27,326 research outputs found
AS-level topology collection through looking glass servers
While accurate and complete modeling of the Internet topol-ogy at the Autonomous System (AS) level is critical for future protocol design, performance evaluation, simulation and analysis, still it remains a challenge to construct its ac-curate representation. In this paper, we collect BGP route announcements of ASes from Looking glass (LG) servers. By querying LG servers, we build an AS topology estimate of around 116 K AS links, from which we discover 11 K new AS links and 686 new ASes. We conclude that collecting BGP traces from LG servers can help enhance the current view of the AS topology from the BGP collector projects (e.g., RouteViews)
Phase Changes in the Evolution of the IPv4 and IPv6 AS-Level Internet Topologies
In this paper we investigate the evolution of the IPv4 and IPv6 Internet
topologies at the autonomous system (AS) level over a long period of time.We
provide abundant empirical evidence that there is a phase transition in the
growth trend of the two networks. For the IPv4 network, the phase change
occurred in 2001. Before then the network's size grew exponentially, and
thereafter it followed a linear growth. Changes are also observed around the
same time for the maximum node degree, the average node degree and the average
shortest path length. For the IPv6 network, the phase change occurred in late
2006. It is notable that the observed phase transitions in the two networks are
different, for example the size of IPv6 network initially grew linearly and
then shifted to an exponential growth. Our results show that following decades
of rapid expansion up to the beginning of this century, the IPv4 network has
now evolved into a mature, steady stage characterised by a relatively slow
growth with a stable network structure; whereas the IPv6 network, after a slow
startup process, has just taken off to a full speed growth. We also provide
insight into the possible impact of IPv6-over-IPv4 tunneling deployment scheme
on the evolution of the IPv6 network. The Internet topology generators so far
are based on an inexplicit assumption that the evolution of Internet follows
non-changing dynamic mechanisms. This assumption, however, is invalidated by
our results.Our work reveals insights into the Internet evolution and provides
inputs to future AS-Level Internet models.Comment: 12 pages, 21 figures; G. Zhang et al.,Phase changes in the evolution
of the IPv4 and IPv6 AS-Level Internet topologies, Comput. Commun. (2010
Design of Ad Hoc Wireless Mesh Networks Formed by Unmanned Aerial Vehicles with Advanced Mechanical Automation
Ad hoc wireless mesh networks formed by unmanned aerial vehicles (UAVs)
equipped with wireless transceivers (access points (APs)) are increasingly
being touted as being able to provide a flexible "on-the-fly" communications
infrastructure that can collect and transmit sensor data from sensors in
remote, wilderness, or disaster-hit areas. Recent advances in the mechanical
automation of UAVs have resulted in separable APs and replaceable batteries
that can be carried by UAVs and placed at arbitrary locations in the field.
These advanced mechanized UAV mesh networks pose interesting questions in terms
of the design of the network architecture and the optimal UAV scheduling
algorithms. This paper studies a range of network architectures that depend on
the mechanized automation (AP separation and battery replacement) capabilities
of UAVs and proposes heuristic UAV scheduling algorithms for each network
architecture, which are benchmarked against optimal designs.Comment: 12 page
Distributed Network Anomaly Detection on an Event Processing Framework
Network Intrusion Detection Systems (NIDS) are an integral part of modern data centres to ensure high availability and compliance with Service Level Agreements (SLAs). Currently, NIDS are deployed on high-performance, high-cost middleboxes that are responsible for monitoring a limited section of the network. The fast increasing size and aggregate throughput of modern data centre networks have come to challenge the current approach to anomaly detection to satisfy the fast growing compute demand. In this paper, we propose a novel approach to distributed intrusion detection systems based on the architecture of recently proposed event processing frameworks. We have designed and implemented a prototype system using Apache Storm to show the benefits of the proposed approach as well as the architectural differences with traditional systems. Our system distributes modules across the available devices within the network fabric and uses a centralised controller for orchestration, management and correlation. Following the Software Defined Networking (SDN) paradigm, the controller maintains a complete view of the network but distributes the processing logic for quick event processing while performing complex event correlation centrally. We have evaluated the proposed system using publicly available data centre traces and demonstrated that the system can scale with the network topology while providing high performance and minimal impact on packet latency
A management framework for automating network experiments and user behaviour emulation on large scale testbed facilities
Generic test environments such as Emu lab allow to perform large scale tests on different network topologies. While these facilities offer a tool to easily configure the topology, setting up realistic network scenarios afterwards is a manual and time consuming task involving the configuration of dozens of servers, including the installation of software suites and the emulation of subscriber behaviour. Also collecting the evaluation results afterwards can be complex and time consuming. This article discusses a management framework that allows both automating the configuration of networking experiments through a Graphical User Interface and automating the collection of measurements and visualisation of experimental results afterwards
- …