Mapping the Internet

Size: px
Start display at page:

Download "Mapping the Internet"

Transcription

1 Mapping the Internet Seminar Communication Systems Spring Semester 2013 Department of Informatics, University of Zurich Tobias Klauser Zurich, 30 May 2013 T. Klauser Mapping the Internet Zurich, 30 May / 34

2 Contents 1 Introduction 2 Techniques and Algorithms 3 Internet Mapping Projects 4 Data Quality and Completeness 5 Questions 6 Discussion T. Klauser Mapping the Internet Zurich, 30 May / 34

3 Introduction Historic map of Oerlikon around 1850 (GIS-ZH, Maps are an important tool to comprehend aspects of the real world Overview of abstract structures, not directly visible to the eye T. Klauser Mapping the Internet Zurich, 30 May / 34

4 1. Humans created maps for ages, example: map of Oerlikon around Maps are always abstractions, leaving out certain details 3. Internet too large to be comprehended at once, no traditional mapping possible 4. Like the real world, structure is rapidly and constantly changing

5 Motivation Detection of congestion, sources of delay, outages, censorship Routing stability, optimality, adaptability, and fault tolerance Correlation of mapping data with additional data (e.g. meteorological) Implementation of topology-aware algorithms Academic research in network theory T. Klauser Mapping the Internet Zurich, 30 May / 34

6 1. Might help ISP in provisioning of infrastructure 2. Internet policy, regulations, and planning (even though no central control but certain agencies overlooking certain aspects) 3. Linking events from the real world to the virtual realm. 4. Performance improvements based on gained insights, detection of bottlenecks 5. Algorithms and concepts from network theory might help to gain a deeper understanding of the Internet s structure and growth and networks in general (e.g. social networks). 6. Mapping as art (examples later on)

7 Techniques and Algorithms Goal: Map the topology of the Internet, path by path Usually active measurements Sending of hop-limited packets (traceroute), interpret responses Annotation of connectivity graph with additional data (e.g. geographical) T. Klauser Mapping the Internet Zurich, 30 May / 34

8 1. No central instance which can be queried for the data, thus active measurement is needed 2. Topology usually at the network/internet protocol layer. 3. Additional data: e.g. geographical or other real world/real time data 4. GeoIP, but not available in same accuracy for all infrastructure (especially routing infrastructure), tricks might need to be used. 5. Annotation optional, but maps usually not of much use without additional data. 6. Nowadays Web services (e.g. Google Maps) allow to create a variety of overlay maps

9 Traceroute start A X Y B Request packet: Dest = B Src = A TTL = 1 Echo req. T. Klauser Mapping the Internet Zurich, 30 May / 34

10 1. Example: Traceroute probe from host A towards host B 2. Simple, abstract example. Intermediate routers possibly have many more interfaces and lateral connections. 3. ICMP Packet only shows important fields: Source and Destination address, TTL, ICMP message 4. Example shown with ICMP echo requests (ping), there are variants with UDP packets to obscure ports 5. Maximum TTL needs to be specified (usually 64 or 128) 6. Same working principle for IPv4 and IPv6

11 Traceroute TTL=1 A X Y B Request packet: Dest = B Src = A TTL = 1 Echo req. Reply packet: Dest = A Src = X TTL = max Time exc. Reported path: Hop 1: X T. Klauser Mapping the Internet Zurich, 30 May / 34

12 Traceroute TTL=2 A X Y B Request packet: Dest = B Src = A TTL = 2 Echo req. Reply packet: Dest = A Src = Y TTL = max Time exc. Reported path: Hop 1: X Hop 2: Y T. Klauser Mapping the Internet Zurich, 30 May / 34

13 Traceroute TTL=3 A X Y B Request packet: Dest = B Src = A TTL = 3 Echo req. Reply packet: Dest = A Src = B TTL = max Echo reply Reported path: Hop 1: X Hop 2: Y Hop 3: B (target) T. Klauser Mapping the Internet Zurich, 30 May / 34

14 Traceroute for Redundant Paths E G A D I B F H D decides on path for packets based on routing policy T. Klauser Mapping the Internet Zurich, 30 May / 34

15 1. In reality, we most often probe topologies with redundant paths 2. Routing policy of nodes in-between very often not known. Needs to be heuristically detected. 3. Can lead to problems with reported paths in case of flow-based routing.

16 Traceroute for Redundant Paths E G A D I B F H Successive traceroute packets might go through E or F Topology reported wrong, e.g. A - D - E - H - I - B T. Klauser Mapping the Internet Zurich, 30 May / 34

17 1. If flow-based Routing is in place, Paris traceroute might be used. 2. Allows to circumvent false reporting in the above case.

18 Probing Target Selection Naïve approach: Probe all addresses from public range Probe representatives for each subnet or Autonomous System (AS) Probe fixed selection of destinations Heuristic approach: Select next target from prefixes of probed paths Generate random addresses for prefix and probe it Add new prefixes seen on the path to list If no prefixes available, select new ones by using neighboring prefixes T. Klauser Mapping the Internet Zurich, 30 May / 34

19 addresses in principle, large block reserved thus less 2. Abstraction (like classical mapping) 3. Heuristic approach: starts with small initial list of prefixes 4. Target selection approach depends on aim of the mapping endeavor. Topology vs. reachability/stability etc. 5. Naïve approach might have been feasible in the 90ies when only a percentage of IPv4 addresses was assigned, nowadays fails completely for IPv6

20 Centralized vs. Distributed Probing Centralized probing: Probing takes a lot of time if done for all public IP subnets Tradeoff in number of hosts probed Distributed probing: Measurements from multiple sources Aggregation of results at central place T. Klauser Mapping the Internet Zurich, 30 May / 34

21 1. Centralized probing: Usually representatives from subnets are probed (heuristic methods) 2. Distributed: Finer grained probing possible

22 Alternative: AS-Level Probing Border Gateway Protocol (BGP) used to exchange routing information on the Internet Each router keeps IP-prefix-to-AS mapping table based on BGP information Determines reachability to other ASs as path Graph of Internet topology could directly be built from this information T. Klauser Mapping the Internet Zurich, 30 May / 34

23 1. BGP path vector protocol (keeps path vectors to other ASs) 2. AS: collection of connected IP network prefixes under control of one or multiple network operators, presents common routing policy to the Internet 3. Can be combined with traceroute: astraceroute

24 IP Address Alias Resolution Routers have at least 2 interfaces (IP addresses) Several might show up in traceroute paths Interfaces belonging to the same router must be identified and merged Strategy for resolutions: Send UDP packets to all addresses seen in traceroute paths Use obscure UDP ports Routers must answer probe packets with ICMP port unreachable Source address of answer set to interface of the unicast route to prober T. Klauser Mapping the Internet Zurich, 30 May / 34

25 1. Needed for topology at router level. 2. Internet routers possibly have 100s of interfaces 3. UDP packets destined for potentially unused UDP ports, provoke ICMP response

26 Internet Mapping Projects Numerous examples of Internet mapping endeavors Historic: The Internet Mapping Project (Cheswick et al. 1998) Shift from centralized to distributed probing Traceroute remains main technique T. Klauser Mapping the Internet Zurich, 30 May / 34

27 RIPE Atlas ( Global measurement network run by RIPE Active measurements (traceroute-based), IPv4 and IPv6 Topology mapping, connectivity and reachability measurements Distributed network of probes (around 4000 registered probes) Atlas probe device ( T. Klauser Mapping the Internet Zurich, 30 May / 34

28 1. RIPE: Réseaux IP Européens, an open forum for all parties interested in wide area IP networks, especially the Internet. 2. You can register to run your own probe. 3. Custom measurements possible

29 RIPE Atlas Map Reachability of a.root-servers.net by IPv6 ( T. Klauser Mapping the Internet Zurich, 30 May / 34

30 1. Map shows location of probes and reachability of a.root-servers.net via IPv6 2. Probing towards fixed destinations (e.g. DNS root servers, RIPE infrastructure) 3. Measurement data is centrally aggregated, analyzed and visualized 4. Generated data sets available to registered users (hosting a probe)

31 RIPE Atlas Measurements Own implementation of traceroute (supports Paris traceroute method) ICMP Ping to probe reachability DNS, HTTP and SSL certificate queries Custom measurements Source code of the measurement tools recently became open source T. Klauser Mapping the Internet Zurich, 30 May / 34

32 1. Custom, user-defined measurements can be defined by registered users, based on a credit system (can be deployed on other probes in network, e.g. to test reachability of own site) 2. Credits can be earned by hosting probes or by sponsoring them

33 CAIDA ( Network of probes (71 active) Aggregated in teams (3 teams active) Probing 9.5 million /24 IPv4 networks 100 packets/sec 2-3 days for full /24 scan (per team) CAIDA probe device (Image courtesy of CAIDA) T. Klauser Mapping the Internet Zurich, 30 May / 34

34 1. The Cooperative Association for Internet Data Analysis (CAIDA) 2. Probes mainly distributed among research institutions 3. Probing device is Raspberry Pi based 4. Uses dynamically generated list of targets, randomly chosen from within /24 prefixes 5. Additional DNS lookups of probed addresses 6. Data sets are publicly available

35 CAIDA T. Klauser Mapping the Internet Zurich, 30 May / 34

36 1. AS-level topology maps created for IPV4 and IPv6. 2. Traceroute paths serve as basis, IP addresses are looked up in BGP tables and are assigned to the longest matching prefix. 3. If two successive hops resolve to different ASs, this is interpreted as link between the two ASs. 4. Several problems: private ASs, multi-origin ASs (same prefix advertised by multiple ASs) 5. Visualization: Angular position: geographical longitude; Color: out-degree of AS (number of outgoing links)

37 Use Case: Hurricane Sandy Superstorm Sandy hit the US East Coast in 2012 Affected region hosts numerous major hubs of global communication networks Analysis of the hurricane s effects on Internet infrastructure T. Klauser Mapping the Internet Zurich, 30 May / 34

38 Use Case: Hurricane Sandy Number of traceroute packets going towards ns.ripe.net during hurricane Sandy (Image courtesy of RIPE Atlas) T. Klauser Mapping the Internet Zurich, 30 May / 34

39 Data Quality and Completeness Percentage of Atlas probes per country (Image courtesy of RIPE Atlas) T. Klauser Mapping the Internet Zurich, 30 May / 34

40 1. Coverage high in Western Europe, Russia and North America. Limited coverage in Africa, Asia and South America.

41 Data Quality and Completeness Worldwide Undersea Communication infrastructure ( T. Klauser Mapping the Internet Zurich, 30 May / 34

42 1. South America and Asia host important hubs of the global communication network. 2. Thickness: transmission capacity

43 Data Quality and Completeness Internet users per 100 people ( T. Klauser Mapping the Internet Zurich, 30 May / 34

44 1. Internet users per 100 people 2. Obviously Western Europe and North America highest, but Eastern Asia and South America (Brazil!) have high percentage too.

45 Data Quality and Completeness Geographical lookups not always exact or even possible Traceroute biased towards shortest-path trees Connectivity on data link layer (layer 2) not considered Interface alias resolution might lead to false negatives Internet s growth is self-organized, no central control Combination of data problematic T. Klauser Mapping the Internet Zurich, 30 May / 34

46 1. Workaround to guess geographical location: Deduce from DNS name (ISPs tend to include geolocation in DNS name)

47 Summary Several active and inactive Internet mapping projects Shift from centralized to distributed probing Usage of Traceroute as basic probing technique Certain shortcomings with respect to completeness and accuracy T. Klauser Mapping the Internet Zurich, 30 May / 34

48 Questions? Thanks for your attention. Do you have any questions? T. Klauser Mapping the Internet Zurich, 30 May / 34

49 Discussion: Additional Data What could be other data of interest to be measured/acquired atop of the topology, and why? T. Klauser Mapping the Internet Zurich, 30 May / 34

50 Discussion: Additional Data What could be other data of interest to be measured/acquired atop of the topology, and why? Services offered by nodes, combination with port scans. Spam-sending networks, correlation with spam block lists. Various demographics: Internet user percentage, mobile phone users per population, population densities. Protocols used: dissemination of IPv6, routing protocols, traffic classification: Web, , P2P,... T. Klauser Mapping the Internet Zurich, 30 May / 34

51 Discussion: Internet Mapping and ISPs Suppose you re a network operator. Why would you want to allow measurements in your network and e.g. disclose geolocations of your infrastructure? Why wouldn t you? T. Klauser Mapping the Internet Zurich, 30 May / 34

52 Discussion: Internet Mapping and ISPs Suppose you re a network operator. Why would you want to allow measurements in your network and e.g. disclose geolocations of your infrastructure? Why wouldn t you? Benefit from more detailed maps, e.g. in order to analyze structure of own infrastructure, might help to identify problems in terms of stability, availability, security,... Non-commerical operators (research networks, universities) are usually quite open about their infrastructure anyway. Disclose company secrets (think about how the large cloud providers keep the locations of their data centers secret), might make it easier to attack infrastructure (e.g. DDoS). T. Klauser Mapping the Internet Zurich, 30 May / 34

53 Discussion: Traceroute Do you see any issues with the traceroute-style probe technique? If yes, how could they be overcome? Can you think of alternatives/amendments to traceroute? T. Klauser Mapping the Internet Zurich, 30 May / 34

54 Discussion: Traceroute Do you see any issues with the traceroute-style probe technique? If yes, how could they be overcome? Can you think of alternatives/amendments to traceroute? Biased towards shortest paths. Lateral connections of routers not considered (unless explicitly probed). Topology on layers below and above Internet layer are not considered. Partial solution: Passive measurements. Shortcomings with respect to flow-based routing. Partial solution: Paris traceroute. Run measurements periodically. Compare current data set to previously generated data sets. T. Klauser Mapping the Internet Zurich, 30 May / 34

55 Discussion: Active vs. Passive Measurements The described projects rely on active measurements. Can you think of a way passive measurements could potentially be used for topology mapping? What could be potential issues? T. Klauser Mapping the Internet Zurich, 30 May / 34

56 Discussion: Active vs. Passive Measurements The described projects rely on active measurements. Can you think of a way passive measurements could potentially be used for topology mapping? What could be potential issues? Probes at large Internet nodes, monitoring traffic flows. Use latency based measures to deduce location of communicating nodes. Hard to map topology since all that can be seen are node-to-node packets or connections. Querying routing tables. Monitoring traffic would need a lot of bandwidth and possibly computational power. Issues with privacy. T. Klauser Mapping the Internet Zurich, 30 May / 34

57 Discussion: Coverage and Completeness Do you think the limited coverage in the presented projects is an issue? Why? How could it possibly be overcome? T. Klauser Mapping the Internet Zurich, 30 May / 34

58 Discussion: Coverage and Completeness Do you think the limited coverage in the presented projects is an issue? Why? How could it possibly be overcome? Cooperate with network equipment vendors (e.g. directly integrating probes in home routers). Work together with large network operators (e.g. SWITCH) or research institutions. T. Klauser Mapping the Internet Zurich, 30 May / 34

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Instructor Notes for Lab 3

Instructor Notes for Lab 3 Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

More information

Limitations of Packet Measurement

Limitations of Packet Measurement Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing

More information

Network measurement II. Sebastian Castro NZRS 27 th May 2015 Victoria University

Network measurement II. Sebastian Castro NZRS 27 th May 2015 Victoria University Network measurement II Sebastian Castro NZRS 27 th May 2015 Victoria University Agenda Network measurement in the wild Common pitfalls in methodologies Network measurement datasets Stories Our work AMP

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton University Motivation Routing anomalies are

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

F5 Silverline DDoS Protection Onboarding: Technical Note

F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same. This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the

More information

Internet (IPv4) Topology Mapping. Department of Computer Science The University of Texas at Dallas

Internet (IPv4) Topology Mapping. Department of Computer Science The University of Texas at Dallas Internet (IPv4) Topology Mapping Kamil Sarac (ksarac@utdallas.edu) Department of Computer Science The University of Texas at Dallas Internet topology measurement/mapping Need for Internet topology measurement

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

20. Switched Local Area Networks

20. Switched Local Area Networks 20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on

More information

PORTOLAN. Probing the Internet through Smartphone-based Crowdsourcing

PORTOLAN. Probing the Internet through Smartphone-based Crowdsourcing PORTOLAN Probing the Internet through Smartphone-based Crowdsourcing Adriano Faggiani, Enrico Gregori, Alessandro Improta, Luciano Lenzini, Valerio Luconi, Alessio Vecchio RIPE 67 Athens 14-18 October

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) SFWR 4C03: Computer Networks & Computer Security Jan 31-Feb 4, 2005 Lecturer: Kartik Krishnan Lecture 13-16 Internet Control Message Protocol (ICMP) The operation of the Internet is closely monitored by

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol

More information

Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:

Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below: Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani Last name First name Student Identification number You are only allowed to use a pen and

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Internet Protocol version 4 Part I

Internet Protocol version 4 Part I Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents

More information

Combining SPF and Source Routing for an Efficient Probing Solution in IPv6 Topology Discovery

Combining SPF and Source Routing for an Efficient Probing Solution in IPv6 Topology Discovery Combining SPF and Source Routing for an Efficient Probing Solution in IPv6 Topology Discovery by M. F. Rabbi Ur Rashid A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Efficient Methodical Internet Topology Discovery

Efficient Methodical Internet Topology Discovery Efficient Methodical Internet Topology Discovery Alistair King Supervisor: Dr Matthew Luckie This report is submitted in partial fulfilment of the requirements for the degree of Bachelor of Computing and

More information

Application Layer -1- Network Tools

Application Layer -1- Network Tools EITF25 Internet: Technology and Applications Application Layer -1- Network Tools 2015, Lecture 08 Kaan Bür Previously on EITF25 Addressing above IP Ports, sockets Process-to-process delivery Transport

More information

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance

More information

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer

More information

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics Switching and Forwarding Switching and Forwarding Generic Router rchitecture Forwarding Tables: ridges/layer Switches; VLN Routers and Layer 3 Switches Forwarding in Layer 3 (Network Layer) Network Layer

More information

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand).

The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand). http://waikato.researchgateway.ac.nz/ Research Commons at the University of Waikato Copyright Statement: The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand). The thesis

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Troubleshooting Network Performance with Alpine

Troubleshooting Network Performance with Alpine Troubleshooting Network Performance with Alpine Jeffrey Papen As a Network Engineer, I am often annoyed by slow Internet performance caused by network issues like congestion, fiber cuts, and packet loss.

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

TCP/IP Security Problems. History that still teaches

TCP/IP Security Problems. History that still teaches TCP/IP Security Problems History that still teaches 1 remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home

More information

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture. Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

DEGREE THESIS. Improving Network Performance by Implementing the Path Control Tools. Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim

DEGREE THESIS. Improving Network Performance by Implementing the Path Control Tools. Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim Network Design and Computer Management, 120 HP DEGREE THESIS Improving Network Performance by Implementing the Path Control Tools Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim Network Project

More information

Exercise 4 MPLS router configuration

Exercise 4 MPLS router configuration Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Visio Enabled Solution: One-Click Switched Network Vision

Visio Enabled Solution: One-Click Switched Network Vision Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft

More information

Chapter 10 Link-State Routing Protocols

Chapter 10 Link-State Routing Protocols Chapter 10 Link-State Routing Protocols CCNA2-1 Chapter 10 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

The Value of Flow Data for Peering Decisions

The Value of Flow Data for Peering Decisions The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

CHAPTER 10 IP MULTICAST

CHAPTER 10 IP MULTICAST CHAPTER 10 IP MULTICAST This chapter is about IP multicast, the network layer mechanisms in the Internet to support applications where data is sent from a sender to multiple receivers. The first section

More information

Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002

Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002 Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002 The Internet is coming of age, in large part because of its ability to open up markets and to

More information

Outline. The Problem BGP/Routing Information. Netflow/Traffic Information. Conclusions

Outline. The Problem BGP/Routing Information. Netflow/Traffic Information. Conclusions Outline The Problem BGP/Routing Information BGP-Inspect Information Extraction from BGP Update messages VAST Internet AS topology Visualization Netflow/Traffic Information Flamingo Internet Traffic Exploration

More information

Layer 3 Routing User s Manual

Layer 3 Routing User s Manual User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

Flow Analysis. Make A Right Policy for Your Network. GenieNRM Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery

Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery Middle-East Journal of Scientific Research 15 (9): 1264-1271, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11480 Efficient Doubletree: An Algorithm for Large-Scale Topology

More information

Yarrp ing the Internet

Yarrp ing the Internet Yarrp ing the Internet Robert Beverly Naval Postgraduate School February 12, 2016 Active Internet Measurements (AIMS) Workshop R. Beverly (NPS) Yarrp AIMS 2016 1 / 17 Motivation Active Topology Probing

More information

Internet topology and performance analytics for mapping critical network infrastructure

Internet topology and performance analytics for mapping critical network infrastructure CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Internet topology and performance analytics for mapping critical network infrastructure CAIDA/UCSD PI k claffy 16-18 December 2014 1 Team

More information

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com Sveronese@networkphysics.com September 2003 1 Agenda Today s IT challenges Introduction to Network

More information

SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4

SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4 SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4 1 INTRODUCTION 4 2 DEFINITIONS AND ABBREVIATIONS 4 3 SERVICE OVERVIEW NATIONAL AND INTERNATIONAL 5 3.1 Geographic cover Internet Transit... 5 3.1.1

More information

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

Flow Analysis Versus Packet Analysis. What Should You Choose?

Flow Analysis Versus Packet Analysis. What Should You Choose? Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation

More information

Internet Traffic Trends A View from 67 ISPs

Internet Traffic Trends A View from 67 ISPs Internet Traffic Trends A View from 67 ISPs Craig Labovitz (labovit@arbor.net) Danny McPherson (danny@arbor.net) Scott Iekel-Johnson (scottij@arbor.net) Mike Hollyman (mhollyman@arbor.net) Internet Statistics

More information

What's inside the cloud?!

What's inside the cloud?! What's inside the cloud?! Initial Arpanet Initial Arpanet Interface Message Processors - DDP-516 mini-computers - 24 Kbyte of Core memory - Store-and-forward packet switching - Predecessors of present

More information

Reducing the impact of DoS attacks with MikroTik RouterOS

Reducing the impact of DoS attacks with MikroTik RouterOS Reducing the impact of DoS attacks with MikroTik RouterOS Alfredo Giordano Matthew Ciantar WWW.TIKTRAIN.COM 1 About Us Alfredo Giordano MikroTik Certified Trainer and Consultant Support deployment of WISP

More information

Outline. Outline. Outline

Outline. Outline. Outline Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather

More information

Routing Protocols OSPF CHAPTER. The following topics describe supported routing protocols. Topics include OSPF, page 9-1 IS-IS Protocol, page 9-3

Routing Protocols OSPF CHAPTER. The following topics describe supported routing protocols. Topics include OSPF, page 9-1 IS-IS Protocol, page 9-3 CHAPTER 9 The following topics describe supported routing protocols. Topics include OSPF, page 9-1 IS-IS Protocol, page 9-3 OSPF Open Shortest Path First (OSPF) is a link state Internet routing protocol.

More information

Measuring IP Performance. Geoff Huston Telstra

Measuring IP Performance. Geoff Huston Telstra Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Web Caching and CDNs. Aditya Akella

Web Caching and CDNs. Aditya Akella Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion

More information

Internet Protocols Fall 2004. Outline

Internet Protocols Fall 2004. Outline Internet Protocols Fall 2004 Lecture 7 Andreas Terzis 9/29/04 Outline Internet Protocol CIDR Forwarding CS 449/Fall 04 2 1 Classless Interdomain Routing (CIDR) Addressing The IP address space is broken

More information

GregSowell.com. Mikrotik Routing

GregSowell.com. Mikrotik Routing Mikrotik Routing Static Dynamic Routing To Be Discussed RIP Quick Discussion OSPF BGP What is Routing Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/routing In the context of this

More information

The Case for Source Address Routing in Multihoming Sites

The Case for Source Address Routing in Multihoming Sites The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.

More information

Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery

Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 3 (Jul. - Aug. 2013), PP 05-12 Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery

More information

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem

More information

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in

More information

NQA Technology White Paper

NQA Technology White Paper NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics

More information

TEIN2 Measurement and Monitoring Workshop. Bruce.Morgan@aarnet.edu.au

TEIN2 Measurement and Monitoring Workshop. Bruce.Morgan@aarnet.edu.au TEIN2 Measurement and Monitoring Workshop Bruce.Morgan@aarnet.edu.au Introduction Agenda TEIN2 Topology Network Monitoring Network Measurement Day 1 Session I: Introduction 09:00-09:30 Introduction to

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Some Examples of Network Measurements

Some Examples of Network Measurements Some Examples of Network Measurements Example 1 Data: Traceroute measurements Objective: Inferring Internet topology at the router-level Example 2 Data: Traceroute measurements Objective: Inferring Internet

More information

Passively Detecting Remote Connectivity Issues Using Flow Accounting. 2nd EMANICS Workshop on Netflow/IPFIX usage in network management

Passively Detecting Remote Connectivity Issues Using Flow Accounting. 2nd EMANICS Workshop on Netflow/IPFIX usage in network management Passively Detecting Remote Connectivity Issues Using Flow Accounting 2nd EMANICS Workshop on Netflow/IPFIX usage in network management 08.10.2009 Jacobs University Bremen, Germany Tim Kleefass, Simon Leinen

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Internet Routing Based on Computer Networking, 4 th Edition by Kurose and Ross Intra-AS Routing Also known as Interior Gateway Protocols (IGP) Most common Intra-AS routing protocols:

More information

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone 3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement

More information