The Internet’s Dynamic Geography Scott Kirkpatrick, School of Engineering, Hebrew University of Jerusalem and EVERGROW Collaborators (thanks, not blame…)

Slides:



Advertisements
Similar presentations
University of Nevada, Reno Router-level Internet Topology Mapping CS790 Presentation Modified from Dr. Gunes slides by Talha OZ.
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
The Connectivity and Fault-Tolerance of the Internet Topology
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
Measuring the Internet in real time. Scott Kirkpatrick, Systems Group (HUJI), and EVERGROW partners: DIMES (TAU) and ETOMIC (Budapest, Navarra)
Jellyfish, and other Interesting creatures Of the Internet Scott Kirkpatrick, Hebrew University with Avishalom Shalit, Sorin Solomon, Shai Carmi, Eran.
Routing So how does the network layer do its business?
Analysis of BGP Routing Tables
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
The Internet as a computing surface Avogadro-scale Computing MIT, April 17, 2008 Scott Kirkpatrick Hebrew University of Jerusalem and CBA, MIT.
CS335 Networking & Network Administration Tuesday, May 18, 2010.
Measurement in the Internet. Outline Internet topology Bandwidth estimation Tomography Workload characterization Routing dynamics.
Near-Deterministic Inference of AS Relationships Udi Weinsberg A thesis submitted toward the degree of Master of Science in Electrical and Electronic Engineering.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
The structure of the Internet. The Internet as a graph Remember: the Internet is a collection of networks called autonomous systems (ASs) The Internet.
The Internet’s Physical Topology (or, Will the Internet ever measure itself?)‏ Scott Kirkpatrick, School of Engineering, Hebrew University of Jerusalem.
Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.
Measuring ISP topologies with Rocketfuel Ratul Mahajan Neil Spring David Wetherall University of Washington ACM SIGCOMM 2002.
Ping and traceroute Lab/Homework exercise Assigned 9/12/2006 Due 9/19/2006 CSIT 220 Fall, 2006 Based on T. Blum Exercises.
INTERNET TOPOLOGY MAPPING INTERNET MAPPING PROBING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
Measuring and Analyzing Networks Scott Kirkpatrick Hebrew University of Jerusalem April 12, 2011.
Open Shortest Path First (OSPF) -Sheela Anand -Kalyani Ravi -Saroja Gadde.
1 CS 4396 Computer Networks Lab Dynamic Routing Protocols - II OSPF.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Traceroute-like exploration of unknown networks: a statistical analysis A. Barrat, LPT, Université Paris-Sud, France I. Alvarez-Hamelin (LPT, France) L.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Routing/Routed Protocols. Remember: A Routed Protocol – defines logical addressing. Most notable example on the test – IP A Routing Protocol – fills the.
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato Optimising Path Discovery Doubletree.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Issues with Inferring Internet Topological Attributes Lisa Amini ab, Anees Shaikh a, Henning Schulzrinne b a IBM T.J. Watson Research Center b Columbia.
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Routing and Routing Protocols
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
1 Version 3.1 Module 6 Routed & Routing Protocols.
An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many.
Dynamic Routing Protocols II OSPF
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 3 Rutgers University Internet Institute Instructor: Chris Uriarte.
Jellyfish, and other Interesting creatures Of the Internet Scott Kirkpatrick, Hebrew University with Avishalom Shalit, Sorin Solomon, Shai Carmi, Eran.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
Inter-domain Routing Outline Border Gateway Protocol.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Response network emerging from simple perturbation Seung-Woo Son Complex System and Statistical Physics Lab., Dept. Physics, KAIST, Daejeon , Korea.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
Interaction and Animation on Geolocalization Based Network Topology by Engin Arslan.
Dynamic Routing Protocols II OSPF
Improved Algorithms for Network Topology Discovery
Routing and Routing Protocols: Routing Static
ICMP ICMP – Internet Control Message Protocol
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing.
Routing and Routing Protocols: Routing Static
Measured Impact of Crooked Traceroute
Dynamic Routing Protocols II OSPF
Routers Routing algorithms
Lecture 26: Internet Topology CS 765: Complex Networks.
Visualization of Temporal Difference of BGP Routing Information
Routing.
Presentation transcript:

The Internet’s Dynamic Geography Scott Kirkpatrick, School of Engineering, Hebrew University of Jerusalem and EVERGROW Collaborators (thanks, not blame…) Yuval Shavitt, Eran Shir, Shai Carmi, Shlomo Havlin, Avishalom Shalit Bremen, June 11-12, 2007

Measuring and monitoring the Internet Has undergone a revolution Traceroute – an old hack  basic tool in wide use Active monitors – hardware intensive  distributed software DIMES an example, not the only one now Many enhancements under consideration, as the problems in traceroute become very evident Ultimately, we expect every router (or what they become in the future internet) will participate in distributed active monitoring. The payoff comes with interactive and distributed services that can achieve greater performance at greatly decreased overhead

History of TraceRoute active measurement Jacobson, “traceroute” from LBL, February 1989 Commonly uses ICMP echo or UDP Variants exist – tcptraceroute, NANOG, “Paris traceroute” And this is something that can be rewritten for special situations, such as cellphones Single machine traces to many destinations – Lucent, 1990s (Burch and Cheswick) Great pictures, but interpretation not clear, demonstrate need for more analytic visualization techniques But excellent for magazine covers, t-shirts… First attempt to determine the time evolution of the Internet First experience in operating under the “network radar” Lumeta, their spinoff, ended up as a network radar supplier.

IP address map of August 1998

IP address map of Jan 1999

IP address map of June 1999

Map interpreted: color by ISPs

History of Internet Measurement, ctd. Skitter and subsequent projects at CAIDA (SDSC) machines (typically <25), at academic sites around world RIPE and NLANR, machines, commercial networks and telco backbones, information is proprietary DIMES (>10,000 software agents) represents the next step A complementary approach is available at the coarser level of ISPs (actually “autonomous systems” or ASes) RouteViews (Univ. of Oregon) since 2001 has monitored BGP preferred routes broadcast from a healthy sampling of ASes’ border routers.

Traceroute is more than a piece of string A flood of feigned suicide packets (with TTL values t=1 to about 30 hops), each sent more than one time. Ideal situation, each packet dies at step t, router returns echo message, “so sorry, your packet died at ip address I, time T” Non ideal situations must be filtered to avoid data corruption: Errors – router inserts destination address for I Non-response is common Multiple interfaces for a single (complex) router Route flaps, load balancing create false links Route instabilities can be reduced with careful header management (requires guessing router tricks)

The Internet is more than a random graph Internet is a federation of subnetworks (ASs or ISPs) It has at least a two-level structure (AS, ip-level) because two different routing strategies and software are used to direct packets. Other coarse grain views – country, city, POP… There are no global databases, many local databases, poor data quality available. Models have evolved steadily Waxman (Random graph with Poisson distribution of ngbrs) “Transit-stub” model with two-level hierarchy Power law pictures, such as preferential attachment, reordering Jellyfish and Medusa

What is the quality of today’s measurements? Bias issues – does a superposition of shortest-path trees converge to the actual underlying graph? Concerns about diminishing returns? Filters needed to screen as many false links as possible. Once you have a flood of data, need to address two issues: Has it converged to cover the real graph? Betweenness and visit count help address this How stable are the measurements over time? And finally, how does traceroute discovery compare with online tables of AS-disclosed information (BGP tables)?

What do we see with DIMES? New graphical analysis methods reveal considerable structure, apparently related to function. Yes, Virginia, there are power laws! But the initial conditions and some of the patterns of growth reflect distinct roles of subnetworks as well as growth dynamics, and economic incentives. The Internet is a moving target, and we are observing it through a very shaky telescope. How should we characterize its evanescent behavior? How to integrate to see the fainter stars? Discussions of bias and “diminishing returns” may be addressing the wrong hypotheses.

Use a new analytical tool – k-pruning Prune by grouping sites in “shells” with a common connectivity further into the Internet: All sites with connectivity 1 are removed (recursively) and placed in the “1-shell,” leaving a “2- core” then 2-shell, 3-core and so forth. The union of shells 1-k is called the “k-crust” At some point, kmax, pruning runs to completion. Identify nucleus as kmax-core This is a natural, robust definition, and should apply to other large networks of interest in economics and biology. Cluster analysis finds interesting structure in the k-crusts

Does degree of site relate to k-shell?

Numbers of site-distinct paths in the nucleus Conclusion: innermost k-cores are k-connected. But outer k- cores (2,3,4) show exceptions (sites with 1,2,3 paths). kmax (03-06) = 41 kmax (05-06) = 39

Distances and Diameters in cores

Distances and Diameters

K-crusts show percolation threshold Data from  These are the hanging tentacles of our (Red Sea) Jellyfish For subsequent analysis, we distinguish three components: Core, Connected, Isolated Largest cluster in each shell

Michalis Faloutsos ’ Jellyfish Highly connected nodes form the core Each Shell: adjacent nodes of previous shell, except 1- degree nodes Importance decreases as we move away from core 1-degree nodes hanging The denser the 1-degree node population the longer the stem Core Shells 1 2 3

Meduza ( מדוזה ) model This picture has been stable from January 2005 (kmax = 30) to present day, with little change in the nucleus composition. The precise definition of the tendrils: those sites and clusters isolated from the largest cluster in all the crusts – they connect only through the core.

Non-communication Networks

Communication networks

Who’s “tier-1” in Medusa? Data from months 10-12, 2005 kmax = 42, 93 nodes All fall within CAIDA’s top 200 ASes, measured by size of “customer input cone.”

What about the error bars, the bias, etc.? Need to address the specifics of the “network discoveries” How frequently observed? How sensitive are the observations to the number of observers? How do the measurements depend on the time of observation? The extensive literature on the subject is mostly straw-man counterexamples, that show bias from this class of observation can be serious, in graphs of known structure, but do not address how to estimate structure from actual measurements.

Lecture 2 Efforts to model the Internet Waxman (Poisson statistics, single scale) Zegura and co-workers (GaTech) two scales “Transit” and “stub” Preferential attachment Shalit et al (2001) showed exponent in (2,3) possible, and k- shells also give simple power laws Counterattack of the establishment Luddites?

The Empire Strikes Back!

Willinger et al. analysis of models Is a particular model “descriptive” or “explanatory”? Descriptive models are “evocative “data-driven” But too generic in nature Explanatory models are Structural Can close the loop by validating the explanatory steps with real data “Demystify emergent phenomena”

So models  excerpts of actual measurements Power laws occur in the k-shells as well as in degree distrib: But the k-cores are not scale invariant!

Where is a pure “emergent phenomenon” happening? Box cover construction shows true fractal only as the shells percolate

Back to the actual data Visit count and betweenness Best evidence for reliability of data How much better will it get with 100,000 agents observing? Can’t ask the question. But can ask, how much worse will it be with fewer. Three approaches in prospect. All future work. Study betweenness of present graph with reduced traffic model Reanalyze our raw data with fewer agents included Run retrospective experiments with agents selected specially

What sort of coverage is obtained?

Agents from entire two years participate

Weekly coverage and agent utilization

Time dependences – even RouteViews’ BGP speakers vary Study 6 weeks in 2006 (June, July) 50,245 to 51,309 edges found per week In wk 26, 48,221 edges seen all week 335 edges seen for 6 days 192 edges seen only 5 days 294 edges seen only 4 days 354 edges seen only 3 days 260 edges seen only 2 days 175 edges seen only 1 day 451 edges seen only one time. Single observations peak on Sunday (149 edges, other days typically ~40) Edges seen 3 or more days peak at ends of the week Twice as many edges are created on Monday as are deleted on Sunday…

Random scale-free graphs produce the same basic structure, different details

Percolation “ attacks ” K-core based attack (“by reputation”) is comparable to accurate degree-based attack for random networks, but not for the real AS graph.

Preliminary reachability data (using whole graph) Sites reachable

Now restrict to the 20-crust Up then downSide step at topThree sidesteps