PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

Size: px
Start display at page:

Download "PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services"

Transcription

1 PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton University

2 Motivation Routing anomalies are common on Internet Maintenance Power outage Fiber cut Misconfiguration Anomalies can affect end-to-end performance Packet losses Packet delays Disconnectivities 2

3 Background Anomaly detection and diagnosis are nontrivial Asymmetric paths Failure information propagation Highly varied durations Limited coverage 3

4 Contributions New techniques for Anomaly detection Anomaly isolation Anomaly classification Large-scale study of anomalies Broad coverage High detection rate, low overhead Characterization of anomalies End-to-end effects Benefits to host service 4

5 Outline State of the Art PlanetSeer Components MonD passive monitoring ProbeD active probing Anomaly Analysis Loop-based anomaly Non-loop anomaly Bypassing Anomalies Summary 5

6 State of the Art Routing messages BGP: AS-level diagnosis IS-IS, OSPF: Within single ISP Router/link traffic statistics SNMP, NetFlow: proprietary End-to-end measurement Ping, traceroute 6

7 End-to-End Probing All-pairs probes among n nodes O(n^2) measurement cost Not scalable as n grows 7

8 Key Observation Combine passive monitoring with active probing Peer-to-Peer (P2P), Content Distribution Network (CDN) Large client population Geographically distributed nodes Large traffic volume Highly diverse paths The traffic generated by the services reveals information about the network. 8

9 Our Approach Host service CDN Components Passive monitoring Active probing Advantages Low overhead Wide coverage Client R1 R2 C A B 9

10 MonD: Anomaly Detection Anomaly indicators Time-to-live (TTL) change Routing change n consecutive timeouts (n = 4 in current system) Idling period of 3 to 16 seconds most congestion periods < 220ms 10

11 ProbeD Operation Baseline probes When a new IP appears From local node Forward probes When a possible anomaly detected From multiple nodes (including local node) Reprobes At 0.5, 1.5, 3.5 and 7.5 hours later From local node 11

12 Number of Groups US (edu) US (nonedu) ProbeD Groups 353 nodes, 145 sites, 30 groups According to geographic location One traceroute per group Canada Europe Asia & MidE Other 12

13 Estimating Scope Local ProbeD Client Remote ProbeD r a r b r c r d Which routers might be affected? Routers which possibly change their next hops Traceroutes from multiple locations can narrow the scope 13

14 Tier Coverage Path Diversity 100% 80% 60% Core Edge 40% 20% 0% Tier 1 Tier 2 Tier 3 Tier 4 Tier 5 22 ASes 215 ASes 1392 ASes 1420 ASes ASes Monitoring Period: 02/ /2004 Unique IPs: 887,521 Traversed ASes: 10,090 14

15 Confirming Anomalies Reported anomalies 2,259,588 Conditions Loops Route change Partial unreachability ICMP unreachable Very conservative confirmation Undecided 22% Anomaly 12% Nonanomaly 66% 15

16 Confirmed Anomaly Breakdown Confirmed anomalies 271,898 2 per minute 100x more Temp loop 1% Temp anomalies Inconsistent probes Persist Loop 7% Other Outage 23% Temp Anomalies 16% Fwd Outage 9% Path Change 44% 16

17 Scope of Loops 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 1% persist loops cross ASes 15% temp loops cross ASes How many routers or ASes are involved? Persistent Temp Temp loops involve more routers than persistent loops 97% persistent loops and 51% temp loops contain 2 hops 17

18 Distribution of Loops 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Many persistent loops in tier-3, few in tier-1 Worst 10% of tier-1 ASes implications for largest ISPs 20% traffic Tier 1 Tier 2 Tier 3 Tier 4 Tier 5 35% persistent loops Persistent Temp Traffic 18

19 Duration of Persistent Loops 60% 50% 40% 30% 20% 10% 0% <0.5 hrs <1.5 hrs <3.5 hrs <7.5 hrs >= 7.5 hrs How long do persistent loops last? Either resolve quickly or last for an extended period 19

20 fraction Scope of Forward Anomalies How many routers or ASes are affected? 60% outages within 1 hops 78% outages within 2 ASes 57% changes within 2 ASes hops 75% outages and 68% changes within 4 hops change outage 20

21 fraction Location of Forward Anomalies hops How close are the anomalies to the edges of the network? 44% outages at the last hop 72% outages and 40% changes within 4 hops change outage 21

22 Distribution of Forward Anomalies 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Tier 1 Tier 2 Tier 3 Tier 4 Tier 5 Change Outage Traffic Which ASes are affected? Tier-1 ASes most stable Tier-3 ASes most likely to be affected 22

23 Overlay Routing Use alternate path when default path fails source destination intermediate 23

24 fraction Bypassing Anomalies bypass ratio How useful is overlay routing for bypassing failures? Effective in 43% of 62,815 failures, lower than previous studies 32% bypass paths inflate RTTs by more than a factor of two 24

25 Summary Confirm 272,000 anomalies in 3 months Persistent and temporary loops Persistent loops narrower scope, either resolve quickly or last for a long time Path outages and changes Outages closer to edge, narrower scope Anomaly distribution Skewed. Tier-1 most stable. Tier-3 most problematic. Overlay routing Bypasses 43% failures, latency inflation 25

26 More Information In the paper More details about anomaly characteristics End-to-end impacts Classification methodology Optimizations to reduce overheads & improve confirmation rate 26

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang, Vivek Pai, Larry Peterson, and Randy Wang Department of Computer Science Princeton University

More information

Studying Black Holes on the Internet with Hubble

Studying Black Holes on the Internet with Hubble Studying Black Holes on the Internet with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson University of Washington August 2008 This

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Moving Beyond End-to-End Path Information to Optimize CDN Performance

Moving Beyond End-to-End Path Information to Optimize CDN Performance Moving Beyond End-to-End Path Information to Optimize CDN Performance Rupa Krishnan Harsha V. Madhyastha Sridhar Srinivasan Sushant Jain Arvind Krishnamurthy Thomas Anderson Jie Gao Google Inc. University

More information

An Evaluation of Peering and Traffic Engineering in the Pan- African Research and Education Network

An Evaluation of Peering and Traffic Engineering in the Pan- African Research and Education Network An Evaluation of Peering and Traffic Engineering in the Pan- African Research and Education Network *Clifford Sibanda (National University of Science and Technology- Bulawayo) *Josiah Chavula (Mzuzu University

More information

How To Find A Failure In A Network

How To Find A Failure In A Network Practical Issues with Using Network Tomography for Fault Diagnosis Yiyi Huang Georgia Institute of Technology yiyih@cc.gatech.edu Nick Feamster Georgia Institute of Technology feamster@cc.gatech.edu Renata

More information

An AS-Level Study of Internet Path Delay Characteristics

An AS-Level Study of Internet Path Delay Characteristics An AS-Level Study of Internet Path Delay Characteristics Amgad Zeitoun Chen-Nee Chuah Supratik Bhattacharyya Christophe Diot University of Michigan, Ann Arbor University of California Davis Sprint ATL

More information

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Traceroute The Internet s Diagnostic Tool

Traceroute The Internet s Diagnostic Tool Traceroute The Internet s Diagnostic Tool NTT Communications Global IP Network White Paper By Charles Sellers, CISSP May, 2006 NTT, NTT Communications, and the NTT Communications logo are registered trademarks

More information

Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002

Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002 Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002 The Internet is coming of age, in large part because of its ability to open up markets and to

More information

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com Sveronese@networkphysics.com September 2003 1 Agenda Today s IT challenges Introduction to Network

More information

Fast Reroute Techniques in MPLS Networks. George Swallow swallow@cisco.com

Fast Reroute Techniques in MPLS Networks. George Swallow swallow@cisco.com Fast Reroute Techniques in MPLS Networks George Swallow swallow@cisco.com Agenda What are your requirements? The solution space U-turns Traffic Engineering for LDP Traffic Engineering Some Observations

More information

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing

More information

Traceroute-Based Topology Inference without Network Coordinate Estimation

Traceroute-Based Topology Inference without Network Coordinate Estimation Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Troubleshooting Network Performance with Alpine

Troubleshooting Network Performance with Alpine Troubleshooting Network Performance with Alpine Jeffrey Papen As a Network Engineer, I am often annoyed by slow Internet performance caused by network issues like congestion, fiber cuts, and packet loss.

More information

Detection and Analysis of Routing Loops in Packet Traces

Detection and Analysis of Routing Loops in Packet Traces Detection and Analysis of Routing Loops in Packet Traces Urs Hengartner, Sue Moon, Richard Mortier, Christophe Diot Abstract Routing loops are caused by inconsistencies in routing state among a set of

More information

Measurement and Classification of Out-of-Sequence Packets in a Tier-1 IP Backbone

Measurement and Classification of Out-of-Sequence Packets in a Tier-1 IP Backbone Measurement and Classification of Out-of-Sequence Packets in a Tier-1 IP Backbone Sharad Jaiswal, Gianluca Iannaccone, Christophe Diot, Jim Kurose, Don Towsley Sprint ATL Burlingame, CA gianluca,cdiot

More information

Towards a Highly Available Internet

Towards a Highly Available Internet Towards a Highly Available Internet Tom Anderson University of Washington Joint work with: John P. John, Ethan Katz-Bassett, Dave Choffnes, Colin Dixon, Arvind Krishnamurthy, Harsha Madhyastha, Colin Scott,

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

TEIN2 Measurement and Monitoring Workshop. Bruce.Morgan@aarnet.edu.au

TEIN2 Measurement and Monitoring Workshop. Bruce.Morgan@aarnet.edu.au TEIN2 Measurement and Monitoring Workshop Bruce.Morgan@aarnet.edu.au Introduction Agenda TEIN2 Topology Network Monitoring Network Measurement Day 1 Session I: Introduction 09:00-09:30 Introduction to

More information

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 January 29th, 2008 Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. way-back machine Web 1998 way-back

More information

Lab - Mapping the Internet

Lab - Mapping the Internet Objectives Part 1: Test Network Connectivity Using Ping Part 2: Trace a Route to a Remote Server Using Windows Tracert Part 3: Trace a Route to a Remote Server Using Web-Based and Software Tools Part 4:

More information

An Empirical Evaluation of Wide-Area Internet Bottlenecks

An Empirical Evaluation of Wide-Area Internet Bottlenecks An Empirical Evaluation of Wide-Area Internet Bottlenecks Aditya Akella, Srinivasan Seshan Carnegie Mellon University Pittsburgh, PA 523 {aditya,srini+}@cs.cmu.edu Anees Shaikh IBM T.J. Watson Research

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone 3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement

More information

Four-Year Experience of Coordinated Network Performance Monitoring & Diagnosis from Academic Nodes

Four-Year Experience of Coordinated Network Performance Monitoring & Diagnosis from Academic Nodes Four-Year Experience of Coordinated Network Performance Monitoring & Diagnosis from Academic Nodes Rocky K. C. Chang and Waiting Fok The Internet Infrastructure and Security Lab The Hong Kong Polytechnic

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

A Comparison of Overlay Routing and Multihoming Route Control

A Comparison of Overlay Routing and Multihoming Route Control A Comparison of Overlay Routing and Multihoming Route Control Aditya Akella Jeffrey Pang Bruce Maggs Srinivasan Seshan Carnegie Mellon University {aditya, jeffpang,srini+, bmm}@cs.cmu.edu Anees Shaikh

More information

Internet Anonymity and the Design Process - A Practical Approach

Internet Anonymity and the Design Process - A Practical Approach anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, mwright@uta.edu,

More information

Validating the System Behavior of Large-Scale Networked Computers

Validating the System Behavior of Large-Scale Networked Computers Validating the System Behavior of Large-Scale Networked Computers Chen-Nee Chuah Robust & Ubiquitous Networking (RUBINET) Lab http://www.ece.ucdavis.edu/rubinet Electrical & Computer Engineering University

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Automating Internet Routing Behavior Analysis Using Public WWW Traceroute Services

Automating Internet Routing Behavior Analysis Using Public WWW Traceroute Services Automating Internet Routing Behavior Analysis Using Public WWW Traceroute Services Selim Gurun and Boleslaw K. Szymanski Department of Computer Science, RPI, Troy, NY 12180-3590 Key words: Internet, route

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

Network Troubleshooting from End-Hosts

Network Troubleshooting from End-Hosts Habilitation à Diriger des Recherches Université Pierre et Marie Curie Paris 6 Network Troubleshooting from End-Hosts presented by Renata Cruz Teixeira Submitted in total fullfilment of the requirements

More information

Internet Peering, IPv6, and NATs. Mike Freedman V22.0480-005 Networks

Internet Peering, IPv6, and NATs. Mike Freedman V22.0480-005 Networks Internet Peering, IPv6, and NATs Mike Freedman V22.0480-005 Networks Internet Peering Review: Routing Internet has a loose hierarchy of domains Hosts now local router Local routers know site routers Site

More information

Web Caching and CDNs. Aditya Akella

Web Caching and CDNs. Aditya Akella Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion

More information

Introduction to Routing

Introduction to Routing Introduction to Routing How traffic flows on the Internet Philip Smith pfs@cisco.com RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,

More information

Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring

Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring Praveen Yalagandula, Sung-Ju Lee, Puneet Sharma and Sujata Banerjee Hewlett-Packard Labs, Palo Alto, CA Abstract With

More information

Effective Wide-Area Network Performance Monitoring and Diagnosis from End Systems

Effective Wide-Area Network Performance Monitoring and Diagnosis from End Systems Effective Wide-Area Network Performance Monitoring and Diagnosis from End Systems by Ying Zhang A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy

More information

EE627 Lecture 22. Multihoming Route Control Devices

EE627 Lecture 22. Multihoming Route Control Devices EE627 Lecture 22 Multihoming Route Control Devices 1 Multihoming Connect to multiple ISPs Provide reliability from access link/isp failures Potential for load balancing Intelligent Route Control Devices

More information

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection On the Impact of Route Monitor Selection Ying Zhang Zheng Zhang Z. Morley Mao Y. Charlie Hu Bruce Maggs Univ. of Michigan Purdue Univ. Univ. of Michigan Purdue Univ. CMU Paper ID: E-578473438 Number of

More information

Active Measurements: traceroute

Active Measurements: traceroute Active Measurements: traceroute 1 Tools: Traceroute Exploit TTL (Time to Live) feature of IP When a router receives a packet with TTL=1, packet is discarded and ICMP_time_exceeded returned to sender Operational

More information

Enhancing Network Monitoring with Route Analytics

Enhancing Network Monitoring with Route Analytics with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments

More information

Chapter 52 WAN Load Balancing

Chapter 52 WAN Load Balancing Chapter 52 WAN Load Balancing Introduction... 52-2 WAN Load Balancer Operating Principles... 52-2 Load Distribution Methods... 52-3 Round Robin Distribution... 52-3 Weighted Lottery Distribution... 52-3

More information

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014 Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461

More information

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE) 1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)

More information

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling AKAMAI WHITE PAPER Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling Delivering Dynamic Web Content in Cloud Computing Applications 1 Overview

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

- Multiprotocol Label Switching -

- Multiprotocol Label Switching - 1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can

More information

Instructor Notes for Lab 3

Instructor Notes for Lab 3 Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

Interdomain Routing. Project Report

Interdomain Routing. Project Report Interdomain Routing Project Report Network Infrastructure improvement proposal To Company A Team 4: Zhang Li Bin Yang Md. Safiqul Islam Saurabh Arora Network Infrastructure Improvement Interdomain routing

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

A Link Load Balancing Solution for Multi-Homed Networks

A Link Load Balancing Solution for Multi-Homed Networks A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only

More information

DEGREE THESIS. Improving Network Performance by Implementing the Path Control Tools. Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim

DEGREE THESIS. Improving Network Performance by Implementing the Path Control Tools. Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim Network Design and Computer Management, 120 HP DEGREE THESIS Improving Network Performance by Implementing the Path Control Tools Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim Network Project

More information

Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu

Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu 1 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash

More information

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons

More information

Network Troubleshooting

Network Troubleshooting Network Troubleshooting by Othmar Kyas 18 Testing Network Performance An Agilent Technologies Publication Agilent Technologies Testing 18 Network Performance It is a capital mistake to theorize before

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

A Framework for Scalable Global IP-Anycast (GIA)

A Framework for Scalable Global IP-Anycast (GIA) A Framework for Scalable Global IP-Anycast (GIA) Dina Katabi, John Wroclawski MIT Laboratory for Computer Science 545 Technology Square Cambridge, MA 02139 {dina,jtw}@lcs.mit.edu ABSTRACT This paper proposes

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

An Efficient Load Balancing Technology in CDN

An Efficient Load Balancing Technology in CDN Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University

More information

How To: Diagnose Poor VoIP Calls through diagnostics.

How To: Diagnose Poor VoIP Calls through diagnostics. How To: Diagnose Poor VoIP Calls through diagnostics. When problems arise with poor VoIP phone calls, where do you start looking to troubleshoot the issue? This is one of the many challenges of managing

More information

Intelligent Routing Platform White Paper

Intelligent Routing Platform White Paper White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

How To Build A Lightpath Network For Multiple Lightpath Projects

How To Build A Lightpath Network For Multiple Lightpath Projects Building a LAN to Support Multiple Lightpath Projects Ronald van der Pol About SARA Computing and Networking services Houses and operates national supercomputer Huygens Houses and operates national

More information

Real-Time Traffic Engineering Management With Route Analytics

Real-Time Traffic Engineering Management With Route Analytics Real-Time Traffic Engineering Management With Route Analytics Executive Summary Increasing numbers of service providers and mobile operators are using RSVP-TE based traffic engineering to provide bandwidth

More information

Measuring Load-balanced Paths in the Internet

Measuring Load-balanced Paths in the Internet Measuring oad-balanced Paths in the Internet Brice Augustin, Timur Friedman, and Renata Teixeira aboratoire d Informatique de Paris 6 (IP6) Université Pierre et Marie Curie and CNRS ABSTRACT Tools to measure

More information

pathchar a tool to infer characteristics of Internet paths

pathchar a tool to infer characteristics of Internet paths pathchar a tool to infer characteristics of Internet paths Van Jacobson (van@ee.lbl.gov) Network Research Group Lawrence Berkeley National Laboratory Berkeley, CA 94720 MSRI April 21, 1997 c 1997 by Van

More information

LIFEGUARD: Practical Repair of Persistent Route Failures

LIFEGUARD: Practical Repair of Persistent Route Failures LIFEGUARD: Practical Repair of Persistent Route Failures Ethan Katz-Bassett Univ. of Southern California Univ. of Washington Ítalo Cunha UFMG, Brazil Harsha V. Madhyastha UC Riverside Colin Scott UC Berkeley

More information

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Simon Balon and Guy Leduc Research Unit in Networking EECS Department- University of Liège (ULg) Institut Montefiore, B28 - B-4000

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Chapter 51 WAN Load Balancing

Chapter 51 WAN Load Balancing Chapter 51 WAN Load Balancing Introduction... 51-2 WAN Load Balancer Operating Principles... 51-2 Load Distribution Methods... 51-3 Round Robin Distribution... 51-3 Weighted Lottery Distribution... 51-3

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

ADDRESSING BANDWIDTH CONSTRAINTS IN THE HOSPITALITY AND SPECIALTY RETAIL INDUSTRIES

ADDRESSING BANDWIDTH CONSTRAINTS IN THE HOSPITALITY AND SPECIALTY RETAIL INDUSTRIES ADDRESSING BANDWIDTH CONSTRAINTS IN THE HOSPITALITY AND SPECIALTY RETAIL INDUSTRIES Written By: Vic Herrera, Chief Technology Officer Bandwidth for remote viewing of surveillance data consists of several

More information

Operating Systems and Networks Sample Solution 1

Operating Systems and Networks Sample Solution 1 Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation

More information

Traceroute Anomalies

Traceroute Anomalies Traceroute Anomalies Martin Erich Jobst Supervisor: Dipl.-Inf. Johann Schlamp Seminar Future Internet SS2012 Chair for Network Architectures and Services Department for Computer Science, Technische Universität

More information

Distributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 24. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2013 November 27, 2013 2013 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Routing Overlays and Virtualization. Nick Feamster CS 7260 March 7, 2007

Routing Overlays and Virtualization. Nick Feamster CS 7260 March 7, 2007 Routing Overlays and Virtualization Nick Feamster CS 7260 March 7, 2007 Today s Lecture Routing Overlays: Resilient Overlay Networks Motivation Basic Operation Problems: scaling, syncrhonization, etc.

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

KNOM Tutorial 2003. Internet Traffic Measurement and Analysis. Sue Bok Moon Dept. of Computer Science

KNOM Tutorial 2003. Internet Traffic Measurement and Analysis. Sue Bok Moon Dept. of Computer Science KNOM Tutorial 2003 Internet Traffic Measurement and Analysis Sue Bok Moon Dept. of Computer Science Overview Definition of Traffic Matrix 4Traffic demand, delay, loss Applications of Traffic Matrix 4Engineering,

More information

How To Get Around A Map Of A Map On A Pc Or Macbook

How To Get Around A Map Of A Map On A Pc Or Macbook Is It Really Worth to Peer at IXPs? Marco Di Bartolomeo Roberto di Lallo Giuseppe Di Battista Claudio Squarcella Roma Tre University Nautilius Mediterranean Exchange Point (NaMeX) ISCC 2015 Introduction

More information

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing

More information

Chapter 4. Distance Vector Routing Protocols

Chapter 4. Distance Vector Routing Protocols Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

Internet Traffic Measurement

Internet Traffic Measurement Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,lshi@tssg.org

More information

IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources

IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

Passive Aggressive Measurement with MGRP

Passive Aggressive Measurement with MGRP Passive Aggressive Measurement with MGRP Pavlos Papageorge 1,2, Justin McCann 2, Michael Hicks 2 Google 1 University of Maryland, College Park 2 1 Choice 1: Passive Measurement Video conference Observing

More information

Avoiding the Frailties of the Internet with Intelligent Route Control

Avoiding the Frailties of the Internet with Intelligent Route Control Avoiding the Frailties of the Internet with Intelligent Route Control In any business climate, it is necessary to be prepared for contingencies that may affect business-critical operations. Business continuity

More information

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As) Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia

More information

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information