The Internet Topology: Illusion and Reality

dc.contributor.advisorKhaled Harfoush, Committee Chairen_US
dc.contributor.advisorArne A. Nilsson, Committee Memberen_US
dc.contributor.advisorCarla D. Savage, Committee Memberen_US
dc.contributor.advisorGeorge N. Rouskas, Committee Memberen_US
dc.contributor.authorKim, Sangminen_US
dc.date.accessioned2010-04-02T18:38:57Z
dc.date.available2010-04-02T18:38:57Z
dc.date.issued2008-12-04en_US
dc.degree.disciplineComputer Scienceen_US
dc.degree.leveldissertationen_US
dc.degree.namePhDen_US
dc.description.abstractResearch studies targeted at unveiling the Internet topology are essential for understanding the performance of the Internet and its resilience to failures or distributed attacks, and for generating realistic topologies to simulate Internet protocols and applications. An accurate understanding of the complex Internet structure and behavior, while very rewarding, is very challenging and in fact is a source of controversy in the networking research community. Till now, there is a lack of understanding of the Internet complexity In this thesis, we make the following contributions. First, we propose an efficient tool, AROMA, to unveil Layer-3 maps of the Internet and use it to reveal ISP maps. AROMA reveals the same number of routers and links as existing tools such as Rocketfuel after sending less than 5.1% of the number of probes used by Rocketfuel, and reveals at least 100% more links and routers than Rocketuel while using the same number of probe packets. Second, we study the limitations of existing layer-3 tools such as traceroute in unveiling the details of the Internet structure and identify that the power law connectivity observed in the Internet topology is not an illusion as suggested by some researchers. It is mainly manifested due to the blindness of traceroute to layer-2 devices, and this manifestation will persist independent of the nature of the underlying physical topology. Third, we provide a realistic Internet topology model, HINT, which captures the Internet structure and features. HINT is based on economical, performance and security constraints that are typically used to construct networks. Matching HINT topologies to known ISP topologies confirms its superiority to existing Internet topology models.en_US
dc.identifier.otheretd-11072007-093228en_US
dc.identifier.urihttp://www.lib.ncsu.edu/resolver/1840.16/3869
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dis sertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to NC State University or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.subjectInterneten_US
dc.subjectcycleen_US
dc.subjectpower lawen_US
dc.subjectnetwork topologyen_US
dc.titleThe Internet Topology: Illusion and Realityen_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
etd.pdf
Size:
2.23 MB
Format:
Adobe Portable Document Format

Collections