10 research outputs found

    Computing Delay-Constrained Least-Cost Paths for Segment Routing is Easier Than You Think

    Full text link
    With the growth of demands for quasi-instantaneous communication services such as real-time video streaming, cloud gaming, and industry 4.0 applications, multi-constraint Traffic Engineering (TE) becomes increasingly important. While legacy TE management planes have proven laborious to deploy, Segment Routing (SR) drastically eases the deployment of TE paths and thus became the most appropriate technology for many operators. The flexibility of SR sparked demands in ways to compute more elaborate paths. In particular, there exists a clear need in computing and deploying Delay-Constrained Least-Cost paths (DCLC) for real-time applications requiring both low delay and high bandwidth routes. However, most current DCLC solutions are heuristics not specifically tailored for SR. In this work, we leverage both inherent limitations in the accuracy of delay measurements and an operational constraint added by SR. We include these characteristics in the design of BEST2COP, an exact but efficient ECMP-aware algorithm that natively solves DCLC in SR domains. Through an extensive performance evaluation, we first show that BEST2COP scales well even in large random networks. In real networks having up to thousands of destinations, our algorithm returns all DCLC solutions encoded as SR paths in way less than a second

    MVP : measuring internet routing from the most valuable points

    No full text
    Scrutinizing BGP routes is part of the everyday tasks that network operators and researchers conduct to monitor their networks and measure Internet routing. This task is facilitated by the expansion of routing information services such as RIPE RIS [2] and Route-Views [3] that collect BGP routes from an increasing number of Vantage Points (VPs). Unfortunately, while more data is often beneficial, in the case of BGP, it involves downloading and processing large volumes of route updates that exhibit a high level of redundancy. Today with more than one billion route updates collected every day, users often have no other option than to focus on a subset of the VP. Because of the highly skewed location of the VP, randomly selecting them may result in a lot of missing information

    Internet Science Moonshot: Expanding BGP Data Horizons

    No full text
    Dramatic growth in Internet connectivity poses a challenge for the resource-constrained data collection efforts that sup- port scientific and operational analysis of interdomain rout- ing. Inspired by tradeoffs made in other disciplines, we ex- plore a fundamental reconceptualization to how we design public BGP data collection architectures: an overshoot-and- discard approach that can accommodate an order of magni- tude increase in vantage points by discarding redundant data shortly after its collection. As defining redundant depends on the context, we design algorithms that filter redundant updates without optimizing for one objective, and evaluate our approach in terms of detecting two noteworthy phenom- ena using BGP data: AS-topology mapping and hijacks. Our approach can generalize to other types of Internet data (e.g., traceroute, traffic). We offer this study as a first step to a potentially new area of Internet measurement research

    Computing Delay-Constrained Least-Cost Paths for Segment Routing is Easier Than You Think

    No full text
    With the growth of demands for quasi-instantaneous communication services such as real-time video streaming, cloud gaming, and industry 4.0 applications, multi-constraint Traffic Engineering (TE) becomes increasingly important. While legacy TE management planes have proven laborious to deploy, Segment Routing (SR) drastically eases the deployment of TE paths and thus became the most appropriate technology for many operators. The flexibility of SR sparked demands in ways to compute more elaborate paths. In particular, there exists a clear need in computing and deploying Delay-Constrained Least-Cost paths (DCLC) for real-time applications requiring both low delay and high bandwidth routes. However, most current DCLC solutions are heuristics not specifically tailored for SR. In this work, we leverage both inherent limitations in the accuracy of delay measurements and an operational constraint added by SR. We include these characteristics in the design of BEST2COP, an exact but efficient ECMP-aware algorithm that natively solves DCLC in SR domains. Through an extensive performance evaluation, we first show that BEST2COP scales well even in large random networks. In real networks having up to thousands of destinations, our algorithm returns all DCLC solutions encoded as SR paths in way less than a second

    Le ProblĂšme Ă  trois Contraintes : Calcul et DĂ©ploiement de Segments de Routage

    No full text
    Longtemps freinĂ©e par des technologies peu extensibles et difficilesĂ  automatiser, l'ingĂ©nierie de trafic retrouve peĂč a peu de son allant. D'une part, les services de communicationĂ©mergents, comme le cloud gaming et l'industrie 4.0, nĂ©cessitent des chemins spĂ©cifiques offrant des garanties strictes. D'autre part, Segment Routing (SR), une technologie de routage par la source plus extensible que le plan de contrĂŽle MPLS, offre aux opĂ©rateurs la possibilitĂ© de dĂ©ployer des chemins contraintsĂ  grandeĂ©chelle. Ces chemins peuvent par exemple respecter une contrainte de latence maximum tout en minimisant le "coĂ»t interne" pour l'opĂ©rateur (coĂ»t IGP). En effet, ce type de chemins est requis pour les applications nĂ©cessitant un haut niveau d'interactivitĂ© sans nĂ©gliger la bande passante. Cependant, calculer de telles routes multi-contraintes est un problĂšme NP-Difficile bien connu : DCLC. Bien que de nombreuses solutions existent, elles ne sont pas adaptĂ©esĂ  Segment Routing qui ajoute une contrainte opĂ©rationnelle aux deux contraintes de qualitĂ© de service. De plus, ces propositions n'offrent gĂ©nĂ©ralement pas de garanties fortes en terme de temps d'exĂ©cution. Dans ce travail, afin de proposer une solution exacte mais pratique et efficace, nous tirons parti des avantages et inconvĂ©nients de SR ainsi que des limites inhĂ©rentes aux rĂ©seaux d'opĂ©rateurs. Notre algorithme, BEST2COP, conçu pour etre massivement parallĂ©lisable, rĂ©sout efficacement DCLC mĂȘme lorsque la double valuation du graphe est alĂ©atoire. Que ce soit sur des graphes aux structures rĂ©elles ou alĂ©atoires, BEST2COP rĂ©sout DCLC en largement moins d'une seconde sur des domaines SR de plus de mille noeuds

    The multiple roles that IPv6 addresses can play in today's internet

    No full text
    The Internet use IP addresses to identify and locate network interfaces of connected devices. IPv4 was introduced more than 40 years ago and specifies 32-bit addresses. As the Internet grew, available IPv4 addresses eventually became exhausted more than ten years ago. The IETF designed IPv6 with a much larger addressing space consisting of 128-bit addresses, pushing back the exhaustion problem much further in the future. In this paper, we argue that this large addressing space allows reconsidering how IP addresses are used and enables improving, simplifying and scaling the Internet. By revisiting the IPv6 addressing paradigm, we demonstrate that it opens up several research opportunities that can be investigated today. Hosts can benefit from several IPv6 addresses to improve their privacy, defeat network scanning, improve the use of several mobile access network and their mobility as well as to increase the performance of multicore servers. Network operators can solve the multihoming problem more efficiently and without putting a burden on the BGP RIB, implement Function Chaining with Segment Routing, differentiate routing inside and outside a domain given particular network metrics and offer more fine-grained multicast services

    Deploying Near-Optimal Delay-Constrained Paths with Segment Routing in Massive-Scale Networks

    No full text
    With a growing demand for quasi-instantaneous communication services such as real-time video streaming, cloud gaming, and industry 4.0 applications, multi-constraint Traffic Engineering (TE) becomes increasingly important. While legacy TE management planes have proven laborious to deploy, Segment Routing (SR) drastically eases the deployment of TE paths and is thus increasingly adopted by Internet Service Providers (ISP). There is a clear need in computing and deploying Delay-Constrained Least-Cost paths (DCLC) with SR for real-time interactive services. However, most current DCLC solutions are not tailored for SR. They also often lack efficiency or guarantees. Similarly to approximation schemes, we argue that the challenge is to design an algorithm providing both performances and guarantees. However, conversely to most of these schemes, we also consider operational constraints to provide a practical, high-performance implementation. We leverage the inherent limitations of delay measurements and account for the operational constraint added by SR to design a new algorithm, best2cop, providing guarantees and performance in all cases. Best2cop outperforms a state-of-the-art algorithm on both random and real networks of up to 1000 nodes. Relying on commodity hardware with a single thread, our algorithm retrieves all non-superfluous 3-dimensional routes in only 250ms and 100ms respectively. This execution time is further reduced using multiple threads, as the design of best2cop enables a speedup almost linear in the number of cores. Finally, we extend best2cop to deal with massive scale ISP by leveraging the multi-area partitioning of these deployments. Thanks to our new topology generator specifically designed to model the realistic patterns of such massive IP networks, we show that best2cop solves DCLC-SR in approximately 1 second even for ISP having more than 100000 routers

    A System to Detect Forged-Origin Hijacks

    No full text
    Despite global efforts to secure Internet routing, attack- ers still successfully exploit the lack of strong BGP security mechanisms. This paper focuses on an attack vector that is frequently used: Forged-origin hijacks, a type of BGP hijack where the attacker manipulates the AS path to make it im- mune to RPKI-ROV filters and appear as legitimate routing updates from a BGP monitoring standpoint. Our contribution is DFOH, a system that quickly and consistently detects forged- origin hijacks in the whole Internet. Detecting forged-origin hijacks boils down to inferring whether the AS path in a BGP route is legitimate or has been manipulated. We demonstrate that current state-of-art approaches to detect BGP anomalies are insufficient to deal with forged-origin hijacks. We identify the key properties that make the inference of forged AS paths challenging, and design DFOH to be robust against real-world factors (e.g., data biases). Our inference pipeline includes two key ingredients: (i) a set of strategically selected features, and (ii) a training scheme adapted to topological biases. DFOH detects 90.9% of the forged-origin hijacks within only ≈5min. In addition, it only reports ≈17.5 suspicious cases every day for the whole Internet, a small number that allows operators to investigate the reported cases and take countermeasures
    corecore