Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
need: summary of duration, number of samples, volume of compressed and uncompressed traces, i gues the IMPACT-like nubmers, were we putting these datasets in impact. for all anonymized passive traces. | ||||||||
Line: 30 to 30 | ||||||||
Network troubleshooting | https://www.usenix.org/conference/nsdi14/technical-sessions/presentation/handigol![]() | ||||||||
Added: | ||||||||
> > | Understanding stochastic properties of traffic: https://link.springer.com/chapter/10.1007/978-3-319-66562-7_4![]() | |||||||
Example from ILENS http://www.caida.org/funding/ilens-np/ilens-np_proposal.xml#tth_sEc3.2![]() |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
need: summary of duration, number of samples, volume of compressed and uncompressed traces, i gues the IMPACT-like nubmers, were we putting these datasets in impact. for all anonymized passive traces. | ||||||||
Line: 31 to 31 | ||||||||
Network troubleshooting | https://www.usenix.org/conference/nsdi14/technical-sessions/presentation/handigol![]() | ||||||||
Added: | ||||||||
> > | Example from ILENS http://www.caida.org/funding/ilens-np/ilens-np_proposal.xml#tth_sEc3.2![]() | |||||||
Added: | ||||||||
> > | 3.2 New research opportunities enabled by current data products Our web site lists publications known to us by non-CAIDA authors that make use of CAIDA data (summarized in Figure 5) [60], a lower bound since we cannot enforce the reporting requirement of our AUP. Researchers have requested CAIDA's topology data to support research in the areas of: modeling IPv4 and IPv6 AS-level topology and routing behavior; alias resolution, router-level, and PoP-level topology discovery (including classified work to support DARPA's Plan X project); topology inference and fault diagnosis; infrastructure failure assessments; machine-learning-based AS classification; incongruity between data plane and control plane paths; improving anycast implementations; new metrics for describing scale-free networks; peer-to-peer system scalability; improving visualization of complex systems; geolocation; modeling of delay; improved traceback for network attacks; and new protocols (extensions of IP) to support attribution and prioritization. Publications reported back to us have covered a variety of topics related to the security and stability of the Internet as critical infrastructure [61,62,63,64]: growth analysis of ISPs [65]; infrastructure improvements in the developing world [66]; interdomain traffic estimation [67]; Internet mapping [68], router-level topology discovery [14,69,70]; tomography [71] and path prediction techniques [72]; evolution of interconnection policies and controversies [73]; risks of Internet partitioning [74]; prefix hijacking [75,76,77]; DDoS attack countermeasures [78,79]; complex network robustness in the face of epidemics [80]; geometric analysis of the Internet topology [81]; complex network theory [82,83]; future Internet architectures; CDN architectures [84]; and a geographic database ("Atlas") of the Internet at the physical layer [85,86]. |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
Added: | ||||||||
> > | need: summary of duration, number of samples, volume of compressed and uncompressed traces, i gues the IMPACT-like nubmers, were we putting these datasets in impact. for all anonymized passive traces.
How about network neutrality measurements? | https://dl.acm.org/citation.cfm?doid=3055535.3040966![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |