Mapping the Internet
|
|
- Amberlynn Watts
- 7 years ago
- Views:
Transcription
1 Mapping the Internet Seminar Communication Systems Spring Semester 2013 Department of Informatics, University of Zurich Tobias Klauser Zurich, 30 May 2013 T. Klauser Mapping the Internet Zurich, 30 May / 34
2 Contents 1 Introduction 2 Techniques and Algorithms 3 Internet Mapping Projects 4 Data Quality and Completeness 5 Questions 6 Discussion T. Klauser Mapping the Internet Zurich, 30 May / 34
3 Introduction Historic map of Oerlikon around 1850 (GIS-ZH, Maps are an important tool to comprehend aspects of the real world Overview of abstract structures, not directly visible to the eye T. Klauser Mapping the Internet Zurich, 30 May / 34
4 1. Humans created maps for ages, example: map of Oerlikon around Maps are always abstractions, leaving out certain details 3. Internet too large to be comprehended at once, no traditional mapping possible 4. Like the real world, structure is rapidly and constantly changing
5 Motivation Detection of congestion, sources of delay, outages, censorship Routing stability, optimality, adaptability, and fault tolerance Correlation of mapping data with additional data (e.g. meteorological) Implementation of topology-aware algorithms Academic research in network theory T. Klauser Mapping the Internet Zurich, 30 May / 34
6 1. Might help ISP in provisioning of infrastructure 2. Internet policy, regulations, and planning (even though no central control but certain agencies overlooking certain aspects) 3. Linking events from the real world to the virtual realm. 4. Performance improvements based on gained insights, detection of bottlenecks 5. Algorithms and concepts from network theory might help to gain a deeper understanding of the Internet s structure and growth and networks in general (e.g. social networks). 6. Mapping as art (examples later on)
7 Techniques and Algorithms Goal: Map the topology of the Internet, path by path Usually active measurements Sending of hop-limited packets (traceroute), interpret responses Annotation of connectivity graph with additional data (e.g. geographical) T. Klauser Mapping the Internet Zurich, 30 May / 34
8 1. No central instance which can be queried for the data, thus active measurement is needed 2. Topology usually at the network/internet protocol layer. 3. Additional data: e.g. geographical or other real world/real time data 4. GeoIP, but not available in same accuracy for all infrastructure (especially routing infrastructure), tricks might need to be used. 5. Annotation optional, but maps usually not of much use without additional data. 6. Nowadays Web services (e.g. Google Maps) allow to create a variety of overlay maps
9 Traceroute start A X Y B Request packet: Dest = B Src = A TTL = 1 Echo req. T. Klauser Mapping the Internet Zurich, 30 May / 34
10 1. Example: Traceroute probe from host A towards host B 2. Simple, abstract example. Intermediate routers possibly have many more interfaces and lateral connections. 3. ICMP Packet only shows important fields: Source and Destination address, TTL, ICMP message 4. Example shown with ICMP echo requests (ping), there are variants with UDP packets to obscure ports 5. Maximum TTL needs to be specified (usually 64 or 128) 6. Same working principle for IPv4 and IPv6
11 Traceroute TTL=1 A X Y B Request packet: Dest = B Src = A TTL = 1 Echo req. Reply packet: Dest = A Src = X TTL = max Time exc. Reported path: Hop 1: X T. Klauser Mapping the Internet Zurich, 30 May / 34
12 Traceroute TTL=2 A X Y B Request packet: Dest = B Src = A TTL = 2 Echo req. Reply packet: Dest = A Src = Y TTL = max Time exc. Reported path: Hop 1: X Hop 2: Y T. Klauser Mapping the Internet Zurich, 30 May / 34
13 Traceroute TTL=3 A X Y B Request packet: Dest = B Src = A TTL = 3 Echo req. Reply packet: Dest = A Src = B TTL = max Echo reply Reported path: Hop 1: X Hop 2: Y Hop 3: B (target) T. Klauser Mapping the Internet Zurich, 30 May / 34
14 Traceroute for Redundant Paths E G A D I B F H D decides on path for packets based on routing policy T. Klauser Mapping the Internet Zurich, 30 May / 34
15 1. In reality, we most often probe topologies with redundant paths 2. Routing policy of nodes in-between very often not known. Needs to be heuristically detected. 3. Can lead to problems with reported paths in case of flow-based routing.
16 Traceroute for Redundant Paths E G A D I B F H Successive traceroute packets might go through E or F Topology reported wrong, e.g. A - D - E - H - I - B T. Klauser Mapping the Internet Zurich, 30 May / 34
17 1. If flow-based Routing is in place, Paris traceroute might be used. 2. Allows to circumvent false reporting in the above case.
18 Probing Target Selection Naïve approach: Probe all addresses from public range Probe representatives for each subnet or Autonomous System (AS) Probe fixed selection of destinations Heuristic approach: Select next target from prefixes of probed paths Generate random addresses for prefix and probe it Add new prefixes seen on the path to list If no prefixes available, select new ones by using neighboring prefixes T. Klauser Mapping the Internet Zurich, 30 May / 34
19 addresses in principle, large block reserved thus less 2. Abstraction (like classical mapping) 3. Heuristic approach: starts with small initial list of prefixes 4. Target selection approach depends on aim of the mapping endeavor. Topology vs. reachability/stability etc. 5. Naïve approach might have been feasible in the 90ies when only a percentage of IPv4 addresses was assigned, nowadays fails completely for IPv6
20 Centralized vs. Distributed Probing Centralized probing: Probing takes a lot of time if done for all public IP subnets Tradeoff in number of hosts probed Distributed probing: Measurements from multiple sources Aggregation of results at central place T. Klauser Mapping the Internet Zurich, 30 May / 34
21 1. Centralized probing: Usually representatives from subnets are probed (heuristic methods) 2. Distributed: Finer grained probing possible
22 Alternative: AS-Level Probing Border Gateway Protocol (BGP) used to exchange routing information on the Internet Each router keeps IP-prefix-to-AS mapping table based on BGP information Determines reachability to other ASs as path Graph of Internet topology could directly be built from this information T. Klauser Mapping the Internet Zurich, 30 May / 34
23 1. BGP path vector protocol (keeps path vectors to other ASs) 2. AS: collection of connected IP network prefixes under control of one or multiple network operators, presents common routing policy to the Internet 3. Can be combined with traceroute: astraceroute
24 IP Address Alias Resolution Routers have at least 2 interfaces (IP addresses) Several might show up in traceroute paths Interfaces belonging to the same router must be identified and merged Strategy for resolutions: Send UDP packets to all addresses seen in traceroute paths Use obscure UDP ports Routers must answer probe packets with ICMP port unreachable Source address of answer set to interface of the unicast route to prober T. Klauser Mapping the Internet Zurich, 30 May / 34
25 1. Needed for topology at router level. 2. Internet routers possibly have 100s of interfaces 3. UDP packets destined for potentially unused UDP ports, provoke ICMP response
26 Internet Mapping Projects Numerous examples of Internet mapping endeavors Historic: The Internet Mapping Project (Cheswick et al. 1998) Shift from centralized to distributed probing Traceroute remains main technique T. Klauser Mapping the Internet Zurich, 30 May / 34
27 RIPE Atlas ( Global measurement network run by RIPE Active measurements (traceroute-based), IPv4 and IPv6 Topology mapping, connectivity and reachability measurements Distributed network of probes (around 4000 registered probes) Atlas probe device ( T. Klauser Mapping the Internet Zurich, 30 May / 34
28 1. RIPE: Réseaux IP Européens, an open forum for all parties interested in wide area IP networks, especially the Internet. 2. You can register to run your own probe. 3. Custom measurements possible
29 RIPE Atlas Map Reachability of a.root-servers.net by IPv6 ( T. Klauser Mapping the Internet Zurich, 30 May / 34
30 1. Map shows location of probes and reachability of a.root-servers.net via IPv6 2. Probing towards fixed destinations (e.g. DNS root servers, RIPE infrastructure) 3. Measurement data is centrally aggregated, analyzed and visualized 4. Generated data sets available to registered users (hosting a probe)
31 RIPE Atlas Measurements Own implementation of traceroute (supports Paris traceroute method) ICMP Ping to probe reachability DNS, HTTP and SSL certificate queries Custom measurements Source code of the measurement tools recently became open source T. Klauser Mapping the Internet Zurich, 30 May / 34
32 1. Custom, user-defined measurements can be defined by registered users, based on a credit system (can be deployed on other probes in network, e.g. to test reachability of own site) 2. Credits can be earned by hosting probes or by sponsoring them
33 CAIDA ( Network of probes (71 active) Aggregated in teams (3 teams active) Probing 9.5 million /24 IPv4 networks 100 packets/sec 2-3 days for full /24 scan (per team) CAIDA probe device (Image courtesy of CAIDA) T. Klauser Mapping the Internet Zurich, 30 May / 34
34 1. The Cooperative Association for Internet Data Analysis (CAIDA) 2. Probes mainly distributed among research institutions 3. Probing device is Raspberry Pi based 4. Uses dynamically generated list of targets, randomly chosen from within /24 prefixes 5. Additional DNS lookups of probed addresses 6. Data sets are publicly available
35 CAIDA T. Klauser Mapping the Internet Zurich, 30 May / 34
36 1. AS-level topology maps created for IPV4 and IPv6. 2. Traceroute paths serve as basis, IP addresses are looked up in BGP tables and are assigned to the longest matching prefix. 3. If two successive hops resolve to different ASs, this is interpreted as link between the two ASs. 4. Several problems: private ASs, multi-origin ASs (same prefix advertised by multiple ASs) 5. Visualization: Angular position: geographical longitude; Color: out-degree of AS (number of outgoing links)
37 Use Case: Hurricane Sandy Superstorm Sandy hit the US East Coast in 2012 Affected region hosts numerous major hubs of global communication networks Analysis of the hurricane s effects on Internet infrastructure T. Klauser Mapping the Internet Zurich, 30 May / 34
38 Use Case: Hurricane Sandy Number of traceroute packets going towards ns.ripe.net during hurricane Sandy (Image courtesy of RIPE Atlas) T. Klauser Mapping the Internet Zurich, 30 May / 34
39 Data Quality and Completeness Percentage of Atlas probes per country (Image courtesy of RIPE Atlas) T. Klauser Mapping the Internet Zurich, 30 May / 34
40 1. Coverage high in Western Europe, Russia and North America. Limited coverage in Africa, Asia and South America.
41 Data Quality and Completeness Worldwide Undersea Communication infrastructure ( T. Klauser Mapping the Internet Zurich, 30 May / 34
42 1. South America and Asia host important hubs of the global communication network. 2. Thickness: transmission capacity
43 Data Quality and Completeness Internet users per 100 people ( T. Klauser Mapping the Internet Zurich, 30 May / 34
44 1. Internet users per 100 people 2. Obviously Western Europe and North America highest, but Eastern Asia and South America (Brazil!) have high percentage too.
45 Data Quality and Completeness Geographical lookups not always exact or even possible Traceroute biased towards shortest-path trees Connectivity on data link layer (layer 2) not considered Interface alias resolution might lead to false negatives Internet s growth is self-organized, no central control Combination of data problematic T. Klauser Mapping the Internet Zurich, 30 May / 34
46 1. Workaround to guess geographical location: Deduce from DNS name (ISPs tend to include geolocation in DNS name)
47 Summary Several active and inactive Internet mapping projects Shift from centralized to distributed probing Usage of Traceroute as basic probing technique Certain shortcomings with respect to completeness and accuracy T. Klauser Mapping the Internet Zurich, 30 May / 34
48 Questions? Thanks for your attention. Do you have any questions? T. Klauser Mapping the Internet Zurich, 30 May / 34
49 Discussion: Additional Data What could be other data of interest to be measured/acquired atop of the topology, and why? T. Klauser Mapping the Internet Zurich, 30 May / 34
50 Discussion: Additional Data What could be other data of interest to be measured/acquired atop of the topology, and why? Services offered by nodes, combination with port scans. Spam-sending networks, correlation with spam block lists. Various demographics: Internet user percentage, mobile phone users per population, population densities. Protocols used: dissemination of IPv6, routing protocols, traffic classification: Web, , P2P,... T. Klauser Mapping the Internet Zurich, 30 May / 34
51 Discussion: Internet Mapping and ISPs Suppose you re a network operator. Why would you want to allow measurements in your network and e.g. disclose geolocations of your infrastructure? Why wouldn t you? T. Klauser Mapping the Internet Zurich, 30 May / 34
52 Discussion: Internet Mapping and ISPs Suppose you re a network operator. Why would you want to allow measurements in your network and e.g. disclose geolocations of your infrastructure? Why wouldn t you? Benefit from more detailed maps, e.g. in order to analyze structure of own infrastructure, might help to identify problems in terms of stability, availability, security,... Non-commerical operators (research networks, universities) are usually quite open about their infrastructure anyway. Disclose company secrets (think about how the large cloud providers keep the locations of their data centers secret), might make it easier to attack infrastructure (e.g. DDoS). T. Klauser Mapping the Internet Zurich, 30 May / 34
53 Discussion: Traceroute Do you see any issues with the traceroute-style probe technique? If yes, how could they be overcome? Can you think of alternatives/amendments to traceroute? T. Klauser Mapping the Internet Zurich, 30 May / 34
54 Discussion: Traceroute Do you see any issues with the traceroute-style probe technique? If yes, how could they be overcome? Can you think of alternatives/amendments to traceroute? Biased towards shortest paths. Lateral connections of routers not considered (unless explicitly probed). Topology on layers below and above Internet layer are not considered. Partial solution: Passive measurements. Shortcomings with respect to flow-based routing. Partial solution: Paris traceroute. Run measurements periodically. Compare current data set to previously generated data sets. T. Klauser Mapping the Internet Zurich, 30 May / 34
55 Discussion: Active vs. Passive Measurements The described projects rely on active measurements. Can you think of a way passive measurements could potentially be used for topology mapping? What could be potential issues? T. Klauser Mapping the Internet Zurich, 30 May / 34
56 Discussion: Active vs. Passive Measurements The described projects rely on active measurements. Can you think of a way passive measurements could potentially be used for topology mapping? What could be potential issues? Probes at large Internet nodes, monitoring traffic flows. Use latency based measures to deduce location of communicating nodes. Hard to map topology since all that can be seen are node-to-node packets or connections. Querying routing tables. Monitoring traffic would need a lot of bandwidth and possibly computational power. Issues with privacy. T. Klauser Mapping the Internet Zurich, 30 May / 34
57 Discussion: Coverage and Completeness Do you think the limited coverage in the presented projects is an issue? Why? How could it possibly be overcome? T. Klauser Mapping the Internet Zurich, 30 May / 34
58 Discussion: Coverage and Completeness Do you think the limited coverage in the presented projects is an issue? Why? How could it possibly be overcome? Cooperate with network equipment vendors (e.g. directly integrating probes in home routers). Work together with large network operators (e.g. SWITCH) or research institutions. T. Klauser Mapping the Internet Zurich, 30 May / 34
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationInstructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
More informationLimitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
More informationNetwork measurement II. Sebastian Castro NZRS 27 th May 2015 Victoria University
Network measurement II Sebastian Castro NZRS 27 th May 2015 Victoria University Agenda Network measurement in the wild Common pitfalls in methodologies Network measurement datasets Stories Our work AMP
More informationOutline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright
More informationPlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services
PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton University Motivation Routing anomalies are
More informationInternet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationF5 Silverline DDoS Protection Onboarding: Technical Note
F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution
More informationIP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationAvaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationThis Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.
This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the
More informationInternet (IPv4) Topology Mapping. Department of Computer Science The University of Texas at Dallas
Internet (IPv4) Topology Mapping Kamil Sarac (ksarac@utdallas.edu) Department of Computer Science The University of Texas at Dallas Internet topology measurement/mapping Need for Internet topology measurement
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More information20. Switched Local Area Networks
20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on
More informationPORTOLAN. Probing the Internet through Smartphone-based Crowdsourcing
PORTOLAN Probing the Internet through Smartphone-based Crowdsourcing Adriano Faggiani, Enrico Gregori, Alessandro Improta, Luciano Lenzini, Valerio Luconi, Alessio Vecchio RIPE 67 Athens 14-18 October
More informationRouter and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
More informationInternet Control Message Protocol (ICMP)
SFWR 4C03: Computer Networks & Computer Security Jan 31-Feb 4, 2005 Lecturer: Kartik Krishnan Lecture 13-16 Internet Control Message Protocol (ICMP) The operation of the Internet is closely monitored by
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationQuestion 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:
Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani Last name First name Student Identification number You are only allowed to use a pen and
More informationFirst Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationCS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
More informationInternet Protocol version 4 Part I
Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents
More informationCombining SPF and Source Routing for an Efficient Probing Solution in IPv6 Topology Discovery
Combining SPF and Source Routing for an Efficient Probing Solution in IPv6 Topology Discovery by M. F. Rabbi Ur Rashid A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial
More informationComputer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
More information04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
More informationEfficient Methodical Internet Topology Discovery
Efficient Methodical Internet Topology Discovery Alistair King Supervisor: Dr Matthew Luckie This report is submitted in partial fulfilment of the requirements for the degree of Bachelor of Computing and
More informationApplication Layer -1- Network Tools
EITF25 Internet: Technology and Applications Application Layer -1- Network Tools 2015, Lecture 08 Kaan Bür Previously on EITF25 Addressing above IP Ports, sockets Process-to-process delivery Transport
More informationDynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
More informationMapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer
More informationNetwork Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery
Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationClassful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics
Switching and Forwarding Switching and Forwarding Generic Router rchitecture Forwarding Tables: ridges/layer Switches; VLN Routers and Layer 3 Switches Forwarding in Layer 3 (Network Layer) Network Layer
More informationLab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationThe digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand).
http://waikato.researchgateway.ac.nz/ Research Commons at the University of Waikato Copyright Statement: The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand). The thesis
More informationFaculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationTroubleshooting Network Performance with Alpine
Troubleshooting Network Performance with Alpine Jeffrey Papen As a Network Engineer, I am often annoyed by slow Internet performance caused by network issues like congestion, fiber cuts, and packet loss.
More informationComputer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
More informationTCP/IP Security Problems. History that still teaches
TCP/IP Security Problems History that still teaches 1 remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home
More informationRouting in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks
Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationMPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.
Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More informationDEGREE THESIS. Improving Network Performance by Implementing the Path Control Tools. Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim
Network Design and Computer Management, 120 HP DEGREE THESIS Improving Network Performance by Implementing the Path Control Tools Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim Network Project
More informationExercise 4 MPLS router configuration
Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.
More informationMultihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
More informationNetwork congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationVisio Enabled Solution: One-Click Switched Network Vision
Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft
More informationChapter 10 Link-State Routing Protocols
Chapter 10 Link-State Routing Protocols CCNA2-1 Chapter 10 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks
More informationEECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
More informationThe Value of Flow Data for Peering Decisions
The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationInterconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
More informationCHAPTER 10 IP MULTICAST
CHAPTER 10 IP MULTICAST This chapter is about IP multicast, the network layer mechanisms in the Internet to support applications where data is sent from a sender to multiple receivers. The first section
More informationRoute Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002
Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002 The Internet is coming of age, in large part because of its ability to open up markets and to
More informationOutline. The Problem BGP/Routing Information. Netflow/Traffic Information. Conclusions
Outline The Problem BGP/Routing Information BGP-Inspect Information Extraction from BGP Update messages VAST Internet AS topology Visualization Netflow/Traffic Information Flamingo Internet Traffic Exploration
More informationLayer 3 Routing User s Manual
User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
More informationIntroduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
More informationFlow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
More informationProCurve Networking IPv6 The Next Generation of Networking
ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...
More informationIP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
More informationRouting in packet-switching networks
Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call
More informationEfficient Doubletree: An Algorithm for Large-Scale Topology Discovery
Middle-East Journal of Scientific Research 15 (9): 1264-1271, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11480 Efficient Doubletree: An Algorithm for Large-Scale Topology
More informationYarrp ing the Internet
Yarrp ing the Internet Robert Beverly Naval Postgraduate School February 12, 2016 Active Internet Measurements (AIMS) Workshop R. Beverly (NPS) Yarrp AIMS 2016 1 / 17 Motivation Active Topology Probing
More informationInternet topology and performance analytics for mapping critical network infrastructure
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Internet topology and performance analytics for mapping critical network infrastructure CAIDA/UCSD PI k claffy 16-18 December 2014 1 Team
More informationThe Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com Sveronese@networkphysics.com September 2003 1 Agenda Today s IT challenges Introduction to Network
More informationSERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4
SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4 1 INTRODUCTION 4 2 DEFINITIONS AND ABBREVIATIONS 4 3 SERVICE OVERVIEW NATIONAL AND INTERNATIONAL 5 3.1 Geographic cover Internet Transit... 5 3.1.1
More informationOutline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationFlow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
More informationInternet Traffic Trends A View from 67 ISPs
Internet Traffic Trends A View from 67 ISPs Craig Labovitz (labovit@arbor.net) Danny McPherson (danny@arbor.net) Scott Iekel-Johnson (scottij@arbor.net) Mike Hollyman (mhollyman@arbor.net) Internet Statistics
More informationWhat's inside the cloud?!
What's inside the cloud?! Initial Arpanet Initial Arpanet Interface Message Processors - DDP-516 mini-computers - 24 Kbyte of Core memory - Store-and-forward packet switching - Predecessors of present
More informationReducing the impact of DoS attacks with MikroTik RouterOS
Reducing the impact of DoS attacks with MikroTik RouterOS Alfredo Giordano Matthew Ciantar WWW.TIKTRAIN.COM 1 About Us Alfredo Giordano MikroTik Certified Trainer and Consultant Support deployment of WISP
More informationOutline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
More informationRouting Protocols OSPF CHAPTER. The following topics describe supported routing protocols. Topics include OSPF, page 9-1 IS-IS Protocol, page 9-3
CHAPTER 9 The following topics describe supported routing protocols. Topics include OSPF, page 9-1 IS-IS Protocol, page 9-3 OSPF Open Shortest Path First (OSPF) is a link state Internet routing protocol.
More informationMeasuring IP Performance. Geoff Huston Telstra
Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour
More informationExterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
More informationWeb Caching and CDNs. Aditya Akella
Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion
More informationInternet Protocols Fall 2004. Outline
Internet Protocols Fall 2004 Lecture 7 Andreas Terzis 9/29/04 Outline Internet Protocol CIDR Forwarding CS 449/Fall 04 2 1 Classless Interdomain Routing (CIDR) Addressing The IP address space is broken
More informationGregSowell.com. Mikrotik Routing
Mikrotik Routing Static Dynamic Routing To Be Discussed RIP Quick Discussion OSPF BGP What is Routing Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/routing In the context of this
More informationThe Case for Source Address Routing in Multihoming Sites
The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.
More informationEfficient Doubletree: An Algorithm for Large-Scale Topology Discovery
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 3 (Jul. - Aug. 2013), PP 05-12 Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery
More informationOverview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
More informationDD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
More informationNQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
More informationTEIN2 Measurement and Monitoring Workshop. Bruce.Morgan@aarnet.edu.au
TEIN2 Measurement and Monitoring Workshop Bruce.Morgan@aarnet.edu.au Introduction Agenda TEIN2 Topology Network Monitoring Network Measurement Day 1 Session I: Introduction 09:00-09:30 Introduction to
More informationCisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
More informationSome Examples of Network Measurements
Some Examples of Network Measurements Example 1 Data: Traceroute measurements Objective: Inferring Internet topology at the router-level Example 2 Data: Traceroute measurements Objective: Inferring Internet
More informationPassively Detecting Remote Connectivity Issues Using Flow Accounting. 2nd EMANICS Workshop on Netflow/IPFIX usage in network management
Passively Detecting Remote Connectivity Issues Using Flow Accounting 2nd EMANICS Workshop on Netflow/IPFIX usage in network management 08.10.2009 Jacobs University Bremen, Germany Tim Kleefass, Simon Leinen
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Internet Routing Based on Computer Networking, 4 th Edition by Kurose and Ross Intra-AS Routing Also known as Interior Gateway Protocols (IGP) Most common Intra-AS routing protocols:
More informationMeasurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone
3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement
More information