Network Architectures and Services NET 2013 - 02 - 1 Proceedings of the Seminars Future Internet ( FI ) and Innovative Internet Technologies and Mobile
نویسندگان
چکیده
This paper is about the measurement of Internet outages with a focus on the Border Gateway Protocol, as one of the most common routing protocols. First some background information about the protocol and its tasks are described, followed by a concrete example of last year’s events in Egypt. Thereafter a self-made analysis regarding the earthquake in New Zealand in 2011 is presented. Finally a conclusion about Internet outages and their monitoring with data collected by the Border Gateway Protocol is given. The conclusion also includes a short passage about recent papers and methods involving Internet outage monitoring in current academic research with a focus on the role of BGP within those.
منابع مشابه
Network Architectures and Services Net 2010-08-2 Proceedings of the Seminars Future Internet (fi) and Innovative Internet Technologies and Mobile Communications (iitm) Summer Semester 2010 Proceedings Zu Den Seminaren Future Internet (fi) Und Innovative Internet-technologien Und Mobilkommunikation (iitm) Cataloging-in-publication Data
Bigtable is a storage system for structured or semi-structured data [1]. Bigtable can be regarded as a distributed, non-relational Database from a system point of view (Bigtable is using a different data model than relational Databases). Bigtable scales to large data sets and provides a good performance of accessing the data. As of January 2008, there are more than sixty Google applications usi...
متن کاملNetwork Architectures and Services Net 2010-02-01 Proceedings of the Seminar Innovative Internet Technologies and Mobile Communication (iitm) Proceedings of the Seminar Innovative Internet Technologies and Mobile Communication (iitm) Cataloging-in-publication Data
A Wireless Sensor Network (WSN) is a tool with many applications. Because of its characteristic structure and hardware composition, it is much more difficult to ensure authentication, integrity and confidentiality in WSNs. Several algorithms have been proposed to fulfill these requirements. However, securing each OSI layer individually leads to inefficiencies in the operation of the network and...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملAnalysis and Development of Technology Acceptance Model in Mobile Bank Field
Internet-based banking (Internet bank) has limitations such as access to the Internet Network and PC (Personal Computer) in addition to providing bank services at any time and easily to customers. The provision of mobile phone services with the title of Mobile Bank was introduced to eliminate these restrictions and limitations. Due to the importance of technology adoption by users, in this rese...
متن کاملConstraints to Effective Use of Information Communication Technologies (ICTs) among Small-scale Farmers in Anambra State, Nigeria
The study was carried out in Anambra State, Nigeria. Questionnaire was used to collect data from a sample of one hundred and eight (108) small-scale farmers. Percentage, mean score, standard deviation and factor analysis were used for data analysis. The duration of the study was June 2009 and March, 2010. Results of the study indicated that the major constraints to effective use of ICTs by smal...
متن کامل