ICNP 2006 Inter­domain Policy Violations in Overlay Routes Srinivasan Seetharaman, Mostafa Ammar Networking and Telecommunications Group College of Computing.

Slides:



Advertisements
Similar presentations
LASTor: A Low-Latency AS-Aware Tor Client
Advertisements

Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
1 Internet Path Inflation Xenofontas Dimitropoulos.
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada ISP-Friendly Peer Matching without ISP Collaboration Mohamed Hefeeda (Joint.
On the Geographic Distribution of On- line Game Servers and Players Wu-chang FengWu-chi Feng Discussion moderated By: John Carter.
Ashish Gupta, Marcia Zangrilli, Ananth I. Sundararaj, Peter A. Dinda, Bruce B. Lowekamp EECS, Northwestern University Computer Science, College of William.
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Wen Xu and Jennifer Rexford Princeton University MIRO : Multi-path Interdomain ROuting.
University of Massachusetts, Amherst 1 On the Evaluation of AS Relationship Inferences Jianhong Xia and Lixin Gao Department of Electrical and Computer.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Inter-domain Routing Outline Border Gateway Protocol.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
IPlane Status Harsha V. Madhyastha University of California San Diego.
New Directions and Half-Baked Ideas in Topology Modeling Ellen W. Zegura College of Computing Georgia Tech.
1 Meeyoung Cha (KAIST) Sue Moon (KAIST) Chong-Dae Park (KAIST) Aman Shaikh (AT&T Labs – Research) IEEE INFOCOM 2005 Poster Session Positioning Relay Nodes.
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Quantifying the Causes of Path Inflation Neil Spring, Ratul Mahajan, and Thomas Anderson Presented by Luv Kohli COMP November 24, 2003.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
On the Interaction between Dynamic Routing in the Native and Overlay Layers INFOCOM 2006 Srinivasan Seetharaman Mostafa Ammar College of Computing Georgia.
Network Aware Resource Allocation in Distributed Clouds.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
On AS-Level Path Inference Jia Wang (AT&T Labs Research) Joint work with Z. Morley Mao (University of Michigan, Ann Arbor) Lili Qiu (University of Texas,
Streaming over Subscription Overlay Networks Department of Computer Science Iowa State University.
Advanced Networking Lab. Given two IP addresses, the estimation algorithm for the path and latency between them is as follows: Step 1: Map IP addresses.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
PIT and Cache Dynamics in CCN. Objects & Conclusion Cache-PIT dynamics in CCN Cache and PIT aggregation effect save bandwidth consumption As network load.
Achieving good end-to-end service using Bill-Pay Cristian Estan, Aditya Akella, Suman Banerjee Univ. of Wisconsin - Madison.
A Joint Bandwidth Allocation and Routing Scheme for the IEEE 802
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 23 PHILLIPA GILL - STONY BROOK U.
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Routing in Multi-Layered Networks Srinivasan Seetharaman Georgia Institute of Technology Case Western Reserve University March 2007.
Overlay Networking Srinivasan Seetharaman Fall 2006.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
GLOBECOM 2007 Exit Policy Violations in Multi-hop Overlay Routes Srinivasan Seetharaman, Mostafa Ammar Networking and Telecommunications Group College.
Self-Organized Resource Allocation in LTE Systems with Weighted Proportional Fairness I-Hong Hou and Chung Shue Chen.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Load Balancing of Multipath Source Routing in Ad Hoc Networks Lianfang Zhang, Zenghua Zhao, Yantai Shu, and Lei Wang Department of Computer Science Tianjin.
Scaling Properties of the Internet Graph Aditya Akella With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
1 On the Interaction between Dynamic Routing in the Native and Overlay Layers Infocom2006 Srinivasan Seetharaman and Mostafa Ammar College of Computing.
Analyzing Cross-layer Interaction in Overlay Networks
A Study of Group-Tree Matching in Large Scale Group Communications
P2P Streaming for Mobile Nodes: Scenarios and Related Issues
Overlay­Friendly Native Network: A Contradiction in Terms?
No Direction Home: The True cost of Routing Around Decoys
Routing in Multiple Layers: Opportunities and Challenges
Managing Inter-domain Traffic in the Presence of BitTorrent File-Sharing Srinivasan Seetharaman and Mostafa Ammar School of Computer Science Objective:
Algorithms for Budget-Constrained Survivable Topology Design
Fixing the Internet: Think Locally, Impact Globally
Authors: Jinliang Fan and Mostafa H. Ammar
Srinivasan Seetharaman - College of Computing, Georgia Tech
Presentation transcript:

ICNP 2006 Inter­domain Policy Violations in Overlay Routes Srinivasan Seetharaman, Mostafa Ammar Networking and Telecommunications Group College of Computing Georgia Institute of Technology

ICNP 2006 Typically in Service Overlays… Objective of overlay layer: Offer better latency routes to end-systems But, what is assumed here? The overlay traffic is just a small fraction Node at Harvard is capable of relaying overlay packets Colorado State Univ Harvard Univ Univ of NC 30 ms 24 ms 61 ms

ICNP 2006 Typically in Service Overlays… Objective of native layer: Enforce inter-domain policies and offer best-effort service Unhappy 1. Money 2. Load Client 1 Client 1 A Client 2 B Client 3 C Provider 1 Provider 2 Peer Legitimate native route Overlay route Valley-free violation

ICNP 2006 Outline We answer the following questions: What type of violations? How extensive are these violations? What benefit did overlays derive? What if ASes enforce policies? Framework for regaining routing advantage?

ICNP 2006 Focus What Inter-domain policies? Valley-free property (Thou shalt not transit for anyone but customers) Since unrelated AS is incurring expense Which overlay paths? Desirable multi-hop paths are our main concern Single hop paths are non-violating

ICNP 2006 Topology: 58 geographically distributed Planetlab nodes (Univ + Commercial). This yields 3306 overlay paths Measurement steps: 1. Determine AS path of each overlay link (Rockettrace / traceroute for hop list + IP  AS mapping) 2. Determine overlay path based on shortest path algo (For Cost = latency, 56.6% overlay paths prefer relaying) 3. AS relationships inferred using Gao’s algorithm See: Planetlab Overlay Measurements

ICNP 2006 I. Extent of Valley-free Violations A: Provider-AS-Provider (63.1%) B: Provider-AS-Peer (2.43%) Client 1 Provider 1 Client 2 Provider 2 Client 3 Peer Client 1 Provider 1 Client 2 Provider 2 Client 3 Peer

ICNP 2006 I. Extent of Valley-free Violations No violation if intermediate node is at a provider. In our dataset, 30.19% of paths had no violation C: Peer-AS-Provider (2.00%) D: Peer-AS-Peer (2.39%) Client 1 Provider 1 Client 2 Provider 2 Client 3 Peer Client 1 Provider 1 Client 2 Provider 2 Client 3 Peer

ICNP 2006 II. Benefit Derived Gain = Overlay link latency – Overlay path latency Overlay link latency

ICNP 2006 III. Enforcing Native Policies ASes may become aware of the negative impact of overlays and commence filtering Two modes for filtering objectionable traffic: 1. Blind filtering: Filter all overlay traffic at host AS 2. Policy-Aware Filtering: Filter only violating traffic (Ex: 30.19% of the relayed traffic is NOT blocked)

ICNP 2006 Penalty = Post-filtering Overlay path latency Best possible path latency III. Overlay Performance Diminishes Blind filtering Policy-aware filtering

ICNP 2006 Overlay service provider (OSP) shares some of the cost incurred by the native layer  We adopt two strategies: 1. Obtain transit permit: Lifetime fee of P i 2. Add new node: Lifetime fee of N i Cost-sharing approach IV. A Framework for Legitimizing Paths

ICNP 2006 With no filtering, 4 violating multi-hop overlap paths IV. Cost Sharing Approach Betweenness = 2 Cust-Prov relation Peering relation Overlay hosting AS

ICNP 2006 With filtering, we have no multi-hop paths Overlay routing is obviated and performance suffers IV. Cost Sharing Approach (contd.) Cust-Prov relation Peering relation Overlay hosting AS

ICNP 2006 After obtaining permit from AS 32 2 multi-hop overlap paths are permitted IV. Cost Sharing Approach (contd.) Transit Permit Cust-Prov relation Peering relation Overlay hosting AS

ICNP 2006 After adding new node to AS 23 2 reasonably good non-violating multi-hop overlap paths are permitted IV. Cost Sharing Approach (contd.) Add new node Cust-Prov relation Peering relation Overlay hosting AS

ICNP 2006 IV. Cost Sharing Problem For a certain budget, determine optimal set { N, P } that maximizes overall path gain where: N = Set of ASes where new nodes are placed P = Set of ASes being paid for permits Deriving optimal solution set is a hard problem. Hence…

ICNP 2006 IV. Greedy Heuristics Pay ASes along unrestricted best-gain path Obtain permits first from stub ASes that have high betweenness (# of overlay paths through the node) Next, add overlay nodes to upstream providers, starting with the overlay paths which achieve the highest gain

ICNP 2006 IV. Cost Sharing Results Let: Permit fee for each AS = P New node fee for each AS = N Add new nodePermit

ICNP 2006 Conclusions Overlay routing gains advantage by violating native layer policy. As overlay applications and overlay traffic surge, the native layer policy violations have a bigger impact User experience suffers drastically as more ASes deploy filtering mechanisms Our cost-sharing approach is a mutually agreeable solution to improve gain without causing violations.