Understanding the Internet AS-level Structure

Size: px
Start display at page:

Download "Understanding the Internet AS-level Structure"

Transcription

1 UNIVERSITY OF CALIFORNIA Los Angeles Understanding the Internet AS-level Structure A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science by Ricardo V. Oliveira 2009

2

3 The dissertation of Ricardo V. Oliveira is approved. Yingnian Wu Beichuan Zhang Mario Gerla Songwu Lu Leonard Kleinrock Lixia Zhang, Committee Chair University of California, Los Angeles 2009 ii

4 To my Parents... for their unconditional love and affection iii

5 TABLE OF CONTENTS 1 Introduction Background Internet Routing Inter-domain Connectivity and Peering Ground Truth vs. Observed Map Topology Liveness and Completeness Problems A Solution to the Liveness Problem An Empirical Model of Observed Topology Dynamics Data Sets An Empirical Model Comparison with router configuration files from a Tier Comparison with Internet Registry Data Evaluation of Traceroute Data Applications More Accurate View of the Topology Evaluating Theoretical Models Characterizing Evolution Trends Discussion iv

6 5 Quantifying the Topology (in)completeness Data Sets Establishing the Ground Truth Case studies Tier-1 Network Tier-2 Network Abilene and Geant Content provider Simple stubs Completeness of the public view Public view vs. ground truth Network Classification Coverage of the public view Discussion Path Exploration and Internet Topology BGP Path Exploration Methodology and Data Set Data Set and Preprocessing Clustering Updates into Events Classifying Routing Events Comparing AS Paths Characterizing Events v

7 6.3.1 The Impact of Unstable Prefixes Policies, Topology and Routing Convergence MRAI Timer The Impact of Policy and Topology on Routing Convergence Origin of Fail-down Events Impact of Fail-down Convergence Prefix Hijacking and Internet Topology Prefix Hijacking Hijack Evaluation Metrics Evaluating Hijacks Simulation Setup Characterizing Topological Resilience Factors Affecting Resilience Prefix Hijack Incidents in the Internet Case I: Prefix Hijacks by AS Case II: Prefix Hijacks by AS Discussion Related Work Internet Topology Modeling Path Exploration Prefix Hijacking vi

8 9 Conclusion References vii

9 LIST OF FIGURES 2.1 Route propagation A sample IXP. ASes A through G connect to each other through a layer-2 switch in subnet / A set of interconnected ASes, each node represent an AS. (a) shows an example of hidden links, and (b) an example of invisible links Observing Topology Over Time Number of links captured by different sets of monitors Number of monitors in RouteViews and RIPE-RIS combined Number of links, Tier-1 monitor with different starting times Visible links seen by all monitors Link disappearance period Link disappearance period, by all monitors Observation period as a function of confidence level for links Node birth from RIR Link birth from IRR Link death from IRR Visible links in Skitter, λ = , b = Comparison between routers config files connectivity and BGP data (cumulative) from a Tier-1 network Comparison of appearance times between routers config files and BGP data of a Tier-1 network viii

10 4.14 Link disappearance period, by Skitter, µ = , d = Comparison of appearance timestamps between Skitter and BGP Comparison of disappearance timestamps between Skitter and BGP Number of reachable addresses in Skitter destination list Trade-off between liveness and completeness for topology snapshot Fraction of multi-homed customers Attachment probability distribution for a target node degree Model evaluation Node net growth Link net growth Net growth of node wirings Frequency of link changes Number of collected links in DIMES Diurnal pattern of new link appearances Weekly pattern of new link appearances Link growth for Abilene (AS11537) Output of show ip bgp summary command Configuring remote BGP peerings. R 0 and R 2 are physically directly connected, while R 1 and R 3 are not Connectivity of the Tier-1 network (since 2004) Connectivity of the Tier-1 network (since 2007) Capturing the connectivity of the Tier-1 network through table snapshots and updates ix

11 5.6 Tier-2 network connectivity Capturing Tier-2 network connectivity through table snapshots and updates Abilene connectivity Projection of the number of peer ASes of a representative content provider Customer-provider links can be revealed over time, but downstream peer links are invisible to upstream monitors Distribution of number of downstream customers per AS Example of a prefix hijack scenario where AS2 announces prefix p belonging to AS1. Because of the invisible peer link AS2 AS3, the number of ASes affected by the attack is underestimated Path exploration triggered by a fail-down event CCDF of inter-arrival times of BGP updates for the 8 beacon prefixes as observed from the 50 monitors Difference in number of events per [monitor,prefix] for T =2 and 8 minutes, relatively to T =4 minutes, during one month period Event taxonomy Usage time per ASPATH-Prefix for router , Jan Validation of path preference metric Comparison between C correct,c equal and C wrong of length, policy and usage time metrics for (a) T up and (b) T down events of beacon prefixes Comparison between accuracy of length, policy and usage time metrics Number of T down events per monitor x

12 6.10 Duration of events for January Duration of events for February Number of Updates per Event, January Number of Unique Paths Explored per Event, January Duration of events for unstable prefixes, January Duration of events for stable prefixes, January Determining MRAI configuration Duration of T down events as seen by monitors at different tiers Number of unique paths explored during T down as seen by monitors at different tiers Topology example Duration of T down events observed and originated in different tiers Number of paths explored during T down events observed and originated in different tiers Median of duration of T down events observed and originated in different tiers Number of T down events over time Case where T down convergence disrupts data delivery Hijack scenario Distribution of node resilience Resilience of nodes in different tiers Understanding resilience of tier-1 nodes Resilience of nodes with different number of Tier-1 providers xi

13 7.6 Case study: AS as false origin Case studies with AS-9121 as false origin xii

14 LIST OF TABLES 4.1 Model Parameters Comparison Between Stub and Transit changes IXP membership data, July Connectivity of stub networks Coverage of BGP monitors Coverage of BGP monitors for different network types Event Statistics for Jan 2006 (31 days) Event Statistics for Feb 2006 (28 days) T down Events by Origin AS xiii

15 ACKNOWLEDGMENTS First and foremost, I would like to acknowledge my dissertation advisor Dr. Lixia Zhang for her constant support and guidance through out my dissertation. I would also like to acknowledge Dr. Mohit Lad for his infinite patience, helpful discussions and relentless support. I am also grateful to Dr. Beichuan Zhang for contributing to the original idea of modeling topology evolution by a birth/death model, Dr. Walter Willinger and Dr. Dan Pei for their guidance during the AT&T internship, Dr. Christophe Diot for his guidance during Thomson internship and Dr. Qingming Ma for his supervision while at Juniper Networks. I would like to extend a special note of thanks to Verra Morgan for her time and support during my Ph.D. Finally, various friends and colleagues have played an important role during my Ph.D., notable among them are Dr. Vasilis Pappas, Dr. Dan Massey, Rafit Izhak-Ratzin, Cesar Marcondes, Cassio Lopes, Niko Palaskas, Bruno Miranda, Leonardo Alves and my sister Raquel Oliveira. Finally, I would like to acknowledge the portuguese Fundacao para a Ciencia e Tecnologia (FCT) for their scholarships under which my Phd work was supported. xiv

16 VITA 1978 Born, Povoa de Varzim, Portugal 2001 B.E. Electrical Engineering, Faculty of Engineering of Porto University, Portugal Software developer, Oberonsis, Portugal Telecommunications Engineer, TMN, Portugal M.Sc. Computer Science, University of California, Los Angeles Intern at AT&T Labs Research Intern at Thomson, Paris Intern at Juniper Networks. PUBLICATIONS 1. Ricardo Oliveira, Dan Pei, Walter Willinger, Beichuan Zhang, Lixia Zhang, The (in)completeness of the Observed Internet AS-level Structure, to appear in IEEE/ACM Transactions on Networking 2. Ricardo Oliveira, Beichuan Zhang, Dan Pei, Lixia Zhang, Quantifying Path Exploration in the Internet, to appear in IEEE/ACM Transactions on Networking, June xv

17 Italo Cunha, Fernando Silveira, Ricardo Oliveira, Renata Teixeira, Christophe Diot, Uncovering Artifacts of Flow Measurement Tools,Passive and Active Measurement Conference, April He Yan, Ricardo Oliveira, Kevin Burnett, Dave Matthews, Lixia Zhang, Dan Massey, BGPmon: A real-time, scalable, extensible monitoring system, Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH), March Ricardo Oliveira, Fernando Silveira, Renata Teixeira, Christophe Diot, The elusive Effect of Routing Dynamics on Traffic Anomalies, Technical Report, Thomson, CR- PRL Ricardo Oliveira, Dan Pei, Walter Willinger, Beichuan Zhang, Lixia Zhang, Quantifying the Completeness of the Observed Internet AS-level Structure, Technical Report, UCLA CS Department, TR , September Ying-Ju Chi, Ricardo Oliveira, Lixia Zhang, Cyclops: The Internet AS-level Observatory, ACM SIGCOMM Computer Communication Review (CCR), October Ricardo Oliveira, Ying-Ju Chi, Mohit Lad, Lixia Zhang, Cyclops: The Internet AS-level Observatory, NANOG 43, Brooklyn, New York, June 2008 xvi

18 9. Ricardo Oliveira, Dan Pei, Walter Willinger, Beichuan Zhang, Lixia Zhang, In Search of the elusive Ground Truth: The Internet s AS-level Connectivity Structure, ACM SIGMETRICS, Annapolis, USA, June Ricardo Oliveira, Mohit Lad, Beichuan Zhang, Lixia Zhang, Geographically Informed Inter-Domain Routing, in IEEE ICNP, Beijing, China, October Mohit Lad, Ricardo Oliveira, Dan Massey, Lixia Zhang, Inferring the Origin of Routing Changes using Link Weights, in IEEE ICNP, Beijing, China, October Ricardo Oliveira, Beichuan Zhang, Lixia Zhang, Observing the Evolution of Internet AS Topology, in ACM SIGCOMM, Kyoto, Japan, August Ricardo Oliveira, Ying-Ju Chi, Ioannis Pefkianakis, Mohit Lad, Lixia Zhang, Visualizing Internet Topology Dynamics with Cyclops, in ACM SIGCOMM (poster session), Kyoto, Japan, August Mohit Lad, Ricardo Oliveira, Beichuan Zhang, Lixia Zhang, Understanding the Resiliency of Internet Topology Against False Origin Attacks, in IEEE/IFIP DSN,Edinburgh, UK, June Ricardo Oliveira, Beichuan Zhang, Dan Pei, Rafit Izhak-Ratzin, Lixia Zhang, Quantifying Path Exploration in the Internet, ACM SIGCOMM/USENIX Internet Measurement Conference(IMC), Rio de Janeiro, Brazil, October Mohit Lad, Ricardo Oliveira, Beichuan Zhang, Lixia Zhang, Understanding the xvii

19 Impact of Prefix Hijacks in Internet Routing, ACM SIGCOMM (poster session), Pisa, Italy, September Beichuan Zhang, Vamsi Kambhampati, Daniel Massey, Ricardo Oliveira, Dan Pei, Lan Wang, Lixia Zhang A Secure and Scalable Internet Routing Architecture (SIRA), ACM SIGCOMM (poster session), Pisa, Italy, September Ricardo Oliveira, Mohit Lad, Beichuan Zhang, Dan Pei, Daniel Massey, Lixia Zhang, Placing BGP Monitors in the Internet, Technical Report, UCLA CS Department, TR , May Vidyut Samanta, Ricardo Oliveira, Advait Dixit, Parixit Aghera, Petros Zerfos, Songwu Lu, Impact of Video Encoding Parameters on Dynamic Video Transcoding, in IEEE COMSWARE, Delhi, India, January Ricardo Oliveira, Rafit Izhak-Ratzin, Beichuan Zhang, Lixia Zhang, Measurement of Highly Active Prefixes in BGP, in IEEE GLOBECOM, St. Louis, USA, November xviii

20 ABSTRACT OF THE DISSERTATION Understanding the Internet AS-level Structure by Ricardo V. Oliveira Doctor of Philosophy in Computer Science University of California, Los Angeles, 2009 Professor Lixia Zhang, Chair The Internet is a vast distributed system consisting of a myriad of independent networks interconnected to each other by business relationships. The border gateway protocol is the glue that keeps this structure connected. Characterizing and modeling the Internet topology is important to our understanding of Internet routing and its interplay with technical, economic and social forces. In this thesis we address several challenges that emerge when studying the Internet connectivity. First, not all the observed changes in connectivity correspond to actual changes in the topology. There are changes that may be caused by transient routing dynamics while others are real topology changes. The problem of distinguishing between these two types of changes is non-trivial, and we call it the liveness problem. We propose a solution to this problem based on a birth/death model of observed links. This solution allows to accurately detect the permanent changes in the Internet topology graph and measure topology dynamics in an accurate way. The second problem in obtaining accurate topology models is the completeness problem, which consists in establishing how much of the real topology is missing from the observed data. We address the completeness problem by defining some bounds on how (in)complete is the graph provided by the current observation. The results using ground truth information obtained from a Tier-1 ISP inxix

21 dicate that the observed Internet graph contains most of the customer-provider links, but may be missing the vast majority of the peer-peer links. Finally, we study how protocol properties such as routing convergence and resilience to prefix hijack attacks depend on the connectivity and relationship between networks. We find that networks at the border of the Internet undergo more severe path exploration because of the higher number of paths available to reach other destinations. On the other hand, we show that Tier-1 networks have the fastest convergence time because of the limited number of alternative routes. In terms of prefix hijack attacks, we surprisingly find that Tier-1 networks at the core of the Internet are vulnerable to hijack attacks from customers because of the business nature of BGP route selection. Based on our observations, we formulate a connectivity recommendation for ISPs to increase their resiliency to these type of attacks. xx

22 CHAPTER 1 Introduction The Internet has been evolving rapidly over recent years, much like a living organism, and its topology has become more complex. Characterizing the structure and evolution trends of the Internet topology is an important research topic for several reasons. It provides an essential input to the understanding of limitations of existing routing protocols, the evaluations of new designs, as well as the projection of future needs; and it will help advance our understanding of the interplay between networking technology, the resulting topology, and the economic forces behind them. Many research projects have used a graphic representation of the Internet AS-level topology, where nodes represent entire autonomous systems (ASes) and two nodes are connected if and only if the two ASes are engaged in a business relationship to exchange data traffic. Due to the Internet s decentralized architecture, however, this AS-level construct is not readily available and obtaining accurate AS maps has remained an active area of research. A common feature of all the AS maps that have been used by the research community is that they have been inferred from either BGPbased or traceroute-based data. Unfortunately, both types of measurements are more a reflection of what we can measure than what we really would like to measure, resulting in fundamental limitations as far as their ability to reveal the Internet s true AS-level connectivity structure is concerned. While these limitations inherent in the available data have long been recognized, there has been little effort in assessing the degree of completeness, accuracy, and am- 1

23 biguity of the resulting AS maps. Although it is relatively easy to collect a more or less complete set of ASes, it has proven difficult, if not impossible, to collect the complete set of inter-as links. The sheer scale of the AS-level Internet makes it infeasible to install monitors everywhere or crawl the topology exhaustively. At the same time, big stakeholders of the AS-level Internet, such as Internet service providers and large content providers, tend to view their AS connectivity as proprietary information and are in general unwilling to disclose it. As a result, the quality of the currently used AS maps has remained by and large unknown. Yet numerous projects [37, 55, 59, 20, 31, 29, 91] have been conducted using these maps of unknown quality, causing serious scientific and practical concerns in terms of the validity of the claims made and accuracy of the results reported. Obtaining accurate and complete Internet topology data is a challenging task. First, the observed AS topology snapshots only capture a subset of the real Internet topology [27, 99, 60, 77, 96, 70]. This is referred as the completeness problem. The incompleteness of the observed AS topology stems from the fact that our main source of connectivity data are BGP routing tables (Border Gateway Protocol), and BGP was designed to propagate routing information, not AS adjacencies. In BGP, only the best path is propagated to neighbors, and not all neighbors receive all routes, therefore it s only natural that there is missing connectivity information when using a limited number of vantage points. By using ground truth information of a Tier-1 ISP, we quantify to some extent the degree of incompleteness of the observed topology. We find that current set of vantage points are able to capture the totality of customer-provider links, but as much as 90% of the peer links are still escaping from observation. The invisible peer links exist mainly between nodes at the border of the network. Second, a new problem arises when we try to measure topology changes over time: the changes in the observed topology do not necessarily reflect the changes in the 2

24 real topology and vice versa. Because the observed topology is normally inferred from routing or data paths, its changes can be due to either real topology changes or transient routing dynamics (e.g., caused by link failures or router crashes). Therefore the challenge is, given all the changes in the observed topology over time, how to differentiate those caused by real topology changes from those caused by transient routing dynamics, which we call the liveness problem. Only after solving the liveness problem can we provide empirical topology evolution data such as when and where an AS or an inter-as link is added or removed from the Internet. In this thesis we develop a solution to the liveness problem based on the analysis of available data. Our analysis shows that the effect of transient routing dynamics on the observed topology decreases exponentially over time, and the real topology changes can be modeled as the combination of a constant-rate birth process and a constant-rate death process. There are several properties of BGP that depend on the structure of the Internet topology. In this thesis we study two of these properties: path exploration and resiliency to prefix hijacks. Before declaring a destination unreachable, BGP explores all backup paths until it finds a valid one. We call this process path exploration. In order to reduce delays and data loss during routing convergence, path exploration should happen as fast as possible. We show that path exploration depends on the number of alternative paths between the source and the destination, and that nodes at the border of the network with more alternative paths will experience more severe convergence delays than nodes at the core of the network. Other protocol property(or deficiency) that depends heavily on the topology is the resiliency of a node to prefix hijacks. A prefix hijack attack happens when a network X starts announcing address space that belongs to a network Y. The end result is that a fraction of the traffic will be deviated to the false origin. In some cases the false origin can even intercept the traffic and send it back to the true origin. After conducting a set of Internet scale simulations we find that networks connected with multiple Tier-1s are the most resilient to this type of 3

25 attacks. Furthermore, we also surprisingly find that Tier-1s at the core of the network are more vulnerable to prefix hijacks launched by its customers because of the policy factor in BGP route selection. The main contributions of this dissertation can be summarized as follows. First, we formulate the topology liveness problem and propose a solution for it, this is described in Chapter 4. Second, we investigate the completeness of the observed AS topology by quantifying and explaining the reasons why AS adjacencies are missing from commonly used data sources, which is described in Chapter 5. Third, in Chapter 6 we establish the dependency between the convergence of BGP routes and the topological location of both the monitor and the origin of the routes. Lastly, in Chapter 7 we show how the resiliency of networks to prefix hijack depends on how close to the Tier-1 core each network is connected. 4

26 CHAPTER 2 Background In this section we present the relevant background on Internet routing and relationships between different networks. 2.1 Internet Routing The Internet consists of more than thirty thousand networks called Autonomous Systems (AS). Each AS is represented by a unique numeric ID known as its AS number, and may advertise one or more IP address prefixes. For example, the prefix /16 represents a range of 2 16 IP addresses belonging to AS-52 (UCLA). Internet Registries such as ARIN and RIPE assign prefixes to organizations, who then become the owner of the prefixes. Automonous Systems run the Border Gateway Protocol (BGP) [78] to propagate prefix reachability information among themselves. In the rest of the thesis, we abstract an autonomous system into a single entity called AS node or node, and the BGP connection between two autonomous systems as AS link or simply link. BGP uses routing update messages to propagate routing changes. As a path-vector routing protocol, BGP lists the entire AS path to reach a destination prefix in its routing updates. Route selection and announcement in BGP are determined by networks routing policies, in which the business relationship between two connected ASes plays a major role. AS relationships can be generally classified as customer-provider or peer- 5

27 peer 1. In a customer-provider relationship, the customer AS pays the provider AS for access service to the rest of the Internet. The peer-peer relationship does not usually involve monetary flow; The two peer ASes exchange traffic between their respective customers only. Usually a customer AS does not forward traffic between its providers, nor does a peer AS forward traffic between two other peers. For example in Figure 2.1, AS-1 is a customer of AS-2 and AS-3, and hence would not want to be a transit between AS-2 and AS-3, since it would be pay both AS-2 and AS-3 for traffic exchange between themselves. This results in the so-called valley-free BGP paths [39] generally observed in the Internet. When ASes choose their best path, they usually follow the order of customer routes, peer routes, and provider routes. This policy of no valley prefer customer is generally followed by most networks in the Internet. As we will see later, the no valley prefer customer policy plays an important role in determining the impact of prefix hijacks and hence we present a simple example to illustrate how this policy works. Figure 2.1 provides a simple example illustrating route selection and propagation. AS-1 announces a prefix (e.g /16) to its upstream service providers AS-2 and AS-3. The AS announcing a prefix to the rest of the Internet is called the origin AS of that prefix. Each of these providers then prepends its own AS number to the path and propagates the path to their neighbors. Note that AS-3 receives paths from its customer, AS-1, as well as its peer, AS-2, and it selects the customer path over the peer path thus advertising the path {3 1} to its neighbors AS-4 and AS-5. AS-5 receives routes from AS-2 and AS-3 and we assume AS-5 selects the route announced by AS- 3 and announces the path {5 3 1} to its customer AS-6. In general, an AS chooses which routes to import from its neighbors and which routes to export to its neighbors based on import and export routing policies. An AS receiving multiple routes picks 1 Sometimes the relationship between two AS nodes can be siblings, usually because they belong to the same organization. 6

28 Provider Customer Peer Peer Tier Figure 2.1: Route propagation. the best route based on policy preference. Metrics such as path length and other BGP parameters are used in route selection if the policy is the same for different routes. The BGP decision process also contains many more parameters that can be configured to mark the preference of routes. A good explanation of these parameters can be found in [41]. 2.2 Inter-domain Connectivity and Peering As a path-vector protocol, BGP includes in its routing updates the entire AS-level path to each prefix, which can be used to infer the AS-level connectivity. Projects such as RouteViews [15] and RIPE-RIS [14] host multiple data collectors that establish BGP sessions with operational routers, which we term monitors, in hundreds of ASes to obtain their BGP forwarding tables and routing updates over time. Among all the ASes, less than 10% are transit networks, and the rest are stub networks. A transit network is an Internet Service Provider (ISP) whose business is to provide packet forwarding service between other networks. Stub networks, on the 7

29 A B G C F D Layer-2 cloud IXP E Figure 2.2: A sample IXP. ASes A through G connect to each other through a layer-2 switch in subnet /24. other hand, do not forward packets for other networks. In the global routing hierarchy, stub networks are at the bottom or at the edge, and need transit networks as their providers to reach the rest of the Internet. Transit networks may have their own providers and peers, and are usually described as different tiers, e.g., regional ISPs, national ISPs, and global ISPs. At the top of this hierarchy are a dozen or so tier-1 ISPs, which connect to each other in a fully mesh to form the core of the global routing infrastructure. The majority of stub networks today multi-home with more than one provider, and some stub networks also peer with each other. In particular, content networks, e.g., networks supporting search engines, e-commerce, and social network sites, tend to peer with a large number of other networks. Peering is a delicate but also important issue in inter-domain connectivity. A network has incentives to peer with other networks to reduce the traffic sent to its providers, hence saving operational costs. But peering also comes with its own issues. For ISPs, besides additional equipment and management cost, they also do not want to establish peer-peer relationships with potential customers. Therefore ISPs in gen- 8

30 eral are very selective in choosing their peers. Common criteria include number of co-locations, ratio of inbound and outbound traffic, and certain requirements on prefix announcements [2, 1]. In recent years, with the fast growth of available content in the Internet, content networks have been keen on peering with other networks to bypass their providers. Because they have no concern regarding transit traffic or potential customers, content networks generally have an open peering policy and peer with a large number of other networks. AS peering can be realized through either private peering or public peering. A private peering is a dedicated connection between two networks. It provides dedicated bandwidth, makes troubleshooting easier, but has a higher cost. Public peering usually happens at the Internet Exchange Points (IXPs), which are third-party maintained physical infrastructures that enable physical connectivity between their member networks 2. Currently most IXPs connect their members through a shared layer-2 switching fabric (or layer-2 cloud). Figure 2.2 shows an IXP that interconnects ASes A through G using a subnet /24. Though an IXP provides physical connectivity among all participants, it is up to individual networks to decide with whom to establish BGP sessions. It is often the case that one network only peers with some of the other participants in the same IXP. Public peering has a lower cost but its available bandwidth capacity between any two parties can be limited. However, with the recent increase in bandwidth capacity, we have seen a trend to migrate private peerings to public peerings. 2.3 Ground Truth vs. Observed Map To study AS-level connectivity, we need a clear definition on what constitutes an inter- AS link. A link between two ASes exists if the two ASes have a contractual agreement 2 Note that private and public peering can happen in the same physical facility. 9

31 5 Provider Peer 4 Costumer Peer Best path p p 1 p 2 (a) (b) Figure 2.3: A set of interconnected ASes, each node represent an AS. (a) shows an example of hidden links, and (b) an example of invisible links. to exchange traffic over one or multiple BGP sessions. The ground truth of the Internet AS-level connectivity is the complete set of AS links. As the Internet evolves, its AS-level connectivity also changes over time. We use G real (t) to denote the ground truth of the entire Internet AS-level connectivity at time t. Ideally if each ISP maintains an up-to-date list of its AS links and makes the list accessible, obtaining the ground truth would be trivial. However, such a list is proprietary and rarely available, especially for large ISPs with a large and changing set of links. In this thesis, we derive the ground truth of several individual networks whose data is made available to us, including their router configurations, syslogs, BGP command outputs, as well as personal communications with the operators. From router configurations, syslogs and BGP command outputs, we can infer whether there is a working BGP session, i.e., a BGP session that is in the established state as specified in RFC 4271 [78]. We assume there is a link between two ASes if there is at least one working BGP session between them. However if all the BGP sessions between two ASes are down at the moment of data collection, the link may not 10

32 appear in the ground truth on that particular day, even though the two ASes have a valid agreement to exchange traffic. Fortunately we have continuous daily data going back for years, thus the problem of missing links due to transient failures should be negligible. When inferring connectivity from router configurations, extra care is needed to remove stale BGP sessions, i.e., sessions that appear to be correctly configured in router configurations, but are actually no longer active. We use syslog data in this case to remove the stale entries (as described in detail in the next section). We believe that this careful filtering makes our inferred connectivity a very good approximation of the real ground-truth. We denote an observed global AS topology at time t by G obsv (t), which typically provides only a partial view of the ground truth. There are two types of missing links when we compare G obsv and G real : hidden links and invisible links. Given a set of monitors, a hidden link is one that has not yet been observed but could possibly be revealed at a later time. An invisible link is one that is impossible to be observed by the given set of monitors. For example, in Figure 2.3(a), assuming that AS5 hosts a monitor (either a BGP monitoring router or a traceroute probing host) which sends to the collector all the AS paths used by AS5. Between the two customer paths to reach prefix p 0, AS5 picks the best one, [5-2-1], so we are able to observe the existence of AS links 2-1 and 5-2. The three other links, 5-4, 4-3, and 3-1, are hidden at the time, but will be revealed when AS5 switches to path [ ] if a failure along the primary path [5-2-1] occurs. In Figure 2.3(b), the monitor AS10 uses paths [10-8-6] and [10-9-7] to reach prefixes p 1 and p 2, respectively. In this case, link 8-9 is invisible to the monitor in AS10, because it is a peer link that will not be announced to AS10 under any circumstances due to the no-valley policy. Hidden links are typically revealed if we build AS maps using routing data (e.g., BGP updates) collected over an extended period. However, a new problem arises from 11

33 this approach: the introduction of potentially stale links; that is, links that existed some time ago but are no longer present. A empirical solution for removing possible stale links has been developed in [72]. To discover all invisible links, we would need additional monitors at most, if not all, edge ASes where routing updates can contain the peering links as permitted by routing policy. The issues of hidden and invisible links are shared by both BGP logs and traceroute measurements. 12

34 CHAPTER 3 Topology Liveness and Completeness Problems Because individual ASes apply private routing policies to BGP updates, generally speaking one cannot observe the complete AS topology. We denote the complete real Internet AS topology graph by G real, and the topology graph that one infers from measurement data by G obsv. The observed portion of the AS topology is a subset of the real topology, i.e., G obsv G real. Knowing how much these two topologies differ is what we term the Completeness Problem. G obsv can be constructed in multiple ways. One way is to have data collectors establish BGP sessions with a set of operational routers, which we call monitors, to obtain their BGP routing tables and updates. Another way is to have a set of vantage points send traceroute probes and then to convert the obtained router paths to AS paths 1. For example, in Fig. 3.1, at time t 0, we measure the topology from monitor A by either examining A s routing table or probing other two nodes B and C. The resulting G obsv misses one link, B-C, from G real. To study graph properties of the AS topology it is important to minimize the number of missing links. Existing efforts in this area include deploying additional monitors and incorporating data from other sources (e.g., routing registry [96]). For example, if B is also a monitor, then one can observe the existence of link B-C. 1 Different from BGP monitors, traceroute vantage points are usually end hosts. However in this thesis we term both as monitors. 13

35 Figure 3.1: Observing Topology Over Time As a direct consequence of our inability to observe the complete topology, another problem, which we call the Liveness Problem, arises when we study topology evolution over time. That is, an observed change in G obsv does not necessarily reflect a change in G real. For example, in Fig. 3.1, at time t 1, link A-C goes down due to a physical failure, but this failure does not change the contractual relationship between A and C, i.e., link A-C still exists in G real. However, the routing protocol will adapt to the failure and link A-C disappears from the observation. As a result, comparing G obsv (t 0 ) with G obsv (t 1 ), we will see one link removal (A-C) and one link addition (B-C). In another example, consider the changes from time t 2 to time t 3 in Fig D changes its service provider by switching from C to B. This is a real topology change and results in one link removal (D-C) and one link addition (D-B) in both G real and G obsv. In both cases, what we observe are changes in G obsv, and the question is how to tell which ones are real topology changes happened in G real. We use appearance and disappearance to name the addition and removal of elements (i.e., links and nodes) in G obsv respectively, and birth and death to name the addition and removal of elements in G real respectively. The liveness problem concerns 14

36 how to infer the real births and deaths from observed appearances and disappearances. More specifically, when a link or node disappears from G obsv, is it still alive in G real? When a link or node appears for the very first time, has it been alive in G real before? Answering these questions is critical to studying topology evolution, as we need to know when and where births and deaths occur in G real. The liveness problem and completeness problem are related in that solving one will help solve the other. If the liveness of links and nodes is known, we can combine observations made at different times to form a more complete topology estimate. For example, in Fig. 3.1, combining G obsv (t 0 ) and G obsv (t 1 ) will give a more complete topology at time t 1, provided that we know link A-C is still alive at time t 1. Similarly, if the complete topology is known, we will be able to differentiate real topology changes from transient routing changes. For example, if we know the complete topology in Fig. 3.1, we will not take the appearance of link B-C at time t 1 as a birth. However the liveness problem and completeness problem are also fundamentally different. On the one hand, even if we know the liveness of all the observed links and nodes over time and are able to combine observations made through a long time period, we still do not know whether the combined topology is complete, or how incomplete it may be. For example, in Fig. 3.1, from time t 2 to time t 3, knowing the liveness of links and nodes does not help tell whether link B-C exists. On the other hand, even if monitors are placed at every node to capture all the links (except those having failures at the moment), when link A-C disappears from the observation at time t 1, we still cannot tell instantly whether it is due to an operational failure or the termination of the inter-as contract, although observations over time can provide a good estimate as described later in this thesis. Both the liveness problem and completeness problem are important to a full understanding of the Internet topology and its evolution. An ideal solution would be having 15

37 all the ISPs register their inter-as connectivity at a central registry and keep their entries up-to-date, which, unfortunately, does not seem feasible in the current Internet. A near ideal solution would be placing a monitor in each AS, which is also infeasible in reality. A number of research efforts have been devoted to making G obsv more complete, without knowing exactly how close the obtained G obsv is to G real. However, to our knowledge, no one has addressed the liveness problem, which has been a major hurdle to empirical studies of topology evolution. In this thesis, we focus on the liveness problem and propose a solution based on the analysis of available topology data. Intuitively, real topology changes generally occur over relatively long time intervals (e.g., months or even years), while transient routing changes happen within much shorter periods (e.g., minutes or hours). Thus if we keep observing the topology over time, we should be able to differentiate topology changes from transient routing changes. For example, if a link disappears and re-appears after a short period of time, it is most likely that the disappearance is not a death. If a link disappears and never re-appears again over a long time period, it is most likely that the link no longer exists. The research question is how long one should wait before declaring a birth or death with a given level of confidence. We develop an empirical model that captures the effects of long-term topology changes and short-term routing changes on observed topologies. Internet topology can be abstracted at different granularity, e.g., router-level topology, AS-level topology, and ISP-level topology (a number of ISPs have multiple ASes). Although this thesis focuses on the AS-level topology, the liveness problem is a general problem that exists independently from whether the nodes in Fig. 3.1 are routers, ASes, or ISPs. Thus we believe that solving the problem at the AS-level could lead a way to liveness solutions at other granularity. For example, if we can identify real 16

38 topology changes for each AS, by combining the behavior of ASes that belong to the same ISP, we will get the topology changes for ISP-level topology. One of our future work is to apply the methodology developed in this thesis to other types of topologies. 17

39 CHAPTER 4 A Solution to the Liveness Problem In this chapter we develop a solution to the topology liveness problem based on empirical data and provide some example applications of the model. 4.1 An Empirical Model of Observed Topology Dynamics We develop the model using BGP log data, verify its consistency with information extracted from Internet registries, and evaluate the suitability of router configuration files and traceroute data sets in solving the liveness problem Data Sets We use data from four different types of sources: BGP, router configurations, traceroute, and Internet registries. The BGP data consists of both routing tables and updates collected by RouteViews [15] and RIPE-RIS [14] from a few hundreds of monitors between January 1, 2004 and December 1, 2006, a period of almost three years 1. From BGP routing tables and updates, we extract topology information (i.e., AS nodes and links) and record the timestamps of appearances and disappearances of links and nodes. There are totally 27,972 nodes and 123,182 links in the entire data set. To evaluate the effects of different monitors, we group BGP data into three sets. 1 The main reason for starting from 2004 instead of earlier is to have an adequate number of monitors for the entire measurement period. 18

40 700 Cumulative number of links observed Tier-1 Set-54 All Number of days since January 1 st 2004 Number of peers Number of covered ASes Figure 4.1: Number of links captured by different sets of monitors Figure 4.2: Number of monitors in Route- Views and RIPE-RIS combined Cumulative number of links Cumulative number of links observed Data Linear component Fit Number of days since January 1 st Number of days since Jan 1 st 2004 Figure 4.3: Number of links, Tier-1 monitor with different starting times Figure 4.4: Visible links seen by all monitors 19

41 Tier-1: data from a single monitor residing in a Tier-1 network. Set-54: data from a set of 54 monitors residing in 35 ASes; these monitors are present throughout the entire measurement period. ALL: data from all monitors. The traceroute data is collected and kindly provided to us by three research projects: Skitter [17], DIMES [82], and iplane [57]. They all have monitors around the globe to periodically traceroute thousands of destination IP addresses, and convert router paths to AS paths. They differ in the number of monitors, locations of monitors, probing frequency, and the list of destinations to probe. Both Skitter and DIMES have data from January 1, 2004 to December 1, 2006, but iplane s data collection only started from late June, Each data set comes with an AS adjacency list describing the AS topology it observes. We also extract AS number allocation data from Regional Internet Registries (RIR) [12], and AS connectivity information from Internet Routing Registries (IRR) [7]. In addition to the above publicly available data sources, we also made use of router configuration data of all the routers of a Tier-1 backbone network, which includes historical configuration files of more than one thousand routers filtered as described in [70]. Moreover, we have access to ibgp feeds of several routers in this network. Finally, in Section 4.3 we also use ibgp data provided by Abilene, the US research and educational network An Empirical Model We first use BGP data to develop an empirical model for observed topology changes. Before starting the model development, we would like to note an important difference between links and nodes in terms of their observability. Due to the relatively small 20

42 Cumulative number of links Tier-1 Set-54 All Disappearance period of links Cumulative number of links Data Linear component Fit Disappearance period Figure 4.5: Link disappearance period Figure 4.6: Link disappearance period, by all monitors number of existing monitors and the rich connectivity among ASes, many links are not seen on the first day of observation; some of them get revealed through routing dynamics over time. However, because most ASes (over 99%) originate one or more prefixes, they appear in the global routing table on the first day of observation; the small number of remaining transit ASes behave in the same way as links in terms of their observability. As a result, the same model applies to both links and nodes. We will focus on developing the model for links, and only show the results of applying the model to nodes The Appearance of Links and Nodes Observations: Fig. 4.1 shows the cumulative number of unique links captured by different monitor sets over time. Taking the Tier-1 curve for instance: on the first day, the observed links are those in the monitor s routing table on January 1, 2004; a point (200, 40000) on the curve means that during the first 200 days, this monitor has seen unique links in total from its BGP routing tables and updates. 21

The (in)completeness of the Observed Internet AS-level Structure

The (in)completeness of the Observed Internet AS-level Structure The (in)completeness of the Observed Internet AS-level Structure Ricardo Oliveira Dan Pei Walter Willinger Beichuan Zhang Lixia Zhang {rveloso,lixia}@cs.ucla.edu {peidan,walter}@research.att.com bzhang@arizona.edu

More information

Observing the Evolution of Internet AS Topology

Observing the Evolution of Internet AS Topology Observing the Evolution of Internet AS Topology Ricardo Oliveira University of California Los Angeles, CA rveloso@cs.ucla.edu Beichuan Zhang University of Arizona Tucson, AZ bzhang@cs.arizona.edu Lixia

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection On the Impact of Route Monitor Selection Ying Zhang Zheng Zhang Z. Morley Mao Y. Charlie Hu Bruce Maggs Univ. of Michigan Purdue Univ. Univ. of Michigan Purdue Univ. CMU Paper ID: E-578473438 Number of

More information

Border Gateway Protocols

Border Gateway Protocols Paper 106, ENG 104 Border Gateway Protocols Sadeta Krijestorac, Marc Beck, Jonathan Bagby Morehead State University University of Louisville Florida Atlanic University s.krijestor@moreheadstate.edu marcbeck1982@yahoo.com

More information

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,

More information

Placing BGP Monitors in the Internet UCLA Computer Science Department - Techical Report TR-060017-2006

Placing BGP Monitors in the Internet UCLA Computer Science Department - Techical Report TR-060017-2006 Placing BGP Monitors in the Internet UCLA Computer Science Department - Techical Report TR-060017-2006 Abstract Ricardo Oliveira Mohit Lad Beichuan Zhang rveloso@cs.ucla.edu mohit@cs.ucla.edu bzhang@cs.arizona.edu

More information

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection On the Impact of Route Monitor Selection Ying Zhang Zheng Zhang Z. Morley Mao Y. Charlie Hu Bruce M. Maggs Univ. of Michigan Purdue Univ. Univ. of Michigan Purdue Univ. Carnegie Mellon and Akamai Tech.

More information

IPv4 Address Allocation and the BGP Routing Table Evolution

IPv4 Address Allocation and the BGP Routing Table Evolution IPv Address Allocation and the BGP Routing Table Evolution Xiaoqiao Meng, Zhiguo Xu, Beichuan Zhang, Geoff Huston, Songwu Lu, Lixia Zhang Computer Science Dept., UCLA APNIC Los Angeles, CA 99 Brisbane,

More information

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003 On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude

More information

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Studying Black Holes on the Internet with Hubble

Studying Black Holes on the Internet with Hubble Studying Black Holes on the Internet with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson University of Washington August 2008 This

More information

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone 3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement

More information

Introduction to Routing

Introduction to Routing Introduction to Routing How traffic flows on the Internet Philip Smith pfs@cisco.com RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,

More information

On the Eyeshots of BGP Vantage Points

On the Eyeshots of BGP Vantage Points On the Eyeshots of BGP Vantage Points Kai Chen, Chengchen Hu, Wenwen Zhang, Yan Chen, Bin Liu Northwestern University, Tsinghua University, University of Illinois at Chicago {kchen, ychen}@northwestern.edu,

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

BGP Routing Stability of Popular Destinations

BGP Routing Stability of Popular Destinations BGP Routing Stability of Popular Destinations Jennifer Rexford, Jia Wang, Zhen Xiao, and Yin Zhang AT&T Labs Research; Florham Park, NJ Abstract The Border Gateway Protocol (BGP) plays a crucial role in

More information

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution

More information

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

Impact of BGP Dynamics on Router CPU Utilization

Impact of BGP Dynamics on Router CPU Utilization Impact of BGP Dynamics on Router CPU Utilization Sharad Agarwal 1, Chen-Nee Chuah 2, Supratik Bhattacharyya 3, and Christophe Diot 4 1 University of California, Berkeley, USA, sagarwal@cs.berkeley.edu

More information

Understanding BGP Next-hop Diversity

Understanding BGP Next-hop Diversity This paper was presented as part of the 14th IEEE Global Internet Symposium (GI) 211 at IEEE INFOCOM 211 Understanding BGP Next-hop Diversity Jaeyoung Choi, Jong Han Park, Pei-chun Cheng, Dorian Kim, Lixia

More information

Some Examples of Network Measurements

Some Examples of Network Measurements Some Examples of Network Measurements Example 1 Data: Traceroute measurements Objective: Inferring Internet topology at the router-level Example 2 Data: Traceroute measurements Objective: Inferring Internet

More information

Collecting the Internet AS-level Topology

Collecting the Internet AS-level Topology Collecting the Internet AS-level Topology Beichuan Zhang, Raymond Liu Computer Science Dept. UCLA {bzhang, raymondl}@cs.ucla.edu Daniel Massey Computer Science Dept. Colorado State University massey@cs.colostate.edu

More information

Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics

Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics WHITE PAPER Table of Contents Introduction 3 Route-Flow Fusion 4 BGP Policy Visibility 5 Traffic Visibility

More information

BGP route propagation. Internet AS relationships, Routing policy on Internet paths. Example of commercial relationship. Transit vs.

BGP route propagation. Internet AS relationships, Routing policy on Internet paths. Example of commercial relationship. Transit vs. BGP route propagation Internet AS relationships, Routing policy on Internet paths Z. Morley Mao Lecture 5 Jan 20, 2005 Connectivity does not imply reachability Not all possible routes propagate Commercial

More information

Inter-domain Routing. Outline. Border Gateway Protocol

Inter-domain Routing. Outline. Border Gateway Protocol Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small

More information

Evaluating Potential Routing Diversity for Internet Failure Recovery

Evaluating Potential Routing Diversity for Internet Failure Recovery Evaluating Potential Routing Diversity for Internet Failure Recovery Chengchen Hu,2, Kai Chen 3, Yan Chen 3, Bin Liu CST Department, Tsinghua University, {huc, liub}@tsinghua.edu.cn 2 SKLNST, Beijing University

More information

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu ABSTRACT

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

Border Gateway Protocol (BGP-4)

Border Gateway Protocol (BGP-4) Vanguard Applications Ware IP and LAN Feature Protocols Border Gateway Protocol (BGP-4) Notice 2008 Vanguard Networks 25 Forbes Blvd Foxboro, MA 02035 Phone: (508) 964 6200 Fax: (508) 543 0237 All rights

More information

An Overview of Solutions to Avoid Persistent BGP Divergence

An Overview of Solutions to Avoid Persistent BGP Divergence An Overview of Solutions to Avoid Persistent BGP Divergence Ravi Musunuri Jorge A. Cobb Department of Computer Science The University of Texas at Dallas Email: musunuri, cobb @utdallas.edu Abstract The

More information

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better

More information

Outline. Outline. Outline

Outline. Outline. Outline Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather

More information

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Simon Balon and Guy Leduc Research Unit in Networking EECS Department- University of Liège (ULg) Institut Montefiore, B28 - B-4000

More information

BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <maz@telecom-isac.jp>, <maz@iij.ad.jp>

BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <maz@telecom-isac.jp>, <maz@iij.ad.jp> BGP route monitoring Mar, 25, 2008 Matsuzaki maz Yoshinobu , 1 abstract BGP prefix hijack is a serious security issue in the internet, and these events have been widely

More information

Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D.

Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D. Active measurements: networks Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D. Outline Organization of Internet routing Types of domains Intra- and inter-domain routing Intra-domain

More information

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service

More information

A Strategy for Transitioning to BGP Security

A Strategy for Transitioning to BGP Security NANOG 52 Denver, CO June 14, 2011 A Strategy for Transitioning to BGP Security Sharon Goldberg Boston University Phillipa Gill University of Toronto Michael Schapira Princeton University Princeton University

More information

Inter-domain Routing

Inter-domain Routing Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010 Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system

More information

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the

More information

Pretty Good BGP: Improving BGP by Cautiously Adopting Routes

Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Josh Karlin University of New Mexico karlinjf@cs.unm.edu Stephanie Forrest University of New Mexico Santa Fe Institute forrest@cs.unm.edu Jennifer

More information

Interdomain Routing. Project Report

Interdomain Routing. Project Report Interdomain Routing Project Report Network Infrastructure improvement proposal To Company A Team 4: Zhang Li Bin Yang Md. Safiqul Islam Saurabh Arora Network Infrastructure Improvement Interdomain routing

More information

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As) Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia

More information

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Internet Routing: Separating Customers from Providers

Internet Routing: Separating Customers from Providers Internet Routing: Separating Customers from Providers Beichuan Zhang bzhang@cs.arizona.edu Ricardo Oliveira rveloso@cs.ucla.edu Vamsi Kambhampati vamsi@cs.colostate.edu Dan Pei peidan@research.att.com

More information

Malicious MPLS Policy Engine Reconnaissance

Malicious MPLS Policy Engine Reconnaissance Malicious MPLS Policy Engine Reconnaissance A. Almutairi 1 and S. Wolthusen 1,2 1 Information Security Group Royal Holloway, University of London, UK and 2 Norwegian Information Security Laboratory Gjøvik

More information

Increasing Path Diversity using Route Reflector

Increasing Path Diversity using Route Reflector International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 5 ǁ May. 2013 ǁ PP.05-09 Increasing Path Diversity using Route Reflector Prasha Dubey

More information

Understanding BGP Misconfiguration

Understanding BGP Misconfiguration Understanding BGP Misconfiguration Ratul Mahajan David Wetherall Tom Anderson {ratul,djw,tom}@cs.washington.edu Computer Science and Engineering University of Washington Seattle, WA 98195-235 ABSTRACT

More information

A Study of Internet Routing Stability Using Link Weight

A Study of Internet Routing Stability Using Link Weight A Study of Internet Routing Stability Using Link Weight Mohit Lad Jong Han Park Tiziana Refice Lixia Zhang ABSTRACT The global Internet routing infrastructure is a large scale distributed system where

More information

BGPmon: A real-time, scalable, extensible monitoring system

BGPmon: A real-time, scalable, extensible monitoring system Cybersecurity Applications & Technology Conference For Homeland Security BGPmon: A real-time, scalable, extensible monitoring system He Yan Colorado State University yanhe@cs.colostate.edu Dave Matthews

More information

Understanding Large Internet Service Provider Backbone Networks

Understanding Large Internet Service Provider Backbone Networks Understanding Large Internet Service Provider Backbone Networks Joel M. Gottlieb IP Network Management & Performance Department AT&T Labs Research Florham Park, New Jersey joel@research.att.com Purpose

More information

Internet inter-as routing: BGP

Internet inter-as routing: BGP Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability

More information

Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP) Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,

More information

Managing BGP Routes with a BGP Session Multiplexer

Managing BGP Routes with a BGP Session Multiplexer Managing BGP Routes with a BGP Session Multiplexer Vytautas Valancius and Nick Feamster School of Computer Science, Georgia Tech ABSTRACT This paper presents the design, implementation, and evaluation

More information

The Impacts of Link Failure on Routing Dynamics

The Impacts of Link Failure on Routing Dynamics The Impacts of Link Failure Location on Routing Dynamics: A Formal Analysis Xiaoliang Zhao, Beichuan Zhang, Daniel Massey, Andreas Terzis, Lixia Zhang ABSTRACT One approach to understanding the complex

More information

Table of Contents. Cisco How Does Load Balancing Work?

Table of Contents. Cisco How Does Load Balancing Work? Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and

More information

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013 Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing

More information

Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident

Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident Rahul Hiran 1, Niklas Carlsson 1, and Phillipa Gill 2 1 Linköping University, Sweden 2 Citizen Lab, Munk School

More information

How To Understand Bg

How To Understand Bg Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and

More information

Dove siamo? Architecture of Dynamic Routing

Dove siamo? Architecture of Dynamic Routing Dove siamo? Algoritmi di routing Protocolli di routing» Intra dominio (IGP)» Inter dominio (EGP) Le slides relative a questo argomenti sono tratte da Interdomain Routing and The Border Gateway Protocol

More information

Intelligent Routing Platform White Paper

Intelligent Routing Platform White Paper White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5

More information

The Case for an Internet Health Monitoring System

The Case for an Internet Health Monitoring System The Case for an Internet Health Monitoring System Matthew Caesar, Lakshminarayanan Subramanian, Randy H. Katz mccaesar,lakme,randy @cs.berkeley.edu Abstract Internet routing is plagued with several problems

More information

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers

More information

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to: Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations

More information

How To Find A Failure In A Network

How To Find A Failure In A Network Practical Issues with Using Network Tomography for Fault Diagnosis Yiyi Huang Georgia Institute of Technology yiyih@cc.gatech.edu Nick Feamster Georgia Institute of Technology feamster@cc.gatech.edu Renata

More information

BGP. 1. Internet Routing

BGP. 1. Internet Routing BGP 1. Internet Routing (C) Herbert Haas 2005/03/11 1 Internet Routing Interior Gateway Protocols (IGPs) not suitable for Inter-ISP routing Technical metrics only No policy features Inter-ISP routing is

More information

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton University Motivation Routing anomalies are

More information

LHCONE Site Connections

LHCONE Site Connections LHCONE Site Connections Michael O Connor moc@es.net ESnet Network Engineering Asia Tier Center Forum on Networking Daejeon, South Korea September 23, 2015 Outline Introduction ESnet LHCONE Traffic Volumes

More information

Best Practices for Eliminating Risk from Routing Changes

Best Practices for Eliminating Risk from Routing Changes Best Practices for Eliminating Risk from Routing Changes TECHNICAL BRIEF Table of Contents Introduction 3 Route Analytics Intelligence to Meet the Routing Management Challenge 3 Routing Management Best

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Analyzing and modelling the AS-level Internet topology

Analyzing and modelling the AS-level Internet topology Analyzing and modelling the AS-level Internet topology Shi Zhou & Raul J. Mondragon Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS, United Kingdom Email:

More information

Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics

Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics Mohit Lad, Lixia Zhang Computer Science Department University of California Los Angeles, CA 90095, USA mohit,lixia @cs.ucla.edu Dan Massey

More information

Impact of IPv4 Address Allocation Practice on BGP Routing Table Growth

Impact of IPv4 Address Allocation Practice on BGP Routing Table Growth 1 Impact of IPv4 Address Allocation Practice on BGP Routing Table Growth Zhiguo Xu, Xiaoqiao Meng, Lixia Zhang, Songwu Lu Department of Computer Science University of California, Los Angeles Los Angeles,

More information

Embedded BGP Routing Monitoring. Th. Lévy O. Marcé

Embedded BGP Routing Monitoring. Th. Lévy O. Marcé Embedded BGP Routing Monitoring Th. Lévy O. Marcé Introduction & Motivations Off-line BGP routing monitoring initiatives (i.e based on router logs) already exist: Periodic report : The CIDR Report Objective

More information

Measuring the Evolution of Internet Peering Agreements

Measuring the Evolution of Internet Peering Agreements Measuring the Evolution of Internet Peering Agreements Amogh Dhamdhere 1, Himalatha Cherukuru 2, Constantine Dovrolis 2, and Kc Claffy 1 CAIDA 1 Georgia Tech 2 {amogh,kc}@caida.org dovrolis@cc.gatech.edu

More information

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

Internet Traffic Measurement

Internet Traffic Measurement Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software

More information

Understanding Route Redistribution & Filtering

Understanding Route Redistribution & Filtering Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat

More information

Module 12 Multihoming to the Same ISP

Module 12 Multihoming to the Same ISP Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will

More information

Dynamics of Prefix Usage at an Edge Router

Dynamics of Prefix Usage at an Edge Router Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, christos@cs.colostate.edu}

More information

ECONOMIZING ISP INTERCONNECTIONS AT INTERNET EXCHANGE POINTS

ECONOMIZING ISP INTERCONNECTIONS AT INTERNET EXCHANGE POINTS 2006 Society for Design and Process Science ECONOMIZING ISP INTERCONNECTIONS AT INTERNET EXCHANGE POINTS Jörn Altmann TEMAP, Department of Industrial Engineering, School of Engineering, Seoul National

More information

Introduction to The Internet. ISP/IXP Workshops

Introduction to The Internet. ISP/IXP Workshops Introduction to The Internet ISP/IXP Workshops 1 Introduction to the Internet Topologies and Definitions IP Addressing Internet Hierarchy Gluing it all together 2 Topologies and Definitions What does all

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

Towards Modelling The Internet Topology The Interactive Growth Model

Towards Modelling The Internet Topology The Interactive Growth Model Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS

More information

BGP: Border Gateway Protocol

BGP: Border Gateway Protocol LAB 8 BGP: Border Gateway Protocol An Interdomain Routing Protocol OBJECTIVES The objective of this lab is to simulate and study the basic features of an interdomain routing protocol called Border Gateway

More information

Interdomain Routing. Outline

Interdomain Routing. Outline Interdomain Routing David Andersen 15-744 Spring 2007 Carnegie Mellon University Outline What does the Internet look like? Relationships between providers Enforced by: Export filters and import ranking

More information

The Complete IS-IS Routing Protocol

The Complete IS-IS Routing Protocol Hannes Gredler and Walter Goralski The Complete IS-IS Routing Protocol 4y Springer Contents Foreword Credits and Thanks vii ix 1 Introduction, Motivation and Historical Background 1 1.1 Motivation 1 1.2

More information

Routing and traffic measurements in ISP networks

Routing and traffic measurements in ISP networks Routing and traffic measurements in ISP networks Steve Uhlig Network Architectures and Services Delft University of Technology Email : S.P.W.G.Uhlig@ewi.tudelft.nl URL : http://www.nas.ewi.tudelft.nl/people/steve/

More information

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea hsriver@gmail.com and kimsr@konkuk.ac.kr

More information

Service Description DDoS Mitigation Service

Service Description DDoS Mitigation Service Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Contents Contents 1 Introduction...3 2 An Overview...3

More information