Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Timur Friedman is active.

Publication


Featured researches published by Timur Friedman.


IEEE Communications Magazine | 2000

The use of end-to-end multicast measurements for characterizing internal network behavior

Andrew K. Adams; Tian Bu; Timur Friedman; Joseph Horowitz; Donald F. Towsley; Ramón Cáceres; Nick G. Duffield; Francesco Lo Presti; Sue B. Moon; Vern Paxson

We present a novel methodology for identifying internal network performance characteristics based on end-to-end multicast measurements. The methodology, solidly grounded on statistical estimation theory, can be used to characterize the internal loss and delay behavior of a network. Measurements on the MBone have been used to validate the approach in the case of losses. Extensive simulation experiments provide further validation of the approach, not only for losses, but also for delays. We also describe our strategy for deploying the methodology on the Internet. This includes the continued development of the National Internet Measurement Infrastructure to support RTP-based end-to-end multicast measurements and the development of software tools to analyze the traces. Once complete, this combined software/hardware infrastructure will provide a service for understanding and forecasting the performance of the Internet.


IEEE Communications Surveys and Tutorials | 2007

Internet topology discovery: a survey

Benoit Donnet; Timur Friedman

Since the beginning of the nineties, the internet has undergone impressive growth. This growth can be appreciated in terms of the equipment, such as routers and links, that has been added, as well as in the numbers of users and the value of commerce that it supports. In parallel to this expansion, over the past decade the networking research community has shown a growing interest in discovering and analyzing the internet topology. Some researchers have developed tools for gathering network topology data while others have tried to understand and model the internet¿s properties. These efforts have brought us to a crucial juncture for toplogy measurement infrastructures: while, previously, these were both small (in terms of number of measurement points) and monolithic, we are starting to see the deployment of large-scale distributed systems composed of hundreds or thousands of monitors. As we look forward to this next generation of systems, we take stock of what has been achieved so far. In this survey, we discuss past and current mechanisms for discovering the internet topology at various levels: the IP interface, the router, the AS, and the PoP level. In addition to discovery techniques, we provide insights into some of the wellknown properties of the internet topology.


measurement and modeling of computer systems | 2005

Efficient algorithms for large-scale topology discovery

Benoit Donnet; Philippe Raoult; Timur Friedman; Mark Crovella

There is a growing interest in discovery of internet topology at the interface level. A new generation of highly distributed measurement systems is currently being deployed. Unfortunately, the research community has not examined the problem of how to perform such measurements efficiently and in a network-friendly manner. In this paper we make two contributions toward that end. First, we show that standard topology discovery methods (e.g., skitter) are quite inefficient, repeatedly probing the same interfaces. This is a concern, because when scaled up, such methods will generate so much traffic that they will begin to resemble DDoS attacks. We measure two kinds of redundancy in probing (intra- and inter-monitor) and show that both kinds are important. We show that straightforward approaches to addressing these two kinds of redundancy must take opposite tacks, and are thus fundamentally in conflict. Our second contribution is to propose and evaluate Doubletree, an algorithm that reduces both types of redundancy simultaneously on routers and end systems. The key ideas are to exploit the tree-like structure of routes to and from a single point in order to guide when to stop probing, and to probe each path by starting near its midpoint. Our results show that Doubletree can reduce both types of measurement load on the network dramatically, while permitting discovery of nearly the same set of nodes and links.


IEEE Journal on Selected Areas in Communications | 2008

Fixed point opportunistic routing in delay tolerant networks

Vania Conan; Jeremie Leguay; Timur Friedman

We propose in this work a single copy and multi-hop opportunistic routing scheme for sparse delay tolerant networks (DTNs). The scheme uses as only input the estimates of the average inter-contact times between the nodes in the network. Defined as the fixed point of a recursive process, it aims at minimizing delivery time in case of independent exponential pairwise inter-contacts. The two properties of loop-free forwarding and polynomial convergence make the scheme workable for routing in DTNs. The routing performances of the scheme are evaluated on three publicly available reference data sets. Comparisons with well known single-copy schemes, including MED and the two hop relay strategy, consistently demonstrate improvements for both delivery ratio and delay.


IEEE Journal on Selected Areas in Communications | 2006

Deployment of an Algorithm for Large-Scale Topology Discovery

Benoit Donnet; Philippe Raoult; Timur Friedman; Mark Crovella

Topology discovery systems are starting to be introduced in the form of easily and widely deployed software. Unfortunately, the research community has not examined the problem of how to perform such measurements efficiently and in a network-friendly manner. This paper describes several contributions towards that end. These were first presented in the proceedings of ACM Sigmetrics 2005. We show that standard topology discovery methods (e.g., skitter) are quite inefficient, repeatedly probing the same interfaces. This is a concern, because when scaled up, such methods will generate so much traffic that they will begin to resemble distributed denial-of-service attacks. We propose two metrics focusing on redundancy in probing and show that both are important. We also propose and evaluate Doubletree, an algorithm that strongly reduces redundancy, while maintaining nearly the same level of node and link coverage. The key ideas are to exploit the tree-like structure of routes to and from a single point in order to guide when to stop probing, and to probe each path by starting near its midpoint. Following the Sigmetrics work, we implemented Doubletree, and deployed it in a real-network environment. This paper describes that implementation, as well as preliminary favorable results


conference on emerging network experiment and technology | 2006

Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives

Benoit Donnet; Bruno Baynat; Timur Friedman

Where distributed agents must share voluminous set membership information, Bloom filters provide a compact, though lossy, way for them to do so. Numerous recent networking papers have examined the trade-offs between the bandwidth consumed by the transmission of Bloom filters, and the error rate, which takes the form of false positives, and which rises the more the filters are compressed. In this paper, we introduce the retouched Bloom filter (RBF), an extension that makes the Bloom filter more flexible by permitting the removal of selected false positives at the expense of generating random false negatives. We analytically show that RBFs created through a random process maintain an overall error rate, expressed as a combination of the false positive rate and the false negative rate, that is equal to the false positive rate of the corresponding Bloom filters. We further provide some simple heuristics that decrease the false positive rate more than than the corresponding increase in the false negative rate, when creating RBFs. Finally, we demonstrate the advantages of an RBF over a Bloom filter in a distributed network topology measurement application, where information about large stop sets must be shared among route tracing monitors.


IEEE ACM Transactions on Networking | 2011

Measuring multipath routing in the internet

Brice Augustin; Timur Friedman; Renata Teixeira

Tools to measure Internet properties usually assume the existence of just one single path from a source to a destination. However, load-balancing capabilities, which create multiple active paths between two end-hosts, are available in most contemporary routers. This paper extends Paris trace route and proposes an extensive characterization of multipath routing in the Internet. We use Paris traceroute from RON and PlanetLab nodes to collect various datasets in 2007 and 2009. Our results show that the traditional concept of a single network path between hosts no longer holds. For instance, 39% of the source-destination pairs in our 2007 traces traverse a load balancer. This fraction increases to 72% if we consider the paths between a source and a destination network. In 2009, we notice a consolidation of per-flow and per-destination techniques and confirm that per-packet load balancing is rare.


passive and active network measurement | 2005

Improved algorithms for network topology discovery

Benoit Donnet; Timur Friedman; Mark Crovella

Topology discovery systems are starting to be introduced in the form of easily and widely deployed software. However, little consideration has been given as to how to perform large-scale topology discovery efficiently and in a network-friendly manner. In prior work, we have described how large numbers of traceroute monitors can coordinate their efforts to map the network while reducing their impact on routers and end-systems. The key is for them to share information regarding the paths they have explored. However, such sharing introduces considerable communication overhead. Here, we show how to improve the communication scaling properties through the use of Bloom filters to encode a probing stop set. Also, any system in which every monitor traces routes towards every destination has inherent scaling problems. We propose capping the number of monitors per destination, and dividing the monitors into clusters, each cluster focusing on a different destination list.


wireless and optical communications networks | 2005

GPS-free-free positioning system for wireless sensor networks

Farid Benbadis; Timur Friedman; M.D. de Amorim; Serge Fdida

Positioning systems are important components of many communication architectures. The traditional global positioning system (GPS) is impractical in many situations, which makes the need for relative measurement-based approaches. Existing relative solutions lead to good results but generally require that nodes are embedded with specific capabilities. in this paper, we propose GPS-free-free, a simple positioning system based on distances in number of hops between nodes. GPS-free-free make very loose assumptions (only neighborhood discovery) and does not require the computation of complex algorithms. We show through simulations that GPS-free-free leads to good placement results at very low signaling over-head.


acm special interest group on data communication | 2006

Community-oriented network measurement infrastructure (CONMI) workshop report

Kimberly C. Claffy; Mark Crovella; Timur Friedman; Colleen Shannon; Neil Spring

This report summarizes issues discussed at the first CONMI workshop held on 30 March 2005 in Boston, Massachusetts. Sponsored by the National Science Foundations Office of Cyberinfrastructure (OCI-0532233), the workshop was intended to begin a discussion regarding the viability and utility of a community-oriented network measurement infrastructure. This report was published 20 December 2005 online at: http://www.caida.org/workshops/conmi/.

Collaboration


Dive into the Timur Friedman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Donald F. Towsley

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Joseph Horowitz

University of Massachusetts Amherst

View shared research outputs
Researchain Logo
Decentralizing Knowledge