New Routing Architectures Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.

Slides:



Advertisements
Similar presentations
Using Network Virtualization Techniques for Scalable Routing Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton University.
Advertisements

Multihoming and Multi-path Routing
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
Lecture 6 Overlay Networks CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
Traffic Engineering With Traditional IP Routing Protocols
1 Route Control Platform Making the Network Act Like One Big Router Jennifer Rexford Princeton University
Traffic Engineering Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
1 Overlay Networks Reading: 9.4 COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford Teaching Assistants: Sunghwan Ihm and.
1 Overlay Networks Reading: 9.4 COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Jennifer Rexford Teaching Assistant: Ioannis Avramopoulos.
1 Policy-Based Path-Vector Routing Reading: Sections COS 461: Computer Networks Spring 2006 (MW 1:30-2:50 in Friend 109) Jennifer Rexford Teaching.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Computer Science Department Princeton University
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
1 Future Internet Architectures: Toward an Architecture-Agnostic Architecture Jennifer Rexford Princeton University
Anycast Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
1 Different Strokes for Different Folks (Or, How I Learned to Stop Worrying and Love Virtualization) Jennifer Rexford, Princeton University Joint work.
Link-State Routing Reading: Sections 4.2 and COS 461: Computer Networks Spring 2011 Mike Freedman
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Internet Routing (COS 598A) Today: Telling Routers What to Do Jennifer Rexford Tuesdays/Thursdays.
Internet Routing (COS 598A) Today: Multi-Homing Jennifer Rexford Tuesdays/Thursdays 11:00am-12:20pm.
Routing Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Routing and Routing Protocols
1 Routing as a Service Karthik Lakshminarayanan (with Ion Stoica and Scott Shenker) Sahara/i3 retreat, January 2004.
1 Interdomain Routing Policy Reading: Sections plus optional reading COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford.
New Interdomain Routing Architectures Jennifer Rexford.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Backbone Networks Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Overlay Networks and Tunneling Reading: 4.5, 9.4 COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in COS 105) Mike Freedman Teaching Assistants: Wyatt.
Wen Xu and Jennifer Rexford Princeton University MIRO : Multi-path Interdomain ROuting.
Multipath Routing Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Internet Routing (COS 598A) Today: Router Software Jennifer Rexford Tuesdays/Thursdays 11:00am-12:20pm.
Interdomain Routing and the Border Gateway Protocol (BGP) Reading: Section COS 461: Computer Networks Spring 2011 Mike Freedman
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
Jennifer Rexford Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks Central.
Jennifer Rexford Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks Stub.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
Routing and Routing Protocols Routing Protocols Overview.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 Cabo: Concurrent Architectures are Better than One Jennifer Rexford Princeton University Joint work with Nick Feamster.
CCNA 1 Module 10 Routing Fundamentals and Subnets.
LAN Switching and Wireless – Chapter 1
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
OVERVIEW Lecture 6 Overlay Networks. 2 Focus at the application level.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Mike Freedman Fall 2012 COS 561: Advanced Computer Networks Traffic Engineering.
Separating Routing From Routers Jennifer Rexford Princeton University
Separating Routing From Routers Jennifer Rexford Princeton University
1 Internet Routing: BGP Routing Convergence Jennifer Rexford Princeton University
Routing and Routing Protocols CCNA 2 v3 – Module 6.
COS 561: Advanced Computer Networks
CPE 401/601 Computer Network Systems
Can Economic Incentives Make the ‘Net Work?
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
Lecture 6 Overlay Networks
COS 561: Advanced Computer Networks
BGP Policies Jennifer Rexford
COS 461: Computer Networks
Lecture 6 Overlay Networks
COS 561: Advanced Computer Networks
BGP Instability Jennifer Rexford
Computer Networks Protocols
Presentation transcript:

New Routing Architectures Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm

Outline Changing the routing architecture –Why? –Where and how? Example architectures –Removing routing from routers –Hybrid Link-state/Path-vector –Resilient Overlay Routing

Why Change Routing? Better performance –Scalability, security, convergence, reliability, flexibility, … Simpler management –For network operators –For folks deploying services Greater extensibility –To enable experimentation –To enable new services

What to Change, and Where? Add another layer about network routing –Routing functionality in overlay networks Change the routing protocols –To improve scalability, security, convergence, … Change the division of functionality –Data, control, and management planes Change the division of responsibility –End users, third parties, and service providers ???

Removing Routing from Routers: Routing Control Platform, Routing as a Service, 4D Control Plane, Ethane, …

Network Operators Network-wide views –Network topology (e.g., routers, links) –Mapping to lower-level equipment –Traffic matrix Network-level objectives –Load balancing –Survivability –Reachability –Security Direct control –Explicit configuration of data-plane mechanisms

What Should Routers Do? Forward packets: yes –Must be done at high speed –… in line-card hardware on fast routers –So, needs to be done on the routers Collect measurement data: yes –Traffic statistics –Topology information Compute routes: no??? –Distributed computation of forwarding tables –Doesn’t inherently need to run on the routers

Reasons to Remove Routing From Routers Routing is hard to do in a distributed fashion –Beyond single-path and/or shortest-path routing Difficult to make load-sensitive routing stable –Over-reacting to out-of-date information Poor visibility to drive good decisions –Incomplete local views of topology and load Not flexible enough for end users –Cannot easily select customized routes Difficult to extend over time –Hard-coded into the underlying routers

Routing Control Platform Goal: Move beyond today’s artifacts, while remaining compatible with the legacy routers RCP computes routes for the routers –Network-wide visibility and control Backwards compatibility –RCP speaks to routers using BGP protocol AS 2 RCP

Example Services Selective denial-of-service attack blackholing –Identify entry point and victim of attack –Drop offending traffic at the entry point Planned maintenance dryout –Drain traffic off of an edge router –Before bringing it down for maintenance Flexible egress point selection –Multiple ways to reach the same destination –Giving customers control over the decision Enhanced interdomain routing security –Anomaly detection or security protocols

Routing As a Service Goal: third parties pick end-to-end paths for clients to satisfy diverse user objectives Forwarding infrastructure –Basic routing (e.g., default routing) –Primitives for inserting routes Route selector –Aggregates network information –Selects routes on behalf of clients –Competes with other selectors for customers End host –Queries route selector to set up paths

Feasibility Fast reaction to failures –Routers are closer to the failures –Can a service react quickly enough? Scalability with network size –State and computation grow with the topology –Can a service manage a large network? Reliability? –Service is now a point of failure –Is simple replication enough? Security? –Service is now a natural point of attack –Easier (or harder) to protect than the routers?

Improving BGP Convergence

Routing Change: Before and After (1,0) (2,0) (3,1,0) (2,0) (1,2,0) (3,2,0)

Routing Change: Path Exploration AS 1 –Delete the route (1,0) –Switch to next route (1,2,0) –Send route (1,2,0) to AS 3 AS 3 –Sees (1,2,0) replace (1,0) –Compares to route (2,0) –Switches to using AS (2,0) (1,2,0) (3,2,0)

Routing Change: Path Exploration Initial situation –Destination 0 is alive –All ASes use direct path When destination dies –All ASes lose direct path –All switch to longer paths –Eventually withdrawn E.g., AS 2 –(2,0)  (2,1,0) –(2,1,0)  (2,3,0) –(2,3,0)  (2,1,3,0) –(2,1,3,0)  null (1,0) (1,2,0) (1,3,0) (2,0) (2,1,0) (2,3,0) (2,1,3,0) (3,0) (3,1,0) (3,2,0)

Convergence Overhead and Delay Path exploration is expensive –Large number of possible paths –Might have to explore (nearly) all of them Much slower than link-state routing –Simply floods the topology –And routers compute shortest path Any way to reduce BGP convergence time? –Avoid exploring paths with the same failure? –Hybrids of path vector and link state?

HLP: Hybrid Link-state/Path-vector Assume hierarchical AS structure –Provider-customer relationships dominate –And some peer-peer edges –(Are we willing to cook in these assumptions?) Hybrid of link state and path vector –Link state within a sub-tree –Path vector across peer-peer links Route on AS numbers –Rather than prefixes

Add New Features in an Overlay: Resilient Overlay Networks

Overlay Networks

RON: Resilient Overlay Networks Premise: by building application overlay network, can increase performance and reliability of routing Two-hop (application-level) Berkeley-to-Princeton route application-layer router Princeton Yale Berkeley

RON Circumvents Policy Restrictions IP routing depends on AS routing policies –But hosts may pick paths that circumvent policies USLEC PU Patriot ISP me My home computer

RON Adapts to Network Conditions Start experiencing bad performance –Then, start forwarding through intermediate host A C B

RON Customizes to Applications VoIP traffic: low-latency path Bulk transfer: high-bandwidth path A C B voice bulk transfer

How Does RON Work? Keeping it small to avoid scaling problems –A few friends who want better service –Just for their communication with each other –E.g., VoIP, gaming, collaborative work, etc. Send probes between each pair of hosts A C B

How Does RON Work? Exchange the results of the probes –Each host shares results with every other host –Essentially running a link-state protocol! –So, every host knows the performance properties Forward through intermediate host when needed A C B B

RON Works in Practice Faster reaction to failure –RON reacts in a few seconds –BGP sometimes takes a few minutes Single-hop indirect routing –No need to go through many intermediate hosts –One extra hop circumvents the problems Better end-to-end paths –Circumventing routing policy restrictions –Sometimes the RON paths are actually shorter

RON Limited to Small Deployments Extra latency through intermediate hops –Software delays for packet forwarding –Propagation delay across the access link Overhead on the intermediate node –Imposing CPU and I/O load on the host –Consuming bandwidth on the access link Overhead for probing the virtual links –Bandwidth consumed by frequent probes –Trade-off probe overhead vs. detection speed Possibility of causing instability –Moving traffic in response to poor performance –May lead to congestion on the new paths

Future Routing Architecture Who is in charge? –Network administrators? –End hosts? –Third-party overlays? –Third-party routing providers? Build on top of today’s network? –New AS-level control plane? –Overlays on top of existing Internet? Assume (restricted) economic models? –To improve scalability and convergence?