How Asymmetric Is the Internet?
详细信息    查看全文
  • 关键词:Internet ; Asymmetry ; Large Scale Measurements
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2015
  • 出版时间:2015
  • 年:2015
  • 卷:9122
  • 期:1
  • 页码:113-125
  • 全文大小:311 KB
  • 参考文献:1.Damerau, F.J.: A technique for computer detection and correction of spelling errors. Communications of the ACM?7(3), 171-76 (1964)View Article
    2.Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827 (Best Current Practice) (2000), http://www.ietf.org/rfc/rfc2827.txt
    3.He, Y.H.Y., Chen, W.C.W., Xiao, B.X.B., Peng, W.P.W.: An Efficient and Practical Defense Method Against DDoS Attack at the Source-End. In: 11th International Conference on Parallel and Distributed Systems (ICPADS 2005) (February 2005)
    4.He, Y., Faloutsos, M., Krishnamurthy, S., Huffaker, B.: On routing asymmetry in the Internet. In: Global Telecommunications Conference, GLOBECOM 2005, vol.?2, p. 6. IEEE (November 2005)
    5.He, Y., Faloutsos, M., Krishnamurthy, S.V.: Quantifying routing asymmetry in the Internet at the AS level. In: GLOBECOM, pp. 1474-479. IEEE (2004), http://dblp.uni-trier.de/db/conf/globecom/globecom2004.html#HeFK04
    6.Iputils: ping(8) (2014), http://man7.org/linux/man-pages/man8/ping.8.html
    7.Katz-Bassett, E., Madhyastha, H., Adhikari, V.: Reverse traceroute. In: Network Systems Design and Implementation (2010), https://www.usenix.org/legacy/event/nsdi10/tech/full_papers/katz-bassett.pdf
    8.Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady?10, 707-10 (1966)MathSciNet
    9.Paxson, V.: End-to-end Routing Behavior in the Internet. In: Conference Proceedings on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 1996, pp. 25-8. ACM, New York (1996), http://doi.acm.org/10.1145/248156.248160
    10.Schwartz, Y., Shavitt, Y., Weinsberg, U.: On the Diversity, Stability and Symmetry of End-to-End Internet Routes. In: INFOCOM IEEE Conference on Computer Communications Workshops 2010, pp. 1- (2010)
  • 作者单位:Wouter de Vries (18)
    José Jair Santanna (18)
    Anna Sperotto (18)
    Aiko Pras (18)

    18. Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands
  • 丛书名:Intelligent Mechanisms for Network Configuration and Security
  • ISBN:978-3-319-20034-7
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
文摘
A network path is a path that a packet takes to reach its target. However, determining the network path that a host uses to reach it’s target from the viewpoint of the latter is less trivial than it appears. Tools such as Traceroute allow the user to determine the path towards a target (i.e. the forward path), but not the path from the target to the source (i.e. the reverse path) due to routing asymmetry. Routing asymmetry means that the network path between two hosts may be different in opposite directions. Although previous studies have shown that this asymmetry is widespread, a more detailed characterization is lacking. In this paper routing asymmetry is investigated in depth using large scale measurements with 4.000 probes distributed world wide. The main goal of this paper is to provide characteristics about Internet asymmetry based on recent large scale measurements. Our findings contribute to a conclusive overview of Internet asymmetry, which assist researchers and engineers in making valid assumptions about routing asymmetry.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700