Measuring Packet Reordering NETREAD UC Berkeley George Porter Oct 4, 2002.

Slides:



Advertisements
Similar presentations
7. 7 Chapter 13 Transmission Control Protocol (TCP) Retransmission and Time-Out.
Advertisements

 Implementation of physical and data link layer in software  Real-time access to network stack  Real-time traffic monitoring  Fine-grained control.
CCNA – Network Fundamentals
Error control Simplest: Cyclic Redundancy Checks - CRC Detects  all single bit errors  almost all 2-bit errors  any odd number of errors  all bursts.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
TCP for today’s Web. Connections today Web-page > 300KB but objects are small 7.5KB -2.4KB [25] lots of small objects in a page. Implication: TCP Handshake.
Chapter 7 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain the need for the transport layer.  Identify.
NMAP Scanning Options. EC-Council NMAP  Nmap is the most popular scanning tool used on the Internet.  Cretead by Fyodar ( it.
Congestion Control Created by M Bateman, A Ruddle & C Allison As part of the TCP View project.
Detecting Forged TCP Reset Packets Authors: Nicholas Weaver, Robin Sommer, Vern Paxon Presented by: Anuj Kalia, Shashank Gupta.
Statistical Analysis of Malformed Packets and Their Origins in the Modern Internet NETREAD UC Berkeley George Porter Oct 4, 2002.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #11 TCP Eiffel (RFC 3522)
1 Internet Networking Spring 2006 Tutorial 10 The Eifel Detection Algorithm for TCP RFC 3522.
UCB TCP Jean Walrand U.C. Berkeley
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
1 Transport Layer Computer Networks. 2 Where are we?
CIS 725 Wireless networks. Low bandwidth High error rates.
11 September 2015 RE Meyers, Ms.Ed. CCENT ICND1 Exam Topics Review Describe the Operation of Data Networks: Network Diagrams and Data Paths.
1 Network Packet Generator Midway presentation Supervisor: Mony Orbach Presenting: Eugeney Ryzhyk, Igor Brevdo.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
Adaptive Failover Mechanism Motivation End-to-end connectivity can suffer during net failures Internet path outage detection and recovery is slow (shown.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 2. Network Monitoring Metrics.
Network Services Networking for Home & Small Business.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Voice Over Internet Protocol (VoIP). Basic Components of a Telephony Network.
Data Transmission Over Wireless Links Fan Yang
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
CS551: End-to-End Packet Dynamics Paxon’99 Christos Papadopoulos (
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
MultiPath TCP Proxy Presented by: Yongzhi Zhuang, Wei Zeng, Jianlei Zhang.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
TCP Behavior Inference Tool Jitendra Padhye, Sally Floyd Presented by Songjie Wei.
1 Evaluating NGI performance Matt Mathis
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
Protocol Layering Chapter 11.
TCP Congestion Control 컴퓨터공학과 인공지능 연구실 서 영우. TCP congestion control2 Contents 1. Introduction 2. Slow-start 3. Congestion avoidance 4. Fast retransmit.
Transport Protocols.
Development of a QoE Model Himadeepa Karlapudi 03/07/03.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
IP Configuration API. Network Interface Configuration NAIfconfigIsDeviceUp() NAIfconfigDeviceFromInterface() NAIfconfigBringDeviceUp() NAIfconfigSetIpAddress()
Fall 2004FSU CIS 5930 Internet Protocols1 TCP – Data Exchange Reading: Section 24.4.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Uni Innsbruck Informatik th IETF, PMTUD WG: Path MTU Discovery Using Options draft-welzl-pmtud-options-01.txt Michael Welzl
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
MPTCP Proxy MPTCP Client MPTCP Proxy Server.
Ch 3. Transport Layer Myungchul Kim
BASICS Gabriella Paolini (GARR) 27/05/11 - ICCU Roma 1 How INTERNET works !
TCP over Wireless PROF. MICHAEL TSAI 2016/6/3. TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum.
An Introduction To ARP Spoofing & Other Attacks
Introduction to TCP/IP networking
Satellite TCP Lecture 19 04/10/02.
Domain 4 – Communication and Network Security
Magda El Zarki Professor, ICS UC, Irvine
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
Chapter 5 The Network Layer.
Precept 2: TCP Congestion Control Review
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
IPv6: Are we really ready to turn off IPv4?
Lecture 2: Overview of TCP/IP protocol
Lecture 3: Secure Network Architecture
Chapter 5 Transport Layer Introduction
CS4470 Computer Networking Protocols
Communication Networks: Technology & Protocols
Chapter 5 Transport Layer Introduction
Presentation transcript:

Measuring Packet Reordering NETREAD UC Berkeley George Porter Oct 4, 2002

Motivation Reordering needs to be understood –Mismatch between best-effort guarantee of IP and assumptions made by TCP –Fast retransmit –VoIP apparently not designed to handle reorder, only jitter –Non idempotent protocols (should those exist?)

Single connection test

Requires 2 samples –Packet loss causes problems –Delayed acks To solve delayed ack issue, reverse the order. But now you can’t tell forward from reverse path reorder d2 a1 d1 a3d3 a4 d2 a1 d3 a1 d1 a4 d2 a1 d1 a3 d3 a4 d2 a1 d3 a1 d1 a4 No reorder forward reverse both

Dual connection test The two connections allow associating acks with data Packets are acked in order they are received Can test if diff between IPIDs of acks is consistent with order in which data packets were sent [example on board]

Problems with dual test Relies on strictly increasing IPID values (MTU discovery in Linux prevents that) Load balancers cause problems (separate hosts on the back end) SYN trick to work around that –Convince load balancers to hash 4-tuple to same host RST, ACK are used to determine reorder SYN attack may be inferred

TCP Data transfer test Only can detect reorder on the reverse path Requires software on the end host Not good for testing some web hosts, since you need lots of packets to make these observations, and web traffic might fit into one packet

Test environment 99.99% success rate on closed environment Internet wide: –40% of paths had some reordering –They use confidence intervals and null hypotheses, etc… –Data transfer method may catch only half the reorders