• 제목/요약/키워드: Internet Topology

검색결과 281건 처리시간 0.019초

Study on the Characteristics of the Korea Internet AS-Level Topology Using Node Degree and Node Connectivity Metrics

  • 오동익;이강원
    • 한국통신학회논문지
    • /
    • 제38B권6호
    • /
    • pp.417-426
    • /
    • 2013
  • The Korea Internet AS-level topology was constructed using three data sources: Border Gateway Protocol (BGP) trace collector, Internet Routing Registry (IRR), and Internet Exchange Point (IXP). It has 685 nodes and 1,428 links. The Korea Internet AS-level topology is a small regional subgraph of the massive global one. We investigate how well the Korea Internet preserves the topological characteristics of the global one or how different they are. We carefully select several topology metrics that can analyze the characteristics of the Korea Internet AS-level topology. We also investigate how well Internet topology generators can represent the characteristics of the Korea Internet AS-level topology.

한국 인터넷 AS 레벨 위상 분석 (Analysis of Korea Internet AS-Level Topology)

  • 오동익;이강원
    • 한국통신학회논문지
    • /
    • 제37B권10호
    • /
    • pp.901-911
    • /
    • 2012
  • 한국의 인터넷은 매우 빠르게 진화해 등록된 AS 수는 755개에 이르지만 국내에서 AS 수준의 인터넷 위상을 분석한 연구는 거의 전무하다. 본 연구에서는 한국 인터넷 AS 위상 구축과 power-law 특성 분석을 시도 하였다. 보다 정확하고 최신의 AS 수준 위상 구축을 위해 사용 가능한 데이터들을 모두 조사 하였다. 이들에 대한 비판적인 분석 과정을 통해 한국의 실정에 적합하고 또한 획득 가능한 데이터 소스 들을 유도 하였다. UCLA의 "Internet Topology Collection"을 이용한 BGP 데이터 그리고 IRR 과 IXP 데이터로부터 실제 국내 인터넷에 최대한 근접한 위상 데이터를 추출하고 검증 절차를 거쳐 한국 인터넷의 AS 수준 위상을 구축 하였다. 전 세계 AS 수준 위상의 차수 분포가 power-law 분포를 따르는 것으로 알려져 있다. 본 연구에서는 전 세계 AS 수준 위상의 일부분인 한국 AS 수준 위상의 차수 분포가 power-law 분포를 따르는지 조사하였다.

국내 AS 수준 인터넷 위상 분석과 인터넷 위상 생성기 비교에 관한 연구 (A Comparative Study of The Internet Topology Generators for Domestic AS-Level Topology)

  • 오동익;이강원
    • 한국정보통신학회논문지
    • /
    • 제16권11호
    • /
    • pp.2365-2373
    • /
    • 2012
  • 본 논문에서는 UCLA IRL의 BGP 데이터, IRR, IXP 데이터를 이용하여 한국 AS 수준 인터넷 위상 데이터를 구축하였다. 그리고 지금까지 소개된 인터넷 위상 생성 모형(Waxman, BA and GLP)를 이용하여 한국 AS 수준 인터넷과 동일한 노드수를 가지는 위상 데이터를 생성한 뒤, 각각의 모형이 얼마나 한국 AS 수준 인터넷 위상을 잘 묘사하는지 분석하였다. 본 연구를 통해 기존의 인터넷 위상 생성기 모형들은 한국 AS 수준 인터넷을 잘 묘사하지 못하는 것을 확인하였다.

비단조 변화성을 이용한 인터넷의 미래 위상 예측 (Prediction of the Future Topology of Internet Reflecting Non-monotony)

  • 조인숙;이문호
    • Journal of Information Technology Applications and Management
    • /
    • 제11권2호
    • /
    • pp.205-214
    • /
    • 2004
  • Internet evolves into the huge network with new nodes inserted or deleted depending on specific situations. A new model of network topology is needed in order to analyze time-varying Internet more realistically and effectively. In this study the non-monotony models are proposed which can describe topological changes of Internet such as node insertion and deletion, and can be used for predicting its future topology. Simulation is performed to analyze the topology generated by our model. Simulation results show that our proposed model conform the power law of realistic Internet better than conventional ones. The non-monotony model can be utilized for designing Internet protocols and networks with better security.

  • PDF

Jellyfish: A Conceptual Model for the AS Internet Topology

  • Siganos Georgos;Tauro Sudhir Leslie;Faloutsos Michalis
    • Journal of Communications and Networks
    • /
    • 제8권3호
    • /
    • pp.339-350
    • /
    • 2006
  • Several novel concepts and tools have revolutionized our understanding of the Internet topology. Most of the existing efforts attempt to develop accurate analytical models. In this paper, our goal is to develop an effective conceptual model: A model that can be easily drawn by hand, while at the same time, it captures significant macroscopic properties. We build the foundation for our model with two thrusts: a) We identify new topological properties and b) we provide metrics to quantify the topological importance of a node. We propose the jellyfish as a model for the inter-domain Internet topology. We show that our model captures and represents the most significant topological properties. Furthermore, we observe that the jellyfish has lasting value: It describes the topology for more than six years.

인터넷 토폴로지 생성 모델에 관한 문헌조사 연구 (A Literature Survey of the Internet Topology Generation Models)

  • 이강원;국광호
    • 대한산업공학회지
    • /
    • 제33권1호
    • /
    • pp.138-152
    • /
    • 2007
  • There has been much effort to improve the accuracy of the Internet topology model and include its quantitativeand/or qualitative effects on studies of a variety of network problems. Such improvement is the primarymotivation of this paper in listing and classifying the body of literature addressing the Internet topology. Themetrics, which characterize the fundamental properties of the Internet, are also divided into five categories andtheir importance and applications are discussed. Finally, we suggest several future research topics for theInternet topology models to be more realistic and applicable.

Topology-Hiding Broadcast Based on NTRUEncrypt

  • Mi, Bo;Liu, Dongyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권1호
    • /
    • pp.431-443
    • /
    • 2016
  • Secure multi-party computation (MPC) has been a research focus of cryptography in resent studies. However, hiding the topology of the network in secure computation is a rather novel goal. Inspired by a seminal paper [1], we proposed a topology-hiding broadcast protocol based on NTRUEncrypt and secret sharing. The topology is concealed as long as any part of the network is corrupted. And we also illustrated the merits of our protocol by performance and security analysis.

A Distributed Web-Topology for the Wireless Mesh Network with Directional Antennas

  • Ranjitkar, Arun;Ko, Young-Bae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권1호
    • /
    • pp.191-210
    • /
    • 2011
  • Topology management, which includes neighbor discovery, tracking and updating, is a key area that need to be dealt with appropriately to increase network performance. The use of directional antenna in Wireless Mesh Networks is beneficial in constructing backbone networks viewing the properties of directional antenna. The backbone links must be robust to obtain better network performance. In this paper, a simple yet effective topology protocol is presented that performs well compared to its predecessors. Our protocol constructs the topology with the constraints in the number of links per node. The full topology is constructed in two phases. The resultant topology is termed as Web-topology. The topology formed is robust, efficient, and scalable.

BGP 밸리-프리 라우팅 정책에 기반한 국내 AS 레벨 인터넷 토폴로지의 파워-로 지수 (Power-Laws Exponents of the Domestic AS-level Internet Topology based on the Valley-free BGP Routing Policy)

  • 강구홍
    • 인터넷정보학회논문지
    • /
    • 제11권4호
    • /
    • pp.41-49
    • /
    • 2010
  • Faloutsos et al.[1,2]은 파워-로(power-law)를 이용해 노드 차수와 같은 Autonomous System (AS) 레벨 인터넷 토폴로지 특성의 중꼬리(heavy-tailed) 분포를 성공적으로 나타내었다. 이러한 결과는 파워-로 지수(exponents)를 이용해 이들 인터넷 토폴로지 특성을 간단 명료하게 나타낼 수 있게 한다. 본 논문에서는 BGP 밸리-프리 라우팅 정책에 기반한 국내 AS 레벨 인터넷 토폴로지 속성 - 노드 차수, 홉 수에 따른 노드 쌍의 수, 그리고 그래프의 고유치 - 의 파워-로 지수를 조사하였다. UCLA IRL 연구실이 제공하는 실제 AS 레벨 데이터 셋을 이용하였으며 이들 파워-로 근사는 상관계수(correlation coefficient)가 각각 90.7%, 96.5%, 그리고 97%로 조사되었다. 특히, 실질적인 AS 레벨 토폴로지 직경이 3홉 이내에 존재하는 AS 노드 쌍이 전체 91% 이상이며, 따라서 국내 AS 레벨 토폴로지가 비교적 잘 정리된 것으로 판단된다.

DEVS 모델링을 적용한 인터넷 위상 생성기 (An Internet Topology Generator Applying DEVS Modeling)

  • 손주항;박상준;한정안;김형종;이종찬;김병기
    • 한국시뮬레이션학회논문지
    • /
    • 제13권3호
    • /
    • pp.43-54
    • /
    • 2004
  • Studies of Internet algorithms or policies require experiments on the real large-scale networks. But practical problems with large real networks make them difficult. Instead many researchers use simulations on the Internet topology models. So, It is Important that study about topology model that reflect characteristic of the internet exactly. We propose new topology model which reflect of hierarchical network and addition, removal of nodes and accompanied change of topologies. In the modeling scheme for network generation, we applied DEVS formalism and analyzed the topologies generated by our algorithms.

  • PDF