Distributed Route Aggregation on the Global Network (DRAGON) João Luís Sobrinho 1 Laurent Vanbever 2, Franck Le 3, Jennifer Rexford 2 1 Instituto Telecomunicações,

Slides:



Advertisements
Similar presentations
CSCI-1680 Network Layer: Intra-domain Routing Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Advertisements

Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Border Gateway Protocol Autonomous Systems and Interdomain Routing (Exterior Gateway Protocol EGP)
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
HLP: A Next Generation Interdomain Routing Protocol Lakshminarayanan Subramanian* Matthew Caesar* Cheng Tien Ee*, Mark Handley° Morley Maoª, Scott Shenker*
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
Interdomain Routing and The Border Gateway Protocol (BGP) Courtesy of Timothy G. Griffin Intel Research, Cambridge UK
Internet Routing (COS 598A) Today: BGP Routing Table Size Jennifer Rexford Tuesdays/Thursdays 11:00am-12:20pm.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Internet Routing (COS 598A) Today: Interdomain Traffic Engineering Jennifer Rexford Tuesdays/Thursdays.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Exterior Gateway Protocols: EGP, BGP-4, CIDR Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Ion Stoica October 2, 2002 (* this presentation is based on Lakshmi Subramanian’s slides) EE 122: Inter-domain routing – Border Gateway Protocol (BGP)
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
04/05/20011 ecs298k: Routing in General... lecture #2 Dr. S. Felix Wu Computer Science Department University of California, Davis
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Border Gateway Protocol(BGP) L.Subramanian 23 rd October, 2001.
Allocations vs Announcements A comparison of RIR IPv4 Allocation Records with Global Routing Announcements Geoff Huston May 2004 (Activity supported by.
Computer Networks Layering and Routing Dina Katabi
Inter-domain Routing Outline Border Gateway Protocol.
Yaping Zhu with: Jennifer Rexford (Princeton University) Subhabrata Sen and Aman Shaikh (AT&T Labs-Research) Impact of Prefix-Match.
Information-Centric Networks07b-1 Week 7 / Paper 2 NIRA: A New Inter-Domain Routing Architecture –Xiaowei Yang, David Clark, Arthur W. Berger –IEEE/ACM.
I-4 routing scalability Taekyoung Kwon Some slides are from Geoff Huston, Michalis Faloutsos, Paul Barford, Jim Kurose, Paul Francis, and Jennifer Rexford.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network BGP Attributes and Path Selection Process.
Introduction to BGP.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
RSC Part II: Network Layer 6. Routing in the Internet (2 nd Part) Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are,
CS 3830 Day 29 Introduction 1-1. Announcements r Quiz 4 this Friday r Signup to demo prog4 (all group members must be present) r Written homework on chapter.
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
1 Evolution Towards Global Routing Scalability draft-zhang-evolution-01 Varun Khare Beichuan Zhang
CIDR Classless Inter Domain Routing Give the IP address space some breathing room! Basic idea: allocate the remaining IP addresses in variable-size blocks.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Spring 2010CS 3321 Interdomain Routing. Spring 2010CS 3322 How to Make Routing Scale Flat versus Hierarchical Addresses Inefficient use of Hierarchical.
HLP: A Next Generation Interdomain Routing Protocol Lakshminarayanan Subramanian, Matthew Caesar, Cheng Tien Ee, Mark Handley, Morley Mao, Scott Shenker,
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
Text BGP Basics. Document Name CONFIDENTIAL Border Gateway Protocol (BGP) Introduction to BGP BGP Neighbor Establishment Process BGP Message Types BGP.
Inter-domain Routing Outline Border Gateway Protocol.
Border Gateway Protocol BGP-4 BGP environment How BGP works BGP information BGP administration.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
CS 3700 Networks and Distributed Systems
Border Gateway Protocol
CS 3700 Networks and Distributed Systems
Evolution Towards Global Routing Scalability
Border Gateway Protocol
COS 561: Advanced Computer Networks
HLP-A Next Generation Inter-Domain Routing Protocol
COS 561: Advanced Computer Networks
Routers Routing algorithms
COS 561: Advanced Computer Networks
BGP Policies Jennifer Rexford
COMP/ELEC 429/556 Introduction to Computer Networks
COS 561: Advanced Computer Networks
Fixing the Internet: Think Locally, Impact Globally
BGP Instability Jennifer Rexford
Computer Networks Protocols
Presentation transcript:

Distributed Route Aggregation on the Global Network (DRAGON) João Luís Sobrinho 1 Laurent Vanbever 2, Franck Le 3, Jennifer Rexford 2 1 Instituto Telecomunicações, 1 Universidade de Lisboa 2 Princeton University, 3 IBM T. J. Watson Research

Recently in the news (August 2014) +512 K IPv4 prefixes propagated to ≈ ASs 2

Not a scalable Internet routing system Most prefixes propagated (by BGP) to all ASs – Routing & forwarding tables growth – Churn & convergence time increase – S*BGP processing requirements escalation 3

Outline Characterizing the Internet for scalability DRAGON: basic ideas DRAGON: filtering strategy DRAGON: additional aspects DRAGON: performance Conclusions 4

Outline Characterizing the Internet for scalability DRAGON: basic ideas DRAGON: filtering strategy DRAGON: additional aspects DRAGON: performance Conclusions 5

Decentralization: each AS decides… Where to acquire address space – provider? provider-independent, Internet registry? Where to connect – multi-homing? peering at an exchange point? How to announce assigned address space – de-aggregate first? How to treat routes learned from neighbors – which routing policies? 6

Structure: opportunities to scale? Hierarchy: IP prefixes Classless Inter Domain Routing 7

Structure: opportunities to scale? Provider-customer agreements Hierarchy: ASs Hierarchy: IP prefixes Classless Inter Domain Routing 8

Structure: opportunities to scale? Provider-customer agreements Hierarchy: ASs Hierarchy: IP prefixes Classless Inter Domain Routing 9

Structure: opportunities to scale? Provider-customer agreements Hierarchy: ASs Hierarchy: IP prefixes Geography (rough) Classless Inter Domain Routing 10

Structure: opportunities to scale? Provider-customer agreements How to exploit this structure for scalability? Hierarchy: ASs Hierarchy: IP prefixes Geography (rough) Classless Inter Domain Routing 11

Outline Characterizing the Internet for scalability DRAGON: basic ideas DRAGON: filtering strategy DRAGON: additional aspects DRAGON: performance Conclusions 12

Filtering strategy Filter the more specific prefixes when possible – no black holes – strive to preserve global forwarding behavior Use incentives to filter locally – save on routing and forwarding state – forward data-packets along best possible route Make standard usage of BGP routing messages 13

Generation of aggregation prefixes Generate aggregation prefixes when beneficial – permit filtering of provider-independent prefixes – new address space is not created Announce as in BGP – self-organization when more than one AS generates the same aggregation prefix 14

Outline Characterizing the Internet for scalability DRAGON: basic ideas DRAGON: filtering strategy DRAGON: additional aspects DRAGON: performance Conclusions 15

Providers, customers, and peers #1 #2 #3 #4 #5 #6 #7 #8 #9 AS peer provider customer 16

Prefixes q more specific than p originates p ( /16) originates q ( /24) #1 #2 #3 #4 #5 #6 #7 #8 #9 17

BGP: Gao-Rexford routing policies route attributes: “learned from …” “customer” “provider” exportation: all routes from customers all routes to customers preference q q-route (route pertaining to q) #1 #2 #3 #4 #5 #6 #7 #8 #9 + “peer” 18 –

BGP: Gao-Rexford routing policies q #1 #2 #3 #4 #5 #6 #7 #8 #9 q-route exportation: all routes from customers all routes to customers route attributes: “learned from …” “customer” “provider” preference + – “peer” 19

BGP: Gao-Rexford routing policies q #1 #2 #3 #4 #5 #6 #7 #8 #9 q-route exportation: all routes from customers all routes to customers route attributes: “learned from …” “customer” “provider” preference + “peer” – 20

BGP: Gao-Rexford routing policies q #1 #2 #3 #4 #5 #6 #7 #8 #9 q-route exportation: all routes from customers all routes to customers route attributes: “learned from …” “customer” “provider” preference + “peer” – 21

Final state for prefix q q #1 #2 #3 #4 #5 #6 #7 #8 #9 route attributes: “learned from …” “customer” “provider” preference + “peer” – 22

Final state for prefix p #1 #2 #3 #4 #5 #6 #7 #8 #9 p route attributes: “learned from …” “customer” “provider” preference + “peer” – 23

Combined states for q and p p-route q-route #1 #2 #3 #4 #5 #6 #7 #8 #9 p forwarding: longest prefix match rule q route attributes: “learned from …” “customer” “provider” preference + “peer” – 24

Filtering Code (FC) Other than the owner of p, in the presence of p, filter q if only if: attribute of p-route same or preferred to attribute of q-route 25

Filtering Code (FC) Other than the owner of p, in the presence of p, filter q if only if: attribute of p-route same or preferred to attribute of q-route #1 #2 #3 #4 #5 #6 #7 #8 #9 p q AS 1, AS 2, AS 3, AS 4, AS 5, AS 8 filter q on executing the FC ( ) 26

Arbitrary AS applies the FC AS 4 applies the FC #1 #2 #3 #4 #5 #6 #7 #8 #9 p q 27 withdrawal of q-route

Arbitrary AS applies the FC AS 4 applies the FC #1 #2 #3 #4 #5 #6 #7 #8 #9 p q 28 attribute of q-route worsens at AS 3: double incentive to apply the FC ( ) saves on forwarding state restores attribute of route used to forward data-packets with destination in q

Neighbor AS applies the FC #1 #2 #3 #4 #5 #6 #7 #8 #9 p q 29 AS 3 applies the FC

All ASs apply the FC AS 6, AS 7, AS 9 detailed information q AS 1, AS 2, AS3, AS 4, AS 5, AS 8 coarse-grained information p #1 #2 #3 #4 #5 #6 #7 #8 #9 p q 30

Global property: correctness Correctness no routing anomalies (no black holes) #1 #2 #3 #4 #5 #6 #7 #8 #9 p q 31

Global property: route consistency Route consistency attribute of route used to forward data-packets is preserved Optimal route consistency set of ASs that forgo q is maximal for route consistency #1 #2 #3 #4 #5 #6 #7 #8 #9 p q 32

Route consistency: partial deployment 1.AS 5, AS 8 filter q  route consistency #1 #2 #3 #4 #5 #6 #7 #8 #9 p q 33

Route consistency: partial deployment #1 #2 #3 #4 #5 #6 #7 #8 #9 p q 1.AS 5, AS 8 filter q  route consistency 2.AS 1, AS 2 filter q  route consistency 34

Route consistency: partial deployment 1.AS 5, AS 8 filter q  route consistency 2.AS 1, AS 2 filter q  route consistency 3.AS 3 filters q  route consistency #1 #2 #3 #4 #5 #6 #7 #8 #9 p q 35

Route consistency: partial deployment 1.AS 5, AS 8 filter q  route consistency 2.AS 1, AS 2 filter q  route consistency 3.AS 3 filters q  route consistency 4.AS 4 filters q  route consistency #1 #2 #3 #4 #5 #6 #7 #8 #9 p q 36

Filtering strategy: general case Correctness – for all routing policies for which BGP is correct Route consistent states culminating in optimality – for isotone routing policies (includes Gao-Rexford) – otherwise, some stretch Optimal route consistency is not synonymous with efficiency (think shortest paths) 37

Outline Characterizing the Internet for scalability DRAGON: basic ideas DRAGON: filtering strategy DRAGON: additional aspects DRAGON: performance Conclusions 38

Additional aspects of DRAGON Prefixes at multiple levels of specificity – parent prefix and child prefixes 39

Additional aspects of DRAGON Prefixes at multiple levels of specificity – parent prefix and child prefixes Generation of aggregation prefixes – permit filtering of provider-independent prefixes 40

Additional aspects of DRAGON Prefixes at multiple levels of specificity – parent prefix and child prefixes Generation of aggregation prefixes – permit filtering of provider-independent prefixes Network dynamics – adapts to link failures and additions 41

Outline Characterizing the Internet for scalability DRAGON: basic ideas DRAGON: filtering strategy DRAGON: additional aspects DRAGON: performance Conclusions 42

Filtering efficiency # (FIB entries BGP) – # (FIB entries DRAGON) # (FIB entries BGP) 50% of the prefixes without parent Filtering efficiency bounded at 50% Bound on filtering efficiency rises to 79% Current set of prefixes With aggregation prefixes 43

Performance of DRAGON Every AS forgoes at least 47.5% of the prefixes 80% ASs realize the maximum filtering efficiency of 50% 80% ASs realize the maximum filtering efficiency of 79% Every AS forgoes at least 70% of the prefixes FIB aggregation cumulated % ASs filtering efficiency current set of prefixeswith aggregation prefixes 44

Conclusions DRAGON is a BGP add-on to scale the Internet routing system DRAGON can be deployed incrementally DRAGON can reduce the amount of state in the Internet routing system by approximately 80% DRAGON is – more fundamentally – a solid framework to reason about route aggregation 45

Thank you! Visit us at 46