150 likes | 242 Views
This project aims to improve network performance, international resource utilization, and prevent anomalies in KOREN/APII through traffic engineering optimization. Research areas include network measurement, performance engineering, international routing, and network security. Major topics involve deploying efficient measurement infrastructure, optimizing network load balancing, managing overseas links, and combating Distributed Denial-of-Service attacks.
E N D
Introduction of An Engineering Project for KOREN/APII 2003. 8. 27 Seung-Joon Seok Korea University
Project Overview • Project Title is “A Study of Traffic Engineering in KOREN/APII Testbed” • Grant of NCA (National Computerization Agency) • Project Period is 1.5 year (from July 2003 to Dec. 2004) • Participants
Project Goal • Improvement of Network Engineering Capability for KOREN and APII • Activation of Cooperative Research Group (KESG) in KOREN • Activation of Cooperative Research Interchange between KOREN & QGPOP
Project’s Overall Research Area • This Project treats the issues of KOREN/APII Traffic Engineering • Optimizing KOREN’s Network Performance • Improving International Resource Utilization • Preventing KOREN from anomalies
2) Performance Engineering Inter-Intra Routing Performance Measurement Infra TE 1) Network Traffic Measurement 3) BGP Routing 4) Network Security International routing Info. view Block Diagram of Four Research Areas
1. Network Measurement Area • Measurement System is a Key Infrastructure for Network Management. • In this project, Measurement is needed as a base technology for the other areas: security, performance management in KOREN, and international performance management. Management Area Collaboration Other Areas Collecting & Analyzing Traffic Information Developing Traffic Engineering Mechanisms
1.2 Our Research Topics • Developing & Deploying an Efficient Measurement Infrastructure. • First, Deploying a Measurement System covering entire KOREN/APII Links and using current open tools to collect basic information about KOREN status. • Next, Developing a KOREN Measurement System to support Traffic Engineering & Security efficiently. • How to Interchange Measurement Information between KOREN & other networks (QGPOP, APAN …) • Providing Other Research Areas with indispensable information about KOREN & other networks
2. Performance Engineering in KOREN Area • Now Traffic Engineering for KOREN have to be considered because Over-Engineering is limited • Simply Balancing Network Load • Optimizing Network Resource Utilization • Supporting User Requirements for End-to-End Performance through Edge-to-Edge Traffic Control • Two Issues should be considered simultaneously for KOREN Traffic Engineering .
2.1 Our Research Topics • Deploying Traffic Engineering System in KOREN NOC & Developing Traffic Engineering Mechanism • To collect network information • To control network traffic according to engineering policy • KOREN Edge-to-Edge Performance Information Service • To show end users edge-to-edge performance information through Web Service • To recommend a application a best path supporting user application requirements and not hurting traffic engineering goals simultaneously
3. Int. Performance Management Area • Oversea links should be effectively managed because they have limited resources. • KOREN can’t exactly control BGP operations by itself. • Received Information is up to neighbor domains (QGPOP). • So KOREN needs to cooperate with neighbor for International Performance Management. • BGP Protocol’s imperfection considerably affects KOREN Interior Performance. • So this area needs to be collaborated with Performance Engineering in KOREN area intimately.
3.1 Our Research Topics • Routing Technology for Oversea Link (APII-GENKAI) Management • Detecting & Correcting Asymmetric BGP Path • Load Balancing Mechanisms for Oversea links (APII-GENKAI) • Developing BGP Error Detection & Report System • To make overall map to show users/NOC BGP path at a glance
4. Network Security Area • Distributed Denial-of-Service (DOS) is to deny the victim(s) access to a particular resource/service • consumption of scarce, limited, or non-renewable resources • destruction or alteration of configuration information • physical destruction or alteration of network components • Attacks are detected using their inherent statistical characteristics
4.1 What Can ISPs Do for DOS? • Deploy source address anti-spoof filters (very important!). • Turn off directed broadcasts. • Develop security relationships with neighbor ISPs. • Set up mechanism for handling customer security complaints. • Develop traffic volume monitoring techniques.
4.2 Our Research Topics • Algorithm for dynamic and adaptive attack detection • Traceback mechanism to find original attackers. • Implementation & Deployment of Network Security system • A central network security system • Monitoring & filtering elements