{"id":"https://openalex.org/W2177221341","doi":"https://doi.org/10.1007/978-3-319-20034-7_12","title":"How Asymmetric Is the Internet?","display_name":"How Asymmetric Is the Internet?","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2177221341","doi":"https://doi.org/10.1007/978-3-319-20034-7_12","mag":"2177221341"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-20034-7_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-20034-7_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/5296059/paper2.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101068056","display_name":"Wouter de Vries","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Wouter de Vries","raw_affiliation_strings":["Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044310143","display_name":"Jos\u00e9 Jair Santanna","orcid":"https://orcid.org/0000-0002-8361-6729"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jos\u00e9 Jair Santanna","raw_affiliation_strings":["Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025537461","display_name":"Anna Sperotto","orcid":"https://orcid.org/0000-0002-9481-5846"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Anna Sperotto","raw_affiliation_strings":["Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067140003","display_name":"Aiko Pras","orcid":"https://orcid.org/0000-0002-5091-8608"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Aiko Pras","raw_affiliation_strings":["Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101068056"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.8838,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.89790007,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"113","last_page":"125"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traceroute","display_name":"traceroute","score":0.8935606479644775},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7831037044525146},{"id":"https://openalex.org/keywords/asymmetry","display_name":"Asymmetry","score":0.7624446153640747},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.6886285543441772},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6713013648986816},{"id":"https://openalex.org/keywords/equal-cost-multi-path-routing","display_name":"Equal-cost multi-path routing","score":0.5760979056358337},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5724347829818726},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5297604203224182},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5253143906593323},{"id":"https://openalex.org/keywords/internet-topology","display_name":"Internet topology","score":0.48506155610084534},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45031192898750305},{"id":"https://openalex.org/keywords/static-routing","display_name":"Static routing","score":0.3516528010368347},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.2909039556980133},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1273115873336792},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08880794048309326}],"concepts":[{"id":"https://openalex.org/C157497606","wikidata":"https://www.wikidata.org/wiki/Q603227","display_name":"traceroute","level":3,"score":0.8935606479644775},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7831037044525146},{"id":"https://openalex.org/C38976095","wikidata":"https://www.wikidata.org/wiki/Q752641","display_name":"Asymmetry","level":2,"score":0.7624446153640747},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.6886285543441772},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6713013648986816},{"id":"https://openalex.org/C115443555","wikidata":"https://www.wikidata.org/wiki/Q5367790","display_name":"Equal-cost multi-path routing","level":5,"score":0.5760979056358337},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5724347829818726},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5297604203224182},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5253143906593323},{"id":"https://openalex.org/C99237066","wikidata":"https://www.wikidata.org/wiki/Q17092610","display_name":"Internet topology","level":3,"score":0.48506155610084534},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45031192898750305},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.3516528010368347},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.2909039556980133},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1273115873336792},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08880794048309326},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-319-20034-7_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-20034-7_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:publications/3fa7cef5-27a1-490f-a5ce-80a1dd56d571","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/3fa7cef5-27a1-490f-a5ce-80a1dd56d571","pdf_url":"https://ris.utwente.nl/ws/files/5296059/paper2.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"de Vries, W B, Cardoso de Santanna, J J, Sperotto, A & Pras, A 2015, How asymmetric is the Internet? A Study to Support the use of Traceroute. in S Latr\u00e9, M Charalambides, J Fran\u00e7ois, C Schmitt & B Stiller (eds), Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Lecture Notes in Computer Science, vol. 9122, Springer, Switzerland, pp. 113-125, 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, 22/06/15. https://doi.org/10.1007/978-3-319-20034-7_12","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:HAL:hal-01410157v1","is_oa":true,"landing_page_url":"https://hal.science/hal-01410157","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.113-125, &#x27E8;10.1007/978-3-319-20034-7_12&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:publications/3fa7cef5-27a1-490f-a5ce-80a1dd56d571","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/3fa7cef5-27a1-490f-a5ce-80a1dd56d571","pdf_url":"https://ris.utwente.nl/ws/files/5296059/paper2.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"de Vries, W B, Cardoso de Santanna, J J, Sperotto, A & Pras, A 2015, How asymmetric is the Internet? A Study to Support the use of Traceroute. in S Latr\u00e9, M Charalambides, J Fran\u00e7ois, C Schmitt & B Stiller (eds), Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Lecture Notes in Computer Science, vol. 9122, Springer, Switzerland, pp. 113-125, 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, 22/06/15. https://doi.org/10.1007/978-3-319-20034-7_12","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6864424335","display_name":null,"funder_award_id":"318488","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G765451370","display_name":null,"funder_award_id":"ICT-318488","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2177221341.pdf","grobid_xml":"https://content.openalex.org/works/W2177221341.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W205175404","https://openalex.org/W1647671624","https://openalex.org/W1867219652","https://openalex.org/W2024750700","https://openalex.org/W2066792529","https://openalex.org/W2111100601","https://openalex.org/W2125513999","https://openalex.org/W2138194734","https://openalex.org/W2141487810","https://openalex.org/W2171061056","https://openalex.org/W2911611915","https://openalex.org/W4214671568"],"related_works":["https://openalex.org/W2117825463","https://openalex.org/W20881979","https://openalex.org/W2015754215","https://openalex.org/W752371801","https://openalex.org/W1593324136","https://openalex.org/W2120754938","https://openalex.org/W2160211684","https://openalex.org/W2124849736","https://openalex.org/W2100312336","https://openalex.org/W2121738337"],"abstract_inverted_index":{"A":[0],"network":[1,17,80],"path":[2,5,18,49,60,81],"is":[3,33,99,105,112,132],"a":[4,7,20,51,101,149],"that":[6,19,78,96],"packet":[8],"takes":[9],"to":[10,23,46,64,72,133,148],"reach":[11,24],"its":[12],"target.":[13],"However,":[14],"determining":[15],"the":[16,28,31,44,48,54,59,62,65,68,79],"host":[21],"uses":[22],"it\u2019s":[25],"target":[26,52,63],"from":[27,61],"viewpoint":[29],"of":[30,129,152],"latter":[32],"less":[34],"trivial":[35],"than":[36],"it":[37],"appears.":[38],"Tools":[39],"such":[40],"as":[41],"Traceroute":[42],"allow":[43],"user":[45],"determine":[47],"towards":[50],"(i.e.":[53,67],"forward":[55],"path),":[56],"but":[57],"not":[58],"source":[66],"reverse":[69],"path)":[70],"due":[71],"routing":[73,110,165],"asymmetry.":[74,166],"Routing":[75],"asymmetry":[76,98,111,138],"means":[77],"between":[82],"two":[83],"hosts":[84],"may":[85],"be":[86],"different":[87],"in":[88,114,160],"opposite":[89],"directions.":[90],"Although":[91],"previous":[92],"studies":[93],"have":[94],"shown":[95],"this":[97,108,130],"widespread,":[100],"more":[102],"detailed":[103],"characterization":[104],"lacking.":[106],"In":[107],"paper":[109,131],"investigated":[113],"depth":[115],"using":[116],"large":[117,142],"scale":[118,143],"measurements":[119],"with":[120],"4.000":[121],"probes":[122],"distributed":[123],"world":[124],"wide.":[125],"The":[126],"main":[127],"goal":[128],"provide":[134],"characteristics":[135],"about":[136,164],"Internet":[137,153],"based":[139],"on":[140],"recent":[141],"measurements.":[144],"Our":[145],"findings":[146],"contribute":[147],"conclusive":[150],"overview":[151],"asymmetry,":[154],"which":[155],"assist":[156],"researchers":[157],"and":[158],"engineers":[159],"making":[161],"valid":[162],"assumptions":[163]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2016-06-24T00:00:00"}
