MOTIA FINAL CONFERENCE ''Project Presentation” “Interdependency at the Physical and IP Levels” Wp1 and Wp2 With the support of the Prevention, Preparedness.

Slides:



Advertisements
Similar presentations
Learning about Neighboring and Remote Devices PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
Advertisements

Multihoming and Multi-path Routing
ARP AND RARP ROUTED AND ROUTING Tyler Bish. ARP There are a variety of ways that devices can determine the MAC addresses they need to add to the encapsulated.
Technical Aspects of Peering Session 4. Overview Peering checklist/requirements Peering step by step Peering arrangements and options Exercises.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
The need for BGP AfNOG Workshops Philip Smith. “Keeping Local Traffic Local”
Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED
ECE 4110 – Internetwork Programming TCP/IP Protocol (cont’d)
1 A survey of Internet Topology Discovery. 2 Outline Motivations Internet topology IP Interface Level Router Level AS Level PoP Level.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
Delayed Internet Routing Convergence Craig Labovitz, Abha Ahuja, Abhijit Bose, Farham Jahanian Presented By Harpal Singh Bassali.
Chapter 1 Read (again) chapter 1.
Heuristics for Internet Map Discovery R. Govindan, H. Tangmunarunkit Presented by Zach Schneirov.
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
Measuring ISP topologies with Rocketfuel Ratul Mahajan Neil Spring David Wetherall University of Washington ACM SIGCOMM 2002.
MOTIA FINAL CONFERENCE ''Project Perimetering” “MOdelling Tools for Interdependence Analysis for ICT Systems” With the support of the Prevention, Preparedness.
4 August 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 4: Connecting to the Internet Through.
Rome, February 14, 2013 Status of the Project Report on the first year activities With the support of the Prevention, Preparedness and Consequence.
OSPF To route, a router needs to do the following: Know the destination address Identify the sources it can learn from Discover possible.
Chapter 2 TCP/ IP PROTOCOL STACK. TCP/IP Protocol Suite Describes a set of general design guidelines and implementations of specific networking protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Network Layer Network Fundamentals – Chapter 5.
Figure 6-1 Growth pattern of Internet hosts MillionMillionMillionMillion.
1 Automated Fault diagnosis in VoIP 31st March,2006 Vishal Kumar Singh and Henning Schulzrinne.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Internet Registry procedures The Addressing Plan.
Measuring ISP Toplogies with Rocketfuel Neil Spring, Ratul Mahajan, and David Wetherall Presented By: David Deschenes March 25, 2003.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
Quantifying the Causes of Path Inflation Neil Spring, Ratul Mahajan, and Thomas Anderson Presented by Luv Kohli COMP November 24, 2003.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
1 Chapter Overview Routing Principles. Understanding Routing--important Routing refers to the process of taking a packet from one device and sending it.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Connecting to a Network Lesson 5. Objectives Understand the OSI Reference Model and its relationship to Windows 7 networking Install and configure networking.
Lecture 4: BGP Presentations Lab information H/W update.
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato DAR Active measurement in the large.
Introduction to OSPF Nishal Goburdhan. Routing and Forwarding Routing is not the same as Forwarding Routing is the building of maps Each routing protocol.
Day11 Devices/LAN/WAN. Network Devices Hub Switches Bridge Router Gateway.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
DoS attacks on transit network - David Harmelin ( ) Denial of Service attacks on transit networks David Harmelin DANTE.
Lecture Number One History of the internet and a bit about how it works.
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Microsoft Windows XP Professional
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Exploring the Packet Delivery Process.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 4 Learning About Other Devices.
How to use the Internet Ikjun Yeom. How to send a packet  buy a computer  make sure that the computer is equipped with a network interface card  find.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Chapter 2 Network Models
Cyber security: Lithuanian National Regulatory Authority expertise in monitoring national networks resilience Dr. Rytis Rainys | rrt.lt at TAIEX Multi-beneficiary.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Sem 2 v2 Chapter 12: Routing. Routers can be configured to use one or more IP routing protocols. Two of these IP routing protocols are RIP and IGRP. After.
New Directions in Routing
Static and Default Routing
Improved Algorithms for Network Topology Discovery
Planning and Troubleshooting Routing and Switching
Lecture 6: TCP/IP Networking By: Adal Alashban
No Direction Home: The True cost of Routing Around Decoys
Packet Sniffing.
Enabling Static Routing
BGP Overview BGP concepts and operation.
Static and Default Routing
Multicasting Unicast.
Presentation transcript:

MOTIA FINAL CONFERENCE ''Project Presentation” “Interdependency at the Physical and IP Levels” Wp1 and Wp2 With the support of the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme European Commission - Directorate-General Home Affairs This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein Enrico Gregori – IIT/CNR Roma “Piazza di Spagna - 29 Marzo 2012

Enrico Gregori– Roma - March 29-th INTERNET ARCHITECTURE

Enrico Gregori– Roma - March 29-th IP LEVEL Ip packet travelling from source to destination

Enrico Gregori– Roma - March 29-th COMPLEXITY REDUCTION

Enrico Gregori– Roma - March 29-th PROJECT APPROACH Decompose a descriptor of an ICT (TCP/IP based Infrastructure in three descriptors Physical and Data Link (PHY&DL) IP level Application layer level Rules that enable the connection of the three descriptors must be defined The level of details of the above descriptors has a fundamental impact on the interdependencies discovery

Enrico Gregori– Roma - March 29-th PHYSICAL & DATA LINK Each ISP has a complex infrastructures whose description requires a lot of details, e.g., Site infrastructures Cabling Physical links and related protocols

Enrico Gregori– Roma - March 29-th PHYSICAL & DATA LINK A wide variety of technologies and of physical infrastructures Technologies are well known (mostly standardized) but it is very difficult to obtain descriptor of the Phy& DL infrastructure as they are considered IMPORTANT ASSETS WHOSE DETAILS ARE NOT TO BE DISCLOSED

Enrico Gregori– Roma - March 29-th PHYSICAL & DATA LINK Further complexity: THE ORGANIZATIONAL STRUCTURE 1)Operators owning their physical infrastructure and providing services on top of it 2)Operators buying or hiring physical infrastructures (dark fiber) from (1) and providing services on top of it 3)Operators running services based on lower layer services provided by third parties (that can be both (1) or (2))

Enrico Gregori– Roma - March 29-th PHYSICAL & DATA LINK To sum it up: 1.There are no automatic way to construct the Phy&DL descriptors 2.There are no map of the cabling infrastructures used and cabling infrastructures are often shared by several operators 3.Precise descriptors of the Phy&DL can be developed only in specific contexts in which ISPs are directly interested in the project and are cooperative. A further complexity is generated by those operators buying or hiring physical infrastructures (dark fiber or running services based on lower layer services provided by third parties) 4.A not-detailed descriptor of this level implies rough approximations on the interdependencies associated to Phy&DL problems.

Enrico Gregori– Roma - March 29-th PHYSICAL & DATA LINK 5.Luckily Phy&DL technologies are often very fault tolerant with back-up connectivity and with mechanism for fast restoration. 6.Access network are rarely with secondary connectivity at Phy&DL 7.Faults on access network have impact only on a limited community of users 8.Note that redundant connectivity at the IP level (i.e., with two or more ISPs) is effective (at the access level) if these ISP are not sharing the same cabling infrastructure

Enrico Gregori– Roma - March 29-th IP LEVEL Network router graph

Enrico Gregori– Roma - March 29-th IP LEVEL: AS INFRASTRUCTURE

Enrico Gregori– Roma - March 29-th IP LEVEL: AS INFRASTRUCTURE AS graph

Enrico Gregori– Roma - March 29-th IP LEVEL: AUTONOMOUS SYSTEM AS graph

Enrico Gregori– Roma - March 29-th IP LEVEL: TOPOLOGY DISCOVER There are two tools (Traceroute-based and BGP-based) that have been widely used to automatically collect topology data Both these tools allow automatic topology discover and several project have been running for year with this target These tools were not designed for this purpose and hence they have several limitations

Enrico Gregori– Roma - March 29-th IP GRAPH DESCRIPTOR Router graph descriptor: automatic tool: traceorute, success level: average comment: with trace route you don’t control routing hence for a good discovery you need many starting points! ASGraph descriptor: automatic tool: Yes (BGP or traceroute) success level: high for CP links; low for public or private peering peering ASGraph descriptor + Business relationship (peering, CP, Sibling): automatic tool: Yes (BGP or Traceroute) Success level : high ASGraph descriptor + POP localization automatic tool: Yes (Traceroute) success level: low as it is an very novel research activity

Enrico Gregori– Roma - March 29-th COUPLING THE DESCRIPTORS Phy&DL NIC Each router interface will use a Phy&DL NIC Geolocalizion of the routers and of the POP Infrastructures of the operators could also help in the coupling process Manual coupling with info provide by the operator is always required if maximal precision in the interdependency study is the target Application The IP address is the most valuable info to connect an IP descritor with an Application level descriptor

Enrico Gregori– Roma - March 29-th CONCLUSIONS  Very difficult to get an accurate descriptor of the ICT Infrastructure  Research on measurement methodologies to monitor the ICT infrastructure is still needed  Some data (Phy&DL) will be manually collected  IP monitoring infrastructure is inadequate but automatic data collection is a feasible target  AS-Graph descriptor + Business relationship (peering, transit) + POP localization is a good tradeoff between complexity and precison

MOTIA FINAL CONFERENCE Thanks for Attention Enrico Gregori– IIT/CNR Roma “Piazza di Spagna - 29 Marzo 2012