Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1644893.1644922acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Impact of prefix-match changes on IP reachability

Published:04 November 2009Publication History

ABSTRACT

Although most studies of Internet routing treat each IP address block (or prefix) independently, the relationship between prefixes is important because routers ultimately forward packets based on the "longest-matching prefix." In fact, the most-specific prefix for a given destination address may change over time, as BGP routes are announced and withdrawn. Even if the most-specific route is withdrawn, routers may still be able to deliver packets to the destination using a less-specific route. In this paper, we analyze BGP update messages and Netflow traffic traces from a large ISP to characterize both the changes to the longest-matching prefix over time and the resulting effects on end-to-end reachability of the destination hosts. To drive our analysis, we design and implement an efficient online algorithm for tracking changes in the longest-matching prefix for each IP address. We analyze the BGP message traces to identify the reasons for prefix-match changes, including failures, route flapping, sub-prefix hijacking, and load-balancing policies. Our preliminary analysis of the Netflow data suggests that the relationship between BGP updates and IP reachability is sometimes counterintuitive.

References

  1. B. Zhang, V. Kambhampati, M. Lad, D. Massey, and L. Zhang, "Identifying BGP routing table transfers," in Proc. ACM SIGCOMM Workshop on Mining Network Data (MineNet), August 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Wu, Z. M. Mao, J. Rexford, and J. Wang, "Finding a needle in a haystack: Pinpointing significant BGP routing changes in an IP network," in Proc. Networked Systems Design and Implementation, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Rensys Blog, "Pakistan hijacks YouTube." http://www.renesys.com/blog/2008/02/pakistan_hijacks_youtube_1.shtml.Google ScholarGoogle Scholar
  4. N. Duffield, C. Lund, and M. Thorup, "Learn more, sample less: Control of volume and variance in network measurement," IEEE Transactions in Information Theory, vol. 51, no. 5, pp. 1756--1775, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Broido and k. claffy, "Analysis of RouteViews BGP data: Policy atoms," in Proc. Network Resource Data Management Workshop, 2001.Google ScholarGoogle Scholar
  6. Y. Afek, O. Ben-Shalom, and A. Bremler-Barr, "On the structure and application of BGP policy atoms," in Proc. Internet Measurement Workshop, pp. 209--214, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. Bu, L. Gao, and D. Towsley, "On characterizing BGP routing table growth," Computer Networks, vol. 45, pp. 45--54, May 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. X. Meng, Z. Xu, B. Zhang, G. Huston, S. Lu, and L. Zhang, "IPv4 address allocation and BGP routing table evolution," ACM Computer Communication Review, January 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, "Delayed Internet routing convergence," IEEE/ACM Trans. on Networking, vol. 9, pp. 293--306, June 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in Proc. ACM SIGCOMM, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, "BGP routing stability of popular destinations," in Proc. Internet Measurement Workshop, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Karlin, S. Forrest, and J. Rexford, "Autonomous security for autonomous systems," Computer Networks, October 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, "PHAS: A prefix hijack alert system," in Proc. USENIX Security Symposium, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Zhang, C. Zhang, V. Pai, L. Peterson, and R. Wang, "PlanetSeer: Internet path failure monitoring and characterization in wide-area services," in Proc. Operating System Design and Implementation, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. N. Feamster, D. Andersen, H. Balakrishnan, and M. F. Kaashoek, "Measuring the effects of Internet path faults on reactive routing," in Proc. ACM SIGMETRICS, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Mahajan, N. Spring, D. Wetherall, and T. Anderson, "User-level path diagnosis," in Proc. Symposium on Operating System Principles, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Z. M. Mao, J. Rexford, J. Wang, and R. H. Katz, "Towards an accurate AS-level traceroute tool," in Proc. ACM SIGCOMM, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. F. Wang, L. Gao, O. Spatscheck, and J. Wang, "STRID: Scalable trigger-based route incidence diagnosis," in Proc. IEEE International Conference on Computer Communications and Networks, August 2008.Google ScholarGoogle ScholarCross RefCross Ref
  19. P. Huang, A. Feldmann, and W. Willinger, "A non-intrusive, wavelet-based approach to detecting network performance problems," in Proc. Internet Measurement Workshop, November 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. V. N. Padmanabhan, L. Qiu, and H. Wang, "Server-based inference of Internet performance," in Proc. IEEE INFOCOM, March 2003.Google ScholarGoogle Scholar

Index Terms

  1. Impact of prefix-match changes on IP reachability

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IMC '09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement
          November 2009
          468 pages
          ISBN:9781605587714
          DOI:10.1145/1644893

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 November 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate277of1,083submissions,26%

          Upcoming Conference

          IMC '24
          ACM Internet Measurement Conference
          November 4 - 6, 2024
          Madrid , AA , Spain

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader