POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.

Slides:



Advertisements
Similar presentations
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
Advertisements

Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Internet Control Message Protocol (ICMP)
1 TDC TDC 365 Network Interconnections Technologies Lecture #4 Notes Spring, 2009.
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
1 Internet Networking Spring 2002 Tutorial 4 ICMP (Internet Control Message Protocol)
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
Internet Control Message Protocol (ICMP). Introduction The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected.
Chapter 5 The Network Layer.
Internet Control Message Protocol (ICMP)
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Control Message Protocol (ICMP) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.
1 Internet Control Message Protocol (ICMP) RIZWAN REHMAN CCS, DU.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Defining the IP Packet Delivery Process INTRO v2.0—4-1.
Network Monitoring School of Electronics and Information Kyung Hee University. Choong Seon HONG Selected from ICAT 2003 Material of James W. K. Hong.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
1 Figure 3-33: Internet Control Message Protocol (ICMP) ICMP is for Supervisory Messages at the Internet Layer ICMP and IP  An ICMP message is delivered.
Reading Report 14 Yin Chen 14 Apr 2004 Reference: Internet Service Performance: Data Analysis and Visualization, Cross-Industry Working Team, July, 2000.
CS 6401 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools.
4: Network Layer4a-1 IP datagram format ver length 32 bits data (variable length, typically a TCP or UDP segment) 16-bit identifier Internet checksum time.
Internet Control Message Protocol ICMP. ICMP has two major purposes: –To report erroneous conditions –To diagnose network problems ICMP has two major.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Guide to TCP/IP, Third Edition
Network Administration
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
Internet Control Message Protocol (ICMP)
Problem Statement Map of OSU Routers Gopi Krishna Tummala Rupam Kundu Graduate Students The Ohio State University.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Control Message Protocol (ICMP) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
Software Defined Networking: Traffic Monitoring and Analysis
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 2. Network Monitoring Metrics.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
PC1 LAN GW SP RTR1 SP RTR2 DST 4 * 25 ms 21 ms dst [ ] 4. A third packet is sent with TTL=3, which decrements at each hop, and expires after RTR2,
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Internet Control Message Protocol (ICMP) Chapter 7.
Cisco 2 - Routers Perrine. J Page 112/19/2015 Chapter 8 TCP/IP Error Message Some of the conditions that must be met in order for host to host communication.
1 Connectivity with ARP and RARP. 2 There needs to be a mapping between the layer 2 and layer 3 addresses (i.e. IP to Ethernet). Mapping should be dynamic.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP The PING Tool Traceroute program IGMP.
Connect communicate collaborate Performance Metrics & Basic Tools Robert Stoy, DFN EGI TF, Madrid September 2013.
Lecture#6:Connectivity Verification
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Connectivity Verification
Internet Control Message Protocol (ICMP)
8 Network Layer Part V Computer Networks Tutun Juhana
Part1: Ipconfig ping command Tracert command Getmac command
Lecture#7:Connectivity Verification
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Lecture#6:Connectivity Verification
Internet Control Message Protocol
32 bit destination IP address
Presentation transcript:

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (2) 4. Active Monitoring Techniques  ICMP-based method  Diagnose network problems  Availability / Round-trip delay / Round-trip packet loss  TCP-based method  One-way bandwidth / Round trip bandwidth  Bulk transfer rate  UDP-based method  One-way packet loss / Round trip bandwidth

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (3) 4. Active Monitoring - ICMP  Internet Control Message Protocol (ICMP), RFC 792  The purpose of ICMP messages is to provide feedback about problems in the IP network environment  Delivered in IP packets  ICMP message format  4 byte of ICMP header and optional message

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (4) 4. Active Monitoring - ICMP Functions  To announce network errors  If a network, host, port is unreachable, ICMP Destination Unreachable Message is sent to the source host  To announce network congestion  When a router runs out of buffer queue space, ICMP Source Quench Message is sent to the source host  To assist troubleshooting  ICMP Echo Message is sent to a host to test if it is alive - used by ping  To announce timeouts  If a packet’s TTL field drops to zero, ICMP Time Exceeded Message is sent to the source host - used by traceroute

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (5) 4. Active Monitoring - ICMP Drawbacks  ICMP messages may be blocked (i.e., dropped) by firewall and processed at low priority by router  ICMP has also received bad press by being used in many denial of service attacks and because of the number of sites generating monitoring traffic  As a consequence some ISPs disable ICMP even though this potentially causes poor performance and does not comply with RFC1009 (Internet Gateway Requirements)  In spite of these limitations, ICMP is still most widely used in active network measurements

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (6) 4. Active Monitoring - Ping  A simple application that runs on a host, typically supplied as part of the host's operating system  Uses ICMP ECHO_REQUEST and ECHO_RESPONSE packets  Provides round-trip time and packet loss  For average measurement, run ping at regular intervals so as to measure the site's latency and packet loss

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (7) 4. Active Monitoring – Ping Example

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (8) 4. Active Monitoring - Traceroute  Produces a hop-by-hop listing for each router along the path to the target host  For each hop, it prints the round-trip time for the router  Algorithm: uses ICMP and TTL field in the IP header  Send an ICMP packet with TTL=1  First router sends back ICMP TIME_EXCEEDED  Then send ICMP packet with TTL=2 and hear back from the second router  Continue till the destination is reached or TTL expires (default max TTL=30)  It shows you only the forward path  The reverse path is seldom the same  To trace the reverse path one must run traceroute on the remote host (reverse traceroute server, Looking Glass Server).

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (9) 4. Active Monitoring – Traceroute Example

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (10) Measurement Method Example via Ping Ping (ICMP) – Availability, RT Loss, RTT Delay Measurement Test Machine Measurement Test Machine Gigabit Ethernet Backbone Network RSM Period : 10 min. Packet Size : 40 bytes Packet Generator (ICMP) Customer SLA DB

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (11) Measurement Method Example via TCP TCP – Throughput Measurement Source Machine Measurement Source Machine Measurement Destination Machine Measurement Destination Machine NTP Synchronized hosts TCP local time : t1 local time : t2 t1 t2 Throughput (Mbps) = t2( ㎲ ) – t1( ㎲ ) 10 5 x KB

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (12) Measurement Method Example via UDP UDP – One Way Loss Measurement Source Machine Measurement Source Machine Measurement Destination Machine Measurement Destination Machine NTP Synchronized hosts UDP 100 KB One way Loss = x 100 (%) Sent Packet Counts Received Packet Counts 1 Packet (1000 Byte)