How To Make A Route Map On Bpg More Efficient



Similar documents
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Inter-domain Routing. Outline. Border Gateway Protocol

Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D.

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

Inter-domain Routing

Border Gateway Protocol (BGP)

Network layer: Overview. Network layer functions IP Routing and forwarding

EECS 489 Winter 2010 Midterm Exam

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

Outline. Outline. Outline

Based on Computer Networking, 4 th Edition by Kurose and Ross

The Case for Source Address Routing in Multihoming Sites

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms

IP Addressing Introductory material.

Software Defined Networking & Openflow

Border Gateway Protocols

Introduction to TCP/IP

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know

Internetworking and Internet-1. Global Addresses

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

Exterior Gateway Protocols (BGP)

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

LUCOM GmbH * Ansbacher Str. 2a * Zirndorf * Tel / * Fax / *

Scalable Prefix Matching for Internet Packet Forwarding

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

ECSE-6600: Internet Protocols Exam 2

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

CS101 Lecture 19: Internetworking. What You ll Learn Today

10CS64: COMPUTER NETWORKS - II

Internet Peering, IPv6, and NATs. Mike Freedman V Networks

Introduction to Routing

IP Subnetting and Addressing

SANE: A Protection Architecture For Enterprise Networks

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Route Discovery Protocols

Router and Routing Basics


Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

6.263 Data Communication Networks

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

IP Addressing. IP Addresses. Introductory material.

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Router Architectures

CLASSLESS INTER DOMAIN ROUTING - CIDR

From Active & Programmable Networks to.. OpenFlow & Software Defined Networks. Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S.

(Refer Slide Time: 02:17)

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

APNIC elearning: BGP Attributes

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

A Framework for Scalable Global IP-Anycast (GIA)

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Active Measurements: traceroute

Communications and Networking

CS 5480/6480: Computer Networks Spring 2012 Homework 3 Due by 1:25 PM MT, Monday March 5 th 2012

Border Gateway Protocol BGP4 (2)

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study

Overview of Computer Networks

Internet Packets. Forwarding Datagrams

Understanding Large Internet Service Provider Backbone Networks

Portland: how to use the topology feature of the datacenter network to scale routing and forwarding

Multiprotocol Label Switching (MPLS)

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

We Are HERE! Subne\ng

Classful IP Addressing (cont.)

Interdomain Routing. Outline

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

Data Center Network Topologies: FatTree

Large-Scale Distributed Systems. Datacenter Networks. COMP6511A Spring 2014 HKUST. Lin Gu

Transcription:

NIRA: A New Inter-Domain Routing Architecture Xiaowei Yang, David Clark, Arthur W. Berger Rachit Agarwal (Results are by others, any errors are by me) ( Animated slides shamelessly stolen from Prasad s slides (CS495, Northwestern University), Thanks Google!)

What this paper talks about! Routing at domain level Giving more control to the user over the route Fosters competition among ISPs Routes chosen by BGP not the most efficient Only users know whether a path suits his/her application

What this paper talks about! Claims to answer the questions: Supporting user choice provider compensation scalable route discovery efficient route representation fast route fail-over security

What this paper does not talk about! Acknowledged Issues: Autonomy Issues (why would an ISP allow that?) Potential performance problems Issues not acknowledged: Where is design for tussle? (stronger users means stronger attacks?)

NIRA

Core tier-i ISPs: ISPs that have no providers Core: Region where tier-i ISPs interconnect Up-graph (of an user): network of user s providers, provider s providers (and peers) until the core is reached

Example: Core Cindy R8 B4 B1 core R7 B3 B2 N9 N18 R1 R2 R3 Bob N1 N2 N3 Alice

NIRA in a nutshell! Every node gets a path from its up-graph to the core All these paths get stored in a DNS-like database (NRLS) Path Selection: Choose your up-graph as part of the route Query name-to-route look-up service (NRLS) for destination s up-graph Combine the two to get a path to the destination User s route not selected by the user, but by both user and destination!

Example: NIRA in a nutshell! N15 N16 N17 N18 N14 N13 N12 N11 N10 N9 R9 R8 R7 R6 R10 R1 B4 B1 core R2 B3 B2 R5 R4 R3 Bob N1 N2 N3 Cindy N8 N7 N6 N5 N4 Alice

Some Interesting Details Addressing

Addressing Hierarchical address assignment Providers in the Core obtain a globally unique address prefix Provider then allocates non-overlapping subdivisions of the address prefix to each of its customers Discussion: Practical addressing scheme? One can infer ISP relationships!

Bob 1:1:1::/48 1:2:1::/48 R1 Example: Addressing Core 1::/16 2::/16 1:1::/32 1:2::/32 B2 R3 1:3::/32 2:1::/32 1:2:2::/48 N1 N2 N3 1:1:1::1000 1:2:1::1000 B1 R2 1:3:1::2000 2:1:1::2000 1:3:1::/48 2:1:1::/48 Alice Note: An address represents a valid route to the core.

Forwarding Tables Uphill table 1::/16 B1 Downhill table 1:1:1::/48 N1 1:1::/96 self Core 1::/16 2::/16 1:1::/32 1:2::/32 1:1:1::/48 1:2:1::/48 Bob R1 B1 R2 B2 R3 1:3::/32 2:1::/32 1:2:2::/48 N1 N2 N3 1:1:1::1000 1:2:1::1000 1:3:1::2000 2:1:1::2000 1:3:1::/48 2:1:1::/48 Alice Uphill table: providers Downhill table: customers, self Bridge table: all others Scalability: Size of core limited (financial factors), Provider hierarchy is shallow (domains have limited number of providers)

Hierarchical Addresses Provider-rooted hierarchical address User can use a source and a destination address to compactly represent a valley-free route Switch routes by switching addresses Both source and destination addresses used for forwarding Limits source address spoofing Router may not find an address with an arbitrary source address

Efficient Route Representation

Example: Route Representation N15 N16 N17 N18 N14 N13 N12 N11 N10 N9 R9 R8 R7 R6 R10 R1 B4 B1 core R2 B3 B2 R5 R4 R3 Bob N1 N2 N3 Cindy N8 N7 N6 N5 N4 Alice

Efficient Route Representation Core 1::/16 2::/16 1:1::/32 1:2::/32 1:1:1::/48 1:2:1::/48 Bob R1 B2 R3 1:3::/32 2:1::/32 1:2:2::/48 N1 N2 N3 1:1:1::1000 1:2:1::1000 B1 R2 1:3:1::2000 2:1:1::2000 1:3:1::/48 2:1:1::/48 Alice A source and a destination address unambiguously represent a route.

Forwarding

Overview Packet first forwarded along the sequence of domains that allocate the source address Within the core (from source s provider to destination s provider) Finally, along the sequence of domains that allocate the destination address

up down 1:1:1::1000 1:3:1::2000 Forwarding Core 1::/16 2::/16 1:1::/32 1:2::/32 1:1:1::/48 1:2:1::/48 Bob R1 B1 R2 B2 R3 1:3::/32 2:1::/32 1:2:2::/48 N1 N2 N3 1:1:1::1000 1:2:1::1000 1:3:1::2000 2:1:1::2000 1:3:1::/48 2:1:1::/48 Alice Look up destination address in the downhill table. If no match: Look up the source address in the uphill table.

Discussion Scalability? Consider each ISP having two providers. An user at level k will have O(2 k ) paths. User control? How to exploit this control? How to measure goodness of a domain-level route? Security: Does stronger users necessarily mean stronger attacks? Mobility?

Back-up slides (TIPP and Route Failures)

Topology Information Propagation Protocol (TIPP) Path-vector component Propagating domain level routes Providers propagate routes to their customers, which in turn propagate routes to their customers No route selection (no policy-enforcement) Link-state component Information about dynamic network changes Link-state messages could potentially be propagated only down the hierarchy (no message from a customer to provider required)

Handling Route Failures

Route Failures Problem: TIPP messages do not propagate globally The sender might not have up-to-date information about destination s path (when the destination does not update its routes in NRLS very frequently) Solution: If the route in the packet header is unavailable, inform the sender! If no information received, use timeout!