Overlays and The Evolution of BGP Peering. Agenda BGP Issues – Overlay Networks – VPNs – ToR BGP Peering Today – Rise of the Tier-3 ISPs.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 6: Meeting People Online.
Advertisements

Grand Challenges in Networking Nick Feamster CS 7001.
The Evolution of P2P Technology Robert Levitan, CEO Pando Networks P2P MEDIA SUMMIT, CES 2008.
What you should understand about buying a mobile phone Developed By by.
Bundubox ITU IOT IOT APPLICATION CHALLENGE. Proposal ▫Main idea ▫Local Communication Issues, Involved Solution ▫Bundubox: Local off the grid ip communication.
C Leading edge applications John Bosnell Point Topic 31 January 2005.
Onion Routing Security Analysis Aaron Johnson U.S. Naval Research Laboratory DC-Area Anonymity, Privacy, and Security Seminar.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Tussle in cyberspace: Defining tomorrow ’ s internet (2002) D.Clark, J. Wroclawski, K. Sollins & R. Braden Presented by: Gergely Biczok (Slides in courtesy.
Networks and Distributed Systems: Project Ideas
Criticisms of I3 Jack Lange. General Issues ► Design ► Performance ► Practicality.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Kae Hsu Communication Network Dept. Redundant Internet service provision - customer viewpoint.
A Survey of Network Orchestration in Cloud
Tradeoffs in CDN Designs for Throughput Oriented Traffic Minlan Yu University of Southern California 1 Joint work with Wenjie Jiang, Haoyuan Li, and Ion.
The Next Wave of Massive Disruptions to the Peering Ecosystem Asia Pacific Peering Forum Sydney, Nov. 8, 2006 William B. Norton Co-Founder & Chief Technical.
© 2011 Nicira. All rights reserved.. Peering at the Content Layer Bruce Davie Chief Service Provider Architect
Internet Inter-Domain Traffic Craig Labovitz, Scott Iekel-Johnson, Danny McPherson, Jon Oberheide, Farnam Jahanian Presented by: Kaushik Choudhary.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Network Devices BY JACKSON HARDESTY. Hubs  Hubs are a now outdated way of sending signals at layer 2 compared to switches.  Hubs are used primarily.
Inter-domain Routing Outline Border Gateway Protocol.
P2P Games Conference “Attributes of the Gaming Cloud?” Norman Henderson ASANKYA
Chapter 3 Introduction to Computing Chapter 3 Structures in Computing William Johnson Julia Benson-Slaughter
A Wanderer’s Guide to the Data Network Navigating Our Connected World Garrett Shields, GISP, CFM.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Networking in the cloud: An SDN primer Ben Cherian Chief Strategy Midokura.
Internet Technologies and Applications
Introduction Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Using IChat Instant Messaging Software Dean McKinney Greater St. Albert Catholic Schools January, 2006.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
IPv6 activities in Greece Dimitrios Kalogeras, Ph.d.
Skype A multimedia tool to use in and outside your classroom.
Information-Centric Networking Proposed IRTF RG IRTF Open Meeting at IETF-81 1IRTF Open IETF-81.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
An Overview of Peering; Benefits of Peering Andrew Ogilvie Managing Director, Xtraordinary Networks Ltd
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
1 MIKE NIELSEN DIRECTOR SP MARKETING. CONTENT DELIVERY NETWORKS.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
1 Overview Remember, we are just beginning to herd the cats. Much of this will become clearer LATER! The more we learn, the more all of this will come.
 Web 2.0 is the representation of the evolution of traditional applications to web applications focused on the end user. Web 2.0 is an attitude and not.
Software Defined Networks for Dynamic Datacenter and Cloud Environments.
Network of the future Leif Hansen Director of Engineering & Operations.
Do you want to get 40 Tbps?. Content Delivery Network (CDN)
Two trends that will change the Internet
Global scale with Microsoft Azure Scenarios Achieving high availability with Microsoft Azure Demos.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Questions National Picture What social networking sites is your child a member of? Vote –
Keeping Children Safe Online. Where to report abuse? To report any abuse on social media or internet: CEOP will accept reports from parents, teachers.
Skynet: A Cloud-Based Data Transfer Architecture Aleksandar Kuzmanovic
Overlay Networks : An Akamai Perspective
Microsoft Cloud Solution.  What is the cloud?  Windows Azure  What services does it offer?  How does it all work?  How to go about using it  Further.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Eric Van Horn Cosc 380. Overview of Google Fiber Provided services History of project Comparisons with current internet speeds Pros and cons Conclusion.
Network Function Virtualisation Network Functionality Within The Cloud Presenter : Kenny Marlow JNCIE #210 SP Architecture Team Lead.
IETF95.
September 2009Network Neutrality – the Norwegian ApproachPage 1 Network Neutrality – the Norwegian Approach Senior Adviser Frode Soerensen Norwegian Post.
Ideal in addition to fast VPN Service Provider using Secure VPN Access.
15-849: Hot Topics in Networking Policy and Networks Srinivasan Seshan 1.
Multicast in Information-Centric Networking March 2012.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
VPN Joshua Turner.
Content Distribution Networks
1. Hike in the Advertisement Industry Social media network is considered as a huge marketplace to promote business and to create revenues at very low.
Privacy Through Anonymous Connection and Browsing
It Followed Me Home: Exploring Strong Last Hop Devices and CDNs
CS590B/690B Detecting network interference (Spring 2018)
Presentation transcript:

Overlays and The Evolution of BGP Peering

Agenda BGP Issues – Overlay Networks – VPNs – ToR BGP Peering Today – Rise of the Tier-3 ISPs

OK_NET EVILNET FASTNET MY_NET

BGP Issues End user has no control: End user would like control to: – Avoid certain ISP/AS/Countries for privacy/security reasons – Avoid certain ISP for performance reasons

Overlay Networks OK_NET EVILNET FASTNET MY_NET

Overlay Networks OK_NET EVILNET FASTNET MY_NET

Overlay Networks OK_NET EVILNET FASTNET MY_NET

Overlay Networks OK_NET EVILNET FASTNET MY_NET

Overlay Networks OK_NET EVILNET FASTNET MY_NET

Overlay Networks OK_NET EVILNET FASTNET MY_NET

Overlay Networks OK_NET EVILNET FASTNET MY_NET

Overlay Networks OK_NET EVILNET FASTNET MY_NET Alice->Bob Alice->Goog

Overlay Networks OK_NET EVILNET FASTNET MY_NET Alice->Bob Alice->Goog

Overlay Networks OK_NET EVILNET FASTNET MY_NET Bob->Goog Alice->Goog

Overlay Networks OK_NET EVILNET FASTNET MY_NET Bob->Goog Alice->Goog

Overlay Networks OK_NET EVILNET FASTNET MY_NET Alice->Goog

Examples of Overlays

Security V. Privacy

VPN – Virtual Private Networks Security Oriented Overlay

ToR: Onion Routing Get list of ToR nodes

Knows the source, but not the destination

knows neither the source, nor the destination

Knows the destination, but not the source

No Node in the network knows the destination AND the Source So you can browse anonymously

TOR Anonymity network Everyone knows the TOR Nodes

To Stop Anonymous communication I can block traffic to the TOR nodes

Privacy V. Security Overlay

BGP Relationships and Peering Today Before: – Tier-1 Peer with each other for free – Tier-2 pays Tier-1 – Tier-3 pays Tier-2 – We pay Tier-3 Tier-1 can choose to peer with anyone. Tier-1 Does not pay anyone Tier-1 e.g. ATT, Level 3 Tier-2 Tier-3 e.g. Comcast Content providers & (CDN) Users

BGP Relationships and Peering Today After Videos and Social networks became HUGE The end-user is important – ADs or videos – Very good user experience Now Tier-3s are become powerful players – Tier-3 charge for peering – “Paid Peering” – Essentially a direct connection to the users

Traditional ISP relationshipsNew Model with Paid-Peering

Example: Netflix (2010) Level 3 is a Tier-1 ISP with CDNs Netflix switches from Akamai to Level 3 – Level 3 is cheaper than Akamai Level3 asks Comcast for more capacity Comcast says: Not Unless you start paying. After months of struggle Level3 agrees to pay Compast for traffic. A Tier-1 ISP is now paying a Tier-3 ISP – This changes everything

Example: Netflix (2010) Level 3 is a Tier-1 ISP with CDNs Netflix switches from Akamai to Level 3 – Level 3 is cheaper than Akamai Level3 asks Comcast for more capacity Comcast says: Not Unless you start paying. After months of struggle Level3 agrees to pay Compast for traffic. A Tier-1 ISP is now paying a Tier-3 ISP – This changes everything

Reflection on the State of the Internet

Logics About Final Project Milestones Partner Selection – Groups 2, 3. – Potentially pick a topic Proposal (10/14/2015) – 2 pages Presentation – 15 minutes Final Report – 6 pages Project Types Measurement driven – Understand aspects of the Internet Understand web-services Understand BGP – Data Analysis driven: Understand quality of Bug/Repo More Open-Ended – Improving quality of experience (mobile) – Fault tolerance in BGP networks Re-implementation – Goal: OpenSource an existing idea (SDN related). – Learn to integrate with a cloud platform (e.g. OpenStack) – Learn to integrate with Map-Reduce