What cannot be measured on the Internet? Yvonne-Anne Pignolet, Stefan Schmid, G. Trédan. Misleading stars

Similar documents
Misleading Stars: What Cannot Be Measured in the Internet?

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

Network (Tree) Topology Inference Based on Prüfer Sequence

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014

Efficient Discovery of Load-Balanced Paths. Alistair King

Active Measurements: traceroute

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Sampling Biases in IP Topology Measurements

Security-Aware Beacon Based Network Monitoring

Internet (IPv4) Topology Mapping. Department of Computer Science The University of Texas at Dallas

Internet Infrastructure Measurement: Challenges and Tools

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

Discovering High-Impact Routing Events Using Traceroutes

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

THE last two decades have witnessed an exponential

Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring

Restorable Logical Topology using Cross-Layer Optimization

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Network Tomography and Internet Traffic Matrices

The Butterfly, Cube-Connected-Cycles and Benes Networks

Performance of networks containing both MaxNet and SumNet links

CS335 Sample Questions for Exam #2

Network layer: Overview. Network layer functions IP Routing and forwarding

Lesson 5-3: Border Gateway Protocol

Finding Fault Location: Combining network topology and end-to-end measurments to locate network problems?

WITH THE RAPID growth of the Internet, overlay networks

Diversity Coloring for Distributed Data Storage in Networks 1

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

Instructor Notes for Lab 3

Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies

Approximation Algorithms

Administrative Distance

Link-State Routing Protocols

Stability of QOS. Avinash Varadarajan, Subhransu Maji

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

Small Maximal Independent Sets and Faster Exact Graph Coloring

Avaya ExpertNet Lite Assessment Tool

IT 3202 Internet Working (New)

Topological Properties

Hunting for the Root Cause of Robotic VoIP

Tracers Placement for IP Traceback against DDoS Attacks

The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand).

Robust Monitoring of Link Delays and Faults in IP Networks

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Some Examples of Network Measurements

Approximating Average Distortion of Embeddings into Line

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Sample Configuration Using the ip nat outside source static

Near Optimal Solutions

Chapter 4. Distance Vector Routing Protocols

EECS 489 Winter 2010 Midterm Exam

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY

Scalable Prefix Matching for Internet Packet Forwarding

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

I. ADDITIONAL EVALUATION RESULTS. A. Environment

A Framework for Scalable Global IP-Anycast (GIA)

Junos MPLS and VPNs (JMV)

8.1 Min Degree Spanning Tree

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

Social Network Mining

IP Multicasting. Applications with multiple receivers

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Hyacinth An IEEE based Multi-channel Wireless Mesh Network

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications

Efficient Methodical Internet Topology Discovery

Priority Based Enhancement of Online Power-Aware Routing in Wireless Sensor Network. Ronit Nossenson Jerusalem College of Technology

Network Discovery from Passive Measurements

Internet Packets. Forwarding Datagrams

Network management and QoS provisioning - QoS in the Internet

Multicast Group Management for Interactive Distributed Applications

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

Definition. A Historical Example

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

TRILL Large Layer 2 Network Solution

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Experimentation driven traffic monitoring and engineering research

6.852: Distributed Algorithms Fall, Class 2

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling

Routing Protocols OSPF CHAPTER. The following topics describe supported routing protocols. Topics include OSPF, page 9-1 IS-IS Protocol, page 9-3

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Traceroute-Based Topology Inference without Network Coordinate Estimation

TCP/IP Protocol Suite. Marshal Miller Chris Chase

MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE

ECSE-6600: Internet Protocols Exam 2

Course on Social Network Analysis Graphs and Networks

Network Algorithms for Homeland Security

Mining Social Network Graphs

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

SECURING COMPUTER NETWORKS: ACCESS CONTROL MANAGEMENT AND ATTACK SOURCE IDENTIFICATION

Midterm Practice Problems

Transcription:

: What cannot be measured on the Internet? Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan

How accurate are network maps? Why? To develop/adapt protocols to Internet PaDIS, RMTP To understand the impact of uncertainty: networks metrology? How? multicast [Marchetta et al., JSAC 11] network tomography Traceroute Takeaway Compare internet topologies instead of counting them Local properties suer Global properties suer less

Traceroute principle Idea= send buggy TTL packets, collect error messages

Traceroute Limitations Sampling bias: Impact of sources location Aliasing: How to map IPs to the equipement Load-Balancing: Traceroute assumes all packets follow the same path... Stars: Disabled/Filtered ICMP messages Trace: t 1 = a, 1, b t 2 = b, 2, i 1, i 2, i 3, 3, c

Traceroute Limitations Sampling bias: Impact of sources location Aliasing: How to map IPs to the equipement Load-Balancing: Traceroute assumes all packets follow the same path... Stars: Disabled/Filtered ICMP messages Trace: t 1 = a, 1, b t 2 = b, 2, i 1, i 2, i 3, 3, c

Traceroute Limitations Sampling bias: Impact of sources location Aliasing: How to map IPs to the equipement Load-Balancing: Traceroute assumes all packets follow the same path... Stars: Disabled/Filtered ICMP messages Trace: t 1 = a, 1, b t 2 = b, 2, i 1, i 2, i 3, 3, c?

Traceroute Limitations Sampling bias: Impact of sources location Aliasing: How to map IPs to the equipement Load-Balancing: Traceroute assumes all packets follow the same path... Stars: Disabled/Filtered ICMP messages Trace: t 1 = a, 1, b t 2 = b, 2, i 1, i 2, i 3, 3, c

Traceroute Limitations Sampling bias: Impact of sources location Aliasing: How to map IPs to the equipement Load-Balancing: Traceroute assumes all packets follow the same path... Stars: Disabled/Filtered ICMP messages Trace: t 1 = a, 1, b t 2 = b, 2, i 1, i 2, i 3, 3, c

Traceroute Limitations Sampling bias: Impact of sources location Aliasing: How to map IPs to the equipement Load-Balancing: Traceroute assumes all packets follow the same path... Stars: Disabled/Filtered ICMP messages Trace: t 1 = a, 1, b t 2 = b, 2, i 1, i 2, i 3, 3, c

Related Works Works initiated by Acharya and Gouda [SSS09, ICDCN10, ICDCN11] Models to capture irregular nodes Irregular nodes anonymous nodes Central concept of minimal topologies Counting the number of generable topologies Our approach: Lots of generable topologies is not a problem if they are all similar

Model G 0 (V 0, E 0 ): static undirected graph = Target Topology. v V 0 is either named: always answers with its only name (no aliasing) either anonymous: always answers. Not necessarily minimal! d G 0 (u, v) is the shortest path distance.

Model G 0 (V 0, E 0 ): static undirected graph = Target Topology. v V 0 is either named: always answers with its only name (no aliasing) either anonymous: always answers. Not necessarily minimal! d G 0 (u, v) is the shortest path distance.

Model/2 We don't know G 0, but we know a set of traces T of G 0. Anonymous nodes appear as stars ( ) in T Each star has a unique number ( i, i = 1..s) in T d T (u, v) is the number of symbols in T T between u and v. No Assumption on the number of traces, on path uniqueness nor symmetry. t 1 = a, 1, b t 2 = b, 2, i 1, i 2, i 3, 3, c t 1 = b, 1, c t 2 = b, 2, c t 3 = a, b, 3, c t 4 = c, 4, b, a

Rules Complete cover: Each edge of G O trace to T appears at least once in some Reality sampling: For every trace T T, if the distance between two symbols σ 1, σ 2 T is d T (σ 1, σ 2 ) = k, then there exists a path (i.e., a walk without cycles) of length k connecting two (named or anonymous) nodes σ 1 and σ 2 in G 0. No assumption on coverage a, b, c a, c, b a, 1, c a, d, c

Rules -2 α-(routing) Consistency: There exists an α (0, 1] such that, for every trace T T, if d T (σ 1, σ 2 ) = k for two entries σ 1, σ 2 in trace T, then the shortest path connecting the two (named or anonymous) nodes corresponding to σ 1 and σ 2 in G 0 has distance at least αk. Note: α > 0 loop-less routing a, b, c a, i 1, i 3, i 4, c α 2 5

Some more denitions A topology G is α-consistently inferrable from T if it respects the 3 previous rules. Let G T = {G, s.t. G is inferrable from T } We study the properties of the set G T of inferrable topologies. We dene the canonic graph G c as the straightforward graph that treats each star as unique.

How to infer topologies? 1 inferrable topology= 1 mapping of stars to anonymous routers. Let Map be such function.

How to infer topologies -2 G c is inferrable. Map= Id. (i) if 1 T 1 and 2 T 2, and α d T 1 ( 1, u) > d C (u, 2 ) Map( 1 ) Map( 2 ). (ii) 1 T 1 2 T 2, and T s.t. α d T (u, v) > d C (u, 1 ) + d C (v, 2 ) Map( 1 ) Map( 2 ).

Star graph Algorithm constructive part We construct the Star Graph G (V, E ): Vertices=stars in the trace Edges=if stars cannot be merged: ( 1, 2 ) E Map( 1 ) Map( 2 ). 1 proper coloring of G 1 Map function minimal coloring minimal topology 'maximal' coloring G c V k=γ(g ) P(G, k)/k! G T, γ(g ) = chromatic number of G P(G, k) = chromatic polynomial of G.

Star Graph /2 Trace: t 1 = a, 1, b t 2 = b, 2, i 1, i 2, i 3, 3, c α = 0.5 G c : G Colorings

Looking at properties/ Global Results are bad! Connected components No assumption on coverage Stars disconnect the graph! cc(g 1 )/cc(g 2 ) n 2 Stretch Even if we only consider connected topologies. stretch(g) n+s 1 2

Looking at properties/ Local It's worse! Triangles Bipartite complete graph worst case C 3 (G 1 )/C 3 (G 2 ) Degree Worst case is on anonymous nodes DEG(G 1 ) DEG(G 2 ) 2(s γ(g ))

Best case: Fully explored topologies Strong assumptions: Results: α = 1 : shortest path routing u, v V 0, T T such that u T v T We don't see any stronger case Global properties conserved Local properties: still bad!

Overall Results Absolute dierence: G 1 G 2 Property Arbitrary Fully Explored (α = 1) # of nodes s γ(g ) s γ(g ) # of links 2(s γ(g )) 2(s γ(g )) # of CC n/2 = 0 Diameter (s 1)/s (N 1) s/2 ( ) Max. Deg. 2(s γ(g )) 2(s γ(g )) Triangles 2s(s 1) 2s(s 1)/2 Relative dierence: G 1 /G 2 # of nodes (n + s)/(n + γ(g )) (n + s)/(n + γ(g )) # of links (ν + 2s)/(ν + 2) (ν + 2s)/(ν + 2) # of CC n/2 = 1 Stretch (N 1)/2 = 1 Diameter s 2 Max. Deg. s γ(g ) + 1 s γ(g ) + 1 Triangles

Conclusion Constructive proofs Complex algorithm Don't count, compare! Huge dissimilarities Worst case approach A practical part: compare with reality develop property estimation algorithms

Thanks!