Geolocation Les Cottrell – SLAC University of Helwan / Egypt, Sept 18 – Oct 3, 2010 Partially funded by DOE/MICS Field Work Proposal on Internet End-to-end.

Slides:



Advertisements
Similar presentations
Pune, India, 13 – 15 December 2010 ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services Dr. Bamba Gueye Joint work.
Advertisements

1 QoS on Best-effort IP Networks Les Cottrell – SLAC Presented at the Joint SG13/SG16 Workshop Panel.
Dude, where’s that IP? Circumventing measurement-based IP geolocation Presented by: Steven Zittrower.
S3 Computer Literacy Internet Technology.
CSCI-235 Micro-Computers in Science The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
Multicast Fundamentals n The communication ways of the hosts n IP multicast n Application level multicast.
1 Traceanal: a tool for analyzing and representing traceroutes Les Cottrell, Connie Logg, Ruchi Gupta, Jiri Navratil SLAC, for the E2Epi BOF, Columbus.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1: Solutions Time: 60 min (strictly enforced) Points: 50 YOUR.
Internet…issues Managing the Internet
MAGGIE NIIT- SLAC On Going Projects Measurement & Analysis of Global Grid & Internet End to end performance.
A Detailed Path-latency Model for Router Geolocation Sándor Laki *, Péter Mátray, Péter Hága, István Csabai and Gábor Vattay Department of Physics of Complex.
LOGO 1 MAGGIE Measurement & Analysis of the Global Grid & Internet End-to-End Performance Monitoring A Research Collaboration by National University of.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
Reading Report 14 Yin Chen 14 Apr 2004 Reference: Internet Service Performance: Data Analysis and Visualization, Cross-Industry Working Team, July, 2000.
Fundamental of IP network ~ ping, traceroute ~ Practice 1 Information and Communications Technology Internet Engineering.
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
Working at a Small-Medium Business or ISP
(jeez y) Where is the Internet? Answers from : (G. Whilikers) Out there. (Mike) the way I see it, the "internet" has to be somewhere. a router collects.
PingER: Research Opportunities and Trends R. Les Cottrell, SLAC University of Malaya.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
Computer Networks. IP Addresses Before we communicate with a computer on the network we have to be able to identify it. Every computer on a network must.
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
MCHS The Internet and Its Uses Working at a Small-to-Medium Business or ISP – Chapter 1.
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
© 2002, Cisco Systems, Inc. All rights reserved..
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
Jump Starting ITS Deployment in Los Angeles County using Wireless Communications Lessons Learned.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 9 Basic Router Troubleshooting.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Measurement & Analysis of Global Grid & Internet End to end performance (MAGGIE) Network Performance Measurement.
1 The PingER Project: Measuring the Digital Divide PingER Presented by Les Cottrell, SLAC At the SIS Show Palexpo/Geneva December 2003.
1 Measurements of Internet performance for NIIT, Pakistan Jan – Feb 2004 PingER From Les Cottrell, SLAC For presentation by Prof. Arshad Ali, NIIT.
Locating hosts by TULIP (Trilateration Utility for Locating IP hosts) Prepared by: Les Cottrell SLAC, Faran Javed NIIT, Shahryar Khan NIIT,Umar Kalim NIIT.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
PRACTICAL INTRODUCTION TO INTERNET TECHNOLOGY. Practical one PACKET DELAY AND LOSS IN INTERNET In this experiment, you will observe real delays and loss.
D-Link TSD 2009 workshop D-Link Net-Defends Firewall Training ©Copyright By D-Link HQ TSD Benson Wu.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Overlay Networks : An Akamai Perspective
A Detailed Path-latency Model for Router Geolocation* Internetes hosztok mérés alapú geolokalizációja Sándor Laki, Péter Mátray, Péter Hága, István Csabai.
Navigating PingER Les Cottrell – SLAC Presented at the Optimization Technologies for Low-Bandwidth Networks, ICTP Workshop,
1 PingER performance to Bangladesh Prepared by Les Cottrell, SLAC for Prof. Hilda Cerdeira May 27, 2004 Partially funded by DOE/MICS Field Work Proposal.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
1 IP2Geo: Locating Internet Hosts Geographically Venkat Padmanabhan Microsoft Research Joint work with L. Subramanian (UC Berkeley)
Bernard Ugalde. Every day it becomes clearer that the Net is taking its place alongside the other great transformational technologies that first challenged,
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Lecture 13 – Network Mapping
More on WANs Fiber Optic Cables Used in Internet backbone
Chapter 19 Network Layer Protocols
Traceroute traceroute is a Unix utility designed by Van Jacobson in 1987 The Windows equivalent is called tracert The Linux equivalent is called tracepath.
CONNECTING TO THE INTERNET
Dude, where’s that IP? Circumventing measurement-based geolocation
Phillipa Gill University of Toronto
Navigating PingER Les Cottrell – SLAC
MAGGIE NIIT- SLAC On Going Projects
Ch 17 - Binding Protocol Addresses
Locating hosts by TULIP (Trilateration Utility for Locating IP hosts)
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Lecture 4a Mobile IP 1.
Presentation transcript:

Geolocation Les Cottrell – SLAC University of Helwan / Egypt, Sept 18 – Oct 3, 2010 Partially funded by DOE/MICS Field Work Proposal on Internet End-to-end Performance Monitoring (IEPM), also supported by IUPAP SPACE Weather School: Basic theory & hands-on experience

Outline Geolocation = estimating the latitude and longitude of a public (IP) network interface. Importance How is it done Dynamic method – RTT => distance – Geometrical methods of finding location from circles – Method – Challenges

Why is it important Overlay network construction, Determine where customers are so can use targeted advertising and services – E.g. special offers from local stores Direct customer to the right site – E.g. Hotmail directs clients to appropriate replicated servers based on clients location Understand shopping or other patterns, consumer habits based on location Applying appropriate taxes, digital and territory rights Locate servers or suspicious hosts Language and currency choice & translations Applications such as Visual Traceroute need to locate nodes on a map

How is it done: Heuristics Based on hostname: – Top level domain may correctly identify country Often not true, especially developing countries use proxies in well connected locations – Name may give clue, e.g. denvcr2-sunncr1.es.net router connecting Denver to Sunnyvale

How is it Done: Databases Given an IP address lookup the Autonomous System (AS) and see where it is located – Often gives the corporate HQ of AS not location of host Access to Internet registration databases (e.g. via whois) that may contain locations – Host locations are often not registered Specialized location databases, e.g. – – Lot of work to keep current – Maxmind is a database used by several services

How is it done: Dynamically Measure Round Trip Time (RTT) from landmarks at known locations Convert RTT to distance d Use geometrical method (e.g. trilateration) to find intersection of circles with radius d i (i=1..3) – Trilateration, multilateration, Apollonius Apply other constraints

Get distance from RTT Roughly speed of light in copper or fibre = – 0.6 * c (velocity of light) or RTT = 1ms ~ 100km However: route is not often direct – Can go through multiple routers/switches which add delay to clock the packet onto the link – e.g. 0.5ms for 1Mbps link and 60 byte packet, i.e. – ignore for backbone (typically >= Gbps) buffering in case link is busy – Make multiple measurements, take minimum & assume no buffering

Non direct routes Seldom does the route follow a great circle path E.g. Europe to Japan via submarine cables going around Spain through Mediterranean, Red Sea, around Sri Lanka, Singapore, up E coast Asia to Japan E.g. In US From LA to Salt Lake City via San Francisco

A route in Germany The German part of the traceroute from SLAC to DESY in Hamburg goes from Frankfurt tto Potsdam to Tubingen and then to Hamburg. This is about 1100miles compared to a direct driving distance of ~ 300miles or 4 times the distance This indirect route is shown in red on the right. BTW GeoIPTools placed all the routers about 30km SE of Bonn

Correction factor So use d = alpha * RTT * 100 km alpha ~ 0.4 (km/ms) May try and optimize depending on landmark and target region

Need landmarks from which to make measurements Landmark needs – to be at a known location – to respond to a request to make on-demand RTT measurements to a given target ~ 500 sites nominally available in: – PlanetLabs (420/81), PingER (75/50), perfSONAR – Many sites do not respond, so need to monitor and disable/enable PingER PlanetLab s Locations of Enabled Landmarks

Method Client/users send URL with target to a “reflector” Reflector distributes the request to ping the target to the enabled landmarks and gets back results Formatted results are sent to client – Client converts RTTs to distance, and uses various methods to extract the location GUI displays results of various methods and shows some details

Geometrical methods Trilateration intersection of 3 circles – Uses 3 smallest RTTs Multilateration uses > 3 circles Apollonius finds up to 8 circles tangential to initial 3 circles Do not have to intersect Chooses center of smallest circle Or take inscription of all circles

Improvements Use maximum and minimum circles – d max = 100 * RTT (ms) km – d min = alpha min * 100 * RTT (ms) + b km km RTT ms

Using the two sets of circles to further Constrain result d 1 max d 1 min = alpha*d 1 max + b Landmark 1

Challenges Embedded circles may have no solution Landmarks or targets connected via satellite fail Accuracy depends on density and distribution of landmarks – Works much better for targets in N. America and Europe – Need more landmarks but means more network traffic Typical accuracy only as good as 250km for 80% of the targets Today database methods generally work better – Fail for proxied hosts, – Fail often backbone routers owned by ISP – Replicated hosts, hotmail, Google, Yahoo etc – Mobile hosts So valuable cross check

Problems Amount of traffic directed at target may look like a DOS attack Use tiering – Choose one or more landmarks representative of a region E.g. In center of region such as Chicago for N. America or Geneva for Europe – Use such tier0 landmarks to determine region of target – The use just the landmarks in that region to locate target