intra-va-01.txt -01 Draft of: “FIB Suppression with Virtual Aggregation and Default Routes” Paul.

Slides:



Advertisements
Similar presentations
Multihoming and Multi-path Routing
Advertisements

VA-auto Goal: make the VA configuration simpler –Dont need to make configures on all VA routers. Only APRs and partial ASBRs. –Dont need to change the.
IEEE CCW 08 New Network Architectures: Why Bother? Paul Francis Cornell.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP Diverse Paths draft-ietf-grow-diverse-bgp-paths-dist-02 Keyur Patel.
Internetworking II: MPLS, Security, and Traffic Engineering
RIP V2 W.lilakiatsakun.  RFC 2453 (obsoletes –RFC 1723 /1388)  Extension of RIP v1 (Classful routing protocol)  Classless routing protocol –VLSM is.
Neighbor Discovery for IPv6 Mangesh Kaushikkar. Overview Introduction Terminology Protocol Overview Message Formats Conceptual Model of a Host.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
1 Copyright  1999, Cisco Systems, Inc. Module10.ppt10/7/1999 8:27 AM BGP — Border Gateway Protocol Routing Protocol used between AS’s Currently Version.
Entire Routes Reflecting capability draft-zhang-idr-bgp-entire-routes-reflect-00.txt Zhang Renhai :
BGP.
CS Summer 2003 CS672: MPLS Architecture, Applications and Fault-Tolerance.
Border Gateway Protocol Ankit Agarwal Dashang Trivedi Kirti Tiwari.
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
BGP Extensions for BIER draft-xu-idr-bier-extensions-01 Xiaohu Xu (Huawei) Mach Chen (Huawei) Keyur Patel (Cisco) IJsbrand Wijnands (Cisco)
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Making Routers Last Longer with ViAggre Hitesh Ballani, Paul Francis, Tuan Cao and Jia Wang Cornell University and AT&T Labs- Research Presented by Gregory.
1 CCNA 3 v3.1 Module 1. 2 CCNA 3 Module 1 Introduction to Classless Routing.
The Border Gateway Protocol (BGP) Sharad Jaiswal.
Transition Mechanisms for Ipv6 Hosts and Routers RFC2893 By Michael Pfeiffer.
CS Summer 2003 Lecture 13. CS Summer 2003 MP_REACH_NLRI Attribute The MP_REACH_NLRI attribute is encoded as shown below:
More on BGP Check out the links on politics: ICANN and net neutrality To read for next time Path selection big example Scaling of BGP.
Performance-based BGP Routing Mechanism draft-xu-idr-performance-routing-00 Xiaohu Xu (Huawei) Hui Ni (Huawei) Mohamed Boucadair (France.
BGP Attributes and Path Selections
Computer Networks Layering and Routing Dina Katabi
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP AS AN MVPN PE-CE Protocol draft-keyupate-l3vpn-mvpn-pe-ce-00 Keyur Patel,
A LIGHT-WEIGHT DISTRIBUTED SCHEME FOR DETECTING IP PREFIX HIJACKS IN REAL TIME Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang and Paul Francis. Cornell University,
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
I-4 routing scalability Taekyoung Kwon Some slides are from Geoff Huston, Michalis Faloutsos, Paul Barford, Jim Kurose, Paul Francis, and Jennifer Rexford.
Multi-path Interdomain ROuting by Xu and Rexford Alan Dunn Topics in Network Protocol Design March 5, 2010.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing Protocols.
Lecture 4: BGP Presentations Lab information H/W update.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Chapter 6 VLSM and CIDR.
Chapter 9. Implementing Scalability Features in Your Internetwork.
Routing Fundamental W.lilakiatsakun. Review Routing Fundamental VLSM Static & Dynamic Routing Routing algorithm concept.
Border Gateway Protocol
Xuan Zheng (modified by M. Veeraraghavan) 1 BGP overview BGP operations BGP messages BGP decision algorithm BGP states.
© 2001, Cisco Systems, Inc. A_BGP_Confed BGP Confederations.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #08: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
1 Evolution Towards Global Routing Scalability draft-zhang-evolution-01 Varun Khare Beichuan Zhang
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
Nov. 8, 2006IDR WG Meeting1 IPv6 Next Hop for IPv4 Prefix In BGP Updates, NH not necessarily of same address family as NLRI Currently deployed examples:
IP Traffic Engineering RSP draft-shen-ip-te-rsp-01.txt Naiming Shen Albert Tian Jun Zhuang
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to a Single Service.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Understanding BGP Path Attributes.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
RRG Nov 08 Mapped BGP Paul Francis, Cornell Xiaohu Xu, Huawei Hitesh Ballani, Cornell.
BGP Encapsulation SAFI and BGP Tunnel Encapsulation Attribute draft-pmohapat-idr-info-safi-02.txt Pradosh Mohapatra and Eric Rosen Cisco Systems IETF-69,
AS Numbers - Again Geoff Huston APNIC October 2009
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Internal DP MP-BGP for IPv6 原理 ISSUE 1.0.
Routing and Addressing in Next-Generation EnteRprises (RANGER)
Evolution Towards Global Routing Scalability
Virtual Aggregation (VA)
BGP Routing Policies.
Draft-nalawade-kapoor-tunnel-safi 03.txt
BGP (cont) 1. BGP Peering 2. BGP Attributes
EVPN Interworking with IPVPN
EVPN a very short introduction
BGP-LCU draft-szarecki-idr-bgp-lcu-traffic-steering-00
BGP VPN service for SRv6 Plus IETF 105, Montreal
EVPN Interworking with IPVPN
Presentation transcript:

intra-va-01.txt -01 Draft of: “FIB Suppression with Virtual Aggregation and Default Routes” Paul Francis, Hitesh Ballani Cornell Univ Xiaohu Xu, Huawei

Outline: Changes in the -01 draft Implementation status Next steps (technical) Project status within IETF

Main 00  01 changes: BCP instead of RFC Added “Edge-suppression” mode Removed need for new attribute “Merge”, “add”, “split”, and “remove” procedures for Virtual Prefixes (VP) Edges default to core No wire protocol changes

Recall that “Virtual Aggregation” uses “Virtual Prefixes” (VP) VPs are bigger than any “real” prefix Certain routers FIB-install routes (tunnel) to all sub-prefixes in a VP

Edge Suppression (ES) Mode: Core routers FIB-install all routes Edge routers FIB-install zero or more routes, and a default route to a core ES mode allows all edge routers (not just customer edge) to have small FIBs Routes to customers, popular prefixes.... (Thanks Robert Raszuk)

Removal of new attribute In order to know which prefixes must be FIB-installed, routers need to know: Full set of VPs (Thanks Daniel Ginsburg) VPs for which they are an Aggregation Point -00 used new attribute to convey VPs -01 uses configuration

Merge-add-split-remove FIB-size management sometimes requires redefinition of VPs Must be done without service disruption or temporarily large FIB size See draft....

Implementation Status In VRP5 (Huawei Router OS) Currently GRE (no key) tunnels Huawei wants to use inter-domain tunnels to reduce stretch penalty To ASBR: routers must FIB-install routes learned from neighbor AS Need auto-config of tunnels to remove this restriction

Next Steps (technical) Define automatic configuration of GRE keys in BGP draft-ietf-softwire-encaps-safi For FIB-suppression: GRE key identifies external peer Two possible approaches: Extended attributes (Huawei engineers prefer this because reuses existing mechanism)

GRE tunnel config example: BR router with external peers R1 and R2 R1  BR: NH=R1, NLRI=1.1/16 R2  BR: NH=R2, NLRI=2.2/16 BR advertises: Update1: NH=BR, E-NLRI=BR, Key=1, NLRI=1.1/16 Update2: NH=BR, E-NLRI=BR, Key=2, NLRI=2.2/16 BR can FIB-suppress 1.1/16 and 2.2/16 Received tunneled packets with Key=1 are sent to R1 Received tunneled packets with Key=2 are sent to R2 Encapsulation NLRI Tunnel Encapsulation Attribute

Discussion.... (next steps for BCP....)

tunnel-00.txt -00 Draft of: “Tunnel Endpoints in BGP” Xiaohu Xu, Huawei Paul Francis, Cornell Univ

Inter-AS IP tunnels Motivated by stretch and latency induced by (intra-domain) VA But other benefits may exist Load balance, fast restoration... Idea is simple: Always FIB-install tunnels, avoid extra hops in ASes doing VA

Inter-AS IP tunnels This draft assumes softwire-encaps- safi In softwire draft, tunnel endpoint must be BGP nexthop We extend this across ASes Could be implemented as Extended Attributes or softwire-encaps-safi Would welcome feedback here....

softwire-encaps-safi defines the Tunnel Encapsulation Attribute Our draft adds a sub-TLV which identifies the tunnel endpoint Optional Transitive Meaning: This tunnel can be used to reach the NLRI in this UPDATE Defines tunnel parameters (GRE, L2TPv3) “Endpoint Address Sub-TLV”

Endpoint Address Sub-TLV | Address Family Identifier (2 octets) | | Reserved (1 octet) | | Length of Autonomous System Number (1 octet) | | Autonomous System Number (Variable) | | Endpoint Address (variable) | IPv4 or IPv6 (NLRI may be either type) AS Number must match origin AS Tunnel Endpoint Address

AS-path is the same whether tunnel is used or not Origin AS is origin both for route to tunnel and route to NLRI By including AS Number in attribute, we detect when this is no longer true Could happen, for instance, as a result of upstream aggregation NLRI containing tunnel address is in the same UPDATE

All routers in SP use the same tunnel endpoint address Anycasted across all routers (this optional if site hosts tunnel endpoint) Prevents error where an upstream AS aggregates NLRI, and drops one of the tunnel endpoints ASes using VA should FIB-install routes to tunnel endpoints Makes tunneled packets shortest path

What about load balance? If upstream deaggregates, only one of the resulting routes can have a working tunnel One improvement might be to make the tunnel address a CIDR block Other routes can be used, only without tunnel Upstream ASes would have to know to deaggregate the tunnel address

AS=A, 1/8, 2/8 TE= AS=BAS=C AS=D A; 1/8, 2/8; TE= ; A; 1/8, 2/8; TE= ; A,B; 1/8, 2/8; TE= ; A,C; 1/8, 2/8 ; TE= ; A,B,D; 1/8; TE= ; A,C,D; 2/8 Draft as currently written: If D prefers B for 1/8 and C for 2/8, D cannot use tunnel for packets to 2/8

AS=A, 1/8, 2/8 TE= /28 AS=BAS=C AS=D A; 1/8, 2/8; TE= /29; A; 1/8, 2/8; TE= /29; A,B; 1/8, 2/8; TE= /29; A,C; 1/8, 2/8 ; TE= /29; A,B,D; 1/8; TE= /29; A,C,D; 2/8, /29; TE= /29; With CIDR-block tunnel endpoint addresses:

AS=A, 1/8, 2/8 TE= /28 AS=BAS=C AS=D A; 1/8, 2/8; TE= /29; A; 1/8, 2/8; TE= /29; A,B; 1/8, 2/8; TE= /29; A,C; 1/8, 2/8 ; TE= /29; A,B,D; 1/8; TE= /29; A,C,D; 2/8, /29; TE= /29; With CIDR-block tunnel endpoint addresses: Note that routers in D can now individually select paths to 1/8 and 2/8 Results in finer- grained traffic engineering And fast restoration

AS=A, 1/8, 2/8 TE= /28 AS=BAS=C AS=D A; 1/8, 2/8; TE= /29; A; 1/8, 2/8; TE= /29; A,B; 1/8, 2/8; TE= /29; A,C; 1/8, 2/8 ; TE= /29; A,[B,C],D; 1/8, 2/8; TE= /28; A,[B,C],D; 1/8, 2/8; TE= /28; Use AS-set to convey this path diversity... Can aggregate tunnel (reduces churn)

AS=A, 1/8, 2/8 TE= /28 AS=BAS=C AS=D A; 1/8, 2/8; TE= /29,IAC=30; A; 1/8, 2/8; TE= /29,IAC=60; A,B; 1/8, 2/8; TE= /29,IAC=30; A,C; 1/8, 2/8 ; TE= /29,IAC=60; A,[B,C],D; 1/8, 2/8; TE= /29, IAC=30; TE= /29,IAC=60; A,[B,C],D; 1/8, 2/8; TE= /29, IAC=30; TE= /29,IAC=60; By applying Iljitsch’s IAC weights to tunnels, we can take both sending and receiving AS load balancing needs into account

Discussion....