• Title/Summary/Keyword: Internet Topology

Search Result 281, Processing Time 0.021 seconds

Study on the Characteristics of the Korea Internet AS-Level Topology Using Node Degree and Node Connectivity Metrics

  • Oh, Dong Ik;Lee, Kang Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.417-426
    • /
    • 2013
  • The Korea Internet AS-level topology was constructed using three data sources: Border Gateway Protocol (BGP) trace collector, Internet Routing Registry (IRR), and Internet Exchange Point (IXP). It has 685 nodes and 1,428 links. The Korea Internet AS-level topology is a small regional subgraph of the massive global one. We investigate how well the Korea Internet preserves the topological characteristics of the global one or how different they are. We carefully select several topology metrics that can analyze the characteristics of the Korea Internet AS-level topology. We also investigate how well Internet topology generators can represent the characteristics of the Korea Internet AS-level topology.

Analysis of Korea Internet AS-Level Topology (한국 인터넷 AS 레벨 위상 분석)

  • Oh, Dong Ik;Lee, Kang Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.10
    • /
    • pp.901-911
    • /
    • 2012
  • Over the last decade, the Internet in Korea has developed rapidly. The number of ASes in Korea is 755. However, there has been no significant effort to obtain an accurate picture of the Internet AS-level topology. To construct more complete set of Korea AS-level topology data all the available data sources are critically reviewed and compared. Three data sources, which can be used to infer Korea Internet AS-level topology, are selected; BGP data of UCLA "Internet Topology Collection", IRR data and IXP data. It is known that global Internet AS-level topology follows power-law distribution. In this paper, we also investigate if the Korea Internet AS-level topology follows power-law distribution.

A Comparative Study of The Internet Topology Generators for Domestic AS-Level Topology (국내 AS 수준 인터넷 위상 분석과 인터넷 위상 생성기 비교에 관한 연구)

  • Oh, Dong-Ik;Lee, Kang-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2365-2373
    • /
    • 2012
  • To obtain Korea AS-level internet topology, we used three data sources, which include BGP data of UCLA IRL, IRR and IXP data. Using Internet topology generator models(Waxman, BA and GLP), we developed three graphs that have same number of nodes as Korea AS-level Internet. Then we compared each graph with the Korea AS-level Internet topology. Through this study we could find that the existing Internet topology generators can't simulate Korea AS-level internet.

Prediction of the Future Topology of Internet Reflecting Non-monotony (비단조 변화성을 이용한 인터넷의 미래 위상 예측)

  • 조인숙;이문호
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.205-214
    • /
    • 2004
  • Internet evolves into the huge network with new nodes inserted or deleted depending on specific situations. A new model of network topology is needed in order to analyze time-varying Internet more realistically and effectively. In this study the non-monotony models are proposed which can describe topological changes of Internet such as node insertion and deletion, and can be used for predicting its future topology. Simulation is performed to analyze the topology generated by our model. Simulation results show that our proposed model conform the power law of realistic Internet better than conventional ones. The non-monotony model can be utilized for designing Internet protocols and networks with better security.

  • PDF

Jellyfish: A Conceptual Model for the AS Internet Topology

  • Siganos Georgos;Tauro Sudhir Leslie;Faloutsos Michalis
    • Journal of Communications and Networks
    • /
    • v.8 no.3
    • /
    • pp.339-350
    • /
    • 2006
  • Several novel concepts and tools have revolutionized our understanding of the Internet topology. Most of the existing efforts attempt to develop accurate analytical models. In this paper, our goal is to develop an effective conceptual model: A model that can be easily drawn by hand, while at the same time, it captures significant macroscopic properties. We build the foundation for our model with two thrusts: a) We identify new topological properties and b) we provide metrics to quantify the topological importance of a node. We propose the jellyfish as a model for the inter-domain Internet topology. We show that our model captures and represents the most significant topological properties. Furthermore, we observe that the jellyfish has lasting value: It describes the topology for more than six years.

A Literature Survey of the Internet Topology Generation Models (인터넷 토폴로지 생성 모델에 관한 문헌조사 연구)

  • Lee, Kang Won;Kook, Kwang Ho
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.33 no.1
    • /
    • pp.138-152
    • /
    • 2007
  • There has been much effort to improve the accuracy of the Internet topology model and include its quantitativeand/or qualitative effects on studies of a variety of network problems. Such improvement is the primarymotivation of this paper in listing and classifying the body of literature addressing the Internet topology. Themetrics, which characterize the fundamental properties of the Internet, are also divided into five categories andtheir importance and applications are discussed. Finally, we suggest several future research topics for theInternet topology models to be more realistic and applicable.

Topology-Hiding Broadcast Based on NTRUEncrypt

  • Mi, Bo;Liu, Dongyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.431-443
    • /
    • 2016
  • Secure multi-party computation (MPC) has been a research focus of cryptography in resent studies. However, hiding the topology of the network in secure computation is a rather novel goal. Inspired by a seminal paper [1], we proposed a topology-hiding broadcast protocol based on NTRUEncrypt and secret sharing. The topology is concealed as long as any part of the network is corrupted. And we also illustrated the merits of our protocol by performance and security analysis.

A Distributed Web-Topology for the Wireless Mesh Network with Directional Antennas

  • Ranjitkar, Arun;Ko, Young-Bae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.191-210
    • /
    • 2011
  • Topology management, which includes neighbor discovery, tracking and updating, is a key area that need to be dealt with appropriately to increase network performance. The use of directional antenna in Wireless Mesh Networks is beneficial in constructing backbone networks viewing the properties of directional antenna. The backbone links must be robust to obtain better network performance. In this paper, a simple yet effective topology protocol is presented that performs well compared to its predecessors. Our protocol constructs the topology with the constraints in the number of links per node. The full topology is constructed in two phases. The resultant topology is termed as Web-topology. The topology formed is robust, efficient, and scalable.

Power-Laws Exponents of the Domestic AS-level Internet Topology based on the Valley-free BGP Routing Policy (BGP 밸리-프리 라우팅 정책에 기반한 국내 AS 레벨 인터넷 토폴로지의 파워-로 지수)

  • Kang, Koo-Hong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.41-49
    • /
    • 2010
  • Faloustsos et al.[1,2] showed successfully that the power-laws describe the heavy-tailed distributions of the AS level Internet topology properties such as node degree. This result allows us to represent the characteristics of AS-level Internet topology using some power-law exponents with elegant and simple. In this paper, we obtained the power-law exponents of the domestic AS-level Internet topology properties - the node degree, the number of pairs within hops, and eigenvalues of the graph - based on the valley-free BGP routing policy. We used the real data sets from UCLA IRL laboratory, and showed that these power-laws fit the real data pretty well resulting in correlation coefficient of 90.7%, 96.5%, and 97%, respectively. In particular, rounding the effective diameter to three, approximately 91% of the pairs of nodes are within this distance; that is, we might conclude our topology is pretty well organized.

An Internet Topology Generator Applying DEVS Modeling (DEVS 모델링을 적용한 인터넷 위상 생성기)

  • Sohn Juhang;Park Sangjoon;Han Jungahn;Kim Hyungjong;;Kim Byunggi
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.43-54
    • /
    • 2004
  • Studies of Internet algorithms or policies require experiments on the real large-scale networks. But practical problems with large real networks make them difficult. Instead many researchers use simulations on the Internet topology models. So, It is Important that study about topology model that reflect characteristic of the internet exactly. We propose new topology model which reflect of hierarchical network and addition, removal of nodes and accompanied change of topologies. In the modeling scheme for network generation, we applied DEVS formalism and analyzed the topologies generated by our algorithms.

  • PDF