A review of internet topology research at the autonomous system level

T Witono, S Yazid - Proceedings of Sixth International Congress on …, 2022 - Springer
Internet topology research is often done at the autonomous system level because of its
highest level of granularity and the availability of several public datasets. The purpose of this …

Bgp-multipath routing in the internet

J Li, V Giotsas, Y Wang, S Zhou - IEEE Transactions on Network …, 2022 - ieeexplore.ieee.org
BGP-Multipath (BGP-M) is a multipath routing technique for load balancing. Distinct from
other techniques deployed at a router inside an Autonomous System (AS), BGP-M is …

Investigating characteristics of internet paths

K Bakhshaliyev, MA Canbaz, MH Gunes - ACM Transactions on …, 2019 - dl.acm.org
Interactive and multimedia applications depend on the stability of end-to-end paths for
predictable performance and good quality of service. On the other hand, network providers …

Analytical subnetwork and ip alias resolution for network tomography using path traces

A Aksoy - Electronics, 2024 - mdpi.com
Mapping of link-level network topologies requires the processing of collected raw traces,
including the resolution of alias IPs of router interfaces and underlying subnetworks. There …

Router-level topologies of autonomous systems

MA Canbaz, K Bakhshaliyev, MH Gunes - Complex Networks IX …, 2018 - Springer
In order to understand the Internet topology, it is important to analyze the underlying
networks' characteristics. Internet is enabled by independently operating Autonomous …

Analysis of path stability within autonomous systems

MA Canbaz, K Bakhshaliyev… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Interactive and multimedia applications depend on the stability of end-to-end paths on the
Internet for predictable performance and good quality of service. On the other hand, network …

Internet topology mining: from big data to network science

MA Canbaz - 2018 - search.proquest.com
Data has become one of the most valuable resources in today's world where we have
greater digital presence. Large volumes of data are generated through various platforms …

A framework for internet connectivity risk assessment based on graph models

T Ermakova, B Fabian, D Alexander Fradin… - IEEE/WIC/ACM …, 2021 - dl.acm.org
Autonomous systems (AS) that relay Internet traffic are not equally well connected. The
failure of just a tiny portion of them can render multiple sites inaccessible and disconnect …

Resolving Anonymous Nodes Based on “Watermelon Patterns” Towards Constructing Router-Level Topology in Mesh Network

R Li, X Feng, C Liu, F Yuan, S Ding - International Conference on …, 2023 - Springer
Router-level topology, portraying the connection relationship between network devices, is
important for discovering key devices in network. In actual networks, there are some …

Protecting File Transfers Against Silent Data Corruption with Robust End-to-End Integrity Verification

B Charyyev - 2019 - search.proquest.com
Scientific applications generate large volumes of data that often needs to be moved between
geographically distributed sites which has led to a significant increase in data transfer rates …