Policy-Preferred Paths in AS-level Internet Topology Graphs
Using Autonomous System (AS) level Internet topology maps to determine accurate AS-level paths is essential for network diagnostics, performance optimization, security enforcement, business policy management and topology-aware application development. One significant drawback that we have observed i...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Georgia Southern University
2018-03-01
|
Series: | Theory and Applications of Graphs |
Subjects: | |
Online Access: | https://digitalcommons.georgiasouthern.edu/tag/vol5/iss1/3 |
id |
doaj-9df78da61caf4cf687dfe4244abf23b2 |
---|---|
record_format |
Article |
spelling |
doaj-9df78da61caf4cf687dfe4244abf23b22020-11-25T00:04:00ZengGeorgia Southern UniversityTheory and Applications of Graphs2470-98592018-03-015110.20429/tag.2018.050103Policy-Preferred Paths in AS-level Internet Topology GraphsMehmet TozalUsing Autonomous System (AS) level Internet topology maps to determine accurate AS-level paths is essential for network diagnostics, performance optimization, security enforcement, business policy management and topology-aware application development. One significant drawback that we have observed in many studies is simplifying the AS-level topology map of the Internet to an undirected graph, and then using the hop distance as a means to find the shortest paths between the ASes. A less significant drawback is restricting the shortest paths to only valley-free paths. Both approaches usually inflate the number of paths between ASes; introduce erroneous paths that do not conform to economic policies; and generate symmetric paths, which in reality is not a rule. As a result, the derived conclusions might be greatly misleading. In this study we introduce a single-destination, policy-preferred path enumeration algorithm which discovers policy consistent paths from all ASes to a destination AS in an edge-labeled, finite, directed graph representing the Internet topology. Considering that our algorithm's run time complexity is the same as Dijkstra's shortest paths algorithm, we believe that the proposed algorithm will notably enhance the future works that leverage AS-to-AS paths in Internet topology graphs.https://digitalcommons.georgiasouthern.edu/tag/vol5/iss1/3Internet Topology GraphsAlgorithmsPolicy Consistent Paths |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Mehmet Tozal |
spellingShingle |
Mehmet Tozal Policy-Preferred Paths in AS-level Internet Topology Graphs Theory and Applications of Graphs Internet Topology Graphs Algorithms Policy Consistent Paths |
author_facet |
Mehmet Tozal |
author_sort |
Mehmet Tozal |
title |
Policy-Preferred Paths in AS-level Internet Topology Graphs |
title_short |
Policy-Preferred Paths in AS-level Internet Topology Graphs |
title_full |
Policy-Preferred Paths in AS-level Internet Topology Graphs |
title_fullStr |
Policy-Preferred Paths in AS-level Internet Topology Graphs |
title_full_unstemmed |
Policy-Preferred Paths in AS-level Internet Topology Graphs |
title_sort |
policy-preferred paths in as-level internet topology graphs |
publisher |
Georgia Southern University |
series |
Theory and Applications of Graphs |
issn |
2470-9859 |
publishDate |
2018-03-01 |
description |
Using Autonomous System (AS) level Internet topology maps to determine accurate AS-level paths is essential for network diagnostics, performance optimization, security enforcement, business policy management and topology-aware application development. One significant drawback that we have observed in many studies is simplifying the AS-level topology map of the Internet to an undirected graph, and then using the hop distance as a means to find the shortest paths between the ASes. A less significant drawback is restricting the shortest paths to only valley-free paths. Both approaches usually inflate the number of paths between ASes; introduce erroneous paths that do not conform to economic policies; and generate symmetric paths, which in reality is not a rule. As a result, the derived conclusions might be greatly misleading. In this study we introduce a single-destination, policy-preferred path enumeration algorithm which discovers policy consistent paths from all ASes to a destination AS in an edge-labeled, finite, directed graph representing the Internet topology. Considering that our algorithm's run time complexity is the same as Dijkstra's shortest paths algorithm, we believe that the proposed algorithm will notably enhance the future works that leverage AS-to-AS paths in Internet topology graphs. |
topic |
Internet Topology Graphs Algorithms Policy Consistent Paths |
url |
https://digitalcommons.georgiasouthern.edu/tag/vol5/iss1/3 |
work_keys_str_mv |
AT mehmettozal policypreferredpathsinaslevelinternettopologygraphs |
_version_ |
1725431501850411008 |