Open Access Open Access  Restricted Access Subscription or Fee Access

Improved Doubletree Algorithm to Discovery Large-Scale Topology

Ranjit Kumar Nukathati

Abstract


There is a growing interest in how to effectively and efficiently perform the topology discovery task in a network-friendly manner Monitoring Internet topology was a tractable problem. Topology discovery systems are starting to be introduced in the form of easily and widely deployed software. Unfortunately, they have a problem of how to perform such measurements efficiently and in a network-friendly manner. When scaled up, such methods will generate so much traffic that they will begin to resemble distributed denial-of-service attacks. The current trend towards a relevant highly distributed system by increasing the number of monitors is not a trivial matter. Duplication of effort close to the monitors wastes time by re-exploring previously discovered parts of the network, not to mention that probes converging from a set of sources towards a given destination can resemble a distributed denial-of-service(DDoS) attack as the probes converge from a set of sources towards a given destination. Improved Doubletree, which deals with these issues while keeping high network coverage. The existing Doubletree algorithm faces the problem of redundancy. To solve this, the Improved Doubletree algorithm is proposed which reduces redundancy while maintaining nearly the same level of nodes and link coverage. Algorithm quantifies the amount of redundancy in classic Internet topology discovery approaches by taking into account the perspective of a single monitor (intramonitor) and that of an entire system (intermonitor). Improved Doubletree simultaneously meets the conflicting demands of reducing intramonitor and intermonitor redundancy. In both the above cases a hop in the middle that is between monitor and destination will be selected by Hop Selection to increase efficiency.

Keywords


Distributed Denial-of-Service (DDoS) Attack Improved Doubletree Forward Probing Backward Probing Stopping Rule

Full Text:

PDF

References


V. Jacobsen et al., “Traceroute UNIX,” 1989. [Online]. Available: ftp://ftp.ee.lbl.gov/traceroute.tar.gz, man page

B. Huffaker, D.Moore, D. Plummer, and k. claffy, “Topology discovery by active probing,” in Proc. Symp. App. Internet, Jan. 2002, pp. 90–96.

WAND Network Research Group, “IPv6 scamper.” [Online]. Available: http://www.wand.net.nz/~mjl12/ipv6-scamper/

E.C. Rosen. “Vulnerabilities of network control protocols: An example”. RFC 789, July 1981.

Y. Rekhter. “BGP Protocol Analysis”. RFC 1265 (Informational), October 1991.

D. Atkins and R. Austein. “Threat Analysis of the Domain Name System (DNS)”. RFC 3833 (Informational), August 2004.

S. Murphy. “BGP Security Vulnerabilities Analysis”. RFC 4272 (Informational), January 2006.

A. Retana, R. White, V. Fuller, and D. McPherson. “Using 31-Bit Prefixes on IPv4 Point-to-Point Links”. RFC 3021 (Proposed Standard), December 2000.

Y. Rekhter and T. Li. “A Border Gateway Protocol 4 (BGP-4)”. RFC 1771 (Draft Standard), March 1995. Obsoleted by RFC 4271

IANA, “Special-Use IPv4 Addresses,” Internet Engineering Task Force, RFC 3330, Sep. 2002.

R. Govindan and H. Tangmunarunkit, “Heuristics for Internet map discovery,” in Proc. IEEE INFOCOM, Mar. 2000, pp. 1371–1380.

Y. Bejerano and R. Rastogi, “Robust monitoring of link delays and faults in IP networks,” in Proc. IEEE INFOCOM, Apr. 2003, pp. 134–144.

R. K. Jain, The Art of Computer Systems Performance Analysis. New York:Wiley, 1991.

A. Broido and k. claffy, “Internet topology: Connectivity of IP graphs,” in Proc. SPIE Int. Symp. Convergence IT and Commun., Aug. 2001, pp. 172–187.

C. R. Simpson, Jr. and G. F. Riley, “NETI@home: A distributed approach to collecting end-to-end network performance measurements,” in Proc. Passive Active Measure. Workshop, 2004, pp. 168–174. [Online]. Available: http://www.neti.gatech.edu/

B. Cheswick, H. Burch, and S. Branigan, “Mapping and visualizing the Internet,” in Proc. USENIX Annu. Tech. Conf., Jun. 2000, pp. 1–12.

A. Clauset and C. Moore, “Traceroute sampling makes random graphs appear to have power law degree distributions,” Feb. 2004, arXiv, condmat0312674.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.