Internet (IPv4) Topology Mapping. Department of Computer Science The University of Texas at Dallas

Size: px
Start display at page:

Download "Internet (IPv4) Topology Mapping. Department of Computer Science The University of Texas at Dallas"

Transcription

1 Internet (IPv4) Topology Mapping Kamil Sarac Department of Computer Science The University of Texas at Dallas

2 Internet topology measurement/mapping Need for Internet topology measurement Help with network management or surveillance Robustness with respect to failures/attacks Comprehend spreading of worms/viruses Relevant in active defense scenarios Scientific discovery Scale-free (power-law), small-world, rich-club, disassortativity, 2

3 Traditional approach in layer 3 topology mapping: Router level maps 3

4 Network layer Internet topology maps sample IP network segment view at Layer 3 number of routers connected via subnets R 1 R 2 R 3 R 4 R 5 R 6 R 7 4

5 router level map at layer 3 corresponding router level map view R 1 R 2 R 3 R 4 R 5 R 6 R 7 5

6 How to build router level network maps? Involves topology data collection and topology construction How to collect topology data? Traceroute a network debugging and diagnostic tool End-to-end traces from k vantage points to n destinations where (typically) k << n How to construct topology maps? Resolving alias IP addresses Resolving anonymous routers 6

7 Traceroute-based topology data collection ksarac> tracert -d Tracing route to [ ] over a maximum of 30 hops: 1 2 ms 1 ms 1 ms ms 4 ms 3 ms ms 3 ms 3 ms ms 4 ms 10 ms ms 4 ms 4 ms * 13 ms 6 ms ms 4 ms 4 ms ms 15 ms 15 ms ms 27 ms 26 ms ms 35 ms 32 ms ms 25 ms 25 ms ms 27 ms 28 ms ms 27 ms 50 ms ms 96 ms 51 ms ms 84 ms 52 ms ms 61 ms 51 ms ms 53 ms 66 ms ms 99 ms 51 ms Trace complete. 7

8 Traceroute, cont d ksarac> tracert -d Tracing route to e2561.b.akamaiedge.net [ over a maximum of 30 hops: 1 4 ms 2 ms 2 ms ms 2 ms 2 ms ms 2 ms 2 ms ms 10 ms 3 ms ms 3 ms 3 ms ms 4 ms 4 ms ms 4 ms 3 ms * * * Request timed out ms 26 ms 25 ms ms 26 ms 26 ms ms 26 ms 26 ms ms 27 ms 27 ms ms 36 ms 36 ms ms 58 ms 58 ms ms 57 ms 57 ms Trace complete. n anonymous router that does not answer the traceroute query 8

9 How to use traceroute for topology discovery? e S Internet2 backbone N f U C W L K H d Traces d - H - L - S - e d - H - - W - N - f e - S - L - H - d e - S - U - K - C - N - f f - N - C - K- H - d f - N - C - K - U - S - e 9

10 How to use traceroute for topology discovery? e s.1 S s.2 l.1 L l.3 s.3 l.2 u.1 U u.3 u.2 f n.2 n.1 N n.3 c.2 c.1 w.1 w.2 C W c.3 k.1 c.4 w.3 K k.2 k.3 a.1 a.2 a.3 Each router has multiple IP addresses Traceroute returns only one IP address of each visited router h.2 H h.3 h.1 h d 10 Traces d - h.4 - l.3 - s.2 - e d - h.4 - a.3 - w.3 - n.3 - f e - s.1 - l.1 - h.1 - d e - s.1 - u.1 - k.1 - c.1 - n.1 - f f - n.2 - c.2 - k.2 - h.2 - d f - n.2 - c.2 - k.2 - u.2 - s.3 - e

11 IP lias Resolution Problem S U K C N Sampled network e L H W f s.3 d e s.1 s.2 l.1 u.1 u.2 k.1 c.1 n.1 k.2 c.2 a.3 w.3 n.2 n.3 f l.3 Sample map without alias resolution h.1 d h.4 h.2 11 Traces d - h.4 - l.3 - s.2 - e d - h.4 - a.3 - w.3 - n.3 - f e - s.1 - l.1 - h.1 - d e - s.1 - u.1 - k.1 - c.1 - n.1 - f f - n.2 - c.2 - k.2 - h.2 - d f - n.2 - c.2 - k.2 - u.2 - s.3 - e

12 IP lias Resolution pproaches Source IP ddress Based Method Relies on a particular implementation of ICMP error generation. IP Identification Based Method (ally) Relies on a particular implementation of IP identifier B B field, Many routers ignore direct probes. Dest = DNS Based Method Relies on similarities in the host name structures Dest = sl-bb21-lon-14-0.sprintlink.net sl-bb21-lon-8-0.sprintlink.net Dest = B Works when a systematic naming is used. Dest = B, ID=100 B B, ID=103 ID=99 Record Route Based Method Depends on router support to IP route record processing 12

13 nalytical IP lias Resolution UTD no response no response MIT liases

14 nonymous Router Resolution Problem e S Internet2 backbone N f U C W L K H d Traces d - - L - S - e d W - - f e - S - L - - d e - S - U - - C - - f f - - C d f - - C - - U - S - e 14

15 nonymous Router Resolution Problem S U K C N f Traces d - - L - S - e d W - - f e - S - L - - d e - S - U - - C - - f f - - C d f - - C - - U - S - e e e S L H W d Sampled network U C L W f d Resulting network 15

16 nonymous Router Resolution Basic heuristics IP: Combine anonymous nodes b/w same known nodes Limited resolution S U C z NM: Combine all anonymous neighbors of a known node L High false positives y C S U W z More theoretic approaches y L x H fter resolution W Graph minimization approach Combine s as long as they do not violate two accuracy conditions: x (1) Trace preservation condition and (2) distance preservation condition High complexity O(n 5 ) n is number of s fter resolution y S ISOMP based dimensionality reduction approach U Build an nxn distance C matrix then z use ISOMP to reduce it to a nx5 matrix S U K C N Distance: (1) hop count or (2) link delay z High complexity O(n W 3 ) n is number of nodes L y L H W x x Resulting network Sampled network 16

17 nonymous Router Resolution Graph Based Induction x C y2 x C y2 Parallel -substring y1 y3 y1 y3 D w x C y E z D w x C y E z Star C x y D w F v E z C x y D w F v E z Complete Bipartite C x y D w E z C x y D w E z Clique nonymous router resolution: Merge anonymous nodes as long as they cause no loops in path traces 17

18 Subnets as first class citizens in network layer Internet topology maps 18

19 network layer view incl. routers & subnets Not all subnets are created equal! Can we discover layer 3 view of subnets? List of alive IP addresses Subnet number as a.b.c.d/x R 1 R 2 R 3 R 4 R 5 R 6 R 7 19

20 Why know subnets? 1. n alternative layer 3 view of the Internet map where subnets are nodes routers are links /30 /29 S 1 S 2 S 1 S 2 S 3 S 4 S 3 S 4 /29 /31 20

21 Why know subnets? P2 & P3 are not nodeand-link disjoint but P1 & P3 are 2. more complete network layer picture of the underlying network P1 P2 P3

22 Why know subnets? P1 & P3 are not node-and-link disjoint as they share the same 2. more complete network layer picture of subnet the underlying network P1 P3

23 How to discover a subnet? ExploreNET an active probing based tool Given an IP address IP v, discovers the subnet hosting IP v Labels with its observable subnet mask Uses a set of heuristics for subnet inference 23

24 ExploreNET Given an IP address IP v, explore the subnet B R3 R4 v R2 R1 v (pivot interface) is the interface with R5 IP address IP v that is TTL = d hops away from vantage point R6 R7 24

25 How to discover a subnet? Probing cost is within to 25

26 ExploreNET internals How to explore the subnets that v resides? 1. Form a /30 subnet S which includes the IP address IP v of the pivot interface v Check if IP i /30 mate of IP v is likely to be in S 2. Grow S to a /X subnet (X = 29, 28, ) which includes IP v as long as IP addresses in subnet S satisfy our heuristics 26

27 ExploreNET heuristics 9 of them to improve accuracy of our inferences Q: Does IP address i belong to assumed subnet S? : Yes with high probability, if it satisfies heuristics Far-fringe interfaces S Close-fringe interfaces Ingress Router Ingress-fringe interfaces 27

28 ExploreNET limitations Requires router responsiveness Depends on heuristics based on best practices in layer 3 network configuration Underestimation due to subnets with sparsely utilized IP addresses Underestimation due to path diversity due to load balancing or TE practices 28

29 ExploreNET evaluations ccuracy and completeness of the heuristics Comparison against ground truth data Collected from the public Internet using mrinfo [MDP2010] mrinfo an IP multicast diagnostic tool Returns IP multicast enabled interfaces of a router For each such interface, returns IP addresses of other multicast enabled interfaces on the same subnet mrinfo based ground truth data total of 5536 subnets collected from the Internet ExploreNET experiment Pick a random IP address from each subnet and run explorenet to discover the subnet 29

30 ExploreNET evaluations - results M total no. of subnets (5536) unresponsive (768) B exact discovery (3702) C failure cases (673) D subsumes mrinfo subnets (142) E partially unresponsive (251) F partially unresponsive and having non-multicast IPs (55) ccuracy: B+D / B+D+E+F = 93% Completeness-1: B+D / M = 69% Completeness-2: B+D / B+C+D = 85% 30

31 Use of subnet info for network diagnosis 31

32 Tracenet: n extension for traceroute B network segment 1. Traceroute at toward B Traceroute returns: B 1. One router (or IP address) at each hop on the -to-b path 2. Point-to-point link between consecutive routers (or consecutive (?) IP addresses) 32

33 Tracenet: n extension for traceroute Internet at the network layer consists of Router & subnets (point-to-point OR multi-access) B network segment with ROUTERs & SUBNETs B traceroute returned network segment 33

34 Tracenet Overview Traceroute vs tracenet B network segment 2. Tracenet at toward B t each hop distance d = 2, 3, 1. Trace collection - Find an IP i in a subnet S at hop d 2. Subnet exploration Explore subnet S returning all IP s in it B 34 i S i

35 Tracenet Overview Traceroute vs tracenet B network segment 2. Tracenet at toward B t each hop distance d = 2, 3, 1. Trace collection - Find an IP i in a subnet S at hop d 2. Subnet exploration Explore subnet S returning all IP s in it B i 35 S

36 Tracenet Overview Traceroute vs tracenet B network segment 2. Tracenet Tracenet returns: at toward B t each hop distance d = 2, 3, 1. Trace collection - Find an IP i in a subnet S at hop d One layer-3 subnet topology at each hop on the path B 2. Subnet exploration Explore subnet S returning all IP s in it Multiple IP addresses at each subnet Subnetting relation between IP addresses Subnet mask info for the subnet Some IP alias resolution as an artifact 36

37 traceroute vs tracenet in use IP alias resolution on the links IP addresses & hop distances at each subnet Subnets on a path w/ their subnet mask 37

38 Conclusions IPv4 network topology discovery Router level topology discovery IP alias resolution nonymous router resolution Subnet discovery Presented a heuristic to discover L3 subnet info Developed two tools implementing the scheme explorenet given an IP address, discovers the subnet tracenet an extension to traceroute To download tracenet and explorenet implementations 38

39 Future work How to extend this to IPv6? How to do IPv6 alias resolution? How to do IPv6 subnet discovery? 39

40 Thank you 40

41 TraceNET Heuristic 1 - Prefix Reduction Encountering a stop-and-shrink statement implies that the candidate subnet has been grown beyond its real size Execution of this statement shrinks to by removing all IP addresses in /p but not in /p+1 s the subnet grows larger possibility of encountering a false positive IP address causing execution of stop-andshrink statement increases This rule serves as one of the stopping conditions of subnet exploration algorithm This rule increases our confidence level on accuracy of large subnets 41

42 TraceNET Heuristic 2 Upper Bound Subnet Contiguity Tests whether the candidate IP address is in use and not located farther from the investigated subnet Code Snippet 42

43 TraceNET Heuristic 3 Single Contra Pivot Interface Eliminates Ingress Fringe Interfaces Under a fixed ingress router to subnet Code Snippet 43

44 TraceNET Heuristic 4 Lower Bound Subnet Contiguity Increases the confidence on the contra-pivot interface determined by the previous heuristic Code Snippet 44

45 TraceNET Heuristic 5 Mate-31 Subnet Contiguity Shortcut rule for immediately adding /31 mate of the pivot interface Valid for /30 mate in case /31 mate did not return a reply Code Snippet 45

46 TraceNET Heuristic 6 Fixed Entry Point Tests whether the examined IP address resides at another subnet located at the same distance with the explored subnet Code Snippet 46

47 TraceNET Heuristic 7 Upper Bound Router Contiguity Detects far fringe interfaces Code Snippet 47

48 TraceNET Heuristic 8 Lower Bound Router Contiguity Detects close fringe interfaces Code Snippet 48

49 TraceNET Heuristic 9 Border ddress Reduction This rule applies to the collected subnet not to the examined IP address It is a post processing operation While contains any of the border addresses the subnet is divided into two halves and the one containing the pivot interface is set to be the new iteratively 49

Subnet Level Network Topology Mapping

Subnet Level Network Topology Mapping Subnet Level Network Topology Mapping M. Engin Tozal, Student Member, IEEE, Kamil Sarac, Member, IEEE, Department of Computer Science, University of Texas at Dallas, TX 75080 U.S.A. {engintozal, ksarac}@utdallas.edu

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

Efficient Methodical Internet Topology Discovery

Efficient Methodical Internet Topology Discovery Efficient Methodical Internet Topology Discovery Alistair King Supervisor: Dr Matthew Luckie This report is submitted in partial fulfilment of the requirements for the degree of Bachelor of Computing and

More information

Estimating Network Layer Subnet Characteristics via Statistical Sampling

Estimating Network Layer Subnet Characteristics via Statistical Sampling Estimating Network Layer Subnet Characteristics via Statistical Sampling M. Engin Tozal and Kamil Sarac Department of Computer Science The University of Texas at Dallas, Richardson, TX 758 USA engintozal,ksarac@utdallas.edu

More information

The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand).

The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand). http://waikato.researchgateway.ac.nz/ Research Commons at the University of Waikato Copyright Statement: The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand). The thesis

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Active Measurements: traceroute

Active Measurements: traceroute Active Measurements: traceroute 1 Tools: Traceroute Exploit TTL (Time to Live) feature of IP When a router receives a packet with TTL=1, packet is discarded and ICMP_time_exceeded returned to sender Operational

More information

TreeNET: Discovering and Connecting Subnets

TreeNET: Discovering and Connecting Subnets TreeNET: Discovering and Connecting Subnets Jean-Francois Grailet, Fabien Tarissan, Benoit Donnet Université de Liège, Montefiore Institute Belgium Université Paris-Saclay, ISP, ENS Cachan, CNRS, 94235

More information

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006 CSE331: Introduction to Networks and Security Lecture 8 Fall 2006 Announcements Reminders: Project I is due on Monday, Sept. 25th. Homework 1 is due on Friday, Sept. 29th. CSE331 Fall 2004 2 Internet Protocol

More information

Some Examples of Network Measurements

Some Examples of Network Measurements Some Examples of Network Measurements Example 1 Data: Traceroute measurements Objective: Inferring Internet topology at the router-level Example 2 Data: Traceroute measurements Objective: Inferring Internet

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface IP addressing IP address: 32-bit identifier for host, router interface Interface: Connection between host, router and physical link routers typically have multiple interfaces host may have multiple interfaces

More information

Internet Packets. Forwarding Datagrams

Internet Packets. Forwarding Datagrams Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Importance of IP Alias Resolution in Sampling Internet Topologies

Importance of IP Alias Resolution in Sampling Internet Topologies Importance of IP Alias Resolution in Sampling Internet Topologies Mehmet Hadi Gunes Department of Computer Science University of Texas at Dallas Email: mgunes@utdallas.edu Kamil Sarac Department of Computer

More information

Instructor Notes for Lab 3

Instructor Notes for Lab 3 Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters

More information

Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP)

Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP) Mitigation of Breaking Connections (a.k.a. OLSRd v1 Multi-Gateway & BRDP) About Me Ferry Huberts Self-Employed Open Source Entrepreneur Lead Committer for OLSRd v1 Committer in several other projects Mainly

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Efficient Discovery of Load-Balanced Paths. Alistair King al@bellstreet.co.nz

Efficient Discovery of Load-Balanced Paths. Alistair King al@bellstreet.co.nz Efficient Discovery of Load-Balanced Paths Alistair King al@bellstreet.co.nz Load-Balancer Traceroute Gives confidence that the complete topology has been discovered. Probes each TTL repeatedly to discover

More information

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com 1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:

Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below: Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani Last name First name Student Identification number You are only allowed to use a pen and

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol

More information

Topology Discovery at the Router Level: A New Hybrid Tool Targeting ISP Networks

Topology Discovery at the Router Level: A New Hybrid Tool Targeting ISP Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 9, OCTOBER 2011 1 Topology Discovery at the Router Level: A New Hybrid Tool Targeting ISP Networks Pietro Marchetta, Pascal Mérindol, Benoit

More information

MPLS Part II - Recovery

MPLS Part II - Recovery MPLS Part II - Recovery Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach

More information

IPv6 Diagnostic and Troubleshooting

IPv6 Diagnostic and Troubleshooting 8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................

More information

OSPF Routing Protocol

OSPF Routing Protocol OSPF Routing Protocol Contents Introduction Network Architecture Campus Design Architecture Building Block Design Server Farm Design Core Block Design WAN Design Architecture Protocol Design Campus Design

More information

WITH THE RAPID growth of the Internet, overlay networks

WITH THE RAPID growth of the Internet, overlay networks 2182 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 12, DECEMBER 2006 Network Topology Inference Based on End-to-End Measurements Xing Jin, Student Member, IEEE, W.-P. Ken Yiu, Student

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

Answers to Sample Questions on Network Layer

Answers to Sample Questions on Network Layer Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Layer 3 Routing User s Manual

Layer 3 Routing User s Manual User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer ECE 358: Computer Networks Solutions to Homework #4 Chapter 4 - The Network Layer P 4. Consider the network below. a. Suppose that this network is a datagram network. Show the forwarding table in router

More information

ARTICLE IN PRESS. Practical utilities for monitoring multicast service availability. Pavan Namburi a, Kamil Sarac a, *, Kevin Almeroth b

ARTICLE IN PRESS. Practical utilities for monitoring multicast service availability. Pavan Namburi a, Kamil Sarac a, *, Kevin Almeroth b Computer Communications xx (2005) 1 12 www.elsevier.com/locate/comcom Practical utilities for monitoring multicast service availability Pavan Namburi a, Kamil Sarac a, *, Kevin Almeroth b a Department

More information

Discovering Topologies at Router Level: Part II

Discovering Topologies at Router Level: Part II Discovering Topologies at Router Level: Part II Alessio Botta, Walter de Donato, Antonio Pescapé, and Giorgio Ventre University of Napoli Federico II (Italy), {a.botta,walter.dedonato,pescape,giorgio}@unina.it

More information

Interconnecting IPv6 Domains Using Tunnels

Interconnecting IPv6 Domains Using Tunnels Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how

More information

Analyzing and modelling the AS-level Internet topology

Analyzing and modelling the AS-level Internet topology Analyzing and modelling the AS-level Internet topology Shi Zhou & Raul J. Mondragon Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS, United Kingdom Email:

More information

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics Switching and Forwarding Switching and Forwarding Generic Router rchitecture Forwarding Tables: ridges/layer Switches; VLN Routers and Layer 3 Switches Forwarding in Layer 3 (Network Layer) Network Layer

More information

Hands On Activities: TCP/IP Network Monitoring and Management

Hands On Activities: TCP/IP Network Monitoring and Management Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring

More information

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Network layer 1DT066! Distributed Information Systems!! Chapter 4 Network Layer!! goals: 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a

More information

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture. Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

ASIST Administração de Sistemas

ASIST Administração de Sistemas ASIST Administração de Sistemas Aula 1 9 de Outubro de 2006 Alexandre Bragança Bibliografia: IBM Redbook: TCP/IP Tutorial and Technical Overview, Adolfo Rodriguez, John Gatrell, John Karas, Roland Peschke

More information

How to Keep Track of Your Network Configuration

How to Keep Track of Your Network Configuration The following paper was originally presented at the Seventh System Administration Conference (LISA 93) Monterey, California, November, 1993 How to Keep Track of Your Network Configuration J. Schonwalder

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

CS335 Sample Questions for Exam #2

CS335 Sample Questions for Exam #2 CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to

More information

Subnetting,Supernetting, VLSM & CIDR

Subnetting,Supernetting, VLSM & CIDR Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space

More information

Subnet Based Internet Topology Generation

Subnet Based Internet Topology Generation Subnet Based Internet Topology Generation Mehmet Burak AKGÜN with Mehmet Hadi GÜNEŞ ISMA 2011 Workshop on Active Internet Measurements Outline Introduction Related Work Methodology Algortihm Results Future

More information

A Survey of Techniques for Internet Topology Discovery

A Survey of Techniques for Internet Topology Discovery A Survey of Techniques for Internet Topology Discovery Reza Motamedi, Reza Rejaie University of Oregon {motamedi,reza}@cs.uoregon.edu Walter Willinger Niksun Inc. wwillinger@niksun.com ABSTRACT Capturing

More information

High-Frequency Active Internet Topology Mapping

High-Frequency Active Internet Topology Mapping High-Frequency Active Internet Topology Mapping Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Robert Beverly Assistant Professor Naval Postgraduate School rbeverly@nps.edu

More information

Part A:Background/Preparation

Part A:Background/Preparation Lab no 1 PC Network TCP/IP Configuration In this lab we will learn about Computer Networks Configuration Introduction to IP addressing Identify tools used for discovering a computer s network configuration

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

Yarrp ing the Internet

Yarrp ing the Internet Yarrp ing the Internet Robert Beverly Naval Postgraduate School February 12, 2016 Active Internet Measurements (AIMS) Workshop R. Beverly (NPS) Yarrp AIMS 2016 1 / 17 Motivation Active Topology Probing

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013 Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing

More information

Sampling Biases in IP Topology Measurements

Sampling Biases in IP Topology Measurements Sampling Biases in IP Topology Measurements Anukool Lakhina with John Byers, Mark Crovella and Peng Xie Department of Boston University Discovering the Internet topology Goal: Discover the Internet Router

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance

More information

Lab PC Network TCP/IP Configuration

Lab PC Network TCP/IP Configuration Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer

More information

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Classful IP Addressing (cont.)

Classful IP Addressing (cont.) Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful

More information

Internet Protocol Version 6 (IPv6)

Internet Protocol Version 6 (IPv6) Internet Protocol Version 6 (IPv6) Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 14-1 Overview

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

What cannot be measured on the Internet? Yvonne-Anne Pignolet, Stefan Schmid, G. Trédan. Misleading stars

What cannot be measured on the Internet? Yvonne-Anne Pignolet, Stefan Schmid, G. Trédan. Misleading stars : What cannot be measured on the Internet? Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan How accurate are network maps? Why? To develop/adapt protocols to Internet PaDIS, RMTP To understand the impact

More information

COMP 631: COMPUTER NETWORKS. IP Addressing. Jasleen Kaur. Fall 2014. How to Deal With Heterogeneity & Scale?

COMP 631: COMPUTER NETWORKS. IP Addressing. Jasleen Kaur. Fall 2014. How to Deal With Heterogeneity & Scale? COMP 631: COMPUTER NETWORKS IP Addressing Jasleen Kaur Fall 2014 1 How to Deal With Heterogeneity & Scale? Requirements from IP addressing: Should be globally unique Should facilitate easy mapping to link-layer

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

IP Addressing Introductory material.

IP Addressing Introductory material. IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

Network Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Network Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery

More information

Hypothesis Testing for Network Security

Hypothesis Testing for Network Security Hypothesis Testing for Network Security Philip Godfrey, Matthew Caesar, David Nicol, William H. Sanders, Dong Jin INFORMATION TRUST INSTITUTE University of Illinois at Urbana-Champaign We need a science

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

IP Switching: Issues and Alternatives

IP Switching: Issues and Alternatives IP Switching: Issues and Alternatives Professor of Computer and Information Sciences http://www.cis.ohio-state.edu/~jain/ 6-1 Overview LANE, IPOA, NHRP, MPOA IP Switch Cell Switched Router Tag Switching

More information

Lesson 5-3: Border Gateway Protocol

Lesson 5-3: Border Gateway Protocol Unit 5: Intradomain and Interdomain Protocols Lesson 5-3: Gateway Protocol At a Glance The Gateway Protocol (BGP) is an interdomain routing protocol used in TCP/IP internetworks. BGP was created to allow

More information

DDoS Attack Traceback

DDoS Attack Traceback DDoS Attack Traceback and Beyond Yongjin Kim Outline Existing DDoS attack traceback (or commonly called IP traceback) schemes * Probabilistic packet marking Logging-based scheme ICMP-based scheme Tweaking

More information

A Framework for Scalable Global IP-Anycast (GIA)

A Framework for Scalable Global IP-Anycast (GIA) A Framework for Scalable Global IP-Anycast (GIA) Dina Katabi, John Wroclawski MIT Laboratory for Computer Science 545 Technology Square Cambridge, MA 02139 {dina,jtw}@lcs.mit.edu ABSTRACT This paper proposes

More information

Network Discovery from Passive Measurements

Network Discovery from Passive Measurements Network Discovery from Passive Measurements Brian Eriksson UW-Madison bceriksson@wisc.edu Paul Barford UW-Madison pb@cs.wisc.edu Robert Nowak UW-Madison nowak@ece.wisc.edu ABSTRACT Understanding the Internet

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Combining SPF and Source Routing for an Efficient Probing Solution in IPv6 Topology Discovery

Combining SPF and Source Routing for an Efficient Probing Solution in IPv6 Topology Discovery Combining SPF and Source Routing for an Efficient Probing Solution in IPv6 Topology Discovery by M. F. Rabbi Ur Rashid A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial

More information

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy , ICMP, IPv6 UDP IP Eth Phy UDP IP Eth Phy Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011

Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011 Joe Davies Principal Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group June 1, 2011 2011 Microsoft Corporation IPv6 addressing and DNS review IPv6 subnetting

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1 Scaling the Network: Subnetting and Other Protocols Networking CS 3470, Section 1 Today CIDR Subnetting Private IP addresses ICMP, IMAP, and DHCP Protocols 2 Packet Encapsulation ** Creative Commons: http://en.wikipedia.org/wiki/file:udp_encapsulation.svg

More information

Using OSPF in an MPLS VPN Environment

Using OSPF in an MPLS VPN Environment Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest

More information

Unit Objectives. IP Addressing Basics. Component 4: Introduction to Information and Computer Science. Unit 7: Networks & Networking Lecture 2

Unit Objectives. IP Addressing Basics. Component 4: Introduction to Information and Computer Science. Unit 7: Networks & Networking Lecture 2 Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 2 This material was developed by Oregon Health & Science University, funded by the Department of Health

More information

Traceroute The Internet s Diagnostic Tool

Traceroute The Internet s Diagnostic Tool Traceroute The Internet s Diagnostic Tool NTT Communications Global IP Network White Paper By Charles Sellers, CISSP May, 2006 NTT, NTT Communications, and the NTT Communications logo are registered trademarks

More information