Efficient discovery of network topology and routing policy in

Embed Size (px)

DESCRIPTION

 

Text of Efficient discovery of network topology and routing policy in

  • 1. Efcient discovery of network topology and routing policy in the Internet Neil Timothy Spring A dissertation submitted in partial fulllment of the requirements for the degree of Doctor of Philosophy University of Washington 2004 Program Authorized to Offer Degree: Computer Science and Engineering
  • 2. University of Washington Graduate School This is to certify that I have examined this copy of a doctoral dissertation by Neil Timothy Spring and have found that it is complete and satisfactory in all respects, and that any and all revisions required by the nal examining committee have been made. Co-Chairs of Supervisory Committee: David J. Wetherall Thomas E. Anderson Reading Committee: Thomas E. Anderson David J. Wetherall John Zahorjan Date:
  • 3. In presenting this dissertation in partial fulllment of the requirements for the doctoral degree at the University of Washington, I agree that the Library shall make its copies freely available for inspection. I further agree that extensive copying of this dissertation is allowable only for scholarly purposes, consistent with fair use as prescribed in the U.S. Copyright Law. Requests for copying or reproduction of this dissertation may be referred to Bell and Howell Information and Learning, 300 North Zeeb Road, Ann Arbor, MI 48106-1346, to whom the author has granted the right to reproduce and sell (a) copies of the manuscript in microform and/or (b) printed copies of the manuscript made from microform. Signature Date
  • 4. University of Washington Abstract Efcient discovery of network topology and routing policy in the Internet by Neil Timothy Spring Co-Chairs of Supervisory Committee: Associate Professor David J. Wetherall Department of Computer Science and Engineering Professor Thomas E. Anderson Department of Computer Science and Engineering Little is known about the structure and conguration of the ISP networks that constitute the Internet. This shortage of information is a consequence of a fundamental principle of the Internet architecture: that constituent ISPs are administered independently. ISP networks connect by a narrow interface that supports the delivery of data but hides the implemen- tation and behavior of a network from its neighbors. One consequence of this isolation between networks is that, although operators have inside information for their own net- works, it is difcult to recognize and x problems that span administrative boundaries. In this dissertation, I focus on what can be discovered by an outsider: a user or re- searcher without access to privileged information. I show that the network topologies and routing policies of ISP networks can be discovered despite the narrowness of the interface between them. To do this, I develop and evaluate techniques to measure structured, router- level ISP network topologies and infer intra-domain and peering routing policies. To make these techniques efcient, I use a philosophy of choosing to collect only measurements
  • 5. likely to yield new information. This enables the techniques to run on a large network measurement platform, composed of hundreds of public traceroute servers, to produce an accurate result. I applied and evaluated my techniques to map ten diverse ISP networks and characterize the routing policies of 65 ISP networks. The results are a set of ISP topologies that are several times more complete than previous maps and the rst quantitative study of peering routing policy. This data highlights the diversity of ISP networks and can be used by others to better understand network operation and protocol design choices.
  • 6. TABLE OF CONTENTS List of Figures iv List of Tables vii Chapter 1: Introduction 1 1.1 Benets of Measured Topologies and Routing Policies . . . . . . . . . . . 3 1.2 Challenges and Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.3 Thesis and Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.4 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Chapter 2: Background 12 2.1 Internet Topology Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.2 Internet Routing Policy Concepts . . . . . . . . . . . . . . . . . . . . . . . 19 Chapter 3: Related Work 25 3.1 Traceroute and Active Measurement . . . . . . . . . . . . . . . . . . . . . 25 3.2 BGP Routing Information . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 3.3 DNS Naming Information . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Chapter 4: ISP Topology Mapping 38 4.1 Choosing Traceroutes for Efcient ISP Topology Mapping . . . . . . . . . 39 4.2 Resolving IP Aliases to Routers . . . . . . . . . . . . . . . . . . . . . . . 48 4.3 Decoding DNS Names to Find Structure . . . . . . . . . . . . . . . . . . . 52 4.4 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 i
  • 7. 4.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Chapter 5: ISP Topology Mapping Evaluation 59 5.1 The ISPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 5.2 Efciency of Traceroute Collection . . . . . . . . . . . . . . . . . . . . . . 61 5.3 Agreement Between Alias Resolution Methods . . . . . . . . . . . . . . . 75 5.4 Efciency of Alias Resolution . . . . . . . . . . . . . . . . . . . . . . . . 83 5.5 Completeness and Consistency of Inferred Geographic Locations . . . . . . 89 5.6 Accuracy of the Resulting Maps . . . . . . . . . . . . . . . . . . . . . . . 94 5.7 Sampling Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 5.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Chapter 6: Network Routing Policy Inference 111 6.1 Intra-domain Routing Policy Inference . . . . . . . . . . . . . . . . . . . . 112 6.2 Intra-domain Routing Model Accuracy . . . . . . . . . . . . . . . . . . . . 122 6.3 Measurements for Studying Peering Routing Policy . . . . . . . . . . . . . 128 6.4 Peering Routing Policy Inference . . . . . . . . . . . . . . . . . . . . . . . 136 6.5 Peering Routing Model Predictiveness . . . . . . . . . . . . . . . . . . . . 144 6.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Chapter 7: ISP Maps and Analyses 148 7.1 Measured Router-level ISP Maps . . . . . . . . . . . . . . . . . . . . . . . 149 7.2 Analysis of the Measured Router-level ISP Topologies . . . . . . . . . . . 152 7.3 Analysis of Routing Policies . . . . . . . . . . . . . . . . . . . . . . . . . 164 7.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 ii
  • 8. Chapter 8: Conclusions and Future Work 176 8.1 Thesis and Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 8.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Bibliography 185 iii
  • 9.

Recommended

View more >