Internet (IPv4) Topology Mapping. Department of Computer Science The University of Texas at Dallas
|
|
- Ruby Sabrina Watson
- 8 years ago
- Views:
Transcription
1 Internet (IPv4) Topology Mapping Kamil Sarac Department of Computer Science The University of Texas at Dallas
2 Internet topology measurement/mapping Need for Internet topology measurement Help with network management or surveillance Robustness with respect to failures/attacks Comprehend spreading of worms/viruses Relevant in active defense scenarios Scientific discovery Scale-free (power-law), small-world, rich-club, disassortativity, 2
3 Traditional approach in layer 3 topology mapping: Router level maps 3
4 Network layer Internet topology maps sample IP network segment view at Layer 3 number of routers connected via subnets R 1 R 2 R 3 R 4 R 5 R 6 R 7 4
5 router level map at layer 3 corresponding router level map view R 1 R 2 R 3 R 4 R 5 R 6 R 7 5
6 How to build router level network maps? Involves topology data collection and topology construction How to collect topology data? Traceroute a network debugging and diagnostic tool End-to-end traces from k vantage points to n destinations where (typically) k << n How to construct topology maps? Resolving alias IP addresses Resolving anonymous routers 6
7 Traceroute-based topology data collection ksarac> tracert -d Tracing route to [ ] over a maximum of 30 hops: 1 2 ms 1 ms 1 ms ms 4 ms 3 ms ms 3 ms 3 ms ms 4 ms 10 ms ms 4 ms 4 ms * 13 ms 6 ms ms 4 ms 4 ms ms 15 ms 15 ms ms 27 ms 26 ms ms 35 ms 32 ms ms 25 ms 25 ms ms 27 ms 28 ms ms 27 ms 50 ms ms 96 ms 51 ms ms 84 ms 52 ms ms 61 ms 51 ms ms 53 ms 66 ms ms 99 ms 51 ms Trace complete. 7
8 Traceroute, cont d ksarac> tracert -d Tracing route to e2561.b.akamaiedge.net [ over a maximum of 30 hops: 1 4 ms 2 ms 2 ms ms 2 ms 2 ms ms 2 ms 2 ms ms 10 ms 3 ms ms 3 ms 3 ms ms 4 ms 4 ms ms 4 ms 3 ms * * * Request timed out ms 26 ms 25 ms ms 26 ms 26 ms ms 26 ms 26 ms ms 27 ms 27 ms ms 36 ms 36 ms ms 58 ms 58 ms ms 57 ms 57 ms Trace complete. n anonymous router that does not answer the traceroute query 8
9 How to use traceroute for topology discovery? e S Internet2 backbone N f U C W L K H d Traces d - H - L - S - e d - H - - W - N - f e - S - L - H - d e - S - U - K - C - N - f f - N - C - K- H - d f - N - C - K - U - S - e 9
10 How to use traceroute for topology discovery? e s.1 S s.2 l.1 L l.3 s.3 l.2 u.1 U u.3 u.2 f n.2 n.1 N n.3 c.2 c.1 w.1 w.2 C W c.3 k.1 c.4 w.3 K k.2 k.3 a.1 a.2 a.3 Each router has multiple IP addresses Traceroute returns only one IP address of each visited router h.2 H h.3 h.1 h d 10 Traces d - h.4 - l.3 - s.2 - e d - h.4 - a.3 - w.3 - n.3 - f e - s.1 - l.1 - h.1 - d e - s.1 - u.1 - k.1 - c.1 - n.1 - f f - n.2 - c.2 - k.2 - h.2 - d f - n.2 - c.2 - k.2 - u.2 - s.3 - e
11 IP lias Resolution Problem S U K C N Sampled network e L H W f s.3 d e s.1 s.2 l.1 u.1 u.2 k.1 c.1 n.1 k.2 c.2 a.3 w.3 n.2 n.3 f l.3 Sample map without alias resolution h.1 d h.4 h.2 11 Traces d - h.4 - l.3 - s.2 - e d - h.4 - a.3 - w.3 - n.3 - f e - s.1 - l.1 - h.1 - d e - s.1 - u.1 - k.1 - c.1 - n.1 - f f - n.2 - c.2 - k.2 - h.2 - d f - n.2 - c.2 - k.2 - u.2 - s.3 - e
12 IP lias Resolution pproaches Source IP ddress Based Method Relies on a particular implementation of ICMP error generation. IP Identification Based Method (ally) Relies on a particular implementation of IP identifier B B field, Many routers ignore direct probes. Dest = DNS Based Method Relies on similarities in the host name structures Dest = sl-bb21-lon-14-0.sprintlink.net sl-bb21-lon-8-0.sprintlink.net Dest = B Works when a systematic naming is used. Dest = B, ID=100 B B, ID=103 ID=99 Record Route Based Method Depends on router support to IP route record processing 12
13 nalytical IP lias Resolution UTD no response no response MIT liases
14 nonymous Router Resolution Problem e S Internet2 backbone N f U C W L K H d Traces d - - L - S - e d W - - f e - S - L - - d e - S - U - - C - - f f - - C d f - - C - - U - S - e 14
15 nonymous Router Resolution Problem S U K C N f Traces d - - L - S - e d W - - f e - S - L - - d e - S - U - - C - - f f - - C d f - - C - - U - S - e e e S L H W d Sampled network U C L W f d Resulting network 15
16 nonymous Router Resolution Basic heuristics IP: Combine anonymous nodes b/w same known nodes Limited resolution S U C z NM: Combine all anonymous neighbors of a known node L High false positives y C S U W z More theoretic approaches y L x H fter resolution W Graph minimization approach Combine s as long as they do not violate two accuracy conditions: x (1) Trace preservation condition and (2) distance preservation condition High complexity O(n 5 ) n is number of s fter resolution y S ISOMP based dimensionality reduction approach U Build an nxn distance C matrix then z use ISOMP to reduce it to a nx5 matrix S U K C N Distance: (1) hop count or (2) link delay z High complexity O(n W 3 ) n is number of nodes L y L H W x x Resulting network Sampled network 16
17 nonymous Router Resolution Graph Based Induction x C y2 x C y2 Parallel -substring y1 y3 y1 y3 D w x C y E z D w x C y E z Star C x y D w F v E z C x y D w F v E z Complete Bipartite C x y D w E z C x y D w E z Clique nonymous router resolution: Merge anonymous nodes as long as they cause no loops in path traces 17
18 Subnets as first class citizens in network layer Internet topology maps 18
19 network layer view incl. routers & subnets Not all subnets are created equal! Can we discover layer 3 view of subnets? List of alive IP addresses Subnet number as a.b.c.d/x R 1 R 2 R 3 R 4 R 5 R 6 R 7 19
20 Why know subnets? 1. n alternative layer 3 view of the Internet map where subnets are nodes routers are links /30 /29 S 1 S 2 S 1 S 2 S 3 S 4 S 3 S 4 /29 /31 20
21 Why know subnets? P2 & P3 are not nodeand-link disjoint but P1 & P3 are 2. more complete network layer picture of the underlying network P1 P2 P3
22 Why know subnets? P1 & P3 are not node-and-link disjoint as they share the same 2. more complete network layer picture of subnet the underlying network P1 P3
23 How to discover a subnet? ExploreNET an active probing based tool Given an IP address IP v, discovers the subnet hosting IP v Labels with its observable subnet mask Uses a set of heuristics for subnet inference 23
24 ExploreNET Given an IP address IP v, explore the subnet B R3 R4 v R2 R1 v (pivot interface) is the interface with R5 IP address IP v that is TTL = d hops away from vantage point R6 R7 24
25 How to discover a subnet? Probing cost is within to 25
26 ExploreNET internals How to explore the subnets that v resides? 1. Form a /30 subnet S which includes the IP address IP v of the pivot interface v Check if IP i /30 mate of IP v is likely to be in S 2. Grow S to a /X subnet (X = 29, 28, ) which includes IP v as long as IP addresses in subnet S satisfy our heuristics 26
27 ExploreNET heuristics 9 of them to improve accuracy of our inferences Q: Does IP address i belong to assumed subnet S? : Yes with high probability, if it satisfies heuristics Far-fringe interfaces S Close-fringe interfaces Ingress Router Ingress-fringe interfaces 27
28 ExploreNET limitations Requires router responsiveness Depends on heuristics based on best practices in layer 3 network configuration Underestimation due to subnets with sparsely utilized IP addresses Underestimation due to path diversity due to load balancing or TE practices 28
29 ExploreNET evaluations ccuracy and completeness of the heuristics Comparison against ground truth data Collected from the public Internet using mrinfo [MDP2010] mrinfo an IP multicast diagnostic tool Returns IP multicast enabled interfaces of a router For each such interface, returns IP addresses of other multicast enabled interfaces on the same subnet mrinfo based ground truth data total of 5536 subnets collected from the Internet ExploreNET experiment Pick a random IP address from each subnet and run explorenet to discover the subnet 29
30 ExploreNET evaluations - results M total no. of subnets (5536) unresponsive (768) B exact discovery (3702) C failure cases (673) D subsumes mrinfo subnets (142) E partially unresponsive (251) F partially unresponsive and having non-multicast IPs (55) ccuracy: B+D / B+D+E+F = 93% Completeness-1: B+D / M = 69% Completeness-2: B+D / B+C+D = 85% 30
31 Use of subnet info for network diagnosis 31
32 Tracenet: n extension for traceroute B network segment 1. Traceroute at toward B Traceroute returns: B 1. One router (or IP address) at each hop on the -to-b path 2. Point-to-point link between consecutive routers (or consecutive (?) IP addresses) 32
33 Tracenet: n extension for traceroute Internet at the network layer consists of Router & subnets (point-to-point OR multi-access) B network segment with ROUTERs & SUBNETs B traceroute returned network segment 33
34 Tracenet Overview Traceroute vs tracenet B network segment 2. Tracenet at toward B t each hop distance d = 2, 3, 1. Trace collection - Find an IP i in a subnet S at hop d 2. Subnet exploration Explore subnet S returning all IP s in it B 34 i S i
35 Tracenet Overview Traceroute vs tracenet B network segment 2. Tracenet at toward B t each hop distance d = 2, 3, 1. Trace collection - Find an IP i in a subnet S at hop d 2. Subnet exploration Explore subnet S returning all IP s in it B i 35 S
36 Tracenet Overview Traceroute vs tracenet B network segment 2. Tracenet Tracenet returns: at toward B t each hop distance d = 2, 3, 1. Trace collection - Find an IP i in a subnet S at hop d One layer-3 subnet topology at each hop on the path B 2. Subnet exploration Explore subnet S returning all IP s in it Multiple IP addresses at each subnet Subnetting relation between IP addresses Subnet mask info for the subnet Some IP alias resolution as an artifact 36
37 traceroute vs tracenet in use IP alias resolution on the links IP addresses & hop distances at each subnet Subnets on a path w/ their subnet mask 37
38 Conclusions IPv4 network topology discovery Router level topology discovery IP alias resolution nonymous router resolution Subnet discovery Presented a heuristic to discover L3 subnet info Developed two tools implementing the scheme explorenet given an IP address, discovers the subnet tracenet an extension to traceroute To download tracenet and explorenet implementations 38
39 Future work How to extend this to IPv6? How to do IPv6 alias resolution? How to do IPv6 subnet discovery? 39
40 Thank you 40
41 TraceNET Heuristic 1 - Prefix Reduction Encountering a stop-and-shrink statement implies that the candidate subnet has been grown beyond its real size Execution of this statement shrinks to by removing all IP addresses in /p but not in /p+1 s the subnet grows larger possibility of encountering a false positive IP address causing execution of stop-andshrink statement increases This rule serves as one of the stopping conditions of subnet exploration algorithm This rule increases our confidence level on accuracy of large subnets 41
42 TraceNET Heuristic 2 Upper Bound Subnet Contiguity Tests whether the candidate IP address is in use and not located farther from the investigated subnet Code Snippet 42
43 TraceNET Heuristic 3 Single Contra Pivot Interface Eliminates Ingress Fringe Interfaces Under a fixed ingress router to subnet Code Snippet 43
44 TraceNET Heuristic 4 Lower Bound Subnet Contiguity Increases the confidence on the contra-pivot interface determined by the previous heuristic Code Snippet 44
45 TraceNET Heuristic 5 Mate-31 Subnet Contiguity Shortcut rule for immediately adding /31 mate of the pivot interface Valid for /30 mate in case /31 mate did not return a reply Code Snippet 45
46 TraceNET Heuristic 6 Fixed Entry Point Tests whether the examined IP address resides at another subnet located at the same distance with the explored subnet Code Snippet 46
47 TraceNET Heuristic 7 Upper Bound Router Contiguity Detects far fringe interfaces Code Snippet 47
48 TraceNET Heuristic 8 Lower Bound Router Contiguity Detects close fringe interfaces Code Snippet 48
49 TraceNET Heuristic 9 Border ddress Reduction This rule applies to the collected subnet not to the examined IP address It is a post processing operation While contains any of the border addresses the subnet is divided into two halves and the one containing the pivot interface is set to be the new iteratively 49
Subnet Level Network Topology Mapping
Subnet Level Network Topology Mapping M. Engin Tozal, Student Member, IEEE, Kamil Sarac, Member, IEEE, Department of Computer Science, University of Texas at Dallas, TX 75080 U.S.A. {engintozal, ksarac}@utdallas.edu
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationEfficient Methodical Internet Topology Discovery
Efficient Methodical Internet Topology Discovery Alistair King Supervisor: Dr Matthew Luckie This report is submitted in partial fulfilment of the requirements for the degree of Bachelor of Computing and
More informationEstimating Network Layer Subnet Characteristics via Statistical Sampling
Estimating Network Layer Subnet Characteristics via Statistical Sampling M. Engin Tozal and Kamil Sarac Department of Computer Science The University of Texas at Dallas, Richardson, TX 758 USA engintozal,ksarac@utdallas.edu
More informationThe digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand).
http://waikato.researchgateway.ac.nz/ Research Commons at the University of Waikato Copyright Statement: The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand). The thesis
More informationAssignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
More informationActive Measurements: traceroute
Active Measurements: traceroute 1 Tools: Traceroute Exploit TTL (Time to Live) feature of IP When a router receives a packet with TTL=1, packet is discarded and ICMP_time_exceeded returned to sender Operational
More informationTreeNET: Discovering and Connecting Subnets
TreeNET: Discovering and Connecting Subnets Jean-Francois Grailet, Fabien Tarissan, Benoit Donnet Université de Liège, Montefiore Institute Belgium Université Paris-Saclay, ISP, ENS Cachan, CNRS, 94235
More informationCSE331: Introduction to Networks and Security. Lecture 8 Fall 2006
CSE331: Introduction to Networks and Security Lecture 8 Fall 2006 Announcements Reminders: Project I is due on Monday, Sept. 25th. Homework 1 is due on Friday, Sept. 29th. CSE331 Fall 2004 2 Internet Protocol
More informationSome Examples of Network Measurements
Some Examples of Network Measurements Example 1 Data: Traceroute measurements Objective: Inferring Internet topology at the router-level Example 2 Data: Traceroute measurements Objective: Inferring Internet
More informationInternetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
More informationComputer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
More informationIP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface
IP addressing IP address: 32-bit identifier for host, router interface Interface: Connection between host, router and physical link routers typically have multiple interfaces host may have multiple interfaces
More informationInternet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationImportance of IP Alias Resolution in Sampling Internet Topologies
Importance of IP Alias Resolution in Sampling Internet Topologies Mehmet Hadi Gunes Department of Computer Science University of Texas at Dallas Email: mgunes@utdallas.edu Kamil Sarac Department of Computer
More informationInstructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
More informationIP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
More informationLab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
More informationMitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP)
Mitigation of Breaking Connections (a.k.a. OLSRd v1 Multi-Gateway & BRDP) About Me Ferry Huberts Self-Employed Open Source Entrepreneur Lead Committer for OLSRd v1 Committer in several other projects Mainly
More informationRoute Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
More informationEfficient Discovery of Load-Balanced Paths. Alistair King al@bellstreet.co.nz
Efficient Discovery of Load-Balanced Paths Alistair King al@bellstreet.co.nz Load-Balancer Traceroute Gives confidence that the complete topology has been discovered. Probes each TTL repeatedly to discover
More informationAdditional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html
Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE
More informationTomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
More informationIPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com
1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationQuestion 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:
Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani Last name First name Student Identification number You are only allowed to use a pen and
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationTopology Discovery at the Router Level: A New Hybrid Tool Targeting ISP Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 9, OCTOBER 2011 1 Topology Discovery at the Router Level: A New Hybrid Tool Targeting ISP Networks Pietro Marchetta, Pascal Mérindol, Benoit
More informationMPLS Part II - Recovery
MPLS Part II - Recovery Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach
More informationIPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
More informationOSPF Routing Protocol
OSPF Routing Protocol Contents Introduction Network Architecture Campus Design Architecture Building Block Design Server Farm Design Core Block Design WAN Design Architecture Protocol Design Campus Design
More informationWITH THE RAPID growth of the Internet, overlay networks
2182 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 12, DECEMBER 2006 Network Topology Inference Based on End-to-End Measurements Xing Jin, Student Member, IEEE, W.-P. Ken Yiu, Student
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More informationAnswers to Sample Questions on Network Layer
Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationLayer 3 Routing User s Manual
User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
More informationECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer
ECE 358: Computer Networks Solutions to Homework #4 Chapter 4 - The Network Layer P 4. Consider the network below. a. Suppose that this network is a datagram network. Show the forwarding table in router
More informationARTICLE IN PRESS. Practical utilities for monitoring multicast service availability. Pavan Namburi a, Kamil Sarac a, *, Kevin Almeroth b
Computer Communications xx (2005) 1 12 www.elsevier.com/locate/comcom Practical utilities for monitoring multicast service availability Pavan Namburi a, Kamil Sarac a, *, Kevin Almeroth b a Department
More informationDiscovering Topologies at Router Level: Part II
Discovering Topologies at Router Level: Part II Alessio Botta, Walter de Donato, Antonio Pescapé, and Giorgio Ventre University of Napoli Federico II (Italy), {a.botta,walter.dedonato,pescape,giorgio}@unina.it
More informationInterconnecting IPv6 Domains Using Tunnels
Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how
More informationAnalyzing and modelling the AS-level Internet topology
Analyzing and modelling the AS-level Internet topology Shi Zhou & Raul J. Mondragon Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS, United Kingdom Email:
More informationClassful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics
Switching and Forwarding Switching and Forwarding Generic Router rchitecture Forwarding Tables: ridges/layer Switches; VLN Routers and Layer 3 Switches Forwarding in Layer 3 (Network Layer) Network Layer
More informationHands On Activities: TCP/IP Network Monitoring and Management
Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring
More informationNetwork layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
More informationMPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.
Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet
More informationIntroduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
More informationASIST Administração de Sistemas
ASIST Administração de Sistemas Aula 1 9 de Outubro de 2006 Alexandre Bragança Bibliografia: IBM Redbook: TCP/IP Tutorial and Technical Overview, Adolfo Rodriguez, John Gatrell, John Karas, Roland Peschke
More informationHow to Keep Track of Your Network Configuration
The following paper was originally presented at the Seventh System Administration Conference (LISA 93) Monterey, California, November, 1993 How to Keep Track of Your Network Configuration J. Schonwalder
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationCS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
More informationSubnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
More informationSubnet Based Internet Topology Generation
Subnet Based Internet Topology Generation Mehmet Burak AKGÜN with Mehmet Hadi GÜNEŞ ISMA 2011 Workshop on Active Internet Measurements Outline Introduction Related Work Methodology Algortihm Results Future
More informationA Survey of Techniques for Internet Topology Discovery
A Survey of Techniques for Internet Topology Discovery Reza Motamedi, Reza Rejaie University of Oregon {motamedi,reza}@cs.uoregon.edu Walter Willinger Niksun Inc. wwillinger@niksun.com ABSTRACT Capturing
More informationHigh-Frequency Active Internet Topology Mapping
High-Frequency Active Internet Topology Mapping Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Robert Beverly Assistant Professor Naval Postgraduate School rbeverly@nps.edu
More informationPart A:Background/Preparation
Lab no 1 PC Network TCP/IP Configuration In this lab we will learn about Computer Networks Configuration Introduction to IP addressing Identify tools used for discovering a computer s network configuration
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More informationYarrp ing the Internet
Yarrp ing the Internet Robert Beverly Naval Postgraduate School February 12, 2016 Active Internet Measurements (AIMS) Workshop R. Beverly (NPS) Yarrp AIMS 2016 1 / 17 Motivation Active Topology Probing
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationTransitioning to BGP. ISP Workshops. Last updated 24 April 2013
Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing
More informationSampling Biases in IP Topology Measurements
Sampling Biases in IP Topology Measurements Anukool Lakhina with John Byers, Mark Crovella and Peng Xie Department of Boston University Discovering the Internet topology Goal: Discover the Internet Router
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationDynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
More informationLab PC Network TCP/IP Configuration
Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer
More informationNetwork Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery
Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationClassful IP Addressing (cont.)
Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful
More informationInternet Protocol Version 6 (IPv6)
Internet Protocol Version 6 (IPv6) Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 14-1 Overview
More informationInternet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
More informationWhat cannot be measured on the Internet? Yvonne-Anne Pignolet, Stefan Schmid, G. Trédan. Misleading stars
: What cannot be measured on the Internet? Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan How accurate are network maps? Why? To develop/adapt protocols to Internet PaDIS, RMTP To understand the impact
More informationCOMP 631: COMPUTER NETWORKS. IP Addressing. Jasleen Kaur. Fall 2014. How to Deal With Heterogeneity & Scale?
COMP 631: COMPUTER NETWORKS IP Addressing Jasleen Kaur Fall 2014 1 How to Deal With Heterogeneity & Scale? Requirements from IP addressing: Should be globally unique Should facilitate easy mapping to link-layer
More informationComputer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
More informationIP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
More informationNETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
More informationFaculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
More informationOverview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
More informationMobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
More informationNetwork Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery
More informationHypothesis Testing for Network Security
Hypothesis Testing for Network Security Philip Godfrey, Matthew Caesar, David Nicol, William H. Sanders, Dong Jin INFORMATION TRUST INSTITUTE University of Illinois at Urbana-Champaign We need a science
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationIP Switching: Issues and Alternatives
IP Switching: Issues and Alternatives Professor of Computer and Information Sciences http://www.cis.ohio-state.edu/~jain/ 6-1 Overview LANE, IPOA, NHRP, MPOA IP Switch Cell Switched Router Tag Switching
More informationLesson 5-3: Border Gateway Protocol
Unit 5: Intradomain and Interdomain Protocols Lesson 5-3: Gateway Protocol At a Glance The Gateway Protocol (BGP) is an interdomain routing protocol used in TCP/IP internetworks. BGP was created to allow
More informationDDoS Attack Traceback
DDoS Attack Traceback and Beyond Yongjin Kim Outline Existing DDoS attack traceback (or commonly called IP traceback) schemes * Probabilistic packet marking Logging-based scheme ICMP-based scheme Tweaking
More informationA Framework for Scalable Global IP-Anycast (GIA)
A Framework for Scalable Global IP-Anycast (GIA) Dina Katabi, John Wroclawski MIT Laboratory for Computer Science 545 Technology Square Cambridge, MA 02139 {dina,jtw}@lcs.mit.edu ABSTRACT This paper proposes
More informationNetwork Discovery from Passive Measurements
Network Discovery from Passive Measurements Brian Eriksson UW-Madison bceriksson@wisc.edu Paul Barford UW-Madison pb@cs.wisc.edu Robert Nowak UW-Madison nowak@ece.wisc.edu ABSTRACT Understanding the Internet
More information100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
More informationRouting in packet-switching networks
Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call
More informationExterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
More informationCombining SPF and Source Routing for an Efficient Probing Solution in IPv6 Topology Discovery
Combining SPF and Source Routing for an Efficient Probing Solution in IPv6 Topology Discovery by M. F. Rabbi Ur Rashid A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial
More informationDHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy
, ICMP, IPv6 UDP IP Eth Phy UDP IP Eth Phy Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationJoe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011
Joe Davies Principal Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group June 1, 2011 2011 Microsoft Corporation IPv6 addressing and DNS review IPv6 subnetting
More informationCS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationScaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1
Scaling the Network: Subnetting and Other Protocols Networking CS 3470, Section 1 Today CIDR Subnetting Private IP addresses ICMP, IMAP, and DHCP Protocols 2 Packet Encapsulation ** Creative Commons: http://en.wikipedia.org/wiki/file:udp_encapsulation.svg
More informationUsing OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
More informationUnit Objectives. IP Addressing Basics. Component 4: Introduction to Information and Computer Science. Unit 7: Networks & Networking Lecture 2
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 2 This material was developed by Oregon Health & Science University, funded by the Department of Health
More informationTraceroute The Internet s Diagnostic Tool
Traceroute The Internet s Diagnostic Tool NTT Communications Global IP Network White Paper By Charles Sellers, CISSP May, 2006 NTT, NTT Communications, and the NTT Communications logo are registered trademarks
More information