INTERNET MEASUREMENT INTERNET MAPPING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University of Nevada,

Slides:



Advertisements
Similar presentations
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Advertisements

REVEALING MIDDLEBOXES INTERFERENCE WITH TRACEBOX Gregory Detal*, Benjamin Hesmans*, Olivier Bonaventure*, Yves Vanaubel° and Benoit Donnet°. *Université.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Precept 3 Host Configuration 1 Peng Sun. What TCP conn. running? Commands netstat [-n] [-p] [-c] (Linux) lsof -i -P (Mac) ss (newer version of netstat)
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
Internet Control Message Protocol (ICMP)
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
1 A survey of Internet Topology Discovery. 2 Outline Motivations Internet topology IP Interface Level Router Level AS Level PoP Level.
Measurement in the Internet. Outline Internet topology Bandwidth estimation Tomography Workload characterization Routing dynamics.
ITIS 6167/8167: Network and Information Security Weichao Wang.
Measuring ISP topologies with Rocketfuel Ratul Mahajan Neil Spring David Wetherall University of Washington ACM SIGCOMM 2002.
1 Network Topology Measurement Yang Chen CS 8803.
CISCO NETWORKING ACADEMY Chabot College ELEC ping & traceroute.
Ping and traceroute Lab/Homework exercise Assigned 9/12/2006 Due 9/19/2006 CSIT 220 Fall, 2006 Based on T. Blum Exercises.
PALMTREE M. Engin TozalKamil Sarac The University of Texas at Dallas.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Defining the IP Packet Delivery Process INTRO v2.0—4-1.
INTERNET TOPOLOGY MAPPING INTERNET MAPPING PROBING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
CS 6401 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools.
Fundamental of IP network ~ ping, traceroute ~ Practice 1 Information and Communications Technology Internet Engineering.
Internet Control Message Protocol ICMP. ICMP has two major purposes: –To report erroneous conditions –To diagnose network problems ICMP has two major.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Internet Control Message.
Problem Statement Map of OSU Routers Gopi Krishna Tummala Rupam Kundu Graduate Students The Ohio State University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Network Layer Network Fundamentals – Chapter 5.
Measuring ISP Toplogies with Rocketfuel Neil Spring, Ratul Mahajan, and David Wetherall Presented By: David Deschenes March 25, 2003.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
10/8/2015CST Computer Networks1 IP Routing CST 415.
Issues with Inferring Internet Topological Attributes Lisa Amini ab, Anees Shaikh a, Henning Schulzrinne b a IBM T.J. Watson Research Center b Columbia.
PC1 LAN GW SP RTR1 SP RTR2 DST 4 * 25 ms 21 ms dst [ ] 4. A third packet is sent with TTL=3, which decrements at each hop, and expires after RTR2,
Chelebi: Subnet-level Internet Mapper Mehmet H. Gunes University of Nevada, Reno.
Internet Control Message Protocol (ICMP) Chapter 7.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
INTERNET MEASUREMENT INTERNET MAPPING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University of Nevada,
1 Connectivity with ARP and RARP. 2 There needs to be a mapping between the layer 2 and layer 3 addresses (i.e. IP to Ethernet). Mapping should be dynamic.
PACKET SWITCHING AND CIRCUIT SWITCHING AS PART OF NETWORK AND HARDWARE.
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
Computer Networks 0111-ICMP Gergely Windisch
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
Domain Name System: DNS To identify an entity, TCP/IP protocols use the IP address, which uniquely identifies the Connection of a host to the Internet.
Lecture#6:Connectivity Verification
ROUTING.
Connectivity Verification
Ping and traceroute.
Comparative Analysis of Internet Topology Data Sets
Introduction to Networking
Troubleshooting IP Communications
Lecture#7:Connectivity Verification
Ping Hackathon 2018.
RESOLVING IP ALIASES USING DISTRIBUTED SYSTEMS
Chapter 9 Introduction To Data-Link Layer 9.# 1
Internet Control Message Protocol Version 4 (ICMPv4)
Lecture#6:Connectivity Verification
Internet Control Message Protocol
Chapter 11: Network Address Translation for IPv4
Lecture 26: Internet Topology CS 765: Complex Networks.
IP Address (Network Layer)
ITIS 6167/8167: Network and Information Security
Internet Control Message Protocol
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Presentation transcript:

INTERNET MEASUREMENT INTERNET MAPPING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University of Nevada, Reno M.Sc.

 Detect ingress points of a target AS  Announced IP Subnets (routeviews)  Find which ingress point is passed through to reach an IP Subnet in the target AS  Directly start probing from ingresses  Analyze VPs to efficiently probe a target AS IDEA

 traceroute to ( ), 30 hops max, 60 byte packets [AS3851/AS22911] ms ms ms [AS65534] ms ms [AS65534] ms [AS65534] ms ms [AS65534] ms [AS3851/AS22911] ms ms ms [AS3851] ms ms ms [AS2152] ms ms ms [AS2152] ms ms ms [AS2152] ms ms ms [AS2152] ms ms ms [AS4637] ms ms ms [AS55831] ms [AS3786] ms [AS3786] ms [AS3786] ms [AS3786] ms [AS55831] ms [AS3786] ms ms [AS55831] ms [AS3786] ms ms ms [AS9842] ms ms ms [AS9842] ms ms ms [AS9842] ms ms ms [AS9842] ms ms ms IGRESS POINT IDENTIFICATION

 Pick 12 ASes  Based on:  Sizes (#IPs), #Ingresses, #Peers, Ranks  1 small, 1 medium, 1 large  Probe these ASes from each VP AS ingress analysis

 SIZE (#IPs) SMALL, ASN: 65222, SIZE: 32 SIZE (#IPs) MID, ASN: 1301, SIZE: 9728 SIZE (#IPs) LARGE, ASN: 4134, SIZE:  INGRESS SMALL, ASN: 610, #Ingresses: 1 INGRESS MID, ASN: 4366, #Ingresses: 71 INGRESS LARGE, ASN: 701, #Ingresses: 2510  RANK SMALL, ASN: 9989, RANK: 9088 RANK MID, ASN: 9207, RANK: 8714 RANK LARGE, ASN: 3356, RANK: 1  PEER SMALL, ASN: 9253, #Peers: 1 PEER MID, ASN: 8697, #Peers: 34 PEER LARGE, ASN: 174, #Peers: AS ingress analysis

 Ingress point analysis  VP analysis How to reduce redundant probing?

 Pick 2 IPs from each prefix  First IP, Last IP  /24 Ingress Analysis - Probing Mechanism Probe these IPs If they enter the AS from the same ingress, then that means all IPs in this /24 subnet belongs to the same ingress. If they reveal different ingress points, then divide the subnet in two and continue probing each subnet.

Ingress Analysis - Probing Mechanism First IP: Last IP: First IP: Last IP: First IP: Last IP: /24 Divide: /25 || /25 Ingress A Done! Ingress A Ingress B Continue Done! Ingress A Done! Ingress B /25 Ingress B /25 Ingress A

 Program probes every subnet that each AS announces  Program selects a subnet from the target AS's list randomly and probes first and last IPs of that subnet.  If the actual entrance point of the target AS cannot be identified, then the entrance point for the target AS is predicted. Ingress Analysis - Probing Mechanism

 Predicted Entrance Routers:  1.If the trace ends before revealing the target AS, and if there are some unresponsive hops: traceroute [( :33456) -> ( :33457)], protocol icmp, algo hopbyhop ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ---> predicted entrance router 10 * * * 11 * * * 12 * * * :33456 Ingress Analysis - Probing Mechanism

 If the target AS is revealed, however some number of hops before the target did not respond then the entrance is predicted as the last responsive hop before the target: traceroute [( :33456) -> ( :33457)], protocol icmp, algo hopbyhop ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ----> (ASN X) predicted entrance router 13 * * * 14 * * * 15 * * * ms ms ms --- > (ASN T) Target AS revealed :33456 Ingress Analysis - Probing Mechanism

 If the trace ends before revealing the target AS, and if there is no unresponsive hops at the end, then this is considered as "NO_ENTRANCE_INFO": traceroute [( :33456) -> ( :33457)], protocol icmp, algo hopbyhop ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms ms !H ms !H ms !H :33456 Ingress Analysis - Probing Mechanism

 Tried to use 550 Planetlab Nodes  350 of the nodes are usable  Got results from only 225 Nodes  Utilized from Paris-traceroute Ingress Analysis - Probing Mechanism

 Some nodes do not allow users to use ‘sudo’ command through ssh connection  Nodes are not consistent  SSH connection to nodes was interrupted while getting the results  Nodes cannot SSH to our servers in UNR  Need to use a server outside the firewall of the UNR Campus PROBLEMS!

VP Node Name: static.oxfr.ma.charter.com Target AS: 174 ENTR: ENTR_AS: ENTR: ENTR_AS: 3356 (Divided Subnet: /30) ENTR: ENTR_AS: Target AS: 3356 ENTR: ENTR_AS: 3561 very small amount ENTR: ENTR_AS: Target AS: 701 ENTR: ENTR_AS: 174 VP Node Name: ampelos.ipv6.lip6.fr Target AS: 3356 ENTR: ENTR_AS: 1273 ENTR: ENTR_AS: PRE_ENTR: ENTR_AS: PRE_ENTR: ENTR_AS: PRE_ENTR: ENTR_AS: 3549 Target AS: 174 ENTR: ENTR_AS: 1273 ENTR: ENTR_AS: 1273 PARTIAL RESULTS

VP Node Name: planetlab1.net.in.tum.de Target AS: 701 ENTR: ENTR_AS: 3356 ENTR: ENTR_AS: 3549 very small amount VP Node Name: planetlab2.informatik.uni-erlangen.de Target AS: 174 ENTR: ENTR_AS: 680 Target AS: 4134 ENTR: ENTR_AS: 3356 ENTR: ENTR_AS: 3356 VP Node Name: static.oxfr.ma.charter.com Target AS: 4134 ENTR: ENTR_AS: ENTR: ENTR_AS: small amount PRE_ENTR: ENTR_AS: 4837 PARTIAL RESULTS

 Probe target AS IPs starting from the entrance router of the target AS.  -f option of paris-traceroute allows to set the TTL value of the first packet  Reduce the redundant probing through target AS START PROBING FROM ENTRANCE ROUTER

Target IP VP 3 VP 2 VP 1 Entrance Point A Entrance Point B AS X AS Y AS T AS R AS Z Directly start probing from entrance points

 Ant Census Data  Starting in 2003, researchers at ISI have been collecting data about the Internet address space.  ~ IP addresses that response to ping  Parse the data  Which IPs belong to which AS Subnets  Get the min hop number of the entrance point from the first probing results  Probe the target IP starting from the entrance router hop number START PROBING FROM ENTRANCE ROUTER

 Entrance Point Hop number:  traceroute [( :33456) -> ( :33457)], protocol icmp, algo hopbyhop  ms ms ms  ms ms ms  ms ms ms  ms ms ms  ms ms ms  ms ms ms  ms ms ms  ms ms ms  ms ms ms  ms ms ms  11 * ms ms  ms ms ms  ms ms ms > Entrance IP(AS -X) Hop Number: 13  ms * ms > Target IP(AS -T) START PROBING FROM ENTRANCE ROUTER

VP analysis Target AS Ingress router VP Target AS Other ASes

? QUESTIONS?