INTERNET TOPOLOGY MAPPING INTERNET MAPPING PROBING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University.

Slides:



Advertisements
Similar presentations
Chapter 22 Network Layer: Delivery, Forwarding, and Routing.
Advertisements

Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Networks: Routing1 Network Layer Routing. Networks: Routing2 Network Layer Concerned with getting packets from source to destination Network layer must.
Measurement in the Internet. Outline Internet topology Bandwidth estimation Tomography Workload characterization Routing dynamics.
Routing and Routing Protocols Introduction to Static Routing.
Routing.
14 – Inter/Intra-AS Routing
Networks: Routing1 Network Layer Routing. Networks: Routing2 Network Layer Concerned with getting packets from source to destination. The network layer.
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
INTERNET MEASUREMENT INTERNET MAPPING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University of Nevada,
CS 453 Computer Networks Lecture 24 IP Routing. See…
Introduction to Routing and Routing Protocols By Ashar Anwar.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato Optimising Path Discovery Doubletree.
Routing and Routing Protocols Routing Protocols Overview.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Efficient Algorithms for Large-Scale Topology Discovery Benoit Donnet joint work with Philippe Raoult, Timur Friedman and Mark Crovella Sigmetrics 2005.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
Doubletree: a Way to Reduce Redundancy in Traceroute Systems Benoit Donnet joint work with P. Raoult, T. Friedman and M. Crovella CAIDA – San Diego (Sept.
Introduction to OSPF Nishal Goburdhan. Routing and Forwarding Routing is not the same as Forwarding Routing is the building of maps Each routing protocol.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
Chelebi: Subnet-level Internet Mapper Mehmet H. Gunes University of Nevada, Reno.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 34 Routing Algorithms Ref: Tanenbaum pp ;
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
Routing and Routing Protocols
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
1 Version 3.1 Module 6 Routed & Routing Protocols.
Dynamic Routing Protocols II OSPF
1 7-Jan-16 S Ward Abingdon and Witney College Dynamic Routing CCNA Exploration Semester 2 Chapter 3.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
Transport Layer3-1 Network Layer Every man dies. Not every man really lives.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
INTERNET MEASUREMENT INTERNET MAPPING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University of Nevada,
Routing Protocols Brandon Wagner.
Routing Protocols COSC 541 Data Commun. System & Networks Yue Dou.
CHAPTER 6: STATIC ROUTING Static Routing 2 nd semester
Cisco 2 - Routers Perrine modified by Brierley Page 13/21/2016 Chapter 4 Module 6 Routing & Routing Protocols.
Border Gateway Protocol. Intra-AS v.s. Inter-AS Intra-AS Inter-AS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Topology Discovery Using an Address Prefix Stopping Rule Benoit Donnet Joint work with Timur Friedman Eunice 2005 – Madrid (Spain)
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
A CIDR Prefix Stopping Rule for Topology Discovery Benoit Donnet joint work with Timur Friedman Algotel 2005 – Presqu'Ile de Giens.
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
Network Layer Routing Networks: Routing.
Working at a Small-to-Medium Business or ISP – Chapter 6
Dynamic Routing Protocols II OSPF
Improved Algorithms for Network Topology Discovery
Routing and Routing Protocols: Routing Static
COMP 3270 Computer Networks
RESOLVING IP ALIASES USING DISTRIBUTED SYSTEMS
Introduction to Internet Routing
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing.
Routing and Routing Protocols: Routing Static
Dynamic Routing Protocols II OSPF
Dynamic Routing Protocols
Static Routing 1st semester
Routers Routing algorithms
Switch controller: Routing
Network Layer Routing Networks: Routing.
Dynamic Routing Protocols
Multipath tracing with Paris Traceroute
Working at a Small-to-Medium Business or ISP – Chapter 6
Computer Networks Protocols
Routing.
Presentation transcript:

INTERNET TOPOLOGY MAPPING INTERNET MAPPING PROBING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University of Nevada, Reno M.Sc.

TOPOLOGY OF THE INTERNET Network of networks linked together world wide WHY IMPORTANT?  Identify vulnerabilities  Identify threats  Create new protocols  Examine internet evolution  Economics (Internet based services)

An autonomous system (AS) is a network or a collection of networks that are all managed and supervised by a single entity or organization. TOPOLOGY OF THE INTERNET AS 1 AS 2 AS 4 AS 3 Interconnection of Autonomous Systems (Internet Service Providers, Universities, Companies) Distinct regions of administrative control

Connection between ASes  AS needs to know how to reach the rest of the Internet BGP (Border Gateway Protocol)  provides reachability across the whole Internet  exchange routing information between ASes  iBGP, eBGP  eBGP: Border router  a direct link to another border router in another AS TOPOLOGY OF THE INTERNET AS 1 AS 2

 Traceroute  Sends a series of probes to successive nodes along a route to a destination  Records source address and time delay of the message returned by each hop. Tools for Topology Mapping

Figure: Tony McGregor RIPE NCC Visiting Researcher The reason of sending 3 packets is to calculate the average RTT. Traceroute RTT: the delay between sending the packet and getting the response

 Probing Overhead  Causes DoS attacks  Reduces efficiency THE PROBLEM

 Intra –monitor redundancy  Occurs when all traceroutes start from a single point  Inter –monitor redundancy  Occurs when multiple monitors visit the same point INTRA AND INTER –MONITOR REDUNDANCY

INTRA –MONITOR REDUNDANCY Monitor 1 Destination 1 Destination 2 Destination 3

INTER –MONITOR REDUNDANCY Monitor 1 Monitor 2 Monitor 3 Destination 1

 Introduced by Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella  Significantly reduces both kinds of redundancy: inter- and intra- monitor  Key ideas:  utilize tree-like structure of routes  probe each target by starting midpoint of the path DOUBLETREE

 Intra-monitor: Monitor-Rooted tree  Start probing far from the monitor (vantage point)  Probe forwards and backwards  If an interface is encountered that has already been discovered by the vantage point:  stop probing  add the discovered interface to the “local stop set” DOUBLETREE

Doubletree: Monitor-Rooted Tree Intra-Monitor

 Inter-monitor: Destination-Rooted tree  Probe forwards and backwards  If facing an interface that has already been discovered  stop probing  add the discovered interface to the “global stop set”  Monitors (vantage points) need to share information of discovered interfaces  VPs have to work in coordination DOUBLETREE

Doubletree: Destination-Rooted Tree Inter-Monitor

 Must determine a paths mid point  Information sharing between nodes causes another traffic  Doesn’t deal well with load balancing DOUBLETREE

 Reduce intra-monitor redundancy by performing partial traces to some destination IP addresses.  Once having a full trace to an IP address in an AS,  start traceroute queries from the hop distance h i of the ingress router  If the first IP of the new trace has not appeared at the same hop distance h j in any of the earlier full traces to the AS,  then completes the trace, otherwise does not complete the trace. CHELEBY Intra –monitor redundancy

CHELEBY - Intra-Monitor Redundancy AS 1 B C A D E F G H Start the trace from 4 th hop (D)

 A destination IP is probed by only one monitor (Vantage Point) of a team  Vantage Points in the same area are geographically close  Their contribution to identify a new link/node is small  Identify ingress points of ASes to dynamically establish teams for each destination AS  One vantage point probing through each ingress point of an AS CHELEBY Inter –monitor redundancy

CHELEBY - Inter-Monitor Redundancy V A 1 V A 2 V B 1 V B 2 V B 3 D Area A Area B

 By Guillermo Baltra, Robert Beverly, Geoffrey G. Xie  A new interface-level network mapping technique  Underlying IPS  is the observation that a target AS is multi-homed and multi-connected INGRESS POINT SPREADING (IPS)

 An AS being connected to two or more separate ISPs (more than one AS).  If one outgoing link fails, outgoing traffic will automatically be routed via one of the remaining links.  Has multiple ingress points AS Multi-homing

 If probes enter the AS (multihomed) via different ingress points  Not only reduce the probing overhead but likely to reveal more of the target network’s topological structure D1D1 D3D3 D2D2 V2V2 V1V1 V3V3 A Multi-Homed AS INGRESS POINT SPREADING (IPS)

 1. Infer the number of ingress points for a target network  2. Select the VP with the highest likelihood to traverse an ingress point that has not yet been covered  3. To infer potential ingress points:  Subnet Centric Probing  IPS algorithm computes a per-destination network rank- ordered list of VPs based on prior rounds of probing. INGRESS POINT SPREADING (IPS)

 IPS seeks to utilize all of the ingress points discovered in prior rounds of probing  future probing can induce probe traffic to flow through each of these known ingresses  explore more of the destination network’s topology INGRESS POINT SPREADING (IPS)

 Uses one day’s worth of prior probing results to infer potential ingress points at different notional network boundaries for each target prefix  Use the knowledge of how networks are subnetted to select addresses to probe within each BGP advertised prefix  Adapt the number of probes to the degree of subnetting within the prefix to avoid wasted probing Subnet Centric Probing

Reducing the probing redundancy by - Generalizes DoubleTree without parametrization -Intelligently tuning (via TTL) the set of hops each trace interrogates -Start a trace with a TTL suitable to reach the destination and iteratively decrement the TTL until a previously discovered hop (i.e. at the AS ingress) is found. - Discover AS ingress points and paths to the AS via multiple vantage points AS ingress

  REFERENCES

? QUESTIONS?