The Internet’s Physical Topology (or, Will the Internet ever measure itself?)‏ Scott Kirkpatrick, School of Engineering, Hebrew University of Jerusalem.

Slides:



Advertisements
Similar presentations
University of Nevada, Reno Router-level Internet Topology Mapping CS790 Presentation Modified from Dr. Gunes slides by Talha OZ.
Advertisements

Communication Networks Recitation 3 Bridges & Spanning trees.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 22 Omar Meqdadi Department of Computer Science and Software Engineering University.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
Structure of the Internet Update for 1 st H/Wk We will start lab next week Paper presentation at the end of the session Next Class MPLS.
The Internet’s Dynamic Geography Scott Kirkpatrick, School of Engineering, Hebrew University of Jerusalem and EVERGROW Collaborators (thanks, not blame…)
Jellyfish, and other Interesting creatures Of the Internet Scott Kirkpatrick, Hebrew University with Avishalom Shalit, Sorin Solomon, Shai Carmi, Eran.
The Internet as a computing surface Avogadro-scale Computing MIT, April 17, 2008 Scott Kirkpatrick Hebrew University of Jerusalem and CBA, MIT.
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Measurement in the Internet. Outline Internet topology Bandwidth estimation Tomography Workload characterization Routing dynamics.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
14 – Inter/Intra-AS Routing
EECC694 - Shaaban #1 lec #7 Spring The OSI Reference Model Network Layer.
Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
MPLS Evan Roggenkamp. Introduction Multiprotocol Label Switching High-performance Found in telecommunications networks Directs data from one network node.
Delivery, Forwarding and
INTERNET TOPOLOGY MAPPING INTERNET MAPPING PROBING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University.
Measuring and Analyzing Networks Scott Kirkpatrick Hebrew University of Jerusalem April 12, 2011.
Chapter 8 Routing. Introduction Look at: –Routing Basics (8.1) –Address Resolution (8.2) –Routing Protocols (8.3) –Administrative Classification (8.4)
1 CS 4396 Computer Networks Lab Dynamic Routing Protocols - II OSPF.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Interior Gateway Protocol. Introduction An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with.
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
Page 110/27/2015 A router ‘knows’ only of networks attached to it directly – unless you configure a static route or use routing protocols Routing protocols.
1 Module 4: Implementing OSPF. 2 Lessons OSPF OSPF Areas and Hierarchical Routing OSPF Operation OSPF Routing Tables Designing an OSPF Network.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Dynamic Routing Protocols II OSPF
4: Network Layer4b-1 OSPF (Open Shortest Path First) r “open”: publicly available r Uses Link State algorithm m LS packet dissemination m Topology map.
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
Transport Layer3-1 Network Layer Every man dies. Not every man really lives.
Jellyfish, and other Interesting creatures Of the Internet Scott Kirkpatrick, Hebrew University with Avishalom Shalit, Sorin Solomon, Shai Carmi, Eran.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Cisco 2 - Routers Perrine modified by Brierley Page 13/21/2016 Chapter 4 Module 6 Routing & Routing Protocols.
Multi-protocol Label Switching
Redundancy. Single point of failure Hierarchical design produces many single points of failure Redundancy provides alternate paths, but may undermine.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
Dynamic Routing Protocols II OSPF
Improved Algorithms for Network Topology Discovery
Routing and Routing Protocols: Routing Static
ICMP ICMP – Internet Control Message Protocol
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
CS4470 Computer Networking Protocols
CHAPTER 3 Architectures for Distributed Systems
CCNA 2 v3.1 Module 6 Routing and Routing Protocols
RESOLVING IP ALIASES USING DISTRIBUTED SYSTEMS
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing and Routing Protocols: Routing Static
Dynamic Routing Protocols II OSPF
COS 561: Advanced Computer Networks
Lecture 26: Internet Topology CS 765: Complex Networks.
Routing and the Network Layer (ref: Interconnections by Perlman
Presentation transcript:

The Internet’s Physical Topology (or, Will the Internet ever measure itself?)‏ Scott Kirkpatrick, School of Engineering, Hebrew University of Jerusalem EVERGROW and OneLab2 Collaborators (thanks, not blame…)‏ Yuval Shavitt, Eran Shir, Udi Weinsberg, Shai Carmi, Shlomo Havlin, Avishalom Shalit, Daqing Li

The Internet is our most distributed work of Engineering Federated initially from military and commercial networks, some of which involved highly proprietary and gratuitously different platforms. – Arpanet, DECnet, PC-based systems, IBM’s SNA, BitNet, Euronet… – As a result, there are two distinct layers: BGP and above (inter-AS), and intra-AS (OSPF shortest path, MPLS, ATM, …)‏ – BGP information is exchanged by sharing recommended routes, exposing only those for which an AS will be properly compensated. Engineering the Internet has always been distributed using a formal model, IETF RFP’s etc. similar to international standards formation, yet with less commercial involvement than typical ISO practice, and a US center-of-gravity for the deliberations. Layering of communications protocols has permitted high degree of refinement, but now seems in stasis. There are no global databases, many local databases, poor data quality.

Measuring and monitoring the Internet Has undergone a revolution Traceroute – an old hack  basic tool in wide use Active monitors – hardware intensive  distributed software DIMES an example, not the only one now Many enhancements under consideration, as the problems in traceroute become very evident Ultimately, we expect every router (or what they become in the future internet) will participate in distributed active monitoring. The payoff comes with interactive and distributed services that can achieve greater performance at greatly decreased overhead

History of TraceRoute active measurement Jacobson, “traceroute” from LBL, February 1989 And this is something that can be rewritten for special situations, such as cellphones Single machine traces to many destinations – Lucent, 1990s (Burch and Cheswick)‏ Great pictures, but interpretation not clear, demonstrate need for more analytic visualization techniques But excellent for magazine covers, t-shirts… First attempt to determine the time evolution of the Internet First experience in operating under the “network radar”

History of Internet Measurement, ctd. Skitter and subsequent projects at CAIDA (SDSC)‏ machines (typically <25), at academic sites around world RIPE and NLANR, machines, commercial networks and telco backbones, information is proprietary DIMES (>10,000 software agents) represents the next step Current statistics: 8298 users 19,597 agents registered (in 115 countries)‏ Have seen 29,404 Ases and 204,204 AS-AS links 6.6 B measurements saved since 9/2004

DIMES data available for general use Monthly data files currently available from 1/2007 Weekly data files available by web request from 9/2004 Data sets AS nodes AS edges Routers City Edges POPs (tested, but not released yet)

DIMES documentation File entries are explained, otherwise, caveat emptor:

Monthly DIMES data set sizes…

Monthly DIMES city count

Are evidence of weeks in which data is not trustworthy.

Traceroute is more than a piece of string A flood of feigned suicide packets (with TTL values t=1 to about 30 hops), each sent more than one time. Ideal situation, each packet dies at step t, router returns echo message, “so sorry, your packet died at ip address I, time T” Non ideal situations must be filtered to avoid data corruption: Errors – router inserts destination address for I Non-response is common Multiple interfaces for a single (complex) router Route flaps, load balancing create false links Route instabilities can be reduced with careful header management (requires guessing router tricks)‏ Resulting links must be resolved – to Ases, to routers, to POPs

Models of the Internet are highly contentious Practitioner preferences – start with points in 2D Impose physical constraints of actual routers Finite number of connections Low connectivity/high bandwidth (core) High connectivity/low bandwidth (edge) Introduce randomness through distance-dependent probability of interconnection Reorganize net locally in ways thought to reflect engineering practice Ignore existence of extended entities (large Ases) Results in strong resistance to scale-free models

Use a new analytical tool – k-pruning Prune by grouping sites in “shells” with a common connectivity further into the Internet: All sites with connectivity 1 are removed (recursively) and placed in the “1-shell,” leaving a “2- core” then removing 2-shell leaves 3-core, and so forth. The union of shells 1- k is called the “k-crust” At some point, kmax, pruning runs to completion. Identify nucleus as kmax-core This is a natural, robust definition, and should apply to other large networks of interest in economics and biology. Cluster analysis finds interesting structure in the k-crusts

Does degree of site relate to k-shell?

Distances and Diameters in cores

Distances and Diameters

K-crusts show percolation threshold Data from  These are the hanging tentacles of our (Red Sea)‏ Jellyfish For subsequent analysis, we distinguish three components: Core, Connected, Isolated Largest cluster in each shell

Meduza ( מדוזה ) model This picture has been stable from January 2005 (kmax = 30) to present day, with little change in the nucleus composition. The precise definition of the tendrils: those sites and clusters isolated from the largest cluster in all the crusts – they connect only through the core.

Communication networks

Social Networks

What about the error bars, the bias, etc.? Need to address the specifics of the “network discoveries” How frequently observed? How sensitive are the observations to the number of observers? How do the measurements depend on the time of observation? The extensive literature on the subject is mostly straw-man counterexamples, that show bias from this class of observation can be serious, in graphs of known structure, but do not address how to estimate structure from actual measurements.

Filtering the masses of data Current efforts (me, Weinsberg, Carmi) are studying how the Meduza model and other observations are affected by removal of the less-reliable data: Infrequently seen links Less than three days presence in a week Some things seen only once Stuff seen by rogue agents Is it intentional? Probably not. So far all the basic observations are proving robust.

What sort of coverage is obtained?

Agents from entire period participate

Discovery process continues for several weeks

How does the city data differ from the AS-graph information? Cities are local, ASes may be highly extended (ATT, Level 3, Global Xing, Google) About 4000 cities identified, cf. 25,000 ASes But similar features are seen Wide spread of small-k shells Distinct nucleus with high path redundancy Many central sites participate with nucleus A less strong Medusa structure

K-shell size distribution

Average distance and diameter of k-cores

City locations permit mapping the physical internet

Is BGP routing wasting capacity? Peer-connected component (PCC) capable of long ranged communications as well as local We've used “betweenness” to test alternate routings which ignore “Tier One” links. Betweenness is essentially a traffic model. Each node in a set sends one packet to each other node in the set. (Example, all 1 and 2 shell nodes)‏ Compare maximum betweenness with and without the nucleus ASes.

Naïve re-routing succeeds in smoothing distribution:

But naïve re-routing overloads the rest of the network:

Conclusions – will the Internet use this information? Undisclosed transverse capacity in peering links can provide a global backup or reserve Unless business relationships evolve, it is not adequate to also carry long-distance traffic One hop (in AS-graph) of extra disclosure will probably suffice to make this viable for regional traffic.