{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T07:18:39Z","timestamp":1776064719377,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2105393,CNS-1901517,OAC-1724853"],"award-info":[{"award-number":["CNS-2105393,CNS-1901517,OAC-1724853"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["CA HR00112020014"],"award-info":[{"award-number":["CA HR00112020014"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1145\/3487552.3487812","type":"proceedings-article","created":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T17:35:11Z","timestamp":1635788111000},"page":"720-738","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Inferring regional access network topologies"],"prefix":"10.1145","author":[{"given":"Zesen","family":"Zhang","sequence":"first","affiliation":[{"name":"UC San Diego"}]},{"given":"Alexander","family":"Marder","sequence":"additional","affiliation":[{"name":"CAIDA, UC San Diego"}]},{"given":"Ricky","family":"Mok","sequence":"additional","affiliation":[{"name":"CAIDA, UC San Diego"}]},{"given":"Bradley","family":"Huffaker","sequence":"additional","affiliation":[{"name":"CAIDA, UC San Diego"}]},{"given":"Matthew","family":"Luckie","sequence":"additional","affiliation":[{"name":"University of Waikato"}]},{"given":"K C","family":"Claffy","sequence":"additional","affiliation":[{"name":"CAIDA, UC San Diego"}]},{"given":"Aaron","family":"Schulman","sequence":"additional","affiliation":[{"name":"UC San Diego"}]}],"member":"320","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Netacuity. https:\/\/www.digitalelement.com\/solutions\/."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Netalyzr. https:\/\/play.google.com\/store\/apps\/details?id=edu.berkeley.icsi.netalyzr.android&hl=en_US."},{"key":"e_1_3_2_1_3_1","unstructured":"2019. RIPE Atlas. https:\/\/atlas.ripe.net\/landing\/measurements-and-tools\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. OpenCelliD. https:\/\/www.opencellid.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"ATT. 2008. West CA Tandem and subtending end offices. https:\/\/tinyurl.com\/7pyywwp7."},{"key":"e_1_3_2_1_6_1","unstructured":"AT&T. 2014. DRAFT AT&T Iperf Mobile Application User Guide. https:\/\/pdfslide.net\/documents\/draft-att-iperf-mobile-application-user-guide-aka-iperf-commands-205pdf.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3155055.3155059"},{"key":"e_1_3_2_1_8_1","volume-title":"Bustamante","author":"Bischof Zachary S.","year":"2011","unstructured":"Zachary S. Bischof, John S. Otto, Mario A. S\u00e1nchez, John P. Rula, David R. Choffnes, and Fabi\u00e1n E. Bustamante. 2011. Crowdsourcing ISP characterization to the network edge. In Proc. ACM SIGCOMM."},{"key":"e_1_3_2_1_9_1","volume-title":"Gregory Laughlin, Bruce M. Maggs, and Ankit Singla.","author":"Bozkurt Ilker Nadi","year":"2018","unstructured":"Ilker Nadi Bozkurt, Waqar Aqeel, Debopam Bhattacherjee, Balakrishnan Chandrasekaran, Philip Brighten Godfrey, Gregory Laughlin, Bruce M. Maggs, and Ankit Singla. 2018. Dissecting Latency in the Internet's Fiber Infrastructure."},{"key":"e_1_3_2_1_10_1","unstructured":"CAIDA. [n.d.]. Archipelago. https:\/\/www.caida.org\/projects\/ark\/."},{"key":"e_1_3_2_1_11_1","unstructured":"CAIDA. [n.d.]. AS-relationships. https:\/\/publicdata.caida.org\/datasets\/as-relationships\/."},{"key":"e_1_3_2_1_12_1","unstructured":"CAIDA. [n.d.]. DNS Decoded (DDec). http:\/\/ddec.caida.org."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398805"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500447"},{"key":"e_1_3_2_1_15_1","unstructured":"Cisco. 2011. LTE Design and Deployment Strategies. https:\/\/www.cisco.com\/c\/dam\/global\/en_ae\/assets\/expo2011\/saudiarabia\/pdfs\/lte-design-and-deployment-strategies-zeljko-savic.pdf."},{"key":"e_1_3_2_1_16_1","unstructured":"Crown Infrastructure Partners. 2021. Ultra fast broadband. https:\/\/www.crowninfrastructure.govt.nz\/ufb\/what\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Mike Dano. 2019. An Inside Look at Verizon's Edge Computing Capabilities. https:\/\/www.lightreading.com\/the-edge\/an-inside-look-at-verizons-edge-computing-capabilities."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298313"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Dittrich David and Kenneally Erin and Bailey Michael. 2013. Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report. http:\/\/ssrn.com\/abstract=2342036.","DOI":"10.2139\/ssrn.2342036"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of International Teletraffic Congress.","author":"Dong Wei","year":"2011","unstructured":"Wei Dong, Zihui Ge, and Seungjoon Lee. 2011. 3G meets the Internet: Understanding the performance of hierarchical routing in 3G networks. In Proceedings of International Teletraffic Congress."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787499"},{"key":"e_1_3_2_1_22_1","volume-title":"Ragland","author":"Ehsan Navid","year":"2003","unstructured":"Navid Ehsan, Mingyan Liu, and Roderick J. Ragland. 2003. Evaluation of performance enhancing proxies in internet over satellite. International Journal of Communication Systems 16 (May 2003)."},{"key":"e_1_3_2_1_23_1","unstructured":"FCC. 2020. June 15 2020 T-Mobile Network Outage Report."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423648"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987483"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832534"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ONDM.2008.4578398"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2967360.2967369"},{"key":"e_1_3_2_1_29_1","first-page":"6","article-title":"DRoP:DNS-based Router Positioning","volume":"44","author":"Huffaker B.","year":"2014","unstructured":"B. Huffaker, M. Fomenkov, and k. claffy. 2014. DRoP:DNS-based Router Positioning. ACM Computer Communication Review (CCR) 44 (2014), 6--13.","journal-title":"ACM Computer Communication Review (CCR)"},{"key":"e_1_3_2_1_30_1","unstructured":"Cisco Systems Inc. 2000. Introduction to DWDM Technology. https:\/\/www.cisco.com\/c\/dam\/global\/de_at\/assets\/docs\/dwdm.pdf."},{"key":"e_1_3_2_1_31_1","unstructured":"Tive Inc. 2019. Tive Releases Return-By-Mail Supply Chain Tracker. https:\/\/blog.tive.co\/tive-releases-return-by-mail-supply-chain-tracker."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Kenneally Erin and Dittrich David. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. http:\/\/ssrn.com\/abstract=2445102.","DOI":"10.2139\/ssrn.2445102"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2198887"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"e_1_3_2_1_35_1","volume-title":"Netalyzr. In Proc. ACM Internet Measurement Conference (IMC).","author":"Kreibich Christian","year":"2010","unstructured":"Christian Kreibich, Nicholas Weaver, Boris Nechaev, and Vern Paxson. 2010. Netalyzr. In Proc. ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699345"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879171"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355589"},{"key":"e_1_3_2_1_39_1","unstructured":"M-Lab. [n.d.]. BigQuery QuickStart. https:\/\/www.measurementlab.net\/data\/docs\/bq\/quickstart\/."},{"key":"e_1_3_2_1_40_1","volume-title":"When mobile terminals meet the cloud: computation offloading as the bridge","author":"Ma Xiaoqiang","year":"2013","unstructured":"Xiaoqiang Ma, Yuan Zhao, Lei Zhang, Haiyang Wang, and Limei Peng. 2013. When mobile terminals meet the cloud: computation offloading as the bridge. IEEE Network (2013), 28--33."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637237"},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. IEEE Traffic Measurement and Analysis Conference (TMA).","author":"Mani Sathiya Kumaran","year":"2020","unstructured":"Sathiya Kumaran Mani, Matthew Nance Hall, Ramakrishnan Durairajan, and Paul Barford. 2020. Characteristics of Metro Fiber Deployments in the US. In Proc. IEEE Traffic Measurement and Analysis Conference (TMA)."},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. ACM Internet Measurement Conference (IMC).","author":"Mao Yun","unstructured":"Yun Mao, Hani Jamjoom, Shu Tao, and Jonathan M. Smith. 2007. NetworkMD: Topology Inference and Failure Diagnosis in the Last Mile. In Proc. ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Nitinder Mohan Lorenzo Corneo Aleksandr Zavodovski Suzan Bayhan Walter Wong and Jussi Kangasharju. 2020. Pruning Edge Research with Latency Shears. 182--189.","DOI":"10.1145\/3422604.3425943"},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. ACM SIGCOMM.","author":"Spring N.","unstructured":"N. Spring and R. Mahajan and D. Wetherall. 2002. Measuring ISP topologies with Rocketfuel. In Proc. ACM SIGCOMM."},{"key":"e_1_3_2_1_46_1","unstructured":"NBN Co. 2021. NBN Multi Technology Mix. https:\/\/www.nbnco.com.au\/learn\/network-technology."},{"key":"e_1_3_2_1_47_1","unstructured":"GSMA Future Network. 2019. Cloud AR\/VR Whitepaper. https:\/\/www.gsma.com\/futurenetworks\/wiki\/cloud-ar-vr-whitepaper\/"},{"key":"e_1_3_2_1_48_1","unstructured":"Juniper Networks. 2016. Metro Ethernet Design Guide. https:\/\/www.juniper.net\/documentation\/en_US\/release-independent\/solutions\/information-products\/pathway-pages\/solutions\/metro-ethernet-dg.pdf."},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. ACM Conference on Mobile Systems, Applications, and Services (MobiSys).","author":"Nikravesh Ashkan","unstructured":"Ashkan Nikravesh, Hongyi Yao, Shichang Xu, David Choffnes, and Z. Morley Mao. 2015. Mobilyzer: An Open Platform for Controllable Mobile Network Measurements. In Proc. ACM Conference on Mobile Systems, Applications, and Services (MobiSys)."},{"key":"e_1_3_2_1_50_1","unstructured":"US Department of Transportation. [n.d.]. 49 CFR &sect;172.185 - Lithium cells and batteries. https:\/\/www.law.cornell.edu\/cfr\/text\/49\/173.185."},{"key":"e_1_3_2_1_51_1","unstructured":"Ookla. [n.d.]. Speedtest. http:\/\/www.speedtest.net."},{"key":"e_1_3_2_1_52_1","volume-title":"Democratizing the Network Edge. ACM Computer Communication Review (CCR)","author":"Peterson Larry","year":"2019","unstructured":"Larry Peterson, Tom Anderson, Sachin Katti, Nick McKeown, Guru Parulkar, Jennifer Rexford, Mahadev Satyanarayanan, Oguz Sunay, and Amin Vahdat. 2019. Democratizing the Network Edge. ACM Computer Communication Review (CCR) (2019)."},{"key":"e_1_3_2_1_53_1","unstructured":"Rapid7 Labs. 2021. Reverse DNS (RDNS). https:\/\/opendata.rapid7.com\/sonar.rdns_v2\/."},{"key":"e_1_3_2_1_54_1","volume-title":"Proc. of the ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data.","author":"Rula John P.","unstructured":"John P. Rula, Zachary S. Bischof, and Fabian E. Bustamante. 2015. Second Chance: Understanding Diversity in Broadband Access Network Performance. In Proc. of the ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663734"},{"key":"e_1_3_2_1_56_1","unstructured":"Samsung. 2021. Keep your Galaxy device at its normal operating temperature. https:\/\/www.samsung.com\/us\/support\/answer\/ANS00076952\/"},{"key":"e_1_3_2_1_57_1","volume-title":"Proc. Symposium on Networked Systems Design and Implementation (NSDI).","author":"S\u00e1nchez Mario A.","unstructured":"Mario A. S\u00e1nchez, John S. Otto, Zachary S. Bischof, and David R. Choffnes. 2013. Dasu: Pushing Experiments to the Internet's Edge. In Proc. Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"e_1_3_2_1_60_1","unstructured":"Southwestern Bell Company (SBC). 2005. Rates and Tariffs Quote Sheet---OC3c Purchased Under the OC-n Point to Point Service Offering. https:\/\/tinyurl.com\/uwh3puzj."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30505-9_7"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068819"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402993"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863970"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366316.2366337"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Srikanth Sundaresan Nick Feamster and Renata Teixeira. 2016. Home network or access link? Locating last-mile downstream throughput bottlenecks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9631 (2016) 111--123.","DOI":"10.1007\/978-3-319-30505-9_9"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018452"},{"key":"e_1_3_2_1_68_1","volume-title":"Proc. ACM Internet Measurement Conference (IMC).","author":"Teixeira Renata","unstructured":"Renata Teixeira, Keith Marzullo, Stefan Savage, and Geoffrey M. Voelker. 2003. In Search of Path Diversity in ISP Networks. In Proc. ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.271"},{"key":"e_1_3_2_1_70_1","volume-title":"Case Study: Ethernet Cell Site Backhaul Request for Quotation Process.","author":"Tran Hoang","year":"2012","unstructured":"Hoang Tran. 2012. Case Study: Ethernet Cell Site Backhaul Request for Quotation Process."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.11601\/ijates.v4i2.109"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815687"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131378"},{"key":"e_1_3_2_1_74_1","unstructured":"Chris Whitaker. 2011. The Comcast Enterprise Network Story. https:\/\/www.slideshare.net\/cwhita002\/the-comcast-enterprise-network-story."},{"key":"e_1_3_2_1_75_1","first-page":"586","article-title":"Mathematics and the Internet: A Source of Enormous Confusion and Great Potential","volume":"56","author":"Willinger Walter","year":"2009","unstructured":"Walter Willinger, David Alderson, and John C. Doyle. 2009. Mathematics and the Internet: A Source of Enormous Confusion and Great Potential. Notices of the American Mathematical Society 56 (2009), 586--599.","journal-title":"Notices of the American Mathematical Society"},{"key":"e_1_3_2_1_76_1","volume-title":"Proceedings of USENIX ATC.","author":"Wu Daoyuan","year":"2017","unstructured":"Daoyuan Wu, Rocky Chang, Weichao Li, Eric Cheng, and Debin Gao. 2017. MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance. In Proceedings of USENIX ATC."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790118"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081367"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993744.1993777"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Hyo-Sik Yang M. Herzog M. Maier and M. Reisslein. 2004. Metro WDM networks: performance comparison of slotted ring and AWG star networks. IEEE Journal on Selected Areas in Communications (2004).","DOI":"10.1109\/JSAC.2004.830448"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_3"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329039"}],"event":{"name":"IMC '21: ACM Internet Measurement Conference","location":"Virtual Event","acronym":"IMC '21","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 21st ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487812","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3487552.3487812","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487812","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:24:27Z","timestamp":1765819467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487812"}},"subtitle":["methods and applications"],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":82,"alternative-id":["10.1145\/3487552.3487812","10.1145\/3487552"],"URL":"https:\/\/doi.org\/10.1145\/3487552.3487812","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]},"assertion":[{"value":"2021-11-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}