Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer An
DOI: 10.1109/infcom.2001.916285
|View full text |Cite
|
Sign up to set email alerts
|

Efficiently monitoring bandwidth and latency in IP networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
80
0
4

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(84 citation statements)
references
References 12 publications
0
80
0
4
Order By: Relevance
“…There are, however, applications of the vertex covering problem and other, closely related optimization problems [2,3] to a huge number of real-world network problems, examples are the monitoring of Internet traffic [4], the prevention of denial-of-service attacks [5] and immunization strategies in networks [6]. Another technically related network problem is the one of counting loops in networks, recently analyzed on the basis of statistical-physics methods [7].…”
Section: Introductionmentioning
confidence: 99%
“…There are, however, applications of the vertex covering problem and other, closely related optimization problems [2,3] to a huge number of real-world network problems, examples are the monitoring of Internet traffic [4], the prevention of denial-of-service attacks [5] and immunization strategies in networks [6]. Another technically related network problem is the one of counting loops in networks, recently analyzed on the basis of statistical-physics methods [7].…”
Section: Introductionmentioning
confidence: 99%
“…Essentially, due to the small number of paths actually monitored, it is possible for errors to be introduced when round-trip times between tracers are used to approximate arbitrary path latencies. Recently, in [7], the authors propose a monitoring scheme where a single network operations center (NOC) performs all the required measurements. In order to monitor links not in its routing tree, the NOC uses the IP source routing option to explicitly route probe packets along the link.…”
Section: A Related Workmentioning
confidence: 99%
“…Each router along the path followed by the packet then decrements the TTL value by one until it reaches zero. When a router decrements the TTL field to zero, it discards the packet and sends an ICMP "time expired" reply to the packet's source node 7 . Now suppose that we would like link e = (u, v) ∈ T s to be monitored by station s ∈ S, and let node v be the node that is further from s. Our strategy is to appropriately set the TTL values in the two probe messages m(s, u) and m(s, v) that measure link e's delay, such that the probes can also detect changes in T s due to e's failure.…”
Section: A Detecting a Network Link Failurementioning
confidence: 99%
“…In efficient reactive monitoring [11], global polling is combined with local event driven reporting to monitor IP networks. Breitbart et al [6] use probing-based techniques where path latencies and bandwidth are measured by transmitting probes from a single point of control. They find the optimal number of probes using vertex cover solutions.…”
Section: Network Tomography and Violation Detectionmentioning
confidence: 99%