Measurement: Techniques, Strategies, and Pitfalls Nick Feamster CS 7260 February 7, 2007.

Slides:



Advertisements
Similar presentations
Network Layer: Address Mapping, Error Reporting, and Multicasting
Advertisements

Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
A New Method for Symmetric NAT Traversal in UDP and TCP
Security Issues In Mobile IP
Nick Feamster Georgia Tech
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Data-Plane Accountability with In-Band Path Diagnosis Murtaza Motiwala, Nick Feamster Georgia Tech Andy Bavier Princeton University.
Multihoming and Multi-path Routing
Theory Lunch. 2 Problem Areas Network Virtualization for Experimentation and Architecture –Embedding problems –Economics problems (markets, etc.) Network.
Multihoming and Multi-path Routing
Interconnection: Switching and Bridging CS 4251: Computer Networking II Nick Feamster Fall 2008.
Measurement: Techniques, Strategies, and Pitfalls Nick Feamster CS 6250 Fall 2011.
Network Monitoring and Security Nick Feamster CS 4251 Spring 2008.
Traffic Dynamics at a Commercial Backbone POP Nina Taft Sprint ATL Co-authors: Supratik Bhattacharyya, Jorjeta Jetcheva, Christophe Diot.
Topology Modeling via Cluster Graphs Balachander Krishnamurthy and Jia Wang AT&T Labs Research.
University of Nevada, Reno Router-level Internet Topology Mapping CS790 Presentation Modified from Dr. Gunes slides by Talha OZ.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Local Area Networks - Internetworking
CCENT Study Guide Chapter 12 Security.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
Christophe Jelger – CS221 Network and Security - Universität Basel Christophe Jelger Post-doctoral researcher IP Multicasting.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
Chapter 2 Static Routing – Part 2 CIS 82 Routing Protocols and Concepts Rick Graziani Cabrillo College Last Updated: 2/22/2009.
IP Routing.
06-Sep-2006Copyright (C) 2006 Internet Initiative Japan Inc.1 Prevent DoS using IP source address spoofing MATSUZAKI ‘maz’ Yoshinobu.
Multihoming and Multi-path Routing CS 7260 Nick Feamster January
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-5-1 WAN Connections Enabling RIP.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
1 A survey of Internet Topology Discovery. 2 Outline Motivations Internet topology IP Interface Level Router Level AS Level PoP Level.
Measurement and Monitoring Nick Feamster Georgia Tech.
Routing Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
Routing.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
1 Network Topology Measurement Yang Chen CS 8803.
1 ICMP – Using Ping and Trace CCNA Semester
INTERNET TOPOLOGY MAPPING INTERNET MAPPING PROBING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University.
10/8/2015CST Computer Networks1 IP Routing CST 415.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
Measurement: Techniques, Strategies, and Pitfalls David Andersen CMU Many (most) slides in this lecture from Nick Feamster's measurement lecture.
NAT – Network Address Translation
Network Tools and Utilities
ICMP ICMP – Internet Control Message Protocol
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
8 Network Layer Part V Computer Networks Tutun Juhana
ICMP – Using Ping and Trace
RESOLVING IP ALIASES USING DISTRIBUTED SYSTEMS
Routing.
ICMP – Using Ping and Trace
Measured Impact of Crooked Traceroute
ITL Simple Diagnostic Tools
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
Lecture 26: Internet Topology CS 765: Complex Networks.
Routing.
Presentation transcript:

Measurement: Techniques, Strategies, and Pitfalls Nick Feamster CS 7260 February 7, 2007

2 Internet Measurement Process of collecting data that measure certain phenomena about the network –Should be a science –Today: closer to an art form Key goal: Reproducibility “Bread and butter” of networking research –Deceptively complex –Probably one of the most difficult things to do correctly

3 Types of Data traceroute ping UDP probes TCP probes Application-level “probes” –Web downloads –DNS queries Packet traces –Complete –Headers only –Specific protocols Flow records Specific data –Syslogs … –HTTP server traces –DHCP logs –Wireless association logs –DNSBL lookups –… Routing data –BGP updates / tables, ISIS, etc. Passive Active

4 Outline: Tools and Pitfalls Aspects of Data Collection –Precision: At what granularity are measurements taken? –Accuracy: Does the data capture phenomenon of interest? –Context: How was the data collected? Tools –Active Ping, traceroute, etc. Accuracy pitfall example: traceroute –Passive Packet captures (e.g., tcpdump, DAG) Flow records (e.g., netflow) Routing data (e.g., BGP, IS-IS, etc.) Context pitfall example: eBGP multihop data collection

5 Outline (continued) Strategies –Cross validate consistency checks multiple “overlapping” measurements –Examine Zeroth-Order Database as secret weapon Other considerations –Anonymization and privacy –Maintaining longitudinal data

6 Active Measurement

7 How Traceroute Works Send packets with increasing TTL values ICMP “time exceeded TTL=1TTL=2TTL=3 Nodes along IP layer path decrement TTL When TTL=0, nodes return “time exceeded” message

8 Problems with Traceroute Can’t unambiguously identify one-way outages –Failure to reach host : failure of reverse path? ICMP messages may be filtered or rate-limited IP address of “time exceeded” packet may be the outgoing interface of the return packet TTL=1TTL=2TTL=3

9 Famous Traceroute Pitfall Question: What ASes does traffic traverse? Strawman approach –Run traceroute to destination –Collect IP addresses –Use “whois” to map IP addresses to AS numbers Thought Questions –What IP address is used to send “time exceeded” messages from routers? –How are interfaces numbered? –How accurate is whois data?

10 More Caveats: Topology Measurement Routers have multiple interfaces Measured topology is a function of vantage points Example: Node degree –Must “alias” all interfaces to a single node (PS 2) –Is topology a function of vantage point? Each vantage point forms a tree See Lakhina et al.

11 Less Famous Traceroute Pitfall Host sends out a sequence of packets –Each has a different destination port –Load balancers send probes along different paths Equal cost multi-path Per flow load balancing Soule et al., “Avoiding Traceroute Anomalies with Paris Traceroute”, IMC 2006 Question: Why won’t just setting same port number work?

12 Designing for Measurement What mechanisms should routers incorporate to make traceroutes more useful? –Source IP address to “loopback” interface –AS number in time-exceeded message –??

13 Routing Data IGP BGP –Collection methods eBGP (typically “multihop”) iBGP –Table dumps: Periodic, complete routing table state (direct dump from router) –Routing updates: Continuous, incremental, best route only iBGP session

14 BGP Routing Updates: Example Accuracy issue: Old versions of Zebra would not process updates during a table dump…buggy timestamps. TIME: 07/06/06 19:49:52 TYPE: BGP4MP/STATE_CHANGE PEER: AS65533 STATE: Active/Connect TIME: 07/06/06 19:49:52 TYPE: BGP4MP/STATE_CHANGE PEER: AS65533 STATE: Connect/Opensent TIME: 07/06/06 19:49:52 TYPE: BGP4MP/STATE_CHANGE PEER: AS65533 STATE: Opensent/Active TIME: 07/06/06 19:49:55 TYPE: BGP4MP/MESSAGE/Update FROM: AS3 TO: AS3 WITHDRAW / / / / / / /24

15 The Importance of Context: Case Studies with Routing Data

16 Context Pitfall: AS-Level Topologies Question: What is the Internet’s AS-level topology? Strawman approach –Routeviews routing table dumps –Adjacency for each pair of ASes in the AS path Problems with the approach? –Completeness: Many edges could be missing. Why? Single-path routing Policy: ranking and filtering Limited vantage points –Accuracy –Coarseness

17 Context Pitfall: Routing Instability Question: Does worm propagation cause routing instability? Strawman approach: –Observe routing data collected at RIPE RIRs –Correlate routing update traffic in logs with time of worm spread –Finding: Lots of routing updates at the time of the worm sprreading! –(Bogus) conclusion: Worm spreading causes route instability Missing/Ignored Context: Instability + eBGP multihop … Cowie et al., “Global Routing Instabilities Triggered by Code Red II and Nimda Worm Attacks”