Internet Networking Spring 2004 Tutorial 5 Safe “Peering Backup” Routing With BGP.

Slides:



Advertisements
Similar presentations
1 Interdomain Traffic Engineering with BGP By Behzad Akbari Spring 2011 These slides are based on the slides of Tim. G. Griffin (AT&T) and Shivkumar (RPI)
Advertisements

Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
Path Vector Routing NETE0514 Presented by Dr.Apichan Kanjanavapastit.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Does BGP Solve the Shortest Paths Problem? Timothy G. Griffin Joint work with Bruce Shepherd and Gordon Wilfong Bell Laboratories, Lucent Technologies.
Part IV BGP Modeling. 2 BGP Is Not Guaranteed to Converge!  BGP is not guaranteed to converge to a stable routing. Policy inconsistencies can lead to.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
Towards a Logic for Wide-Area Internet Routing Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Kunal.
Inferring Autonomous System Relationships in the Internet Lixin Gao Dept. of Electrical and Computer Engineering University of Massachusetts, Amherst
Inferring Autonomous System Relationships in the Internet Lixin Gao.
Inferring Autonomous System Relationships in the Internet Lixin Gao Presented by Santhosh R Thampuran.
Announcement  Slides and reference materials available at  Slides and reference materials available.
1 Internet Path Inflation Xenofontas Dimitropoulos.
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
HLP: A Next Generation Interdomain Routing Protocol Lakshminarayanan Subramanian* Matthew Caesar* Cheng Tien Ee*, Mark Handley° Morley Maoª, Scott Shenker*
1 Tutorial 5 Safe “Peering Backup” Routing With BGP Based on:
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Tutorial 5 Safe Routing With BGP Based on: Internet.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
CS Summer 2003 Lecture 3. CS Summer 2003 What is a BGP Path Attribute? BGP uses a set of parameters known as path attributes to characterize.
Improving BGP Convergence Through Consistency Assertions Dan Pei, Lan Wang, Lixia Zhang UCLA Xiaoliang Zhao, Daniel Massey, Allison Mankin, USC/ISI S.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Internet Networking Spring 2002
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Computer Networks Layering and Routing Dina Katabi
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Border Gateway Protocol
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 34 Routing Algorithms Ref: Tanenbaum pp ;
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao,
Pitch Patarasuk Policy Disputes in Path-Vector Protocol A Safe Path Vector Protocol The Stable Paths Problem and Interdomain routing.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol)
HLP: A Next Generation Interdomain Routing Protocol Lakshminarayanan Subramanian, Matthew Caesar, Cheng Tien Ee, Mark Handley, Morley Mao, Scott Shenker,
Border Gateway Protocol (BGP) (Bruce Maggs and Nick Feamster)
Inferring AS Relationships. The Problem  One view  AS relationships  BGP route tables  The other view  BGP route tables  AS relationships  Available.
CSci5221: BGP Policies1 Inter-Domain Routing: BGP, Routing Policies, etc. BGP Path Selection and Policy Routing Stable Path Problem and Policy Conflicts.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
1 Internet Routing 4/12/2012. Admin. r Exam 2 date: m Wednesday, May 2 at 2:00 p.m. m If you want to take the exam in another day (e.g. due to travel),
1 Network Layer: Routing Intra- and Inter-Domain Routing Y. Richard Yang 4/18/2016.
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
New Directions in Routing
COS 561: Advanced Computer Networks
Interdomain Traffic Engineering with BGP
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 461: Computer Networks Spring 2014
COMP/ELEC 429/556 Introduction to Computer Networks
COS 461: Computer Networks
BGP Instability Jennifer Rexford
Presentation transcript:

Internet Networking Spring 2004 Tutorial 5 Safe “Peering Backup” Routing With BGP

BGP - Background Inter-AS routing protocol. The routers have no global knowledge of the topology Each router knows its neighbors The router chooses a path according to local policies. The router advertises paths it chose to the neighbors

Safe System We call a collection of routing policies safe if they can never lead to routing divergence. Example: Unsafe system AS1 AS2 AS0 (AS1,AS2,AS0) (AS1,AS0) (AS2,AS1,AS0) (AS2,AS0) Paths to AS0:

Global Coordination – Why Not? Many ASes may be unwilling to reveal their local policies to others Statically checking for convergence properties is NP-complete problem Even if convergence insured for certain topology, BGP might not converge after router/link failures or policy change

Why Not “ Shortest Path Routing ” ? This may contradict local policy (i.e. the case where an AS wants to route through its provider even if the route is not attractive in terms of its length). For example, there is a possibility that a router will prefer provider path over customer path – against its financial incentive.

Relationships Between AS Customer – Provider (transit) relation – the customer pays to the provider for traffic on the link. An AS will export to its providers paths it learned from its customers. An AS will export to its customer paths it learned from providers, customers and peers Peer-to-peer (peering) relation – the link is intended for traffic between two neighbors and their customers. An AS will export to its peers paths it learned from its customers only.

AS Graph - Example The export policies should prohibit the use of some of the paths: for example paths (6,0,3), (4,2,0) and (2,0,1) Possible Paths from 0 to 2: (0,2), (0,3,2), (0,3,4,2), (0,3,5,4,2), (0,6,5,3,2), (0,6,5,4,2) Peer-to-peer Provider-to-customer

AS Graph Properties An AS graph is said to be an acyclic provider- customer digraph if the directed graph induced by provider–customer relations is acyclic. Example: if we added a provider-customer edge {0,5} in the previous graph, we would create a cycle. A path has a valley if it traverses a provider- costumer edge and then a costumer-provider edge. Example: paths (3,2,4), (6,1,0,3) – have a valley path (3,5,4) – has no valley

AS Graph Properties A path has a step if: There is a peer-to-peer edge followed by a peer-to-peer edge. Example: (2, 0, 1). There is a peer-to-peer edge followed by a costumer-provider edge. Example: (2, 0, 5). There is a provider-costumer edge followed by a peer-to-peer edge. Example: (3, 0, 1).

Export Policy The following table indicates whether or not AS announces a route to its neighbor depending on its relationship to the AS that send the route: These export rules ensure that no permitted path will have a step or a valley. providerpeercustomer YYY NNYpeer NNYprovider From To

The Safety Theorem Guideline: If for AS1 next hop of path P1 belongs to AS1’s customers, and next hop of path P2 belongs to AS1’s providers or peers, then AS1 should prefer P1 over P2. Why does this Guideline make sense? Theorem: Consider a BGP system where (a) there are only transit and peering relations, (b) all ASs follow the above Guideline (c) there is no provider-customer cycle (d) there is no valley (e) there is no step, then this BGP system is safe.

Peering Backup “Peering Backup” is a new relation (agreement) between neighboring ASs AS-1 and AS-2 (recall that we have considered in the past only “peering” and “transit”) The idea is that if the connectivity of AS-1 through its provider is lost, then AS-1 is allowed to send packets through AS-2 even if they are not destined for AS-2 siblings, and vice versa. More formally, we permit a path that includes a step. Since such a paths should be used only in the case of failure, it will always have lower preference than a primary path.

Paths categories Provider-costumer, peer-to-peer: w vu P

Paths categories peer-to-pee, customer-provider v wu P

Paths categories peer-to-peer, peer-to-peer: wvu P

Export Policies for supporting peering backup The new policy can form valley paths. E.g To avoid this, paths received from a provider should be marked not only as a backup, but using an additional flag, and AS that gets such a marked path should never export it to its provider. providerpeercustomer YYY Y(backup) Ypeer NY(backup)Yprovider From To

Backup Path - Example Paths (5,3,4,2) or (1,0,2,4) are legal backup paths Path (3,0,6) is not legal backup peering Provider-to-customer backup peering backup peering

Backup Path - Example Example of the propagation of an announcement of a backup path: AS0 sends path (0,1) to AS6, but the path is not accepted (and therefore is not propagated further) while link (6,1) is up. When link (6,1) is broken, AS6 accepts the backup path (6,0,1) and announces it to AS5.

Ranking backup paths Example: Suppose that AS3’s policy is: prefer routing through AS2. Suppose that AS2’s policy is: prefer routing through AS3. Consequently, we get routing divergence (2,3,1,0) (3,2,1,0) (1,0)

Ranking backup paths – solution I Ranks backup paths based on the path “length” (number of ASs). Ensures that the system is safe, Very restrictive: prefer a provider path with two steps over customer path with one step. Note: giving a priority to customer- based routes, might result in an unsafe system.

Ranking backup paths – solution II Paths with smaller number of steps should be preferred. Among paths with the same number of steps customer paths should be preferred. Among customer paths with the same number of steps the shorter one should be preferred This policy is consistent with the commercial relationships between nodes and also ensures that the system is inherently safe (i.e. safe under any failures)

Avoidance Level In order to implement the policy we associated a new attribute, called avoidance level, to each path. For each step edge the avoidance level of the path should be increased. Each router may increase the avoidance level by different value – it just should be positive. Avoidance level may be increased when adding any edge, not only a step. The path with lower avoidance level should be preferred.

Increasing Avoidance Level The following table indicates when the avoidance level attribute should be increased. (R indicates that its increase is required while O indicates that its increase is optional providerpeercustomer OOO RROpeer ROprovider