Tony McGregor RIPE NCC Visiting Researcher The University of Waikato Optimising Path Discovery Doubletree.

Slides:



Advertisements
Similar presentations
Challenges in Making Tomography Practical
Advertisements

OLD DOG CONSULTING Challenges and Solutions for OAM in Point-to-Multipoint MPLS Adrian Farrel, Old Dog Consulting Ltd. Zafar Ali, Cisco Systems, Inc.
IPv6 The New Internet Protocol Integrated Network Services Almerindo Graziano.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
REVEALING MIDDLEBOXES INTERFERENCE WITH TRACEBOX Gregory Detal*, Benjamin Hesmans*, Olivier Bonaventure*, Yves Vanaubel° and Benoit Donnet°. *Université.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
CSE 461: IP/ICMP and the Network Layer. Next Topic  Focus:  How do we build large networks?  Introduction to the Network layer  Internetworks  Service.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Router-level Internet Topology Mapping By Talha OZ.
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
Network Layer4-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Heuristics for Internet Map Discovery Ramesh Govindan USC/Information Sciences Institute Joint work with Hongsuda Tangmunarunkit.
Measurement in the Internet. Outline Internet topology Bandwidth estimation Tomography Workload characterization Routing dynamics.
CSEE W4140 Networking Laboratory Lecture 5: IP Routing (OSPF and BGP) Jong Yul Kim
Heuristics for Internet Map Discovery R. Govindan, H. Tangmunarunkit Presented by Zach Schneirov.
Announcements List Lab is still under construction Next session we will have paper discussion, assign papers,
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
IPv6 Fundamentals Chapter 2: IPv6 Protocol
PALMTREE M. Engin TozalKamil Sarac The University of Texas at Dallas.
CMPT 471 Networking II Address Resolution IPv6 Neighbor Discovery 1© Janice Regan, 2012.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
INTERNET TOPOLOGY MAPPING INTERNET MAPPING PROBING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University.
4: Network Layer4a-1 IP datagram format ver length 32 bits data (variable length, typically a TCP or UDP segment) 16-bit identifier Internet checksum time.
Guide to TCP/IP, Third Edition
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
Efficient Algorithms for Large-Scale Topology Discovery Benoit Donnet joint work with Philippe Raoult, Timur Friedman and Mark Crovella Sigmetrics 2005.
Issues with Inferring Internet Topological Attributes Lisa Amini ab, Anees Shaikh a, Henning Schulzrinne b a IBM T.J. Watson Research Center b Columbia.
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato DAR Active measurement in the large.
Doubletree: a Way to Reduce Redundancy in Traceroute Systems Benoit Donnet joint work with P. Raoult, T. Friedman and M. Crovella CAIDA – San Diego (Sept.
A METHOD FOR INCONSPICUOUS TRACEROUTE Jonathan Haber.
Resilient Overlay Networks By David Andersen, Hari Balakrishnan, Frans Kaashoek, and Robert Morris MIT RON Paper from ACM Oct Advanced Operating.
MENU Implications of Securing Router Infrastructure NANOG 31 May 24, 2004 Ryan McDowell
1 Debugging Path MTU Discovery Failures - Techniques and Results Internet2 Member Meeting September 21, 2005 Matthew Luckie, Kenjiro Cho, Bill Owens.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
Dynamic Routing Protocols II OSPF
5: DataLink Layer 5a-1 Bridges and spanning tree protocol Reference: Mainly Peterson-Davie.
BGP and ICMP. Exterior Gateway Protocol (EGP) Like RIP, but no metrics. Just if reachable. Rtr inside a domain collects reachability information and informs.
ISMA 2011 AIMS-3 Workshop on Active Internet Measurements Workshop Summary Mehmet Burak Akgun February 9-11, 2011 UCSD, La Jolla, CA.
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
A METHOD FOR INCONSPICUOUS TRACEROUTE Jonathan Haber.
Topology Discovery Using an Address Prefix Stopping Rule Benoit Donnet Joint work with Timur Friedman Eunice 2005 – Madrid (Spain)
A CIDR Prefix Stopping Rule for Topology Discovery Benoit Donnet joint work with Timur Friedman Algotel 2005 – Presqu'Ile de Giens.
4: Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
GRE.
Homework 4 Out: Fri 2/24/2017 In: Fri 3/10/2017.
Computer Communication Networks
TRANSPORT LAYER BY, Parthasarathy.g.
NAT – Network Address Translation
Introduction To TCP/IP Networking Mr. Zeeshan Ali, Asst. Professor
Introduction to TCP/IP networking
Avoiding traceroute anomalies with Paris Traceroute
Evaluation of a Large-Scale Topology Discovery Aglorithm
Routing BY, P.B.SHANMATHI.
Improved Algorithms for Network Topology Discovery
GRE-in-UDP Encapsulation
Homework 4 Out: Fri 2/26/2016 In: Fri 3/11/2016.
Ingress Filtering, Site Multihoming, and Source Address Selection
RESOLVING IP ALIASES USING DISTRIBUTED SYSTEMS
Intra-Domain Routing Jacob Strauss September 14, 2006.
CS 457 – Lecture 10 Internetworking and IP
Measured Impact of Crooked Traceroute
Multipath tracing with Paris Traceroute
Lecture 26: Internet Topology CS 765: Complex Networks.
Internet Control Message Protocol
Review of Internet Protocols Network Layer
32 bit destination IP address
Presentation transcript:

Tony McGregor RIPE NCC Visiting Researcher The University of Waikato Optimising Path Discovery Doubletree and Paris Traceroute

About Finding The Path between Two Monitors Traceroute

Traceroute (the real story)‏

Traceroute (the really real story)‏

Traceroute (more reality)‏

Traceroute (But wait... there's more)‏ RFC1918 addresses ICMP disabled ICMP filters False routes Load balancing Interface coalition ISPs hide topology  TTL 0 Tunnels  MPLS  IPv6

Why Not Use Routing Data? It's different!  More detailed  Route changes  Load balancing  Aggregation  Policy  etc

Scamper vs BGP

Wasted Probes (doubletree)‏ Donnet B et al. “Efficient Algorithms for Large-Scale Topology Discovery” Sigmetrics 05

Wasted Probes (doubletree)‏

Intra-monitor Redundancy

Extent of intra-monitor redundancy Donnet et al. Estimate that in skitter 87% of probes were redundant. skitterdoubletree

Inter-monitor redundancy

skitterdoubletree

Limitations Doubletree finds fewer nodes that repeated traceroutes  Path changes  Load balancing Global stop set requires communication  Negates savings to some extent  May be large if there are many destinations Trade off between reducing intra- and inter- monitor redundancy

Doubletree for DAR The DAR project is investigating the design of a very large scale active measurement system  Design should support in the order of probes Want to find path to a small number of targets from a large number of probes  can't just probe  double tree A lot of redundancy so much potential for savings Need to share global stop set between many probes Global stop set will be smaller than for scamper

Discovering Alternative Paths load balancing and Paris traceroute TCP traceroute study (July 2006, 5,000 addresses)  7 of 9 Tear one ISPs  17 of 64 top regional ISPs  Over 80% of destinations appeared to have load balancers in their path Augustin et al. “Avoiding traceroute anomalies with Paris traceroute” Université of Pierre et Marie Curie

Alternative Paths naïve traceroute

Load Balancing Three types of load balancers  Random (per-packet)‏  Destination address based  Flow ID based Some or all of the classic 5-tuple TOS ICMP code and checksum Traceroute deliberately varies flow information  Match TTL expired with probe packet

Paris Traceroute Goal:  To discover all paths from a source to a destination  Doesn't address per-destination load balancing Create headers such that flow ID remains the same Still need to match ICMP TTL expired packets to probes  For UDP vary checksum Requires manipulating the payload  For ICMP vary sequence number and identifier So that checksum remains constant  For TCP vary the sequence number Uses TCP half-open technique

Results For a particular set of 5000 destinations from Université Pierre et Marie Curie Loops  5.3% of traceroute paths  87% caused by per flow load balancing Cycles  0.84% of traceroute paths  78% caused by per-flow load balancing Diamonds  79% of traceroute paths  64% cause by per-flow load balancing