Some Examples of Network Measurements
|
|
|
- Patience Hawkins
- 10 years ago
- Views:
Transcription
1 Some Examples of Network Measurements Example 1 Data: Traceroute measurements Objective: Inferring Internet topology at the router-level Example 2 Data: Traceroute measurements Objective: Inferring Internet topology at the level of Autonomous Systems (ASes) Example 3 Data: BGP measurements Objective: Inferring Internet topology at the level of Autonomous Systems (ASes) 1
2 Measurement tool: traceroute traceroute traceroute to ( ), 30 hops max, 60 byte packets 1 fp-core.research.att.com ( ) 2 ms 1 ms 1 ms 2 ngx19.research.att.com ( ) 1 ms 0 ms 0 ms ms 1 ms 1 ms ms 2 ms 2 ms 5 tbr1.n54ny.ip.att.net ( ) 4 ms 5 ms 3 ms 6 ggr7.n54ny.ip.att.net ( ) 3 ms 3 ms 3 ms ms 4 ms 8 ms 8 jfk-core-02.inet.qwest.net ( ) 3 ms 3 ms 4 ms 9 dca-core-01.inet.qwest.net ( ) 11 ms 11 ms 11 ms 10 dca-edge-04.inet.qwest.net ( ) 11 ms 15 ms 11 ms 11 gw-dc-mcnc.ncren.net ( ) 18 ms 18 ms 18 ms 12 rlgh7600-gw-to-rlgh1-gw.ncren.net ( ) 18 ms 18 ms 18 ms 13 roti-gw-to-rlgh7600-gw.ncren.net ( ) 20 ms 20 ms 20 ms 14 art1sp-tel1sp.netcom.duke.edu ( ) 23 ms 20 ms 20 ms 15 webhost-lb-01.oit.duke.edu ( ) 21 ms 38 ms 20 ms 1 traceroute measurement: about 1KB 2
3 Large-scale traceroute experiments 1 million x 1 million traceroutes: 1PB 3
4 Two Examples of inferred ISP topology 4
5 About the Traceroute tool (1) traceroute is strictly about IP-level connectivity Originally developed by Van Jacobson (1988) Designed to trace out the route to a host Using traceroute to map the router-level topology Engineering hack Example of what we can measure, not what we want to measure! Basic problem #1: IP alias resolution problem How to map interface IP addresses to IP routers Largely ignored or badly dealt with in the past New efforts in 2008 for better heuristics 5
6 Interfaces 1 and 2 belong to the same router 6
7 IP Alias Resolution Problem for Abilene (thanks to Adam Bender) 7
8 About the Traceroute tool (2) traceroute is strictly about IP-level connectivity Basic problem #2: Layer-2 technologies (e.g., MPLS, ATM) MPLS is an example of a circuit technology that hides the network s physical infrastructure from IP Sending traceroutes through an opaque Layer-2 cloud results in the discovery of high-degree nodes, which are simply an artifact of an imperfect measurement technique. This problem has been largely ignored in all large-scale traceroute experiments to date. 8
9 (a) (b) 9
10 10
11 About the Traceroute tool (3) The irony of traceroute measurements The high-degree nodes in the middle of the network that traceroute reveals are not for real If there are high-degree nodes in the network, they can only exist at the edge of the network where they will never be revealed by generic traceroute-based experiments Additional irony Bias in (mathematical abstraction of) traceroute Has been a major focus within CS/Networking literature Non-issue in the presence of above-mentioned problems 11
12 Example 1: Lessons learned Know your measurement technique! Question: Can you trust the data obtained by your tool? Know your data! Critical role of Data Hygiene in the Petabyte Age Corollary: Petabytes of garbage = garbage Data hygiene is often viewed as dirty/unglamorous work Question: Can the data be used for the purpose at hand? Regarding Example 1: (Current) traceroute measurements are of (very) limited use for inferring router-level connectivity It is unlikely that future traceroute measurements will be more useful for the purpose of router-level inference 12
13 A textbook example for what can go wrong J.-J. Pansiot and D. Grad, On routes and multicast trees in the Internet, ACM Computer Communication Review 28(1), Original traceroute data -- purpose for using the data is explicitly stated Most of the issues with traceroute are listed! M. Faloutsos, P. Faloutsos, and C. Faloutsos, On the power-law relationships of the Internet topology, Proc. ACM SIGCOMM 99, Rely on the Pansiot-Grad data, but use it for a very different purpose Take the available data at face value, even though Pansiot/Grad list most of the problems There is no scientific basis for the reported power-law findings! R. Albert, H. Jeong, and A.-L. Barabasi, Error and attack tolerance of complex networks, Nature, Do not even cite original data source (i.e., Pansiot/Grad) Take the results of FFF 99 at face value The reported results are all wrong! 13
14 Applying lessons to Example 2 Example 2: Use of traceroute measurements to infer Internet topology at the level of Autonomous Systems (ASes) Know your measurement technique! traceroute (see Example 1) Know your data! Main source of errors: IP address sharing between BGP neighbors makes mapping traceroute paths to AS paths very difficult Up to 50% of traceroute-derived AS adjacencies appear to be bogus 14
15 Applying lessons to Example 2 (cont.) Regarding Example 2 (Current) traceroute measurements are of (very) limited use for inferring AS-level connectivity Obtaining the ground truth is very challenging It is possible that in the future, more targeted traceroute measurements in conjunction with BGP data will be more useful for the purpose of inferring AS-level connectivity 15
16 Applying lessons to Example 3 Example 3: Use of BGP data to infer Internet topology at the level of Autonomous Systems (ASes) Know your measurement technique! BGP -- de facto inter-domain routing protocol BGP -- designed to propagate reachability information among ASes, not connectivity information Engineering hack not designed to obtain connectivity information Example of what we can measure, not what we want to measure! Collect BGP routing information base (RIB) information from as many routers as possible 16
17 Applying lessons to Example 3 (cont.) Know your data! Examining the hygiene of BGP measurements requires significant commitment and domain knowledge Parts of the available data seem accurate and solid (i.e., customer-provider links, nodes) Parts of the available data are highly problematic and incomplete (i.e., peer-to-peer links) Ground truth is hard to come by Regarding Example 3 (Current) BGP-based measurements are of questionable quality for inferring AS-level connectivity Obtaining the ground truth is very challenging It is possible that in the future, more targeted traceroute measurements in conjunction with BGP data will be more useful for the purpose of inferring AS-level connectivity 17
18 A Reminder Data-driven network analysis in the presence of high-quality data that can be taken at face value All models are wrong but some are useful (G.E.P. Box) Data-driven network analysis in the presence of highly ambiguous data that should not be taken at face value When exactitude is elusive, it is better to be approximately right than certifiably wrong. (B.B. Mandelbrot) 18
19 SOME RELATED REFERENCES L. Li, D. Alderson, W. Willinger, and J. Doyle, A first-principles approach to understanding the Internet s router-level topology, Proc. ACM SIGCOMM J.C. Doyle, D. Alderson, L. Li, S. Low, M. Roughan, S. Shalunov, R. Tanaka, and W. Willinger. The "robust yet fragile" nature of the Internet. PNAS 102 (41), D. Alderson, L. Li, W. Willinger, J.C. Doyle. Understanding Internet Topology: Principles, Models, and Validation. ACM/IEEE Trans. on Networking 13(6), L. Li, D. Alderson, J.C. Doyle, W. Willinger. Toward a Theory of Scale-Free Networks: Definition, Properties, and Implications. Internet Mathematics 2 (4), R. Oliveira, D. Pei, W. Willinger, B. Zhang, L. Zhang. In Search of the elusive Ground Truth: The Internet's AS-level Connectivity Structure. Proc. ACM SIGMETRICS B. Krishnamurthy and W. Willinger. What are our standards for validation of measurement-based networking research? Proc. ACM HotMetrics Workshop W. Willinger, D. Alderson, and J.C. Doyle. Mathematics and the Internet: A Source of Enormous Confusion and Great Potential. Notices of the AMS, Vol. 56, No. 2,
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
Towards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
Internet (IPv4) Topology Mapping. Department of Computer Science The University of Texas at Dallas
Internet (IPv4) Topology Mapping Kamil Sarac ([email protected]) Department of Computer Science The University of Texas at Dallas Internet topology measurement/mapping Need for Internet topology measurement
Active Measurements: traceroute
Active Measurements: traceroute 1 Tools: Traceroute Exploit TTL (Time to Live) feature of IP When a router receives a packet with TTL=1, packet is discarded and ICMP_time_exceeded returned to sender Operational
Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
ECONOMIZING ISP INTERCONNECTIONS AT INTERNET EXCHANGE POINTS
2006 Society for Design and Process Science ECONOMIZING ISP INTERCONNECTIONS AT INTERNET EXCHANGE POINTS Jörn Altmann TEMAP, Department of Industrial Engineering, School of Engineering, Seoul National
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
BGP route propagation. Internet AS relationships, Routing policy on Internet paths. Example of commercial relationship. Transit vs.
BGP route propagation Internet AS relationships, Routing policy on Internet paths Z. Morley Mao Lecture 5 Jan 20, 2005 Connectivity does not imply reachability Not all possible routes propagate Commercial
Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone
3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement
Border Gateway Protocols
Paper 106, ENG 104 Border Gateway Protocols Sadeta Krijestorac, Marc Beck, Jonathan Bagby Morehead State University University of Louisville Florida Atlanic University [email protected] [email protected]
Traceroute-Based Topology Inference without Network Coordinate Estimation
Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.
Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
Week 4 / Paper 1. Open issues in Interdomain Routing: a survey
Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
Internet Topology. Yihua He [email protected] Michalis Faloutsos [email protected]. University of California, Riverside. Glossary 2.
Internet Topology Yihua He [email protected] Michalis Faloutsos [email protected] Georgos Siganos [email protected] University of California, Riverside Contents Glossary 2 1 Definition 2 2 Introduction
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
Inter-domain Routing
Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010 Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system
On Routing Asymmetry in the Internet
On Routing Asymmetry in the Internet Yihua He Michalis Faloutsos Srikanth Krishnamurthy Bradley Huffaker [email protected] [email protected] [email protected] [email protected] Department of Computer Science
AN INITIAL PEER CONFIGURATION ALGORITHM
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS Tomoyuki Ishii and Atsushi Inoie * Department of Network Engineering, Kanagawa Institute of Technology, Atsugi-city, Japan
Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident
Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident Rahul Hiran 1, Niklas Carlsson 1, and Phillipa Gill 2 1 Linköping University, Sweden 2 Citizen Lab, Munk School
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
HTS: A Hierarchical Method for Load Balancing in Autonomous Networks
74 HTS: A Hierarchical Method for Load Balancing in Autonomous Networks MohammadReza HeidariNezhad, Zuriati Ahmad Zukarnain, Nur Izura Udzir and Mohamed Othman Faculty of Computer Science & Information
Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
The Internet Is Like A Jellyfish
The Internet Is Like A Jellyfish Michalis Faloutsos UC Riverside Joint work with: Leslie Tauro, Georgos Siganos (UCR) Chris Palmer(CMU) Big Picture: Modeling the Internet Topology Traffic Protocols Routing,
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur
Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution
Understanding Large Internet Service Provider Backbone Networks
Understanding Large Internet Service Provider Backbone Networks Joel M. Gottlieb IP Network Management & Performance Department AT&T Labs Research Florham Park, New Jersey [email protected] Purpose
Quantifying the BGP routes diversity inside a tier-1 network
Quantifying the BGP routes diversity inside a tier-1 network Steve Uhlig, Sébastien Tandel Department of Computing Science and Engineering Université catholique de Louvain, Louvain-la-neuve, B-1348, Belgium
A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option
A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option Matthew Luckie and kc claffy {mjl,kc}@caida.org CAIDA, UC San Diego, USA Abstract. Artifacts in traceroute
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations Suresh Babu Panatula Department of Computer Science and Engineering Sri Sai Aditya Institute of Science and Technology,
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics
Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics WHITE PAPER Table of Contents Introduction 3 Route-Flow Fusion 4 BGP Policy Visibility 5 Traffic Visibility
Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics
Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics Mohit Lad, Lixia Zhang Computer Science Department University of California Los Angeles, CA 90095, USA mohit,lixia @cs.ucla.edu Dan Massey
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN
Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D.
Active measurements: networks Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D. Outline Organization of Internet routing Types of domains Intra- and inter-domain routing Intra-domain
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Estimating Network Layer Subnet Characteristics via Statistical Sampling
Estimating Network Layer Subnet Characteristics via Statistical Sampling M. Engin Tozal and Kamil Sarac Department of Computer Science The University of Texas at Dallas, Richardson, TX 758 USA engintozal,[email protected]
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
IP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
Using the Border Gateway Protocol for Interdomain Routing
CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous
Lesson 5-3: Border Gateway Protocol
Unit 5: Intradomain and Interdomain Protocols Lesson 5-3: Gateway Protocol At a Glance The Gateway Protocol (BGP) is an interdomain routing protocol used in TCP/IP internetworks. BGP was created to allow
Building MPLS VPNs with QoS Routing Capability i
Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
Internet topology and performance analytics for mapping critical network infrastructure
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Internet topology and performance analytics for mapping critical network infrastructure CAIDA/UCSD PI k claffy 16-18 December 2014 1 Team
