Mapping peering interconnections to a facility

Giotsas, Vasileios and Smaragdakis, Georgios and Huffaker, Bradley and Luckie, Matthew and Claffy, K. C. (2015) Mapping peering interconnections to a facility. In: CoNEXT '15 Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. Association for Computing Machinery, Inc, DEU. ISBN 9781450334129

[img]
Preview
PDF (conext15-final233)
conext15_final233.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial.

Download (1MB)

Abstract

Annotating Internet interconnections with robust physical coordinates at the level of a building facilitates network management including interdomain troubleshooting, but also has practical value for helping to locate points of attacks, congestion, or instability on the Internet. But, like most other aspects of Internet interconnection, its geophysical locus is generally not public; the facility used for a given link must be inferred to construct a macroscopic map of peering. We develop a methodology, called constrained facility search, to infer the physical interconnection facility where an interconnection occurs among all possible candidates. We rely on publicly available data about the presence of networks at different facilities, and execute traceroute measurements from more than 8,500 available measurement servers scattered around the world to identify the technical approach used to establish an interconnection. A key insight of our method is that inference of the technical approach for an interconnection sufficiently constrains the number of candidate facilities such that it is often possible to identify the specific facility where a given interconnection occurs. Validation via private communication with operators confirms the accuracy of our method, which outperforms heuristics based on naming schemes and IP geolocation. Our study also reveals the multiple roles that routers play at interconnection facilities; in many cases the same router implements both private interconnections and public peerings, in some cases via multiple Internet exchange points. Our study also sheds light on peering engineering strategies used by different types of networks around the globe.

Item Type:
Contribution in Book/Report/Proceedings
Additional Information:
© ACM, 2015. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CoNEXT '15 Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies http://dx.doi.org/10.1145/2716281.2836122
Uncontrolled Keywords:
/dk/atira/pure/subjectarea/asjc/1700/1705
Subjects:
ID Code:
123504
Deposited By:
Deposited On:
16 Feb 2018 10:51
Refereed?:
Yes
Published?:
Published
Last Modified:
27 Sep 2020 06:40