Inter-domain Routing



Similar documents
TODAY S Internet is divided into more than 10,000 Autonomous

Characterizing the Internet Hierarchy from Multiple Vantage Points

Exterior Gateway Protocols (BGP)

BGP route propagation. Internet AS relationships, Routing policy on Internet paths. Example of commercial relationship. Transit vs.

Inter-domain Routing. Outline. Border Gateway Protocol

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection

On the Eyeshots of BGP Vantage Points

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003

Today. Finishing up inter-domain routing. Review of end-to-end forwarding. How we build routers. Economics of peering/settlement

Analyzing and modelling the AS-level Internet topology

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

ECONOMIZING ISP INTERCONNECTIONS AT INTERNET EXCHANGE POINTS

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Towards Modelling The Internet Topology The Interactive Growth Model

Inter-Domain Routing: Stability, Policies, and Incentives

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?

Dove siamo? Architecture of Dynamic Routing

Masterkurs Rechnernetze IN2097

Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D.

NETWORK TOPOLOGIES: INFERENCE, MODELING, AND GENERATION

Interdomain Routing. Project Report

Controlling IP Spoofing based DDoS Attacks Through Inter-Domain Packet Filters

Characterization and Design of Effective BGP AS-PATH Prepending

An Overview of Solutions to Avoid Persistent BGP Divergence

6.263 Data Communication Networks

Quality of Service Routing Network and Performance Evaluation*

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

Doing Don ts: Modifying BGP Attributes within an Autonomous System

Interconnection and its Discontents

Collecting the Internet AS-level Topology

Internet Routing. Review of Networking Principles

CS 40, Lecture 3: Internet economics. Ramesh Johari

An AS-Level Study of Internet Path Delay Characteristics

Understanding Large Internet Service Provider Backbone Networks

How To Make A Route Map On Bpg More Efficient

Evaluating Potential Routing Diversity for Internet Failure Recovery

Hi-BGP: A Lightweight Hijack-proof Inter-domain Routing Protocol

HTS: A Hierarchical Method for Load Balancing in Autonomous Networks

The Internet. Internet Technologies and Applications

Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics

Embedded BGP Routing Monitoring. Th. Lévy O. Marcé

Network Level Multihoming and BGP Challenges

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Cost Efficient Overflow Routing for Outbound ISP Traffic

Exploiting BGP Scoping Services to Violate Internet Transit Policies

Internet Routing Protocols Lecture 04 BGP Continued

Incorporating Congestion Control in BGP considering its. Economic and Policy Effects

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies

Lecture 18: Border Gateway Protocol"

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

Placing BGP Monitors in the Internet UCLA Computer Science Department - Techical Report TR

Analysis of Internet Topologies: A Historical View

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

BGP Routing Stability of Popular Destinations

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

Topological Trends of Internet Content Providers

Computer Networks. k-fault tolerance of the Internet AS graph

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

Introduction. Internet Address Depletion and CIDR. Introduction. Introduction

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

BGP: Border Gateway Protocol

Quantifying the BGP routes diversity inside a tier-1 network

TOPOLOGIES NETWORK SECURITY SERVICES

IPv4 Address Allocation and the BGP Routing Table Evolution

Intelligent Load Balancing: Overflow Balance

Measuring the Shared Fate of IGP Engineering and Interdomain Traffic

Internet Traffic Measurement

AS Relationships, Customer Cones, and Validation

A Link Load Balancing Solution for Multi-Homed Networks

Outline. Outline. Outline

Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident

ISPs Traffic Engineering and Peering Strategy

The Impacts of Link Failure on Routing Dynamics

Today s Class. Kinds of Networks. What s a Network? Normal Distribution. Properties of Networks. What are networks Properties of networks

Distributed Out-bound Load Balancing in Inter-AS Routing by Random Matchings

Fireware How To Dynamic Routing

XROADS NETWORKS WHITE PAPER

A Strategy for Transitioning to BGP Security

Understanding Route Aggregation in BGP

Traffic Engineering With Traditional IP Routing Protocols

Analysis of Internet Topologies

Network Formation and Routing by Strategic Agents using Local Contracts

Network Working Group Request for Comments: March 1999

Internetworking and Internet-1. Global Addresses

Internet structure: network of networks

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012

IAB IPv6 Multi-Homing BOF. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations

Autonomous Security for Autonomous Systems

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Intelligent Load Balancing: Enforced Balance

Interdomain Routing. Outline

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

Efficient Detection of Ddos Attacks by Entropy Variation

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

Transcription:

Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010

Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system relationships in the Internet, IEEE/ACM Trans. Networking, vol. 9, no. 6, December 2001; L. Subramanian, S. Agarwal, J. Rexford, and R. H. Katz, Characterizing the Internet hierarchy from multiple vantage points, in Proc. IEEE INFOCOM, June 2002, pp. 618 C627;

Outline the structure of the Internet; Inferring the hierarchy of Internet; Inferring the relationships of autonomous systems; Problem aroused.

Constructive Parts of Internet Figure 1: The structure of the Internet

Internet Hierarchy Tier 1 ISPs: those that have access to the global Internet Routing Table and don t buy network capacity from other providers. UUNet, Cable & Wireless, Sprint, Qwest, Genuity, and AT&T. Tier 2 ISPs: generally has a smaller national presence than a Tier 1 ISP and may lease part or all of its network from a Tier 1. America Online, Broadwing, and @home. Tier 3 ISPs: typically a regional provider with no national backbone. RCN, Verizon, Log On America, and so on.

Internet Hierarchy Tier 1 ISPs: those that have access to the global Internet Routing Table and don t buy network capacity from other providers. UUNet, Cable & Wireless, Sprint, Qwest, Genuity, and AT&T. Tier 2 ISPs: generally has a smaller national presence than a Tier 1 ISP and may lease part or all of its network from a Tier 1. America Online, Broadwing, and @home. Tier 3 ISPs: typically a regional provider with no national backbone. RCN, Verizon, Log On America, and so on. Autonomous system: a collection of IP networks and routers under the control of one entity.

Types of AS Relationships Provider-to-Customer (Customer-to-Provider): the customer pays the provider to gain the access to all (or most) destinations in provider s routing table. Peering: two ASes provide mutual access to a subset of each other s routing tables without any financial settlement. Sibling: two ASes, belonging to the same commercial organization, sharing all their routing tables. Backup: to provide connectivity in the event of a failure. Maybe some new comings...

Inferring the AS Relationships Figure 2: A undirected graph representing the connectivity view of part of the Internet

Inferring the AS Relationships Figure 2: A undirected graph representing the connectivity view of part of the Internet

Inferring the AS Relationships Figure 3: A directed graph representing the connectivity view of part of the Internet

Inferring the Positions of ASes in Internet Hierarchy The relationships translate directly into policies for exporting route advertisements via BGP sessions with neighboring ASes: Exporting to a provider: In exchanging routing information with a provider, an AS can export its routes and routes of its customers, but cannot export routes learned from other providers or peers. Exporting to a customer: An AS can export its routes, routes of its customers, and routes learned from other providers and peers to its customer. Exporting to a peer: In exchanging routing information with a peer, an AS can export its routes and the routes of its customers, but cannot export routes learned from other providers or peers. Exporting to a sibling: An AS can export its routes, routes of its customers, and routes learned from other providers and peers to its customer. If every AS obeys the export policies, then every advertised path has the following form: ((customer to provider), (sibing) ), (peering) X, ((provider to customer), (sibing) ), Where X equals to 0 or 1.

Gao s Algorithm Source data: A collection of AS paths gained from a single AS. Algorithm: Step One: to choose the first node with the highest degree to be the boundary between the uphill and downhill portions of the path; Step Two: To assign the relationship of any continuous nodes in the uphill part to be customer-to-provider; To assign the relationship of any continuous nodes in the downhill part to be provider-to-customer; Step Three: To apply step 1 and 2 to other paths in the collection until all the paths have been issued; Step Four: To go through all the paths, and then assign the relationship of two continuous nodes to be sibling if they have both customer-to-provider and provider-to-customer relationships; Step Six: To compare the degree of the boundary node with that of its next node. If the difference is within some threshold, the relationship between these two nodes could be peering. Results: High accuracy for provider-to-customer and peering relationships, but comparatively low accuracy for sibling relationships.

Subramanian s Algorithm The Main Difference Using different source data: A collection of AS paths gained from multiple vantage points (ASes). Because of multiple vantage points, we could have a more complete view of the whole Internet; we could examine the relationship between two ASes from different angles; we would have enough conflict paths which can be used to figure out the configuration mistakes;... However, we should also notice that improper choice of vantage points may introduce REDUNDANCY.

Problems Raised The Privacy Issue!

Acknowledgement Thanks very much for your time!