IEEE INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37
DOI: 10.1109/infcom.2003.1208666
|View full text |Cite
|
Sign up to set email alerts
|

Robust monitoring of link delays and faults in IP networks

Abstract: -In this paper, we develop failure-resilient techniques for monitoring link delays and faults in a Service Provider or Enterprise IP network. Our two-phased approach attempts to minimize both the monitoring infrastructure costs as well as the additional traffic due to probe messages. In the first phase of our approach, we compute the locations of a minimal set of monitoring stations such that all network links are covered, even in the presence of several link failures. Subsequently, in the second phase, we com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
135
0

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 106 publications
(137 citation statements)
references
References 12 publications
1
135
0
Order By: Relevance
“…In this regard, our analysis of the data sets suggests that 10-30 minute time interval appear to be an ap- 1 We do not know exactly what caused the delays. We focus our work on measuring and estimating delays.…”
Section: Metrics Definition For Practical Delay Monitoringmentioning
confidence: 87%
See 1 more Smart Citation
“…In this regard, our analysis of the data sets suggests that 10-30 minute time interval appear to be an ap- 1 We do not know exactly what caused the delays. We focus our work on measuring and estimating delays.…”
Section: Metrics Definition For Practical Delay Monitoringmentioning
confidence: 87%
“…A high precision timing technique without GPS was developed for one way delay measurement in [26]. The problem of monitoring link delays and faults that en-sure complete coverage of the network are studied in [1]. In [32], authors compute delays for path segments from a set of end-to-end delay measurements by solving a system of linear equations.…”
Section: Related Workmentioning
confidence: 99%
“…We adopt the most common approach of anomaly detection that is monitoring a covering path set that do not distinguish link anomalies 1 (e.g. [1], [2], [6]). The aim of such an approach is to minimize the monitoring overhead when the network is operational.…”
Section: Problem Formulationmentioning
confidence: 99%
“…Each AS is identified by a unique 16-bit number assigned by the internet assigned numbers authority (IANA). Note that the special problem of determining the topology within a single AS is a separate area of inquiry (see, for instance, Bejerano and Rastogi's work [72]). It is not, strictly speaking, internet topology discovery, and it is considerably helped by the privileged access available to the administrator of an AS.…”
Section: As Levelmentioning
confidence: 99%