Incorporating Routing Analysis into IP Network Management

Size: px
Start display at page:

Download "Incorporating Routing Analysis into IP Network Management"

Transcription

1 Incorporating Routing Analysis into IP Network Management AUTHOR:Lance Tatman Agilent Laboratories 3500 Deer Creek Road P.O. Box 10350, MS 24M-A Palo Alto, CA May 2003 Introduction How often are network operators looking at green icons when the telephone rings? How many times don t customers call to complain? What are we missing in our attempts to detect problems in IP networks? Just detect, not isolate, not repair, just know about problems in the network at a given time. Routing protocols routinely route around failed interfaces and links. Redundant services routinely take over after failure of primary systems. Network management software continually monitors our networks and alerts us not only to failures, but also of poorly performing services or links. With all of this in place how often are network operators looking at green icons when the telephone rings? What might be done to improve network management systems so that operators can find the root cause of more problems, so that top engineers aren t continually devoting their time to troubleshooting the hard problems instead of planning for the next network expansion or network service? This paper proposes that routing data contains information that can be used to identify currently undetected problems, not just run-of-the-mill problems, but the hard problems, problems that are possibly temporary. With the data required to solve the problems being invisible or difficult to obtain, routing data correlated with network element data and service management data can provide a more comprehensive view of network health and the magnitude of problems on the network, on services and on customers. Page 1 of 17

2 Some potential uses of combined routing data analysis and network management data include identification of router mis-configuration and inconsistent routing policies, two of the most frequent causes of routing failures [LA98]. Other problems that may be addressed are loss of reachability from an outside network, oscillations in paths and/or performance, and routing loops. In addition, this information would also allow a provider to quickly classify routing problems as internal or external and provide an indication of the culprit autonomous system (AS). After providing background on current methods of network management, this paper will examine what routing data should be analyzed to identify one or more of the items mentioned above. The paper assumes the perspective of a tier one or tier two ISP. Current Methods of Network Management Network Element Management In 1983, in a single evening, Mike Muuss wrote the now famous ping utility while at the U.S. Army Ballistics Research Laboratory. Ping became widely used for several purposes in network management. It was used to measure latency, determine the up or down state of an interface, and for network interface discovery. Indeed, the grandfather of modern IP network element management is simply timed pings used to monitor interface availability. This type of monitoring and discovery is still widely used today. The next step in the evolution of IP network management was the introduction of the simple gateway management protocol (SGMP) by Jeff Case, Mark Fedor, Martin Schoffstall, and James Davin in August of SGMP was designed to manage routers, but eventually was used as the basis for the development of simple network management protocol (SNMP), which was developed in This was a major improvement in the ability to manage network devices. SNMP provided a common protocol, which allowed operators to query devices for specific information. This might include interface state, memory usage, central processing unit (CPU) usage, bits in and out of an interface, and Page 2 of 17

3 more. This protocol also enabled devices to send messages (traps) on certain conditions. SNMP has undergone improvements since 1988 and is still widely used as a network management tool. The above tools are used for network device and element management. Interface-byinterface, slot-by-slot, chassis-by-chassis, the purpose of monitoring network elements is to verify that all of the hardware is working as it should. With state-of-the-art network element monitoring today, the network management software has usually been set up to be aware of the interdependencies of the network equipment, so that if a router with 30 interfaces loses power, only a single alarm is generated rather than 30. Key performance indicators are charted and displayed for the network operations staff. These may include data such as number of dropped packets on an interface or octets/sec through an interface, router CPU load, and interface uptime. Using these techniques, today s network element management provides network operators with a good indication of the health of the network hardware. Service Management As the Internet matured and grew, more complex networks developed and it became apparent that monitoring individual links wasn t sufficient. Many networks had redundant paths or links, and routing protocols successfully routed around individual network element failures. An interface going down didn t necessarily mean the loss of services or revenue. Companies were now offering more than just network connectivity; they were offering mail services, Web-hosting services, electronic sales, and more. Networks were robustly designed to handle the failure of a single path. The revenue now came from services as well as connectivity, hence, the development of service management. Service management is concerned with managing the services being used across the network. Today, both active and passive monitoring is used. One approach used in active monitoring uses a central server to send out messages to service ports and monitors responses. If an inappropriate response is received, or a threshold crossed, an event in the Page 3 of 17

4 network service monitoring system is generated. At best, this technique monitors whether or not a service is up as viewed from a single point and does little to help one to understand the performance of the service. A better method, adopted by several operations support system (OSS) providers and even some GNU public license network management developers, is to use active measurement agents, typically software packages installed on remote systems deployed across the network. These agents regularly send the appropriate type of packets across the network to the appropriate server to measure network service performance and availability. The tests break down a service into basic elements. For instance, a test monitoring Web service may monitor domain name system (DNS) lookup time, transport control protocol (TCP) connect time, server response time, etc. Breaking the service down helps the operator to pinpoint problems more quickly. Using software agents provides the operator with information on the service performance from the vantage point of each individual agent. Agents are placed at strategic points in the network, and may even be placed outside of the service provider s own network, inside a customer s network for example, to provide a view from the customer vantage point. Additionally, passive tests may also be taken from agents, collecting information such as service transaction rates, disc space used, and so on. Passive tests are integral to network service monitoring. The most-advanced network management software today can correlate network element events with service failure. It will notify the Network Operations Center (NOC) of which network element failed and provide a list of services and customers that have been affected. This is state-of-the-art in terms of network management today. While there are products that have routing analysis and some routing management capabilities, none have taken the next step to integrate and correlate this information with element and service management data. Inside-Outside Page 4 of 17

5 Monitoring one s network from the inside provides us with a very important, but small part of the required picture. Increasingly, trouble-calls may come from customers outside of one s own network, from people trying to access services from outside of the network hosting the services, or from adjacent service providers trying to track down problems for their customers. The Internet is a loose federation of cooperatively competitive large networks, where all of the information needed for analysis is not always available to the engineer. The engineer may face a very complex chain of symptoms and causes that are not easily separable from one another. Data may flow through several intermediate networks before reaching the provider s network, and each of those intermediate networks will affect the end user s experience. Given each network is independently operated, and one has access only to their own network equipment for measurement data, how does one track down problems that are occurring outside of their own network? One approach has been to deploy hundreds or even thousands of servers at points across the Internet. A network operator could then request that their network be probed from these external servers so that availability may be tracked on a wider scale and not just from within. While this approach does provide useful information, it has the drawback of being inefficient, expensive to implement and maintain, and still provides a very limited picture of global access to one s network and services. A Different Approach Network element and service monitoring have worked well enough to this point, but they miss a large class of problems. Monitoring network elements and services alone won t reliably identify problems due to routing anomalies. Current methods may indeed catch some interior and exterior routing problems depending on the density of deployed agents and the placement of servers being monitored. After all, it comes down to connectivity. One can either reach point A and the services offered or one cannot. If it s a routing problem or a bad card or a server down, the result may be the same; however, narrowing the problem down to the root cause allows it to be repaired more quickly. Page 5 of 17

6 Experience using current OSSs has shown that it is often the case that the customer is the instrument used to find network problems not found by the OSS system. By answering the question of how these problems, found only by customers, are solved, we may be able to develop methods to find these problems before the customer. What approach is used today to solve these problems? For instance, what is done when engineers are on the phone with a customer whose web site cannot be reached. First, the engineers must be confident that their own network is not at fault. Currently, they rely on their network element management and service management systems for a first sign. This is where the green light syndrome comes in. If the engineers see all green from their OSS, the problem may very well be with routing. The engineers must determine if their own network is behaving properly with respect to routing. Here, they generally turn to custom scripts that were written in-house. Using a combination of real-time configuration checking, manually logging into routers, and examining results from the inhouse scripts, the engineers will verify the proper routing behavior of their own network. After they verify proper operation of their own networks, in order to locate the root cause of a problem, they must often look at their network from an outside perspective. When troubleshooting suspected routing problems, a technique used by many network engineers, focuses on network availability verification and uses publicly accessible looking glasses 1. A looking glass is a publicly available system set up by the operator of a network, which allows others to look at routing data from the perspective of that network. One can visit the looking glass Web site for a particular network whose perspective they are interested in, such as the one used by the customer making the complaint and see if their network is visible from the perspective of that network. If it is, the operator can see what other networks are between the two end networks and begin to view the network from these intermediate perspectives. In this way, the operator narrows down the networks that may be at fault. Generally, looking glasses also provide a remote traceroute tool, which allows the operator to view network path information at a more detailed level than the autonomous system level provided by the routing tables. 1 maintains a nice index of looking glasses Page 6 of 17

7 Another set of tools engineers use to gain perspective from outside networks are routing table collection points. These are routers set up specifically to collect routing information advertised by service providers. These routers make collective routing information publicly available via the Web. Systems, such as Oregon Route Views 2 and the Reseaux IP Europeans (RIPE), Routing Information Service 3, ask providers to peer with the route collection system as a public service. There are now several of these systems in place and many network operators begin by looking to these systems to identify problems with external routing perspectives. Using the combined knowledge obtained from examining their own network routing tables, knowledge of their own routing policy, and the information obtained from various remote looking glasses or routing table collection points, network operators are able to track down the root cause of problems occurring outside of their own network to the level of the responsible autonomous system. Fixing the problem then becomes an issue of finding the right person at that company, someone with the ability to understand and fix the problem. Once this person is located, they then must be convinced that this is a problem that needs to be fixed. This is difficult enough when one has a direct relationship with the operator at fault, but becomes much more difficult when dealing with an intermediate network operator with whom neither the provider nor customer has a relationship. One can see how this process can become quite time consuming and how it requires extensive knowledge not only of one s own network and routing policies, but also knowledge of relationships with other providers and their networks and policies. Given any changes in the routing configuration can potentially have catastrophic affects on the operators network and customer networks, only the most senior engineers are allowed to tread in this swamp Oregon Route Views Web Site 3 RIPE RIS Web Site 4 A most famous case in Internet lore can be found at Page 7 of 17

8 Three Views of Routing Data -Inside Out- However it is obtained, it is important that network engineers collect and analyze data that is accessible only from their own network. Operators have the ability to collect more information about their own network than any other. There are some simple measurements that may be taken from the provider s own network for troubleshooting routing problems. Some of these are listed here. 1. Average Number of Prefixes Advertised/Peer Networks with whom an ISP peers will have varying numbers of prefixes that they advertise. Indeed, some may advertise a single network (the ISP s customer) and others may advertise over 100,000 routes (the ISP s transit provider). However, the number of routes each peer advertises typically remains within a relatively constant range. Currently, some ISPs set a maximum number of routes they will accept from a peer in order to minimize their exposure to leaking routes, however, this is used with very course granularity and was not intended as a monitoring tool. Monitoring the number of prefixes advertised by each peer is a simple way to check for potential problems. Once the prefixes have been monitored for a sufficient time to determine baseline values, thresholds may be set accordingly. In practice, if a peer that was normally advertising routes suddenly starts advertising only 100 routes or 50,000 routes, it can be taken as a sign that all is not well. 2. Peering Session State Another simple measure is to monitor the state of peering sessions. Peering sessions are TCP connections on port 179. There are several ways of conducting monitoring: via a separate agent with a duplicate peering session with each peer, via command line and via SNMP. If a peering session s state is listed as active then no routes are available from that peer and it may warrant further investigation. Uptime for the peering session can provide similar information. If the peering session is down, the peer is no longer providing or receiving routes. Effectively, that connection is down. Page 8 of 17

9 3. Number of Updates Received/Peer/Time A quickly increasing number of border gateway protocol (BGP) update messages received from a peer can be an indication of problems with stability of the peer or the peer s downstream peers. This is something that is typically examined during live troubleshooting sessions. An engineer will look at these numbers and note instability from a specific peer to determine if a particular peer is contributing significantly to instability and to historically identify unstable peers. 4. Router Resources Routing input and output queues may be monitored along with router CPU load and memory usage to track router resource utilization. This is just common sense. Router resources are limited and, when stretched too far, the router fails. 5. Access Control List (ACL) Hit Monitor Access control lists are used to filter routes into the network. They may be monitored for hits, a hit meaning the peer has advertised routes that must be filtered. If the number of hits exceeds a threshold, warnings may be issued. This may be used simply to save resources on your router or it may be used to detect attacks. If a certain ACL is continually hit, resources are being wasted. It will be worth the operator s time to track down the cause and inform the offending peer of the problem. There is an entire list of prefixes called bogons that most all ISPs filter. If a peer is continually advertising one of these prefixes, they should be informed, as it indicates a mis-configured router and is a waste of resources. 6. Routing Registry vs. Observed Policy Monitor A Routing Registry may be scanned periodically both for one s own routing policy as well as for that of peers. The registered policy may be compared against observed policy to identify cases where configuration is not matched to policy. Since most ISPs take the attitude that peering policy is confidential information they refuse to register their policy in public registries (but may maintain it in a private registry), thereby limiting the scope Page 9 of 17

10 of this method of monitoring. However, there are providers that require customers to maintain accurate registry entries and this policy would make this method useful for monitoring compliance. 7. Router Configuration Change Monitor The most common causes of router mis-configuration are typing errors, a misunderstanding of the commands or a misunderstanding of the company s routing policy. Configuration changes occur frequently to turn up or remove customer services. Router configuration may be logged and the running configuration checked periodically and compared against the saved configuration so that a configuration change will trigger an alarm. NetDB [FR00] developed by AT&T labs does just this. A quote from the AT&T labs web page: Use of the NetDB toolkit led to a huge, sustained drop in CBB (Common Back Bone) network configuration errors. The CBB operational systems NMTS and CTT are now routinely monitored for configuration errors using NetDB. The use of RouteDB, a new tool for querying network BGP (Border Gateway Protocol) data, resulted in tightening and improving CBB routing policies. BGP protocol research produced the first set of guidelines for stable, efficient BGP routing [Ah01] NetDB does more than simply check consistency of the router configuration against a saved copy. It extracts information from the router configuration files and compares it against its internal data model, performing consistency checks and policy checks against its internal database. 8. Traffic Profiling While more of a planning tool than a network-monitoring tool, an ISP s customer or peer traffic may be profiled in order to determine better peering arrangements. Profiling in this context is to chart top volume prefix AS paths, both selected paths and offered paths. This can be done with NetFlow-type statistics turned on and scripts to process the data. By examining not just the selected AS path, but all of the AS paths offered for the top volume prefixes, one may see that the ISP may be better served by a different transit provider or that the ISP should approach a certain service provider to negotiate a peering Page 10 of 17

11 agreement. The ISP pays for transit, but generally doesn t pay for peering. If a profile of traffic shows a majority going to an AS that must be reached via the transit provider, the provider may want to try to establish peering with the destination AS to avoid transit costs. Some less simple, but perhaps more relevant routing information which can be obtained from inside one s own network includes an analysis of each BGP update message from each peer. This is the subject of ongoing research, but it can be imagined that one may be able to isolate undesirable interactions amongst peers, such as conflicting route flap damping policies or route oscillations. Particular vendor BGP implementation issues [La99] can also become apparent and problems introduced by routing operating system updates can be isolated more quickly. Another primary use of individual update analysis might be to isolate and identify denial of service attacks directed at BGP. Stepping away from BGP for a moment, but remaining inside one s own network, it has already been shown that by using the flooding characteristics of interior gateway protocols (IGPs), such as intermediate system-to-intermediate system (IS-IS) or open shortest path first (OSPF), network operators can generate maps of topology that are instantly updated 5. A more detailed analysis of the IGP routing data could also provide a more efficient means of monitoring one s network than traditional methods. Using the measurements listed above, combined with information provided by the network element and service management systems, operators can quickly verify proper operation of their own network always the first step in troubleshooting. The Three Views of Routing Data -Outside In- If the customer is the most used tool for finding routing problems, the index finger is the most used tool for fixing them verify a problem isn t with one s own network and then 5 A prototype was built at Agilent Labs by Andrew Lehane Page 11 of 17

12 vaguely blame it on another carrier down the line. This is how things are currently handled and these are two primary problems we need to solve: finding the problem before the customer and being able to quickly identify the culprit and prove culpability. In order to address these problems, we need to view the world from various outside perspectives and we need to do this at several layers of granularity. First, we should look at the Internet as a whole and view BGP behavior in aggregate. This means viewing the routing behavior of a large numbers of ISPs at multiple locations. The SQL Slammer worm affected networks globally 6. Most public networks were affected nearly simultaneously. When there is a clear understanding that a problem is not local, but global, troubleshooting becomes a much different process. The fog of war is cleared to a great degree and one can quickly eliminate many potential causes and begin to look elsewhere or to look to other operators for immediate assessment of successful filter implementations instead of wasting hours trying to figure out why your network is broken 7. In fact, in the future, the global perspective may even be of potential use to find the originator of global routing problems. Next, one needs to view their own network from the perspective of each of their peers and transit providers. This will quickly isolate problems with mis-configuration or localized failures. By paying attention only to one s peers at this level, the scope is limited to those that have the most direct influence on your network and over whom you have the most influence. These are the networks that immediately propagate one s network advertisements out to the world and those that provide one s network with their own view of the world. One always views the world through their peer s glasses, so it is a good idea to keep an eye on them. Another level of detail required is to view the network from the customer s view. It is through their provider s network that customers view the world. By tracking the routes they are announcing and that they are being given, isolating problems can become much easier. For instance, if a customer calls their provider to complain about poor network 6 for a nice account of SQL Slammer 7 Operators currently use mailing lists like NANOG and an network operations IP phone network set up by Packet Clearing House for quick information on global routing problems Page 12 of 17

13 performance or lack of connectivity and the provider has insight into the behavior of that customer s routing announcements, and can spot changes in the customer s routing behavior, the provider will be able to help the customer solve the problem rather than getting into a blame game with one s own customers. Or, if indeed it is the provider s fault, it is possible they can find the problem before the customer. This would be particularly useful if a configuration change on the part of a provider impacts a customer. By maintaining a view of the world from the customer s prospective, the provider can bring to bear expertise, which may be unavailable to the customer, to quickly identify problems with customer router configuration, such as conflicting routing policy or leaking routes. Enabling the provider to quickly identify a problem as internal, customer, or external is a key benefit of including routing data in the network management scheme. The Three Views of Routing Data -Microview- The finest granularity and final perspective is the relative performance of individual routers with unique configurations under various control traffic and data traffic loads. An operator should be aware of the limits of their equipment and should be able to track key indicators of performance for each router in their network. For instance, an operator may find it useful to know that adding another peer will increase the load on their router by X percent and their router s performance falls off significantly if load exceeds Y percent. It may be useful to know that the increased instability caused by peer A is causing an increase in jitter for customer B. Giving network operators quantified measurements regarding the affects of new configurations or operating system versions on performance of a router would be especially useful. While these measurements fall outside the scope of routing management, given routing is the primary function, it seems appropriate. Do fluctuations in network performance at the far end of a connection show up in TCP behavior to one s customer? Can that behavior be monitored and used to predict network instability? These are topics of current and ongoing research, but are critical to enabling providers to guarantee reliable quality of service. Page 13 of 17

14 Preliminary Work Agilent Labs has done preliminary work in several areas of routing management. Each area outlined above is being examined. First, Agilent Labs analyzed Internet-wide measurements made available by RIPE s RIS project. We analyzed six months of routing updates and verified previous assumptions and observations. For instance, the fact that approximately 20 percent of BGP announcements are duplicates was observed by Craig Labovitz in 1998 [La99]. Several years later, we observed the same behavior. We were able to get an idea of what stable means in terms of large service providers routing updates. More importantly, we are beginning to understand what unstable means. We now process every BGP update message sent by each participating peer at several RIPE RIS exchange points. We put the data into graphs and make them available for public use. Figures 1 and 2 show an example of this data during the SQL Slammer worm attack. Notice the Y axis on the first graph (a normal period), is an order of magnitude smaller than for the Y axis scale during the attack, shown in the second graph. These graphs, if available to operators, would have been a clear indication to engineers, that this was not a local problem. Figure 1 Figure 2 The daily archives of the RIPE data may be found at Page 14 of 17

15 Agilent Labs has also implemented many of the measurements mentioned in the Inside- Out section of this paper into Agilent s QoS Manager (Firehunter) product. Measurements of Agilent s own border routers during the SQL Slammer worm contribute to the argument for taking multiple views of the network. Figure 3 and 4 show the affects of this worm on Agilent s border routers. COSBDR1-Peer-AT&T Prefixes Advertised to Agilent 3:00am 1/24 to 3pm 1/25 Sapphire Worm Effects COSBDR1-Peer-AT&T BGP InMessages/Minute 3:00am 1/24 to 3pm 1/25 Sapphire Worm Effects Prefixes 117, , , , , , , , , ,500 Measurement System Unplugged from Net :00 AM 5:00 AM 7:00 AM 9:00 AM 11:00 AM 1:00 PM 3:00 PM 5:00 PM 7:00 PM 9:00 PM 11:00 PM 1:00 AM 3:00 AM 5:00 AM 7:00 AM 9:00 AM 11:00 AM 1:00 PM 3:00 PM 3:00 AM 4:45 AM 6:30 AM 8:15 AM 10:00 AM 11:45 AM 1:30 PM 3:15 PM 5:00 PM 6:45 PM 8:30 PM 10:15 PM 12:00 AM 1:45 AM 3:30 AM 5:15 AM 7:00 AM 8:45 AM 10:30 AM 12:15 PM 2:00 PM BGP InMessages/Minute Measurement System Unplugged from Net Time Time Figure 3 Figure 4 An engineer looking first at their own edge routers and seeing the graphs in figures 3 and 4 and then looking at the global perspective, and seeing the spikes shown in figure 2 would immediately know that there was a global problem with routing and that the affects being seen on their network were being seen across the globe. They could then troubleshoot from a much different, and more informed perspective. Moreover, using this information in combination with network element and service management information would have likely shown increased data traffic on particular links, primarily those with infected systems. The provider would be able to see that the routing problems inside their own network were being caused by possibly overloaded links and not an attack on a router. They could then focus on correlating changes being viewed in network service and network element behavior with the times of the routing anomalies to help identify the type of traffic that was overloading the links and could then put in place filters or shut down the systems generating the traffic. This approach would have been much more efficient than the troubleshooting techniques used when little or no information is available. Page 15 of 17

16 Looking at one s own network from specific user-selected perspectives, automatically, is also being explored. The approach here, as a prototype, is to enable the user to select specific prefixes to be monitored along with perspectives desired, for instance, only from Europe, or Asia, or from AS 1, 2 and 3. The prefixes will be monitored automatically from various public looking glasses with the results compiled in a database. Using this tool, a provider could verify the proper advertisement of a new customer or quickly and automatically check the availability of a prefix during troubleshooting. Agilent Labs has also created a testbed to begin to analyze the affects of routing control traffic on router performance and to begin to look at prediction of instability in routes based on TCP behavior. This is ongoing work and is being conducted in cooperation with the Technical University of Munich, the University of Massachusetts, and the Cooperative Association of Internet Data Analysis (CAIDA). Conclusion Service management and network element management can provide much of the required information to successfully operate a network, however, they are only two legs of the OSS stool. Missing is routing analysis. Much can be learned by analysis of routing behavior. Using multiple perspectives and combining the information learned from routing analysis with that from network element and service management, it will be much less likely that network operators are looking at green icons when the phone rings. References [LA98] [FR00] [Ah01] [La99] C. Labovitz, A. Ahjua, Experimental Study of Internet Stability and Wide-Area Backbone Failures, SIGCOMM 2000, A. Feldman, J. Rexford, IP Network Configuration for Traffic Engineering, H. Ahmadi, IP Network Management, Traffic Measurement and Performance Capabilities, A Labs-Research News, 9/ C. Labovitz, Scalability of the Internet Backbone Routing Infrastructure, Ph.D. thesis, Univer of Michigan, 1999, Page 16 of 17

17 2978/SCALABILITY_OF_THE_INTERNET_BACKBONE_ROUTING_INFRASTRUCTUR Page 17 of 17

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service

More information

Best Practices for Eliminating Risk from Routing Changes

Best Practices for Eliminating Risk from Routing Changes Best Practices for Eliminating Risk from Routing Changes TECHNICAL BRIEF Table of Contents Introduction 3 Route Analytics Intelligence to Meet the Routing Management Challenge 3 Routing Management Best

More information

Enhancing Network Monitoring with Route Analytics

Enhancing Network Monitoring with Route Analytics with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN

More information

KT The Value Networking Company

KT The Value Networking Company KT The Value Networking Company IRIMS (Internet Routing Information Management System) 2005. 9 Y.D. KIM, G.E.KIM, C.K.Hwang, J.H.YOO (webman, gekim, ckhwang, styoo@kt kt.co..co.kr) Abstract An AS (Autonomous

More information

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers

More information

Introduction to Routing

Introduction to Routing Introduction to Routing How traffic flows on the Internet Philip Smith pfs@cisco.com RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,

More information

Security Toolsets for ISP Defense

Security Toolsets for ISP Defense Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.

More information

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand

More information

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router

More information

Inter-domain Routing. Outline. Border Gateway Protocol

Inter-domain Routing. Outline. Border Gateway Protocol Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small

More information

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to: Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations

More information

Traffic Analysis with Netflow The Key to Network Visibility

Traffic Analysis with Netflow The Key to Network Visibility Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications

More information

Global Network Mobility NANOG 31

Global Network Mobility NANOG 31 Ben Abarbanel cbbrouting@boeing.com Global Network Mobility NANOG 31 Implementing Global Network Mobility What is Connexion by Boeing? Summary of the problem Network and Service Challenges BGP as a mobility

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Outline. Outline. Outline

Outline. Outline. Outline Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather

More information

Traffic Analysis With Netflow. The Key to Network Visibility

Traffic Analysis With Netflow. The Key to Network Visibility Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

Intelligent Routing Platform White Paper

Intelligent Routing Platform White Paper White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5

More information

TECHNOLOGY WHITE PAPER. Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform

TECHNOLOGY WHITE PAPER. Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform TECHNOLOGY WHITE PAPER Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform Abstract Enterprises are expanding their private clouds and extending

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

GLOBAL SERVER LOAD BALANCING WITH SERVERIRON

GLOBAL SERVER LOAD BALANCING WITH SERVERIRON APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the

More information

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many

More information

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Troubleshooting and Maintaining Cisco IP Networks Volume 1 Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training

More information

Approaches for DDoS an ISP Perspective. barry@null0.net ognian.mitev@viawest.com

Approaches for DDoS an ISP Perspective. barry@null0.net ognian.mitev@viawest.com Approaches for DDoS an ISP Perspective barry@null0.net ognian.mitev@viawest.com Home School How everyone starts It s all up to you It s inexpensive (compared to other forms of education) Quality may not

More information

Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002

Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002 Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002 The Internet is coming of age, in large part because of its ability to open up markets and to

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management Taking the Guesswork Out of Network Performance Management EXECUTIVE SUMMARY Many enterprise

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton University Motivation Routing anomalies are

More information

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

The Case for an Internet Health Monitoring System

The Case for an Internet Health Monitoring System The Case for an Internet Health Monitoring System Matthew Caesar, Lakshminarayanan Subramanian, Randy H. Katz mccaesar,lakme,randy @cs.berkeley.edu Abstract Internet routing is plagued with several problems

More information

Gaining Operational Efficiencies with the Enterasys S-Series

Gaining Operational Efficiencies with the Enterasys S-Series Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction

More information

Best Practices for NetFlow/IPFIX Analysis and Reporting

Best Practices for NetFlow/IPFIX Analysis and Reporting WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management

More information

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone 3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement

More information

TELE 301 Network Management

TELE 301 Network Management TELE 301 Network Management Lecture 22: Diagnostics & Ethics Haibo Zhang Computer Science, University of Otago TELE301 Lecture 22: Diagnostics & Ethics 1 Fault Management Fault management It means preventing,

More information

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,

More information

#41 D A N T E I N P R I N T. TEN-155 Multicast: MBGP and MSDP monitoring. Jan Novak Saverio Pangoli

#41 D A N T E I N P R I N T. TEN-155 Multicast: MBGP and MSDP monitoring. Jan Novak Saverio Pangoli D A N T E I N P R I N T TEN-155 Multicast: #41 MBGP and MSDP monitoring Jan Novak Saverio Pangoli DANTE IN PRINT is a track record of papers and articles published by, or on behalf of DANTE. An HTML version

More information

Studying Black Holes on the Internet with Hubble

Studying Black Holes on the Internet with Hubble Studying Black Holes on the Internet with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson University of Washington August 2008 This

More information

Understanding Large Internet Service Provider Backbone Networks

Understanding Large Internet Service Provider Backbone Networks Understanding Large Internet Service Provider Backbone Networks Joel M. Gottlieb IP Network Management & Performance Department AT&T Labs Research Florham Park, New Jersey joel@research.att.com Purpose

More information

DNS Best Practices. Mike Jager Network Startup Resource Center mike@nsrc.org

DNS Best Practices. Mike Jager Network Startup Resource Center mike@nsrc.org DNS Best Practices Mike Jager Network Startup Resource Center mike@nsrc.org This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be

More information

Global Network Mobility RIPE 48

Global Network Mobility RIPE 48 John Bender Don Bowman cbbrouting@boeing.com Global Network Mobility RIPE 48 Implementing Network Mobility Summary What is Connexion by Boeing? Network and Service Challenges BGP as a mobility solution

More information

BGP. 1. Internet Routing

BGP. 1. Internet Routing BGP 1. Internet Routing (C) Herbert Haas 2005/03/11 1 Internet Routing Interior Gateway Protocols (IGPs) not suitable for Inter-ISP routing Technical metrics only No policy features Inter-ISP routing is

More information

How Cisco IT Protects Against Distributed Denial of Service Attacks

How Cisco IT Protects Against Distributed Denial of Service Attacks How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN

More information

perfsonar Overview Jason Zurawski, ESnet zurawski@es.net Southern Partnerships for Advanced Networking November 3 rd 2015

perfsonar Overview Jason Zurawski, ESnet zurawski@es.net Southern Partnerships for Advanced Networking November 3 rd 2015 perfsonar Overview Jason Zurawski, ESnet zurawski@es.net Southern Partnerships for Advanced Networking November 3 rd 2015 This document is a result of work by the perfsonar Project (http://www.perfsonar.net)

More information

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

SolarWinds Certified Professional. Exam Preparation Guide

SolarWinds Certified Professional. Exam Preparation Guide SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how

More information

A Systematic Approach to BGP Configuration Checking

A Systematic Approach to BGP Configuration Checking A Systematic Approach to BGP Configuration Checking Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory {feamster,hari}@lcs.mit.edu http://nms.lcs.mit.edu/bgp/

More information

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes

More information

Avoiding the Frailties of the Internet with Intelligent Route Control

Avoiding the Frailties of the Internet with Intelligent Route Control Avoiding the Frailties of the Internet with Intelligent Route Control In any business climate, it is necessary to be prepared for contingencies that may affect business-critical operations. Business continuity

More information

BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45

BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003 On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

Claudio Jeker. RIPE 41 Meeting Amsterdam, 15. January 2002. oppermann@pipeline.ch. jeker@n-r-g.com. Using BGP topology information for DNS RR sorting

Claudio Jeker. RIPE 41 Meeting Amsterdam, 15. January 2002. oppermann@pipeline.ch. jeker@n-r-g.com. Using BGP topology information for DNS RR sorting BGPDNS Using BGP topology information for DNS RR sorting a scalable way of multi-homing André Oppermann oppermann@pipeline.ch Claudio Jeker jeker@n-r-g.com RIPE 41 Meeting Amsterdam, 15. January 2002 What

More information

BT Internet Connect Global - Annex to the General Service Schedule

BT Internet Connect Global - Annex to the General Service Schedule 1. Definitions The following definitions apply, in addition to those in the General Terms and Conditions and the General Services Schedule. ARP means Address Resolution Protocol. Border Gateway Protocol

More information

Validating the System Behavior of Large-Scale Networked Computers

Validating the System Behavior of Large-Scale Networked Computers Validating the System Behavior of Large-Scale Networked Computers Chen-Nee Chuah Robust & Ubiquitous Networking (RUBINET) Lab http://www.ece.ucdavis.edu/rubinet Electrical & Computer Engineering University

More information

Cisco Network Foundation Protection Overview

Cisco Network Foundation Protection Overview Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and

More information

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com 10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the

More information

SURE 5 Zone DDoS PROTECTION SERVICE

SURE 5 Zone DDoS PROTECTION SERVICE SURE 5 Zone DDoS PROTECTION SERVICE Sure 5 Zone DDoS Protection ( the Service ) provides a solution to protect our customer s sites against Distributed Denial of Service (DDoS) attacks by analysing incoming

More information

IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources

IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,

More information

Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001

Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001 Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001 Virtual routing is a software design method used to provide multiple independent routers that share

More information

How To Manage A Network

How To Manage A Network Network Management Keeping the Network Alive from Afar Network management is the process of documenting, monitoring, troubleshooting, and configuring network devices. Network management gives visibility

More information

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications

More information

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe

More information

Contact Center Technology Monitoring

Contact Center Technology Monitoring tech line / oct 2012 Contact Center Technology Monitoring Monitoring allows companies to detect outages and issues for quick resolution, and enables effective planning for prevention and optimization going

More information

Troubleshooting an Enterprise Network

Troubleshooting an Enterprise Network Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco

More information

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers

More information

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As) Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia

More information

How to Configure BGP Tech Note

How to Configure BGP Tech Note How to Configure BGP Tech Note This document gives step by step instructions for configuring and testing full-mesh multi-homed ebgp using Palo Alto Networks devices in both an Active/Passive and Active/Active

More information

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for

More information

Troubleshooting on Intra-Domain Routing Instability

Troubleshooting on Intra-Domain Routing Instability Troubleshooting on Intra-Domain Routing Instability Zhang Shu National Institute of Information and Communications Technology 4-2-1 Nukui-kitamachi, Koganei, Tokyo Japan 184-8795 zhang@koganei.wide.ad.jp

More information

ANATOMY OF A CODE RED II ATTACK

ANATOMY OF A CODE RED II ATTACK ANATOMY OF A CODE RED II ATTACK IMPROVING FIREWALL SECURITY USING PATROL FOR CHECK POINT FIREWALL-1 BILL KENNON, SENIOR SOFTWARE CONSULTANT BMC SOFTWARE, INC 1 The Surprise Attack As the NT Systems Administrator

More information

Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006

Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006 Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006 The modern enterprise relies on its web sites to provide information

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,

More information

Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka

Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka Tim Evens (tievens@cisco.com) NANOG-65 Traditional Method: VTY (cli/netconf/xml) Data is polled instead of pushed (not real-time) Large queries

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

APPLICATION PERFORMANCE MONITORING

APPLICATION PERFORMANCE MONITORING APPLICATION PERFORMANCE MONITORING PRACTICAL WAYS TO MONITOR THE END USER EXPERIENCE WHITE PAPER Performance of key applications is a critical item to monitor in many IT environments where users depend

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu ABSTRACT

More information

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

Extending Network Visibility by Leveraging NetFlow and sflow Technologies Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks

More information

Effect of anycast on K-root

Effect of anycast on K-root Effect of anycast on K-root Some early results 1 K root anycast deployment 3 global nodes (BGP transit) LINX... 5459 25152 25152 i AMS-IX... 25152 25152 25152 i Tokyo (since 5/2005)... 25152 25152 25152

More information

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling

More information

WEB SERVER MONITORING SORIN POPA

WEB SERVER MONITORING SORIN POPA WEB SERVER MONITORING SORIN POPA Keywords: monitoring systems, web server, monitoring process Sorin POPA, Associate Professor, PhD. University of Craiova Abstract. This paper introduces web-server monitoring,

More information

Towards a virtualized Internet for computer networking assignments

Towards a virtualized Internet for computer networking assignments Towards a virtualized Internet for computer networking assignments Luis Bellido, David Fernández, Encama Pastor Abstract By combining virtualization technologies, virtual private network techniques and

More information

Detecting BGP hijacks in 2014

Detecting BGP hijacks in 2014 Detecting BGP hijacks in 2014 Guillaume Valadon & Nicolas Vivet Agence nationale de la sécurité des systèmes d information http://www.ssi.gouv.fr/en NSC - November 21th, 2014 ANSSI - Detecting BGP hijacks

More information

Interconnecting IPv6 Domains Using Tunnels

Interconnecting IPv6 Domains Using Tunnels Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how

More information

DEGREE THESIS. Improving Network Performance by Implementing the Path Control Tools. Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim

DEGREE THESIS. Improving Network Performance by Implementing the Path Control Tools. Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim Network Design and Computer Management, 120 HP DEGREE THESIS Improving Network Performance by Implementing the Path Control Tools Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim Network Project

More information

Company & Solution Profile

Company & Solution Profile Company & Solution Profile About Us NMSWorks Software Limited is an information technology company specializing in developing Carrier grade Integrated Network Management Solutions for the emerging convergent

More information

F5 Silverline DDoS Protection Onboarding: Technical Note

F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Using the Border Gateway Protocol for Interdomain Routing

Using the Border Gateway Protocol for Interdomain Routing CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous

More information

NETWORK TO NETWORK INTERFACE PLAN

NETWORK TO NETWORK INTERFACE PLAN AT&T will provide interconnect points at both the Network Security Operations Center (NSOC) and the Sam Houston Building (SHB), the prescribed DIR locations via AT&T s VPN (AVPN) service. The standards-based

More information

Seminar Seite 1 von 10

Seminar Seite 1 von 10 Seminar Seite 1 von 10 CISCO - Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Dauer: 5 Tage Kosten: 2.490,00 EUR (pro Person / zzgl. MwSt) Ziele: Der Kurs Implementing Cisco Switched Networks

More information