Comparing internet probing methodologies through an analysis of large dynamic graphs
MetadataShow full item record
The Internet is an evolving, robust system with built in redundancy to ensure the flow of information regardless of any act of nature or man-made event. This makes mapping the Internet a daunting task, but important because understanding its structure helps identifying vulnerabilities and possibly optimizing traffic through the network. We explore CAIDA’s and NPS’s probing methodologies to verify the assentation that NPS’s probing methodology discovers comparable Internet topologies in less time. We compare these by modeling union of traceroute outputs as graphs, and using standard graph theoretical measurements as well as a recently introduced measurement. Ultimately, the researchers verified the NPS’s probing methodology was comparable to the CAIDA’s probing methodology. We also propose additional avenues for further exploration from our initial discoveries. We also introduced a technique that can possibility identify stable core existence among the whole Internet and explore case studies of two country sub-graphs.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Perri, Richard. (Monterey, California: Naval Postgraduate School, 1999-12);During the mid 90s, data and voice began to merge, propelled by advances in compression technology. The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces ...
Parker, Kevin J (Monterey, California. Naval Postgraduate School, 1997);This thesis argues that the Internet is likely to he a strong, positive facilitating factor for the transition to and consolidation of democracy for states in Southeast Asia. U.S. policy makers intent on promoting democracy ...
Schively, Jody L. (Monterey, California. Naval Postgraduate School, 1994-09);As the Naval Postgraduate School's (NPS) computer network continues to incorporate computers with a wide variety of security holes, it is vital that an Internet firewall be installed to provide perimeter security for NPS ...