[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Path similarity evaluation using Bloom filters

Published: 01 February 2012 Publication History

Abstract

The performance of several Internet applications often relies on the measurability of path similarity between different participants. In particular, the performance of content distribution networks mainly relies on the awareness of content sources topology information. It is commonly admitted nowadays that, in order to ensure either path redundancy or efficient content replication, topological similarities between sources is evaluated by exchanging raw traceroute data, and by a hop by hop comparison of the IP topology observed from the sources to the several hundred or thousands of destinations. In this paper, based on real data we collected, we advocate that path similarity comparisons between different Internet entities can be much simplified using lossy coding techniques, such as Bloom filters, to exchange compressed topology information. The technique we introduce to evaluate path similarity enforces both scalability and data confidentiality while maintaining a high level of accuracy. In addition, we demonstrate that our technique is scalable as it requires a small amount of active probing and is not targets dependent.

References

[1]
Donnet, B. and Friedman, T., Internet topology discovery: a survey. IEEE Communications Surveys and Tutorials. v9 i4. 2-15.
[2]
V. Jacobson et al., Traceroute, Main Page, UNIX, 1989, See source code: <ftp://ftp.ee.lbl.gov/traceroute.tar.gz>.
[3]
K. Claffy, Y. Hyun, K. Keys, M. Fomenkov, Internet mapping: from art to science, in: Proc. IEEE Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH), 2009.
[4]
A. Schmitt et al., La météo du net. <http://www.grenouille.com/> (ongoing service since 2000).
[5]
P. Radoslavov, H. Tangmunarunkit, H. Yu, R. Govindan, S. Shenker, D. Estrin, On Characterizing Network Topologies and Analyzing their Impact on Protocol Design, USC-CS-TR 00-731, Computer Science Department, University of Southern California (February 2000).
[6]
R. Teixeira, K. Marzullo, S. Savage, G. Voelker, In search of path diversity in ISP networks, in: Proc. ACM SIGCOMM Internet Measurement Conference (IMC), 2003.
[7]
T. Fei, S. Tao, L. Gao, R. Guerin, How to select a good alternate path in large peer-to-peer systems? in: Proc. IEEE INFOCOM, 2006.
[8]
A. Agapi, T. Kielmann, H. Bal, Synthetic coordinates for disjoint multipath routing over the Internet, in: Proc. CoreGRID Symposium, 2007.
[9]
N. Hu, P. Steenkiste, Quantifying Internet end-to-end route similarity, in: Proc. Passive and Active Measurement Workshop (PAM), 2006.
[10]
N. Hu, O. Spatscheck, J. Wang, P. Steenkiste, Optimizing network performance in replicated hosting, in: Proc. Web Caching and Content Distribution Workshop (WCW), 2005.
[11]
S. Ratnasamy, M. Handley, R. Karp, S. Shenker, Topologically-aware overlay construction and server selection, in: Proc. IEEE INFOCOM, 2002.
[12]
S. Bakira, Approximate server selection algorithms in content distribution networks, in: Proc. IEEE International Conference on Communications (ICC), 2005.
[13]
Bloom, B.H., Space/time trade-offs in hash coding with allowable errors. Communications of the ACM. v13 i7. 422-426.
[14]
A. Broder, M. Mitzenmacher, Network applications of Bloom filters: a survey, Internet Mathematics 1 (4).
[15]
M. Mitzenmacher, Compressed Bloom filters, IEEE/ACM Transactions on Networking 10 (5).
[16]
Hexasoft Development Sdn. Bhd, IP address geolocation to identify website visitor's geographical location. <http://www.ip2location.com>.
[17]
IANA, Special-use IPv4 addresses, RFC 3330, Internet Engineering Task Force (September 2002).
[18]
Matsumoto, M. and Nishimura, T., Mersenne Twister: a 623-dimensionally equidistributed uniform pseudorandom number generator. ACM Transactions on Modeling and Computer Simulation. v8 i1. 3-30.
[19]
B. Donnet, B. Baynat, T. Friedman, Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negatives, in: Proc. ACM CoNEXT, 2006.
[20]
J. Bruck, J. Gao, A. Jiang, Weighted bloom filter, in: Proc. IEEE Internationl Symposium on Information Theory (ISIT), 2006.
[21]
N. Hu, P. Steenkiste, Exploiting Internet route sharing for large scale available bandwidth estimation, in: Proc. Internet Measurement Conference (IMC), 2005.
[22]
A. Pathak, H. Pucha, Y. Zhang, C. Hu, M. Mao, A measurement study of Internet delay asymmetry, in: Proc. Passive and Active Measurement Conference (PAM), 2008.
[23]
B. Donnet, T. Friedman, M. Crovella, Improved algorithms for network topology discovery, in: Proc. Passive and Active Measurement Workshop (PAM), 2005.

Cited By

View all
  • (2020)Constructions and Applications for Accurate Counting of the Bloom Filter False Positive Free ZoneProceedings of the Symposium on SDN Research10.1145/3373360.3380845(135-145)Online publication date: 3-Mar-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking  Volume 56, Issue 2
February, 2012
476 pages

Publisher

Elsevier North-Holland, Inc.

United States

Publication History

Published: 01 February 2012

Author Tags

  1. Bloom filter
  2. Similarity
  3. Topology
  4. Traceroute

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Constructions and Applications for Accurate Counting of the Bloom Filter False Positive Free ZoneProceedings of the Symposium on SDN Research10.1145/3373360.3380845(135-145)Online publication date: 3-Mar-2020

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media