Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics
|
|
|
- Godwin Willis
- 9 years ago
- Views:
Transcription
1 Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics Mohit Lad, Lixia Zhang Computer Science Department University of California Los Angeles, CA 90095, USA Dan Massey USC/Information Sciences Institute 38 N Fairfax Dr. Arlington, VA 22203, USA [email protected] Abstract Failures at the BGP level can have significant impact on the overall Internet. Understanding the behavior of BGP is thus both an important practical challenge and an interesting research problem. To understand the true dynamics, and help interpret the multiple gigabytes of BGP log data, we have developed the Link-Rank graphical toolset. Link-Rank weighs the links between Autonomous Systems by the number of routing prefixes going through each link. Tracing these graphs over time results in a directed graph that shows the weight changes of the logical inter-as links. From this graph one can easily visualise the complex BGP path changes and also combine views from multiple vantage points, to get a better picture of global routing dynamics. We illustrate the usefulness of Link-Rank by using it to examine BGP routing dynamics in three example cases. These examples show Link-Rank is able to help BGP analysts estimate the scope of routing changes and to reveal important routing dynamics in the presence of superfluous BGP update messages. Keywords Border Gateway Protocol(BGP), BGP Routing Dynamics, Network and Systems Monitoring. Introduction The Internet is made of a large number of Autonomous Systems (ASes) and the Border Gateway Protocol (BGP) [] is used to exchange reachability information between Autonomous Systems. In order to monitor global reachability, analyze BGP dynamics, and promptly detect routing failures, many individual ASes monitor their local view of the BGP routing system; some ASes also provide public access to local routing table snapshots, referred to as looking glasses. A few passive BGP monitoring sites, such as RIPE [2] and RouteViews [3], have also been established to collect BGP update data. These monitoring sites peer with BGP routers of various ASes to passively collect the updates from the peering routers, and make the resulting BGP log data publicly available. Although publicly accessible looking glasses and BGP update logs provide potentially This material is based upon work supported by the Defense Advanced Research Projects Agency (DARPA) under Contract No DABT63-00-C-027 by National Science Fundation(NSF) under Contract No ANI Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors
2 useful information into the operations of the Internet routing infrastructure, we are facing several challenges in making effective use of the available data. First, due to routing policies, each vantage point tends to have a different view of BGP reachability and routing activities, and observations at a particular router does not reflect the state for the rest of the Internet in general. Second, there is no easy or clear way to combine these individual views into a coherent picture of the global routing changes. Third, the data volume is large. For example, Route-Views typically logs over 0 gigabytes of BGP update messages per month from over 30 routers in various topological locations; during the SQL Slammer worm attack on Jan 25th 2003, RIPE monitoring point received updates from a single peer router. [4] also showed BGP log data collected during stressful events, such as Nimda and Code Red worm attacks, may contain a high percentage of measurement artifacts. The sheer amount of log data makes it difficult, if not impossible, to observe whether the global routing system is going through its daily routine reachability exchanges, or a significant failure has occurred, and if so where it is, what is the scope of the impact, and how well BGP is adapting to the failure. As the Internet continues to grow, the increase in inter-as connectivity, the variety of routing policies, and the lack of monitoring tools makes it increasingly challenging to understand BGP routing dynamics. In order to provide dependable Internet connectivity, not only do we need to collect BGP operation logs, but we must also have effective tools to analyze and interpret the log data to explain the observed routing update dynamics, and present the data in a way that makes the global routing dynamics readily accessible to human operators. In this paper we present the Link-Rank toolset. We define Link-Rank graphs showing the weighted importance of AS peerings from observation points. We also define Rank- Change graphs that can extract a compact graphical representation from BGP log data to visually show important BGP dynamics. We further provide a systematic approach for combining the Rank-Change graphs from multiple routers into a single global graph summarizing overall BGP dynamics. The global graph can help in understanding issues like the nature of the event and extent of overlap of affected peerings. But unlike the efforts on constructing the AS level topology of the Internet [5, 6, 7], the Link-Rank objective is to present BGP routing dynamics in an aggregate and easy to understand form in order to aid network operators in understanding and evaluating the BGP operations. We use three case studies to show how Link-Rank can compactly represent bulk BGP log data In the first case, RouteViews vantage point observed a burst of routing changes to around 0000 prefixes, from a single router. Using Link-Rank, we show that this event is local, and does not affect global routing. In the second example, we apply Link-Rank to BGP logs collected during the time period of a known failure at a large AS, and show how Link-Rank helps assess the global impact of this failure. Finally, we use Link-Rank to examine the global routing events during the SQL Slammer worm attack on January 25, The paper is organized as follows. Section 2 formally presents the Link-Rank model and presents the algorithm for graph construction and combining the views from multiple monitoring points. Section 3 show how Link-Rank is used to analyze BGP routing events, and provides a detailed look at a routing update burst, and a large AS failure. Section 4 2
3 presents another application of Link-Rank to examine routing during the SQL Slammer worm attack. Finally, Section 6 concludes the paper. 2. Link-Rank and Rank-Change graphs This section defines, with the help of examples, Link-Rank and Rank-Change graphs that concisely represent large-scale path vector dynamics in a simple form. In a path vector routing protocol such as BGP, routers exchange update messages that include the complete path used to reach the destination and the path information is typically used in loop detection, but in this case we use it for capturing BGP routing dynamics. 2. Definition and Construction of Link-Rank Graphs A Link-Rank graph is constructed from a path vector routing table by representing the paths as a directed graph. Each link in the graph is assigned a weight (i.e. rank) in terms of the number of routes that rely on the link. Figure (a) shows a sample topology (shown by the undirected edges). In this example topology, there are three prefixes that are advertised: prefix A is advertised by AS5, prefix B is advertised by AS6, and prefix C is advertised by AS7. Assuming a BGP peering session between our observation point and a router in AS, the path information is sent to the observation point. For instance, from point X, to reach prefix A, the next hop is AS, followed by AS2 and then finally AS5, that is the origin of the prefix. The objective of a Link-Rank graph is to represent the AS level links used from a particular vantage point in a visually compact form. Later, we describe how we use Link- Rank graphs to construct Rank-Change graphs for capturing dynamics. The bold directed edges in figure (a) constitute the Link-Rank graph for point X, showing how the three prefixes can be reached from AS. The weight on each link indicates the number of prefixes that can be reached by using the link. Note that the Link-Rank graph from a point will include only those ASs and links that are used to reach prefixes. In this example, we have presented the underlying topology, but in actual analysis, one does not know the complete AS-AS peering or connectivity. This link carries routes to 2 prefixes A and B, thus, net rank is +=2 AS 2 Prefix A AS 5 Since route to prefix C is not carried by the link AS AS2, its linkrank decreases by. 2 AS 2 AS 5 Prefix A Link disappears from the route to reach prefix B AS 2 AS Point of Observation X 2 AS 3 AS 4 Prefix C AS 7 Prefix B AS 6 AS Point of Observation X 2 AS 3 AS 4 AS 6 AS 7 Prefix C Prefix B AS AS 3 AS 4 (a) Link-Rank Graph for (b) Link-Rank Graph for (c) Rank-Change Graph Figure Graphs from Point X 3
4 @ I I More formally, we define the Link Rank graph as follows: Given a path vector routing table with entries of the "! form, the corresponding Link Rank graph is a directed graph where : # &%(' %*)+,, $ for some. In other words the vertices in the Link Rank graph are the nodes from the paths. # -.% /0 such that %, /0 is a subsequence in some. In other words, the set of edges in the Link Rank graph correspond to the links in the paths. Each link in the Link-Rank graph is assigned a weight based on the importance of the link. The measure of importance used in this study is number of routes that rely on that link, but other measures like address space coverage can also be used. More precisely, % /06)7"! the number of paths,,, that contain subsequence %, / Rank-Change Graphs: Tracing Link-Rank Changes Over Time A Link-Rank graph from a vantage point provides a static snapshot of the AS-AS peerings used to carry routes. Rank-Change graphs, which are derived over time from Link-Rank graphs, help in visually identifying the sections of the routes that change. Conceptually, a Rank-Change graph denotes the change in BGP routes as observed from a router over a period 8. The Rank-Change graph shows which AS links lost routes and which AS links gained routes from a router s perspective, and looking at this graph can give a visual picture of the routing change event from that router s perspective. A Rank-Change graph is weighted directed graph :9<;=> "! that captures the? A@ difference between a Link-Rank graph from time and a Link-Rank graph from time. The weight associated with each link indicates the change in the weight of that link. Thus, a positive weight would indicate a gain of routes carried over the link, while a negative weight would indicate a loss. For ease of presentation, a solid directed edge corresponds to a rank increase and a dotted directed? C?D! edge 50@F! to a rank decrease. More formally, let B and be two Link-Rank graphs obtained from the same path vector router at times and respectively. Algorithm constructs the corresponding Rank-Change graph: Algorithm : Constructing A Rank-Change Graph? C?! Input: Link-Rank graphs and Output: A directed Rank-Change graph "I "I 5 Construct a graph JI $JI such that 0@H! $ 5 %, I.% /0! for each edge.% /0!PO %, /0!RQ containing weight MN if M L &%, / TS then JI,UJI L %, /0 ; I,.% /0!.% /W!XO ;.% /0! MVI UM ; ; do The algorithm constructs the Rank-Change graph by adding edges that have changed in 4
5 %! I! I %! Link-Rank values, to build the edge set, and building the vertex set for vertices associated with these edges. The Rank-Change graph does not contain the edges that didn t undergo any rank change and? as L a result, the set of nodes may be reduced in the Rank-Change graph compared Assume at time, the Link-Rank graph in fig (a) changes to the Link-Rank graph in fig (b). This could be due to problems in the peering between AS-2 and AS-4, or some other policy reason. In most cases, we do not know which link failures triggered the route changes, and we use Rank-Change graphs to help narrow down on most likely candidates. The corresponding Rank-Change graph is shown in Figure (c). The solid rectangle in the Rank-Change graph identifies the point of observation. Including the point of observation is useful when we combine! Rank-Change graphs viewed from different points. In the! example above, the links and have increased in ranks by, by virtue of the! change in path for prefix B from,2,4,6 to the new path,3,4,6. Similarly, the links! and have reduced in ranks by (weight of -). Thus, Rank-Change graph visually indicates only sections have changed. 2.3 Combining RankChange Graphs from Different Vantage Points Each Rank-Change graph captures the dynamics as observed from the particular router s perspective, and for monitoring points, we would have at most Rank-Change graphs. Thus, there is a need to combine these views to construct a global picture. Algorithm 2 details how we can combine different rank change graphs to understand collective BGP dynamics. Since combining rank change graphs can increase the size of the global graph by a factor of in the worst case, it is necessary to abstract out most important changes from each viewpoint. We thus reduce each Rank-Change graph into a reasonably small graph representing the most important changes in the graph. These subgraphs are then combined into one graph by performing a union on the set of nodes, and a multiset union on the set of edges. We draw multiple links if required for AS-AS peerings that appear in more than one graph to later identify commonality. Algorithm 2: Combining Rank-Change Graphs 5 Input: Rank-Change Graphs for a Set of Routers for time interval 8 5 Output: Global Graph I9 I combining multiple views Initialization: K) 5 "I I, ; "! for each with Graph!G do "! Find a subgraph with a threshold ; to filter the most significant changes; 5 Construct Graph JI9 JI from the obtained s as follows:; JI(T"I ; I where is a multiset union operator; end I( 5
6 2.4 BGP Link-Rank and Rank-Change Graphs Link-Rank and Rank-Change graphs are defined in terms of arbitrary path vector routing protocols, but we use these graphs to study BGP routing dynamimcs and provide some insight into BGP. The BGP routing protocol is to used the exchange reachability information between Autonomous Systems (AS) and a BGP path consists of a sequence of Autonomous Systems (ASes). Each AS is modeled as a single node, and the peering sessions between routers in different ASs are modeled as edges in the graphs. The Link-Rank graph shows logical links between Autonomous Systems. Each logical link in the model may consist of several physical connection between two Autonomous Systems in the Internet. A path vector protocol such as BGP hides the details of these physical connections and only indicates the sequence of ASes used to reach the destination. It is also important to note that the Link-Rank graph does not provide a complete map of the Internet s AS topology. Instead, the link graph shows the ASes and inter-as connections that are used by a single router. There will be additional ASes that are not visible from the router s perspective, and thus these ASes do not occur in the router s Link-Rank graph. In other words, the Link-Rank graph is a proper subgraph of the Internet s AS topology and represents one view of the preferred paths selected by a router. Since the Internet is growing in size and a typical backbone router currently has routes to over 20K prefixes, it becomes useful to identify operationally important ASes by the number of prefixes they carry, and AS to AS level usage of BGP routes provides valuable insights on of how routing changes take place. The complete Link-Rank graph contains several thousand ASes so in order to concisely present the graph and highlight bulk changes, we often show only the links whose rank exceeds some threshold value. Note that the objective is to understand BGP dynamics in the aggregate and the threshold value can be adjusted to vary the amount the dynamics of interest. 2.5 Extracing Event Information from BGP logs In the construction of a Rank-Change graph, we compare BGP routes from two snapshots in the time-interval 8. If Rank-Change graphs were to be laid out on a real time basis, then one critical aspect of capturing event dynamics would be identifying event boundaries in the BGP log. When a predetermined interval is not known advance, we select an interval with the help of thresholding and waiting. In our context, one candidate for threshold parameter is the magnitude of Rank- Change. In a simplistic scheme, the? threshold value is pre-defined, and we start with a snapshot of the routes at time. Whenever the total Rank-Change crosses this predefined threshold, we start a convergence timer (around 5 mins) to reduce the of BGP convergence. When the timer expires at time, another snapshot of the system is O and? with these two snapshots, we can construct the Rank-Change graphs for For the next sequence, acts as the starting point and Rank-Change graphs are constructed for 8. Further improvements on this basic threshold AS path attribute may include both AS sequences and AS sets that result from aggregation, but AS sets rarely occurred in the data we observed 6
7 Number of Events Detected t=20k t=40k t=60k t=00k t=200k 5 0 0/23 0/24 0/24 0/25 0/25 0/26 0/26 0/27 0/27 Figure 2 Effects of different threshold values on identification of number of events for January 2003 scheme may be achieved, by employing other feedback based learning techniques, like the beta-gamma adaptive threshold regulation method explained in [8]. Figure 2 shows the variation of the number of events captured with varying values of thresholds. As expected, increasing the threshold decreases the number of events captured. 3. Analysing BGP Path Dynamics In this section we use the concepts from section 2 on BGP data collected from Oregon RouteViews[3] and RIPE NCC[2] over several months in 2002 and To illustrate the usefulness of the Link-Rank tools, three events are examined in detail. We pick these cases, out of the many results we had, to be representative of three different classes of events. All these events had similar update messages spikes, yet completely contrasting routing behaviors as seen by our graphs. In all three cases, we only show Link-Rank edges with a weight greater than 200. This value called presentation threshold, helps provide clarity in the presenting the graphs and has the effect of filtering out small changes. Presentation thresholds can be changed to vary the amount of details, according to the interest of the viewer. The greater the presentation threshold, the lesser the number of edges in the graph. We consistently maintain the same threshold of 200 for all our cases to establish a common ground for comparison. The data retrieved from Ripe and RouteViews is first preprocessed to remove monitoring artifacts in the BGP data collection methodology[4]. In particular, if the BGP session between the monitoring point and the router being monitored breaks, then the entire routing table is exchanged after the session is re-established. This can result in large volumes of BGP updates, but only reflects re-establishement of peering session with the monitoring point. 3. Case I: th August 2003 As a first case, we examine the BGP dynamics on th August 2003, a date where no specific BGP related problems or anomalies were reported on standard operational mailing lists. Yet figure 3(a) shows a huge spike in the BGP updates on that day compared to other days. However, even for this simple example there is a large amount of logged data and understanding the activity during even this normal time period can be a challenge for operations. Figure 3(b) shows the Rank-change graph around 7:36 GMT, and the edge 7
8 S AS330 4e e+06 Number of Announcements Number of Withdraws AS Number of Prefix Updates 3e e+06 2e+06.5e+06 e AS4637 AS AS AS AS AS / 08/ 08/2 08/2 Time 08/3 08/3 08/4 AS AS AS (a) Number of Updates in 6 hour bins from Aug th to Aug 3th 2003 (b) Rank-Change Graph for AS 330 on Aug th 2003 Figure 3 Case-I weight for each links counts the change in Link-Rank in the last 5 mins. Note that all the changes are observed from vantage point connected to AS 330. Rank-Change graphs from other monitoring points do not show any significant rank changes. Update logs confirm that in the interval between 7:25 and 7:40, only one AS of the over 30 monitored AS, shows high routing activity corresponding to 3(b). The graph shows that around 0,000 prefixes stopped using a path beginning with S, and most of them switched to a path beginning with. Below AS 239, the path changes are spread across multiple links to 4323, 4637, 732, 708 and But large scale path changes did not occur below the first two hops. The Rank-Change graph for a single AS achieves the first step of compactly representing a high number of updates to give a simple picture of how the routes from a single router s viewpoint changed. Note that in this case, the other routers do not see any significant rank-changes and hence the combined graph from all routers is simply the Rank-Change graph from figure 3(b). Although the Rank-Change graph shows only two neigbhors for AS 330, there are many more neighbors present in the update logs that are omitted due to rank changes less than presentation threshold(200 in this case). Looking at the distribution of rank changes lower down, it seems likely the routing changes observed are due to some local peering problems between AS 330 and AS 239 or some internal problems at AS 239 or AS 330. As observed from all other points, none of the links underwent a loss or gain of more than 200 prefixes. Rank-Change graphs for later times during this day, produced more such large routing swings to and away from AS 239, observed from the same AS. Through this quick and simple analysis, and examining continuous Rank-Change graphs for extended periods, an operator can quickly identify the dominant BGP dynamics during this time period. 8
9 Note that in Figure 3(b) (and other later Rank-Change graphs), we do not see a perfect match in the number of prefixes lost by an AS on one link, and the number of prefixes gained by that AS on other links. In this case, AS330 loses 987 prefixes on the peering with AS 239 and there is a gain of 877 prefixes on the peering with AS 294. The difference can be due to the slight variation in the total number of reachable prefixes at any instant of time. The presentation threshold can also be responsible for filtering out some of the smaller changes. 3.2 Case II: October 3, 2002 In a second example, the Link-Rank tools detected some unusual activity around 2:0 pm GMT on October 3, The algorithm produced several Rank-Change graphs from various monitoring point during that day and showed large link rank changes from multiple points. Figure 5(a) shows the number of updates in 6-hour intervals around October 3, 2002 with a huge spike. Figure 4(a) shows the Rank-Change graph for AS Note that although, the view is observed from AS 6539, none of the links adjacent to AS 6539 actually appear in the graph. This is because none of these direct links show significant changes. The figure shows 6506 routes switched from AS 70 to other ASs. Similar to our analysis in the Case example, an operator may suspect the source of the event is either AS 70, or the peering between AS294 and AS70. But unlike Case, this event also generated Rank-Change graphs for many other routers being monitored and Figure 4(b) and Figure 4(c) show the Rank-Change graph as viewed from two other ASs, AS 330 and AS 294 respectively. To better understand the event, we can combine Rank-Change graphs for different observation points into a single representative graph. We use algorithm 2 and excluding edges with changes less than 000. Figure 4(d) shows the resulting combined view. We can see a high number of dashed edges into AS 70, as well as no solid edges to AS 70. The high in-degree of the dashed edges in the global graph suggests that AS 70 lost routes observed from various vantage points and is the likely cause of event in this case. This also indicates this event had a significant impact on all of our monitoring points. Furthermore, we can even identify common segments, such as the peering between AS294 and AS70, that lost routes as viewed from multiple points. Our analysis is confirmed by reports about traffic congestion with AS 70 on the North American Network Operators (NANOG) mailing list[9]. We can see that the Link-Rank tools not only help an operator identify the potential problem, they provide a concise description of large volumes of data and allow the operator to get a visual feel of the BGP dynamics resulting from this change. 4. BGP Dynamics During the SQL Worm As a final representative case, we look at the BGP activities during the SQL Slammer worm attack. The SQL Slammer worm alias Sapphire infected around hosts in a period of 30 minutes between 5:29 GMT and 6:00 GMT [0] in January Beginning around 05:00 Sat Jan GMT, the MS-SQL Server Worm began propagating through the Internet. Infected hosts generated a high volume of malicious worm probe traffic to UDP port 434. Traffic congestion led to denial of service against many hosts 9
10 (a) Rank-Change Graph from AS 6539 (b) Rank-Change Graph from AS AS 294 AS 330 (router ) AS 330 (router 2) AS 708 AS 22 AS 6539 AS (c) Rank-Change Graph from AS 294 (d) Combined Rank-Change Graph Figure 4 Case II: October 3, 2002 and as well as the network infrastructure. Concerns were raised on how Internet Routing was affected by the worm and [] showed that around 5,000 prefixes were instantly withdrawn after the worm started infecting hosts. Internet health report for that time [2] showed that the delays on lot of links were above the critical value. Though Sapphire did not carry any malicious payload, its damage was caused by overloading networks by saturating the bandwidth and taking database servers out of operation. As a result, many individual sites reportedly lost connectivity as their access bandwidth was saturated by local copies of the worm. To analyze the amount of Internet backbone disruption, we use Link-Rank to examine the extremely large volume of BGP data collected during this time 0
11 4e e+06 No. of Announcements No. of Withdraws 8e+06 7e+06 Number of Announcements Number of Withdraws Number of Prefix Updates 3e e+06 2e+06.5e+06 e+06 Number of Prefix Updates 6e+06 5e+06 4e+06 3e+06 2e e /02 0/02 0/03 0/03 0/04 0/04 0/05 0 0/24 0/24 0/25 0/25 0/26 0/26 0/27 0/27 Time Time (a) Case-II, October 2002 Figure 5 Update Count Plots (b) Case-III, January 2003 period. Figure 5(b) shows the number of updates observed at all the monitoring points at RouteViews in 6 hour bins. Once again, we can see the spike in the updates around the worm attack. Using the concepts from section 2, we constructed Rank-Change graphs from various vantage points during the time window 05:25 am to 05:37 am GMT on Jan 25, To maintain consistency, in figures 6(a), 6(b) and 6(c), we show the Rank-Change graphs for the same three monitored AS used in Case-I and Case-II. We see that in all three cases, the dashed lines (route loss) dominate. This suggests that routes lost on one sub-path are not compensated by a gain on another. In other words, the routes were withdrawn along the shown AS-AS peerings, but for some reason not transfered to another AS-AS peering. Dashed lines (or Route loss links) dominating the Rank-Change graphs is not very common, and is an indication of loss of reachability. Whether the reachability is affected by problems at the edge, core or close to the monitoring point, may not necessarily be understood with the help of Rank-Change graphs and would require operator expertise. Figure 6(d) shows the combined graph for these three monitoring points. A main result is actually the sparse nature of both individual and combined Rank-Change graphs. Although the volume of BGP updates was very high at each of the monitoring points, there were no large-scale common changes. This suggests that the changes were distributed widely with no one link suffering a large hit. The analysis on SQL slammer worm in [0] shows that a large number edge ASs were affected and the damage caused was geographically diverse. We showed the effectiveness of Link-Rank using three diverse cases of BGP routing changes. In the first case, although a large number of route changes were observed at one point in the network, such large-scale change did not show up on the Rank-Change graph drawn from other vantage points, indicating local dynamics that have little impact on the rest of the Internet. In the second case, although the amount of route changes observed from the individual points look moderate, the Rank-Change graphs from multiple points reveal a common pattern of routes moving away from the same AS, indicating that the event had a much wider impact on the overall Internet traffic flow. In the third case, an exceptionally high volume of BGP updates was observed during the worm attack on Jan 25th, However, the Rank-Change graphs showed that the magnitude of changes
12 (a) Rank-Change, AS 330 (b) Rank-Change, AS 294 (c) Rank-Change, AS AS 330 AS 852 AS 82 AS 22 AS 267 AS 2493 AS 608 AS 6539 AS 257 (d) Combined Rank-Change Graph Figure 6 Case III: Slammer Worm attack were much lesser and there were hardly any common pattern of route changes. Changes occurred at different parts of the Internet, indicating the distributed nature of the event. Note that although we used Link-Rank in constructing Rank-Change graphs, for brevity, we did not explicitly present Link-Rank graphs in our case case studies. While selecting views to combine for a better picture, the LinkRank graph is very useful here to see how important the peerings are and how topology pictures compare in order to select peer routers that contribute useful and significant information about the Autonomous Systems and/or links of interest. 5. Related Work In this paper, we analyzed AS path information from BGP update messages. [3] and [4] also used AS path information from BGP routing tables, but their objective was to map and derive characteristics of the Internet inter-domain topology. [5] further inferred the relationships between ASes using AS path information. [6] also inferred inter-as 2
13 relationship, but their approach is based on the consistency among multiple routing tables. These studies have led to a better understanding of the structure of the Internet topology and the commercial relationship between ASes. However, each of them gives us only a snapshot of the Internet and tells us little about how the Internet routing changes. Our study, on the other hand, follows AS path changes and their effects on the overall routing topology to reveal the source and impact of routing problems. Researchers have looked at BGP updates during stressful events such as the code red worm [7]. According to the study in [4], the worm had a big impact on some edge networks, and weaknesses in BGP s design and implementation substantially amplified the impact. Although this kind of studies offer some insights into the causes of the BGP updates in the routing events, they lack a formal model to systematically identify these causes and assess their impacts. This paper aims to provide such a formal model. On the visualisation front, projects like BGPlay [8] for visualization of inter-as routing instability and HERMES [9] for visualization of inter-as connectivities are examples of succesful BGP visualization. [20] also describes a good visualization tool for BGP called Elisha. Though these visualizations are related, none of these tools directly capture BGP dynamics in the sense discussed in this paper. 6. Conclusion The large volume of BGP log data obscures the view of BGP routing dynamics and makes it difficult to extract significant routing outages from routine updates. Furthermore, the limited view of individual vantage points from which the data is collected also severely constrains the ability to derive the causes and assess the impact of observed routing dynamics. As a first step towards a global Internet routing monitoring toolset, the Link-Rank design explored a new approach for presenting the routing changes in a concise graphic form. Simply weighting the links individually based on prefixes reached per vantage point, Rank-Change graphs were able to capture AS level dynamics and give insight about the event. Combining Rank-Change graphs from multiple points allowed us to narrow down on the likely cause of change. We believe Link-Rank can be used as an effective monitoring toolset either at a single monitoring point to draw a Rank-Change graph, or at a BGP monitoring site collecting updates from multiple vantage points. A network operator can use the former to monitor the paths used by his own network, and contrast the latter against the locally observed BGP events to assess the scope of the impact. As shown in our case studies, these graphs can be used to pinpoint the cause of change and evaluate its impact on the rest of the Internet. Our future work includes the use of IP address space metric in combination with the prefix count metric as the link weight in drawing routing graphs, the consideration of the tier level of ASes in the rank change analysis, and further improvements in combining multiple views to scale well with increasing numbers of vantage points. References [] Y. Rekhter and T. Li, A border gateway protocol (BGP-4), Request for Comment (RFC): 77, Mar
14 [2] RIPE, Routing Information Service Project, [3] Univeristy of Oregon, The Route Views Project, [4] L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S. Wu, and L. Zhang, Observation and analysis of BGP behavior under stress, in Proceedings of the ACM SIGCOMM Internet Measurement Workshop 2002, Nov [5] R. Govindan, C. Alaettinoglu, G. Eddy, D. Kessens, S. Kumar, and W. Lee, An architecture for stable, analyzable internet routing, IEEE Network, January/February 999. [6] Ramesh Govindan and Hongsuda Tangmunarunkit, Heuristics for internet map discovery, in IEEE INFOCOM 2000, Tel Aviv, Israel, March 2000, IEEE, pp [7] H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger, On inferring aslevel connectivity from bgp routing tables, Technical Report UM-CSE-TR , [8] Chengxiang Zhai, Peter Jansen, Emilia Stoica, Norbert Grot, and David A. Evans, Threshold calibration in CLARIT adaptive filtering, in Text REtrieval Conference, 998, pp [9] NANOG mailing list, [0] David Moore et. al., The spread of the Sapphire/Slammer worm, nweaver/sapphire/. [] Tim Griffin, BGP Impact of SQL Worm, griffin/bgp monitor/sql worm.html. [2] Internet Health Report, Sapphire Worm Attack, udp worm/ internet health.jpg. [3] R. Govindan and A. Reddy, An analysis of inter-domain topology and routing stability, in Proceedings of the IEEE INFOCOM 97, Apr [4] M. Faloutsos, P. Faloutsos, and C. Faloutsos, On power-law relationships of the internet topology, in Proceedings of the ACM SIGCOMM 99, 999. [5] L. Gao, On inferring autonomous system relationships in the internet, IEEE/ACM Transactions on Networking, vol. 9, no. 6, pp , 200. [6] L. Subramanian, S. Agarwal, J. Rexford, and R. H. Katz, Characterizing the internet hierarchy from multiple vantage points, in Proceedings of the IEEE INFOCOM 02, New York, NY, June [7] CERT Advisory CA-200-9, Code Red Worm Exploiting Buffer Overflow In IIS Indexing Service DLL, [8] BGPlay, BGPlay, compunet/bgplay/. [9] HERMES, HERMES Visualization of Internet Service Provider Relationships, hermes/. [20] ELISHA, ELISHA Visualizing the Internet Anomalies and Dynamics, 4
Towards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
Impact of BGP Dynamics on Router CPU Utilization
Impact of BGP Dynamics on Router CPU Utilization Sharad Agarwal 1, Chen-Nee Chuah 2, Supratik Bhattacharyya 3, and Christophe Diot 4 1 University of California, Berkeley, USA, [email protected]
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
An Overview of Solutions to Avoid Persistent BGP Divergence
An Overview of Solutions to Avoid Persistent BGP Divergence Ravi Musunuri Jorge A. Cobb Department of Computer Science The University of Texas at Dallas Email: musunuri, cobb @utdallas.edu Abstract The
Inter-domain Routing
Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010 Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system
Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.
Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,
BGP Routing Stability of Popular Destinations
BGP Routing Stability of Popular Destinations Jennifer Rexford, Jia Wang, Zhen Xiao, and Yin Zhang AT&T Labs Research; Florham Park, NJ Abstract The Border Gateway Protocol (BGP) plays a crucial role in
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude
Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
Inter-domain Routing. Outline. Border Gateway Protocol
Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small
BGP Route Analysis and Management Systems
BGP Route Analysis and Management Systems Alex A. Stewart and Marta F. Antoszkiewicz Department of Computer Science The University of Northern Iowa 305 ITTC Cedar Falls, Iowa 50614-0507 {astewart, mantoszk}@cs.uni.edu
IPv4 Address Allocation and the BGP Routing Table Evolution
IPv Address Allocation and the BGP Routing Table Evolution Xiaoqiao Meng, Zhiguo Xu, Beichuan Zhang, Geoff Huston, Songwu Lu, Lixia Zhang Computer Science Dept., UCLA APNIC Los Angeles, CA 99 Brisbane,
Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
Dynamics of Prefix Usage at an Edge Router
Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, [email protected]}
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
Protecting BGP Routes to Top Level DNS Servers
Protecting BGP Routes to Top Level DNS Servers Lan Wang 1, Xiaoliang Zhao 2, Dan Pei 1, Randy Bush 3, Daniel Massey 2, Lixia Zhang 1 Abstract The Domain Name System (DNS) is an essential part of the Internet
Border Gateway Protocols
Paper 106, ENG 104 Border Gateway Protocols Sadeta Krijestorac, Marc Beck, Jonathan Bagby Morehead State University University of Louisville Florida Atlanic University [email protected] [email protected]
KT The Value Networking Company
KT The Value Networking Company IRIMS (Internet Routing Information Management System) 2005. 9 Y.D. KIM, G.E.KIM, C.K.Hwang, J.H.YOO (webman, gekim, ckhwang, styoo@kt kt.co..co.kr) Abstract An AS (Autonomous
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] ABSTRACT
Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur
Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the
BGP route propagation. Internet AS relationships, Routing policy on Internet paths. Example of commercial relationship. Transit vs.
BGP route propagation Internet AS relationships, Routing policy on Internet paths Z. Morley Mao Lecture 5 Jan 20, 2005 Connectivity does not imply reachability Not all possible routes propagate Commercial
Some Examples of Network Measurements
Some Examples of Network Measurements Example 1 Data: Traceroute measurements Objective: Inferring Internet topology at the router-level Example 2 Data: Traceroute measurements Objective: Inferring Internet
Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
Intelligent Routing Platform White Paper
White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5
Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone
3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
Introduction to Routing
Introduction to Routing How traffic flows on the Internet Philip Smith [email protected] RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Internet inter-as routing: BGP
Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
Border Gateway Protocol (BGP-4)
Vanguard Applications Ware IP and LAN Feature Protocols Border Gateway Protocol (BGP-4) Notice 2008 Vanguard Networks 25 Forbes Blvd Foxboro, MA 02035 Phone: (508) 964 6200 Fax: (508) 543 0237 All rights
Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?
Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Simon Balon and Guy Leduc Research Unit in Networking EECS Department- University of Liège (ULg) Institut Montefiore, B28 - B-4000
How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)
Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia
Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks
Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics
Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics WHITE PAPER Table of Contents Introduction 3 Route-Flow Fusion 4 BGP Policy Visibility 5 Traffic Visibility
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Quantifying the BGP routes diversity inside a tier-1 network
Quantifying the BGP routes diversity inside a tier-1 network Steve Uhlig, Sébastien Tandel Department of Computing Science and Engineering Université catholique de Louvain, Louvain-la-neuve, B-1348, Belgium
B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure
Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Week 4 / Paper 1. Open issues in Interdomain Routing: a survey
Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many
BGP. 1. Internet Routing
BGP 1. Internet Routing (C) Herbert Haas 2005/03/11 1 Internet Routing Interior Gateway Protocols (IGPs) not suitable for Inter-ISP routing Technical metrics only No policy features Inter-ISP routing is
Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms
Outline Internet Routing Venkat Padmanabhan Microsoft Research 9 pril 2001 Routing algorithms distance-vector (DV) link-state (LS) Internet Routing border gateway protocol (BGP) BGP convergence paper Venkat
An Efficient Load Balancing Technology in CDN
Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University
CLASSLESS INTER DOMAIN ROUTING - CIDR
CLASSLESS INTER DOMAIN ROUTING - CIDR Marko Luoma Helsinki University of Technology Laboratory of Telecommunications Technology [email protected] ABSTRACT As the Internet evolved and become more familiar
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Internet Routing Based on Computer Networking, 4 th Edition by Kurose and Ross Intra-AS Routing Also known as Interior Gateway Protocols (IGP) Most common Intra-AS routing protocols:
B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure
Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better
Routing Protocols (RIP, OSPF, BGP)
Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to
Understanding BGP Next-hop Diversity
This paper was presented as part of the 14th IEEE Global Internet Symposium (GI) 211 at IEEE INFOCOM 211 Understanding BGP Next-hop Diversity Jaeyoung Choi, Jong Han Park, Pei-chun Cheng, Dorian Kim, Lixia
MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
Embedded BGP Routing Monitoring. Th. Lévy O. Marcé
Embedded BGP Routing Monitoring Th. Lévy O. Marcé Introduction & Motivations Off-line BGP routing monitoring initiatives (i.e based on router logs) already exist: Periodic report : The CIDR Report Objective
Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Routing with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations Suresh Babu Panatula Department of Computer Science and Engineering Sri Sai Aditya Institute of Science and Technology,
Path Selection Methods for Localized Quality of Service Routing
Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures
Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures T. Anji Kumar [email protected] Dept. of IT/ UCEV JNTUK Vizianagaram, 535003, India Dr MHM Krishna Prasad Dept.
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud
Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN
