Rights statement: © ACM, 2015. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CoNEXT '15 Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies http://dx.doi.org/10.1145/2716281.2836122
Accepted author manuscript, 1.29 MB, PDF document
Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License
Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Publication date | 1/12/2015 |
---|---|
Host publication | CoNEXT '15 Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies |
Place of Publication | New York |
Publisher | Association for Computing Machinery, Inc |
Number of pages | 13 |
ISBN (electronic) | 9781450334129 |
<mark>Original language</mark> | English |
Event | 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT 2015 - Heidelberg, Germany Duration: 1/12/2015 → 4/12/2015 |
Conference | 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT 2015 |
---|---|
Country/Territory | Germany |
City | Heidelberg |
Period | 1/12/15 → 4/12/15 |
Conference | 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT 2015 |
---|---|
Country/Territory | Germany |
City | Heidelberg |
Period | 1/12/15 → 4/12/15 |
Annotating Internet interconnections with robust physical coordinates at the level of a building facilitates network management including interdomain troubleshooting, but also has practical value for helping to locate points of attacks, congestion, or instability on the Internet. But, like most other aspects of Internet interconnection, its geophysical locus is generally not public; the facility used for a given link must be inferred to construct a macroscopic map of peering. We develop a methodology, called constrained facility search, to infer the physical interconnection facility where an interconnection occurs among all possible candidates. We rely on publicly available data about the presence of networks at different facilities, and execute traceroute measurements from more than 8,500 available measurement servers scattered around the world to identify the technical approach used to establish an interconnection. A key insight of our method is that inference of the technical approach for an interconnection sufficiently constrains the number of candidate facilities such that it is often possible to identify the specific facility where a given interconnection occurs. Validation via private communication with operators confirms the accuracy of our method, which outperforms heuristics based on naming schemes and IP geolocation. Our study also reveals the multiple roles that routers play at interconnection facilities; in many cases the same router implements both private interconnections and public peerings, in some cases via multiple Internet exchange points. Our study also sheds light on peering engineering strategies used by different types of networks around the globe.