Improved Doubletree Algorithm to Discovery Large-Scale Topology
Abstract
Keywords
Full Text:
PDFReferences
V. Jacobsen et al., “Traceroute UNIX,” 1989. [Online]. Available: ftp://ftp.ee.lbl.gov/traceroute.tar.gz, man page
B. Huffaker, D.Moore, D. Plummer, and k. claffy, “Topology discovery by active probing,” in Proc. Symp. App. Internet, Jan. 2002, pp. 90–96.
WAND Network Research Group, “IPv6 scamper.” [Online]. Available: http://www.wand.net.nz/~mjl12/ipv6-scamper/
E.C. Rosen. “Vulnerabilities of network control protocols: An example”. RFC 789, July 1981.
Y. Rekhter. “BGP Protocol Analysis”. RFC 1265 (Informational), October 1991.
D. Atkins and R. Austein. “Threat Analysis of the Domain Name System (DNS)”. RFC 3833 (Informational), August 2004.
S. Murphy. “BGP Security Vulnerabilities Analysis”. RFC 4272 (Informational), January 2006.
A. Retana, R. White, V. Fuller, and D. McPherson. “Using 31-Bit Prefixes on IPv4 Point-to-Point Links”. RFC 3021 (Proposed Standard), December 2000.
Y. Rekhter and T. Li. “A Border Gateway Protocol 4 (BGP-4)”. RFC 1771 (Draft Standard), March 1995. Obsoleted by RFC 4271
IANA, “Special-Use IPv4 Addresses,” Internet Engineering Task Force, RFC 3330, Sep. 2002.
R. Govindan and H. Tangmunarunkit, “Heuristics for Internet map discovery,” in Proc. IEEE INFOCOM, Mar. 2000, pp. 1371–1380.
Y. Bejerano and R. Rastogi, “Robust monitoring of link delays and faults in IP networks,” in Proc. IEEE INFOCOM, Apr. 2003, pp. 134–144.
R. K. Jain, The Art of Computer Systems Performance Analysis. New York:Wiley, 1991.
A. Broido and k. claffy, “Internet topology: Connectivity of IP graphs,” in Proc. SPIE Int. Symp. Convergence IT and Commun., Aug. 2001, pp. 172–187.
C. R. Simpson, Jr. and G. F. Riley, “NETI@home: A distributed approach to collecting end-to-end network performance measurements,” in Proc. Passive Active Measure. Workshop, 2004, pp. 168–174. [Online]. Available: http://www.neti.gatech.edu/
B. Cheswick, H. Burch, and S. Branigan, “Mapping and visualizing the Internet,” in Proc. USENIX Annu. Tech. Conf., Jun. 2000, pp. 1–12.
A. Clauset and C. Moore, “Traceroute sampling makes random graphs appear to have power law degree distributions,” Feb. 2004, arXiv, condmat0312674.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.