User-level Internet Path Diagnosis Ratul Mahajan, Neil Spring, David Wetherall and Thomas Anderson Designed by Yao Zhao.

Slides:



Advertisements
Similar presentations
Challenges in Making Tomography Practical
Advertisements

Data-Plane Accountability with In-Band Path Diagnosis Murtaza Motiwala, Nick Feamster Georgia Tech Andy Bavier Princeton University.
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
A Case for Relative Differentiated Services and the Proportional Differentiation Model Constantinos Dovrolis Parameswaran Ramanathan University of Wisconsin-Madison.
Internet Control Message Protocol (ICMP)
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
1 Internet Networking Spring 2002 Tutorial 4 ICMP (Internet Control Message Protocol)
1 A survey of Internet Topology Discovery. 2 Outline Motivations Internet topology IP Interface Level Router Level AS Level PoP Level.
15-441: Computer Networking Lecture 26: Networking Future.
1 A Suite of Schemes for User-level Network Diagnosis without Infrastructure Yao Zhao, Yan Chen Lab for Internet and Security Technology, Northwestern.
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
User-level Internet Path Diagnosis R. Mahajan, N. Spring, D. Wetherall and T. Anderson.
Internet Control Message Protocol (ICMP)
Internet Bandwidth Measurement Techniques Muhammad Ali Dec 17 th 2005.
Yao Zhao 1, Yan Chen 1, David Bindel 2 Towards Unbiased End-to-End Diagnosis 1.Lab for Internet & Security Tech, Northwestern Univ 2.EECS department, UC.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Control Message Protocol (ICMP) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
Scalable and Deterministic Overlay Network Diagnosis Yao Zhao, Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer.
Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.
Measuring ISP topologies with Rocketfuel Ratul Mahajan Neil Spring David Wetherall University of Washington ACM SIGCOMM 2002.
1 Network Topology Measurement Yang Chen CS 8803.
CISCO NETWORKING ACADEMY Chabot College ELEC ping & traceroute.
1 ICMP – Using Ping and Trace CCNA Semester
NET-REPLAY: A NEW NETWORK PRIMITIVE Ashok Anand Aditya Akella University of Wisconsin, Madison.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Problem Statement Map of OSU Routers Gopi Krishna Tummala Rupam Kundu Graduate Students The Ohio State University.
Measuring ISP Toplogies with Rocketfuel Neil Spring, Ratul Mahajan, and David Wetherall Presented By: David Deschenes March 25, 2003.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Control Message Protocol (ICMP) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
Monitoring for network security and management Cyber Solutions Inc.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
Advanced Networking Lab. Given two IP addresses, the estimation algorithm for the path and latency between them is as follows: Step 1: Map IP addresses.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
N. Hu (CMU)L. Li (Bell labs) Z. M. Mao. (U. Michigan) P. Steenkiste (CMU) J. Wang (AT&T) Infocom 2005 Presented By Mohammad Malli PhD student seminar Planete.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
정하경 MMLAB Fundamentals of Internet Measurement: a Tutorial Nevil Brownlee, Chris Lossley, “Fundamentals of Internet Measurement: a Tutorial,” CMG journal.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
Péter Hága Eötvös Loránd University, Hungary European Conference on Complex Systems 2008 Jerusalem, Israel.
A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance Feng Wang 1, Zhuoqing Morley Mao 2 Jia Wang 3, Lixin Gao 1,
Network Virtualization Sandip Chakraborty. In routing table we keep both the next hop IP (gateway) as well as the default interface. Why do we require.
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
November 10, 2010IETF 79 – Beijing, China A method for IP multicast performance monitoring draft-cociglio-mboned-multicast-pm-01 Alessandro Capello Luca.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
COMP2322 Lab 5 IP Steven Lee March 18, IP Internet Protocol Network layer protocol 3.
March 22, 2010IETF 77 – Anaheim, USA1 A method for IP multicast performance monitoring draft-cociglio-mboned-multicast-pm-00 Alessandro Capello Luca Castaldelli.
Lecture#6:Connectivity Verification
Traceroute traceroute is a Unix utility designed by Van Jacobson in 1987 The Windows equivalent is called tracert The Linux equivalent is called tracepath.
Connectivity Verification
COMP2322 Lab 5 IP Steven Lee March 22, 2017.
Network Tools and Utilities
8 Network Layer Part V Computer Networks Tutun Juhana
ICMP – Using Ping and Trace
Lecture#7:Connectivity Verification
Introduction to Networking
RESOLVING IP ALIASES USING DISTRIBUTED SYSTEMS
ICMP – Using Ping and Trace
Measured Impact of Crooked Traceroute
Lecture#6:Connectivity Verification
Presentation transcript:

User-level Internet Path Diagnosis Ratul Mahajan, Neil Spring, David Wetherall and Thomas Anderson Designed by Yao Zhao

A distributed system is one in which the failure of a computer you didn’t even know existed can render your own computer unusable. L. Lamport

Motivation Can end users, with no special privileges identify and pinpoint faults inside the network that degrade the performance of their applications? Why (unprivileged) end users? Operators do not share the users ’ view of the network Operators may have no more insight than unprivileged users for problems inside other administrative domains user can directly contact the responsible ISP leading to faster problem resolution Many techniques are more effective and scalable with fault localization than blindly trying all possibilities

Outline Diagnosis architecture Diagnosis Tool: Tulip Evaluation Recommendations Conclusion

Problem

An Ideal Trace-based Solution Routers log packet activity and make these traces available to users. The log at each router is recorded for both input and output interfaces. impractical for deployment

Packet-based Solutions Complete Embedding Each router along the path records information into each packet that it forwards. Barring two exceptions, the scheme above is equivalent to the path trace. Reduced Embedding Remove the step of embedding the complete input packet in the output packet Constant Space Embedding Sample TTL Real Clocks Unsynchronized clock Finite precision

New Fields of Packet Header in the Architecture

Outline Diagnosis architecture Diagnosis Tool: Tulip Evaluation Recommendations Conclusion

Internet Approximations Out-of-band measurement probes ICMP timestamp requests to access time at the router IP identifiers instead of per-flow counters

Packet Reordering

Assumptions for Packet Loss IP-IDs are consecutive 80% of the time from over 90% of the routers Small size packets usually have low loss rate In over 60% of the cases when any packet in the triplet was lost, only the data packet was lost. ICMP rate-limiting will not be mistaken as packet loss 1 more check packet

Packet Loss

Packet Queuing Similar to cing Two practical problems: ICMP generation time Cable modems and wireless links

Tulip Network Load BL/W Diagnosis time 10 ~ 30 min per path Parallel search vs Binary search Two or more faults?

Outline Diagnosis architecture Diagnosis Tool: Tulip Evaluation Recommendations Conclusion

Methodology Evaluate applicability Diagnosis granularity Three sources: MIT, U Washington and London Destinations from Skitter Validation

Diagnosis granularity (1)

Diagnosis granularity (2)

Validation IP-IDs and ICMP timestamp vs End-to- end measurement Tulip vs Sting Consistency of Tulip ’ s inferences Consistency between Tulip and Paths

Two facts Locating Loss and Delay in the Internet Persistence of Faults

Outline Diagnosis architecture Diagnosis Tool: Tulip Evaluation Recommendations Conclusion

Limitations of Tulip Out-of-band measurements Stable routing path IP-ID counters Limitations of ICMP timestamps

In-band vs Out-of-band Diagnosis Priority of protocols Packet drop Packet size Loss rate Reordering

Other Recommendations Path Verification IP Identifiers Router Timestamps

Related Works Diagnosis Approaches Magpie SPIE NetFlow Measurement Primitives Overlay primitives IPMP Measurement Tools PING, Traceroute, pathchar, Sting

Conclusion Tulip Practical tool to diagnose packet reordering, loss and queuing Diagnosis architecture In-band Lightweight

Questions?