Examination IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491
|
|
- Berniece Bell
- 7 years ago
- Views:
Transcription
1 Examination IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: October 22th 2007 at 9:00 13:00 SOLUTIONS
2 1. BGP messages (4p) Name the four message types in BGP. Briefly describe each message: What is its role in BGP, what mechanism does it implement? OPEN Initiate connection, exchange capabilities. Optional parameters used for capability negotiations. UPDATE Update information about routes. The message is partitioned into withdrawn routes, path attributes and network layer reachability information (NLRI). The path attributes apply to the NLRI defined. KEEPALIVE check liveness. The message is sent periodically to ensure that peers are reachable. TCP keepalives cannot be used since they (if enabled) are sent using longer intervals. NOTIFICATION signal errors. The message contains error codes and sub-codes that are defined for the BGP protocol. BGP messages are transferred reliably so in BGP one can assume that all messages are transferred to the other peer correctly. 2. Transport (5p) BGP peering is based on TCP (Transmission Control Protocol). Suppose an implementation of BGP would use UDP instead of TCP. (UDP is the User Datagram Protocol and is a simple datagram transport protocol using IP.) What would be the consequences? What mechanisms would have to be added to BGP? TCP is a reliable protocol. The consequences of using an unreliable transport protocol would be that BGP could no longer trust the transport layer to transfer the BGP data reliably. Packets could be lost, re-ordered or duplicated without BGP knowing it. The consequences of this would be very serious since route announcements or withdrawals could be dropped and lead to black-holing and illegal announcements. Note that UDP has the same checksum mechanism as TCP (but optional), so bit-errors in the payload would be detected in the same way as in TCP. Second, TCP has session control. It has mechanisms for opening, maintaining and closing sessions. This is not part of BGP (apart from the Open/notification messages) and would have to be added. Third, TCP has flow control, to not overrun the receiver buffers. This has to be added in BGP by using some feedback mechanism from the receiver. Further, without TCP, BGP would not adjust its sending rate to congestion in the network. Congestion detection may be optional, since it is not completely clear that it is always a benefit to have congestion control in this scenario, since this means that BGP would perform slower when there is more data traffic in the network. This could in fact mean that you could slow down BGP by overloading the network with other TCP flows. TCP also has an optional mechanism for authentication using an MD5 checksum mechanism.
3 Therefore, BGP would have to introduce new mechanisms in the protocol itself, for example by using message sequence numbers and ACKs, a sliding window protocol for flow control, loss and reordering detection, and optionally some congestion detection mechanism. 3. Attributes (5p) Name and describe five BGP path attributes. You should cover what the purpose is for each attribute and give a clarifying example of its use. The AS-PATH and NEXTHOP attributes should be included in the five attributes. Examples of attributes apart from AS_PATH and NEXTHOP are ORIGIN, MULTI_EXIT_DISC, LOCAL_PREF, ATOMIC_AGGREGATE, and COMMUNITY. There are also several other attributes that may be described from other than the base RFC. A brief description of each and an example is necessary for full points. (See book or lecture slides). 4. Decision process (6p) The BGP decision process is the process of selecting one single route out of several routes received from different peers (and even other protocols through route redistribution). There are several variants of the decision process used by different vendors, and even in different RFCs. However, the basic mechanism is the same. Describe the basic decision process in BGP. The decision process as described in the lecture notes is as follows (other variants may be accepted as well): 1. If next hop inaccessible, ignore route (this can actually be argued to be outside the decision process being an a priori condition) 2. Prefer highest local pref value 3. Prefer shortest AS_PATH 4. Prefer lowest origin type 5. Prefer lowest metric value (if from same AS) 6. Prefer routes from EBGP over IBGP 7. Prefer routes with lower IGP metric 8. Prefer routes from peer with lowest router id 9. Prefer routes from peer with lowest peer id 5. Transit traffic (6p) There are several ways of handling transit traffic through an autonomous system using IP routing. One way is to use an IGP (Interior routing protocol). Describe how you use an IGP for your transit traffic between EBGP border routers, and what drawbacks this has (in comparison with IBGP). If you use an IGP for transit traffic, you inject the external routes from EBGP into the IGP at the border routers. Using this technique it is
4 assumed that the border routers speak full mesh IBGP between each other. That is, the BR speak IBGP with each other, but not the internal routers. If the Brs do not speak IBGP between each other, mechanism to translate path attributes from BGP->IGP->BGP needs to be made, and this is much more difficult. For example, the AS_PATH needs to be conveyed correctly via the IGP do avoid BGP loops. The BGP routes injected into routes will be treated as external routes (in OSPF or ISIS) and need to be imported with appropriate metrics, for example by translating the AS_PATH length to OSPF metrics. When routes injected on one border reach another border router, that border router knows that it is safe to announce the prefix further, that is, synchronization between BGP and the IGP has been made. Drawbacks of this approach is (1) a large number of external routes will lead to a high memory consumption in the IGP. IGPs typically need much more memory for storing and transferring routes than BGP. The IGP mechanism to compute shortest path is often more CPU consuming as well (Dijkstra, etc) which leads to a slow convergence of the IGP. (2) The synchronization between the IGP and BGP needs to be made. Note however, that even though IGP is not used for transit traffic, it is still needed for next-hop reachability in a full-mesh IBGP transit network.
5 6. IBGP (10p) AS1 AS2 AS3 R4 R3 R2 R6 R7 R8 R1 R /24 Study the network above that contains AS1, AS2 and AS3. BGP runs between each AS on all links(using physical one-hop peering) and also within each AS as full mesh IBGP(using virtual loopback peering). Each AS also runs an IGP. AS1 contains the network / Which BGP peerings are present in the network above? Draw or write as text(1p) EBGP peerings: R3-R4, R1-R5, R7-R8. IBGP peerings: R1-R2, R2-R3, R1-R3, R4-R5,R4-R6,R4-R7,R5-R6,R5- R7,R6-R7. 2. Assume you configure AS1 and AS2 using BGP. Design the networks so that the traffic to /24 uses R3-R4 as primary connection, and R1-R5 as secondary. Describe a policy on how this may be achieved using BGP path attributes.(4p) Several techniques can be used, including MED, prefix pre-pending, and communities, and can also be combined with NO_EXPORT community. In all those scenarios it is the policies in R1 and R3 that are modified so that R4-R3 is preferred. For example,by letting R1 make extra prepends of AS1 to the AS_PATH as the route is announced externally, and spread within AS2. The key point is to make the traffic flow internally in AS2 to R4. Note that in the solution, traffic from R5 must also be sent via R3-R4 as first option. Use of LOCAL_PREF is typically more complex since you need to make a policy in R4/R5 as well. LOCAL_PREFs in AS1 is not meaningful for this question. 3. For the prefix /24 in AS2, write down proposed values of the AS_PATH and NEXTHOP attributes as they are announced by each router in the AS (ie R4, R5, R6 and R7). Write also down the values of any extra attributes that you may have used in your design in the previous exercise (2). Motivate your answer. You may have to add more information in order to complete this exercise (such as
6 interface addresses).(5p) This solution uses AS-path prepending (R1 prepends AS1 an extra time when announcing to R5). Assume IP1, IP3 and IP7 are the IP address on the external physical interface of R1, R3 and R7, respectively). Other solutions are possible. R4 announces /24 to R5, R6 and R7 using AS_PATH: AS1 and Nexthop: IP3. R5 may initially announce /24 to R4, R6 and R7 using AS_PATH: AS1 AS1 and nexthop: IP1.However, as soon as R5 receives the route from R4, it will consider that better (shorter AS_PATH) and since it is an IBGP route, not re-announce it internally. That is, R5 will not announce the prefix internally. However, R5 will now announce this prefix to R1 externally. R6 does not announce /24 since it has received this prefix from IBGP and it is not allowed to re-announce such a route via IBGP. R7 announces /24 to R8 using EBGP as follows: AS_PATH: AS2 AS1 and Nexthop: IP7. If MEDs or some other BGP attributes were used in the solution, then the values of these attributes would have to be included. 7. Route reflection (5p) What is route reflection, and why is it used? Which new attributes are introduced to provide route reflection and how are they used? Route reflection is a way to modify BGP's split-horizon rule so that a BGP node may be able to redistribute a route it has received from an IBGP neighbour. With the original IBGP full mesh requirement, all IBGP peers need to establish peering with every other IBGP peer, which leads to a high number of peerings, which leads to large RIBs (one adjribin/ adjribout for every peering), which in turn leads to high memory consumption and more processing to select routes. Route reflection establishes a hierarchy within an internal network. This hierarchy is defined of clusters consisting of clients. This leads to two new rules for redistribution: (1) If a route is received from a non-client peer (not within the cluster), reflect the route to all client peers; (2) If the route was received from a client, reflect it to all other clients and all nonclient peers. The two new attributes are CLUSTER_LIST (list of CLUSTER_IDs of all RR a route has passed through) and ORIGINATOR_ID(The original IBGP entry point can be a client for locally originated routes) which essentially are there to avoid loops within the internal network. 8. Communities (6p) Communities can be used as a general method to define the routing policy for an operator. Suppose a specific ISP has a set of of transit operators, a set of customers and a set of external peers with which it exchanges customer (non-transit) traffic. Describe how the ISP can use communities
7 to avoid being transit providers for such external peers. Describe using concrete examples. 9. VPNs (7p) A VPN (Virtual Private Network) comes in many variants. In this course we have studied provider-based VPNs, and we have labbed both L2VPNs (actually the correct term is VPWS for Virtual Private Wire Service) and L3VPNs. Compare L2VPN and L3VPN. What are the advantages and disadvantages of each, in relation to the other? The answer should cover scaling, configuration, complexity, at both the client and the provider. The important about the answer to this question is that the reasoning is coherent and correct. There may be several valid views and answers. The following is a very extensive proposal for an answer. L3VPN and L2VPN(VPWS) are both based on MPLS and BGP. In the lab we have also used RSVP as signaling protocol. In L2VPN the provider has to setup pseudo-wires between its sites, a configuration detail that is more difficult to maintain compared to the dynamic mechanism (the CEto-PE routing) in L3VPN. From a customer perspective one can argue that L2VPN is easier to configure than L3VPN since L2VPN is simply a pointto-point link, whereas for L3VPN the CE-to-PE routing need to be established and configured, typically by redistributing routes and maybe aggregating prefixes. However, you typically need to add VLANs for every new L2VPN which is a configuration complexity at the customer. In terms of scaling in terms of routes/memory, L2VPN typically scales better than L3VPN since no customer information(eg routes) are imported into the providers network. In L2VPN one has to set up pseudowires and this may be a tedious task if full-mesh is used between a large set of sites, but there is really no scaling consideration. L3VPN on the other hand may quickly lead to very large tables, especially if the provider has many customers, and if these customers have large routing tables, such as full-feed BGP. From a traffic scaling perspective, L3VPN is better, since L2VPN inherits the problem with the broadcast domains from LANs. That is, ARP requests and other broadcast traffic may flood the links. Additionally, loops may occur and one may have to run STP which leads to sub-optimal forwarding. If routers are used as endpoints to the pseudo-wires, however thos issues are not a problem. Finally, scaling with respect to connections is typically not an issue, since the state at each router is small. There are rally no scaling limitations from the customer's perspective in either solution. L3VPN is currently more popular in the market-place. From a security perspective the solutions are equivalent. 10. L3VPN (6p) 1. In L3VPN, what is the purpose of the route distinguisher? (1p) The route distinguisher (RD) is used to make the customer IP
8 prefixes unique within the providers network. The provider prepends the RD to the IP prefix and distributes it via MP-BGP internally. 2. In L3VPN, what is the purpose of route targets? (1p) Route targets (RT:s) are used to define a VPN. By tagging routes with RT:s (a route target is an extended BGP community attribute) and writing route target import rules, an operator may define how customer prefixes are exported and imported to a specific customer site (between BGP and a VRF). 3. How can route targets be used to create a full-mesh VPN? Give an example. (2p) One easy way is to make symmetric route targets for export and import so that the same (equal) RT is exported by all VRFs into BGP. For example, suppose a customer has three sites. Every site writes an export rule that tags all IP prefixes from that site with the same RT (eg 65001:3). The provider also writes an import rule at every site that imports all routes with that (same) RT (eg 65001:3). 4. How can route targets be used to create a hub-and-spoke VPN? Give an example(2p) In a hub-and-spoke VPN, all customer routes are announced via a central site (the hub). Reasons may be security, external routing, etc. In a hub-and-spoke VPN, the Pes at all customer sites (except the central) may tag its routes with a specific RT (such as 65001:1) when exporting the routes from the VRF to BGP. In the central hub, an import rule is defined that imports this RT (eg 65001:1). Further, after processing at the hub, the routes are re-announced, but now tagged with a new RT (eg 65001:2). All other sites use this RT in an import rule. In this way, all routes are first announced from the spokes, collected centrally and then re-announced to the spokes again.
Examination. IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491
Examination IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: December 15 2009 14:00 18:00 1. No help material is allowed - You
More informationBGP Router Startup Message Flow
LEG: Brief BGP Router Startup Message Flow This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). The Border Gateway Protocol (BGP) is an inter-autonomous
More informationAPNIC elearning: BGP Attributes
APNIC elearning: BGP Attributes Contact: training@apnic.net erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice
More informationInter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
More informationBGP Best Path Selection Algorithm
BGP Best Path Selection Algorithm Document ID: 13753 Contents Introduction Prerequisites Requirements Components Used Conventions Why Routers Ignore Paths How the Best Path Algorithm Works Example: BGP
More informationRouting Protocol - BGP
Routing Protocol - BGP BGP Enterprise Network BGP ISP AS 3000 AS 2000 BGP is using between Autonomous Systems BGP(cont.) RFC 1771(BGPv4) Support CIDR Transfer the AS information to reach destination Using
More informationBGP overview BGP operations BGP messages BGP decision algorithm BGP states
BGP overview BGP operations BGP messages BGP decision algorithm BGP states 1 BGP overview Currently in version 4. InterAS (or Interdomain) routing protocol for exchanging network reachability information
More informationE6998-02: Internet Routing
E6998-02: Internet Routing Lecture 13 Border Gateway Protocol, Part II John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More informationHow To Understand Bg
Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and
More informationDD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
More informationExterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
More informationModule 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur
Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the
More informationBGP Basics. BGP Uses TCP 179 ibgp - BGP Peers in the same AS ebgp - BGP Peers in different AS's. 64512-65535 Private BGP ASN. BGP Router Processes
BGP Basics BGPv4 - RFC 4271 - IPv6 support Path vector routing protocol EGP Routing between AS'es Classless Transit Area - Area used to reach other areas. Requires full routing table (no default routes).
More informationCS551 External v.s. Internal BGP
CS551 External v.s. Internal BGP Bill Cheng http://merlot.usc.edu/cs551-f12 1 Exterior vs. Interior World vs. me EGP vs. IGP Little control vs. complete administrative control BGP (and GGP, Hello, EGP)
More informationBorder Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
More informationDD2491 p1 2008. Inter-domain routing and BGP part I Olof Hagsand KTH/CSC
DD2491 p1 2008 Inter-domain routing and BGP part I Olof Hagsand KTH/CSC Inter-domain routing The objective of inter-domain routing is to bind together all the thousands of independent IP networks that
More informationInternet inter-as routing: BGP
Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability
More informationUsing the Border Gateway Protocol for Interdomain Routing
CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous
More informationLoad balancing and traffic control in BGP
DD2491 p2 2011 Load balancing and traffic control in BGP Olof Hagsand KTH CSC 1 Issues in load balancing Load balancing: spread traffic on several paths instead of a single. Why? Use resources better Can
More informationDD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC
DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Internet Routing Based on Computer Networking, 4 th Edition by Kurose and Ross Intra-AS Routing Also known as Interior Gateway Protocols (IGP) Most common Intra-AS routing protocols:
More informationUnderstanding Virtual Router and Virtual Systems
Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT
More informationAPNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: training@apnic.net Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
More informationRoute Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
More informationBorder Gateway Protocol (BGP-4)
Vanguard Applications Ware IP and LAN Feature Protocols Border Gateway Protocol (BGP-4) Notice 2008 Vanguard Networks 25 Forbes Blvd Foxboro, MA 02035 Phone: (508) 964 6200 Fax: (508) 543 0237 All rights
More informationBGP Terminology, Concepts, and Operation. Chapter 6 2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
BGP Terminology, Concepts, and Operation 1 IGP versus EGP Interior gateway protocol (IGP) A routing protocol operating within an Autonomous System (AS). RIP, OSPF, and EIGRP are IGPs. Exterior gateway
More information--BGP 4 White Paper Ver.1.0-- BGP-4 in Vanguard Routers
BGP-4 in Vanguard Routers 1 Table of Contents Introduction to BGP... 6 BGP terminology... 6 AS (Autonomous system):... 6 AS connection:... 6 BGP Speaker:... 6 BGP Neighbor/Peer:... 7 BGP Session:... 7
More informationBorder Gateway Protocol BGP4 (2)
Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning
More informationbasic BGP in Huawei CLI
basic BGP in Huawei CLI BGP stands for Border Gateway Protocol. It is widely used among Internet Service Providers to make core routing decisions on the Internet. The current BGP version is BGP-4 defined
More informationPRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
More informationAdministra0via. STP lab due Wednesday (in BE 301a!), 5/15 BGP quiz Thursday (remember required reading), 5/16
BGP Brad Smith Administra0via How are the labs going? This week STP quiz Thursday, 5/9 Next week STP lab due Wednesday (in BE 301a!), 5/15 BGP quiz Thursday (remember required reading), 5/16 Following
More informationIPv6 over MPLS VPN. Contents. Prerequisites. Document ID: 112085. Requirements
IPv6 over MPLS VPN Document ID: 112085 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram VRF Configuration Multiprotocol BGP (MP BGP) Configuration
More informationGregSowell.com. Mikrotik Routing
Mikrotik Routing Static Dynamic Routing To Be Discussed RIP Quick Discussion OSPF BGP What is Routing Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/routing In the context of this
More information6.263 Data Communication Networks
6.6 Data Communication Networks Lecture : Internet Routing (some slides are taken from I. Stoica and N. Mckewon & T. Griffin) Dina Katabi dk@mit.edu www.nms.csail.mit.edu/~dina Books Text Book Data Communication
More informationMPLS VPN Route Target Rewrite
The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets
More informationConfiguring BGP. Cisco s BGP Implementation
Configuring BGP This chapter describes how to configure Border Gateway Protocol (BGP). For a complete description of the BGP commands in this chapter, refer to the BGP s chapter of the Network Protocols
More informationInternet inter-as routing: BGP
Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability
More informationHow To Set Up Bgg On A Network With A Network On A Pb Or Pb On A Pc Or Ipa On A Bg On Pc Or Pv On A Ipa (Netb) On A Router On A 2
61200860L1-29.4E March 2012 Configuration Guide Configuring Border Gateway Protocol in AOS for Releases Prior to 18.03.00/R10.1.0 This guide only addresses BGP in AOS data products using AOS firmware prior
More informationBGP Attributes and Path Selection
BGP Attributes and Path Selection ISP Workshops Last updated 29 th March 2015 1 BGP Attributes BGP s policy tool kit 2 What Is an Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes
More informationBell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
More informationLecture 18: Border Gateway Protocol"
Lecture 18: Border Gateway Protocol" CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday! Some figures courtesy Mike Freedman Lecture 18 Overview" Path-vector Routing Allows scalable, informed
More informationChapter 49 Border Gateway Protocol version 4 (BGP-4)
Chapter 49 Border Gateway Protocol version 4 (BGP-4) Introduction... 1-3 Overview of BGP-4... 1-3 BGP Operation... 1-5 BGP Attributes... 1-6 BGP Route Selection... 1-8 Classless Inter-domain Routing (CIDR)
More informationInterdomain Routing. Outline
Interdomain Routing David Andersen 15-744 Spring 2007 Carnegie Mellon University Outline What does the Internet look like? Relationships between providers Enforced by: Export filters and import ranking
More informationAdvanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP
Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP Renato Lo Cigno Routing Algorithms: One or Many? Is there a single routing protocol in the Internet? How can different protocols and algorithms
More informationIncreasing Path Diversity using Route Reflector
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 5 ǁ May. 2013 ǁ PP.05-09 Increasing Path Diversity using Route Reflector Prasha Dubey
More informationIntroduction Inter-AS L3VPN
Introduction Inter-AS L3VPN 1 Extending VPN services over Inter-AS networks VPN Sites attached to different MPLS VPN Service Providers How do you distribute and share VPN routes between ASs Back- to- Back
More informationHow To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
More informationIK2205 Inter-domain Routing
IK2205 Inter-domain Routing Lecture 5 Voravit Tanyingyong, voravit@kth.se Outline Redundancy, Symmetry, and Load Balancing Redundancy Symmetry Load balancing Scenarios Controlling Routing Inside the AS
More informationDD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
More informationIntroduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
More informationMPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
More informationInterdomain Routing. Project Report
Interdomain Routing Project Report Network Infrastructure improvement proposal To Company A Team 4: Zhang Li Bin Yang Md. Safiqul Islam Saurabh Arora Network Infrastructure Improvement Interdomain routing
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationChapter 6: Implementing a Border Gateway Protocol Solution for ISP Connectivity
: Implementing a Border Gateway Protocol Solution for ISP Connectivity CCNP ROUTE: Implementing IP Routing ROUTE v6 1 Objectives Describe basic BGP terminology and operation, including EBGP and IBGP. Configure
More informationLoad balancing and traffic control in BGP
DD2491 p2 2009/2010 Load balancing and traffic control in BGP Olof Hagsand KTH /CSC 1 Issues in load balancing Load balancing: spread traffic on several paths instead of a single. Why? Use resources better
More informationThe ISP Column. An Introduction to BGP the Protocol
The ISP Column An occasional column on things Internet May 2006 Geoff Huston An Introduction to BGP the Protocol Routing in the Internet is divided into two parts fine-grained topological detail of connected
More informationAdvanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
More informationECSE-6600: Internet Protocols Exam 2
ECSE-6600: Internet Protocols Exam 2 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT omit necessary detail {Note: Simply copying text directly from the slides or notes will
More informationInter-domain Routing. Outline. Border Gateway Protocol
Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small
More informationITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1
IP Routing Primer Paul C. Huang, Ph.D. ITRI / / N300 /N300; Paul Huang 1999/6/2 1 Basic Addressing / Subnetting Class A 0 Network Host Host Host 127 networks / 16,777,216 hosts Class A natural mask 255.0.0.0
More informationHP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
More informationUnderstanding Route Aggregation in BGP
Understanding Route Aggregation in BGP Document ID: 5441 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Aggregate Without the as set Argument Aggregate with
More informationRouting in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks
Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router
More informationBGP4 Case Studies/Tutorial
BGP4 Case Studies/Tutorial Sam Halabi-cisco Systems The purpose of this paper is to introduce the reader to the latest in BGP4 terminology and design issues. It is targeted to the novice as well as the
More informationAnalyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP
Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations
More informationTransitioning to BGP. ISP Workshops. Last updated 24 April 2013
Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing
More informationIP Routing Configuring RIP, OSPF, BGP, and PBR
13 IP Routing Configuring RIP, OSPF, BGP, and PBR Contents Overview..................................................... 13-6 Routing Protocols.......................................... 13-6 Dynamic Routing
More informations@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ]
s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ] Topic 1, Volume A Question No : 1 - (Topic 1) How much overhead does the GRE
More informationEINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
More informationBGP1 Multihoming and Traffic Engineering
83950 Telecommunications Laboratory Course BGP1 BGP1 Multihoming and Traffic Engineering date & time student # name 1 2 bgp-tyo.tex,v 1.11 2005/04/18 14:09:14 ams Exp 1/17 Part I Home Assignment 1 General
More informationBFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45
BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two
More informationIP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationModule 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
More informationUsing OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationWeek 4 / Paper 1. Open issues in Interdomain Routing: a survey
Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many
More informationNetwork Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
More informationClass of Service (CoS) in a global NGN
Class of Service (CoS) in a global NGN Zukunft der Netze Chemnitz 2009 8. Fachtagung des ITG-FA 5.2 Thomas Martin Knoll Chemnitz University of Technology Communication Networks Phone 0371 531 33246 Email
More informationConfiguring and Testing Border Gateway Protocol (BGP) on Basis of Cisco Hardware and Linux Gentoo with Quagga Package (Zebra)
Configuring and Testing Border Gateway Protocol (BGP) on Basis of Cisco Hardware and Linux Gentoo with Quagga Package (Zebra) Contents Introduction Used Abbreviations Border Gateway Protocol (BGP) Overview
More informationGregSowell.com. Intro to Networking Mikrotik/Cisco
Intro to Networking Mikrotik/Cisco Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic.
More informationMPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
More informationBGP: Frequently Asked Questions
BGP: Frequently Asked Questions Document ID: 5816 Contents Introduction How do I configure BGP? How do I configure BGP with the use of a loopback address? What is the order of preference of attributes
More informationS-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006
S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006 Original version: Johanna Nieminen and Timo Viipuri (2005) Modified: Timo-Pekka Heikkinen, Juha Järvinen and Yavor Ivanov (2006) Task
More informationIMPLEMENTING CISCO MPLS V3.0 (MPLS)
IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility
More informationKingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
More informationExam Name: BGP + MPLS Exam Exam Type Cisco Case Studies: 3 Exam Code: 642-691 Total Questions: 401
Question: 1 Every time a flap occurs on a route, the route receives A. 750 per-flap penalty points which are user configurable B. 1500 per-flap penalty points which are user configurable C. 200 per-flap
More informationRouting with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
More informationUnderstanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
More informationDynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
More informationOutline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
More informationDoing Don ts: Modifying BGP Attributes within an Autonomous System
Doing Don ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre IEEE/IFIP Network Operations and Management Symposium
More informationCan Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?
Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Simon Balon and Guy Leduc Research Unit in Networking EECS Department- University of Liège (ULg) Institut Montefiore, B28 - B-4000
More informationIntroducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
More informationMPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN
MPLS VPN Peer to Peer VPN s Agenda MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) CE-PE OSPF Routing CE-PE Static Routing CE-PE RIP Routing
More informationBGP as an IGP for Carrier/Enterprise Networks
BGP as an IGP for Carrier/Enterprise Networks Presented by: Kevin Myers, SENIOR NETWORK ENGINEER IP ArchiTECHS MANAGED SERVICES Background Kevin Myers 15 + years in IT/Network Engineering Designed and
More informationInternetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
More information