BGP and Traffic Engineering with Akamai. Christian Kaufmann Akamai Technologies MENOG 14

Similar documents
BGP and Traffic Engineering with Akamai. Caglar Dabanoglu Akamai Technologies AfPIF 2015, Maputo, August 25th

Making the Internet fast, reliable and secure. DE-CIX Customer Summit Steven Schecter <schecter@akamai.com>

Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

Simple Multihoming. ISP/IXP Workshops

Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies APNIC th August 2013

Module 12 Multihoming to the Same ISP

Advanced BGP Policy. Advanced Topics

Multihomed BGP Configurations

Load balancing and traffic control in BGP

Simple Multihoming. ISP Workshops. Last updated 30 th March 2015

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Load balancing and traffic control in BGP

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012

Border Gateway Protocol Best Practices

BGP Multihoming. Why Multihome? Why Multihome? Why Multihome? Why Multihome? Why Multihome? Redundancy. Reliability

Edge-1#show ip route Routing entry for /24. Known via "bgp 65001", distance 200, metric 0. Tag 65300, type internal

Network Level Multihoming and BGP Challenges

Intelligent Routing Platform White Paper

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Claudio Jeker. RIPE 41 Meeting Amsterdam, 15. January Using BGP topology information for DNS RR sorting

Fireware How To Dynamic Routing

BGP Multihoming Techniques

Border Gateway Protocol BGP4 (2)

BGP Multihoming Techniques

netkit lab bgp: multi-homed Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

BGP Attributes and Path Selection

BGP Best Practices for ISPs Prefix List, AS PATH filters, Bogon Filters, Anycast, Mailing Lists, INOC DBA

Routing Protocol - BGP

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia

APNIC elearning: BGP Attributes

HP Networking BGP and MPLS technology training

APNIC elearning: BGP Basics. Contact: erou03_v1.0

BGP Multihoming Techniques. Philip Smith APRICOT st February 2 nd March 2012 New Delhi

Site-to-Site Load Distribution Using IGP and BGP

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering

Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering

BGP Multihoming Techniques

The Value of Content Distribution Networks Mike Axelrod, Google Google Public

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc.

Understanding Route Aggregation in BGP

Community tools to fight against DDoS

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

Border Gateway Protocol (BGP)

BGP Best Path Selection Algorithm

Exterior Gateway Protocols (BGP)

BGP1 Multihoming and Traffic Engineering

Internet Routing Protocols Lecture 04 BGP Continued

How To Set Up Bgg On A Network With A Network On A Pb Or Pb On A Pc Or Ipa On A Bg On Pc Or Pv On A Ipa (Netb) On A Router On A 2

How To Load Balance On A Bgg On A Network With A Network (Networking) On A Pc Or Ipa On A Computer Or Ipad On A 2G Network On A Microsoft Ipa (Netnet) On An Ip

BGP Multihoming Techniques. Philip Smith APRICOT 2013 Singapore 19 th February 1 st March 2013

ETHEL THE AARDVARK GOES BGP ROUTING

LAB II: Securing The Data Path and Routing Infrastructure

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

BGP Multihoming Techniques

DDoS Mitigation Techniques

E : Internet Routing

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

How More Specifics increase your transit bill (and ways to avoid it)

Understanding Route Redistribution & Filtering

BGP Operations and Security. Training Course

How To Import Ipv4 From Global To Global On Cisco Vrf.Net (Vf) On A Vf-Net (Virtual Private Network) On Ipv2 (Vfs) On An Ipv3 (Vv

Application Note. Failover through BGP route health injection

Exam Name: BGP + MPLS Exam Exam Type Cisco Case Studies: 3 Exam Code: Total Questions: 401

LHCONE Site Connections

BGP Multihoming Techniques

Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski

Interdomain Routing. Project Report

Troubleshooting Network Performance with Alpine

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

BGP Support for Next-Hop Address Tracking

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Service Description DDoS Mitigation Service

Using the Border Gateway Protocol for Interdomain Routing

Data Center Content Delivery Network

BGP Multipath Load Sharing for Both ebgp and ibgp in an MPLS-VPN

A Link Load Balancing Solution for Multi-Homed Networks

Understanding Large Internet Service Provider Backbone Networks

EE627 Lecture 22. Multihoming Route Control Devices

IAB IPv6 Multi-Homing BOF. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution

BGP Multihoming: An Enterprise View BRKRST , Cisco Systems, Inc. All rights reserved. Presentation_ID.scr

How To Understand The Power Of A Content Delivery Network (Cdn)

The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network)

How to Configure BGP Tech Note

BGP Link Bandwidth. Finding Feature Information. Prerequisites for BGP Link Bandwidth

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Building A Cheaper Peering Router. (Actually it s more about buying a cheaper router and applying some routing tricks)

Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ]

basic BGP in Huawei CLI

Introduction. Internet Address Depletion and CIDR. Introduction. Introduction

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD

BGP Router Startup Message Flow

Indirection. science can be solved by adding another level of indirection" -- Butler Lampson. "Every problem in computer

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

BGP Advanced Routing in SonicOS

Network Infrastructure for Critical DNS. Steve Gibbard

Transcription:

BGP and Traffic Engineering with Akamai Christian Kaufmann Akamai Technologies MENOG 14

The Akamai Intelligent Platform The world s largest on-demand, distributed computing platform delivers all forms of web content and applications The Akamai Intelligent Platform: 147,000+ Servers 2,000+ Locations 1,200+ Networks 700+ Cities 92 Countries Typical daily traffic: More than 2 trillion requests served Delivering over 21 Terabits/second 15-30% of all daily web traffic

Basic Technology Akamai mapping

How CDNs Work When content is requested from CDNs, the user is directed to the optimal server This is usually done through the DNS, especially for non-network CDNs, e.g. Akamai It can be done through anycasting for network owned CDNs Users who query DNS-based CDNs be returned different A (and AAAA) records for the same hostname This is called mapping The better the mapping, the better the CDN

How Akamai CDN Work Example of Akamai mapping Notice the different A records for different locations: [NYC]% host www.symantec.com www.symantec.com CNAME e5211.b.akamaiedge.net. e5211.b.akamaiedge.net. A 207.40.194.46 e5211.b.akamaiedge.net. A 207.40.194.49 [Boston]% host www.symantec.com www.symantec.com CNAME e5211.b.akamaiedge.net. e5211.b.akamaiedge.net. A 81.23.243.152 e5211.b.akamaiedge.net. A 81.23.243.145

Peering with Akamai

Why Akamai Peer with ISPs Performance & Redundancy Removing intermediate AS hops seems to give higher peak traffic for same demand profile Burstability During large events, having direct connectivity to multiple networks allows for higher burstability than a single connection to a transit provider Peering reduces costs Network Intelligence Backup for on-net servers If there are servers on-net, the peering can act as a backup during downtime and overflow Allows serving different content types

Why ISPs peer with Akamai Performance Akamai and ISPs are in the same business, just on different sides - we both want to serve end users as quickly and reliably as possible Cost Reduction Transit savings Possible backbone savings Marketing Claim performance benefits over competitors Keep customers from seeing important web sites through their second uplink Because you are nice :-)

How Akamai use IXes Akamai usually do not announce large blocks of address space because no one location has a large number of servers It is not uncommon to see a single /24 from Akamai at an IX This does not mean you will not see a lot of traffic How many web servers does it take to fill a gigabit these days?

How Akamai use IXes Peer Network Content IX Akamai (Non-network CDNs) do not have a backbone, so each IX instance is independent Akamai uses transit to pull content into the servers Content is then served to peers over the IX After BGP is established, you might not see traffic until 24hrs Akamai Mapping System needs time to process new prefix CDN Servers Transit Origin Server

Why don t I get all the Akamai content via the Peering? CDN Servers No single cluster can accommodate all Akamai content Peer with Akamai in different locations for accessing different Akamai Content ISP prefers Customer before Peers Akamai prefers on-net Cluster before Peer Do you want to host Akamai Cluster? Origin Server

After Peering With Akamai. DO and DON T s of Traffic Engineering

The world uses

AS Path Prepending Before Akamai Router#sh ip b 100.100.100.100 BGP routing table entry for 100.100.100.0/20, version Paths: (1 available, best #1, table Default-IP-Routing-Table) Multipath: ebgp Advertised to update-groups: 2 7 4635 1001 202.40.161.1 from 202.40.161.1 (202.40.161.1) After Akamai Router#sh ip b 100.100.100.100 BGP routing table entry for 100.100.100.0/20, version Paths: (1 available, best #1, table Default-IP-Routing-Table) Multipath: ebgp Advertised to update-groups: 2 7 4635 1001 1001 1001 1001 202.40.161.1 from 202.40.161.1 (202.40.161.1)

But it does not has the usual effect

The world uses

MED Before Akamai Router#sh ip b 100.100.100.100 BGP routing table entry for 100.100.100.0/20, version Paths: (1 available, best #1, table Default-IP-Routing-Table) Multipath: ebgp Advertised to update-groups: 2 7 4635 1001 202.40.161.1 from 202.40.161.1 (202.40.161.1) Origin IGP, metric 0, localpref 100, valid, external, best After Akamai Router#sh ip b 100.100.100.100 BGP routing table entry for 100.100.100.0/20, version Paths: (1 available, best #1, table Default-IP-Routing-Table) Multipath: ebgp Advertised to update-groups: 2 7 4635 1001 202.40.161.1 from 202.40.161.1 (202.40.161.1) Origin IGP, metric 1000, localpref 100, valid, external, best

But it does not has the usual effect

The world uses

More Specific Route Before Akamai Router#sh ip b 100.100.100.100 BGP routing table entry for 100.100.96.0/20, version Paths: (1 available, best #1, table Default-IP-Routing-Table) Multipath: ebgp Advertised to update-groups: 2 7 4635 1001 202.40.161.1 from 202.40.161.1 (202.40.161.1) After Akamai Router#sh ip b 100.100.100.100 BGP routing table entry for 100.100.100.0/24, version Paths: (1 available, best #1, table Default-IP-Routing-Table) Multipath: ebgp Advertised to update-groups: 2 7 4635 1001 202.40.161.1 from 202.40.161.1 (202.40.161.1)

But it does not has the usual effect

Why doesn t it has the usual effect? Akamai uses Mapping, on top of the BGP routing Akamai Mapping is different from BGP routing Akamai uses multiple criteria to choose the optimal server These include standard network metrics: Latency Throughput Packet loss

Typical Scenarios in Traffic Engineering

Scenario: In-consistent Route Announcement

Consistent Route Announcement of Multi-Home ISP A ISP A is multi-home to AS2002 and AS3003 AS2002 peer with Akamai AS3003 do not peer with Akamai Akamai always sends traffic to ISP A via AS2002 AS4003 0.0.0.0/0 AS3003 IX ISP A AS1001 Akamai AS20940 IX 100.100.96.0/20 AS2002 100.100.96.0/20

What will you do? ISP A would like to balance the traffic between two upstream providers ISP A prepend, MED to AS2002. Unfortunately, no effect on Akamai traffic.. Eventually, ISP A breaks the /20 and starts more specific & inconsistent route announcement What will happen?

ISP A Load Balance the Traffic Successfully ISP A announces more specific routes /24 to AS3003 AS3003 announces new /24 to AS2002 Akamai peer router do not have full routes like many other ISP, so traffic continue route to the superblock /20 of AS2002 ISP A is happy with the balanced traffic on dual s AS4003 0.0.0.0/0 AS3003 IX ISP A AS1001 Akamai AS20940 IX 100.100.96.0/20 AS2002 100.100.96.0/20 Akamai AS20940 Routing Table 100.100.96.0/20 AS2002 AS1001 0.0.0.0/0 AS4003 AS2002 Routing Table 100.100.100.0/24 AS3003 AS1001 100.100.99.0/24 AS3003 AS1001 100.100.96.0/20 AS1001

What is the problem? Loss of revenue for AS2002 although their backbone is consumed What could happen if AS2002 does not like the peer-to-peer traffic?

AS2002 Filter Traffic on Peer Port In order to get rid of peer-to-peer traffic, AS2002 implement an ACL on IX port facing AS3003 ISP A cannot access some websites due to traffic black hole AS4003 AS3003 0.0.0.0/0 Akamai AS20940 IX 100.100.96.0/20 IX ACL AS2002 hostname AS2002-R1! interface TenGigabitEthernet1/1 ip access-group 101 out! access-list 101 deny ip any 100.100.100.0 0.0.0.255 access-list 101 deny ip any 100.100.99.0 0.0.0.255 access-list 101 permit ip any any ISP A AS1001 100.100.96.0/20

Is Traffic Filtering a good workaround? It is observed that some s filter peer-to-peer traffic on IX port or Private Peer If you promised to carry the traffic of a block (eg./20), you should not have any holes (eg. /24) or drop any part of the traffic The end users connectivity will be impacted by your ACL!!!

Your Promise Send to Hong Kong please Cour ier to 2012 AKAMAI FASTER FORWARDTM Asia

You break the promise! Hong Kong 2012 AKAMAI FASTER FORWARDTM

Akamai workaround on ISP Traffic Filtering Akamai observes ISP A user unable to access some websites Akamai blocks all prefix received from AS2002, so traffic shifts from IX to Transit AS4003 ISP A can access all websites happily AS2002 observes traffic drop on IX AS4003 AS3003 0.0.0.0/0 Akamai AS20940 IX 100.100.96.0/20 IX ACL AS2002 ISP A AS1001 100.100.96.0/20

What is the result? ISP A results in imbalance traffic between two upstream providers We wish consistent route announcement AS2002 lost all Akamai traffic from peer because he breaks the promise of carrying the packet to destination AS2002 lost revenue due to the reducuction of traffic ISP should filter the specific routes rather than filter the traffic

Ideal solution AS2002 should filter the specific route rather than traffic ISP A can work with upstreams and Akamai together AS3003 can peer with Akamai ISP A can announces consistent /24 in both upstream ISP A can prepend the /24 for traffic tuning AS4003 AS3003 0.0.0.0/0 Akamai AS20940 IX 100.100.96.0/20 100.100.99.0/24 100.100.100.0/24 IX Filter Specific route AS2002 ISP A AS1001 100.100.96.0/20 neighbor PEER-GROUP prefix-list DENY-SPECIFIC in! ip prefix-list DENY-SPECIFIC seq 5 deny 100.100.100.0/24 ip prefix-list DENY-SPECIFIC seq 10 deny 100.100.99.0/24 ip prefix-list DENY-SPECIFIC seq 100 permit 0.0.0.0/0 le 32

Scenario: In-complete Route Announcement

In-complete Route Announcement ISP A is multi-home to AS2002 and AS3003 AS2002 peers with Akamai AS3003 does not peer with Akamai ISP A announces different prefix to different ISP ISP A can access full internet AS4003 AS3003 0.0.0.0/0 Akamai AS20940 IX 100.100.96.0/22 100.100.100.0/22 Akamai AS20940 Routing Table 100.100.96.0/22 AS2002 AS1001 100.100.100.0/22 AS2002 AS1001 0.0.0.0/0 AS4003 AS2002 ISP A AS1001 100.100.96.0/20

How will the traffic route to ISP A end users? End Users are using IP Address of 100.100.96.0/22, 100.100.100.0/22, 100.100.104.0/22, 100.100.108.0/22 End Users are using ISP A DNS Server 100.100.100.100 Akamai receives the DNS Prefix 100.100.100.0/22 from AS2002, so it maps the traffic of ISP A to this cluster 100.100.96.0/22 100.100.100.0/22 traffic is routed to AS2002 while 100.100.104.0/22 100.100.108.0/22 traffic is routed to AS3003 by default route AS4003 0.0.0.0/0 Akamai AS20940 IX 100.100.96.0/22 100.100.100.0/22 AS3003 AS2002 ISP A AS1001 End User IP: 100.100.96.0/24 End User IP: 100.100.108.0/24 DNS: 100.100.100.100 ISP A AS1001 100.100.96.0/20

Does it cause problem? It is observed that some ISP performs in-complete route announcement (Eg. Announce different sub-set of prefix to different upstream) Some 100.100.100.108.0/22 end users have different performance than the others What will ISP A do if the user complains?

ISP A change the prefix announcement ISP A perceives AS3003 performance is lower than AS2002 ISP A adjust the route announcement Both 100.100.96.0/22 and 100.100.108.0/22 are routed by AS2002 and end users have the same download speed ISP A end users are happy to close the complaint ticket AS4003 0.0.0.0/0 AS3003 ISP A AS1001 End User IP: 100.100.96.0/24 End User IP: 100.100.108.0/24 DNS: 100.100.100.100 ISP A AS1001 Akamai AS20940 IX 100.100.96.0/22 100.100.108.0/22 AS2002 100.100.96.0/20

After 24hours Akamai s Mapping System processes the change of prefix

ISP A End Users complaints again Akamai no longer receive DNS prefix 100.100.100.0/22 from AS2002 Akamai maps the traffic of ISP A to Cluster B instead of Cluster A ISP A still receives the traffic from both upstream ISP A End Users complain again L

Before Akamai Mapping System refresh Akamai maps the traffic to Cluster A IX Transit Provider AS3003 ISP A Akamai Cluster B Transit Provider AS4003 Transit Provider AS2002 Akamai Cluster A IX Internet

After Akamai Mapping System refresh Akamai maps the traffic to Cluster B IX Transit Provider AS3003 ISP A Akamai Cluster B Transit Provider AS4003 Transit Provider AS2002 Akamai Cluster A IX Internet

Our Recommendation Please maintain complete route announcement Talk to us if there are any traffic or performance issues We can work together for traffic engineering

Ideal solution ISP A should announces complete prefix in both upstream ISP A can work with upstream and Akamai together AS3003 can peer with Akamai AS4003 AS3003 0.0.0.0/0 ISP A AS1001 Akamai AS20940 IX 100.100.96.0/20 100.100.104.0/22 100.100.100.0/22 100.100.96.0/22 100.100.108.0/22 AS2002 100.100.96.0/20

Scenario: Improper Prefix Announcement after customer left

Single Home ISP A ISP A is single home to AS2002 ISP A obtains a /24 from AS2002 Akamai always sends traffic to ISP A via AS2002 AS4003 0.0.0.0/0 Akamai AS20940 IX 100.100.96.0/20 100.100.97.0/24 Akamai AS20940 Routing Table 100.100.96.0/20 AS2002 100.100.97.0/24 AS2002 AS1001 0.0.0.0/0 AS4003 AS2002 100.100.96.0/20 100.100.97.0/24 ISP A AS1001 100.100.97.0/24

Single Home ISP A changed upstream provider ISP A keeps using 100.100.97.0/24 from AS2002 ISP A is changed upstream from AS2002 to AS3003 Akamai always sends traffic to ISP A via AS2002 because the superblock /20 is received AS3003 AS4003 100.100.97.0/24 ISP A AS1001 0.0.0.0/0 IX 100.100.97.0/24 Akamai AS20940 IX 100.100.96.0/20 AS2002 100.100.96.0/20 Akamai AS20940 Routing Table 100.100.96.0/20 AS2002 0.0.0.0/0 AS4003

What is the problem? Lost of revenue for AS2002 although their backbone is consumed and customer left What could happen if AS2002 does not like the peer-to-peer traffic?

AS2002 Filter Traffic on Peer Link In order to get rid of peer-to-peer traffic, AS2002 implement an ACL on IX port facing AS3003 ISP A cannot access some websites due to traffic black hole AS3003 AS4003 100.100.97.0/24 ISP A AS1001 0.0.0.0/0 Akamai AS20940 IX 100.100.96.0/20 Akamai AS20940 Routing Table 100.100.96.0/20 AS2002 0.0.0.0/0 AS4003 IX ACL AS2002 100.100.96.0/20 100.100.97.0/24 hostname AS2002-R1! interface TenGigabitEthernet1/1 ip access-group 101 out! access-list 101 deny ip any 100.100.97.0 0.0.0.255 access-list 101 permit ip any any

Akamai workaround on ISP Traffic Filtering Akamai observes ISP A users unable to access some websites Akamai blocks all prefixes received from AS2002, so traffic shift from IX to Transit AS4003 ISP A can access all websites happily AS2002 observes traffic drop on IX AS3003 AS4003 100.100.97.0/24 ISP A AS1001 0.0.0.0/0 Akamai AS20940 IX 100.100.96.0/20 Akamai AS20940 Routing Table 100.100.96.0/20 AS2002 0.0.0.0/0 AS4003 IX ACL AS2002 100.100.96.0/20 100.100.97.0/24 hostname AS2002-R1! interface TenGigabitEthernet1/1 ip access-group 101 out! access-list 101 deny ip any 100.100.97.0 0.0.0.255 access-list 101 permit ip any any

Is Traffic Filtering a good workaround? It is observed that some s filter peer-to-peer traffic on IX port or Private Peer If you promised to carry the traffic of a block (eg./20), you should not have any holes (eg. /24) or drop any part of the traffic If you assign an IP block (eg. /24) to a customer permanently (eg. Assign Portable), you should not announce the superblock (eg. /20) after customer left The end users connectivity will be impacted by your ACL!!!

Ideal Solution AS2002 can break the superblock (/20) into sub-blocks AS2002 should not announce ISP A prefix AS3003 AS4003 100.100.97.0/24 ISP A AS1001 0.0.0.0/0 Akamai AS20940 Akamai AS20940 Routing Table 100.100.96.0/24 AS2002 100.100.98.0/23 AS2002 100.100.100.0/22 AS2002 100.100.104.0/21 AS2002 0.0.0.0/0 AS4003 IX IX AS2002 100.100.96.0/24 100.100.98.0/23 100.100.100.0/22 100.100.104.0/21 100.100.97.0/24

Conclusions Summary

Summary Akamai Intelligent Platform Highly distributed edge servers Akamai mapping is different from BGP routing Peering with Akamai Improve user experience Reduce transit/peering cost DO and DONTS of Traffic Engineering Typical Traffic Optimization Techniques has no usual effect Maintain consistent route announcement if possible Maintain complete route announcement is a must Do not filter traffic by ACL

Questions? Christian Kaufmann <ck@akamai.com> More information: Peering: http://as20940.peeringdb.com Akamai 60sec: http://www.akamai.com/60seconds