STABLE PATH PROBLEM Presented by: Sangeetha A. J. Based on The Stable Path Problem and Interdomain Routing Timothy G. Griffin, Bruce Shepherd, Gordon Wilfong.

Slides:



Advertisements
Similar presentations
1 Incentive-Compatible Interdomain Routing Joan Feigenbaum Yale University Vijay Ramachandran Stevens Institute of Technology Michael Schapira The Hebrew.
Advertisements

1 Incentive-Compatible Inter-Domain Routing Joan Feigenbaum Yale University Colloquium at Cornell University; October.
Sept Internet routing seminar (Fall 2000) An analysis of BGP convergence Properties Timothy G. Griffin Gordan Wilfong Presented by Tian Bu.
Does BGP Solve the Shortest Paths Problem? Timothy G. Griffin Joint work with Bruce Shepherd and Gordon Wilfong Bell Laboratories, Lucent Technologies.
Part IV BGP Modeling. 2 BGP Is Not Guaranteed to Converge!  BGP is not guaranteed to converge to a stable routing. Policy inconsistencies can lead to.
Courtesy: Nick McKeown, Stanford
Foundations of Inter-Domain Routing Ph.D. Dissertation Defense Vijay Ramachandran Dissertation Director: Joan Feigenbaum Committee Members: Jim Aspnes,
SCHOOL OF INFORMATION UNIVERSITY OF MICHIGAN si.umich.edu Searching for Stability in Interdomain Routing Rahul Sami (University of Michigan) Michael Schapira.
Announcement  Slides and reference materials available at  Slides and reference materials available.
Can Economic Incentives Make the ‘Net Work? Jennifer Rexford Princeton University
BGP Safety with Spurious Updates Martin Suchara in collaboration with: Alex Fabrikant and Jennifer Rexford IEEE INFOCOM April 14, 2011.
Towards a Lightweight Model of BGP Safety Matvey Arye Princeton University Joint work with: Rob Harrison, Richard Wang, Jennifer Rexford (Princeton) Pamela.
Design Principles of Policy Languages for Path Vector Protocols Timothy G. Griffin (AT&T Research), Aaron D. Jaggard (Penn), and Vijay Ramachandran (Yale)
Lecture 14: Inter-domain Routing Stability CS 268 class March 8 th, 2004 (slides from Timothy Griffin’s tutorial and Craig Labovitz’s NANOG talk)
1 Policy Disputes in Path-Vector Protocols A Safe Path-Vector Protocol Zacharopoulos Dimitris
Tutorial 5 Safe Routing With BGP Based on: Internet.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Routing So how does the network layer do its business?
Internet Networking Spring 2004 Tutorial 5 Safe “Peering Backup” Routing With BGP.
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
On the Stability of Rational, Heterogeneous Interdomain Route Selection Hao Wang Yale University Joint work with Haiyong Xie, Y. Richard Yang, Avi Silberschatz,
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
The Strategic Justification for BGP Hagay Levin, Michael Schapira, Aviv Zohar.
Routing.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
Relating Two Formal Models of Path-Vector Routing March 15, 2005: IEEE INFOCOM, Miami, Florida Aaron D. Jaggard Tulane University Vijay.
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
1 Semester 2 Module 6 Routing and Routing Protocols YuDa college of business James Chen
Computer Networks Layering and Routing Dina Katabi
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Egress Route Selection for Interdomain Traffic Engineering Design considerations beyond BGP.
An Adaptive Policy Management Approach to BGP Convergence by Selma Yilmaz PhD Examining Committee: Prof. Ibrahim Matta, First Reader (Major Advisor) Prof.
CS 268: Lecture 9 Inter-domain Routing Protocol Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
Can the Border Gateway Protocol (BGP) be fixed? UCL Oct 15, 2003 Timothy G. Griffin Intel Research, Cambridge UK
CS 268: Lecture 11 Inter-domain Routing Protocol Karthik Lakshminarayanan UC Berkeley (substituting for Ion Stoica) (*slides from Timothy Griffin and Craig.
Pitch Patarasuk Policy Disputes in Path-Vector Protocol A Safe Path Vector Protocol The Stable Paths Problem and Interdomain routing.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Text BGP Basics. Document Name CONFIDENTIAL Border Gateway Protocol (BGP) Introduction to BGP BGP Neighbor Establishment Process BGP Message Types BGP.
CSci5221: BGP Policies1 Inter-Domain Routing: BGP, Routing Policies, etc. BGP Path Selection and Policy Routing Stable Path Problem and Policy Conflicts.
1 Internet Routing 4/12/2012. Admin. r Exam 2 date: m Wednesday, May 2 at 2:00 p.m. m If you want to take the exam in another day (e.g. due to travel),
Doing Don’ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre.
The Stable Paths Problem As A Model Of BGP Routing NJIT April 24, 2002 Timothy G. Griffin AT&T Research
An Analysis of BGP Convergence Properties
COMP 3270 Computer Networks
L. Cittadini, G. Di Battista, M. Rimondini, S. Vissicchio
COS 561: Advanced Computer Networks
Hao Wang Yale University Joint work with
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
Routing.
Interdomain routing V. Arun
Can Economic Incentives Make the ‘Net Work?
Inter-Domain Routing: BGP, Routing Policies, etc.
COS 561: Advanced Computer Networks
Dynamic Routing and OSPF
COS 561: Advanced Computer Networks
Inter-domain Routing Protocol
COS 561: Advanced Computer Networks
COS 461: Computer Networks
BGP Instability Jennifer Rexford
Routing.
Presentation transcript:

STABLE PATH PROBLEM Presented by: Sangeetha A. J. Based on The Stable Path Problem and Interdomain Routing Timothy G. Griffin, Bruce Shepherd, Gordon Wilfong

Overview BGP basics Simple Path Vector Protocol Stable Path Problem Dispute Wheels 2

Border Gateway Protocol The only interdomain routing protocol used in the internet today. Not based on shortest path. Path vector protocol. 3

How is BGP different from shortest path algorithms? Policy based metrics Independent routing policies at each AS These policies could be conflicting BGP can be considered a distributed algorithm to solve the Stable Path Problem. 4

BGP route selection Order of preference 1. Highest local preference 2. Shortest AS path 3. Lowest IP address for next hop 5

Peering transformation Composition of three transformations 1. Export policies r 1 = export (u w, r) 2. Path vector transformation r 2 = PVT (u w, r 1 ) 3. Import policies r 3 = import (u w, r 2 ) 6

Peering transformation pt (u w, r) = import (u w, PVT(u w, export(u w, r))) Suppose u 0 is originating AS P = u k u k-1 …..u 1 u 0 Route record received is pt( u k u k-1, pt( u k-1 u k-2, ……..pt ( u 1 u 0 )))..)) Ranking function λ u k (P) 7

Simple Path Vector Protocol process spvp(u) { receive P from w  { rib-in(u  w) := P if rib(u) != best(u) { rib(u) := best(u) for each v in peers(u) { send rib(u) to v } 8

Stable path problem Mathematical formulation that captures the semantics of any path vector protocol. Does every node have a stable route to one destination node? Node 0 is assumed to be origin or destination of all routes. 9

SHORTEST

SHORTEST 1- Path assignment Node Time

SHORTEST

Stable path problem Undirected graph G = (V, E) V- set of nodes, E - set of edges Path is either empty path or a sequence of nodes (v k v k -1 …..v 1 v 0 ) P v - set of permitted paths from v to origin If P 1, P 2 P v and λ v (P 1 ) < λ v (P 2 ) then P 2 is preferred over P 1. 13

Stable path problem An instance of stable path problem, S = (G,P,Λ) Graph together with permitted paths and ranking function for each node. Some properties P 0 = {(0)} for all v V – {0} ◦ P v (null path is always present in the set) ◦ λ v () =0, λ v (P) > 0 for P ≠ (null path has lowest preference) ◦ P P v then P is a simple path (no repeated nodes). 14

Stable path problem A path assignment is a function π function that maps a node to a permitted path. π(u) P u All possible permitted paths at u, choices (π, u) = { (u v) π(v) | {u,v} E } ∩ P u (u ≠ 0) { (0)} otherwise 15

Stable path problem W is subset of P u such that each path in W has a distinct next hop. Best path in W, best(W, u) {P W with maximal λ u (P) W ≠ Φ otherwise } Path assignment π is stable at node u if π(u) = best (choices (π, u),u) 16

Stable path problem π is stable, if it is stable at each node u Path assignment vector (P 1, P 2,….., P n ) where π(u)=P u If π is stable and π(u)= (u w) P, then π(w)= P. Thus stable path implies tree rooted at the origin. The stable path problem, S = (G,P,Λ) is solvable if there is a stable path assignment for S. 17

SHORTEST

SHORTEST

Good Gadget

Good Gadget Node Time

Good Gadget

Bad Gadget

Bad Gadget Node Time

Naughty Gadget

Naughty Gadget Node Time

Multiple solutions possible

Observations about SPP A stable path problem is safe if SPVP always converges. SPP solvability does not imply safety. ◦ Naughty gadget has single solution but SPVP may diverge. Oscillations are possible. It always diverges if there is no solution. Multiple stable solutions are possible for a SPP. 28

Dispute Wheels A sequence of nodes, u i. A sequence of non-empty paths, Q i and R i. 29 u i+1 u1u1 u2u2 u i u k-1 u0u0 v QiQi R1R1 R i R k-1 Q0Q0 Q1Q1 Q2Q2 R0R0 Q i+1 Q k-1

Dispute Wheels A circular set of dependencies between routing policies that cannot be simultaneously satisfied. R i is a path from u i to u i+1 Q i P u i R i Q i+1 P u i λ u i (Q i ) < λ u i (R i Q i+1 ) Preferred path for every node goes around the wheel instead of following the spoke. 30

Dispute Wheel of Bad Gadget R0R0 R1R1 R2R2 Q0Q0 Q2Q2 Q1Q1 u0u0 u2u2 u1u1

Dispute Wheel of Naughty Gadget R0R0 R1R1 Q0Q0 Q1Q1 u0u0 u1u1

Properties of dispute wheel No dispute wheel implies Solvability Unique solution Safety Robustness 33

Dispute wheel Construct a sequence of subsets of V, V 0, V 1 … Corresponding path assignments π 0, π 1 …. Direct path P = (u 1 u 2 ) P 2 P 2 = π(u 2 ) Add nodes to the set, if its highest rank consistent with π i is direct path. If you are unable to find nodes whose paths are consistent with existing path assignments, you get a dispute wheel. 34

Good Gadget

Good Gadget Node Time (0) (0) (0)

Bad Gadget

Bad Gadget Node Time (0)

Solvability 39 Q0Q0 R0R0 v1v1 u0u0 u1u1 R1R1 u2u2

Unique solution 40 u0u0 R0R0 u1u1 R1R1 u2u2 u3u3 R2R2 R3R3

Robustness If stable path problem, S, has no dispute wheel then S is robust. S is fragile if S is solvable but there exist some E’ (subset of E) such that S/E’ is not solvable. 41

Bad Backup- Fragile

Conclusion A network with unique solution can have a dispute wheel, if transient oscillations are present. This is a rigid condition. Even in networks with multiple stable states, we get dispute wheels. 43

Complementary approaches Operational guidelines Static analysis of routing policies Dynamic detection 44

45