Position Statement Debbie Perouli, PhD Student Sonia Fahmy, Associate Professor Computer Science Department Purdue University WODNAFO 10.

Slides:



Advertisements
Similar presentations
Hidden Metric Spaces and Navigability of Complex Networks
Advertisements

Locating Prefix Hijackers using LOCK Tongqing Qiu +, Lusheng Ji *, Dan Pei * Jia Wang *, Jun (Jim) Xu +, Hitesh Ballani ++ + College of Computing, Georgia.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
Does BGP Solve the Shortest Paths Problem? Timothy G. Griffin Joint work with Bruce Shepherd and Gordon Wilfong Bell Laboratories, Lucent Technologies.
Geometry of large networks (computer science perspective) Dmitri Krioukov (CAIDA/UCSD) AIM, November 2011.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada ISP-Friendly Peer Matching without ISP Collaboration Mohamed Hefeeda (Joint.
S ufficient C onditions to G uarantee P ath V isibility Akeel ur Rehman Faridee
Mapping the Internet Topology Via Multiple Agents.
Interdomain Routing and The Border Gateway Protocol (BGP) Courtesy of Timothy G. Griffin Intel Research, Cambridge UK
Computer Science 1 An Approach to Universal Topology Generation Alberto Medina Anukool Lakhina Ibrahim Matta John Byers
Improving BGP Convergence Through Consistency Assertions Dan Pei, Lan Wang, Lixia Zhang UCLA Xiaoliang Zhao, Daniel Massey, Allison Mankin, USC/ISI S.
(c) Anirban Banerjee, Winter 2005, CS-240, 2/1/2005. The Impact of Internet Policy and Topology on Delayed Routing convergence C. Labovitz, A. Ahuja, R.
Incrementally Deployable Security for Interdomain Routing (TTA-4, Type-I) Jennifer Rexford, Princeton University Joan Feigenbaum, Yale University August,
Scalability and Accuracy in a Large- Scale Network Emulator Amin Vahdat, Ken Yocum, Kevin Walsh, Priya Mahadevan, Dejan Kostic, Jeff Chase, and David Becker.
1 Intrusion Monitoring of Link-State Routing Protocols Akshay Aggarwal Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of.
Routing.
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
1 Understanding Route Redistribution ICNP 2007 October 17 th, 2007 Franck Le, Geoffrey G. Xie, Hui Zhang.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
Introduction to compact routing Dmitri Krioukov UCSD/CAIDA IDRWS 2004.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Computer Networks Layering and Routing Dina Katabi
EQ-BGP: an efficient inter- domain QoS routing protocol Andrzej Bęben Institute of Telecommunications Warsaw University of Technology,
Subnet Level Internet Topology Generator Mehmet Burak AKGUN CS790 Complex Networks.
Network Sensitivity to Hot-Potato Disruptions Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
I-4 routing scalability Taekyoung Kwon Some slides are from Geoff Huston, Michalis Faloutsos, Paul Barford, Jim Kurose, Paul Francis, and Jennifer Rexford.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Chapter 27 sections CS 332 Spring Link-state Routing Q: Could you go over link-state routing (like OSPF)? A: Each router constructs a graph of the.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
David M. Nicol Assoc. Director R&D, ISTS Professor of Computer Science, Dartmouth Network Security Research Using High Performance Simulation.
Complex network geometry and navigation Dmitri Krioukov CAIDA/UCSD F. Papadopoulos, M. Kitsak, kc claffy, A. Vahdat M. Á. Serrano, M. Boguñá UCSD, December.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Reducing Transient Disconnectivity using Anomaly-Cognizant Forwarding Andrey Ermolinskiy, Scott Shenker University of California – Berkeley and ICSI.
A Case Study in Understanding OSPFv2 and BGP4 Interactions Using Efficient Experiment Design David Bauer†, Murat Yuksel‡, Christopher Carothers† and Shivkumar.
RR-FS Status Report Dmitri Krioukov CAIDA IETF-60.
SEP: Sensibility analysis of BGP convergence and scalability using network simulation Sensibility analysis of BGP convergence and scalability using network.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
A comparison of overlay routing and multihoming route control Hayoung OH
On Understanding of Transient Interdomain Routing Failures Feng Wang, Lixin Gao, Jia Wang, and Jian Qiu Department of Electrical and Computer Engineering.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Advancements in the Inference of AS Relationships Xenofontas Dimitropoulos (Fontas) (CAIDA/GaTech) Dmitri Krioukov Bradley Huffaker k claffy George Riley.
02/01/2006USC/ISI1 Updates on Routing Experiments Cyber DEfense Technology Experimental Research (DETER) Network Evaluation Methods for Internet Security.
Introduction to compact routing Dmitri Krioukov UCSD/CAIDA 3 rd CAIDA-WIDE Workshop.
On the Impact of Clustering on Measurement Reduction May 14 th, D. Saucez, B. Donnet, O. Bonaventure Thanks to P. François.
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Josh Karlin, Stephanie Forrest, Jennifer Rexford IEEE International Conference on Network.
Dynamic Routing Protocols II OSPF
Chapter 20 Unicast Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
March 3, 2009 Network Analysis Valerie Cardenas Nicolson Assistant Adjunct Professor Department of Radiology and Biomedical Imaging.
Path Computation Element Metric Protocol (PCEMP) (draft-choi-pce-metric-protocol-02.txt) Jun Kyun Choi and Dipnarayan Guha
Border Gateway Protocol. Intra-AS v.s. Inter-AS Intra-AS Inter-AS.
PATH DIVERSITY WITH FORWARD ERROR CORRECTION SYSTEM FOR PACKET SWITCHED NETWORKS Thinh Nguyen and Avideh Zakhor IEEE INFOCOM 2003.
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
Towards an integrated multimedia service hosting overlay Dongyan Xu Xuxian Jiang Proceedings of the 12th annual ACM international conference on Multimedia.
Dynamic Routing Protocols II OSPF
COMP 3270 Computer Networks
Subnet Level Internet Topology Generator
Dynamic Routing Protocols II OSPF
Metarouting (SIGCOMM 2005) T. G. Griffin and J. L. Sobrinho
Topology Control and Its Effects in Wireless Networks
Department of Computer Science University of York
COMPUTER NETWORKS CS610 Lecture-42 Hammad Khalid Khan.
Presentation transcript:

Position Statement Debbie Perouli, PhD Student Sonia Fahmy, Associate Professor Computer Science Department Purdue University WODNAFO 10

Central Problem Simplify an experimental scenario before we study it using simulation, emulation, or testbeds. Main Focus: Preserve the important routing characteristics for this scenario.

Characteristics of the Problem Why simplify? Large scale (ASes, prefixes, messages) meaning high memory requirements, long execution times What is important to preserve? Depends on the goal of the experimenter, and which properties may change with the scale Why do it before running the experiment? This is just one approach...

Platform# of ASesMemoryReference Based on SSFNET MB [LN] BGP GB[DR] SSFNET (INET)16000N/A[HK] BSIM18943N/A[KFR] PGBGP C-BGP MB[QU] C-BGP Where are we now? Glenn Carl, Towards Large-Scale Testing of Policy-Based Routing via Path Algebraic and Scaled-Down Topological Modeling, Ph.D. Dissertation, The Pennsylvania State University, May 2008.

References I [DR] X. Dimitropoulos and G. Riley, Large-Scale Simulation Models of BGP, MASCOTS, Shared memory among RIBs, Nix-vectors. Also parallel. [HK] F. Hao and Pramod Koppol, An Internet Scale Simulation Setup for BGP, ACM SIGCOMM CCR, Single global RIB, no TCP/IP modeling. [LN] L. Liljenstam and D. Nicol, On-Demand Computation of Policy Based Routes for Large-Scale Network Simulation, Winter Simulation Conference, PAO routing algorithm, no routing dynamics.

Graph Topology Tools Generators Orbis [MH]: given a set of metrics of a small graph, produce a larger graph preserving those values could we use it in the opposite way? Reducers HBR [HF]: sampling method which produces a topology preserving the hierarchical structure of the Internet

Topological Scale Down [CK] Remove nodes through Gaussian elimination, rewire edges, modify policy configuration. Preserves path length, composition & ordering import policies, i.e. local preference Also, developed a BGP solver (no TCP/IP) based on Path Algebras.

References II [CK] G. Carl and G. Kesidis, Large-Scale Testing of the Internet's Border Gateway Protocol (BGP) via Topological Scale-Down, ACM TOMACS, [KFR] J. Karlin, S. Forrest, and J. Rexford, Pretty Good BGP: Improving BGP by Cautiously Adopting Routes, ICNP, [HF] Y. He, M. Faloutsos, S. Krishnamurthy and M. Chrobak, Policy-Aware Topologies for Efficient Inter-Domain Routing Evaluations, IEEE INFOCOM Mini-Conference, [MH] Priya Mahadevan, Calvin Hubble, Dmitri Krioukov, Bradley Huffaker, and Amin Vahdat, Orbis: Rescaling Degree Correlations to Generate Annotated Internet Topologies, ACM SIGCOMM, [QU] B. Quoitin and S. Uhlig, Modelling the Routing of an Autonomous System with C-BGP, IEEE Network, 2005.

Thank you!

Are graph metrics important? RV Source1998 (March 27) 2003 (March 8) 2009 (March 31) # of Nodes # of Edges Average Degree Assortativity Clustering

Metrics in Routing Papers (1) # of candidate or best paths (2) path length (3) # of BGP updates (4) protocol convergence time (5) end-to-end delay (intra-domain) (6) # of prefixes and origin (7) # of infected nodes or links (8) node degree distribution