SlideShare a Scribd company logo
1 of 50
Download to read offline
TASVEER : TOMOGRAPHY
OF INDIA’S INTERNET
INFRASTRUCTURE
RAHUL KUMAR SINGH
ADVISOR :- SAMBUDDHO CHAKRAVARTY
M.Tech Thesis Defense
(28-07-2015)
THESIS COMMITTEE
 Dr. Sambuddho Chakravarty(Advisor), IIIT-Delhi
 Dr. Vinayak Naik(Internal Examiner), IIIT-Delhi
 Dr. Mohan Dhawan(External Examiner), IBM-IRL
2
RESEARCH GOAL
 Through our research we tried to study the topology of networks in
India i.e the organization of Autonomous Systems (ASes) and routers
in India. Specially, our research aims to identify topological properties
and anomalies observed for different ISPs at both AS- and router-level
 The overall questions we tried to answer are such as: Is there some
small set of ASes and routers through that transports a large fraction
of India's Internet traffic ?
3
MOTIVATION
 India which is the second largest nation by population has
approximately 250 million Internet users with 789 ASes whereas US
has over 22k ASes to route traffic for their 300 million Internet users.
Hence, a very small network infrastructure is used in India to route
the traffic of their Internet users.
 Thus, we are trying to find out that with such a relatively small
network infrastructure does there exists some nodes(AS and router)
in the network which is transporting a major or large fraction of
Indian Internet traffic.
4
MOTIVATION
 India totally has 789 Ases, out of these 789 708 are customer Ases.
 The rest 76 ASes are both transit and origin Ases.
 These 76 Ases include 49 ISPs, with 13 of them having providers
outside India. These ASes connect India's Internet traffic to the world
outside.
 Further, a larger concern is related to network and communication
security. Potentially a small fraction of network routers and Ases
transport large fraction of the entire network traffic. Thus an attack
on these routers and ASes could bring down the entire network.
 Alternatively, an adversary could merely snoop on several network
flows by observing flows entering and leaving only these routers.
5
MOTIVATION
6
INTER & INTRA DOMAIN ROUTING
 Today, an Internet can be so large that one routing protocol cannot
handle the task of updating the routing table of all routers. For this
reason , an Internet is divided into autonomous systems.
 An autonomous systems(AS) is a group of networks and routers under
the authority of a single administration. Routing inside an
autonomous system is referred to as intra domain routing. Routing
between autonomous systems is referred to as inter-domain routing.
 Each autonomous systems can choose one or more intra domain
routing protocols to handle routing inside the autonomous systems.
However, only one inter domain routing protocols handles routing
between autonomous systems.
7
INTER & INTRA DOMAIN ROUTING
8
 BGP routing relies on inter AS
relationship[lixin gao, 2001]
 the relationships can be classified
into three categories: provider-to-
customer, customer-to-provider
and peer-to-peer.
 The customer ISP pays the
provider ISP for transit. A p2p
link connects two ISPs who have
agreed to exchange traffic on a
quid pro quo basis.
9
INTER DOMAIN ROUTING POLICIES a.k.a AS
RELATIONSHIPS
VALLEY FREE(Valid Path)
 A valid path between source and destination ASes is one in which for every ISP
providing transit (a transit provider), there is a payee.
 The payee of the transit provider must be its immediate neighbour in the path.
 An invalid path is one in which there is at least one transit provider not paid by a
neighbour in the path.
10
VALLEY FREE(Valid Path)
 81|20033|-1
 81|20197|0
 81|22753|0
 81|22854|-1
 81|26741|-1
 81|27446|-1
 81|29710|-1
 81|29901|-1
 81|32417|-1
 81|33401|-1
 81|36850|-1
 81|40245|-1
 81|46255|-1
 81|46963|-1
11
 OUR RESEARCH IS DIVIDED INTO THREE MAIN PARTS :
- INTER AS PATH ESTIMATION
- INTRA AS ROUTER CONNECTIVITY ESTIMATION
- IDENTIFYING ROUTERS THAT TRANSPORTS LARGE FRACTION
OF TRAFFIC TO IMPORTANT WEBSITES
12
INTER-AS PATH ESTIMATION
13
IDENTIFYING IP PREFIX to AS PATH
 Our algorithms rely on the
snapshots of the BGP
tables from a number of
vantage points.
 AS prefix graph is
extracted from the BGP
table of N given vantage
point ASes.
1.0.4.0/24 1239 174 7545 56203
1.0.4.0/24 3257 174 7545 56203
1.0.4.0/24 293 2828 7545 56203
1.0.4.0/24 1668 6453 7545 56203
1.0.4.0/24 6762 174 7545 56203
1.0.4.0/24 22652 6939 7545 56203
1.0.4.0/24 37100 6939 7545 56203
1.0.4.0/24 2914 2828 7545 56203
1.0.4.0/24 286 6939 7545 56203
1.0.4.0/24 3549 6939 6939 7545 56203
1.0.4.0/24 3741 6939 7545 56203
1.0.4.0/24 6539 577 2828 7545 56203
1.0.4.0/24 1221 4826 38803 56203
1.0.4.0/24 6939 7545 56203
1.0.4.0/24 852 7545 56203
1.0.4.0/24 2152 2828 7545 56203
1.0.4.0/24 5413 2828 7545 56203
1.0.26.0/23 1239 2914 2519
14
IDENTIFYING IP PREFIX to AS PATH(Contd.)
 Given a AS-prefix graph G
and the sure path P of AS u,
for a neighbour of u, say v, if
the new path (v) + P is valid,
i.e. (v) + P = ψ, sure path P
can be extended to an
extended path (v) + P for v.
 For a neighbour of v, say w, if
(wv)+P = ψ, the extended
path (v)+P can be further
extended to (wv) + P for w.
15
16
IDENTIFYING IP PREFIX to AS PATH(Contd.)
17
IDENTIFYING IP PREFIX to AS PATH(Contd.)
18
IDENTIFYING IP PREFIX to AS PATH(Contd.)
BEST PATH SELECTION CRITERIA
 On the basis of path length
 On the basis of uncertain length
 On the basis of frequency index
19
20
IDENTIFYING IP PREFIX to AS PATH(Contd.)
21
AS CONNECTIVITY GRAPH of INDIA
22
FRACTION OF PATHS THROUGH MAJOR ASes
23
NUMBER OF HOSTS BEHIND EACH ASes
INTRA-AS ROUTER
CONNECTIVITY ESTIMATION
24
INTRA-AS ROUTER CONNECTIVITY
 Real topologies for ISPs/AS are not publicly available because ISP
generally regard their router level topologies as confidential.
 To map router level topologies for our targeted ISP we use traceroutes
from various planet lab nodes across the globe.
 Planetlab is a global research network that supports the development of new
network services. It currently consist of 1345 nodes at 671 sites.
 Traceroute that transit the AS/ISP is the one which is of utter
importance to us
25
TRACEROUTE
 Traceroute is a TCP/IP utility that allows a user to trace a network
connection from one location to another, recording every hop along
the way. When a traceroute is run, it returns a list of network hops
and displays the host name and IP address of each connection. It also
returns the amount of time it took for each connection to take place
(usually in milliseconds).
26
SNAPSHOT OF TRACEROUTE
traceroute to facebook.com (173.252.120.6), 30 hops max, 28 byte packets
1 node2-1.realcloud.nl (62.221.205.11) 0.036 ms 0.015 ms 0.012 ms
2 hosted-by.2is.nl (62.221.254.1) 0.205 ms 0.196 ms 0.185 ms
3 2is-10g.nl.jointtransit.nl (217.170.20.187) 0.866 ms 0.861 ms 0.852 ms
4 nikhef-ixr.openpeering.nl (217.170.0.242) 0.874 ms 0.870 ms 0.860 ms
5 er1.ams1.nl.above.net (80.249.208.122) 1.450 ms 1.418 ms 1.416 ms
6 ae2.er3.lga5.us.zip.zayo.com (64.125.31.214) 72.414 ms 72.156 ms 72.236 ms
7 IPYX-100687-870-ZYO.zip.zayo.com (128.177.165.234) 74.356 ms 74.344 ms 74.278 ms
8 be1.bb01.lga1.tfbnw.net (204.15.20.190) 94.558 ms 95.122 ms 95.180 ms
9 be29.bb01.dca1.tfbnw.net (74.119.78.78) 94.991 ms 95.247 ms 94.861 ms
10 be42.bb01.frc3.tfbnw.net (31.13.26.251) 95.569 ms 95.539 ms 94.751 ms
11 ae62.dr02.frc3.tfbnw.net (173.252.65.103) 94.197 ms 94.911 ms 94.505 ms
12 edge-star-shv-12-frc3.facebook.com (173.252.120.6) 94.320 ms 94.504 ms 94.251 ms
27
TRACEROUTE from VARIOUS PLANETLAB NODES
28
ALIAS RESOLUTION
 Aliases are two different ip address which are associated with
different interfaces of same router.
 Without alias resolution ISP topology would go horribly wrong .
 If the different addresses that represent the same router cannot be
resolved, we get a different topology with more routers and links than
the real one.
29
ALIAS RESOLUTION
30
TRACEROUTE MAP
WITHOUT ALIAS
RESOLUTION
TRACEROUTE MAP
WITH ALIAS
RESOLUTION
IP 2 & IP 3 are aliases
i.e they are the part
of same router but
different interfaces.
GRAPHS BETWEEN NUMBER OF
ROUTERS AND NUMBER OF
TRACEROUTE FLOWS THAT PASS
THROUGH THEM
31
for AIRTEL
32
for NETMAGIC
33
for TATA
34
IDENTIFYING ROUTERS THAT
TRANSPORTS LARGE FRACTION
OF TRAFFIC TO VARIOUS
IMPORTANT WEBSITES
35
APPROACH
 Similar to the aforementioned efforts, we tried to identify routers that
transport large fraction of traffic to various important destination
within India e.g. important government sites, defence websites, banks
etc.
 The process for identifying such routers was very similar to the one
used for identifying the important routers in each AS. We emulated
the Rocketfuel technique that involved launching traceroute from
various PlanetLab sites to the chosen destinations.
 Thereafter, alias resolution was applied to identify unique routers in
each of the paths that were output by traceroute.
 Finally, centrality approach was applied to each path to identify the
critical routers that transported large number of traceroute flows.
36
CRITICAL ROUTERS IN THE PATH OF IMPORTANT
POWER GENERATION & DISTRIBUTION SITES
37
CRITICAL ROUTERS IN THE PATH OF IMPORTANT
FINANCIAL INSTITUTION
38
CRITICAL ROUTERS IN THE PATH OF IMPORTANT
DEFENSE WEBSITES
39
CONCLUSION
 Large number of Internet users in India, there are only 13 ASes which
connects India's Internet to the world outside which is relatively very
less compared to other developed nations.
 99.61% of Internet traffic flows through top 12 ASes of India
 52.68% of total traceroute probes flows through top 15 critical
routers for Airtel.
 33.73% of total traceroute probes flows through top 15 critical
routers for Netmagic.
 40.40% of total traceroute probes flows through top 15 critical
routers for Tata.
40
SUMMARY OF CONTRIBUTIONS
 Developed the AS connectivity graph of India and figured out some
crucial statistics based on that graph.
 Mapped the router connectivity graph of major Internet players in
India and based on that graph figured out some vital information
about them.
 Developed the network maps showing the connectivity of routers
leading to several important networked installations within the
country and identification of critical routers leading to those
networked installations
41
DISCUSSION & FUTURE WORK
 A part of our research motivation was to answer questions like - Does
there exists a small set of ASes and routers through that transports
large fractions of India's Internet traffic?
 we would collaborate with ISPs to determine what level of
information is available and use our results as to study the actual
engineering efforts that an attacker needs to employ to launch
various kinds of attacks (Denial of Service, Eavesdropping etc.) on a
large fraction of the network traffic.
42
REFERENCES
 Donnet, B., and Friedman, T. Internet topology discovery: a survey.
Communications Surveys & Tutorials, IEEE 9, 4 (2007)
 Gao, L. On inferring autonomous system relationships in the internet.
IEEE/ACM Transactions on Networking (ToN) 9, 6 (2001)
 Keys, K., Hyun, Y., Luckie, M., and Claffy, K. Internet-scale ipv4 alias
resolution with midar. IEEE/ACM Transactions on Networking (TON) 21, 2
(2013)
 Qiu, J., and Gao, L. As path inference by exploiting known as paths. In
Proceedings of IEEE GLOBECOM (2005)
 Spring, N., Mahajan, R., and Wetherall, D. Measuring isp topologies with
rocketfuel. In ACM SIGCOMM Computer Communication Review (2002),
vol. 32, ACM
43
REFERENCES
 Hurricane electric bgp toolkit-www.bgp.he.net
 Planetlab http://www.planet-lab.org/
 Route views project, university of oregon-routeviews.org
 Govindan, R., and Tangmunarunkit, H. Heuristics for internet map
discovery. In INFOCOM 2000. Nineteenth Annual Joint Conference of
the IEEE Computer and Communications Societies. Proceedings. IEEE
(2000), vol. 3, IEEE
 McRobb, D., Claffy, K., and Monk, T. Skitter: Caidas macroscopic
internet topology discovery and tracking tool, 1999
44
THANK YOU
APPENDICES
46
CRITICAL ROUTERS IN THE PATH OF POPULAR E-
COMMERCE SITES
47
CRITICAL ROUTERS IN THE PATH OF WELL LNOWN
HOSPITALS WEBSITES
48
CRITICAL ROUTERS IN THE PATH OF IMPORTANT
INDIAN GOVERNMENT INSTITUTION
49
CRITICAL ROUTERS IN THE PATH OF IMPORTANT
EDUCATIONAL INSTITUTION
50

More Related Content

What's hot

Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)IISRT
 
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2Krishna Nanda
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศKaii Eiei
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศKaii Eiei
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-junkut3
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...inventionjournals
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
 
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...sipij
 
An Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing AlgorithmAn Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing Algorithminventionjournals
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 

What's hot (18)

Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)
 
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
01 wireless networks
01 wireless networks01 wireless networks
01 wireless networks
 
Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
GPRS : Architecture and Applications
GPRS : Architecture and ApplicationsGPRS : Architecture and Applications
GPRS : Architecture and Applications
 
Project on GPRS
Project on GPRSProject on GPRS
Project on GPRS
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
 
Gprs
GprsGprs
Gprs
 
Chapter4 l4
Chapter4 l4Chapter4 l4
Chapter4 l4
 
GPRS
GPRSGPRS
GPRS
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
 
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...
 
An Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing AlgorithmAn Approach using Local Information to Build QoS Routing Algorithm
An Approach using Local Information to Build QoS Routing Algorithm
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 

Similar to TASVEER : Tomography of India’s Internet Infrastructure

Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTINGanilinvns
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 
Offering Anomymity Protection With Anonymous...
Offering Anomymity Protection With Anonymous...Offering Anomymity Protection With Anonymous...
Offering Anomymity Protection With Anonymous...Laura Miller
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewIRJET Journal
 
Essay On IS3220 Final Exam
Essay On IS3220 Final ExamEssay On IS3220 Final Exam
Essay On IS3220 Final ExamStacey Wilson
 
Routing Algorithms For The Network
Routing Algorithms For The NetworkRouting Algorithms For The Network
Routing Algorithms For The NetworkMary Stevenson
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Cisco Service Provider Mobility
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...IRJET Journal
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
 

Similar to TASVEER : Tomography of India’s Internet Infrastructure (20)

Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
IP ROUTING
IP ROUTINGIP ROUTING
IP ROUTING
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
Offering Anomymity Protection With Anonymous...
Offering Anomymity Protection With Anonymous...Offering Anomymity Protection With Anonymous...
Offering Anomymity Protection With Anonymous...
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
Final isp
Final ispFinal isp
Final isp
 
C017371624
C017371624C017371624
C017371624
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
 
Essay On IS3220 Final Exam
Essay On IS3220 Final ExamEssay On IS3220 Final Exam
Essay On IS3220 Final Exam
 
Routing Algorithms For The Network
Routing Algorithms For The NetworkRouting Algorithms For The Network
Routing Algorithms For The Network
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANET
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 

More from Cybersecurity Education and Research Centre

Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Cybersecurity Education and Research Centre
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Cybersecurity Education and Research Centre
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Cybersecurity Education and Research Centre
 

More from Cybersecurity Education and Research Centre (17)

Automated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social NetworksAutomated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social Networks
 
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
 
Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Identification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A SurveyIdentification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A Survey
 
Clotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and IncorrectClotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and Incorrect
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling�Clotho: Saving Programs from Malformed Strings and Incorrect String-handling�
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
 
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsAnalyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
 
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing PageEmerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
 
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on TwitterBroker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
 
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasuresExploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasures
 
The future of interaction & its security challenges
The future of interaction & its security challengesThe future of interaction & its security challenges
The future of interaction & its security challenges
 

Recently uploaded

Test of Significance of Large Samples for Mean = µ.pptx
Test of Significance of Large Samples for Mean = µ.pptxTest of Significance of Large Samples for Mean = µ.pptx
Test of Significance of Large Samples for Mean = µ.pptxHome
 
Nodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxNodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxwendy cai
 
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Apollo Techno Industries Pvt Ltd
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...amrabdallah9
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...soginsider
 
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxUNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxrealme6igamerr
 
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....santhyamuthu1
 
Design of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxDesign of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxYogeshKumarKJMIT
 
Gender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 ProjectGender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 Projectreemakb03
 
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Sean Meyn
 
Multicomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfMulticomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfGiovanaGhasary1
 
ASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderjuancarlos286641
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfNaveenVerma126
 
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...Amil baba
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Amil baba
 
Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...sahb78428
 

Recently uploaded (20)

Test of Significance of Large Samples for Mean = µ.pptx
Test of Significance of Large Samples for Mean = µ.pptxTest of Significance of Large Samples for Mean = µ.pptx
Test of Significance of Large Samples for Mean = µ.pptx
 
Lecture 4 .pdf
Lecture 4                              .pdfLecture 4                              .pdf
Lecture 4 .pdf
 
Nodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxNodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptx
 
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
 
Lecture 2 .pdf
Lecture 2                           .pdfLecture 2                           .pdf
Lecture 2 .pdf
 
Lecture 2 .pptx
Lecture 2                            .pptxLecture 2                            .pptx
Lecture 2 .pptx
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
 
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxUNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
 
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
 
Design of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxDesign of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptx
 
Gender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 ProjectGender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 Project
 
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
 
Multicomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfMulticomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdf
 
ASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entender
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
 
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
 
Présentation IIRB 2024 Chloe Dufrane.pdf
Présentation IIRB 2024 Chloe Dufrane.pdfPrésentation IIRB 2024 Chloe Dufrane.pdf
Présentation IIRB 2024 Chloe Dufrane.pdf
 
Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...
 

TASVEER : Tomography of India’s Internet Infrastructure

  • 1. TASVEER : TOMOGRAPHY OF INDIA’S INTERNET INFRASTRUCTURE RAHUL KUMAR SINGH ADVISOR :- SAMBUDDHO CHAKRAVARTY M.Tech Thesis Defense (28-07-2015)
  • 2. THESIS COMMITTEE  Dr. Sambuddho Chakravarty(Advisor), IIIT-Delhi  Dr. Vinayak Naik(Internal Examiner), IIIT-Delhi  Dr. Mohan Dhawan(External Examiner), IBM-IRL 2
  • 3. RESEARCH GOAL  Through our research we tried to study the topology of networks in India i.e the organization of Autonomous Systems (ASes) and routers in India. Specially, our research aims to identify topological properties and anomalies observed for different ISPs at both AS- and router-level  The overall questions we tried to answer are such as: Is there some small set of ASes and routers through that transports a large fraction of India's Internet traffic ? 3
  • 4. MOTIVATION  India which is the second largest nation by population has approximately 250 million Internet users with 789 ASes whereas US has over 22k ASes to route traffic for their 300 million Internet users. Hence, a very small network infrastructure is used in India to route the traffic of their Internet users.  Thus, we are trying to find out that with such a relatively small network infrastructure does there exists some nodes(AS and router) in the network which is transporting a major or large fraction of Indian Internet traffic. 4
  • 5. MOTIVATION  India totally has 789 Ases, out of these 789 708 are customer Ases.  The rest 76 ASes are both transit and origin Ases.  These 76 Ases include 49 ISPs, with 13 of them having providers outside India. These ASes connect India's Internet traffic to the world outside.  Further, a larger concern is related to network and communication security. Potentially a small fraction of network routers and Ases transport large fraction of the entire network traffic. Thus an attack on these routers and ASes could bring down the entire network.  Alternatively, an adversary could merely snoop on several network flows by observing flows entering and leaving only these routers. 5
  • 7. INTER & INTRA DOMAIN ROUTING  Today, an Internet can be so large that one routing protocol cannot handle the task of updating the routing table of all routers. For this reason , an Internet is divided into autonomous systems.  An autonomous systems(AS) is a group of networks and routers under the authority of a single administration. Routing inside an autonomous system is referred to as intra domain routing. Routing between autonomous systems is referred to as inter-domain routing.  Each autonomous systems can choose one or more intra domain routing protocols to handle routing inside the autonomous systems. However, only one inter domain routing protocols handles routing between autonomous systems. 7
  • 8. INTER & INTRA DOMAIN ROUTING 8
  • 9.  BGP routing relies on inter AS relationship[lixin gao, 2001]  the relationships can be classified into three categories: provider-to- customer, customer-to-provider and peer-to-peer.  The customer ISP pays the provider ISP for transit. A p2p link connects two ISPs who have agreed to exchange traffic on a quid pro quo basis. 9 INTER DOMAIN ROUTING POLICIES a.k.a AS RELATIONSHIPS
  • 10. VALLEY FREE(Valid Path)  A valid path between source and destination ASes is one in which for every ISP providing transit (a transit provider), there is a payee.  The payee of the transit provider must be its immediate neighbour in the path.  An invalid path is one in which there is at least one transit provider not paid by a neighbour in the path. 10
  • 11. VALLEY FREE(Valid Path)  81|20033|-1  81|20197|0  81|22753|0  81|22854|-1  81|26741|-1  81|27446|-1  81|29710|-1  81|29901|-1  81|32417|-1  81|33401|-1  81|36850|-1  81|40245|-1  81|46255|-1  81|46963|-1 11
  • 12.  OUR RESEARCH IS DIVIDED INTO THREE MAIN PARTS : - INTER AS PATH ESTIMATION - INTRA AS ROUTER CONNECTIVITY ESTIMATION - IDENTIFYING ROUTERS THAT TRANSPORTS LARGE FRACTION OF TRAFFIC TO IMPORTANT WEBSITES 12
  • 14. IDENTIFYING IP PREFIX to AS PATH  Our algorithms rely on the snapshots of the BGP tables from a number of vantage points.  AS prefix graph is extracted from the BGP table of N given vantage point ASes. 1.0.4.0/24 1239 174 7545 56203 1.0.4.0/24 3257 174 7545 56203 1.0.4.0/24 293 2828 7545 56203 1.0.4.0/24 1668 6453 7545 56203 1.0.4.0/24 6762 174 7545 56203 1.0.4.0/24 22652 6939 7545 56203 1.0.4.0/24 37100 6939 7545 56203 1.0.4.0/24 2914 2828 7545 56203 1.0.4.0/24 286 6939 7545 56203 1.0.4.0/24 3549 6939 6939 7545 56203 1.0.4.0/24 3741 6939 7545 56203 1.0.4.0/24 6539 577 2828 7545 56203 1.0.4.0/24 1221 4826 38803 56203 1.0.4.0/24 6939 7545 56203 1.0.4.0/24 852 7545 56203 1.0.4.0/24 2152 2828 7545 56203 1.0.4.0/24 5413 2828 7545 56203 1.0.26.0/23 1239 2914 2519 14
  • 15. IDENTIFYING IP PREFIX to AS PATH(Contd.)  Given a AS-prefix graph G and the sure path P of AS u, for a neighbour of u, say v, if the new path (v) + P is valid, i.e. (v) + P = ψ, sure path P can be extended to an extended path (v) + P for v.  For a neighbour of v, say w, if (wv)+P = ψ, the extended path (v)+P can be further extended to (wv) + P for w. 15
  • 16. 16 IDENTIFYING IP PREFIX to AS PATH(Contd.)
  • 17. 17 IDENTIFYING IP PREFIX to AS PATH(Contd.)
  • 18. 18 IDENTIFYING IP PREFIX to AS PATH(Contd.)
  • 19. BEST PATH SELECTION CRITERIA  On the basis of path length  On the basis of uncertain length  On the basis of frequency index 19
  • 20. 20 IDENTIFYING IP PREFIX to AS PATH(Contd.)
  • 22. 22 FRACTION OF PATHS THROUGH MAJOR ASes
  • 23. 23 NUMBER OF HOSTS BEHIND EACH ASes
  • 25. INTRA-AS ROUTER CONNECTIVITY  Real topologies for ISPs/AS are not publicly available because ISP generally regard their router level topologies as confidential.  To map router level topologies for our targeted ISP we use traceroutes from various planet lab nodes across the globe.  Planetlab is a global research network that supports the development of new network services. It currently consist of 1345 nodes at 671 sites.  Traceroute that transit the AS/ISP is the one which is of utter importance to us 25
  • 26. TRACEROUTE  Traceroute is a TCP/IP utility that allows a user to trace a network connection from one location to another, recording every hop along the way. When a traceroute is run, it returns a list of network hops and displays the host name and IP address of each connection. It also returns the amount of time it took for each connection to take place (usually in milliseconds). 26
  • 27. SNAPSHOT OF TRACEROUTE traceroute to facebook.com (173.252.120.6), 30 hops max, 28 byte packets 1 node2-1.realcloud.nl (62.221.205.11) 0.036 ms 0.015 ms 0.012 ms 2 hosted-by.2is.nl (62.221.254.1) 0.205 ms 0.196 ms 0.185 ms 3 2is-10g.nl.jointtransit.nl (217.170.20.187) 0.866 ms 0.861 ms 0.852 ms 4 nikhef-ixr.openpeering.nl (217.170.0.242) 0.874 ms 0.870 ms 0.860 ms 5 er1.ams1.nl.above.net (80.249.208.122) 1.450 ms 1.418 ms 1.416 ms 6 ae2.er3.lga5.us.zip.zayo.com (64.125.31.214) 72.414 ms 72.156 ms 72.236 ms 7 IPYX-100687-870-ZYO.zip.zayo.com (128.177.165.234) 74.356 ms 74.344 ms 74.278 ms 8 be1.bb01.lga1.tfbnw.net (204.15.20.190) 94.558 ms 95.122 ms 95.180 ms 9 be29.bb01.dca1.tfbnw.net (74.119.78.78) 94.991 ms 95.247 ms 94.861 ms 10 be42.bb01.frc3.tfbnw.net (31.13.26.251) 95.569 ms 95.539 ms 94.751 ms 11 ae62.dr02.frc3.tfbnw.net (173.252.65.103) 94.197 ms 94.911 ms 94.505 ms 12 edge-star-shv-12-frc3.facebook.com (173.252.120.6) 94.320 ms 94.504 ms 94.251 ms 27
  • 28. TRACEROUTE from VARIOUS PLANETLAB NODES 28
  • 29. ALIAS RESOLUTION  Aliases are two different ip address which are associated with different interfaces of same router.  Without alias resolution ISP topology would go horribly wrong .  If the different addresses that represent the same router cannot be resolved, we get a different topology with more routers and links than the real one. 29
  • 30. ALIAS RESOLUTION 30 TRACEROUTE MAP WITHOUT ALIAS RESOLUTION TRACEROUTE MAP WITH ALIAS RESOLUTION IP 2 & IP 3 are aliases i.e they are the part of same router but different interfaces.
  • 31. GRAPHS BETWEEN NUMBER OF ROUTERS AND NUMBER OF TRACEROUTE FLOWS THAT PASS THROUGH THEM 31
  • 35. IDENTIFYING ROUTERS THAT TRANSPORTS LARGE FRACTION OF TRAFFIC TO VARIOUS IMPORTANT WEBSITES 35
  • 36. APPROACH  Similar to the aforementioned efforts, we tried to identify routers that transport large fraction of traffic to various important destination within India e.g. important government sites, defence websites, banks etc.  The process for identifying such routers was very similar to the one used for identifying the important routers in each AS. We emulated the Rocketfuel technique that involved launching traceroute from various PlanetLab sites to the chosen destinations.  Thereafter, alias resolution was applied to identify unique routers in each of the paths that were output by traceroute.  Finally, centrality approach was applied to each path to identify the critical routers that transported large number of traceroute flows. 36
  • 37. CRITICAL ROUTERS IN THE PATH OF IMPORTANT POWER GENERATION & DISTRIBUTION SITES 37
  • 38. CRITICAL ROUTERS IN THE PATH OF IMPORTANT FINANCIAL INSTITUTION 38
  • 39. CRITICAL ROUTERS IN THE PATH OF IMPORTANT DEFENSE WEBSITES 39
  • 40. CONCLUSION  Large number of Internet users in India, there are only 13 ASes which connects India's Internet to the world outside which is relatively very less compared to other developed nations.  99.61% of Internet traffic flows through top 12 ASes of India  52.68% of total traceroute probes flows through top 15 critical routers for Airtel.  33.73% of total traceroute probes flows through top 15 critical routers for Netmagic.  40.40% of total traceroute probes flows through top 15 critical routers for Tata. 40
  • 41. SUMMARY OF CONTRIBUTIONS  Developed the AS connectivity graph of India and figured out some crucial statistics based on that graph.  Mapped the router connectivity graph of major Internet players in India and based on that graph figured out some vital information about them.  Developed the network maps showing the connectivity of routers leading to several important networked installations within the country and identification of critical routers leading to those networked installations 41
  • 42. DISCUSSION & FUTURE WORK  A part of our research motivation was to answer questions like - Does there exists a small set of ASes and routers through that transports large fractions of India's Internet traffic?  we would collaborate with ISPs to determine what level of information is available and use our results as to study the actual engineering efforts that an attacker needs to employ to launch various kinds of attacks (Denial of Service, Eavesdropping etc.) on a large fraction of the network traffic. 42
  • 43. REFERENCES  Donnet, B., and Friedman, T. Internet topology discovery: a survey. Communications Surveys & Tutorials, IEEE 9, 4 (2007)  Gao, L. On inferring autonomous system relationships in the internet. IEEE/ACM Transactions on Networking (ToN) 9, 6 (2001)  Keys, K., Hyun, Y., Luckie, M., and Claffy, K. Internet-scale ipv4 alias resolution with midar. IEEE/ACM Transactions on Networking (TON) 21, 2 (2013)  Qiu, J., and Gao, L. As path inference by exploiting known as paths. In Proceedings of IEEE GLOBECOM (2005)  Spring, N., Mahajan, R., and Wetherall, D. Measuring isp topologies with rocketfuel. In ACM SIGCOMM Computer Communication Review (2002), vol. 32, ACM 43
  • 44. REFERENCES  Hurricane electric bgp toolkit-www.bgp.he.net  Planetlab http://www.planet-lab.org/  Route views project, university of oregon-routeviews.org  Govindan, R., and Tangmunarunkit, H. Heuristics for internet map discovery. In INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE (2000), vol. 3, IEEE  McRobb, D., Claffy, K., and Monk, T. Skitter: Caidas macroscopic internet topology discovery and tracking tool, 1999 44
  • 47. CRITICAL ROUTERS IN THE PATH OF POPULAR E- COMMERCE SITES 47
  • 48. CRITICAL ROUTERS IN THE PATH OF WELL LNOWN HOSPITALS WEBSITES 48
  • 49. CRITICAL ROUTERS IN THE PATH OF IMPORTANT INDIAN GOVERNMENT INSTITUTION 49
  • 50. CRITICAL ROUTERS IN THE PATH OF IMPORTANT EDUCATIONAL INSTITUTION 50