Abstract
Original language | Undefined |
---|---|
Title of host publication | Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015 |
Editors | Steven Latré, Marinos Charalambides, Jerome François, Corinna Schmitt, Burkhard Stiller |
Place of Publication | Switzerland |
Publisher | Springer |
Pages | 113-125 |
Number of pages | 13 |
ISBN (Print) | 978-3-319-20033-0 |
DOIs | |
State | Published - Jun 2015 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer International Publishing |
Volume | 9122 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Fingerprint
Keywords
- EWI-26164
- Large scale measurements
- IR-98041
- Asymmetry
- METIS-314924
- Internet
Cite this
}
How asymmetric is the Internet? A Study to Support the use of Traceroute. / de Vries, Wouter Bastiaan; Cardoso de Santanna, José Jair; Sperotto, Anna; Pras, Aiko.
Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. ed. / Steven Latré; Marinos Charalambides; Jerome François; Corinna Schmitt; Burkhard Stiller. Switzerland : Springer, 2015. p. 113-125 (Lecture Notes in Computer Science; Vol. 9122).Research output: Scientific - peer-review › Conference contribution
TY - CHAP
T1 - How asymmetric is the Internet? A Study to Support the use of Traceroute
AU - de Vries,Wouter Bastiaan
AU - Cardoso de Santanna,José Jair
AU - Sperotto,Anna
AU - Pras,Aiko
N1 - 10.1007/978-3-319-20034-7_12
PY - 2015/6
Y1 - 2015/6
N2 - A network path is a path that a packet takes to reach its target. However, determining the network path that a host uses to reach it's target from the viewpoint of the latter is less trivial than it appears. Tools such as Traceroute allow the user to determine the path towards a target (i.e. the forward path), but not the path from the target to the source (i.e. the reverse path) due to routing asymmetry. Routing asymmetry means that the network path between two hosts may be different in opposite directions. Although previous studies have shown that this asymmetry is widespread, a more detailed characterization is lacking. In this paper routing asymmetry is investigated in depth using large scale measurements with 4.000 probes distributed world wide. The main goal of this paper is to provide characteristics about Internet asymmetry based on recent large scale measurements. Our findings contribute to a conclusive overview of Internet asymmetry, which assist researchers and engineers in making valid assumptions about routing asymmetry.
AB - A network path is a path that a packet takes to reach its target. However, determining the network path that a host uses to reach it's target from the viewpoint of the latter is less trivial than it appears. Tools such as Traceroute allow the user to determine the path towards a target (i.e. the forward path), but not the path from the target to the source (i.e. the reverse path) due to routing asymmetry. Routing asymmetry means that the network path between two hosts may be different in opposite directions. Although previous studies have shown that this asymmetry is widespread, a more detailed characterization is lacking. In this paper routing asymmetry is investigated in depth using large scale measurements with 4.000 probes distributed world wide. The main goal of this paper is to provide characteristics about Internet asymmetry based on recent large scale measurements. Our findings contribute to a conclusive overview of Internet asymmetry, which assist researchers and engineers in making valid assumptions about routing asymmetry.
KW - EWI-26164
KW - Large scale measurements
KW - IR-98041
KW - Asymmetry
KW - METIS-314924
KW - Internet
U2 - 10.1007/978-3-319-20034-7_12
DO - 10.1007/978-3-319-20034-7_12
M3 - Conference contribution
SN - 978-3-319-20033-0
T3 - Lecture Notes in Computer Science
SP - 113
EP - 125
BT - Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015
PB - Springer
ER -