Chapter 1 INTRODUCTION

Size: px
Start display at page:

Download "Chapter 1 INTRODUCTION"

Transcription

1 Chapter 1 INTRODUCTION 1.1 Introduction With the advent of internet the world of computer and communication has been revolutionized. The internet can be defined as a mechanism for information dispersal with world-wide transmission proficiency which acts as a medium for coactions and intercommunication between individuals and their computers without regard of geographic location. Internet has played very important role in research and development of information infrastructure. Evolution of internet began with early research on packet switching and the ARPANET and the research continues to expand along several areas such as performance, scale and higher level functionality. In late 1966 DARPA (Defense Advanced Research Projects Agency) developed the computer network concept and this concept was published as ARPANET in In 1968 DARPA released an RFQ for the development of one of the key components, the packet switches called interface message processors (IMP s). The Bolt Beranek and Newman (BBN) team worked on IMP s which lead to overall development of ARPANET architectural design and the network topology. In 1969 BBN installed the first IMP at UCLA which resulted in first host computer being connected. By the end of 1969, four host computers were connected together into the initial ARPANET and thus began the internet. In such an early stage stress was laid on networking research which integrated work on elementary network and how to employ the network. This rule is being followed even today also. The original ARPANET transformed into the internet. Internet was based on idea that there would be multiple independent networks of rather random design, beginning with ARPANET which will include other networks to increase the functionality. This lead to the development of open architecture network, in which individual networks are designed and developed separately and each may have its own unique interface. Such types of networks were designed according to the user requirements in some specific environment. No constraints were applied on them such as geographic scope. The idea of open-architecture networking was introduced by Kahn at DARPA in Kahn also developed a new the protocol which could meet the requirements of open-architecture network environment. This protocol was 1

2 Transmission Control Protocol/ Internet Protocol (TCP/IP). Kahn expected that TCP protocol support a range of transport services, from reliable sequenced delivery of data to a datagram service, but TCP worked only with virtual circuits. This leads to the development of an alternative protocol which was named User Datagram Protocol (UDP). Large scale development of LANs, PCs and workstations in 1980s allowed the developing internet to flourish. This leads to the development of many new concepts and changes to underlying technology. First, it resulted in the definition of three network classes (A, B, and C) to accommodate the range of networks. Class A represented small number of networks with large number of hosts, Class B represented regional scale networks and Class C represented local area networks i.e. large number of networks with relatively few hosts. For the ease of the users, hosts were assigned names. Earlier there were very less number of hosts, so it was easy and feasible to maintain a single table of all hosts and their associated names and addresses. But as the usage of the Internet increased, the number of hosts also increased. So having a single table to maintain hosts was not feasible option. This resulted in development of Domain Name System (DNS). It was invented by Paul Mockapetris of USC/ISI. The DNS permitted scalable distributed mechanism for resolving hierarchical host names into an internet addresses. The increase in the size of the Internet also challenged the capabilities of the routers. Originally, there was a single distributed algorithm for routing that was implemented uniformly by all the routers in the Internet. As the number of networks in the Internet exploded, this initial design could not expand as necessary, so it was replaced by a hierarchical model of routing, with an Interior Gateway Protocol (IGP) [46] used inside each region of the Internet, and an Exterior Gateway Protocol (EGP) used to tie the regions together. This design permitted different regions to use a different IGP, so that different requirements for cost, rapid reconfiguration, robustness and scale could be accommodated. Not only the routing algorithm, but the size of the addressing tables, stressed the capacity of the routers. New approaches for address aggregation, in particular classless inter-domain routing (CIDR), have recently introduced to control the size of router tables. 1.2 Routing in the Internet The basic function of the router in a network is to determine the best route for a packet to travel across a network from its source to its destination. Routers accomplish this task by 2

3 storing information in tables and referring to these tables to determine the best path. Various routing protocols have been developed to assist the router in mapping the network and create routing tables. Networks within the internet can be divided into domains. The network under each domain falls under the same administrative authority but they differ in terms of scale, autonomy and privacy which are applied to routing within a domain and routing between domains. Based on domains routing can be broadly classified in to two types which are discussed in following sections Intradomain Routing Intradomain routing is performed on a single domain or a single network and the administrator of the domain has full control and information about network topology, load, and configuration. The goal of Intradomain routing is to establish network connectivity even as network topology keeps on changing due to link additions, hardware failures and to avoid congestion by load balancing. Intradomain routing forms a set of uniform, best routes at every router to each Intradomain destination. One of the most common intradomain routing protocol are link state protocols. In link state routing protocol, routers collect information about the state of links according to which routers can update their view of network topology. From this information the routers construct a weighted graph. From this graph shortest paths are selected and traffic is routed to that path. If routers find multiple shortest paths then traffic is evenly distributed on all those paths (Load balancing). Changes to the network topology initiate new link state packets which in turn reinitiate re-computations of network topology and best routes. Link state routing protocols [45] does not provide flexibility because it only allows distributing the traffic on paths of the same minimal cost and if same link weights are used before and after link failure, the performance can degrade Interdomain Routing In Interdomain routing traffic is exchanged between different domains which are controlled by different administrators which do not have full knowledge about other s domain. Unlike Intra domain routing, paths are calculated across the domains that the traffic needs to traverse to reach destination. Once the packet is forwarded to another domain, that domain has total control over it & its next path. 3

4 In 1984, EGP (Exterior gateway protocol) became formalized in RFC 904. EGP are path vector protocols in which when information about router is exchanged, then entire path (Called path vector) is included in it. From this information Nodes/Stations can check whether they already appear in path vector and if so they discard that route. Routes are maintained at the autonomous system (AS) / domain level. EGP message do not contain information about routes which are used within a domain, which results in the privacy of network topology from other domains. EGP Route-selection Procedure: Each router maintains a routing table with AS paths to various IP prefixes. If more than one router is available at the destination then selection of best route is done on the basis of router s local policy configuration. These local policies directly influence the setting of attribute values which the information about a route stored in routing table entry. To gain knowledge about destination advertisements are broadcasted from neighbouring routes. Once a path has been established between AS, they exchange reach ability information with its neighbours. This allows the AS to gain information about destination. Paths are established by repeating the following three step process: (i) Routes are imported through neighboring routes which contains information about established routes. This route information depends upon update message & import policy. (ii) For each destination the protocol s best route selection procedure is used to choose best routes. (iii) These selected best routes are then exported by advertising them to neighboring routes through update message. The routes which exchange this information with inter-as connections are called border routers. The EGP establishes connectivity & share reach ability information across interdomain links and it also distributes information of inter-domain routes to non-border routes. EGP uses autonomous system number (ASN). ASN is represented by a unique 2-byte or recently introduce due to ASN pool exhaustion, 4-byte identifier associated with AS. ASN s are assigned in blocks by the internet assigned numbers authority (IANA) to regional Internet registries (RIR s). Recursively, RIR s assign ASN from their IANA allocated blocks within its designated area BGP (Border Gateway Protocol) To overcome the problems of EGP, in 1989 the new protocol was introduced BGP [46] (Border Gateway Protocol). BGP no longer let routers find neighbours on their own; it required them to be configured manually and ran over TCP. BGP version (RFC 1105) - June 4

5 1989 still had the notion of up, down or horizontal relationships as in EGP. This limitation was removed in BGP-2 (RFC1163) June 1990 along with major changes to the message formats BGP-3 (RFC 1267). In 1991 BGP identifier field was introduced in the open message and defined how to use this field to decide which connection is terminated when two BGP neighbours each initiate a TCP session at the same time. In 1994, BGP-4 (RFC1654, later RFC 1771) added CIDR (Classless Interdomain routing), aggregation support, the local preference attributes and a per-connection hold time. In BGP every router receives reach ability information from its neighbours and then router chooses the route with the shortest path for inclusion in the routing table and announces this path to other neighbours, if the routing policy permits it. The path is a list of every Autonomous System (AS) between the router & the destination. The idea behind AS is that network don t care about the inner details of other networks. Thus instead of listening every router along the way, BGP groups network together within ASes (Autonomous Systems) [55] so they may be viewed as a single entity, whether an AS contains only a single BGP-speaking router or hundreds of BGP and non-bgp speaking routers. BGP 4 is the de-facto routing protocol in Internet. The reason BGP has achieved its status in the Internet today is because it has following characteristics: 1. Reliability: BGP s reliability can be examined from following perspectives: a) BGP uses TCP (Transmission Control protocol) on port 179 for communication between neighbours. This eliminates the need in BGP to implement update fragmentation, retransmission, Ack and sequencing because TCP takes care of these functions. b) BGP also uses regular keepalives and update messages to maintain session integrity. A BGP session is closed if three consecutive keepalives are missed and no update messages are received. c) BGP uses various measures to transmit accurate routing information. For e.g., (i) When updates are received, AS-PATH (a BGP attribute that lists the Ases the route has transferred) is check to detect loops. (ii) Inbound filters can be applied to all updates that ensure conformance to local policies. (iii) Unreachable routes are removed from time to time. 5

6 2. Stability: In order to achieve stability in large network, BGP uses various mechanisms such as Minimal Route Advertisement Interval (MRAI), along with filters to avoid synchronization of updates. Route dampening is another BGP feature that suppresses instability by penalizing the unstable routes. 3. Scalability: Scalability of BGP can be evaluated in two ways: (i) Number of peer sessions (ii) Number of routes. Depending on the configuration, Hardware platforms and Cisco IOS release, BGP has been proven to support hundreds of peer sessions and maintain well over 100,000 routes. To increase the scalability of BGP, the number of routes to be maintained or the number of updates generated can be reduced. BGP also uses route reflection and confederation to increase the scalability. Aggregation of routes is another tool that BGP uses to reduce the number of prefixes to be advertised and increase scalability. 4. Flexibility: The protocol can connect together any internetwork of autonomous system using an arbitrary topology. The only requirement is that each ASes have at least one router that is able to run BGP and that this router connects to at least one other ASes s BGP router. BGP can handle a set of ASes connected in full mesh topology, a partial mesh; a chain of ASes linked one to the next or any other configuration. It also handles changes to topology that may occur over time BGP Path Selection Process BGP assigns the first valid path as the current best path. BGP then compares the best path with the next path in the list, until BGP reaches the end of the list of valid paths. Various BGP attributes used during the path selection are: 1. AS_PATH 2. NEXT_HOP 3. ORIGIN 4. MED (Multi Exit Discriminator) 5. LOCAL_PREF (Local preference) 6. WEIGHT 7. CLUSTER LIST 8. Community. 9. Aggregator. 10. Metric. Following flowchart shows the BGP path selection algorithm [99] using the above mentioned attributes. 6

7 Select a path with the highest weight which is a local parameter Select the path with highest LOCAL_PREF whose default value is 100. Select a path that is originated locally Select the path with the shortest AS_PATH Select path with the lowest origin type. IGP is lower than EGP. Select path with lowest MED (Multi Exit Discriminator) Prefer ebgp over ibgp paths B Yes Is best path selected? No Select path with lowest IGP metric to the BGP next hop A 7

8 A B Yes Determine if multiple paths required? No Minimize RFD by selecting a path that was received first if both paths are external Prefer route that comes from BGP router with lowest router ID If the originator or router ID is same for multiple paths, prefer the path with the minimum cluster list length Select the path that comes from lowest neighbour address. Best path selected 1.3 MPLS (Multiprotocol label switching) MPLS [26] is a routing protocol that is used to forward IP packets along explicit routes - pre-calculated routes that don t necessarily match those that normal IP routing protocol would select. MPLS performs the following functions: 8

9 Specifies mechanisms to manage traffic flows of various granularities, such as flows between different hardware, machines, or even flow between different applications. Remains independent of the Layer-2 and Layer-3 protocols. Provides a mean to map IP addresses to simple, fixed-length labels used by different packet-forwarding and packet-switching technologies Interfaces to existing routing protocols such as resource reservation protocol(rsvp) and open shortest path first(ospf) Supports the IP, ATM and frame-relay Layer-2 protocols In MPLS, data transmission occurs on label-switched paths (LSPs). LSPs are a sequence of labels at each and every node along the path from the source to the destination. LSPs are established either prior to data transmission (Control-driven) or upon detection of a certain flow of data (data-driven). The labels, which are underlying protocol-specific identifier, are distributed using label distribution protocol (LDP) or RSVP [76] or piggybacked on routing protocols like border gateway protocol (BGP) [46] and OSPF [45]. Each data packet encapsulates and carries the label during their journey from source to destination. High-speed switching of data is possible because the fixed-length labels are inserted at the very beginning of the packet or cell and can be used by hardware to switch packets quickly between links. MPLS Operation The following steps must be taken for a data packet to travel through an MPLS domain. 1. Label creation and distribution 2. Table creation at each router 3. Label-switched path creation 4. Label insertion/table lookup 5. Packet forwarding The source sends its data to the destination. In an MPLS domain, not all of the source traffic is necessarily transported through the same path. Depending on the traffic characteristics, different LSPs could be created for packets with different CoS requirements. 1.4 Justification of Problem This thesis discusses three significant challenges that network operators must deal to provide reliable service and the respective solutions that are proposed in this thesis. 9

10 1. Safety of Interdomain Routing BGP protocol is based on trust; therefore it does not certify the route update messages. This can result in announcement of any route into system and AS cannot verify that announcement. Such types of announcements are known as malicious attack that leads to traffic interference or loss of connectivity. Example of malicious attack: Fig 1.1 Malicious attack using address prefix Address block /24 and /16 belong to nodes E and D respectively. Node E is a bogus/malicious and it advertises two address blocks which it does not own. Some nodes on the network will believe these bogus route announcements and will transmit data to the adversary. For example: If Node A sends data to an address in address block /16, it will reach node E instead of valid and authenticated node G. 10

11 Hackers announce incorrect prefixes in order to get hold of sensitive data moving on network. Many BGP attacks have been occurring in the internet. One such case occurred in Feb 2008 [67] when Pakistan telecom brought down YouTube worldwide for several hours when they tried to block local access to the service. They, by mistake propagated new routing information to PCCW, an ISP in Hongkong that propagated the route further. Another such kind of incident happened on April 8, 2010 [78] when Chinese Telecom rerouted traffic destined to about 15% of the address space through servers in china. This also affected traffic destined to US govt and military sites [8]. To achieve privacy several cryptographic measures have been proposed. But such security measure does not work on small scale deployments i.e. for 6-11 participating ASes. Security benefits can be achieved through a combination of several mechanisms. 2. Routing Policies of BGP leading to cycles ASes (Autonomous systems) uses BGP to communicate with each other. Although each AS is independent to select their route preferences and path export policies, but certain policy combinations can lead to permanent cycles in routing system. In these cycles, Routers interchange control plane messages in a cyclical fashion endlessly. This can result in BGP divergence & an unstable BGP. Example of cycle can be shown as follows: Fig 1.2 Conflicting routing policies There are two nodes- Node A and Node B. Both want to reach destination Node Z. To reach node Z, Node A prefers the indirect route through node B over the direct route. Similarly Node B prefers the indirect route through Node A. This situation can lead to cycle as follows: 11

12 1. Originally, node A & B select direct route AZ and BZ respectively. Nodes simultaneously inform each other about the path they are using. 2. After some time both nodes switch to indirect routes ABZ and BAZ, which creates a temporary cycle between nodes A and B. This cycle is removed as soon as nodes inform each other about their new paths and routers update this information. 3. But if this update is once again performed simultaneously, the routes AZ and BZ will be selected and the entire process can repeat itself resulting in cycle. With drawing BGP cycles is critical as cycles can have negative effect on both control plane and data plane. Control plane are routing messages interchanged by the routers where as data plane are data packets roaming on networks. In control plane, cycle increase the number of route renewals which increases load on routers because they are capable enough to process messages at such high speed. Routers on internet are already processing approx 350,000 address prefixes, which causes heavy load even without cycles. Cycles also cause unwanted hindrance or packet drops in the data plane. So cycles may lead to stern performance degeneration for the user. Simple Path Vector Protocol (SPVP) [90] which is proposed by Griffin, Shepherd and Wilfong is a theoretical model of BGP that provides framework to study BGP stability. The most well known result in that framework is a structure known as dispute wheel. Absence of dispute wheel is a sufficient condition to prevent cycles, but there exist other network configurations where BGP protocol cycles but the SPVP model does not. Furthermore, the SPVP model abstracts many implementation details of BGP protocol. 3) Traffic Organization after failure Load balancing on network is one of the important tasks for the network operator. Further they need to handle planned equipment maintenance and unplanned failures smoothly so that users do not get distracted by these problems. Network operators work burden further increases because of the changing bgp traffic patterns during the day and they need to satisfy strict service level agreements (SLAs) which specify for example: the maximum average delay that the network traffic can experience. There are two possible techniques that can be used to protect against failures:-1) local Path preservation. 2) Global Path preservation 12

13 In Local path preservation, failure is repaired locally by sending traffic on alternate path between the two endpoints of the failed link. In fig Node D was sending traffic to Node E via Node C but link between Node c and E crashed, so that Node C used local path preservation and start sending data via Node B to E. But here problem of congestion arises because Node B is already used by Node A to send data to Node F. So load on Node B increases which lead to congestion and hence dropping of packets. Fig 1.3 Path preservation techniques In Global path preservation, traffic is transmitted on an alternate end-to-end path, which allows spreading load in the network more evenly. Consider same figure, If Node D selects a new path via Node G and H to reach e instead from C-B-E, then load is evenly distributed on links. Today s Network handles recovery from failure and traffic engineering independently. This leads to increase complexity in routers and selection of less efficient paths after failure. There is no architecture to optimize load balancing under wide range of failure scenarios that does not require re-optimization after a failure. 13

14 1.5 Aim of Study In the Internet, BGP is de-facto Interdomain routing protocol. BGP allows the autonomous systems (ASes) to exchange reachability information with each other. Each AS has its own independent routing decisions and export policies. AS trusts it neighbour and believes that whatever information about routes announcements is done by its neighbors is true and authentic. Due to this BGP becomes vulnerable to attacks, steady cycles and improper load balancing during failures of channels. The aim of study is to make BGP more stable and reliable. It is to make best-effort services better. The study is done in three areas: 1. Security of Interdomain routing will be analyzed. During this study it will be established that small groups of cooperating system will form the basis of solution for secure Interdomain routing. As present proposals of secure Interdomain routing does not provide significant security benefits in small scale implementations. Moreover implementation of present secure solutions is not viable from economic point of view and also it requires coordination among large number of autonomous systems (ASes). In addition current mechanisms offer very little help to non-cooperating ASes which becomes soft target for hijackers. During this study a combination of mechanisms will be analyzed which will provide security gains to both cooperating and noncooperating ASes alike. The solutions proposed during this study does not aim to remove the adversary completely but it raises bar for them so that it is not easy for them to attack on network and make it unstable. 2. Previous studies of Interdomain routing considered that routers select and advertise the most-favoured available route. But in practice routers may temporarily advertise other recently available routes or they remove routes when destination is not available. Due to these unexpected announcements cycles can occur which were not captured by the previous models which lead to unstable network. A new theoretical model will be proposed which will capture the effect of various local operational features of BGP (like RFD, MRAI timer etc) which can result in cycles. In this work an algorithm will be proposed which will provide combination of necessary and sufficient conditions for safety of routing policies in practice. 3. Today s network handle failure restoration and traffic engineering separately which lead to increased complexity in routers and selection of less efficient paths after failure. Due to this load balancing was not properly done and hence an unstable 14

15 network. In this work a framework will be proposed which will integrate traffic engineering and failure restoration for safe delivery of data even in presence of link failures. The proposed framework will reduce burden from routers and will move functionality to mainframe organization which will compute routes offline after failures so that load balancing can be done properly. This will result in selection of stable routes after failures. 1.6 Organization of Thesis Introduction of the subject is covered in Chapter 1 and rest of the thesis is organized as follows: Chapter 2 gives the background and reviews of related work. A survey is provided on various mechanisms used in securing Interdomain routing, removing cycles caused by conflicting routing policies and traffic engineering with failure restoration. Various proposed techniques are reviewed and compared. Chapter 3 discusses the formulation of problem and various general concepts and models that are required in solving the problem areas discussed in this research work. This chapter gives insight to various challenges and issues that causes network instability. In Chapter 4 simulations are performed to show that how partial implementation of sobgp on small groups does not offer significant security gains. Based on these results two approaches are proposed which are evaluated on realistic AS topology. Chapter 5 discusses safety criterion for BGP with pseudo renewals and also combination of necessary and sufficient conditions are proposed. The algorithms proposed in this chapter are evaluated using theorems. Chapter 6 provides an integrated framework for traffic engineering and failure restoration. Various optimization equations show the working of proposed framework which is simulated using realistic as well as synthetic topologies. Finally Chapter 7 concludes the contribution of the research work. Various directions have been described for the future research on the proposed work. 15

Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP) Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,

More information

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to: Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations

More information

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the

More information

Internet inter-as routing: BGP

Internet inter-as routing: BGP Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability

More information

Border Gateway Protocol BGP4 (2)

Border Gateway Protocol BGP4 (2) Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

APNIC elearning: BGP Attributes

APNIC elearning: BGP Attributes APNIC elearning: BGP Attributes Contact: training@apnic.net erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Using the Border Gateway Protocol for Interdomain Routing

Using the Border Gateway Protocol for Interdomain Routing CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous

More information

APNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0

APNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0 erou03_v1.0 APNIC elearning: BGP Basics Contact: training@apnic.net Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

BGP overview BGP operations BGP messages BGP decision algorithm BGP states

BGP overview BGP operations BGP messages BGP decision algorithm BGP states BGP overview BGP operations BGP messages BGP decision algorithm BGP states 1 BGP overview Currently in version 4. InterAS (or Interdomain) routing protocol for exchanging network reachability information

More information

BGP Best Path Selection Algorithm

BGP Best Path Selection Algorithm BGP Best Path Selection Algorithm Document ID: 13753 Contents Introduction Prerequisites Requirements Components Used Conventions Why Routers Ignore Paths How the Best Path Algorithm Works Example: BGP

More information

Border Gateway Protocol (BGP-4)

Border Gateway Protocol (BGP-4) Vanguard Applications Ware IP and LAN Feature Protocols Border Gateway Protocol (BGP-4) Notice 2008 Vanguard Networks 25 Forbes Blvd Foxboro, MA 02035 Phone: (508) 964 6200 Fax: (508) 543 0237 All rights

More information

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many

More information

Introduction to Routing

Introduction to Routing Introduction to Routing How traffic flows on the Internet Philip Smith pfs@cisco.com RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,

More information

Internet inter-as routing: BGP

Internet inter-as routing: BGP Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Internet Routing Based on Computer Networking, 4 th Edition by Kurose and Ross Intra-AS Routing Also known as Interior Gateway Protocols (IGP) Most common Intra-AS routing protocols:

More information

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Simon Balon and Guy Leduc Research Unit in Networking EECS Department- University of Liège (ULg) Institut Montefiore, B28 - B-4000

More information

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router

More information

basic BGP in Huawei CLI

basic BGP in Huawei CLI basic BGP in Huawei CLI BGP stands for Border Gateway Protocol. It is widely used among Internet Service Providers to make core routing decisions on the Internet. The current BGP version is BGP-4 defined

More information

How To Understand Bg

How To Understand Bg Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Inter-domain Routing. Outline. Border Gateway Protocol

Inter-domain Routing. Outline. Border Gateway Protocol Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

Lecture 18: Border Gateway Protocol"

Lecture 18: Border Gateway Protocol Lecture 18: Border Gateway Protocol" CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday! Some figures courtesy Mike Freedman Lecture 18 Overview" Path-vector Routing Allows scalable, informed

More information

BGP Terminology, Concepts, and Operation. Chapter 6 2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public

BGP Terminology, Concepts, and Operation. Chapter 6 2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public BGP Terminology, Concepts, and Operation 1 IGP versus EGP Interior gateway protocol (IGP) A routing protocol operating within an Autonomous System (AS). RIP, OSPF, and EIGRP are IGPs. Exterior gateway

More information

MPLS VPN Route Target Rewrite

MPLS VPN Route Target Rewrite The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets

More information

Network-Wide Prediction of BGP Routes

Network-Wide Prediction of BGP Routes Network-Wide Prediction of BGP Routes Nick Feamster Jennifer Rexford Georgia Tech Princeton University feamster@cc.gatech.edu jrex@cs.princeton.edu Abstract This paper presents provably correct algorithms

More information

Interdomain Routing. Project Report

Interdomain Routing. Project Report Interdomain Routing Project Report Network Infrastructure improvement proposal To Company A Team 4: Zhang Li Bin Yang Md. Safiqul Islam Saurabh Arora Network Infrastructure Improvement Interdomain routing

More information

How To Set Up Bgg On A Network With A Network On A Pb Or Pb On A Pc Or Ipa On A Bg On Pc Or Pv On A Ipa (Netb) On A Router On A 2

How To Set Up Bgg On A Network With A Network On A Pb Or Pb On A Pc Or Ipa On A Bg On Pc Or Pv On A Ipa (Netb) On A Router On A 2 61200860L1-29.4E March 2012 Configuration Guide Configuring Border Gateway Protocol in AOS for Releases Prior to 18.03.00/R10.1.0 This guide only addresses BGP in AOS data products using AOS firmware prior

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

Understanding Route Aggregation in BGP

Understanding Route Aggregation in BGP Understanding Route Aggregation in BGP Document ID: 5441 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Aggregate Without the as set Argument Aggregate with

More information

ECSE-6600: Internet Protocols Exam 2

ECSE-6600: Internet Protocols Exam 2 ECSE-6600: Internet Protocols Exam 2 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT omit necessary detail {Note: Simply copying text directly from the slides or notes will

More information

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms Outline Internet Routing Venkat Padmanabhan Microsoft Research 9 pril 2001 Routing algorithms distance-vector (DV) link-state (LS) Internet Routing border gateway protocol (BGP) BGP convergence paper Venkat

More information

BGP Router Startup Message Flow

BGP Router Startup Message Flow LEG: Brief BGP Router Startup Message Flow This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). The Border Gateway Protocol (BGP) is an inter-autonomous

More information

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As) Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol

More information

Chapter 49 Border Gateway Protocol version 4 (BGP-4)

Chapter 49 Border Gateway Protocol version 4 (BGP-4) Chapter 49 Border Gateway Protocol version 4 (BGP-4) Introduction... 1-3 Overview of BGP-4... 1-3 BGP Operation... 1-5 BGP Attributes... 1-6 BGP Route Selection... 1-8 Classless Inter-domain Routing (CIDR)

More information

BGP Basics. BGP Uses TCP 179 ibgp - BGP Peers in the same AS ebgp - BGP Peers in different AS's. 64512-65535 Private BGP ASN. BGP Router Processes

BGP Basics. BGP Uses TCP 179 ibgp - BGP Peers in the same AS ebgp - BGP Peers in different AS's. 64512-65535 Private BGP ASN. BGP Router Processes BGP Basics BGPv4 - RFC 4271 - IPv6 support Path vector routing protocol EGP Routing between AS'es Classless Transit Area - Area used to reach other areas. Requires full routing table (no default routes).

More information

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP Renato Lo Cigno Routing Algorithms: One or Many? Is there a single routing protocol in the Internet? How can different protocols and algorithms

More information

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543) BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE

More information

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

DD2491 p1 2008. Inter-domain routing and BGP part I Olof Hagsand KTH/CSC

DD2491 p1 2008. Inter-domain routing and BGP part I Olof Hagsand KTH/CSC DD2491 p1 2008 Inter-domain routing and BGP part I Olof Hagsand KTH/CSC Inter-domain routing The objective of inter-domain routing is to bind together all the thousands of independent IP networks that

More information

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

BGP Attributes and Path Selection

BGP Attributes and Path Selection BGP Attributes and Path Selection ISP Workshops Last updated 29 th March 2015 1 BGP Attributes BGP s policy tool kit 2 What Is an Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D.

Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D. Active measurements: networks Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D. Outline Organization of Internet routing Types of domains Intra- and inter-domain routing Intra-domain

More information

Configuring BGP. Cisco s BGP Implementation

Configuring BGP. Cisco s BGP Implementation Configuring BGP This chapter describes how to configure Border Gateway Protocol (BGP). For a complete description of the BGP commands in this chapter, refer to the BGP s chapter of the Network Protocols

More information

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

--BGP 4 White Paper Ver.1.0-- BGP-4 in Vanguard Routers

--BGP 4 White Paper Ver.1.0-- BGP-4 in Vanguard Routers BGP-4 in Vanguard Routers 1 Table of Contents Introduction to BGP... 6 BGP terminology... 6 AS (Autonomous system):... 6 AS connection:... 6 BGP Speaker:... 6 BGP Neighbor/Peer:... 7 BGP Session:... 7

More information

The ISP Column. An Introduction to BGP the Protocol

The ISP Column. An Introduction to BGP the Protocol The ISP Column An occasional column on things Internet May 2006 Geoff Huston An Introduction to BGP the Protocol Routing in the Internet is divided into two parts fine-grained topological detail of connected

More information

The Internet. Internet Technologies and Applications

The Internet. Internet Technologies and Applications The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

Dove siamo? Architecture of Dynamic Routing

Dove siamo? Architecture of Dynamic Routing Dove siamo? Algoritmi di routing Protocolli di routing» Intra dominio (IGP)» Inter dominio (EGP) Le slides relative a questo argomenti sono tratte da Interdomain Routing and The Border Gateway Protocol

More information

Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics

Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics WHITE PAPER Table of Contents Introduction 3 Route-Flow Fusion 4 BGP Policy Visibility 5 Traffic Visibility

More information

Chapter 6: Implementing a Border Gateway Protocol Solution for ISP Connectivity

Chapter 6: Implementing a Border Gateway Protocol Solution for ISP Connectivity : Implementing a Border Gateway Protocol Solution for ISP Connectivity CCNP ROUTE: Implementing IP Routing ROUTE v6 1 Objectives Describe basic BGP terminology and operation, including EBGP and IBGP. Configure

More information

BGP. 1. Internet Routing

BGP. 1. Internet Routing BGP 1. Internet Routing (C) Herbert Haas 2005/03/11 1 Internet Routing Interior Gateway Protocols (IGPs) not suitable for Inter-ISP routing Technical metrics only No policy features Inter-ISP routing is

More information

CS551 External v.s. Internal BGP

CS551 External v.s. Internal BGP CS551 External v.s. Internal BGP Bill Cheng http://merlot.usc.edu/cs551-f12 1 Exterior vs. Interior World vs. me EGP vs. IGP Little control vs. complete administrative control BGP (and GGP, Hello, EGP)

More information

The Case for Source Address Routing in Multihoming Sites

The Case for Source Address Routing in Multihoming Sites The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

Routing Protocol - BGP

Routing Protocol - BGP Routing Protocol - BGP BGP Enterprise Network BGP ISP AS 3000 AS 2000 BGP is using between Autonomous Systems BGP(cont.) RFC 1771(BGPv4) Support CIDR Transfer the AS information to reach destination Using

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

IK2205 Inter-domain Routing

IK2205 Inter-domain Routing IK2205 Inter-domain Routing Lecture 5 Voravit Tanyingyong, voravit@kth.se Outline Redundancy, Symmetry, and Load Balancing Redundancy Symmetry Load balancing Scenarios Controlling Routing Inside the AS

More information

KT The Value Networking Company

KT The Value Networking Company KT The Value Networking Company IRIMS (Internet Routing Information Management System) 2005. 9 Y.D. KIM, G.E.KIM, C.K.Hwang, J.H.YOO (webman, gekim, ckhwang, styoo@kt kt.co..co.kr) Abstract An AS (Autonomous

More information

RSVP- A Fault Tolerant Mechanism in MPLS Networks

RSVP- A Fault Tolerant Mechanism in MPLS Networks RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data

More information

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing Routing Protocols scale: with 200 million destinations: can t store all dest s in routing tables! routing table exchange would swamp links! Hierarchical Routing Our routing study thus far - idealization

More information

Understanding Virtual Router and Virtual Systems

Understanding Virtual Router and Virtual Systems Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT

More information

Understanding Route Redistribution & Filtering

Understanding Route Redistribution & Filtering Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......

More information

Border Gateway Protocols

Border Gateway Protocols Paper 106, ENG 104 Border Gateway Protocols Sadeta Krijestorac, Marc Beck, Jonathan Bagby Morehead State University University of Louisville Florida Atlanic University s.krijestor@moreheadstate.edu marcbeck1982@yahoo.com

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

The Complete IS-IS Routing Protocol

The Complete IS-IS Routing Protocol Hannes Gredler and Walter Goralski The Complete IS-IS Routing Protocol 4y Springer Contents Foreword Credits and Thanks vii ix 1 Introduction, Motivation and Historical Background 1 1.1 Motivation 1 1.2

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics CSC458 Lecture 6 Inter-domain Routing IP Addressing Stefan Saroiu http://www.cs.toronto.edu/syslab/courses/csc458 University of Toronto at Mississauga Homework #1 Grades Fraction of Students 100 80 60

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

Border Gateway Protocol (BGP) Conformance and Performance Testing

Border Gateway Protocol (BGP) Conformance and Performance Testing White Paper Border Gateway Protocol (BGP) Conformance and Performance Testing 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com Contents Border Gateway Protocol:

More information

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005 MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel

More information

ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1

ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1 IP Routing Primer Paul C. Huang, Ph.D. ITRI / / N300 /N300; Paul Huang 1999/6/2 1 Basic Addressing / Subnetting Class A 0 Network Host Host Host 127 networks / 16,777,216 hosts Class A natural mask 255.0.0.0

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

Kingston University London

Kingston University London Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data

More information

Routing Protocols (RIP, OSPF, BGP)

Routing Protocols (RIP, OSPF, BGP) Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to

More information

Redundancy & the Netnod Internet Exchange Points

Redundancy & the Netnod Internet Exchange Points Redundancy & the Netnod Internet Exchange Points The extent to which businesses and consumers use the Internet for critical communication has been recognised for over a decade. Since the rise of the commercial

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations

More information

Implementing Cisco MPLS

Implementing Cisco MPLS Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

Administra0via. STP lab due Wednesday (in BE 301a!), 5/15 BGP quiz Thursday (remember required reading), 5/16

Administra0via. STP lab due Wednesday (in BE 301a!), 5/15 BGP quiz Thursday (remember required reading), 5/16 BGP Brad Smith Administra0via How are the labs going? This week STP quiz Thursday, 5/9 Next week STP lab due Wednesday (in BE 301a!), 5/15 BGP quiz Thursday (remember required reading), 5/16 Following

More information

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved. MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information