Analysis of topology impact in efficiency and vulnerability in global area networks
The article continues to research the ways of exploring wide segments of the Internet based on the routing tables of its participants. Provided calculation for such network parameters as degree distribution, average geodesic path, the global effectiveness and vulnerability. This review shows a technique for modeling topological changes of a certain segment of the Internet and compare the network parameters before and after the change. Empirical evidence suggests that the sensitivity of the network to the removal of a particular node does not depend on the number of links of this node.
Craig Hunt. TCP/IP Network Administration, 3rd Edition // O'Reilly Media, 2002. - 752 стор.
T. Bates, E. Gerich etc. Representation of IP Routing Policies in a Routing Registry (ripe-181). - 1994. -ftp://ftp.ripe.net/ripe/docs/ripe-181.txt
Y. Rekhter, P. Gross. RFC 1772. Application of the Border Gateway Protocol in the Internet. – http://tools.ietf.org/html/rfc1772.
M.E.J. Newman. The structure and function of complex networks // SIAM Review. - 2003. - Vol. 45. pp. 167–256.
Ю. Головач , К. фон Фербер, О. Олємськой, Т. Головач, О. Мриглод, I. Олємской, В. Пальчиков. Складнi мережi // Журнал фiзичних дослiджень, 2006. –Т. 10. - С. 247–291.
Faloutsos M., Faloutsos P., & Faloutsos C. On Power Law Relationships of the Internet Topology // Comput. Commun. Rev. 29, (1999) 251-263.
A.-L. Barabasi, E. Bonabeau. Scale-Free Networks // Scientific American. – May 2003.- pages 50-59. Ланде Д.В.,
D.J. Watts, S.H. Strogatz. Collective dynamics of “small-world” networks. // Nature. - 1998. - Vol. 393. pp. 440-442.
V.Latora, M.Marchiori // Efficient behavior of small-world networks. Physical Review Letters, vol. 87, no. 19, 5 Nov 2001.
Зубок В. Ю., Фурашев В.Н. Исследование сетевых параметров украинского сегмента Интернет. // Открытые информационные и компьютерные технологии: Сб. науч. трудов. Вып. 40. – Харьков: Нац. аэрокосм. ун-т „ХАИ”: 2008.
How to Cite
Copyright (c) 2020 Collection "Information technology and security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).