AS15169.

Slides:



Advertisements
Similar presentations
NAGIOS AND CACTI NETWORK MANAGEMENT AND MONITORING SYSTEMS.
Advertisements

Traffic Dynamics at a Commercial Backbone POP Nina Taft Sprint ATL Co-authors: Supratik Bhattacharyya, Jorjeta Jetcheva, Christophe Diot.
ATLAS Utility Management Software BobComm 2004 January
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
2006 – (Almost another) BGP Year in Review A BRIEF update to the 2005 report 18 October 2006 IAB Routing Workshop Geoff Huston APNIC.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
The RPLS ‘via’ attributes IETF89, London RPLS-VIA - IETF89 - Job Snijders Hibernia Networks.
Peering policies and BGP configuration
Traffic Engineering for CDNs Matt Jansen Akamai Technologies APRICOT 2015.
Providing A Subset of Whois Data Via DNS Shuang Zhu Xing Li CERNET Center.
Google (LBC) Local Business Center Free Listing, Free Updates, and ( New ) Free Insights Organize your Ownership Listing for enhanced Optimization and.
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
APNIC Internet Routing Registry An introduction to the IRR TWNIC Meeting, 3 December 2003 Nurani Nimpuno, APNIC.
TDTS21: Advanced Networking Lecture 7: Internet topology Based on slides from P. Gill and D. Choffnes Revised 2015 by N. Carlsson.
Network Technologies essentials Week 5: Routing Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University of Washington.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
Remote Trigger Black Hole 111. Remotely Triggered Black Hole Filtering We use BGP to trigger a network wide response to a range of attack flows. A simple.
MyAPNIC Survey 2015 What have we learned? APNIC Services Vivek Nigam 9 September 2015 Jakarta.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
Matt Torrisi Customer Success Operations Data Connectors: Is Your Online Security Intelligent?
The New Policy for Enterprise Networking Robert Bays Chief Scientist June 2002.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Autonomous System Numbers How to describe Routing Policy.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
Thoughts on TEIN2 Operation and Collaboration Xing Li
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Making Routing Registries Great Again Jared Mauch – NTT Communications
Authors: Jiang Xie, Ian F. Akyildiz
Submitting an invoice with the Tungsten Portal
Boarder Gateway Protocol (BGP)
The BGP Visibility Scanner
Mapa de Topología usando sondas RIPE Atlas
Keeping local stuff local
Securing BGP Bruce Maggs.
Border Gateway Protocol
ExpressRoute for Office 365 Training
BGP supplement Abhigyan Sharma.
How do we decide where to deploy to next?
COS 561: Advanced Computer Networks
ExpressRoute for Office 365 Training
Geoff Huston APNIC August 2009
Measuring routing (in)security
COS 561: Advanced Computer Networks
The real-time Internet routing observatory
COS 561: Advanced Computer Networks
Step 3: You will see this page
COS 461: Computer Networks Spring 2014
COMP/ELEC 429/556 Introduction to Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
SDN Controllers in the WAN
Computer Networks Topic :User datagram protocol Transmission Control Protocol -Hemashree S( )
Content Delivery and Remote DNS services
Improving global routing security and resilience
Jan Chrillesen, Stofa A/S
Peering Security DKNOG, March 14-15, 2019 Susan Forney and Walt Wollny
BGP Instability Jennifer Rexford
An Empirical Evaluation of Wide-Area Internet Bottlenecks
FIRST How can MANRS actions prevent incidents .
Unit 7 EIGRP Chapter 13 Using EIGRP in Enterprise Networks
Intro to Data & Internet
By Keessun Fokeerah Member Services(MS) Team
Amreesh Phokeer Research Manager AfPIF-10, Mauritius
APNIC Solving problems for our community
Validating MANRS of a network
APNIC Solving problems for our community
Presentation transcript:

AS15169

Infrastructure Data centers Edge pops GGCs

Our core Belgium Finland Denmark Dublin Netherlands

Edge pops +100 Edge locations FJR UAE - Fujairah Smarthub MCT Oman - Blue City MRS Interxion MIL Avalon campus SOF Telepoint

GGCs Deep within partners networks. Can serve between 60% and 80% of the total AS15169 traffic volume. Great tool to increase cost savings for our partners while enhancing end -user performance.

Traffic flows facts Serves traffic from edge nodes (GGC), then direct peering , then via indirect paths We optimizes traffic delivery for end-user performance so we carry traffic on our own network as close to users as possible We respect AS path length and prefix specifics when deciding how to exchange traffic, still traffic may not follow these guidelines as a result of observed performance between Google serving locations and the end- user. Internal mapping system has visibility over prefixes originating from an ASN based on BGP Announcements and then using our mapping formula we rank serving options based on latency, path congestion, link utilization and advertisement location

Best practices Please advertise all your routes in all locations where you peer with Google, don’t hard TE by using prefixes announcements, instead use sticky notes “communities” Make sure your Peeringdb records are up to date, our automation tools depends on it From 2019-Q2 we will be applying route filters to all our BGP sessions make sure to update your ASN data on the IRR system. To avoid any routing issues please keep your Maintainer, ASN, AS-SET, and Route objects up to date. We use RADB, RIPE, APNIC, AFRINIC, ARIN, NTT and Level3. Google Public DNS 8.8.8.8, are not designed as ICMP network testing services we rate limit ICMP. The termination point of the TCP/UDP session with Google may not represent the full network path between a user and the service

Contacts For peering & GGC Register your interest at peering.google.com General Peering operations issues and questions noc@google.com GGC Specific Questions - ggc@google.com Google ISP Portal - Self Service - isp.google.com Manage your tickets Monitor your Google traffic levels Check your video quality, prefix quality and Google traffic flows Long term planning and high level escalations hossama@google.com