Theoretical Bounds on Control- Plane Self Monitoring in Routing Protocols Raj Kumar Rajendran Vishal Misra Dan Rubenstein.

Slides:



Advertisements
Similar presentations
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Advertisements

October 31, Algorithms and Data Structures Lecture XIII Simonas Šaltenis Nykredit Center for Database Research Aalborg University
The Connectivity and Fault-Tolerance of the Internet Topology
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
Courtesy: Nick McKeown, Stanford
A. Haeberlen Having your Cake and Eating it too: Routing Security with Privacy Protections 1 HotNets-X (November 15, 2011) Alexander Gurney * Andreas Haeberlen.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
13 –Routing Protocols Network Layer4-1. Network Layer4-2 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd.
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
Distance-Vector and Path-Vector Routing Sections , 4.3.2, COS 461: Computer Networks Spring 2011 Mike Freedman
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Tirgul 10 Rehearsal about Universal Hashing Solving two problems from theoretical exercises: –T2 q. 1 –T3 q. 2.
Control Plane Resilience: The Method of Strong Detectio n Raj Kumar Vishal Misra Dan Rubenstein Allerton, 9/28/06.
Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer The service should be independent of the router.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Theoretical Bounds on Control Plane Monitoring in Routing Protocols Dan Rubenstein Joint work with Raj Kumar, Vishal Misra.
Strong Detection of Misconfigurations Raj Kumar Rajendran Vishal Misra Dan Rubenstein.
Toward Optimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, Dan Rubenstein Distributed Network Analysis (DNA) Lab.
Doubling Dimension in Real-World Graphs Melitta Lorraine Geistdoerfer Andersen.
EE 122: Intra-domain routing Ion Stoica September 30, 2002 (* this presentation is based on the on-line slides of J. Kurose & K. Rose)
Distributed Asynchronous Bellman-Ford Algorithm
Internet Traffic Engineering by Optimizing OSPF Weights Bernard Fortz (Universit é Libre de Bruxelles) Mikkel Thorup (AT&T Labs-Research) Presented by.
Link-state routing  each node knows network topology and cost of each link  quasi-centralized: each router periodically broadcasts costs of attached.
CS 5565 Network Architecture and Protocols Godmar Back Lecture 22.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
Reducing Transient Disconnectivity using Anomaly-Cognizant Forwarding Andrey Ermolinskiy, Scott Shenker University of California – Berkeley and ICSI.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
13 – Routing Algorithms Network Layer.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
The Network Layer & Routing
1 Week 5 Lecture 2 IP Layer. 2 Network layer functions transport packet from sending to receiving hosts transport packet from sending to receiving hosts.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Internet Routing r Routing algorithms m Link state m Distance Vector m Hierarchical routing r Routing protocols m RIP m OSPF m BGP.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Graph Algorithms Why graph algorithms ? It is not a “graph theory” course! Many problems in networks can be modeled as graph problems. Note that -The topology.
Distributed, Self-stabilizing Placement of Replicated Resources in Emerging Networks Bong-Jun Ko, Dan Rubenstein Presented by Jason Waddle.
Distance Vector Routing
#1 Make sense of problems and persevere in solving them How would you describe the problem in your own words? How would you describe what you are trying.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Network Layer.
The network layer: routing
CS 5565 Network Architecture and Protocols
Algorithms for Big Data: Streaming and Sublinear Time Algorithms
Chapter 7 Dynamic Routing
Routing Jennifer Rexford.
Shortest Paths and Minimum Spanning Trees
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
Routing in Packet Networks Shortest Path Routing
Road Map I. Introduction II. IP Protocols III. Transport Layer
Lecture 10 Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CS3516: These slides are generated from.
CS 4700 / CS 5700 Network Fundamentals
Instructor: Shengyu Zhang
Chapter 6 Dynamic Programming
CS 3700 Networks and Distributed Systems
COS 561: Advanced Computer Networks
Chapter 6 Dynamic Programming
Chapter 6 Dynamic Programming
CS 3700 Networks and Distributed Systems
Communication Networks
COS 461: Computer Networks
Network Layer (contd.) Routing
Network Layer.
Presentation transcript:

Theoretical Bounds on Control- Plane Self Monitoring in Routing Protocols Raj Kumar Rajendran Vishal Misra Dan Rubenstein

How do Routing Protocols behave when Errors are present? Routing Protocols are fairly well understood, e.g., –Link State: reacts quickly to connectivity changes, scales well, small packets –Distance Vector (a.k.a. Bellman-Ford): simple, efficient, converges-quickly –BGP (Path-Vector): some problems in convergence when routes change, significant literature for evaluating and understanding Critical Assumption for correctness: Nodes follow the proper protocol procedure Q: What happens when some nodes don’t follow the protocol (maliciously or by error)?

Nodes do make errors The infamous BGP AS 7007 Incident: AS #7007’s Distance …… … Normal Operation paths to 8765

And can be highly disruptive The infamous BGP AS 7007 Incident: AS #7007’s Distance …… … Abnormal Operation paths to 8765

What can we do to detect such errors and prevent disruption? Traditional approach –Modify the protocol to add additional checks May not be practical due to large installed base Not clear what checks we should add Alternative approach –Clues that something is amiss may already exist –We are just not using it Does the information given to me by my neighbors make sense? Our Solution –Protocols have an inherent capacity for self-monitoring –Harness this capacity!

What can be detected without changing the protocol? Node has some information it uses for routing Dest/ Neighbor ABE A0812 B107 C7138 D596 E960 F G492 In the process of executing the protocol each node receives additional information. This is its state State can be thought of as the node’s view of the network –Eg. Distance Vector (Bellman Ford) A node can inspect its state for inconsistencies that indicate errors A B E C G F D DestDistNext Hop C7A D5A F12A G2E E.g. Distance Vector Route Information State

Inspecting one’s State for errors Q: How can a good node inspect its state for indications of errors by other nodes? –What should the node “look for”? –If an inspection is being carried out, is the node detecting everything that it can? –Note: there are (classes of) errors that are undetectable, no matter what the node does. NXY 11 D(X,Y) = 3 NXY 13 An undetectable misconfig at node N:

Prior Work: “Weak” Detection How can a node inspect its state for errors Simple approach: –Identify a property that should hold –Check if the property holds –Declare an error if a property is violated Example: –In an undirected graph, D(X,Y) = D(Y,X) Here, D(A,B) = 1 But D(B,A) = 4 –Error! Dest/ Neighbor ABE A0112 B407 C 138 D596 E964 F G492 So why is symmetry weak?

Weak Detection via Triangle Inequality [DMZ’03] No conflict of D(X,Y) = D(Y,X) Triangle Inequality (Another property) is violated: D(X,Y) + D(Y,Z) ≥ D(X,Z) –D(B,E) = 3 –D(B,A) = 1 –D(A,E) = 1 –D(B,A) + D(A,E) < D(B,E) Dest/ Neighbor ABE A011 B103 C12138 D596 E130 So symmetry is weak –Failed to detect an inconsistency observed by another method (triangle inequality)

Even the Triangle Inequality is “Weak” Suppose graph edge lengths must be 1 (hop-count) Dest/ Neighbor AB A02 B20 C31 D33 d(A,D) ≠ 3!!! How do we know if we’ve checked everything we can? AB C D No violation of symmetry or triangle inequality But still an observable misconfiguration

“Strong” Detection Bird’s Eye view of how it works –Let S n be my state (node n) –C = {N} be the set of valid networks –For each network N Run the protocol on N Resulting in state S n (N) at my node –S N ≠ S Error ! –If for some K є C, S n (K) = S Either no error (K is the actual network) Or undetectable error (no check can tell that K is not the actual network) We propose a solution called Strong Detection Definition: A detection method is “Strong” if it detects all detectable errors What network could have resulted in my state? Those two networks and this bizarre one fit. Either everything’s OK or some bozo is giving me wrong information! There were no networks. Something must be wrong G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D G A B C n E F D

High-Complexity Strong Detection Problem The proposed Strong detection technique is computationally infeasible –The number of potential networks C={N} to check can be huge! We need to find a way to reduce the number of potential networks to check

How can self-monitoring be practically used Q: Can Strong Detection be achieved with low complexity? A: Sometimes: We show how to do it for –Bellman-Ford (a.k.a. Distance Vector) –Path-Vector

Strong Detection for D.V. Input at node n: –S n : a single node’s state table that reports each neighbor’s (supposed) distance to all nodes –Set C of all allowable networks Dest/ Neighbor ABE A0112 B407 C 138 D5912 E964 F 1513 G492 SnSn

Strong Detection in D.V. at a node, n Take node n’s state, S n Use this state to build the canonical graph, M є C Simulate D.V. on M to generate simulated state S n (M) We prove: –If S n (M) ≠ S n, then error detected –Else, either there is no error, or it is undetectable because M might be the actual network Dest/ Neighbor ABE A0112 B407 C 138 D5912 E964 F 1513 G492 Dest/ Neighbor ABE A0112 B407 C 138 D5912 E964 F 1513 G492 SnSn S n (M) G A B C E F D G A B C n E F D M n

Creating the Canonical Graph, M for an undirected network For every pair of nodes (x,y): –Create edge (x,y) with length e xy = max |d(m,x) – d(m,y)| Note: Is fully connected Dest/ Neighbor ABE A0112 B407 C 138 D5912 E964 F 1513 G492 G A C n E F D e DE =max(|5-9|,|9-6|,|12-4|} = 8 8 e EF =max(|9-12|,|6-15|,|4-13|} = 9 9 B The proof that this canonical graph is all we need to check is in the paper

Experimental Setup Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Five different networks with 50, 100,200,400 and 800 nodes –Constructed by the BRITE topology generator –The networks mimic the topology of the Internet Nodes distributed on the X-Y plane and edge-weights set to be Euclidean distance between them In each experiment a “monitor” and “liar” node were chosen with distance uniformly dist. Liar node publishes incorrect distances –About all routes –Or distance to a “target” node The monitor node attempts to detect this lie –We studied how large the lie had to be before it is detected –How the distances between monitor, liar and target affect detection

Experimental Results Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1 How big does an error have to be before it is detected As a function of the shortest-path between the monitor and liar Detectability decreases with monitor-liar distance

Experimental Results (2) Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 2 How do distances between the different node-types affect detection? –Monitor/Liar –Liar/Target –Monitor/Target Detection sensitivity most affected by Monitor/Liar distance

Path-Vector Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance We also have low complexity solutions for flavors of path- vector protocols –With hop-by-hop distances –Total distance –Incomplete information Eg. Ad-hoc protocols

Conclusion Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance Simulation 1  How big does an error have to be before it is detected?  As function of monitor-liar distance for single and multiple errors Detection is clearly function of distance We provide a technique called “Strong Detection” that detects all detectable errors We provide a practical implementation of this for the Distance Vector protocol Routing Protocols have inherent capacities to self monitor for Errors We show that Errors fall into two classes –Those that can be detected through self- monitoring –Those that cannot (whatever the method)