Impact of BGP Dynamics on Router CPU Utilization
|
|
|
- Thomas Stafford
- 9 years ago
- Views:
Transcription
1 Impact of BGP Dynamics on Router CPU Utilization Sharad Agarwal 1, Chen-Nee Chuah 2, Supratik Bhattacharyya 3, and Christophe Diot 4 1 University of California, Berkeley, USA, [email protected] 2 University of California, Davis, USA, [email protected] 3 Sprint ATL, Burlingame, USA, [email protected] 4 Intel Research, Cambridge, UK, [email protected] 1 Introduction The Internet is an interconnection of separately administered networks called Autonomous Systems or ASes. To reach entities outside the AS, the inter-domain routing protocol used today is the Border Gateway Protocol or BGP [1]. It has been approximately 15 years since BGP was deployed on the Internet. The number of ASes participating in BGP has grown to over 16, 000 today. However, this growth has been super-linear during the past few years [2]. With this sudden growth there has been concern in the research community about how well BGP is scaling. In particular, it has been noted that there is significant growth in the volume of BGP route announcements (or route flapping) [3] and in the number of BGP route entries in the routers of various ASes [2]. For every BGP routing update that is received by a router, several tasks need to be performed [4]. First, the appropriate RIB-in (routing information base) needs to be updated. Ingress filtering, as defined in the router s configuration, has to be applied to the route announcement. If it is not filtered out, the route undergoes the BGP route selection rules and it is compared against other routes. If it is selected, then it is added to the BGP routing table and the appropriate forwarding table entry is updated. Egress filtering then needs to be applied for every BGP peer (except the one that sent the original announcement). New BGP announcements need to be generated and then added to the appropriate RIB-out queues. These actions can increase the load on the router CPU. Long periods of high router CPU utilization are undesirable due to two main reasons. High utilization can potentially increase the amount of time a router spends processing a routing change, thereby increasing route convergence time. High route convergence times can cause packet loss by increasing the window of time during which the route for a particular destination is unavailable. Further, high router CPU utilization can disrupt other tasks, such as other protocol processing, keep alive message processing and in extreme cases, can cause the router to crash. In this work, we answer the question Do BGP routing table changes cause an increase in average router CPU utilization in the Sprint IP network?. Sprint operates a tier-1 IP network that connects to over 2, 000 other ASes. Thus, we believe that it is a suitable point for studying the impact of BGP on average router CPU utilization. There has been prior work [5, 6] in analyzing BGP protocol behavior during worm propagation. To the best of our knowledge, there has been no prior published work on analyzing the relationship between BGP protocol behavior and router CPU utilization.
2 We examine BGP data from multiple routers in the network. We correlate this with SNMP data on CPU utilization for about 200 routers on different days inside Sprint. The findings of our work are: On average, BGP processes consume the majority of router CPU cycles. For short periods of time, we observe very high router CPU utilization due to BGP processes. We find that during normal network operation, there is some correlation between short increases in the number of BGP routing table changes and increases in average router CPU utilization and vice versa, at the time granularity of 5 minutes. However, over all the instances we observed, the impact was negligible. We find that during the SQL Slammer worm attack in January 2003, there was a tremendous increase in the amount of BGP changes that lasted for several hours and there was a correlation with average router CPU utilization. However, we find that the increase in utilization during this time was under 20% for almost all routers. There are some limitations of our work: Since the Sprint IP network consists purely of Cisco routers, we do not measure how other router architectures react to BGP protocol behavior. We do not benchmark router CPU performance in a laboratory testbed. Our emphasis is on actual performance in an operational environment. We do not attempt to create a detailed model of how the router CPU should react to different kinds and volumes of BGP messages. Such a model will be heavily influenced by the operating system source code, which we do not have access to. 2 Analysis Data To understand how BGP routing table changes impact average router CPU utilization, we need to analyze three kinds of data from the operational network. We now describe the routers that we access, the interactive session data, the SNMP (Simple Network Management Protocol) data and the BGP data that we analyze. 2.1 Routers The Sprint network (AS 1239) consists of over 600 routers, all of which are Cisco routers. We had access to data from 196 routers, the majority of which are Cisco GSR series and Cisco 7500 series with VIP interfaces. They all have either about 256 MB or 512 MB of processor memory. The route processor on each of these routers is a 200 Mhz MIPS R5000 family processor. The BGP routing protocol runs as part of the operating system. On older routers such as the Cisco 1600, 2500, 4500, 4700, 7200, and 7500, there is a single processor that runs both the operating system (IOS) and packet switching [7]. On newer architectures, such as the Cisco 7500 V IP and GSR 12000, the main processor runs IOS and interface card processors perform distributed packet switching. On these routers, the route processor runs all the routing protocols, builds the forwarding, CEF (Cisco Express Forwarding) and adjacency tables and distributes them to the line cards.
3 There are typically four BGP processes in Cisco IOS 5. The BGP Open process handles opening BGP sessions with other routers. It runs rarely. The BGP Scanner process checks the reachability of every route in the BGP table and performs route dampening. It will run once a minute and the size of the routing table will determine how long it takes to complete. The BGP Router process receives and sends announcements and calculates the best BGP path. It runs every second. The BGP I/O process handles the processing and queueing involved in receiving and sending BGP messages. The frequency of execution of this process will be related to the frequency of BGP updates. 2.2 Interactive Session Data All the routers in our study allow command line interface (CLI) access via secure shell (SSH). Upon logging into the router, we can issue commands to query the state of the router. We issued the show process cpu command to all routers during the study. This command lists all the processes in IOS, along with the CPU utilization of each process [7]. Both the percentage utilization of the CPU (over the last 5 seconds, 1 minute and 5 minutes) and the total number of CPU milliseconds consumed since the last boot of IOS is reported. This data provides an instantaneous snapshot of what processes are currently loading the CPU and which processes have consumed the most CPU resources since boot up. A sample output is below. CPU utilization for five seconds: 99%/2%; one minute: 18%; five minutes: 15% PID Runtime(ms) Invoked usecs 5Sec 1Min 5Min TTY Process % 0.00% 0.00% 0 Load Meter % 0.02% 0.03% 2 SSH Process % 0.39% 0.44% 0 BGP Router % 0.69% 0.70% 0 BGP I/O % 14.07% 11.12% 0 BGP Scanner SNMP Data Due to the limitation of how frequently we can collect CLI data, we also collect SNMP data. The SNMP protocol allows for a data collection machine to query certain SNMP counters on these routers and store the values in a database. We query the 1 minute exponentially-decayed moving average of the CPU busy percentage as defined in SNMP MIB We query and store this value once every 5 minutes from each one of the 196 routers that we have access to. The network operators cited concerns about affecting the router CPU load if we were to poll this counter more frequently. This data provides us with the CPU utilization at a relatively large time scale granularity and hence does not identify the process responsible for high load. We have collected this data for as long as 2.5 years for some routers. 2.4 BGP Routing Data In order to know if high CPU utilization is caused by a large number of BGP messages, we also analyze BGP data. We collect ibgp data from over 150 routers in the Sprint 5
4 network, all of which we also collect SNMP data from. We collect BGP data using the GNU Zebra 6 routing software. We connect to about 150 routers which comprise the ibgp route reflector mesh inside the Sprint network. Each PoP announces BGP routes that originate from it to the data collector. We also connect as route reflector clients to two routers in two different PoPs. 3 Results 3.1 Short Time Scale Behavior We first address the impact of the BGP routing protocol on router CPU utilization in short time scales. We analyze interactive session data here using the show process cpu command on routers in the Sprint network. This command was executed during normal network operation when no significant outage or abnormal behavior occurred. Across all 196 routers that we have access to, we see one of two cases when we execute the command. The common case is when the CPU is lightly loaded and no process is consuming a significant percentage of CPU load. In other cases, either the BGP Scanner or the BGP Router process consumes a significant percentage (sometimes over 95%) of CPU load in the 5 second average, but not in the longer term averages. This indicates that for very short time periods, BGP processes can contribute to high load on a router CPU. Aggregate statistics on how often this short time scale behavior manifests itself are difficult to produce since they are highly dependent on the collection methodology. Since polling techniques may have a lower priority than other routing processes in the operating system, aggregate results for such short time scales may be unreliable. However, for the remainder of this section, we focus on longer time scale behavior which does not suffer from this problem. 3.2 Aggregate Behavior The main focus of this work is the impact of BGP dynamics on time scales that are long enough to have the potential to increase route convergence times and impact router stability. The first issue to address here is how much the overall contribution of the BGP processes is to the CPU cycles consumed by the router operating system. The interactive session data shows the number of CPU cycles that each process has consumed since the router was booted. If we add the values for the three BGP processes and compare that to the sum of all the processes, we know the percentage of CPU cycles that the BGP protocol has consumed. On 20 February 2003, we collected a single snapshot of show process cpu data from all 196 routers that we have access to. On this day, no significant outage or abnormal network behavior occurred. Over 85% of the routers had been up for over 10 weeks when we collected the snapshots, which we consider to be long enough for a reliable reading. We calculate the percentage of CPU cycles that BGP processes consume and plot the histogram in Figure 1. We see that for the majority of routers, BGP processes consume over 60% of CPU cycles. Most of the routers below 60% were being phased out of the network and thus had few or no 6
5 # of Routers % Runtime Fig. 1. CPU Utilization due to BGP Processes BGP adjacencies. This histogram was similar across other days that we collected data on. We find that the BGP processes consume the majority of CPU cycles during router uptime. Given how much resource this protocol consumes, there is significant potential for protocol dynamics to directly impact router CPU load. We now consider how frequently high CPU load occurs in operational routers over a 2.5 year period. During this time, a CPU load value is reported every 5 minutes via SNMP. Across the routers that we have data for over 2.5 years, roughly 0.6% of the 5 minute samples are missing. This may be due to router reboots and / or losses in SNMP data collection. We find that typically in less than 1% of these samples the CPU load was above 50%. For the vast majority of time across these routers, the CPU load was below 50%. fraction of data points with load > 50% # of consecutive time intervals with load > 50% Fig. 2. Cumulative Sum of # of Time Intervals with CPU Load > 50% (Sept to Feb. 2003)
6 In Figure 2, we only consider time periods when the CPU load was above 50%. We transform the data into the number of consecutive time intervals with high CPU load and plot the cumulative sum of the sorted data. This shows that of the high CPU load occurrences, the majority of them occur for short time periods, but there are some that occur for long periods of time. This behavior is typical compared to the other routers for which we have data. These graphs are over very long periods of time, during which abnormal network conditions may have occurred to cause the long durations of high load. We now examine typical network conditions and abnormal network conditions separately, and specifically consider the impact by BGP. 3.3 Typical Network Conditions BGP Events (5 min. bin) Time (days) Fig. 3. ibgp Updates During a Typical Week (10-17 Feb. 2003) We begin by considering a typical week (10-17 February 2003) when no significant network event occurred. We examine if variations in the rate of BGP changes impact the average CPU utilization. In Figure 3, we show the number of BGP routing table changes at a router in the Sprint network. The graph is similar for other routers in the network; this one is picked arbitrarily. Each point in the graph represents the total number of changes to the BGP table during a 5 minute period. We see that on average, there are about 600 routing table changes every 5 minutes, but spikes of much higher rate of change occur. One such spike consisted of over 30, 000 changes, which we denote as Event A. However, these spikes do not last a long time. During this same time period, we plot the CPU load in percentage for the same router in Figure 4. Each point shows the percentage of CPU cycles that were consumed by the operating system (the remaining cycles are idle). This value is the 1 minute exponentially-decayed moving average of the CPU load and there is a point every 5 minutes. We see that the load is typically around 25%, and in one case exceeded 45% (which we denote as Event B ).
7 CPU Load % (5 min avg) Time (days) Fig. 4. CPU Load During a Typical Week (10-17 Feb. 2003) CCF Lag Fig. 5. CCF for 2 Hours Around Event A Comparing Figure 3 to Figure 4 shows little correlation. There is very little cross correlation between the two time series over the whole week. The CCF (cross correlation function) magnitude is less than 0.1. In Figure 5, we show the cross correlation between the two time series for a two hour period around Event A. We see that even during this short but significant increase in the number of BGP events, there is only a small correlation with the CPU load (a maximum CCF of about 0.3). In Figure 6, we focus on Event B where there was a significant increase in the CPU load. While there is some correlation here (a maximum CCF of about 0.6), when we check Figure 3 around Event B, we do not see a very large increase compared to normal activity throughout the week. This behavior we observe is typical across other routers and during other time periods. On average, the cross correlation is below In some instances, for two hour periods around specific cases of above average CPU utilization or high BGP activity, the
8 CCF Lag Fig. 6. CCF for 2 Hours Around Event B cross correlation is around 0.5. However, in none of these instances have we observed both high (significantly above average) CPU load and high BGP activity. 3.4 Abnormal Network Conditions Events (5 minutes) Time (hours) Fig. 7. ibgp Updates During the SQL Worm Attack (24-26 Jan. 2003) We now focus on abnormal network conditions. Around 05:30 UTC on 25 January 2003, the Sapphire/Slammer SQL worm attacked various end hosts on the Internet. While routers were not targeted, the additional traffic generated by the attack caused various links on the Internet to get saturated. This caused router adjacencies to be lost due to congestion, resulting in a withdrawal of BGP routes. These withdrawals propagated across the Internet. Upon withdrawal of these routes, congestion would no longer
9 occur on these links and BGP sessions would be restored, causing BGP routes to be re-added. This cycle repeated until filters were applied to drop the attack traffic. As a result, in Figure 7, we see a significant amount of BGP traffic. While the peak value of about 20, 000 route changes in a 5 minute window is not significant compared to the peaks in Figure 3, the length of time is. This large amount of activity took many hours to abate, instead of just a several minute spike. While this graph shows the number of changes at a particular router in the Sprint network, all routers that we have BGP data from experienced similar activity. CCF Lag Fig. 8. CCF During the SQL Worm Attack (24-26 Jan. 2003), One Hour Around Event We correlate this time series with the CPU load percentage for the same router. Across the 65 hour period, there is a correlation of 0.5 around time lag of 0 to 5 minutes. When we focus on 12 hours before and 12 hours after the start of the attack, we see a stronger correlation of 0.6. For a period of 30 minutes before and 30 minutes after the event in Figure 8, a maximum correlation of 0.7 is observed. We plot the maximum correlation between BGP changes and CPU load across all 196 routers that we have access to as a histogram in Figure 9. We see that most routers had a correlation of over 0.5 during this abnormal event. However, even with a strong correlation, we need to consider the magnitude of the impact on the router CPU load. In Figure 10, we show a histogram of the increase in CPU load during the 65 hour period that we consider across the 196 routers. The value that we show is the difference between the lowest CPU load and highest CPU load that each router experienced during the 3 day period. We see that despite the strong correlation, for most routers, there was less than a 20% increase in the router CPU load. In Figure 11 we show the histogram of the highest CPU utilization experienced by each router at any time during the 3 day period. We see that in most cases, the maximum load was below 50%. A few outliers above 50% exist in the data set, but manual inspection revealed that these few routers underwent scheduled maintenance during the increase in CPU load.
10 # of Routers CCF Fig. 9. Max. CCF During the SQL Worm Attack (24-26 Jan. 2003), 1 Hour Around Event # of Routers CPU Load % Shift Fig. 10. CPU Utilization Increase During the SQL Worm Attack (24-26 Jan. 2003) # of Routers CPU Load % Fig. 11. Maximum CPU Utilization During the SQL Worm Attack (24-26 Jan. 2003)
11 4 Conclusions Router CPU load is a significant concern in the operation of an ISP. Long periods of high CPU load can increase route convergence times, and has some correlation with router instability. The BGP routing protocol has a potential for significantly impacting CPU load due to the nature of the protocol. Several actions need to be taken upon receiving a route announcement, and on average more route announcements are seen by an ISP today than ever before. In this study, we examine the impact of BGP activity on operational routers in the Sprint IP network. We find that on average, BGP processes tend to consume over 60% of a router s non-idle CPU cycles. During short time scales (5 seconds), we have observed BGP processes contributing almost 100% CPU load. During longer time scales (1 5 minutes), we see a weaker correlation. During normal network operation, we find that there is some correlation between increased BGP activity and router CPU load, but the impact is small. During an abnormal network event that lasted over 10 hours, we find a correlation. However, the increase in CPU load was under 20% for most routers. BGP processes tend to run frequently for very short intervals, during which the CPU can reach the maximum utilization. Due to this, BGP consumes the majority of CPU cycles over a very long period of time (weeks). The quantity of BGP messages received during a particular cycle can increase the CPU load. However, this increase is not consistently large enough to cause concern about the operation of the router. A possibility is that certain kinds of BGP messages may increase the load more than others. However, without a detailed understanding of the specific implementation of BGP in these routers, we cannot speculate on such specific behavior. Thus we conclude that during normal operation, CPU load is not significantly impacted by BGP activity in the time scale of minutes. Short term impact in the time scale of seconds in not likely to significantly impact convergence times or router stability. During abnormal events of the magnitude of the SQL Slammer worm, router CPU is not likely to increase significantly. References 1. Stewart, J.W.: BGP4: Inter-Domain Routing in the Internet. Addison-Wesley (1998) 2. Huston, G.: Analyzing the Internet s BGP Routing Table. Cisco Internet Protocol Journal (2001) 3. Bu, T., Gao, L., Towsley, D.: On routing table growth. In: Proc. IEEE Global Internet Symposium. (2002) 4. Halabi, S., McPherson, D.: Internet Routing Architectures. Second edn. Cisco Press (2001) 5. Cowie, J., Ogielski, A., Premore, B., Yuan, Y.: Global Routing Instabilities during Code Red II and Nimda Worm Propagation. Draft paper (2001) 6. Wang, L., Zhao, X., Pei, D., Bush, R., Massey, D., Mankin, A., Wu, S.F., Zhang, L.: Observation and analysis of BGP behavior under stress. In: Proc. Internet Measurement Workshop. (2002) 7. Bollapragada, V., Murphy, C., White, R.: Inside Cisco IOS Software Architecture. Cisco Press (2000)
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Dynamics of Prefix Usage at an Edge Router
Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, [email protected]}
#41 D A N T E I N P R I N T. TEN-155 Multicast: MBGP and MSDP monitoring. Jan Novak Saverio Pangoli
D A N T E I N P R I N T TEN-155 Multicast: #41 MBGP and MSDP monitoring Jan Novak Saverio Pangoli DANTE IN PRINT is a track record of papers and articles published by, or on behalf of DANTE. An HTML version
Table of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
BGP Routing Stability of Popular Destinations
BGP Routing Stability of Popular Destinations Jennifer Rexford, Jia Wang, Zhen Xiao, and Yin Zhang AT&T Labs Research; Florham Park, NJ Abstract The Border Gateway Protocol (BGP) plays a crucial role in
BGP Route Analysis and Management Systems
BGP Route Analysis and Management Systems Alex A. Stewart and Marta F. Antoszkiewicz Department of Computer Science The University of Northern Iowa 305 ITTC Cedar Falls, Iowa 50614-0507 {astewart, mantoszk}@cs.uni.edu
Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics
Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics Mohit Lad, Lixia Zhang Computer Science Department University of California Los Angeles, CA 90095, USA mohit,lixia @cs.ucla.edu Dan Massey
Introduction to Routing
Introduction to Routing How traffic flows on the Internet Philip Smith [email protected] RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,
Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP
Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP Seung-Hwa Chung 1, Deepali Agrawal 1, Myung-Sup Kim 1, James W. Hong 1, and Kihong Park 2 1 DPNM Lab., Dept. of Computer
Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP
Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations
Increasing Path Diversity using Route Reflector
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 5 ǁ May. 2013 ǁ PP.05-09 Increasing Path Diversity using Route Reflector Prasha Dubey
Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
Using the Border Gateway Protocol for Interdomain Routing
CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
Internet inter-as routing: BGP
Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability
Border Gateway Protocols
Paper 106, ENG 104 Border Gateway Protocols Sadeta Krijestorac, Marc Beck, Jonathan Bagby Morehead State University University of Louisville Florida Atlanic University [email protected] [email protected]
Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?
Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Simon Balon and Guy Leduc Research Unit in Networking EECS Department- University of Liège (ULg) Institut Montefiore, B28 - B-4000
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Monitoring and analyzing audio, video, and multimedia traffic on the network
Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin [email protected] AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University
Week 4 / Paper 1. Open issues in Interdomain Routing: a survey
Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Simple Network Management Protocol (SNMP) Causes High C
Simple Network Management Protocol (SNMP) Causes High C Table of Contents IP Simple Network Management Protocol (SNMP) Causes High CPU Utilization...1 Introduction...1 Before You Begin...1 Conventions...1
Inter-domain Routing. Outline. Border Gateway Protocol
Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
Troubleshooting Network Performance with Alpine
Troubleshooting Network Performance with Alpine Jeffrey Papen As a Network Engineer, I am often annoyed by slow Internet performance caused by network issues like congestion, fiber cuts, and packet loss.
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
CISCO IOS NETFLOW AND SECURITY
CISCO IOS NETFLOW AND SECURITY INTERNET TECHNOLOGIES DIVISION FEBRUARY 2005 1 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network
Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution
APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
NetFlow v9 Export Format
NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new
IP Accounting C H A P T E R
C H A P T E R 6 IP Accounting This chapter describes the IP Accounting features in Cisco IOS and enables you to distinguish the different IP Accounting functions and understand SNMP MIB details. This chapter
DDoS Mitigation via Regional Cleaning Centers
SPRINT ATL RESEARCH REPORT RR04-ATL-013177 - JANUARY 2004 1 DDoS Mitigation via Regional Cleaning Centers Sharad Agarwal Travis Dawson Christos Tryfonas University of California, Berkeley Sprint ATL Kazeon
Interdomain Routing. Outline
Interdomain Routing David Andersen 15-744 Spring 2007 Carnegie Mellon University Outline What does the Internet look like? Relationships between providers Enforced by: Export filters and import ranking
Quantifying the BGP routes diversity inside a tier-1 network
Quantifying the BGP routes diversity inside a tier-1 network Steve Uhlig, Sébastien Tandel Department of Computing Science and Engineering Université catholique de Louvain, Louvain-la-neuve, B-1348, Belgium
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
NetFlow Performance Analysis
NetFlow Performance Analysis Last Updated: May, 2007 The Cisco IOS NetFlow feature set allows for the tracking of individual IP flows as they are received at a Cisco router or switching device. Network
Understanding BGP Next-hop Diversity
This paper was presented as part of the 14th IEEE Global Internet Symposium (GI) 211 at IEEE INFOCOM 211 Understanding BGP Next-hop Diversity Jaeyoung Choi, Jong Han Park, Pei-chun Cheng, Dorian Kim, Lixia
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
3. Dataset size reduction. 4. BGP-4 patterns. Detection of inter-domain routing problems using BGP-4 protocol patterns P.A.
Newsletter Inter-domain QoS, Issue 8, March 2004 Online monthly journal of INTERMON consortia Dynamic information concerning research, standardisation and practical issues of inter-domain QoS --------------------------------------------------------------------
KT The Value Networking Company
KT The Value Networking Company IRIMS (Internet Routing Information Management System) 2005. 9 Y.D. KIM, G.E.KIM, C.K.Hwang, J.H.YOO (webman, gekim, ckhwang, styoo@kt kt.co..co.kr) Abstract An AS (Autonomous
A Closed-Loop Control Traffic Engineering System for the Dynamic Load Balancing of Inter-AS Traffic
A Closed-Loop Control Traffic Engineering System for the Dynamic Load Balancing of Inter-AS Traffic Mina Amin, Kin Hon Ho, George Pavlou & Michael Howarth Centre for Communication Systems Research, Dept.
How To Understand Bg
Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export
Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export Last Updated: November 28, 2011 This module contains the minimum amount of information about and instructions necessary for configuring
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
An Overview of Solutions to Avoid Persistent BGP Divergence
An Overview of Solutions to Avoid Persistent BGP Divergence Ravi Musunuri Jorge A. Cobb Department of Computer Science The University of Texas at Dallas Email: musunuri, cobb @utdallas.edu Abstract The
TECHNOLOGY WHITE PAPER. Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform
TECHNOLOGY WHITE PAPER Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform Abstract Enterprises are expanding their private clouds and extending
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Routing and traffic measurements in ISP networks
Routing and traffic measurements in ISP networks Steve Uhlig Network Architectures and Services Delft University of Technology Email : [email protected] URL : http://www.nas.ewi.tudelft.nl/people/steve/
A Link Load Balancing Solution for Multi-Homed Networks
A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only
ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc.
ISP Case Study UUNET UK (1997) ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Acknowledgements Thanks are due to UUNET UK for allowing the use of their configuration information and network
Unicast Reverse Path Forwarding
Unicast Reverse Path Forwarding This feature module describes the Unicast Reverse Path Forwarding (RPF) feature, which helps to mitigate problems caused by malformed or forged IP source addresses passing
Detection and Analysis of Routing Loops in Packet Traces
Detection and Analysis of Routing Loops in Packet Traces Urs Hengartner, Sue Moon, Richard Mortier, Christophe Diot Abstract Routing loops are caused by inconsistencies in routing state among a set of
for guaranteed IP datagram routing
Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure
Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better
Embedded BGP Routing Monitoring. Th. Lévy O. Marcé
Embedded BGP Routing Monitoring Th. Lévy O. Marcé Introduction & Motivations Off-line BGP routing monitoring initiatives (i.e based on router logs) already exist: Periodic report : The CIDR Report Objective
Understanding Large Internet Service Provider Backbone Networks
Understanding Large Internet Service Provider Backbone Networks Joel M. Gottlieb IP Network Management & Performance Department AT&T Labs Research Florham Park, New Jersey [email protected] Purpose
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Configuring Health Monitoring
CHAPTER 6 This chapter describes how to configure the health monitoring on the CSM and contains these sections: Configuring Probes for Health Monitoring, page 6-1 Configuring Route Health Injection, page
BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <[email protected]>, <[email protected]>
BGP route monitoring Mar, 25, 2008 Matsuzaki maz Yoshinobu , 1 abstract BGP prefix hijack is a serious security issue in the internet, and these events have been widely
Delivering Quality in Software Performance and Scalability Testing
Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,
Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:
Course: Building Cisco Service Provider Next-Generation Networks, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,750.00 Learning Credits: 38 Description: The Building Cisco Service Provider
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
Internet inter-as routing: BGP
Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability
NetFlow Configuration Guide, Cisco IOS Release 12.4
NetFlow Configuration Guide, Cisco IOS Release 12.4 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
Inter-domain Routing
Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010 Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system
Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur
Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
The Case for Source Address Routing in Multihoming Sites
The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.
Doing Don ts: Modifying BGP Attributes within an Autonomous System
Doing Don ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre IEEE/IFIP Network Operations and Management Symposium
7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
