The Impact of Router Outages on the AS-Level Internet
|
|
- Oswin Dominic Singleton
- 6 years ago
- Views:
Transcription
1 The Impact of Router Outages on the AS-Level Internet Matthew Luckie* - University of Waikato Robert Beverly - Naval Postgraduate School *work started while at CAIDA, UC San Diego SIGCOMM 2017, August 24th
2 Internet Resilience Where are the Single Points of Failure? CE CE CE PE PE PE Example #A Example #B CE: Customer Edge PE: Provider Edge 2
3 Internet Resilience Where are the Single Points of Failure? CE If the CE router fails, the network is disconnected, so the CE router is a PE Single Point of Failure (SPoF) PE Example #A CE: Customer Edge PE: Provider Edge 3
4 Internet Resilience Where are the Single Points of Failure? CE CE If the CE router fails, the network has an PE alternate path available, so the CE router is NOT a Single Point of Failure (SPoF) Example #B CE: Customer Edge PE: Provider Edge 4
5 Internet Resilience Where are the Single Points of Failure? CE CE If the PE router fails, PE the customer network is disconnected, so the PE router is a Single Point of Failure (SPoF) CE: Customer Edge Example #B PE: Provider Edge 5
6 Challenges in topology analysis Prior approaches analyzed static AS-level and router-level topology graphs, - e.g.: Nature 2000 Important AS-level and router-level topology might be invisible to measurement, such as backup paths, - e.g: INFOCOM 2002 A router that appears to be central to a network s connectivity might not be - e.g.: AMS
7 What we did Large-scale (Internet-wide) longitudinal (2.5 years) measurement study to characterize prevalence of Single Points of Failure (SPoF): 1. Efficiently inferred IPv6 router outage time windows 2. Associated routers with IPv6 BGP prefixes 3. Correlated router outages with BGP control plane 4. Correlated router outages with data plane 5. Validated inferences of SPoF with network operators 7
8 What we did Identified IPv6 router interfaces from traceroute 83K to 2.4M interfaces from CAIDA s Archipelago traceroute measurements 8
9 What we did probed router interfaces to infer outage windows We used a single vantage point located at CAIDA, UC San Diego for the duration of this study 9
10 Central counter: 9290 What we did 10
11 Central counter: What we did T1:
12 Central counter: What we did T1: 9290 T2:
13 Central counter: What we did T1: 9290 T2: T3:
14 Central counter: What we did T1: 9290 T2: T3: 9292 T4:
15 Central counter: What we did T1: 9290 T2: T3: 9292 T4: 9293 T5:
16 Central counter: What we did Reboot! T1: 9290 T2: 9291 T3: 9292 T4: 9293 T5:
17 Central counter: What we did T1: 9290 T2: T3: 9292 T4: 9293 T5: 9294 T6: 1 10
18 Central counter: What we did T1: 9290 T2: T3: 9292 T4: 9293 T5: 9294 T6: 1 T7: 2 10
19 Central counter: What we did T1: 9290 T2: T3: 9292 T4: 9293 T5: 9294 T6: 1 T7: 2 T8: 3 10
20 What we did probed router interfaces to infer outage windows using IPID T1: 9290 T2: 9291 T3: 9292 T4: 9293 T5: 9294 T6: 1 Outage Window T7: 2 T8: 3 Infer a reboot when time series of values returned from a router is discontinuous, indicating router was restarted 11
21 Why IPv6 fragment IDs? IPv4 Fragment IDs: - 16 bits, bursty velocity: every packet requires unique ID - At 100Mbps and 1500 byte packets, Nyquist rate dictates 4 second probing interval IPv6 Fragment IDs: - 32 bits, low velocity: IPv6 routers rarely send fragments - We average 15 minute probing interval 12
22 What we did correlated routers with prefixes using traceroute paths 13
23 2001:db8:2::/48 What we did correlated routers with prefixes Ark VP using traceroute paths 2001:db8:1::/ Ark VPs traceroute every routed IPv6 prefix every day Ark VP 14
24 2001:db8:2::/48 What we did correlated routers with prefixes Ark VP using traceroute paths 2001:db8:1::/ Ark VPs traceroute every routed IPv6 prefix every day Ark VP 14
25 2001:db8:2::/48 What we did computed distance of Ark VP router from AS announcing network 0 (CE) 2 1 (PE) 2001:db8:1::/48 CE: Customer Edge PE: Provider Edge 15
26 2001:db8:2::/48 What we did correlated router outage windows with BGP control plane 0 (CE) 2001:db8:1::/48 16
27 2001:db8:2::/48 What we did correlated router outage windows with BGP control plane T1: 9290 T2: 9291 T3: 9292 T4: 9293 Outage Window T5: 9294 T6: 1 T7: 2 T8: :db8:1::/48 17
28 2001:db8:2::/48 What we did correlated router outage windows with BGP control plane RouteViews Outage Window T1: 9290 T2: 9291 T3: 9292 T4: 9293 T5: 9294 T6: 1 T7: :db8:2::/48 T5.2: Peer-1 W T5.2: Peer-2 W T5.3: Peer-3 W T5.3: Peer-4 W T5.8: Peer-3 A T5.8: Peer-2 A T8: :db8:1::/48 T5.8: Peer-1 A T5.8: Peer-4 A 18
29 What we did classified impact on BGP according to observed activity overlapping with inferred outage Complete Withdrawal: all peers simultaneously withdrew route for at least 70 seconds - Single Point of Failure (SPoF) Partial Withdrawal: at least one peer withdrew route for at least 70 seconds, but not all did Churn: BGP activity for the prefix No Impact: No observed BGP activity for the prefix 19
30 What we did Data Collection Summary Probed IPv6 routers at ~15 minute intervals from 18 Jan 2015 to 30 May 2017 (approx. 2.5 years) 149,560 routers allowed reboots to be detected We inferred 59,175 (40%) rebooted at least once,750k reboots in total CDF Number of Outages 20
31 What we found 2,385 (4%) of routers that rebooted (59K) we inferred to be SPoF for at least one IPv6 prefix in BGP Of SPoF routers, we inferred 59% to be customer edge router; 8% provider edge; 29% within destination AS No covering prefix for 70% of withdrawn prefixes - During one-week sample, covering prefix presence during withdrawal did not imply data plane reachability IPv6 Router reboots correlated with IPv4 BGP control plane activity 21
32 Limitations Applicability to IPv4 depends on router being dual-stack Requires IPID assigned from a counter - Cisco, Huawei, Vyatta, Microtik, HP assign from counter % responsive for 14 days assigned from counter Router outage might end before all peers withdraw route - Path exploration + Minimum Route Advertisement Interval (MRAI) + Route Flap Dampening (RFD) Complex events: multiple router outages but one detected - We observed some complex events and filtered them out 22
33 Validation Reboots SPoF Network?? US University US R&E backbone # US R&E backbone # NZ R&E backbone Total: = Validated Inference = Incorrect Inference? = Not Validated 23
34 Validation Reboots SPoF Network?? US University US R&E backbone # US R&E backbone # NZ R&E backbone Total: Challenging to get validation data: operators often could only tell us about the last reboot 24
35 Validation Reboots SPoF Network?? US University US R&E backbone # US R&E backbone # NZ R&E backbone Total: No falsely inferred reboots: we correctly observed the last known reboot of each router 25
36 Validation Reboots SPoF Network?? US University US R&E backbone # US R&E backbone # NZ R&E backbone Total: We did not detect some SPoFs 26
37 Number of Interfaces 3M 1M 100K 30K Data Collection Summary 10K Jan K All Incrementing Jul 15 (a) 83K Jan K Jul 16 ~1.1M (b) 79.8K (c) 41.8K 15.2K Jan 17 PPS List Unresponsive (a) 100 Static 83K hours (b) 225 Static 1.1M hours (c) 200 Dynamic, ~2.4M 7-14 days 27
38 Correlating BGP/router outages Control: six hours prior to inferred outages, Feb 2015 Fraction of Reboot/Prefix Pairs Churn Partial Withdrawal Complete Withdrawal Outside Dest. AS Inside Dest. AS Distance of Router from Destination AS (IP hops) 28
39 Correlating BGP/router outages During the inferred outages, Feb 2015 Fraction of Reboot/Prefix Pairs Churn Partial Withdrawal Complete Withdrawal Outside Dest. AS Inside Dest. AS Distance of Router from Destination AS (IP hops) 29
40 BGP Prefix Withdrawals: SPoF 1 CDF min max 0 1 min min min min hr hr hr Complete Withdrawal Duration 8 hr 16 hr 44% less than 5 minutes, suggestive of router maintenance or router crash 30
41 SPoF prefixes mostly single homed Especially Router hop distance Fraction of Population SPoFs outside 3 destination AS, 2 as expected PE 1 CE Prefix announced through a single upstream Prefix announced through multiple upstreams 31
42 Impact on IPv4 prefixes in BGP 1 Cumulative Fraction Router Outages Before Outage During Outage Control Outage Withdrawn Peers/Advertising Peers We examined IPv4 prefixes for 5% sample of reboots. 19% of correlated IPv4 prefixes withdrawn by at least 90% of peers during router outage window. 32
43 Summary Step towards root-cause analysis of inter-domain routing outages and events Fraction of Reboot/Prefix Pairs 0.5 Churn Partial Withdrawal Complete Withdrawal Distance of Router from Destination AS (IP hops) - Explore applicability of method to measurement of other critical Internet infrastructure: DNS, Web, In our 2.5 year sample of 59K routers that rebooted - 4% (2.3K) were SPoF - SPoF were mostly confined to the edge: 59% customer edge We released our code as part of scamper 33
44 Backup Slides 34
45 Impact on IPv4 Services censys.io April 2017 Active Hosts 39,107 HTTP 25,592 HTTPS 16,321 } Web SSH 11,277 DNS 7,922 IMAP 5,127 } SMTP 7,383 We examined IPv4 prefixes for 5% sample of reboots where at least 90% of peers during router outage window. 35
46 Partial Withdrawals CDF % of pairs had 1 2 peers withdraw 10% of pairs had nearly all peers withdraw Fraction of Peers Withdrawing Route 50% of pairs had 1-2 peers withdraw prefix 10% of pairs had nearly all peers withdraw prefix 36
47 Degrees of ASes monitored Cumulative Fraction of Rebooting ASes Single Points of Failure Monitored Population AS Degree ASes that were inferred to have a SPoF were disproportionately low-degree ASes 37
48 Activity for IPv4 prefixes in BGP Cumulative Fraction Router Outages Before Outage During Outage Peers Sending Updates/Total Peers At least 70% of peers reported BGP activity on IPv4 prefixes for 50% of the inferred router outages 38
49 Reboot Window Durations CDF min 5 min min max 15 min 30 min 1 hr 2 hr Reboot Window Duration 4 hr 8 hr 16 hr Half the maximum reboot lengths were less than 30 minutes (~two probing rounds) 39
50 Router + BGP outage correlation Router IP-ID Sequence: 10, 11, 12 1, 2, 3 Outage Window BGP Sequence: Withdraw-Contained W A Outage-Contained W A Withdraw-Before W A Announce-After W A 40
51 Data processing pipeline Uptime Prober rtr targets CAIDA IPv6 Topology <ip,time,ipid> Cassandra Inferred Reboots BGP Correlation AS border distance single points of failure Route Views <peer,time,prefix> 41
52 Inferring router position Provider Edge (PE) Router Customer Edge (CE) Router AS X AS Y x 1 R 1 x 2 R 2 x 3 R 3 y 1 R 4 y 2 R (a) interface addresses routed by Y appear in traceroute x 1 AS X AS Y x x 2 3?? R R 1 2 R R R (b) no interface addresses routed by Y appear in traceroute 42
53 Data Collection Summary 18 Jan Oct 16 (a) 18 Oct Feb 17 (b) 24 Feb May 17 (c) Probing rate 100 pps 225 pps 200 pps Interfaces 83K seen Dec M seen Jun to Oct 16 Dynamic. 2.4M in May 17 Responsive every round ~15 mins every round ~15 mins every round ~15 mins Unresponsive hours hours 7-14 days 43
54 Why IPv6 fragment IDs? IPv4 ID values are 16 bits with bursty velocity as every packet requires a unique value. Ver HL DSCP length identification offset TTL protocol checksum source address destination address At 100Mbps and 1500 byte packets. Nyquist rate dictates a 4 second probing interval 44
55 Why IPv6 fragment IDs? IPv6 ID values are 32 bits with low velocity as systems rarely send fragmented packets. Ver DSCP flow id payload length protocol TTL source address destination address protocol reserved offset identification 45
56 Soliciting IPv6 Fragment IDs echo request, 1300 bytes echo reply, 1300 bytes packet too big, MTU 1280 echo request, 1300 bytes echo reply, 1280 bytes Fragment ID:
Measuring and Characterizing IPv6 Router Availability
Measuring and Characterizing IPv6 Router Availability Robert Beverly, Matthew Luckie, Lorenza Mosley, kc claffy Naval Postgraduate School UCSD/CAIDA March 20, 2015 PAM 2015-16th Passive and Active Measurement
More informationPrimitives for Active Internet Topology Mapping: Toward High-Frequency Characterization
Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization Robert Beverly, Arthur Berger, Geoffrey Xie Naval Postgraduate School MIT/Akamai February 9, 2011 CAIDA Workshop
More informationUpdates and Case Study
Archipelago Measurement Infrastructure Updates and Case Study Young Hyun CAIDA ISMA 2010 AIMS Workshop Feb 9, 2010 2 Outline Introduction Monitor Deployment Measurements & Collaborations Tools Development
More informationAnalysis of Country-wide Internet Outages Caused by Censorship
CAIDA Workshop on BGP and Traceroute data August 22nd, 211- San Diego (CA), USA Analysis of Country-wide Internet Outages Caused by Censorship Alberto Dainotti - alberto@unina.it University of Napoli Federico
More informationhttps://spoofer.caida.org/
Software Systems for Surveying Spoofing Susceptibility Matthew Luckie, Ken Keys, Ryan Koga, Bradley Huffaker, Robert Beverly, kc claffy https://spoofer.caida.org/ DDoS PI meeting, March 9 2017 www.caida.o
More informationMeasured Impact of Tracing Straight. Matthew Luckie, David Murrell WAND Network Research Group Department of Computer Science University of Waikato
Measured Impact of Tracing Straight Matthew Luckie, David Murrell WAND Network Research Group Department of Computer Science University of Waikato 7 February 2010 The Problem Until recently, load balancing
More informationSoftware Systems for Surveying Spoofing Susceptibility
Software Systems for Surveying Spoofing Susceptibility Matthew Luckie, Ken Keys, Ryan Koga, Bradley Huffaker, Robert Beverly, kc claffy https://spoofer.caida.org/ AusNOG 2016, September 2nd 2016 www.caida.o
More informationIPv6 Topology Mapping
IPv6 Topology Mapping Robert Beverly *, Ram Durairajan, Justin Rohrer *, David Plonka Naval Postgraduate School University of Oregon Akamai April 20, 2018 R. Beverly et al. (NPS/UOregon/Akamai) IPv6 Topology
More informationUpdates and Analyses
Archipelago Measurement Infrastructure Updates and Analyses Young Hyun CAIDA ISMA 2009 AIMS Workshop Feb 12, 2009 2 Outline Focus and Architecture Monitor Deployment Measurements Future Work 3 Introduction
More informationSoftware Systems for Surveying Spoofing Susceptibility
Software Systems for Surveying Spoofing Susceptibility Matthew Luckie, Ken Keys, Ryan Koga, Bradley Huffaker, Robert Beverly, kc claffy https://spoofer.caida.org/ NANOG68, October 18th 2016 www.caida.o
More informationInternet Topology Research
Internet Topology Research Matthew Luckie WAND Network Research Group Department of Computer Science University of Waikato Internet Topology Why should we care? Impacts on the design and operation of routing
More informationInter-Domain Routing Trends
Inter-Domain Routing Trends Geoff Huston gih@apnic.net APNIC March 2007 Agenda 1. Some data about the network and BGP over 2006 2. Some observations about the distribution patterns of BGP updates 3. Pointers
More informationBGP Path Exploration Damping (PED)
BGP Path Exploration Damping (PED) Mattia Rossi mrossi@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Outline Introduction Motivation Path Exploration
More informationOn the Prevalence and Characteristics of MPLS Deployments in the Open Internet
On the Prevalence and Characteristics of MPLS Deployments in the Open Internet Joel Sommers Colgate University Brian Eriksson Boston University Paul Barford University of Wisconsin The elephant in the
More informationAccurate Real-time Identification of IP Hijacking. Presented by Jacky Mak
Accurate Real-time Identification of IP Hijacking Presented by Jacky Mak Outline Problem and Objectives Interdomain Routing and BGP Basics Attack Model of IP Hijacking Real-time Detection Techniques Implementation
More informationInternet Measurement Huaiyu Zhu, Rim Kaddah CS538 Fall 2011
Internet Measurement Huaiyu Zhu, Rim Kaddah CS538 Fall 2011 OUTLINE California Fault Lines: Understanding the Causes and Impact of Network Failures. Feng Wang, Zhuoqing Morley MaoJia Wang3, Lixin Gao and
More informationImplementing MPLS Forwarding
All Multiprotocol Label Switching (MPLS) features require a core set of MPLS label management and forwarding services; the MPLS Forwarding Infrastructure (MFI) supplies these services. Feature History
More informationLecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2)
Last Lecture Internet Protocol (1) This Lecture Internet Protocol (2) Lecture 18 Overview Source: chapters 19.1, 19.2, 22,1 22.2, 26.6 Next Lecture Transport Control Protocol (1) Source: chapters 24.1,
More informationTable of Contents 1 System Maintaining and Debugging Commands 1-1
Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining
More informationNetwork Layer (4): ICMP
1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet
More informationMPLS VPN Explicit Null Label Support with BGP. BGP IPv4 Label Session
MPLS VPN Explicit Null Label Support with BGP IPv4 Label Session The MPLS VPN Explicit Null Label Support with BGP IPv4 Label Session feature provides a method to advertise explicit null in a Border Gateway
More informationAS Connectedness Based on Multiple Vantage Points and the Resulting Topologies
AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 28 Table of Contents 1 Introduction
More informationINFERRING PERSISTENT INTERDOMAIN CONGESTION
INFERRING PERSISTENT INTERDOMAIN CONGESTION Amogh Dhamdhere with David Clark, Alex Gamero-Garrido, Matthew Luckie, Ricky Mok, Gautam Akiwate, Kabir Gogia, Vaibhav Bajpai, Alex Snoeren, k Claffy Problem:
More informationMeasuring BGP. Geoff Huston. CAIA SEMINAR 31 May
Measuring BGP Geoff Huston BGP is An instance of the Bellman-Ford Distance Vector family of routing protocols And a relatively vanilla one at that The routing protocol used to support inter-domain routing
More informationMeasurement: Techniques, Strategies, and Pitfalls. David Andersen CMU
Measurement: Techniques, Strategies, and Pitfalls David Andersen CMU 15-744 Many (most) slides in this lecture from Nick Feamster's measurement lecture Internet Measurement Process of collecting data that
More informationChapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach
Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,
More informationDynamics of Hot-Potato Routing in IP Networks
Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)
More informationLecture 19: Network Layer Routing in the Internet
Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F
More informationTSIN02 - Internetworking
Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4
More informationTSIN02 - Internetworking
Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the
More informationRouting the Internet in Geoff Huston APNIC March 2007
Routing the Internet in 2006 Geoff Huston APNIC March 2007 IPv4 in 2006 Total Advertised BGP Prefixes BGP Table Growth 210000 200000 190000 BGP FIB Entries 180000 2006 170000 2005 160000 150000 Jan Feb
More informationIntroduction to IP Routing. Geoff Huston
Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet
More informationOrganization of Product Documentation... xi
Contents Organization of Product Documentation... xi Chapter 1 Getting Started... 1-1 Introduction...1-1 Software Versions Covered...1-1 Audience...1-1 Conventions...1-1 Terminology...1-2 Support and Warranty
More informationRevealing MPLS Tunnels Obscured from Traceroute
Revealing MPLS Tunnels Obscured from Traceroute Benoit Donnet Matthew Luckie Pascal Mérindol, Jean-Jacques Pansiot Université de Liège CAIDA / UC San Diego Université de Strasbourg Belgium USA France benoit.donnet@ulg.ac.be
More informationA Characterization of IPv6 Network Security Policy
Don t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy Jakub (Jake) Czyz, University of Michigan & QuadMetrics, Inc. Matthew Luckie, University of Waikato Mark Allman, International
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition One of the core protocols in the Internet Primarily used to communicate errors among routers and hosts IP datagram
More informationIRNC-SP: Sustainable data-handling and analysis methodologies for the IRNC networks
IRNC-SP: Sustainable data-handling and analysis methodologies for the IRNC networks Principle Investigator: kc claffy Presenter: Josh Polterock CAIDA NSF IRNC Workshop Arlington,
More informationAchieving scale: Large scale active measurements from PlanetLab
Achieving scale: Large scale active measurements from PlanetLab Marc-Olivier Buob, Jordan Augé (UPMC) 4th PhD School on Traffic Monitoring and Analysis (TMA) April 15th, 2014 London, UK OneLab FUTURE INTERNET
More informationTable of Contents 1 System Maintenance and Debugging Commands 1-1
Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationNetwork Layer PREPARED BY AHMED ABDEL-RAOUF
Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport
More informationECE 158A: Lecture 7. Fall 2015
ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers
More informationTelecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes
Internetworking Contents Overview Functions Issues Basic Delivery Unit Addressing Datagram Delivery ARP IPv4 Header Adapting Datagram Size Notes 2 Overview - Example 3 Direct Delivery 4 Indirect Delivery
More informationIntroduction to MPLS APNIC
Introduction to MPLS APNIC Issue Date: [201609] Revision: [01] What is MPLS? 2 Definition of MPLS Multi Protocol Label Switching Multiprotocol, it supports ANY network layer protocol, i.e. IPv4, IPv6,
More informationIntroduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁
II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:
More informationA Technique for Reducing BGP Update Announcements through Path Exploration Damping
A Technique for Reducing BGP Update Announcements through Path Exploration Damping Geoff Huston, Mattia Rossi, Grenville Armitage mrossi@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne
More informationLecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Network Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it IP datagram format IP protocol version number header length (bytes) type of data max number remaining
More informationBorder Gateway Protocol - BGP
BGP Fundamentals Border Gateway Protocol - BGP Runs over TCP (port 179) TCP connection required before BGP session Need to be reachable! Path vector routing protocol Best path selection based on path attributes
More informationTDTS04 Computer networks and distributed systems Final Exam: 14:00-18:00, Thursday, March 20, 2014
(TEN1) Final Examination: 14:00-18:00, Thursday, August 20, 2014 Time: 240 minutes Total Marks: 40 Grade Requirements: three (20/40); four (28/40); and five (36/40). Assistance: None (closed book, closed
More informationIntroduction to MPLS. What is MPLS? 1/23/17. APNIC Technical Workshop January 23 to 25, NZNOG2017, Tauranga, New Zealand. [201609] Revision:
Introduction to MPLS APNIC Technical Workshop January 23 to 25, 2017. NZNOG2017, Tauranga, New Zealand. Issue Date: [201609] Revision: [01] What is MPLS? 2 1 Definition of MPLS Multi Protocol Label Switching
More informationMAPPING INTERNET INTERDOMAIN CONGESTION
MAPPING INTERNET INTERDOMAIN CONGESTION Amogh Dhamdhere, Bradley Huffaker, Young Hyun, Kc Claffy (CAIDA) Matthew Luckie (Univ. of Waikato) Alex Gamero-Garrido, Alex Snoeren (UCSD) Steve Bauer, David Clark
More informationInternet Mapping Primitives
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Internet Mapping Primitives Naval Postgraduate School Robert Beverly December 17, 2014 Team Profile Naval Postgraduate School: US Navy s
More informationTopics for This Week
Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous
More informationA Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance
A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance Feng Wang University of Mass., Amherst fewang@ecs.umass.edu Zhuoqing Morley Mao University of Michigan zmao@eecs.umich.edu
More informationNetwork Layer: Control/data plane, addressing, routers
Network Layer: Control/data plane, addressing, routers CS 352, Lecture 10 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors)
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationHigh-frequency mapping of the IPv6 Internet using Yarrp
Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2017-03 High-frequency mapping of the IPv6 Internet using Yarrp Gaston,
More informationIntroduction to IPv6. Unit -2. Prepared By:- NITIN PANDYA Assistant Professor, SVBIT.
Introduction to IPv6 Unit -2 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. IP Network Addressing INTERNET world s largest public data network, doubling in size every nine months IPv4, defines
More informationThis document is not restricted to specific software and hardware versions.
Contents Introduction Prerequisites Requirements Components Used Background Information Configure Network Diagram Configuration DN Bit Verify Troubleshoot Related Cisco Support Community Discussions Introduction
More informationTracing the Path to YouTube -
Tracing the Path to YouTube - A Quantification of Path Lengths and Latencies towards Accepted for publication in IEEE Communications Magazine (Pre-print: http://in.tum.de/~doan/2018-yt-traces.pdf) Trinh
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #6 - Presentation on security/ privacy Topic selection Due Tuesday, Nov 22 nd Slides Due Monday, Nov
More informationIPv6 Switching: Provider Edge Router over MPLS
Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationComputer Networks CS 552
Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu Internet measurements-why? Why measure? What s the need? Do we need to measure? Can we just google it? What is the motivation?
More informationComputer Networks CS 552
Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu 1. Measurements 1 Internet measurements-why? Why measure? What s the need? Do we need to measure? Can we just google it? What
More informationnetwork security s642 computer security adam everspaugh
network security s642 adam everspaugh ace@cs.wisc.edu computer security today Announcement: HW3 to be released WiFi IP, TCP DoS, DDoS, prevention 802.11 (wifi) STA = station AP = access point BSS = basic
More informationInitial motivation: 32-bit address space soon to be completely allocated. Additional motivation:
IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:
More informationPreventing the unnecessary propagation of BGP withdraws
Preventing the unnecessary propagation of BGP withdraws V. Van den Schrieck, P. François, C. Pelsser, O.Bonaventure http://inl.info.ucl.ac.be Networking 2009, May 13th Agenda Introduction Presentation
More informationIP Spoofer Project. Observations on four-years of data. Rob Beverly, Arthur Berger, Young Hyun.
IP Spoofer Project Observations on four-years of data Rob Beverly, Arthur Berger, Young Hyun {rbeverly,awberger}@csail.mit, youngh@caida ISMA AIMS 2009 February 12, 2009 Spoofer Project Background Recent
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationExamination. ANSWERS IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491
Examination ANSWERS IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: October 21st 2008 10:00 13:00 a) No help material is allowed
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK 219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationTable of Contents Chapter 1 MPLS Basics Configuration
Table of Contents Table of Contents... 1-1 1.1 MPLS Overview... 1-1 1.1.1 Basic Concepts of MPLS... 1-2 1.1.2 Architecture of MPLS... 1-5 1.1.3 MPLS and Routing Protocols... 1-7 1.1.4 Applications of MPLS...
More informationTaming BGP. An incremental approach to improving the dynamic properties of BGP. Geoff Huston. CAIA Seminar 18 August
Taming BGP An incremental approach to improving the dynamic properties of BGP Geoff Huston BGP is The inter-domain routing protocol for the Internet An instance of a Distance Vector Protocol with explicit
More informationPing, tracert and system debugging commands
Contents Ping, tracert and system debugging commands 1 Ping and tracert commands 1 ping 1 ping ipv6 5 tracert 7 tracert ipv6 9 System debugging commands 10 debugging 10 display debugging 11 i Ping, tracert
More informationDig into MPLS: Transit Tunnel Diversity
January 2015 Dig into MPLS: Transit Tunnel Diversity Yves VANAUBEL Pascal MÉRINDOL Jean-Jacques PANSIOT Benoit DONNET Summary Motivations MPLS Background Measurement Campaign Label Pattern Recognition
More informationInternet Architecture and Experimentation
Internet Architecture and Experimentation Today l Internet architecture l Principles l Experimentation A packet switched network Modern comm. networks are packet switched Data broken into packets, packet
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationCSCI Networking Name:
CSCI 3335- Networking Name: Final Exam Problem 1: Error Checking and TCP (15 Points) (a) True or false: [2.5 points for circling correct answers, -1 points for each wrong answer] i. CRC can both correct
More informationIPv6 Next generation IP
Seminar Presentation IPv6 Next generation IP N Ranjith Kumar 11/5/2004 IPv6 : Next generation IP 1 Network Problems Communication Problem Identification Problem Identification of Networks Logical Addressing
More informationBEng. (Hons) Telecommunications. Examinations for / Semester 2
BEng. (Hons) Telecommunications Cohort: BTEL/16B/FT Examinations for 2016 2017 / Semester 2 Resit Examinations for BTEL/15B/FT MODULE: NETWORKS MODULE CODE: CAN 1102C Duration: 2 ½ hours Instructions to
More informationBGP Routing and BGP Policy. BGP Routing. Agenda. BGP Routing Information Base. L47 - BGP Routing. L47 - BGP Routing
BGP Routing and BGP Policy BGP Routing The BGP Routing Principles and Route Decisions based on AS-Path in a simple topology of AS s routing policy is reduced to a minimal function demonstrated in example
More informationBGP Routing inside an AS
Hot Potatoes Heat Up BGP Routing Renata Teixeira (UC San Diego) http://www-cse.ucsd.edu/~teixeira with Aman Shaikh (AT&T), Tim Griffin(Intel), and Jennifer Rexford(AT&T) 30 th NANOG Miami, Florida BGP
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationMPLS VPN Inter-AS Option AB
First Published: December 17, 2007 Last Updated: September 21, 2011 The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol
More informationOn the Impact of Filters on Analyzing Prefix Reachability in the Internet. Ravish Khosla, Sonia Fahmy, Y. Charlie Hu Purdue University ICCCN 2009
On the Impact of Filters on Analyzing Prefix Reachability in the Internet Ravish Khosla, Sonia Fahmy, Y. Charlie Hu Purdue University ICCCN 2009 Background Border Gateway Protocol (BGP) Inter-domain policy
More informationVendor: Alcatel-Lucent. Exam Code: 4A Exam Name: Alcatel-Lucent Interior Routing Protocols and High Availability.
Vendor: Alcatel-Lucent Exam Code: 4A0-101 Exam Name: Alcatel-Lucent Interior Routing Protocols and High Availability Version: Demo QUESTION 1 When a router receives an IP packet, but does not find a match
More informationIPv6 Switching: Provider Edge Router over MPLS
Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4
More informationCS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)
: Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko
More informationNAT, IPv6, & UDP CS640, Announcements Assignment #3 released
NAT, IPv6, & UDP CS640, 2015-03-03 Announcements Assignment #3 released Overview Network Address Translation (NAT) IPv6 Transport layer User Datagram Protocol (UDP) Network Address Translation (NAT) Hacky
More informationIP Mobility Design Considerations
CHAPTER 4 The Cisco Locator/ID Separation Protocol Technology in extended subnet mode with OTV L2 extension on the Cloud Services Router (CSR1000V) will be utilized in this DRaaS 2.0 System. This provides
More informationUsing Loops Observed in Traceroute to Infer the Ability to Spoof
Using Loops Observed in Traceroute to Infer the Ability to Spoof Qasim Lone 1,MatthewLuckie 2, Maciej Korczyński 1,andMichelvanEeten 1 1 Delft University of Technology, the Netherlands Q.B.Lone, Maciej.Korczynski,
More informationMPLS VPN--Inter-AS Option AB
The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) service provider
More informationRouting Support for Wide Area Network Mobility. Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan
Routing Support for Wide Area Network Mobility Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan 1 Outline Introduction Inter-AS Mobility Support Intra-AS Mobility
More informationThe IP Data Plane: Packets and Routers
The IP Data Plane: Packets and Routers EE 122, Fall 2013 Sylvia Ratnasamy http://inst.eecs.berkeley.edu/~ee122/ Material thanks to Ion Stoica, Scott Shenker, Jennifer Rexford, Nick McKeown, and many other
More informationChapter 4: Network Layer
Mecanismes d Echange d Informations Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint
More informationInternet Anycast: Performance, Problems and Potential
Internet Anycast: Performance, Problems and Potential Zhihao Li, Dave Levin, Neil Spring, Bobby Bhattacharjee University of Maryland 1 Anycast is increasingly used DNS root servers: All 13 DNS root servers
More informationCS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang
CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly
More informationSubnet Masks. Address Boundaries. Address Assignment. Host. Net. Host. Subnet Mask. Non-contiguous masks. To Administrator. Outside the network
Subnet Masks RFCs 917 922 925 (1984) 932 936 940 950 (1985) First major change to IP after RFC791 Net Host Subnet Mask 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Net Bits set indicate net number Bits clear indicate
More informationConfiguring IP SLAs LSP Health Monitor Operations
Configuring IP SLAs LSP Health Monitor Operations This module describes how to configure an IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor. LSP health monitors enable you to
More information