Open Access Open Access  Restricted Access Subscription or Fee Access

Internet Shared Resources Framework

G. S. Nagaraja, Dr. H. V. Ramakrishnan


Resource sharing is also complicated by the absence of a complete and accurate level map of the internet. Without this map, an understanding of the distribution and usage patterns of network resources are limited. The location of routers and links and how they are shared are unknown and obtaining this map is difficult. Existing internet protocols were not explicitly designed for monitoring of further internet service providers (ISP’s).The local networks maps using are only known. In many cases active measurements and observations the network maps are inferred partially the internet’s size, hardware diversity and ISP policy make these maps incomplete and inaccurate. Also, active measurements are limited by administrators who confuse measurement probes for attacks and generate “ abuse reports “ and even legal threats curtail the scope of experiments. What can be done to improve the completeness and accuracy of the map of the internet without causing the ire of network administrators? It is possible to secure and discover shared internet resources without global protocol redeployment or architecture support.

The proposed work is focused on design and evaluation of protocols that secure the internet’s shared resources without requiring network support or global protocol redeployment. The notion of security varies with respect to the attack model. This work demonstrates security in three distinct user assumptions, Co-operative, selfish and malicious users. Novel techniques for increasing the accuracy and completeness of internet topology discovery are designed and evaluated. These techniques leverage existing protocol and hardware features and thus can be implemented on today’s internet.


Convergence, Co-operative, Internet, Leverage, Malicious, Protocol, Resources, Selfish, Security, Sharing

Full Text:



Alexandros Koliousis, Joesph S Ventek “ A Trustworthy Mobile Agent Infrastructure for Network Management,” IEEE 2007.


Abilene router configurations. http://

S Ailleret Larbin: Multipurpose web crawler. overview.html

P Mahadevan, D. Kriokov, K Fall and A. Vahdat. Systematic topology analysis and generation usin degree correlations. In SIGCOMM’O6,2006.

H.V Madhyastha, T. Isdal, M. Piatek, C. Dixon,T. Anderson, A Krishnamurthy, and A Venkataramani. Iplane: An information plane for distributed services. In OSDI, Seattle, WA, Nov.2006.

D Meyer University of Oregon Route views project.

Praveen Gorur.Y “Converged Network Management : Challenges And Solutions,” IEEE Transactions-2006.

Rajesh P, Ranjiith S, Soumya P R, Karthik V, Datthathreya S “Network Management System using Web Services and Service Oriented Architecture,” IEEE Transactions-2006.

Ricardo Lemos Vianna.. “Investigating Web services Composition Applied to Network Management,” IEEE International Conference on Web Services 2006( ICWS’06)

Transmission control protocol specification. IETF RFC 793,1981. ARPA Working Group for Comment DDN network Information Center, SRI International, Menlo Park CA.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.