1
play

1 Validating Replica Streams - PDF document

Link Utilization Detection and Analysis of Routing Loops Internet backbone link in Packet Traces IMW 2002 Routing loop causes Urs Hengartner, Sue Moon, traffic increase by 25%! Richard Mortier, Christophe Diot 1 2 Advanced


  1. � ✁ Link Utilization Detection and Analysis of Routing Loops Internet backbone link in Packet Traces IMW 2002 Routing loop causes Urs Hengartner, Sue Moon, traffic increase by 25%! Richard Mortier, Christophe Diot 1 2 Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Contributions Loop Detection • Offline algorithm for detecting routing • How can we detect routing loops when looking at packets forwarded by a router? loops in Internet traffic traces. • Results of applying algorithm to backbone traffic traces. – How often do routing loops occur? – How long do they last? – How many packets do they affect? Look for identical packets with decreasing TTL values! – Not: Why do they occur? Replica Stream 3 4 Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Loop Detection Detecting Replica Streams Routing loop ✂☎✄ • Replica stream: Packets Single looped packet crossing a link multiple times. Replica • Packets P and Q are part of the same streams replica stream if Merged Replica Stream – P = Q, except TTL and checksum fields – TTL P – TTL Q ≥ ≥ ≥ 2. ≥ Merged replica stream approximates routing loop! 5 6 Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories 1

  2. � ✁ � ✄ ✂ ✂ ✁ ✁ � ✁ ✁ � ☎ ✂ Validating Replica Streams Merging Replica Streams • Goal: Merge replica streams likely to be • Goal: Discard streams not caused by routing due to the same routing loop. loops. • Merging of replica streams with identical • Verify that all packets to the same destination address prefix (/24) create replicas. destination address prefixes – that overlap in time, or ✂☎✄ – that occur less than one minute apart (no not-looped packets to same prefix in- between). ✂☎✄ 7 8 Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Packet Traces Packet Traces • Traces collected from links in Sprint’s tier-1 Internet backbone. Trace Length Packets Looped Routing • Collection dates: (hours) Total (10 6 ) Packets Loops Nov 8, 2001 and Feb 3, 2002. Backbone 1 24 50 4.839% 852 � loops occur in bursts and can • Link capacities: Backbone 2 7.5 1 677 0.118% 413 affect up to 25% of packets! OC-12 (622 Mbps) links. Backbone 3 11 20 1.687% 1485 • Each link connects two different ASs. Backbone 4 11 1350 0.026% 1568 On average, loops do not affect much traffic, but… 9 10 Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Loop Size Traffic Types (Backbone 2) Loop size corresponds to TTL delta. Most loops have size of 2 11 12 Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories 2

  3. Reasons for Increases Routing Loop Duration • TCP SYN traffic – End point tries to open connection, sends SYN. – SYN loops and expires, no other packets are sent. • UDP traffic > 60% of routing loops – UDP is connectionless, no feedback from receiver. last less than 10s – Sending application is oblivious of loop. • ICMP traffic – Caused by “traceroute” and “ping”. – People are exploring loop. Observations confirm presence of loops! 13 14 Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Advanced Technology Laboratories Conclusions • Routing loops can be detected and analyzed in packet traces. • On the average, loops affect few packets. • Loops are typically 2 hops and persist for <10 seconds. • More detailed explanations require extending data collection techniques to include “complete” routing messages. 15 Advanced Technology Laboratories Advanced Technology Laboratories 3

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend