Inferring Autonomous System Relationships in the Internet Lixin Gao.

Slides:



Advertisements
Similar presentations
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
Advertisements

CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
Lecture 9 Overview. Hierarchical Routing scale – with 200 million destinations – can’t store all dests in routing tables! – routing table exchange would.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
Inferring Autonomous System Relationships in the Internet Lixin Gao Dept. of Electrical and Computer Engineering University of Massachusetts, Amherst
Inferring Autonomous System Relationships in the Internet Lixin Gao Presented by Santhosh R Thampuran.
Announcement  Slides and reference materials available at  Slides and reference materials available.
1 Internet Path Inflation Xenofontas Dimitropoulos.
Something We Always Wanted to Know about ASs: Relationships and Taxonomy Dmitri Krioukov X. Dimitropoulos, M. Fomenkov, B. Huffaker, Y.
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
Progress in inferring business relationships between ASs Dmitri Krioukov 4 th CAIDA-WIDE Workshop.
1 Tutorial 5 Safe “Peering Backup” Routing With BGP Based on:
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
Tutorial 5 Safe Routing With BGP Based on: Internet.
Instability of BGP ASPP Supervised by Prof. Chiu and Prof. John Presented by Hui Wang.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
Internet Networking Spring 2004 Tutorial 5 Safe “Peering Backup” Routing With BGP.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Characterizing the Internet Hierarchy from Multiple Vantage Points Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park,
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Near-Deterministic Inference of AS Relationships Udi Weinsberg A thesis submitted toward the degree of Master of Science in Electrical and Electronic Engineering.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
University of Massachusetts, Amherst 1 On the Evaluation of AS Relationship Inferences Jianhong Xia and Lixin Gao Department of Electrical and Computer.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Computer Networks Layering and Routing Dina Katabi
Inter-domain Routing Outline Border Gateway Protocol.
Information-Centric Networks07b-1 Week 7 / Paper 2 NIRA: A New Inter-Domain Routing Architecture –Xiaowei Yang, David Clark, Arthur W. Berger –IEEE/ACM.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Internet Routing: Measurement, Modeling, and Analysis Dr. Jia Wang AT&T Labs Research Florham Park, NJ 07932, USA
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Egress Route Selection for Interdomain Traffic Engineering Design considerations beyond BGP.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
On AS-Level Path Inference Jia Wang (AT&T Labs Research) Joint work with Z. Morley Mao (University of Michigan, Ann Arbor) Lili Qiu (University of Texas,
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
TDTS21: Advanced Networking Lecture 7: Internet topology Based on slides from P. Gill and D. Choffnes Revised 2015 by N. Carlsson.
Border Gateway Protocol
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
On Understanding of Transient Interdomain Routing Failures Feng Wang, Lixin Gao, Jia Wang, and Jian Qiu Department of Electrical and Computer Engineering.
R-BGP: Staying Connected in a Connected World Nate Kushman Srikanth Kandula, Dina Katabi, and Bruce Maggs.
Advancements in the Inference of AS Relationships Xenofontas Dimitropoulos (Fontas) (CAIDA/GaTech) Dmitri Krioukov Bradley Huffaker k claffy George Riley.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol)
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
Inferring AS Relationships. The Problem  One view  AS relationships  BGP route tables  The other view  BGP route tables  AS relationships  Available.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol)
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Border Gateway Protocol. Intra-AS v.s. Inter-AS Intra-AS Inter-AS.
Scaling Properties of the Internet Graph Aditya Akella With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
1 Internet Routing 4/12/2012. Admin. r Exam 2 date: m Wednesday, May 2 at 2:00 p.m. m If you want to take the exam in another day (e.g. due to travel),
Doing Don’ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre.
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
Inferring Autonomous System Relationships in the Internet Lixin Gao Dept. of Electrical and Computer Engineering University of Massachusetts, Amherst.
An Analysis of BGP Convergence Properties
Border Gateway Protocol
COMP 3270 Computer Networks
Routers Routing algorithms
COS 461: Computer Networks Spring 2014
Objective- To use an equation to graph the
BGP Instability Jennifer Rexford
Objective- To graph a relationship in a table.
Presentation transcript:

Inferring Autonomous System Relationships in the Internet Lixin Gao

Background –Network is typically modelled as a graph. Does it work in BGP? Routing in BGP is controlled by the policy. Does connectivity imply reachability? –Need to have AS relation to characterize the Internet. BGP allows each AS to choose its own policy in selecting routes and propagating reachability information. The policies are constrained only by the contractual commercial agreements. –What are the types of the AS relationship? –What kind of paths appear in the BGP routing table? –Is it possible to infer the AS relationship from public information (BGP routing table)

Network model: –connectivity between ASes can be modeled using an AS graph, G= (V, E). –Import policies transform incoming routes. u sends v a set of routes R, import (u, v)[R] represents the set of updated routes after the import policies are applied. E.g. if v in r.as_path then import (u, v)[{r}] = {} –The best path to d, B(u, d) is selected from the updated routes from all neighbor. –Export policies export(v, u) is applied to the best routes before they are send to neighbor v –Routing table enable is either B(u, d) or a local path.

AS relationships –The commercial agreements between pairs of administrative domains can be classified into: customer-provider relationship peering relationship mutual-transit(sibling) relationship

Relationship between a pair of ASes: –customer-to-provider relationship –provider-to-customer relationship –peer-to-peer relationship –sibling-to-sibling relationship

BGP export rules ××× ××××× ××× ×××××

Lemma: If u 0 ’s BGP routing table contains an entry with AS path (u 1,u 2,…,u n ) for destination prefix d, then, (a) any node u i selects a route with as_path (u i+1,…,u n ) as the best route to prefix d, and, (b) u i exports its best route u i-1

Valley-free property –After traversing a provider-to-customer or peer- to-peer edge, the AS path can not traverse a customer-to-provider or peer-to-peer edge. –Formally, an AS path (u 1,u 2,…,u n ) is valley- free iff the following conditions hold true A provider-to-customer edge can be followed by only provider-to-customer or sibling-to-sibling edges A peer-to-peer edge can be followed by only provider-to- customer or sibling-to-sibling edges

Theorem: If all ASes set their export policies according to the BGP export rules, then an AS path in any BGP routing table entry is valley-free

An AS path of a BGP routing table entry has one of the following patterns: –an uphill path –a downhill path –an uphill path followed by a downhill path –an uphill path followed by a peer-to-peer edge –a peer-to-peer edge followed by a downhill path –an uphill path followed by a peer-to-peer edge followed by a downhill path

Algorithm for inferring AS relationships: –Assume the pattern of routes in BGP routing table. –Other intuition: a provider typically has a larger size than its customer and the size of an AS is typically proportional to its degree in the AS graph top provider of an AS path is the AS that has the highest degree among all ASes in the path consecutive AS pairs on the left of the top provider are customer-to-provider or sibling-to-sibling edges and on the right are provider-to-customer or sibling-to-sibling edges

Inferring customer-provider, provider- customer, and sibling-sibling relations: Input: BGP routing table RT Output: Annotated AS graph G Phase 1: Compute the degree for each AS Phase 2: Parse AS path to initialize consecutive AS pair relationship Phase 3: Assign relationship to AS pairs This is a heuristic that may generate inconsistent results.

Inferring peer-peer relation: –Peer-to-peer edge between top provider and one of its neighbors only –If the top provider has sibling-to-sibling relationship with one of its neighbors, then it has a peer-to-peer relationship with the other neighbor –We use the heuristic that peer-to-peer edge is between the top provider and its neighboring AS that has a higher degree because such edges are between ASes of comparable sizes –We also use the heuristic that the degrees of two peers do not differ significantly - ASes having peer-to-peer relationship do not differ by more than R times

Final algorithm: Input: BGP routing table RT Output: Annotated AS graph Phase 1: Use the algorithm to coarsely classify AS pairs into having provider-to-customer or sibling-to-sibling relationships Phase 2: Identify AS pairs that can not have a peer-to- peer relationship Phase 3: Assign peer-to-peer relationships from rest of the connected AS pairs as long as the pair degrees do not differ by more than R times