Mapping Peering Interconnections to a Facility
Total Page:16
File Type:pdf, Size:1020Kb
Mapping Peering Interconnections to a Facility Vasileios Giotsas Georgios Smaragdakis Bradley Huffaker CAIDA / UC San Diego MIT / TU Berlin CAIDA / UC San Diego [email protected] [email protected] bhuff[email protected] Matthew Luckie kc claffy University of Waikato CAIDA / UC San Diego [email protected] [email protected] ABSTRACT CCS Concepts Annotating Internet interconnections with robust phys- •Networks ! Network measurement; Physical topolo- ical coordinates at the level of a building facilitates net- gies; work management including interdomain troubleshoot- ing, but also has practical value for helping to locate Keywords points of attacks, congestion, or instability on the In- Interconnections; peering facilities; Internet mapping ternet. But, like most other aspects of Internet inter- connection, its geophysical locus is generally not pub- lic; the facility used for a given link must be inferred to 1. INTRODUCTION construct a macroscopic map of peering. We develop a Measuring and modeling the Internet topology at the methodology, called constrained facility search, to infer logical layer of network interconnection, i. e., autonomous the physical interconnection facility where an intercon- systems (AS) peering, has been an active area for nearly nection occurs among all possible candidates. We rely two decades. While AS-level mapping has been an im- on publicly available data about the presence of net- portant step to understanding the uncoordinated forma- works at different facilities, and execute traceroute mea- tion and resulting structure of the Internet, it abstracts surements from more than 8,500 available measurement a much richer Internet connectivity map. For example, servers scattered around the world to identify the tech- two networks may interconnect at multiple physical lo- nical approach used to establish an interconnection. A cations around the globe, or even at multiple locations key insight of our method is that inference of the tech- in the same city [58, 52]. nical approach for an interconnection sufficiently con- There is currently no comprehensive mapping of in- strains the number of candidate facilities such that it terconnections to physical locations where they occur [63]. is often possible to identify the specific facility where There are good reasons for the dearth of this informa- a given interconnection occurs. Validation via private tion: evolving complexity and scale of networking in- communication with operators confirms the accuracy frastructure, information hiding properties of the rout- of our method, which outperforms heuristics based on ing system (BGP), security and commercial sensitivi- naming schemes and IP geolocation. Our study also re- ties, and lack of incentives to gather or share data. But veals the multiple roles that routers play at interconnec- this opacity of the Internet infrastructure hinders re- tion facilities; in many cases the same router implements search and development efforts as well as network man- both private interconnections and public peerings, in agement. For example, annotating peering interconnec- some cases via multiple Internet exchange points. Our tions with robust physical coordinates at the level of a study also sheds light on peering engineering strategies building facilitates network troubleshooting and diag- used by different types of networks around the globe. nosing attacks [45] and congestion [48]. Knowledge of geophysical locations of interconnections also enables Permission to make digital or hard copies of all or part of this work for personal assessment of the resilience of interconnections in the or classroom use is granted without fee provided that copies are not made or event of natural disasters [56, 22], facility or router out- distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work ages [7], peering disputes [48], and denial of service at- owned by others than ACM must be honored. Abstracting with credit is per- tacks [24, 62]. This information can also elucidate the mitted. To copy otherwise, or republish, to post on servers or to redistribute to role of emerging entities, e. g., colocation facilities, car- lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. rier hotels, and Internet exchange points (IXP), that CoNEXT ’15 December 01-04, 2015, Heidelberg, Germany enable today's richly interconnected ecosystem [46, 8, c 2015 ACM. ISBN 978-1-4503-3412-9/15/12. $15.00 20, 21, 16]. It also increases traffic flow transparency, DOI: 10.1145/2716281.2836122 e. g., to identify unwanted transit paths through specific countries, and inform peering decisions in a competitive and peering, when two ISPs interconnect to exchange interconnection market. customer traffic, although complicated relationships ex- In this paper we describe a measurement and infer- ist [30, 33]. Whether and how to interconnect requires ence methodology to map a given interconnection to careful consideration, and depends on traffic volume ex- a physical facility. We first create and update a de- changed between the networks, their customer demo- tailed map of interconnection facilities and the networks graphics, peering and security policies, and the cost to present at them. This map requires manual assembly, maintain the interconnection [53]. but fortunately the information is increasingly publicly Interconnection Facility. An interconnection fa- available in recent years, partly due to the fact that cility is a physical location (a building or part of one) many networks require it be available in order to es- that supports interconnection of networks. These facil- tablish peering [4], and many IXPs publish information ities lease customers secure space to locate and operate about which networks are present at which of their fa- network equipment. They also provide power, cooling, cilities in order to attract participating networks [20]. fire protection, dedicated cabling to support different Interconnection facilities also increasingly make the list types of network connection, and in many cases admin- of participant members available on their website or in istrative support. Large companies such as Equinix [29], PeeringDB [47]. While it is a substantial investment of Telehouse [61], and Interxion [38] operate such facilities time to keep such a list current, we find it is feasible. around the globe. Smaller companies operate intercon- However, a well-maintained mapping of networks to nection facilities in a geographic region or a city. Most facilities does not guarantee the ability to accurately interconnection facilities are carrier-neutral, although map all interconnections involving two ASes to specific some are operated by carriers, e. g., Level3. In large physical facilities, since many networks peer at mul- communication hubs, such as in large cities, an intercon- tiple locations even within a city. Mapping a single nection facility operator may operate multiple facilities interconnection to a facility is a search problem with in the same city, and connect them, so that networks a potentially large solution space; however, additional participating at one facility can access networks at an- constraints can narrow the search. The contributions of other facility in the same city. this work are as follows: Internet Exchange Point. An Internet Exchange Point (IXP) is a physical infrastructure composed of • We introduce and apply a measurement method- layer-2 Ethernet switches where participating networks ology, called constrained facility search, which in- can interconnect their routers using the switch fabric. fers the physical facilities where two ASes intercon- At every IXP there is one or more (for redundancy) nect from among all (sometimes dozens of) possi- high-end switches called core switches (the center switch ble candidates, and also infers the interconnection in Figure 1). IXPs partner with interconnection facili- method, e.g. public peering at an IXP, private ties in the city they operate and install access switches peering via cross-connect, point-to-point connec- there (switches at facilities 1 and 2 in Figure 1). These tion tunnelled over an IXP, or remote peering. switches connect via high bandwidth connections to the core switches. In order to scale, some IXPs connect mul- • We validate the accuracy of our methodology using tiple access switches to back-haul switches. The back- direct feedback, BGP communities, DNS records, haul switch then connects to the core switch. All IXP and IXP websites, and find our algorithm achieves members connected to the same access switch or back- at least 90% accuracy for each type of interconnec- haul switch exchange traffic locally if they peer; the tion and outperforms heuristics based on naming rest exchange traffic via the core switch. Thus, routers schemes and IP geolocation. owned by members of IXPs may be located at different • We demonstrate our methodology using case stud- facilities associated with the same IXP [20]. ies of a diverse set of interconnections involving Popular peering engineering options today are: content providers (Google, Akamai, Yahoo, Lime- Private Peering with Cross-connect. A cross- light, and Cloudflare) as well as transit providers connect is a piece of circuit-switched network equipment (Level3, Cogent, Deutsche Telekom, Telia, and NTT). that physically connects the interfaces of two networks Our study reveals the multiple roles that routers at the interconnection