Paths The discussion in these notes captures the essence of Dijkstra s algorithm discussed in textbook

More information

Measuring the Degree Distribution of Routers in the Core Internet

Measuring the Degree Distribution of Routers in the Core Internet Measuring the Degree Distribution of Routers in the Core Internet Matthieu Latapy LIP6 CNRS and UPMC Élie Rotenberg LIP6 ENS de Lyon, UPMC Christophe Crespelle LIP Lyon 1 and CNRS Fabien Tarissan LIP6

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

Toward an Atlas of the Physical Internet

Toward an Atlas of the Physical Internet Toward an Atlas of the Physical Internet Winter 2014 Paul Barford Computer Sciences University of Wisconsin!! Motivation pb@cs.wisc.edu 1 Objectives of our work Create and maintain a comprehensive catalog

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

AN AD HOC network consists of a collection of mobile

AN AD HOC network consists of a collection of mobile 174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,

More information

Diagnosis of TCP Overlay Connection Failures using Bayesian Networks

Diagnosis of TCP Overlay Connection Failures using Bayesian Networks Diagnosis of TCP Overlay Connection Failures using Bayesian Networks ABSTRACT George J. Lee Computer Science and AI Laboratory Massachusetts Institute of Technology Cambridge, MA 0239 USA gjl@mit.edu When

More information

The Buss Reduction for the k-weighted Vertex Cover Problem

The Buss Reduction for the k-weighted Vertex Cover Problem The Buss Reduction for the k-weighted Vertex Cover Problem Hong Xu Xin-Zeng Wu Cheng Cheng Sven Koenig T. K. Satish Kumar University of Southern California, Los Angeles, California 90089, the United States

More information

Object replication strategies in content distribution networks

Object replication strategies in content distribution networks Computer Communications 5 00) 376±383 www.elsevier.com/locate/comcom Object replication strategies in content distribution networks Jussi Kangasharju a, *, James Roberts b, Keith W. Ross a a Institut EureÂcom,

More information

Internet Anycast: Performance, Problems and Potential

Internet Anycast: Performance, Problems and Potential Internet Anycast: Performance, Problems and Potential Zhihao Li, Dave Levin, Neil Spring, Bobby Bhattacharjee University of Maryland 1 Anycast is increasingly used DNS root servers: All 13 DNS root servers

More information

A New Splitting-Merging Paradigm for Distributed Localization in Wireless Sensor Networks

A New Splitting-Merging Paradigm for Distributed Localization in Wireless Sensor Networks A New Splitting-Merging Paradigm for Distributed Localization in Wireless Sensor Networks S. Alireza Motevallian, Lu Xia, Brian D.O Anderson Abstract This paper proposes a new merging (stitching) scheme

More information

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Graph Algorithms. Many problems in networks can be modeled as graph problems. Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm - Efficient

More information

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 35 (2014 ) 1352 1359 18 th International Conference in Knowledge Based and Intelligent Information & Engineering Systems

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

Survivability with P-Cycle in WDM Networks

Survivability with P-Cycle in WDM Networks Survivability with P-Cycle in WDM Networks K. Aparna 1, P. Ramya Krishna 2 JNTUA College of Engineering, Pulivendula Abstract: In this paper we discuss about the Pre-Configured survivability schemes. Network

More information

Dynamic Routing Tables Using Simple Balanced. Search Trees

Dynamic Routing Tables Using Simple Balanced. Search Trees Dynamic Routing Tables Using Simple Balanced Search Trees Y.-K. Chang and Y.-C. Lin Department of Computer Science and Information Engineering National Cheng Kung University Tainan, Taiwan R.O.C. ykchang@mail.ncku.edu.tw

More information

Internet-Scale Simulations of a Peer Selection Algorithm

Internet-Scale Simulations of a Peer Selection Algorithm Internet-Scale Simulations of a Peer Selection Algorithm Ali Boudani, Yiping Chen, Gilles Straub Thomson R&D France 1, av. de Belle-Fontaine CS17616-35576 Cesson-Sévigné, France firstname.lastname@thomson.net

More information

Congestion Propagation among Routers in the Internet

Congestion Propagation among Routers in the Internet Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,

More information

In this chapter, we consider some of the interesting problems for which the greedy technique works, but we start with few simple examples.

In this chapter, we consider some of the interesting problems for which the greedy technique works, but we start with few simple examples. . Greedy Technique The greedy technique (also known as greedy strategy) is applicable to solving optimization problems; an optimization problem calls for finding a solution that achieves the optimal (minimum

More information

An Algorithmic Approach to Graph Theory Neetu Rawat

An Algorithmic Approach to Graph Theory Neetu Rawat An Algorithmic Approach to Graph Theory Neetu Rawat nrwt12345@gmail.com, Assistant Professor, Chameli Devi Group of Institutions, Indore. India. Abstract This paper compares two different minimum spanning

More information

SELF-HEALING NETWORKS: REDUNDANCY AND STRUCTURE

SELF-HEALING NETWORKS: REDUNDANCY AND STRUCTURE SELF-HEALING NETWORKS: REDUNDANCY AND STRUCTURE Guido Caldarelli IMT, CNR-ISC and LIMS, London UK DTRA Grant HDTRA1-11-1-0048 INTRODUCTION The robustness and the shape Baran, P. On distributed Communications

More information

Constructing arbitrarily large graphs with a specified number of Hamiltonian cycles

Constructing arbitrarily large graphs with a specified number of Hamiltonian cycles Electronic Journal of Graph Theory and Applications 4 (1) (2016), 18 25 Constructing arbitrarily large graphs with a specified number of Hamiltonian cycles Michael School of Computer Science, Engineering

More information

IT IS increasingly the case that a given service request from a

IT IS increasingly the case that a given service request from a IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 5, OCTOBER 2001 525 IDMaps: A Global Internet Host Distance Estimation Service Paul Francis, Sugih Jamin, Cheng Jin, Yixin Jin, Danny Raz, Member, IEEE,

More information

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Som Chandra Neema Venkata Nishanth Lolla {sneema,vlolla}@cs.ucr.edu Computer Science Department University of California, Riverside Abstract

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

B. Krishna Sagar et al. / International Journal of Research in Modern Engineering and Emerging Technology

B. Krishna Sagar et al. / International Journal of Research in Modern Engineering and Emerging Technology A Novel System to Map Reasonably Connected Internet Regions B KRISHNA SAGAR Department of Computer Science and Engineering Siddartha educational academy group of institutions, Tirupati (India) N. ANAND

More information

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Henry Lin Division of Computer Science University of California, Berkeley Berkeley, CA 94720 Email: henrylin@eecs.berkeley.edu Abstract

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

Incentives for BGP Guided IP-Level Topology Discovery

Incentives for BGP Guided IP-Level Topology Discovery Incentives for BGP Guided IP-Level Topology Discovery Benoit Donnet Université catholique de Louvain - CSE Deparment - Belgium Abstract. Internet topology discovery has been an attractive research field

More information

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs : A Distributed Adaptive-Learning Routing Method in VDTNs Bo Wu, Haiying Shen and Kang Chen Department of Electrical and Computer Engineering Clemson University, Clemson, South Carolina 29634 {bwu2, shenh,

More information

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik and Alhussein Abouzeid Electrical, Computer and Systems Engineering Department Rensselaer Polytechnic Institute Troy,

More information

Depth First Search A B C D E F G A B C 5 D E F 3 2 G 2 3

Depth First Search A B C D E F G A B C 5 D E F 3 2 G 2 3 Depth First Search A B C D E F G A 4 3 2 B 4 5 4 3 C 5 D 3 4 2 E 2 2 3 F 3 2 G 2 3 Minimum (Weight) Spanning Trees Let G be a graph with weights on the edges. We define the weight of any subgraph of G

More information

Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy. Miroslav Bures and Bestoun S. Ahmed

Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy. Miroslav Bures and Bestoun S. Ahmed 1 Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy Miroslav Bures and Bestoun S. Ahmed arxiv:1802.08005v1 [cs.se] 22 Feb 2018 Abstract Executing various sequences of system

More information

Harnessing Internet Topological Stability in Thorup-Zwick Compact Routing

Harnessing Internet Topological Stability in Thorup-Zwick Compact Routing The 31st Annual IEEE International Conference on Computer Communications: Mini-Conference Harnessing Internet Topological Stability in Thorup-Zwick Compact Routing Stephen D. Strowes School of Computing

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Computational Discrete Mathematics

Computational Discrete Mathematics Computational Discrete Mathematics Combinatorics and Graph Theory with Mathematica SRIRAM PEMMARAJU The University of Iowa STEVEN SKIENA SUNY at Stony Brook CAMBRIDGE UNIVERSITY PRESS Table of Contents

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Final thesis K Shortest Path Implementation by RadhaKrishna Nagubadi LIU-IDA/LITH-EX-A--13/41--SE 213-6-27 Linköpings universitet

More information