Incorporating Congestion Control in BGP considering its. Economic and Policy Effects

Size: px
Start display at page:

Download "Incorporating Congestion Control in BGP considering its. Economic and Policy Effects"

Transcription

1 Incorporating Congestion Control in BGP considering its Economic and Policy Effects Dhaval Malnika Jay Kothari Kishan Parekh Vinita Shah TLEN 5700: Research Methods April 25, 2014 Advisors: Prof. Jose Santos Prof. Mark Dehus Special Thanks: Jay Robertson Senior Manager, IP/CDN Software Engineering Internap Page 1

2 ABSTRACT The Internet can be visualized as an interconnection of Autonomous Systems (ASes), which use the Border Gateway Protocol (BGP) as the standard for exchanging network information among each other. The growth of the Internet has made it possible to access information with ease, but on the other hand, it has given rise to the problem of congestion. BGP does not have an inherent mechanism to avoid or detect congested areas and routes packets through paths that are often congested. The AS_PATH attribute in BGP is an indicator for selecting the best path to reach a certain Internet destination. Current congestion control practice involves manual network configuration changes by network engineers. Our proposal is to amend the BGP protocol to incorporate congestion control mechanism. Thus, we have developed a tool that continuously monitors a link for congestion and automatically carries out AS path prepending to re-route the traffic from a congested link onto another, thereby improving network reachability and reducing packet loss. A new model discussing the related economic and policy consequences is also discussed in the paper. Page 2

3 Table of Contents Serial No. Introduction Page No. I. Introduction 5 i. ii. Statement of the problem Research Question 5 6 II. Literature Review 9 III. Research Methodology 10 IV. Research Results 19 V. Discussion of Results 22 VI. Conclusion and Future Research 24 VII. References 25 List of Figures Serial No. Name of Figures Page No. Fig ISP 2 incurs cost for ISP 1 s traffic 8 Fig. 3.1 Congested BGP topology 11 Fig. 3.2 Congestion Detection algorithm 13 Fig. 3.3 Congestion Recovery algorithm 14 Fig. 3.4 Congestion-controlled BGP 15 Fig. 3.5 Co-ordination between Tier 1 ISPs 16 Fig. 3.6 Multihomed customer 17 Fig 3.7 Economic incentives for Tier 2 ISPs to form a full-mesh 18 Page 3

4 Serial No. Name of Figures Page No. Fig 4.1 Bandwidth vs. % Loss due to congestion 20 Fig 4.2 Comparison of Bandwidth vs. % Loss 20 Fig. 4.3 Graph of transmit load on interfaces 21 Fig. 4.4 Flow analysis graph 22 Fig 4.5 % Loss with a congested alternate path 22 Page 4

5 I. Introduction i. Statement of the problem The Internet is comprised of a large number of ASes and exchanging routing information between two or more ASes is achieved using BGP. BGP is a vector distributed routing protocol and uses TCP as its underlying mechanism, making it reliable [1]. It is not only important for the BGP sessions to be reliable, but also scalable to provide inter-domain Internet connectivity. However, in case of link congestion, the BGP router still forwards packets along the same path, increasing packet loss and degrading network reachability. It not only leads to the packets being dropped and re-sent repeatedly, but also affects cost, performance, and adds delay which eventually affects the customer. Current solutions to cope with congestion majorly focus more on increasing the available bandwidth by adding more links between routers [2]. It is not economical for ISPs to meet traffic requirements by incrementing bandwidth at Layer-1 as traffic is irregular and not always at maximum capacity. Service Providers rely on mechanisms such as Multi-Protocol Label Switching Traffic Engineering (MPLS-TE) and route manipulations that can control congestion to a certain extent by redirecting traffic through suboptimal paths within an AS, but for inter-as congestion-control, there is no clear technique. Thus, a multi-provider congestion control mechanism needs to be implemented by enhancing BGP, to reduce overall packet loss and improve reachability. Considering the previous reasons, there is a need to incorporate an intelligent BGP implementation that will choose a path considering the network utilization and traffic patterns at some point in time. We propose the use of AS Path Prepending as a method to reduce congestion in BGP. By prepending AS_PATH to the destination prefix, we deflect all traffic flows for that Page 5

6 destination onto another suboptimal link, which helps solving delay, packet loss, and throughput problems. Along with BGP, there come certain types of relationships between different ASes. They are commonly referred to as peer, transit, and customer relationships. These three types have traffic agreements between them, what is more commonly known as Service Level Assurances/Agreements (SLAs). These SLAs in customer-transit relationships have monetary arrangements. Generally, peer-peer relationships are settlement-free or require certain financial agreements depending upon the shared number of routes between both the ASes. For example, Century Link and Verizon have settlement-free peering, since both have equal number of routes to share, while Verizon and Cogent have paid-peering since the number of routes shared from both ISPs have a significant difference. Tier-I ISPs have more number of Internet routes as compared to Tier-2 ISPs. Tier-I ISPs offer transit services to Tier-2 ISPs and Tier-2 ISPs offer transit services to its customers. Alternate links to a destination might not have the same financial agreements. Deflecting traffic onto these alternate links, which are not congested, could be a concern to the customertransit and peer-peer relationships. This traffic deflection could cause problems in the SLAs. ii. Research Question: How will integrating a congestion-control mechanism in BGP make it a network efficient protocol and what will be the economic and policy implications as well as feasibility from an industry standpoint? The rest of the paper is organized as follows: The following sub-section provides the subproblems associated with BGP congestion. Section II highlights the literature review and the research done so far regarding BGP congestion. Section III discusses the research methodology. Page 6

7 Section IV provides the results we achieved after running tests on a congested network topology. In Section V, we discuss on the results achieved. Section VI proposes the future scope for this research and conclusion. Research Sub-problems: This section will discuss critical issues and challenges to the possible adoption of congestion control mechanism in BGP. When diverting traffic onto an alternate link, if the alternate path to a destination becomes congested as well, there is a possibility of path flapping or bouncing effect. The traffic will flap between the best path and the alternate path until all the data is sent to the destination. This behavior has to be avoided to prevent packets arriving out of order or packets not arriving at all at the destination. Packet losses will cause retransmission requests through the flapping paths, which will degrade network performance further. Bouncing effect can be eliminated by the router having the best path to the destination by refusing to divert traffic again if it receives the traffic back from the alternate link. An ISP implementing congestion control mechanism may divert traffic to some other ISP. However, some of the ISPs may restrict such traffic flow and as a result the traffic will be black holed. For example, if ISP 2 has implemented congestion control mechanism and if it experiences congestion, then the BGP packet sent by ISP 1 towards ISP 2 will now have a different path towards the destination. Assuming the traffic is now flowing through ISP 3, and if ISP 3 has implemented policies for the traffic to be blocked, all the traffic being diverted to ISP 3 will be dropped. As a result, we might have to implement this mechanism globally and SLAs between the ISPs will have to be Page 7

8 modified. Traffic could be offloaded between the ISPs on an equivalent basis. This also highlights the importance for the ISPs to collaborate among one another for such a congestion control mechanism. The inclusion of these modifications into BGP can lead to economic and policy challenges. Economic: As shown in Fig 1.2.1, congestion occurs on the link between ISP 1 and Transit Provider. In order for ISP 1 to reach its destination, sending data over ISP 2 s link may not seem a plausible solution for ISP 2 because it may not want traffic of a customer on its own link from which it does not obtain profits. This can be a problem when the available alternate paths of ISP 2 are via the transit provider. ISP 2 might have to pay the transit provider, which can result into an overall increase in their costs, which will eventually be borne by the customers or certain financial arrangements will have to be made between the ISPs. Also, such methods may not be acceptable to ISP 2, which are having their bills increased due to diversion of traffic. Fig ISP 2 incurs cost for ISP 1 s traffic Policy: By default, ISPs give highest priority to traffic from their customers, followed by peers, and then transit. The alternate or suboptimal path might be via either peer or transit and if congestion control in BGP will be implemented, the peering and traffic arrangements rules will change to a certain extent. Currently, certain ISPs block traffic of Page 8

9 other ISPs from entering their domain unless they are explicitly permitted. This restriction needs to be changed in order to successfully implement congestion control mechanism in BGP. In addition, ISPs may be required to share internal topological information and/or their available routes with other ISPs, which can lead to ISPs losing their competitive edge [3]. As a result, ISPs might become hesitant to adopt this idea into BGP. II. Literature Review When BGP was invented in 1989, there was no support for traffic congestion based on network load, cost and performance which led to numerous instances of Internet outages. Also, during congestion, BGP still prefers the congested best-path route to a given destination. Experts have done extensive research to overcome this frailty in BGP. The key research ideas related to our research are listed below. Gupta et al., MacKie-Mason and Varian proposed a new Internet model with users being the customers, and providers as suppliers of services like videos, stock quotes, etc. Their model deals with priority pricing mechanisms, where the users decide how much priority they want to give to their own traffic, before sending it towards the destination. In this way, when congestion occurs, lower priority traffic can be dropped and the users with higher priority traffic can pay a higher amount than usual [4]. This research gave us the idea of enabling BGP to prioritize traffic based on its distance (maximum AS path length) from the congested area. Fujinoki, Wang and Gao proposed ideas to include multiple paths in the BGP routing table. They devised methods like Multi-Path BGP, D-BGP, and B-BGP, which added suboptimal paths into BGP for a given destination without creating routing loops [5] [6]. This increased overall network efficiency and throughput in case of congestion. Page 9

10 Sebakor et al. proposed a unique method of introducing a control system for each AS, which controls the inter-domain traffic. This method reserves capacity on a link for certain IP traffic and allocates bandwidth to other traffic automatically. The results obtained from this research showed that the control system could achieve efficiency in link utilization, avoid possible link congestion, and decrease the packet loss rate [7]. The concept of a BGP Path Announcer in our research stems from this idea. According to statistics from the AT&T backbone, about 30% of routes are AS prepended which indicates the significant impact of the attribute on the entire Internet domain [8]. Prepending an AS path does not compromise the BGP routing resilience or increase the BGP routing table size. Rocky K.C. Change et.al proposed various advantages of AS path prepending approach for means of traffic engineering [9]. We incorporated such an approach into our algorithm to reduce manual network configuration and enable predictable control over change in traffic flow. Agarwal et al. proposed an Overlay Policy Control Architecture (OPCA), which runs as an overlay network on top of BGP in the Internet. OPCA allows an AS to make route changes to other remote ASs and achieve quicker fail-over. It also provides an AS the capability to control the inbound traffic, and thereby help in avoiding congestion [10]. This idea cannot be implemented in real world because traffic of one AS is being manipulated by another AS, which would violate current norms in the Internet. To overcome this limitation, we created a model where each AS is independent but requires collaboration with other ASes. III. Research Methodology We adopted the following methodology for our research: Step 1: Proving that BGP cannot handle congestion Page 10

11 We simulated a non-congestion-controlled BGP topology in a multi-as environment. The topology consisting of five ASes had all the possible paths from the source to the destination and selected the best path using the BGP decision process. Thereafter, we simulated a congested BGP scenario by continuously flooding stream of data using Iperf, thereby congesting a particular link between two ASes. Fig. 3.1 Congested BGP topology Iperf is a free Linux based network performance tool used to measure various TCP and UDP parameters such as bandwidth, delay, jitter, packet loss [11]. Here, client is the sender and server is the receiver. All ASes in Fig. 3.1 have external BGP (ebgp) running between them. We created data streams of different bandwidths ranging from 1 Mbps to 100 Mbps and streamed the data from Ubuntu client to Ubuntu server. Also, we observed the % packet loss and % transmit load on the outgoing interface of AS 2 for different bandwidths. Step 2: Logging and analyzing the data We logged the data from the results and analyzed various performance parameters like average end-to-end delay, average packet loss rate, and average load. Then we processed the Page 11

12 logged data to plot the graph of Bandwidth vs. % Loss and Bandwidth vs. % Load to compare them with the results of congestion-controlled BGP scenario. Step 3: Developing the algorithm We developed a tool to achieve congestion control and route optimization using AS Path Prepending approach. The tool is basically divided into two components. 1. The Initial Setup: Simple Network Management Protocol (SNMP) is extensively used to poll the router for various information regarding the interface index, IP addresses, the next hop addresses, routing table attributes and information about the BGP routes, and the AS path lengths. A link object is created that maps the link index to its directly connected neighbors and possible routable network destinations. A dictionary mapping of IP addresses to their AS path lengths is also stored during the initial setup. 2. Active Continuous Measurement: The tool actively monitors all the links of the router for its utilization values. The formula used for calculation link utilization is: [12] Input Utilization = ifinoctets (number of seconds in ) ifspeed Output Utilization = ifoutoctets (number of seconds in ) ifspeed where ifinoctets and ifoutoctets represents the count of inbound and outbound octets of traffic respectively. A variable threshold value is defined to identify congestion on the link. When the link utilization value exceeds the threshold value, the tool starts its congestion control mechanism. Page 12

13 Fig 3.2 Congestion Detection algorithm From the link object, the interface index, IP addresses along with their AS path lengths, and it s directly connected interfaces are retrieved. In case the link has never faced congestion, a subset list of IP addresses having AS path length equal to the maximum AS path length is obtained. Page 13

14 Route-maps to prepend the AS path are entered into the router, which triggers in its immediate neighbors a BGP decision process to choose an alternate best path for the concerned IP addresses. Route maps can also be entered on the basis of Netflow statistics to prepend the largest traffic flow through the router. Such a decision is left onto the ISP. The program then returns to monitoring link utilization. In case the link utilization value still persists above the threshold value, the router again starts the congestion control mechanism. Since, it has already prepended the AS value for the maximum possible AS path lengths, it now prepends the AS path for IP addresses with the next maximum AS path length. Fig 3.3 Congestion Recovery algorithm Page 14

15 If the link utilization value decreases beyond a minimum threshold value, the link is no longer congested. At this point, the ISP will try to restore its previous best forwarding path. The tool identifies from the link object, the minimum of the AS path value for which route maps were entered along with the corresponding IP addresses. The tool then continues to monitor the link utilization. Fig 3.2 also takes care of the bouncing effect or flapping of routes. After diversion of traffic, in case no peers have the required capacity to allow the traffic, the traffic is routed back to ISP, which initially prepended the path. At this stage the ISP can drop/allow the traffic. Step 4: Implementing the algorithm We implemented the mechanism explained in Fig. 3.2 and Fig. 3.3 in the following BGP scenario, where the link between AS 1 and Switch 0 is 10 Mbps and the link between AS 2 and AS 3 is 100 Mbps. Thereafter, we analyzed the traffic patterns to compare average end-to-end delay, average packet loss rate, and average load between traditional BGP and congestioncontrolled BGP. Fig. 3.4 Congestion-controlled BGP Page 15

16 Step 5: Interviews As per our topology and obtained results; we conducted interviews with experts from ISPs to know their viewpoints over a possible integration of congestion-control mechanism into BGP. The interviews helped us analyze the industry standpoint on the possible integration of this new concept in BGP. The interviews mainly focused on these major domains: Awareness: How far the industry experts were aware about the BGP congestion problem and any existing mechanism that could solve the issue Feasibility: The feasibility of incorporating the algorithm in regards to technical and commercial viability Prospective clientele: Based on the current market scenario, who among Tier 1 ISPs, Tier 2 ISPs, and customers, would have an interest in implementing such automatic congestion control mechanism Step 6: Proposed Model Considering the current business relationships among the ASes, we propose a modified Internet model to address the economic and policy sub-problems mentioned previously. The model is divided into the following scenarios: Fig. 3.5 Co-ordination between Tier 1 ISPs Page 16

17 Scenario 1: Explicit Co-ordination among the Tier 1 ISPs As addressed in the economic and policy sub-problem, diversion of traffic onto another link will not be acceptable to an ISP due to increase in costs and trust issues. However, we suggest that all Tier-1 ISPs engage in coordinated inter-domain routing and traffic engineering as shown in Fig As of today, ISPs take independent decisions to carry out its own network engineering, which can impact another ISP's traffic. Coordinated routing on the other hand, requires exchange of policies and routing decisions allowing predictable incoming and outgoing traffic engineering control. Rahul et al, further explain how ISPs can end in a win-win situation while maintaining limited information disclosure among the ISPs. We support the idea of ISPs engaging themselves in a two-way exchange of information and route negotiation between the upstream and the downstream routers as it provides a strong base for global deployment of our tool. With the ability to predict traffic changes, ISPs can divert traffic without worrying about local resource policies and system instability, thus optimizing cost and network performance [13]. Fig. 3.6 Multihomed customer Scenario 2: Mutihomed ASes and Customers "Mutihomed" means connected to more than one Internet service provider as shown in Fig Over the past few years, there has been an increase in the growth of multihomed ASes Page 17

18 and customers to improve network connectivity and performance. We propose the use of our tool for all such enterprise networks that have more than one connection to the Internet. The tool will allow automated traffic engineering control by varying the AS's traffic among the different service providers it is connected to, thus providing better network utilization. Such automated load balancing abilities allow the AS to support more users connecting to the Internet leading to increased revenues. Fig. 3.7 Economic incentives for Tier 2 ISPs to form a full-mesh Scenario 3: Economic arrangements between full-meshed Tier 2 ISPs According to the current Internet model, the interconnection between Tier 2 ISPs is sparse as compared to the interconnection between the Tier 1 ISPs [14]. Tier 2 ISPs purchase transit from the Tier 1 ISPs in order to access the Internet. Congestion on the Tier 2 transit link results in more costs for the Tier 2 ISP in order to allow the additional traffic. We suggest in our model that all the Tier 2 ISPs in a specific region have full mesh connectivity between themselves. Such complete peering benefits the Tier 2 ISPs by reducing the overall transit cost. Considering the transit cost between Tier 1 and Tier 2 is $1/Mbps, the Tier 2 ISP facing congestion can offload Page 18

19 the additional traffic through another Tier 2 peer for the duration of congestion. The costs of the additional traffic can be billed: At the same cost as it would have been to a Tier 1 ISP or, Based upon specific peering and traffic load balancing agreements among the Tier 2 ISPs Based upon pay-per-use of network resources. Such model allows support for inflow and outflow of money among the Tier 2 ISPs as against the current unidirectional outflow of money from a Tier 2 ISP to a Tier 1 ISP. Another additional benefit is that the Tier 2 ISP has a virtual link capacity equal to the entire Tier 2 full mesh bandwidth, thus allowing support for more customers and traffic generating income for the Tier 2 ISP. IV. Research Results After implementing the BGP topology as shown in Fig 3.1, the first step was to prove that BGP cannot handle congestion. We performed the following steps: 1. Injected a stream of data packets on a serial link for the bandwidths ranging from 1 Mbps to 100 Mbps from the Ubuntu client to the Ubuntu server 2. There was no packet loss from 1 Mbps to Mbps. For various link bandwidths from Mbps to 100 Mbps, we observed that the packet loss increased exponentially and remained constant (97%) after 70 Mbps as shown in Fig Page 19

20 Fig. 4.1 Bandwidth vs. % Loss due to congestion 3. Fig. 4.2 shows the comparison graph of Bandwidth (BW) vs. % Loss before and after implementing the congestion-control algorithm. The blue curve represents a flow of traffic within the link capacity of Fa0/0 (AS1). Thus, when the BW was between 1 and 10 Mbps the corresponding loss was 0%. As we increased the bandwidth beyond 10 Mbps, the % loss increased exponentially, as shown by the red curve. At 60 Mbps, we started our congestion control mechanism and as seen, the traffic gets diverted onto the Fa0/1, AS2 link and the flow does not suffer from loss of packets and reaches the destination. Fig. 4.2 Comparison of Bandwidth vs. % Loss Page 20

21 4. Fig. 4.3 shows the comparison graph of % transmit load on outgoing interfaces Fa0/0 and Fa0/1 for routers AS1 and AS2 in Fig. 3.4 respectively. The values are plotted before congestion as well as before and after implementing the congestion-control algorithm. The bar graph shows that the transmit load was 1% before congestion. After congestion on the Fa0/0 interface of AS1, the transmit load rises to 63% i.e. the interface is using around 63% of the available transmit bandwidth. The red portion in the bar graph represents % packet loss on the Fa0/0 interface. Once the algorithm diverts the traffic via an alternate path, the transmit load gradually decreases to 19% on Fa0/0 of AS1 and increases to 30% on the interface Fa0/1 of AS2. Fig. 4.3 Graph of transmit load on interfaces 5. Fig. 4.4 compares the % Loss for 3 flows, which have the same best path to reach the destination, ultimately leading to congestion of the link. Referring Fig. 3.4, flow 1 is traffic from customer connected to AS 1, while flow 2 and flow 3 represent external traffic passing through AS 1. Due to congestion there is a 70-80% loss for flow 1 and flow 2. Since the link is completely congested, there is 100% packet loss for flow 3. We Page 21

22 implement the algorithm for the external traffic, but not for our customer traffic. When the algorithm is implemented, the packet loss for all the three flows becomes 0%. Fig. 4.4 Flow analysis graph 6. The Iperf result shown in Fig. 4.5 is to illustrate the bouncing effect. It shows that link Fa0/0 (AS1) has 68% packet loss when the link is congested. The packet loss on the link reduces to 0% because of the AS Path Prepending. However, the alternate link also gets congested diverting the traffic back to the original path. Thus, we see an increase in packet loss from 0%, back to 68% on the Fa0/0 link. iperf -s -p i 1 u [ 3] local port 6005 connected with port [ ID] Interval Transfer Bandwidth Jitter Lost/Total Datagrams [ 3] sec 1.14 MBytes 9.57 Mbits/sec ms 1736/ 2550 (68%) [ 3] sec 1.14 MBytes 9.57 Mbits/sec ms 1737/ 2551 (68%) [ 3] sec 3.43 MBytes 28.8 Mbits/sec ms 624/ 3073 (20%) [ 3] sec 3.58 MBytes 30.0 Mbits/sec ms 0/ 2551 (0%) [ 3] sec 3.58 MBytes 30.0 Mbits/sec ms 0/ 2551 (0%) [ 3] sec 1.14 MBytes 9.57 Mbits/sec ms 1737/ 2551 (68%) [ 3] sec 1.14 MBytes 9.57 Mbits/sec ms 1737/2551 (68%) Congestion Management Redirection via another path Peer had no available bandwidth Fig. 4.5 % Loss with a congested alternate path V. Discussion of Results Page 22

23 1. As per Fig. 4.1, the rate at which the data is being sent is much higher as compared to the actual capacity of the link resulting in packet loss. The BGP protocol continues to send traffic over the congested link even though there are alternate paths to reach the destination. This shows that BGP has no inherent congestion control mechanism. 2. From Fig. 4.2, we see that link bandwidth was insufficient to handle the incoming traffic resulting in packet loss. As the link utilization increased above the threshold value, the algorithm diverted the additional traffic via an alternate link, which had enough capacity to forward the incoming traffic towards the destination at 0% loss. 3. Fig. 4.3 shows that the link congestion results in packet loss and a high transmit load on the interface. Since the algorithm diverts traffic via an alternate link, the loads get shared among the interfaces. 4. The Iperf result in the fig. 4.5 shows that our algorithm takes care of situation when the alternate path to the destination is also congested. Diverting the traffic causes congestion on the alternate link which then sends the traffic back through the original path. Even though the traffic bounces back with no reduction in packet loss, the traffic is not completely dropped or black holed. However, if such a scenario occurs the ISPs can decide whether to allow/block the traffic. 5. To understand the industry standpoint and the feasibility of the tool, we interviewed industry experts from Tier 1 and Tier 2 ISPs. We asked them about their awareness of the BGP congestion problem, deployment feasibility and viability, and potential customers who could buy our solution. The experts from CenturyLink suggested that the effectiveness of the tool depends on the acceptance of the Open Internet model by other ISPs. They suggested making the tool capable of recognizing multiple links between two Page 23

24 Tier 1 ISPs and pass traffic through those links. They also agreed that such automatic congestion control tool can be readily deployed for multihomed ASes and customers. Tier 2 ISPs supported the idea as this solution not only solves their congestion problem, but also benefits them and their customers economically. They also have an added advantage in the form of inflow and outflow on money, and an increased customer base. VI. Conclusion and Future Research In this paper, we have proposed a novel approach for controlling congestion by diverting traffic onto another link by means of AS Path Prepending traffic engineering approach. Initially, our tool creates a database of all the necessary information, actively probes the links to detect utilization, and then undertakes necessary steps to control congestion. The entire process is automated as opposed to the current ad-hoc engineering methods and does not have any additional dedicated hardware or software requirements. The paper also proposes a model that supports an Open Internet system and explains various scenarios for which the tool can be readily deployed. From the results obtained, we conclude that such automated tools are the future for network operations management and troubleshooting. Our current BGP congestion control mechanism tool works on three simple principles of link utilization monitoring, BGP AS Path Prepending attribute, and co-ordination among the ISPs. The future scope of the tool is based on the decision of the ISPs and their willingness to adopt the Open Internet model. The Open Internet architecture provides the ability to monitor links of different ASes and divert traffic based on least link utilization. The ISPs can choose to develop additional complex features to increase the tool s efficiency to measure delay and throughput characteristics and also take into consideration Netflow statistics before diverting onto an alternate path. Page 24

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to: Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations

More information

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As) Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP) Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better

More information

Interdomain Routing. Outline

Interdomain Routing. Outline Interdomain Routing David Andersen 15-744 Spring 2007 Carnegie Mellon University Outline What does the Internet look like? Relationships between providers Enforced by: Export filters and import ranking

More information

Improving Reliability for Multi-Home Inbound Traffic: MHLB/I Packet-Level Inter-Domain Load-Balancing

Improving Reliability for Multi-Home Inbound Traffic: MHLB/I Packet-Level Inter-Domain Load-Balancing Improving Reliability for Multi-Home Inbound Traffic: MHLB/I Packet-Level Inter-Domain Load-Balancing Hiroshi Fujinoki Department of Computer Science Southern Illinois University Edwardsville Edwardsville,

More information

Inter-domain Routing

Inter-domain Routing Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010 Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system

More information

Interdomain Routing. Project Report

Interdomain Routing. Project Report Interdomain Routing Project Report Network Infrastructure improvement proposal To Company A Team 4: Zhang Li Bin Yang Md. Safiqul Islam Saurabh Arora Network Infrastructure Improvement Interdomain routing

More information

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router

More information

Intelligent Routing Platform White Paper

Intelligent Routing Platform White Paper White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5

More information

Internet inter-as routing: BGP

Internet inter-as routing: BGP Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

A Link Load Balancing Solution for Multi-Homed Networks

A Link Load Balancing Solution for Multi-Homed Networks A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better

More information

Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D.

Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D. Active measurements: networks Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D. Outline Organization of Internet routing Types of domains Intra- and inter-domain routing Intra-domain

More information

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu ABSTRACT

More information

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN

More information

Inbound Traffic Engineering for Multihomed ASes Using AS Path Prepending

Inbound Traffic Engineering for Multihomed ASes Using AS Path Prepending Inbound Traffic Engineering for Multihomed ASes Using AS Path Prepending Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University Hung Hom, Kowloon Hong Kong csrchang@comp.polyu.edu.hk

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers

More information

Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics

Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics WHITE PAPER Table of Contents Introduction 3 Route-Flow Fusion 4 BGP Policy Visibility 5 Traffic Visibility

More information

APNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0

APNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0 erou03_v1.0 APNIC elearning: BGP Basics Contact: training@apnic.net Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes

More information

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution

More information

Building MPLS VPNs with QoS Routing Capability i

Building MPLS VPNs with QoS Routing Capability i Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358

More information

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service

More information

BGP route propagation. Internet AS relationships, Routing policy on Internet paths. Example of commercial relationship. Transit vs.

BGP route propagation. Internet AS relationships, Routing policy on Internet paths. Example of commercial relationship. Transit vs. BGP route propagation Internet AS relationships, Routing policy on Internet paths Z. Morley Mao Lecture 5 Jan 20, 2005 Connectivity does not imply reachability Not all possible routes propagate Commercial

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many

More information

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

Inter-domain Routing. Outline. Border Gateway Protocol

Inter-domain Routing. Outline. Border Gateway Protocol Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

Using the Border Gateway Protocol for Interdomain Routing

Using the Border Gateway Protocol for Interdomain Routing CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous

More information

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

Border Gateway Protocols

Border Gateway Protocols Paper 106, ENG 104 Border Gateway Protocols Sadeta Krijestorac, Marc Beck, Jonathan Bagby Morehead State University University of Louisville Florida Atlanic University s.krijestor@moreheadstate.edu marcbeck1982@yahoo.com

More information

Advanced BGP Policy. Advanced Topics

Advanced BGP Policy. Advanced Topics Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Hands on Workshop. Network Performance Monitoring and Multicast Routing. Yasuichi Kitamura NICT Jin Tanaka KDDI/NICT APAN-JP NOC

Hands on Workshop. Network Performance Monitoring and Multicast Routing. Yasuichi Kitamura NICT Jin Tanaka KDDI/NICT APAN-JP NOC Hands on Workshop Network Performance Monitoring and Multicast Routing Yasuichi Kitamura NICT Jin Tanaka KDDI/NICT APAN-JP NOC July 18th TEIN2 Site Coordination Workshop Network Performance Monitoring

More information

IAB IPv6 Multi-Homing BOF. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

IAB IPv6 Multi-Homing BOF. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI IAB IPv6 Multi-Homing BOF Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Multi-homing Problems Inbound to the destination traffic engineering is needed Current

More information

How To Understand Bg

How To Understand Bg Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Internet Routing Based on Computer Networking, 4 th Edition by Kurose and Ross Intra-AS Routing Also known as Interior Gateway Protocols (IGP) Most common Intra-AS routing protocols:

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Malicious MPLS Policy Engine Reconnaissance

Malicious MPLS Policy Engine Reconnaissance Malicious MPLS Policy Engine Reconnaissance A. Almutairi 1 and S. Wolthusen 1,2 1 Information Security Group Royal Holloway, University of London, UK and 2 Norwegian Information Security Laboratory Gjøvik

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

MPLS: Key Factors to Consider When Selecting Your MPLS Provider White paper MPLS: Key Factors to Consider When Selecting Your MPLS Provider New Edge Networks June 2008 New Edge Networks 3000 Columbia House Blvd. Vancouver, WA 98661 360-693-9009 1-866-636-EDGE www.newedgenetworks.com

More information

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Simon Balon and Guy Leduc Research Unit in Networking EECS Department- University of Liège (ULg) Institut Montefiore, B28 - B-4000

More information

Iperf Tutorial. Jon Dugan <jdugan@es.net> Summer JointTechs 2010, Columbus, OH

Iperf Tutorial. Jon Dugan <jdugan@es.net> Summer JointTechs 2010, Columbus, OH Iperf Tutorial Jon Dugan Summer JointTechs 2010, Columbus, OH Outline What are we measuring? TCP Measurements UDP Measurements Useful tricks Iperf Development What are we measuring? Throughput?

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Class of Service (CoS) in a global NGN

Class of Service (CoS) in a global NGN Class of Service (CoS) in a global NGN Zukunft der Netze Chemnitz 2009 8. Fachtagung des ITG-FA 5.2 Thomas Martin Knoll Chemnitz University of Technology Communication Networks Phone 0371 531 33246 Email

More information

Border Gateway Protocol BGP4 (2)

Border Gateway Protocol BGP4 (2) Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning

More information

Border Gateway Protocol (BGP-4)

Border Gateway Protocol (BGP-4) Vanguard Applications Ware IP and LAN Feature Protocols Border Gateway Protocol (BGP-4) Notice 2008 Vanguard Networks 25 Forbes Blvd Foxboro, MA 02035 Phone: (508) 964 6200 Fax: (508) 543 0237 All rights

More information

VIABILITY OF DEPLOYING ebgp AS IGP IN DATACENTER NETWORKS. Chavan, Prathamesh Dhandapaani, Jagadeesh Kavuri, Mahesh Babu Mohankumar, Aravind

VIABILITY OF DEPLOYING ebgp AS IGP IN DATACENTER NETWORKS. Chavan, Prathamesh Dhandapaani, Jagadeesh Kavuri, Mahesh Babu Mohankumar, Aravind VIABILITY OF DEPLOYING ebgp AS IGP IN DATACENTER NETWORKS Chavan, Prathamesh Dhandapaani, Jagadeesh Kavuri, Mahesh Babu Mohankumar, Aravind Faculty Advisors: Jose Santos & Mark Dehus A capstone paper submitted

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

Dove siamo? Architecture of Dynamic Routing

Dove siamo? Architecture of Dynamic Routing Dove siamo? Algoritmi di routing Protocolli di routing» Intra dominio (IGP)» Inter dominio (EGP) Le slides relative a questo argomenti sono tratte da Interdomain Routing and The Border Gateway Protocol

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Recovery Modeling in MPLS Networks

Recovery Modeling in MPLS Networks Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

Measuring Wireless Network Performance: Data Rates vs. Signal Strength

Measuring Wireless Network Performance: Data Rates vs. Signal Strength EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength

More information

Lecture 18: Border Gateway Protocol"

Lecture 18: Border Gateway Protocol Lecture 18: Border Gateway Protocol" CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday! Some figures courtesy Mike Freedman Lecture 18 Overview" Path-vector Routing Allows scalable, informed

More information

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in

More information

BGP: Border Gateway Protocol

BGP: Border Gateway Protocol LAB 8 BGP: Border Gateway Protocol An Interdomain Routing Protocol OBJECTIVES The objective of this lab is to simulate and study the basic features of an interdomain routing protocol called Border Gateway

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol . White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed

More information

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers

More information

Troubleshooting Network Performance with Alpine

Troubleshooting Network Performance with Alpine Troubleshooting Network Performance with Alpine Jeffrey Papen As a Network Engineer, I am often annoyed by slow Internet performance caused by network issues like congestion, fiber cuts, and packet loss.

More information

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP

More information

Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning

Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning Two Approaches to Internet Engineering for End-to-End Quality of Service Provisioning Kin-Hon Ho, Michael Howarth, Ning Wang, George Pavlou and Stylianos Georgoulas Centre for Communication Systems Research,

More information

BGP Routing Stability of Popular Destinations

BGP Routing Stability of Popular Destinations BGP Routing Stability of Popular Destinations Jennifer Rexford, Jia Wang, Zhen Xiao, and Yin Zhang AT&T Labs Research; Florham Park, NJ Abstract The Border Gateway Protocol (BGP) plays a crucial role in

More information

Module 12 Multihoming to the Same ISP

Module 12 Multihoming to the Same ISP Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

The Value of Flow Data for Peering Decisions

The Value of Flow Data for Peering Decisions The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this

More information

Border Gateway Protocol Best Practices

Border Gateway Protocol Best Practices Border Gateway Protocol Best Practices By Clifton Funakura The Internet has grown into a worldwide network supporting a wide range of business applications. Many companies depend on the Internet for day-to-day

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

BGP Best Path Selection Algorithm

BGP Best Path Selection Algorithm BGP Best Path Selection Algorithm Document ID: 13753 Contents Introduction Prerequisites Requirements Components Used Conventions Why Routers Ignore Paths How the Best Path Algorithm Works Example: BGP

More information

BGP Route Analysis and Management Systems

BGP Route Analysis and Management Systems BGP Route Analysis and Management Systems Alex A. Stewart and Marta F. Antoszkiewicz Department of Computer Science The University of Northern Iowa 305 ITTC Cedar Falls, Iowa 50614-0507 {astewart, mantoszk}@cs.uni.edu

More information

Increasing Path Diversity using Route Reflector

Increasing Path Diversity using Route Reflector International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 5 ǁ May. 2013 ǁ PP.05-09 Increasing Path Diversity using Route Reflector Prasha Dubey

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Understanding Route Aggregation in BGP

Understanding Route Aggregation in BGP Understanding Route Aggregation in BGP Document ID: 5441 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Aggregate Without the as set Argument Aggregate with

More information

for guaranteed IP datagram routing

for guaranteed IP datagram routing Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation

More information

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw

More information

Internet inter-as routing: BGP

Internet inter-as routing: BGP Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability

More information

Introduction to Routing

Introduction to Routing Introduction to Routing How traffic flows on the Internet Philip Smith pfs@cisco.com RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,

More information

The Requirement for a New Type of Cloud Based CDN

The Requirement for a New Type of Cloud Based CDN The Requirement for a New Type of Cloud Based CDN Executive Summary The growing use of SaaS-based applications has highlighted some of the fundamental weaknesses of the Internet that significantly impact

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Measure wireless network performance using testing tool iperf

Measure wireless network performance using testing tool iperf Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,

More information

ISPs Traffic Engineering and Peering Strategy

ISPs Traffic Engineering and Peering Strategy ISPs Traffic Engineering and Peering Strategy WANG, Hui A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Doctor of Philosophy in Information Engineering c The Chinese University

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information