References of "Donnet, Benoît"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailUnveiling the MPLS Structure on Internet Topology
Davila Revelo; Anderson Ricci, Mauricio; Donnet, Benoît ULg et al

in 8th International Workshop on Traffic Monitoring and Analysis (TMA) (2016, April)

Recently, researches have been conducted to discover and assess the usage of MPLS tunnels. Indeed, recent developments in the ICMP protocol make certain categories of MPLS tunnels transparent to ... [more ▼]

Recently, researches have been conducted to discover and assess the usage of MPLS tunnels. Indeed, recent developments in the ICMP protocol make certain categories of MPLS tunnels transparent to traceroute probing. Additional techniques have been proposed to reveal the presence of MPLS tunnels when they do not explicitly appear in traceroute. It has been shown that MPLS is a very well deployed technology whose usage (i.e., Traffic Engineering, load balancing, etc.) varies in time and according to ASes. However, the MPLS structure on the Internet architecture has not been studied yet. In this paper, we follow this path by providing two contributions to the state of the art: (i) we evaluate the biases involved on MPLS tunnel detection when they are not directly revealed through traceroute. (ii), we provide some properties and architectural details related with MPLS deployment on router topology based on a k-core decomposition. [less ▲]

Detailed reference viewed: 42 (3 ULg)
Full Text
Peer Reviewed
See detailTreeNET: Discovering and Connecting Subnets
Grailet, Jean-François ULg; Tarissan, Fabien; Donnet, Benoît ULg

in 8th International Workshop on Traffic Monitoring and Analysis (TMA) (2016, April)

Since the early 2000's, the Internet topology has been an attractive and important research topic, either for developing data collection mechanisms, and for analyzing and modeling the network. Beside ... [more ▼]

Since the early 2000's, the Internet topology has been an attractive and important research topic, either for developing data collection mechanisms, and for analyzing and modeling the network. Beside traditional aspects of the Internet topology (i.e., IP interface, router, and AS levels), recent researches focused on intermediate promising visions of the topology, namely Point-of-Presence (PoP) and subnets (i.e., a set of devices that are located on the same connection medium and that can communicate directly with each other at the link layer). This paper focuses on network subnet discovery by proposing a new tool called treenet. One of the key aspects of treenet is that it builds a tree representing the way subnets are located with respect to each other. This tree allows treenet to obtain additional information on the network, leading to better analysis of the collected data. In this paper, we demonstrate the potential of treenet through the evaluation of its key algorithmic steps and the study of measurements collected from the PlanetLab testbed. [less ▲]

Detailed reference viewed: 50 (13 ULg)
Full Text
Peer Reviewed
See detailA Brief History of MPLS Usage in IPv6
Vanaubel, Yves ULg; Mérindol, Pascal; Pansiot, Jean-Jacques et al

in Lecture Notes in Computer Science (2016)

Recent researches have stated the fast deployment of IPv6. It has been demonstrated that IPv6 grows much faster, being so more and more adopted by both Internet service providers but also by servers and ... [more ▼]

Recent researches have stated the fast deployment of IPv6. It has been demonstrated that IPv6 grows much faster, being so more and more adopted by both Internet service providers but also by servers and end-hosts. In parallel, researches have been conducted to discover and assess the usage of MPLS tunnels. Indeed, recent developments in the ICMP protocol make certain categories of MPLS tunnels transparent to traceroute probing. However, these studies focus only on IPv4, where MPLS is strongly deployed. In this paper, we provide a first look at how MPLS is used under IPv6 networks using traceroute data collected by CAIDA. At first glance, we observe that the MPLS deployment and usage seem to greatly differ between IPv4 and IPv6, in particular in the way MPLS label stacks are used. While label stacks with at least two labels are marginal in IPv4 (and mostly correspond to a VPN usage), they are prevalent in IPv6. After a deeper analysis of the label stack typical content in IPv6, we show that such tunnels result from the use of 6PE. This is not really surprising since this mechanism was specifically designed to forward IPv6 traffic using MPLS tunnels through networks that are not fully IPv6 compliant. However, we show that it does not result from non dual-stack routers but rather from the absence of native IPv6 MPLS signaling protocols. Finally, we investigate a large Tier-1 network, Cogent, that stands out with an original set-up. [less ▲]

Detailed reference viewed: 101 (12 ULg)
Full Text
Peer Reviewed
See detailTowards DisNETPerf: a Distributed Internet Paths Performance Analyzer
Wassermann, Sarah ULg; Casas, Pedro; Donnet, Benoît ULg

in ACM CoNEXT Student Workshop: Heidelberg 1 décembre 2015 (2015, December)

For more than 25 years now, traceroute has demonstrated its supremacy for network-path measurement, becoming the most widely used Internet path diagnosis tool today. A major limitation of traceroute when ... [more ▼]

For more than 25 years now, traceroute has demonstrated its supremacy for network-path measurement, becoming the most widely used Internet path diagnosis tool today. A major limitation of traceroute when the destination is not controllable by the user is its inability to measure reverse paths, i.e., the path from a destination back to the source. Proposed techniques to address this issue rely on IP address spoofing, which might lead to security concerns. In this paper we introduce and evaluate DisNETPerf, a new tool for locating probes that are the closest to a distant server. Those probes are then used to collect data from the server point-of-view to the service user for path performance monitoring and troubleshooting purposes. We propose two techniques for probe location, and demonstrate that the reverse path can be measured with very high accuracy in certain scenarios. [less ▲]

Detailed reference viewed: 130 (43 ULg)
Full Text
Peer Reviewed
See detailMPLS Under the Microscope: Revealing Actual Transit Path Diversity
Vanaubel, Yves ULg; Mérindol, Pascal; Pansiot, Jean-Jacques et al

in ACM Internet Measurement Conference (2015, October)

Traffic Engineering (TE) is one of the keys for improving packet forwarding in the Internet. It allows IP network operators to finely tune their forwarding paths according to various customer needs. One ... [more ▼]

Traffic Engineering (TE) is one of the keys for improving packet forwarding in the Internet. It allows IP network operators to finely tune their forwarding paths according to various customer needs. One of the most popular tool available today for optimizing the use of networking resources is MPLS. On the one hand, operators may use MPLS and label distribution mechanisms such as RSVP-TE in conjunction with BGP to define multiple transit paths (for a given edge pair) verifying different constraints on their network. On the other hand, when operators simply enable LDP for distributing MPLS labels in order to improve the scalability of their network, another kind of path diversity may appear thanks to the ECMP feature of IGP routing. In this paper, using an MPLS labels analysis, we demonstrate that it is possible to better understand the transit path diversity deployed within a given ISP. More specifically, we introduce the Label Pattern Recognition (LPR) algorithm, a method for analyzing traceroute data including MPLS information. LPR reveals the actual usage of MPLS according to the inferred label distribution protocol and is able to make the distinction between ECMP and TE multi-path forwarding. Based on an extensive and longitudinal traceroute dataset obtained from CAIDA, we apply LPR and find that each ISP behavior is really specific in regard to its MPLS usage. In particular, we are able to observe independently for each ISP the MPLS path diversity and usage, and its evolution over time. Globally speaking, the main outcomes of our study are that (i) the usage of MPLS has been increasing over the the last five years with basic encapsulation being predominant, (ii) path diversity is mainly provided thanks to ECMP and LDP, and, (iii), TE using MPLS is as common as MPLS without path diversity. [less ▲]

Detailed reference viewed: 95 (11 ULg)
Full Text
See detailCross-check of Analysis Modules and Reasoner Interactions
Manferdini, U.; Traverso, S.; Mellia, Marco et al

Report (2015)

This deliverable presents an extended set of Analysis Modules, including both the improvements done to those presented in deliverable D4.1 as well as the new analysis algorithms designed and developed to ... [more ▼]

This deliverable presents an extended set of Analysis Modules, including both the improvements done to those presented in deliverable D4.1 as well as the new analysis algorithms designed and developed to address use-cases. The deliverable also describes a complete workflow description for the different use-cases, including both stream processing for real-time monitoring applications as well as batch processing for “off-line” analysis. This workflow description specifies the iterative interaction loop between WP2, WP3, T4.1, and T4.2, thereby allowing for a cross-checking of the analysis modules and the reasoner interactions. [less ▲]

Detailed reference viewed: 31 (0 ULg)
Full Text
Peer Reviewed
See detailTowards a Middlebox Policy Taxonomy: Path Impairments
Edeline, Korian ULg; Donnet, Benoît ULg

in International Workshop on Network Science for Communication Networks (NetSciCom): Hong Kong April 27 2015 (2015, April)

Recent years have seen the rise of middleboxes, such as firewalls, NATs, proxies, or Deep Packet Inspectors. Those middleboxes play an important role in today's Internet, including enterprise networks and ... [more ▼]

Recent years have seen the rise of middleboxes, such as firewalls, NATs, proxies, or Deep Packet Inspectors. Those middleboxes play an important role in today's Internet, including enterprise networks and cellular networks. However, despite their huge success in modern network architecture, they have a negative impact on the Internet evolution as they can slow down the TCP protocol evolution and its extensions. Making available a summary of the potential middlebox network interferences is of the highest importance as it could allow researchers to confront their new transport protocol to potential issues caused by middleboxes. And, consequently, allowing again innovation in the Internet. This is exactly what we tackle in this paper. We propose a path impairment oriented middlebox taxonomy that aims at categorizing the initial purpose of a middlebox policy as well as its potential unexpected complications. Based on a measurement campaign on IPv4 and IPv6 networks, we confront our taxonomy to the real world. Our dataset is freely available. [less ▲]

Detailed reference viewed: 165 (11 ULg)
Full Text
Peer Reviewed
See detailTracking Middleboxes in the Mobile World with TraceboxAndroid
Thirion, Valentin; Edeline, Korian ULg; Donnet, Benoît ULg

in 7th International Workshop on Traffic Monitoring and Analysis (TMA) (2015, April)

Middleboxes are largely deployed over cellular networks. It is known that they might disrupt network performance, expose users to security issues, and harm protocols deployability. Further, hardly any ... [more ▼]

Middleboxes are largely deployed over cellular networks. It is known that they might disrupt network performance, expose users to security issues, and harm protocols deployability. Further, hardly any network measurements tools for smartphones are able to infer middlebox behaviors, specially if one cannot control both ends of a path. In this paper, we present TraceboxAndroid a proof-of-concept measurement application for Android mobile devices implementing the tracebox algorithm. It aims at diagnosing middlebox-impaired paths by detecting and locating rewriting middleboxes. We analyze a dataset sample to highlight the range of opportunities offered by TraceboxAndroid. We show that TraceboxAndroid can be useful for mobile users as well as for the research community. [less ▲]

Detailed reference viewed: 100 (9 ULg)
Full Text
Peer Reviewed
See detailOn the Performance of the LISP Beta Network
Coras, Florin; Saucez, Damien; Iannone, Luigi et al

in IFIP Networking (2014, June)

The future Internet has been a hot topic during the past decade and many approaches towards this future Internet, ranging from incremental evolution to complete clean slate ones, have been proposed. One ... [more ▼]

The future Internet has been a hot topic during the past decade and many approaches towards this future Internet, ranging from incremental evolution to complete clean slate ones, have been proposed. One of the proposition, LISP, advocates for the separation of the identifier and the locator roles of IP addresses to reduce BGP churn and BGP table size. Up to now, however, most studies concerning LISP have been theoretical and, in fact, little is known about the actual LISP deployment performance. In this paper, we fill this gap through measurement campaigns carried out on the LISP Beta Network. More precisely, we evaluate the performance of the two key components of the infrastructure: the control plane (i.e., the mapping system) and the interworking mechanism (i.e., communication between LISP and non-LISP sites). Our measurements highlight that performance offered by the LISP interworking infrastructure is strongly dependent on BGP routing policies. If we exclude misconfigured nodes, the mapping system typically provides reliable performance and relatively low median mapping resolution delays. Although the bias is not very important, control plane performance favors USA sites as a result of its larger LISP user base but also because European infrastructure appears to be less reliable. [less ▲]

Detailed reference viewed: 81 (17 ULg)
Full Text
Peer Reviewed
See detailOn the Quality of BGP Route Collectors for iBGP Policy Inference
Cittadini, Luca; Vissicchio, Stefano; Donnet, Benoît ULg

in IFIP Networking (2014, June)

A significant portion of what is known about Internet routing stems out from public BGP datasets. For this reason, numerous research efforts were devoted to (i) assessing the (in)completeness of the ... [more ▼]

A significant portion of what is known about Internet routing stems out from public BGP datasets. For this reason, numerous research efforts were devoted to (i) assessing the (in)completeness of the datasets, (ii) identifying biases in the dataset, and (iii) augmenting data quality by optimally placing new collectors. However, those studies focused on techniques to extract information about the AS-level Internet topology. In this paper, we show that considering different metrics influences the conclusions about biases and collector placement. Namely, we compare AS-level topology discovery with \iac inference. We find that the same datasets exhibit significantly diverse biases for these two metrics. For example, the sensitivity to the number and position of collectors is noticeably different. Moreover, for both metrics, the marginal utility of adding a new collector is strongly localized with respect to the proximity of the collector. Our results suggest that the ``optimal'' position for new collectors can only be defined with respect to a specific metric, hence posing a fundamental trade-off for maximizing the utility of extensions to the BGP data collection infrastructure. [less ▲]

Detailed reference viewed: 99 (15 ULg)
Full Text
See detailDesign of Analysis Modules
Papadimitriou, Dimitri; Ben Houidi, Z.; Ghamri-Doudane et al

Report (2013)

This public deliverable describes the design and specification of a first set of basic analysis modules for addressing the use cases identified in WP1. The document focuses on the required algorithms ... [more ▼]

This public deliverable describes the design and specification of a first set of basic analysis modules for addressing the use cases identified in WP1. The document focuses on the required algorithms, which use as input the measurements and analysis provided by the lower layers (WP2 and WP3) of the mPlane architecture to provide more advanced analysis and answers towards the resolution of the problem addressed by the use case. These analysis modules include both stream and batch processing algorithms and address issues such as classifications, estimations, predictions, detections, correlations and diagnosis. [less ▲]

Detailed reference viewed: 18 (0 ULg)
Full Text
Peer Reviewed
See detailRevealing Middlebox Interference with Tracebox
Detal, Grégory; Hesmans, Benjamin; Bonaventure, Olivier et al

in ACM/USENIX Internet Measurement Conference (2013, October)

Middleboxes such as firewalls, NAT, proxies, or Deep Packet Inspection play an increasingly important role in various types of IP networks, including enterprise and cellular networks. Recent studies have ... [more ▼]

Middleboxes such as firewalls, NAT, proxies, or Deep Packet Inspection play an increasingly important role in various types of IP networks, including enterprise and cellular networks. Recent studies have shed the light on their impact on real traffic and the complexity of managing them. Network operators and researchers have few tools to understand the impact of those boxes on any path. In this paper, we propose tracebox, an extension to the widely used traceroute tool, that is capable of detecting various types of middlebox interference over almost any path. tracebox sends IP packets containing TCP segments with different TTL values and analyses the packet encapsulated in the returned ICMP message. Further, as recent routers quote, in the ICMP message, the entire IP packet that they received, \tracebox is able to detect any modification performed by upstream middleboxes. In addition, tracebox can often pinpoint the network hop where the middlebox interference occurs. We evaluate tracebox with measurements performed on PlanetLab nodes. Our analysis reveals various types of middleboxes that were not expected on such an experimental testbed supposed to be connected to the Internet without any restriction. [less ▲]

Detailed reference viewed: 127 (19 ULg)
Full Text
Peer Reviewed
See detailNetwork Fingerprinting: TTL-Based Router Signatures
Vanaubel, Yves ULg; Pansiot, Jean-Jacques; Mérindol, Pascal et al

in ACM/USENIX Internet Measurement Conference (2013, October)

Fingerprinting networking equipment has many potential applications and benefits in network management and security. More generally, it is useful for the understanding of network structures and their ... [more ▼]

Fingerprinting networking equipment has many potential applications and benefits in network management and security. More generally, it is useful for the understanding of network structures and their behaviors. In this paper, we describe a simple fingerprinting mechanism based on the initial TTL values used by routers to reply to various probing messages. We show that main classes obtained using this simple mechanism are meaningful to distinguish routers platforms. Besides, it comes at a very low additional cost compared to standard active topology discovery measurements. As a proof of concept, we apply our method to gain more insight on the behavior of MPLS routers and to, thus, more accurately quantify their visible/invisible deployment. [less ▲]

Detailed reference viewed: 266 (42 ULg)
Full Text
Peer Reviewed
See detailTowards a bipartite graph modeling of the internet topology
Tarissan, Fabien; Quoitin, Bruno; Mérindol, Pascal et al

in Computer Networks (2013), 57(11), 2331-2347

Modeling the properties of the Internet topology aims at generating large scale artificial IP networks that mimic properties of real ones for simulation purposes. Current models typically consider the ... [more ▼]

Modeling the properties of the Internet topology aims at generating large scale artificial IP networks that mimic properties of real ones for simulation purposes. Current models typically consider the Internet as a simple graph where edges are point-to-point connections between routers. This approach does not take into account point-to-multipoint connections that exist at lower layers in the network, e.g. layer-2 clouds, such as Ethernet switches or MPLS networks. Instead, such physical point-to-multipoint connections are modeled as several logical IP level point-to-point connections. In this paper, we rely on recent developments in topology discovery based on IGMP probing that allows for revealing part of the network’s layer-2 structure. We take advantage of this additional knowledge for proposing an Internet model based on bipartite graphs considering both point-to-point and point-to-multipoint connections. Our model remains simple: it only takes as input the node degree sequence for both layer-2 and layer-3 nodes, randomly generates a bipartite graph respecting those distributions, and then derives the corresponding layer-3 topology. We show that, despite the simplicity of our model, realistic network properties, such as high local density, emerge naturally. This is in contrast with the now common belief that such properties can only appear with more intricate models or if explicitly injected in random models. Besides, we also provide evidences of how the analysis performed at the bipartite level might shed light on important properties of the real network structure. Finally, we propose and evaluate a bipartite graph generator based on our model that only takes two synthetic node degree distributions as input. [less ▲]

Detailed reference viewed: 96 (10 ULg)
Full Text
See detailOn the Potential of Recommendation Technologies for Efficient Content Delivery Networks
Kaafar, Mohamed Ali; Berkovsky, Shlomo; Donnet, Benoît ULg

in Computer Communication Review (2013), 43(3), 74-77

During the last decade, we have witnessed a substantial change in content delivery networks (CDNs) and user access paradigms. If previously, users consumed content from a central server through their ... [more ▼]

During the last decade, we have witnessed a substantial change in content delivery networks (CDNs) and user access paradigms. If previously, users consumed content from a central server through their personal computers, nowadays they can reach a wide variety of repositories from virtually everywhere using mobile devices. This results in a considerable time-, location-, and event-based volatility of content popularity. In such a context, it is imperative for CDNs to put in place adaptive content management strategies, thus, improving the quality of services provided to users and decreasing the costs. In this paper, we introduce predictive content distribution strategies inspired by methods developed in the Recommender Systems area. Specifically, we outline different content placement strategies based on the observed user consumption patterns, and advocate their applicability in the state of the art CDNs. [less ▲]

Detailed reference viewed: 126 (5 ULg)
Full Text
Peer Reviewed
See detailA First Measurement Look at the Deployment and Evolution of the Locator/ID Separation Protocol
Saucez, Damien; Iannone, Luigi; Donnet, Benoît ULg

in Computer Communication Review (2013), 43(1), 37-43

During the last decade, we have seen the rise of discussions regarding the emergence of a Future Internet. One of the proposed approaches leverages on the separation of the identifier and the locator ... [more ▼]

During the last decade, we have seen the rise of discussions regarding the emergence of a Future Internet. One of the proposed approaches leverages on the separation of the identifier and the locator roles of IP addresses, leading to the LISP (Locator/Identifier Separation Protocol) protocol, currently under development at the IETF (Internet Engineering Task Force). Up to now, researches made on LISP have been rather theoretical, i.e., based on simulations/emulations often using Internet traffic traces. There is no work in the literature attempting to assess the state of its deployment and how this has evolved in recent years. This paper aims at bridging this gap by presenting a first measurement study on the existing worldwide LISP network (lisp4.net). Early results indicate that there is a steady growth of the LISP network but also that network manageability might receive a higher priority than performance in a large scale deployment. [less ▲]

Detailed reference viewed: 36 (5 ULg)
Full Text
Peer Reviewed
See detailInternet Topology Discovery
Donnet, Benoît ULg

in Biersack, Ernst; Callegari, Christian; Matijasevic, Maja (Eds.) Data Traffic Monitoring and Analysis: From Measurement, Classification, and Anomaly Detection to Quality of Experience (2013)

Since the nineties, the Internet has seen an impressive growth, in terms of users, intermediate systems (such as routers), autonomous systems, or applications. In parallel to this growth, the research ... [more ▼]

Since the nineties, the Internet has seen an impressive growth, in terms of users, intermediate systems (such as routers), autonomous systems, or applications. In parallel to this growth, the research community has been looking for obtaining and modeling the Internet topology, i.e., how the various elements of the network interconnect between themselves. An impressive amount of work has been done regarding how to collect data and how to analyse and model it. This chapter reviews main approaches for gathering Internet topology data. We first focus on hop limited probing, i.e., traceroute-like probing. We review large-scale tracerouting projects and discuss traceroute limitations and how they are mitigated by new techniques or extensions. Hop limited probing can reveal an IP interface vision of the Internet. We next focus on techniques for aggregating several IP interfaces of a given router into a single identifier. This leads to a router level vision of the topology. The aggregation can be done through a process called alias resolution. We also review a technique based on IGMP probing that silently collect all multicast interfaces of a router into a single probe. We next refine the router level topology by adding subnet information. We finish this chapter by discussing the AS level topology, in particular the relationships between ASes and the induced hierarchy. [less ▲]

Detailed reference viewed: 155 (8 ULg)
Full Text
Peer Reviewed
See detailQuantifying and Mitigating IGMP Filtering in Topology Discovery
Marchetta, Pietro; Mérindol, Pascal; Donnet, Benoît ULg et al

in IEEE Global Communications Conference (GLOBECOM) (2012, December)

Recent developments in router level topology discovery have suggested the introduction of IGMP probing in addition to standard techniques such as traceroute and alias resolution. With a single IGMP probe ... [more ▼]

Recent developments in router level topology discovery have suggested the introduction of IGMP probing in addition to standard techniques such as traceroute and alias resolution. With a single IGMP probe, one can obtain all multicast interfaces and links of a multicast router. If such a probing is a promising approach, we noticed that IGMP probes are subject to filtering, leading so to the fragmentation of the collected multicast graph into several disjoint connected components. In this paper, we cope with the fragmentation issue. Our contributions are threefold: (i) we experimentally quantify the damages caused by IGMP filtering on collected topologies of large tier-1 ISPs; (ii) using traceroute data, we construct a hybrid graph and estimate how far each IGMP fragment is from each other; (iii) we provide and experimentally evaluate a recursive approach for reconnecting disjoint multicast components. The key idea of the third contribution is to recursively apply alias resolution to reassemble disjoint fragments and, thus, progressively extend the mapping of the targeted ISP. Data presented in the paper, as well as reconstructed topologies, are freely available at http://svnet.u-strasbg.fr/merlin. [less ▲]

Detailed reference viewed: 88 (16 ULg)
Full Text
Peer Reviewed
See detailOn the Dynamics of Locators in LISP
Saucez, Damien; Donnet, Benoît ULg

in IFIP/TC6 Networking (2012, May)

In the Internet, IP addresses play the dual role of identifying the hosts and locating them on the topology. This design choice limits the way a network can control its traffic and causes scalability ... [more ▼]

In the Internet, IP addresses play the dual role of identifying the hosts and locating them on the topology. This design choice limits the way a network can control its traffic and causes scalability issues. To overcome this limitation, the Locator/Identifier Separation Protocol (LISP) has been introduced. In LISP, the addresses used to identify end hosts (i.e., identifiers) are independent of the addresses used to locate them (i.e., locators). LISP maps identifiers into a list of locators and provides a mean to transport the packets with the appropriate locator. A key feature of this separation is that several locators can be associated to a given identifier, leading to more control for an end-site on the path selection to reach a given destination. In this paper, we show that the choice of the locator can have an impact on the performance and the reliability of the communication in a LISP environment. To this aim, we build a mapping between identifiers and locators as if LISP were deployed today. In addition, we extensively collect delay data between locators and demonstrate that the locator selection for a given identifier prefix impacts the performance of the LISP path in 25% of the cases. Finally, we measure the locators availability over time and demonstrate that it remains quite stable. [less ▲]

Detailed reference viewed: 78 (10 ULg)
Full Text
Peer Reviewed
See detailRevealing MPLS Tunnels Obscured from Traceroute
Donnet, Benoît ULg; Luckie, Matthew; Mérindol, Pascal et al

in Computer Communication Review (2012), 42(2), 87-93

Operators have deployed Multiprotocol Label Switching (MPLS) in the Internet for over a decade. However, its impact on Internet topology measurements is not well known, and it is possible for some MPLS ... [more ▼]

Operators have deployed Multiprotocol Label Switching (MPLS) in the Internet for over a decade. However, its impact on Internet topology measurements is not well known, and it is possible for some MPLS configurations to lead to false router-level links in maps derived from traceroute data. In this paper, we introduce a measurement-based classification of MPLS tunnels, identifying tunnels where IP hops are revealed but not explicitly tagged as label switching routers, as well as tunnels that obscure the underlying path. Using a large-scale dataset we collected, we show that paths frequently cross MPLS tunnels in today's Internet: in our data, at least 30% of the paths we tested traverse an MPLS tunnel. We also propose and evaluate several methods to reveal MPLS tunnels that are not explicitly flagged as such: we discover that their fraction is significant (up to half the explicit tunnel quantity) but most of them do not obscure IP-level topology discovery. [less ▲]

Detailed reference viewed: 85 (8 ULg)