Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communi 2012
DOI: 10.1145/2342356.2342393
|View full text |Cite
|
Sign up to set email alerts
|

Anatomy of a large european IXP

Abstract: The largest IXPs carry on a daily basis traffic volumes in the petabyte range, similar to what some of the largest global ISPs reportedly handle. This little-known fact is due to a few hundreds of member ASes exchanging traffic with one another over the IXP's infrastructure. This paper reports on a first-of-its-kind and in-depth analysis of one of the largest IXPs worldwide based on nine months' worth of sFlow records collected at that IXP in 2011.A main finding of our study is that the number of actual peerin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
138
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 224 publications
(142 citation statements)
references
References 40 publications
3
138
1
Order By: Relevance
“…support might not be crucial at this time because according to a recent study, HTTPS is <5% of all web traffic [1].…”
Section: Challenges and Future Workmentioning
confidence: 96%
See 1 more Smart Citation
“…support might not be crucial at this time because according to a recent study, HTTPS is <5% of all web traffic [1].…”
Section: Challenges and Future Workmentioning
confidence: 96%
“…relays supporting 500 000 daily users. 1 Moreover, Tor is popular among BitTorrent users who, while representing a small fraction of the overall users, consume a large fraction of the overall bandwidth [7]. Finally, some delays are inherent in anonymous routing, as paths traverse relays scattered around the world to better hide the true origin of a connection.…”
Section: Introductionmentioning
confidence: 99%
“…• The type of content popularity handled by the network will alter the optimal deployment. Demand that is more uniformly distributed is better handled by pushing caches into the core (e.g., an Internet Exchange Point [41]) to better aggregate requests. For highly skewed demands, caches must be pushed to the edge.…”
Section: Summary Of Findingsmentioning
confidence: 99%
“…In this regard, the fact that adds to the difficulty of countering route leaks using vantage points is the secrecy of the routing policies among ASes. Although several attempts have been made for inferring the relationships and the policies among ASes (see, e.g., [4], [5], [6]), more recent works are currently questioning the accuracy of these techniques [7]. This is mainly due to the fact that the knowledge base for inferring the AS relationships and their corresponding export policies is limited to the routing information available at the data collection points.…”
Section: Introductionmentioning
confidence: 99%
“…This is mainly due to the fact that the knowledge base for inferring the AS relationships and their corresponding export policies is limited to the routing information available at the data collection points. In particular, the increase in the number of Internet Exchange Points (IXPs) and their role in the recent "flattening" of the Internet topology, makes that a large fraction of AS relationships cannot be discovered using these data collection points [7].…”
Section: Introductionmentioning
confidence: 99%