+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Internet Measurement. Infrastructure, Traffic and Applications. Edition No. 1

  • ID: 2242195
  • Book
  • May 2006
  • 520 Pages
  • John Wiley and Sons Ltd
This book provides all the ingredients necessary for a full understanding of the increasingly important discipline of Internet Measurement – ranging from its role in the different layers of architecture to the various applications where it plays a critical role. 

This book and its subject help to build foundational knowledge for other areas of internet and computing courses particularly in regard to internet security, whose subject matter depend upon information derived from this source. Students studying courses that look at web applications or P2P file-sharing applications will find this book provides crucial information for their subject areas.

The experience of the authors, who are at the heart of the Internet Measurement community, and the emerging importance of the discipline make this the authoratitive and defining book of the field.

Note: Product cover images may vary from those shown


1. Introduction.

1.1 Why Measure The Internet?

1.2 How to Read This Book.

1.3 Resources for More Information.

2. Internet Architecture.

2.1 The Internet’s Architecture.

2.2 Details of Internet Operation.

2.3 Protocols.

2.4 Applications.

3. Analytic Background.

3.1 Linear Algebra.

3.2 Probability.

3.3 Statistics.

3.4 Graphs.

3.5 Metrics.

3.6 Measurement and Modelling.

4. Practical Issues in Internet Measurement.

4.1 Where Can Measurements Be Made?

4.2 Role of Time in Measurements.


5. Infrastructure.

5.1 Properties.

5.2 Challenges.

5.3 Tools.

5.4 State of the Art.

6. Traffic.

6.1 Properties.

6.2 Challenges.

6.3 Tools.

6.4 State of the Art.

7. Applications.

7.1 Application Mix.

7.2 DNS.

7.3 Web.

7.4 P2P.

7.5 Online Games.

7.6 Other applications.


8 Anonymization.

8.1 Definitions.

8.2 General Motivation for Anonymizing Data.

8.3 Obstacles and Risks in Sharing Data.

8.4 Categorizing Data: What Should be Anonymized?

8.5 Anonymizing Process and Techniques: How data is Anonymized.

8.6 Anonymization Examples at Different Layers.

8.7 Attacks Against Anonymized Data.

8.8 Anonymizing Data: Metrics for Success.

8.9 Alternatives to Anonymization.

9. Security.

9.1 Role of Internet Measurement in Security.

9.2 Intranet Measurements in Aid of Security.

9.3 Gateway Measurements in Aid of Security.

9.4 Inter-domain Measurements Impact on Security.

9.5 Wide-area Measurements in Aid of Security.

9.6 Application-level Measurements of Attacks.

10. Case Studies.

10.1 Low Level Monitoring Tools.

10.2 Individual Toolsets for Network Measurement.

10.3 Large Scale Measurement Projects.

11. Conclusions and Prospects.

11.1 Trends in Internet Measurement.

11.2 Difficulties.

11.3 Future Work.



Note: Product cover images may vary from those shown
Mark Crovella Boston University.

Balachander Krishnamurthy AT&T Labs - Research.
Note: Product cover images may vary from those shown