+ All Categories
Home > Documents > Topology Pp t

Topology Pp t

Date post: 04-Apr-2018
Category:
Upload: manikantan-pn-naidu
View: 224 times
Download: 0 times
Share this document with a friend

of 74

Transcript
  • 7/29/2019 Topology Pp t

    1/74

    Network Topology

    ELEG 667-013 Spring 2003

  • 7/29/2019 Topology Pp t

    2/74

    Outline:

    Why Network Topology is Important ?

    Modeling Internet Topology

    Complex Networks

    Scale-free Networks Power-laws of the Web

    Search in power-law networks: GNUTELLA, a P2P

    example.

  • 7/29/2019 Topology Pp t

    3/74

    Design Efficient Protocols

    Solve Internetworking Problems:

    - routing

    - resource reservation

    - administration

    Create Accurate Model for Simulation

    Derive Estimates for Topological Parameters

    Study Fault Tolerance and Anti-Attack Properties

    Why Topology is Important ?

  • 7/29/2019 Topology Pp t

    4/74

    Modeling Internet Topology [1]:

    Graph representation

    Router-level modeling

    - vertices are routers

    -edges are one-hop IP connectivity

    Domain- (AS-) level model (high degree of abstraction)

    - vertices are domains (ASes)

    - edges are peering relationships

    Nodes can be assigned numbers rep. e.g. buffer

    capacity

    Edges migth have weights rep. e.g.prop. delay,

    bandwidth capacity.

  • 7/29/2019 Topology Pp t

    5/74

    Modeling Internet Topology [1]:

    access networks

    hosts/endsystems

    routers

    domains/autonomous systemsexchange point

    stub domains

    transit domains

    border routerspeering

    lowly worm

  • 7/29/2019 Topology Pp t

    6/74

    Barabasi Albert Model (BA Model):

    Basis for most current topology generators Very simplistic modelNetwork evolves in size over time.Preferential Connectivity

    Probability that a newly added node will attach to node i

    Many extensions.

    jj

    ii

    k

    kk

    )(

  • 7/29/2019 Topology Pp t

    7/74

    Waxman Model:

    Router level model Nodes placed at random in 2D

    space with dimension L

    Probability of edge (u,v):

    a*e(-d / (bL) )

    , where d isEuclidean distance (u,v), a and

    b are constants

    Models locality

    - no sense of backbone or hierarchy

    -does not guarantee connected

    network

    - as #nodes the #links

    proportionally

    v

    ud(u,v)

  • 7/29/2019 Topology Pp t

    8/74

    Transit-Stub Model:

    Router level model

    Transit domains

    placed in 2D space

    populated with routers connected to each other

    Stub domains

    placed in 2D space

    populated with routers

    connected to transit domains

    Models hierarchy

    Edge count, guaranteed connectivity

  • 7/29/2019 Topology Pp t

    9/74

    Transit-Stub Model:

    No concept of a host all nodes are routers. Two level hierarchy First generate a number of transit domains,then generate a set of stub networks.

    Given average edge-count, produce arandom graph, making sure that it isconnected.

  • 7/29/2019 Topology Pp t

    10/74

    Inet:

    Generate degree sequence

    Build spanning tree over nodeswith degree larger than 1, using

    preferential connectivity randomly select node u not in

    tree

    join u to existing node v with

    probability d(v)/

    d(w)Connect degree 1 nodes usingpreferential connectivity

    Add remaining edges using

    preferential connectivity

  • 7/29/2019 Topology Pp t

    11/74

    BRITE:

    Generate small backbone, withnodes placed:

    randomly or

    concentrated (skewed)

    Add nodes one at a time(incremental growth)

    New node has constant # ofedges connected using:

    preferential connectivityand/or

    locality

  • 7/29/2019 Topology Pp t

    12/74

    Complex Networks:

    Two limiting-case topologies have been extensively considered inthe literature [4],[5].:

    regular network(lattice), the chosen topology of innumerable

    physical models such as the Ising model or percolation.

    random graph,studied in mathematics and used both innatural and social sciences. Properties studied in detail by Pal

    Erdos.

    Most of Erdos work concentrated on the case in which the

    number of vertices is kept constant but the total number of linksbetween vertices increases: the Erds-Rnyi result states that for

    many important quantities there is a percolation-like transition at

    a specific value of the average number of links per vertex.

  • 7/29/2019 Topology Pp t

    13/74

    Complex Networks:

    random networks are used in:

    Physics: in studies of dynamical problems, spin

    models and thermodynamics, random walks, and

    quantum chaos.

    Economics and social sciences: to model interacting

    agents.

  • 7/29/2019 Topology Pp t

    14/74

    In contrast to these two limiting topologies, empirical

    evidence suggests that many biological, technological orsocial networks appear to be somewhere in between these

    extremes.

    many real networks seem to share with regular

    networks the concept of neighborhood, which means that

    if vertices i andj are neighbors then they will have many

    common neighbors --- which is obviously not true for a

    random network.

    On the other hand, studies on epidemics show that it

    can take only a few ``steps'' on the network to reach agiven vertex from any other vertex. This is the foremost

    property of random networks, which is not fulfilled by

    regular networks.

    Complex Networks:

  • 7/29/2019 Topology Pp t

    15/74

    Complex Networks:

  • 7/29/2019 Topology Pp t

    16/74

    Complex Networks:

    The Watts-Strogatz model [5]. :

    To bridge the two limiting cases, Watts and Strogatz

    [Nature 393, 440 (1998)] have introduced a new type of

    network which is obtained by randomizing a fractionp ofthe links of the regular network.

    Initial structure (p=0) is the one-dimensional regular

    network where each vertex is connected to itsznearest

    neighbors.

    For0 < p < 1, we denote these networks disordered. for the casep=1, we have a completely random

    network.

  • 7/29/2019 Topology Pp t

    17/74

    Watts and Strogatz report that for a small value of the

    parameterp, there is an onset ofsmall-world behavior.

    It is characterized by the fact that the distance between

    any two vertices is of the order of that for a random

    network and, at the same time, the concept ofneighborhood is preserved.

    The effect of a change inp is extremely nonlinear,

    where a very small change in the connectivity of the

    network leads to a dramatic change in the distance

    between different pairs of vertices.

    Complex Networks:

  • 7/29/2019 Topology Pp t

    18/74

    The scientific question we are trying to answer is: Does

    the onset of the small-world behavior occurs at a given value

    ofp or does it occur for a value of the system size n which

    depends onp?

    To investigate this question, we need to look at the

    behavior of the system as a function ofp for different values

    ofn.

    Complex Networks:

  • 7/29/2019 Topology Pp t

    19/74

    Complex Networks:

  • 7/29/2019 Topology Pp t

    20/74

    Complex Networks:

    The appearance of the small-world behavior is not a phase-

    transition but a crossover phenomena.

    The average distance lis:

    l (n,p) ~ n* F ( n / n* )

    where:F(u > 1) ~ln u, and n* is a function ofp.

    When the average number of rewired links,pnz/2, is much less

    than one, the network should be in the large-world regime. On theother hand, whenpnz/2 >> 1, the network should be a small-world.

  • 7/29/2019 Topology Pp t

    21/74

    Scale-free networks:

    It was proposed by Barabsi and Albert that real-world

    networks in general arescale-free networks.

    Scale-free networks have a distribution of connectivities that

    decays with a power-law tail.

    Scale-free networks emerge in the context of a growingnetwork in which new vertices connect preferentially to the

    more highly connected vertices in the network. Scale free

    networks are also small-world networks because (i) they have

    clustering coefficients much larger than random networks, and(ii) their diameter increases logarithmically with the number of

    vertices n.

  • 7/29/2019 Topology Pp t

    22/74

    What are Power Laws ?

    kkP )( Distribution that fits :

    Characteristic property of Scale free networks

    Occur very often in Complex Systems literature.

    Many complicated real world networks obey power laws

  • 7/29/2019 Topology Pp t

    23/74

    Implications of Power Laws:

    Majority of nodes have small connectivity.

    Few nodes have very large connectivity.

    Good resistance to random failure.

    Small resistance to planned attack.

    Could imply existence of some hierarchy (all real worldpower law networks support this).

    However, it is not clear whether

    Power Law Hierarchy

  • 7/29/2019 Topology Pp t

    24/74

    Power laws are an observed (empirical) phenomenon.

    The mechanisms that produce these can only beguessed at (for now!)

    Very typical in self organizing systems and chaoticsystems.

    Origin of Power Law:

  • 7/29/2019 Topology Pp t

    25/74

    Scale-free networks:

    (a) the neuronal network of the worm C. elegans.

    (b) world-wide web.(c) the network of citations of scientific papers.

    Scale-free networks:

  • 7/29/2019 Topology Pp t

    26/74

    broad-scale networks: or truncated scale-free networks,

    characterized by a connectivity distribution that has a power-law regime followed by a sharp cut-off, like an exponential or

    Gaussian decay of the tail.

    single-scale networks: characterized by a connectivity

    distribution with a fast decaying tail, such as exponential orGaussian

    Scale-free networks:

    Aging of the vertices: The vertex is still part of the network

    and contributing to network statistics, but it no longer receives

    links. The aging of the vertices thus limits the preferential

    attachment preventing a scale-free distribution of connectivities.

    Cost of adding links to the vertices or the limited capacity of

    a vertex: physical costs of adding links and limited capacity of a

    vertex will limit the number of possible links attaching to a

    given vertex.

  • 7/29/2019 Topology Pp t

    27/74

    Power-laws of the Web [2].:

    How many links on a page (outdegree)?

    How many links to a page (indegree)?

    Probability that a random page has kother pages

    pointing to it is ~k-2.1

    (Power law)

    Probability that a random page points to kother pages is~k

    -2.7(Power law)

  • 7/29/2019 Topology Pp t

    28/74

    In-degree Distribution

  • 7/29/2019 Topology Pp t

    29/74

    Out-degree Distribution

  • 7/29/2019 Topology Pp t

    30/74

    Search in power-law networks: GNUTELLA [3].

    Most of the P2P networks display a power-law

    distribution in their node degree. This distributionreflects the existence of a few nodes with very high

    degree and many with low degree.

    In P2P networks, the name of the target file may be

    known, but due to the networks ad hoc nature, the nodeholding the file may not be known until a real-time

    search is performed.

    A simple strategy to locate files, implemented by

    NAPSTER, is to use a central server that contains an

    index of all the files every node is sharing as they join

    the network.

    GNUTELLA and FREENET do not use a central

    server.

  • 7/29/2019 Topology Pp t

    31/74

    Search in power-law networks: GNUTELLA [3].

    GNUTELLA is a peer-to-peer file-sharing system that treats

    all client nodes as functionally equivalent and lacks a centralserver that can store file location information. This is advantageous

    because it presents no central point of failure.

    The obvious disadvantage is that the location of files is unknown.

    When a user wants to download a file, he sends a query toall the nodes within a neighborhood of size ttl, the time to

    live assigned to the query. Every node passes on the query to

    all of its neighbors and decrements the ttl by one. In this

    way, all nodes within a given radius of the requesting node

    will be queried for the file, and those who have matching

    files will send back positive answers.

  • 7/29/2019 Topology Pp t

    32/74

    Search in power-law networks: GNUTELLA [3].

    This broadcast method will find the target file quickly,

    given that it is located within a radius of ttl. However, broadcasting

    is extremely costly in terms of bandwidth.

    Such a search strategy does not scale well. As query traffic

    increases linearly with the size of GNUTELLA graph, nodes

    become overloaded.

  • 7/29/2019 Topology Pp t

    33/74

    Typically, a GNUTELLA client wishing to join the networkmust find the IP address of an initial node to connect to.

    Currently, ad hoclists of good GNUTELLA clients exist.

    It is reasonable to suppose that this ad hocmethod of

    growth would bias new nodes to connect preferentially tonodes that are already fairly well connected, since these

    nodes are more likely to be well known.

    Based on models of graph growthwhere the rich get richer,

    the power-law connectivity of ad hocpeer-to-peer networks may

    be a fairly general topological feature.

    Search in power-law networks: GNUTELLA [3].

  • 7/29/2019 Topology Pp t

    34/74

    Search in power-law networks: GNUTELLA [3].

    By passing the query to every single node in the network,the GNUTELLA algorithm fails to take advantage of the

    connectivity distribution [3].

    To take advantage of the power-law distribution, we can modify

    each node to keep lists of files stored in first and second neighbor. Instead of passing the query to every node, now we can pass it

    only to the nodes with highest connectivity.

    High degree nodes are presumably high bandwidth node that can

    handle the query traffic.

  • 7/29/2019 Topology Pp t

    35/74

    Outline:

    Internet Structure&Organization

    Internet Hierarchical Structure ISPs, interconnection and organization [ref. 7].

    POP Architecture and Load Balancing

    ISP Architecture [ref. 7]. in detail

    Topology Mapping Tool: Rocketfuel[ref. 8] Discussion

    ELEG 667-013 Spring 2003

  • 7/29/2019 Topology Pp t

    36/74

    Basic Internet Architecture

  • 7/29/2019 Topology Pp t

    37/74

    Basic Architecture: NAPs and nationalISPs

    The Internet has a hierarchical structure.

    At the highest level are large national InternetService Providers that interconnect through Network

    Access Points (NAPs).There are about a dozen NAPs in the U.S., run bycommon carriers such as Sprint and Ameritech, andmany more around the world.

    Regional ISPs interconnect with national ISPs whichprovide services to local ISPs who, in turn, sell accessto individuals.

  • 7/29/2019 Topology Pp t

    38/74

    Basic Architecture: MAEs and local ISPs

    As the number of ISPs has grown, a new type ofnetwork access point, called a metropolitan areaexchange (MAE) has arisen.

    There are about 50 such MAE around the U.S. today.Sometimes large regional and local ISPs also haveaccess directly to NAPs.

  • 7/29/2019 Topology Pp t

    39/74

    Internet Packet Exchange Charges

    ISP at the same level usually do not charge eachother for exchanging messages.

    This is called peering.

    Higher level ISPs, however, charge lower level ones(national ISPs charge regional ISPs which in turncharge local ISPs) for carrying Internet traffic.

    Local ISPs, of course, charge individuals and

    corporate users for access.

  • 7/29/2019 Topology Pp t

    40/74

    Connecting to an ISP

    ISPs provide access to the Internet through a Pointof Presence (POP).

    Individual users access the POP through a dial-up

    line using the PPP protocol.The call connects the user to the ISPs modem pool,after which a remote access server (RAS) checks theuserid and password.

    Once logged in, the user can send TCP/IP/[PPP]

    packets over the telephone line which are then sentout over the Internet through the ISPs POP.

  • 7/29/2019 Topology Pp t

    41/74

    Connecting to an ISP (contd.)

    Corporate users might access the POP using a T-1, T-3

    or ATM OC-3 connections provided by a common carrier.

    T-1 and T-3 lines connect to the ISP POPs CSU/DSUdevice. ChannelServiceUnit/DataServiceUnit.

    The CSU is a device that connects a terminal to a digital

    line. The DSU is a device that performs protective anddiagnostic functions for a telecommunications line. .Typically, the two devices are packaged as a single unit.

    You can think of it as a very high-powered and expensivemodem. Such a device is required for both ends of a T-1 orT-3 connection, and the units at both ends must be set tothe same communications standard.

    http://www.webopedia.com/TERM/C/modem.htmlhttp://www.webopedia.com/TERM/C/T_1_carrier.htmlhttp://www.webopedia.com/TERM/C/T_3_carrier.htmlhttp://www.webopedia.com/TERM/C/T_3_carrier.htmlhttp://www.webopedia.com/TERM/C/T_3_carrier.htmlhttp://www.webopedia.com/TERM/C/T_3_carrier.htmlhttp://www.webopedia.com/TERM/C/T_1_carrier.htmlhttp://www.webopedia.com/TERM/C/T_1_carrier.htmlhttp://www.webopedia.com/TERM/C/T_1_carrier.htmlhttp://www.webopedia.com/TERM/C/modem.html
  • 7/29/2019 Topology Pp t

    42/74

    ISP Point-of Presence

    Modem Pool

    IndividualDial-up Customers

    CorporateT1 Customer

    T1 CSU/DSU

    CorporateT3 Customer

    T3 CSU/DSU

    CorporateOC-3 Customer

    ATM Switch

    Layer-2Switch

    ISP POP

    ISP POP

    ISP POP

    NAP/MAE

    RemoteAccessServer

    ATMSwitch

    Inside an ISP Point of Presence

  • 7/29/2019 Topology Pp t

    43/74

    Internet Organization

    NAP

    NAP

    NAP

    BSP

    ISP

    ISP

    ISP = Internet Service Provider

    BSP = Backbone Service Provider

    NAP = Network Access Point

    POP = Point of Presence

    CN = Customer Network

    POP

    POP

    POP

    ISPPOP

    BSP

    BSPPOP

    POP

    CN

    CN

    CN

    CNCN

    CN

    CN

    CN

    POP

  • 7/29/2019 Topology Pp t

    44/74

    Customer Network

    Clients

    Servers

    LAN

    WAN

    Ethernet10 Mb/s

    T1 Link

    1.54 Mb/s

    Router

  • 7/29/2019 Topology Pp t

    45/74

    NAP Architecture

    ISPBackboneOperator

    ISP ISP

    BackboneOperator

    BackboneOperator

    ISP NAP

    Routers

    Routers

    High-Speed LAN (FDDI, ATM, GigE)RouteServer

  • 7/29/2019 Topology Pp t

    46/74

    Internet structure: network of networks

    roughly hierarchicalat center: tier-1 ISPs (e.g., UUNet, BBN/Genuity, Sprint,AT&T), national/international coverage

    treat each other as equals

    Tier 1 ISP

    Tier 1 ISP

    Tier 1 ISP

    Tier-1providersinterconnect

    (peer)privately

    NAP

    Tier-1 providersalso interconnectat public networkaccess points(NAPs)

  • 7/29/2019 Topology Pp t

    47/74

    Tier-1 ISP: e.g., Sprint

    Sprint US backbone network

  • 7/29/2019 Topology Pp t

    48/74

    Tier-1 IP backbone

    POP

    Point-of-Presence (POP) : A collection of routers andswitches housed in a single location

    The backbone is a set of POPs (usually one per city)

  • 7/29/2019 Topology Pp t

    49/74

    Internet structure: network of networks

    Tier-2 ISPs: smaller (often regional) ISPs Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs

    Tier 1 ISP

    Tier 1 ISP

    Tier 1 ISP

    NAP

    Tier-2 ISPTier-2 ISP

    Tier-2 ISP Tier-2 ISP

    Tier-2 ISP

    Tier-2 ISP paystier-1 ISP forconnectivity torest of Internet tier-2 ISP is

    customeroftier-1 provider

    Tier-2 ISPsalso peerprivately witheach other,interconnectat NAP

  • 7/29/2019 Topology Pp t

    50/74

    Internet structure: network of networks

    Tier-3 ISPs and local ISPs last hop (access) network (closest to end systems)

    Tier 1 ISP

    Tier 1 ISP

    Tier 1 ISP

    NAP

    Tier-2 ISPTier-2 ISP

    Tier-2 ISP Tier-2 ISP

    Tier-2 ISP

    local

    ISP

    local

    ISP

    local

    ISP

    localISP

    localISP Tier 3

    ISP

    local

    ISP

    local

    ISP

    localISP

    Local and tier-3 ISPs arecustomersofhigher tierISPs

    connectingthem to restof Internet

    I t t t t t k f

  • 7/29/2019 Topology Pp t

    51/74

    Internet structure: network ofnetworks

    a packet passes through many networks!

    Tier 1 ISP

    Tier 1 ISP

    Tier 1 ISP

    NAP

    Tier-2 ISPTier-2 ISP

    Tier-2 ISP Tier-2 ISP

    Tier-2 ISP

    local

    ISP

    local

    ISP

    local

    ISP

    localISP

    localISP Tier 3

    ISP

    local

    ISP

    local

    ISP

    localISP

  • 7/29/2019 Topology Pp t

    52/74

    Architecture of a POP

    Backbone

    Router

    Backbone links

    Peering

    Access

    Router

    Access

    Router

    Access

    Router

    ISPs Corporate

    networks

    Web Servers Dial-up

    Access

    Router

    Backbone

    Router

  • 7/29/2019 Topology Pp t

    53/74

    ISP Architecture

    Access Network Architecture

    Dial-up

    ISDN

    DSL

    Dedicated Leased lines

    Frame Relay Service

  • 7/29/2019 Topology Pp t

    54/74

    Dial-up Access Network

    Modem Circuit

    Switch

    Internet Backbone

    Modem Pool

    Router

    Central Office

    ISP POP

    Web Cache

  • 7/29/2019 Topology Pp t

    55/74

    ISDN

    ISDN service access linksterminate at the ISP POP

    Digital signal. Due to signal

    strength limitations, ISDNsubscribers must be within 18000feet of the CO

    At the customers end, an ISDN

    adapter card is required.

  • 7/29/2019 Topology Pp t

    56/74

    DSL

    Modem Circuit

    Switch

    Internet Backbone

    Modem Pool

    Router

    Central Office

    ISP POP

    Web Cache

    DSLAM

  • 7/29/2019 Topology Pp t

    57/74

    DSL Access

    DSL typically provisioned at 1.5Mbpsfrom ISP to customer and at 128kbs inthe reverse direction.

    DSL Access Multiplexer (DSLAM) at COterminates DSL signals from hundredsof customers.

    The IP data is multiplexed into a single

    ATM connection by DSLAM andforwarded to the ISP POP

  • 7/29/2019 Topology Pp t

    58/74

    Dedicated Access

    Leased lines from 56Kbs to155Mbps.

    No multiplexing of othercustomers traffic. Can lead tohigher operational cost.

    Lines terminate at routers in the

    POP.

  • 7/29/2019 Topology Pp t

    59/74

    Frame Relay Service

    Network resembles a star topology, withone leg of the star connected to ISP andother legs connected to different

    customers.

    Frame RelayNetwork

    Router

    Router

    Router

    ISP

    Router

    ISP Architecture: The Backbone

  • 7/29/2019 Topology Pp t

    60/74

    ISP Architecture: The Backbone

    The backbone of a large ISP is typically a WAN spread out across a large

    geographic area.

    Backbone routers connect the individual links composing the backbone .

    ISP Backbone

    Backbone router

    ISP Architecture: Backbone Nodes

  • 7/29/2019 Topology Pp t

    61/74

    ISP Architecture: Backbone Nodes

    ISP Backbone

    Backbone Node

    For reasons of robustness and load management, multiple backbone routers

    can be located in the same geographic location and connected via a LAN.

    We consider all of the backbone routers and the connecting LAN to be

    a backbone node.

    These backbone nodes, whether they contain one or more routers, will serve

    as the points of connection from the outside world to the backbone.

    Backbone Node

  • 7/29/2019 Topology Pp t

    62/74

    ISP Architecture: Access Routers

    Dial-in POP(Downstream)

    ISP Backbone

    Access Router

    Customers such

    as smaller ISPsand enterprises

    (Downstream)

    Customers, including smaller ISPs, enterprise, are connected to backbone nodes

    via access routers. Access routers gain their connectivity to the backbone,

    because they are on the same LAN as one or more backbone routers.

    Remember, the backbone nodes contain backbone routers, as well as these access

    routers.

    Any backbone entry point is known as apoint of presence (POP). Modem entry

    points are known as dial-in POPs ordial-in hubs. Entry points for other types of

    networks are known as broadband POPs.

    ISP Architecture: In Practice

  • 7/29/2019 Topology Pp t

    63/74

    ISP Architecture: In Practice

    Large dial-in POP(Downstream)

    ISP Backbone

    Access Router

    In practice, only the largest customers connect directly to access routers. Other

    customers are aggregated at broadband points of presence (broadband POPs).These are basically LANs. The customers connect to routers on these LANs, and

    then these LANs connect to the access nodes

    Additionally, some very large dial-in POPs do connect directly to backbone routers.

    These typically service very large corporate offices.

    Broadband POP

    BackboneRouter

    ISP A hit t G t

  • 7/29/2019 Topology Pp t

    64/74

    ISP Architecture: Gateways

    Peer ISP

    ISP Backbone

    Gateway Router

    Upstream ISP

    Gateway routers, which are also connected via LANs to backbone routers,

    connect ISPs to each other. The router is known as a gateway router, if it connects

    a peer or upstream ISP.

    Downstream ISPs generally connect via an access router, or directly to a backboneRouter.

    So, a gateway router leads to a peer or upstream provider, whereas an access router leads to

    a downstream network.

    M i ISP T l i ith R k tf l[8]

  • 7/29/2019 Topology Pp t

    65/74

    Measuring ISP Topologies with Rocketfuel[8]:

    Rocketfule internet topology mapping engine

    The goal is to obtain realistic, router-level maps of ISP networks.

    Important influence on:

    - The dynamics of routing protocols

    - The scalability of multicast- The efficacy of proposals for denial-of-service tracing andresponse- Other aspects of protocol performance (Internet pathselection)

    Real topologies are not publicly available- Confidential

  • 7/29/2019 Topology Pp t

    66/74

    Mapping techniques

    Three categories of mapping techniques:

    Selecting Measurements

    Directed probing

    Path reduction

    Alias Resolution

    IP identifier

    Router identification and Annotation

  • 7/29/2019 Topology Pp t

    67/74

    Selecting Measurements

    Directed probing

    To employ BGP tables to identify relevant

    traceroutes and prune the remainderPath reduction

    To identify redundant traceroutes

    Only one traceroutes needs to be taken whentwo traceroutes enter and leave the ISPnetwork at the same point

  • 7/29/2019 Topology Pp t

    68/74

    Alias resolution

    Mercator method

    Sending traceroute-like probe(to a high-

    numbered UDP port but with a TTL of 255)directly to the potentially aliased IPaddress

    Requirement: routers need to be configured to

    send the UDP port unreachable responsewith the address of the outgoing interface asthe source address: Two aliases shouldrespond with the same source

  • 7/29/2019 Topology Pp t

    69/74

    Alias method

    Proposed methods by Spring etc.

    Mercators IP address-based method Comparing IP identifier field of the

    responses

  • 7/29/2019 Topology Pp t

    70/74

    IP identifier hints

    IP identifier helps to identify a packetfor reassembly after fragmentation

    IP identifier is commonly implementedusing a counter that is incrementedafter sending a packet

    Ali l ti b IP id tifi

  • 7/29/2019 Topology Pp t

    71/74

    Alias resolution by IP identifierProcess of alias resolution by IP identifier:

    Ally, a tool for alias resolution, sends aprobe packet to the two potential aliases

    Port unreachable responses, including the IP

    identifiers x and yAlly sends a third packet to the address that

    responded first

    Router Identification &

  • 7/29/2019 Topology Pp t

    72/74

    Router Identification &Annotation

    Using DNS to determine routers ownedby mapped ISP, their geographical

    location and role in the topology

  • 7/29/2019 Topology Pp t

    73/74

    Mapping engine: RocketfuelRocketfuel includes modules:

    BGP table from RouteViews Egress discovery: To find egress routers

    Tasklist generation: To generate a list of directed probes

    Path reductions: To apply ingress and next-hop ASreductions, and generate jobs for execution

    Public traceroute servers Alias resolution: Using IP identifier technique to resolve

    alias problem

    Database

  • 7/29/2019 Topology Pp t

    74/74

    References:

    [1] Kenneth Calvert, Matthew Doar, Ellen Zegura, Modeling Internet

    Topology.

    [2]. Michalis Faloudsos, Petros Faloudsos, Christos Faloudsos, On

    Power-law Relationships of the Internet Topology

    [3]. Lada A. Adamic,1, Rajan M. Lukose,1, Amit R. Puniyani,2, and

    Bernardo A. Huberman1, Search in power-law networks.[4]. L. A. N. Amaral, A. Scala, M. Barthlmy, & H. E. Stanley, 1997,

    Classes of small-world networks.

    http://polymer.bu.edu/~amaral/Content_network.html

    [5]. Ellen Zegura, Kenneth Calvert, How to model an Internetwork

    [6]. Stefan Bornholdt, Holger Ebel, World Wide Web scaling exponentfrom Simons 1955 model

    [7]. S. Halabi and D. McPherson,Internet Routing Architectures, 2nd

    ed., Cisco Press, Indianapolis, 2000.

    [8]. Neil Spring Ratul Mahajan David Wetherall, Measuring ISP


Recommended