Interdomain Routing (Nick Feamster) February 4, 2008.

Slides:



Advertisements
Similar presentations
Improving Internet Availability. Some Problems Misconfiguration Miscoordination Efficiency –Market efficiency –Efficiency of end-to-end paths Scalability.
Advertisements

AGORA: A Market for Internet Connectivity Nick Feamster, Georgia Tech Ramesh Johari, Stanford Vijay Vazirani, Georgia Tech.
Multihoming and Multi-path Routing
CS 4251: Computer Networking II Nick Feamster Spring 2008
1 Interdomain Traffic Engineering with BGP By Behzad Akbari Spring 2011 These slides are based on the slides of Tim. G. Griffin (AT&T) and Shivkumar (RPI)
Border Gateway Protocol Ankit Agarwal Dashang Trivedi Kirti Tiwari.
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Border Gateway Protocol Autonomous Systems and Interdomain Routing (Exterior Gateway Protocol EGP)
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
INTERDOMAIN ROUTING POLICY COS 461: Computer Networks Spring 2010 (MW 3:00-4:20 in COS 105) Mike Freedman
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Towards a Logic for Wide-Area Internet Routing Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Kunal.
Announcement  Slides and reference materials available at  Slides and reference materials available.
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
1 Tutorial 5 Safe “Peering Backup” Routing With BGP Based on:
Tutorial 5 Safe Routing With BGP Based on: Internet.
Internet Networking Spring 2004 Tutorial 5 Safe “Peering Backup” Routing With BGP.
INTERDOMAIN ROUTING POLICY READING: SECTIONS PLUS OPTIONAL READING COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in COS 105) Mike Freedman.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
Computer Networking Lecture 10: Inter-Domain Routing
Internet Routing (COS 598A) Today: Interdomain Traffic Engineering Jennifer Rexford Tuesdays/Thursdays.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Internet Routing (COS 598A) Today: Multi-Homing Jennifer Rexford Tuesdays/Thursdays 11:00am-12:20pm.
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
1 Interdomain Routing Policy Reading: Sections plus optional reading COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford.
Backbone Networks Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Interdomain Routing Policy COS 461: Computer Networks Spring 2011 Mike Freedman 1.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Jennifer Rexford Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks Stub.
Computer Networks Layering and Routing Dina Katabi
Interdomain Routing David Andersen Spring 2007 Carnegie Mellon University.
Nick Feamster Interdomain Routing Correctness and Stability.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network BGP Attributes and Path Selection Process.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
Lecture 4: BGP Presentations Lab information H/W update.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
BGP4 - Border Gateway Protocol. Autonomous Systems Routers under a single administrative control are grouped into autonomous systems Identified by a 16.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #08: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol)
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
Border Gateway Protocol (BGP) (Bruce Maggs and Nick Feamster)
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
CSci5221: BGP Policies1 Inter-Domain Routing: BGP, Routing Policies, etc. BGP Path Selection and Policy Routing Stable Path Problem and Policy Conflicts.
Interdomain Interconnections and Routing Computer Networks Hari Balakrishnan Fall 2016 Most of these slides were prepared by Nick Feamster (’00,
CS 3700 Networks and Distributed Systems
Border Gateway Protocol
CS 3700 Networks and Distributed Systems
Securing BGP Bruce Maggs.
Border Gateway Protocol
Interdomain Routing (Nick Feamster).
COS 561: Advanced Computer Networks
BGP supplement Abhigyan Sharma.
Interdomain Traffic Engineering with BGP
Inter-Domain Routing: BGP, Routing Policies, etc.
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Policies Jennifer Rexford
Securing BGP Bruce Maggs.
COS 561: Advanced Computer Networks
BGP Instability Jennifer Rexford
Border Gateway Protocol (BGP)
Presentation transcript:

Interdomain Routing (Nick Feamster) February 4, 2008

2 Today’s Lecture: Interdomain Routing Today’s interdomain routing protocol: BGP –BGP route attributes Usage Problems –Business relationships Today’s Paper: Stable Internet Routing without Global Coordination –Main ideas –Extensions See (Chapter ) for good coverage of today’s topics.

3 Internet Routing Large-scale: Thousands of autonomous networks Self-interest: Independent economic and performance objectives But, must cooperate for global connectivity Comcast Abilene AT&T Cogent Georgia Tech The Internet

4 Internet Routing Protocol: BGP Route Advertisement Autonomous Systems (ASes) Session Traffic DestinationNext-hopAS Path / … 2637

5 Two Flavors of BGP External BGP (eBGP): exchanging routes between ASes Internal BGP (iBGP): disseminating routes to external destinations among the routers within an AS eBGP iBGP Question: What’s the difference between IGP and iBGP?

6 Internal BGP (iBGP) “iBGP” Default: “Full mesh” iBGP. Doesn’t scale. Large ASes use “Route reflection” Route reflector: non-client routes over client sessions; client routes over all sessions Client: don’t re-advertise iBGP routes.

7 Example BGP Routing Table > show ip bgp Network Next Hop Metric LocPrf Weight Path *>i i *>i i *>i / i * i / i The full routing table > show ip bgp BGP routing table entry for /16 Paths: (1 available, best #1, table Default-IP-Routing-Table) Not advertised to any peer from ( ) Origin IGP, metric 0, localpref 150, valid, internal, best Community: 10578: :950 Last update: Sat Jan 14 04:45: Specific entry. Can do longest prefix lookup: Prefix AS path Next-hop

8 Routing Attributes and Route Selection Local preference: numerical value assigned by routing policy. Higher values are more preferred. AS path length: number of AS-level hops in the path Multiple exit discriminator (“MED”): allows one AS to specify that one exit point is more preferred than another. Lower values are more preferred. Shortest IGP path cost to next hop: implements “hot potato” routing Router ID tiebreak: arbitrary tiebreak, since only a single “best” route can be selected BGP routes have the following attributes, on which the route selection process is based:

9 Other BGP Attributes Next-hop: IP address to send packets en route to destination. (Question: How to ensure that the next-hop IP address is reachable?) Community value: Semantically meaningless. Used for passing around “signals” and labelling routes. More in a bit. Next-hop: iBGP Next-hop:

10 Local Preference Control over outbound traffic Not transitive across ASes Coarse hammer to implement route preference Useful for preferring routes from one AS over another (e.g., primary-backup semantics) Primary Backup Higher local pref Lower local pref Destination

11 Communities and Local Preference Customer expresses provider that a link is a backup Affords some control over inbound traffic More on multihoming, traffic engineering in Lecture 7 Primary Backup “Backup” Community Destination

12 AS Path Length Among routes with highest local preference, select route with shortest AS path length Shortest AS path != shortest path, for any interpretation of “shortest path” Destination Traffic

13 AS Path Length Hack: Prepending Attempt to control inbound traffic Make AS path length look artificially longer How well does this work in practice vs. e.g., hacks on longest-prefix match? D AS 1 AS 2 AS 3 AS 4 AS Path: “1” AS Path: “1 1” AS Path: “3 1 1” AS Path: “2 1” Traffic

14 Multiple Exit Discriminator (MED) Mechanism for AS to control how traffic enters, given multiple possible entry points. I San Francisco New York Los Angeles Dest. Traffic MED: 10 MED: 20

15 Problems with MED Safety: No persistent oscillations –Routing system should “settle down”, assuming the system’s inputs are not changing R3 selects A R1 advertises A to R2 R2 selects C R1 selects C –(R1 withdraws A from R2) R2 selects B –(R2 withdraws C from R1) R1 selects A, advertises to R2 R1 R3R2 A B C 21 MED: 10 MED: 20 Preference between B and C at R2 depends on presence or absence of A.

16 Hot-Potato Routing Prefer route with shorter IGP path cost to next-hop Idea: traffic leaves AS as quickly as possible I New YorkAtlanta Washington, DC 5 10 Dest. Common practice: Set IGP weights in accordance with propagation delay (e.g., miles, etc.) Traffic

17 Problems with Hot-Potato Routing Small changes in IGP weights can cause large traffic shifts I New York Atlanta Washington, DC 5 10 Dest. Question: Cost of sub- optimal exit vs. cost of large traffic shifts Traffic 11

18 What policy looks like in Cisco IOS Inbound “Route Map” (import policy) eBGP Session

19 General Problems with BGP Convergence Security –Too easy to “steal” IP address space Regular examples of suspicious activity (see Internet Alert Registry) –Hard to check veracity of information (e.g., AS path) –Can’t tell where data traffic is actually going to go Broken business models –“Depeering” and degraded connectivity: universal connectivity depends on cooperation. No guarantees! Policy interactions –Oscillations (e.g., today’s paper)

20 Internet Business Model (Simplified) Customer/Provider: One AS pays another for reachability to some set of destinations “Settlement-free” Peering: Bartering. Two ASes exchange routes with one another. Provider Peer Customer Preferences implemented with local preference manipulation Destination Pay to use Get paid to use Free to use

21 Filtering and Rankings Ranking: route selection Filtering: route advertisement Customer Competitor Primary Backup

22 The Business Game and Depeering Cooperative competition (brinksmanship) Much more desirable to have your peer’s customers –Much nicer to get paid for transit Peering “tiffs” are relatively common 31 Jul 2005: Level 3 Notifies Cogent of intent to disconnect. 16 Aug 2005: Cogent begins massive sales effort and mentions a 15 Sept. expected depeering date. 31 Aug 2005: Level 3 Notifies Cogent again of intent to disconnect (according to Level 3) 5 Oct :50 UTC: Level 3 disconnects Cogent. Mass hysteria ensues up to, and including policymakers in Washington, D.C. 7 Oct 2005: Level 3 reconnects Cogent During the “outage”, Level 3 and Cogent’s singly homed customers could not reach each other. (~ 4% of the Internet’s prefixes were isolated from each other)

23 Depeering Continued Resolution… …but not before an attempt to steal customers! As of 5:30 am EDT, October 5th, Level(3) terminated peering with Cogent without cause (as permitted under its peering agreement with Cogent) even though both Cogent and Level(3) remained in full compliance with the previously existing interconnection agreement. Cogent has left the peering circuits open in the hope that Level(3) will change its mind and allow traffic to be exchanged between our networks. We are extending a special offering to single homed Level 3 customers. Cogent will offer any Level 3 customer, who is single homed to the Level 3 network on the date of this notice, one year of full Internet transit free of charge at the same bandwidth currently being supplied by Level 3. Cogent will provide this connectivity in over 1,000 locations throughout North America and Europe.

24 General Problems with BGP Security (more in later lecture) –Too easy to “steal” IP address space –Hard to check veracity of information (e.g., AS path) –Can’t tell where data traffic is actually going to go Broken business models –“Depeering” and degraded connectivity: universal connectivity depends on cooperation. No guarantees! Policy interactions –Oscillations (e.g., today’s paper)

25 Policy Interactions Varadhan, Govindan, & Estrin, “Persistent Route Oscillations in Interdomain Routing”, 1996

26 Strawman: Global Policy Check Require each AS to publish its policies Detect and resolve conflicts Problems: ASes typically unwilling to reveal policies Checking for convergence is NP-complete Failures may still cause oscillations

27 Think Globally, Act Locally Key features of a good solution –Safety: guaranteed convergence –Expressiveness: allow diverse policies for each AS –Autonomy: do not require revelation/coordination –Backwards-compatibility: no changes to BGP Local restrictions on configuration semantics –Ranking –Filtering

28 Main Idea of Today’s Paper Permit only two business arrangements –Customer-provider –Peering Constrain both filtering and ranking based on these arrangements to guarantee safety Surprising result: these arrangements correspond to today’s (common) behavior Gao & Rexford, “Stable Internet Routing without Global Coordination”, IEEE/ACM ToN, 2001

29 Relationship #1: Customer-Provider Filtering –Routes from customer: to everyone –Routes from provider: only to customers providers customer From the customer To other destinations advertisements traffic From other destinations To the customer customer providers

30 Relationship #2: Peering Filtering –Routes from peer: only to customers –No routes from other peers or providers advertisements traffic customer peer

31 Rankings Routes from customers over routes from peers Routes from peers over routes from providers provider peer customer

32 Additional Assumption: Hierarchy Disallowed!

33 Safety: Proof Sketch System state: the current route at each AS Activation sequence: revisit some router’s selection based on those of neighboring ASes

34 Activation Sequence: Intuition Activation: emulates a message ordering –Activated router has received and processed all messages corresponding to the system state “Fair” activation: all routers receive and process outstanding messages

35 Safety: Proof Sketch State: the current route at each AS Activation sequence: revisit some router’s selection based on those of neighboring ASes Goal: find an activation sequence that leads to a stable state Safety: satisfied if that activation sequence is contained within any “fair” activation sequence

36 Proof, Step 1: Customer Routes Activate ASes from customer to provider –AS picks a customer route if one exists –Decision of one AS cannot cause an earlier AS to change its mind An AS picks a customer route when one exists

37 Proof, Step 2: Peer & Provider Routes Activate remaining ASes from provider to customer –Decision of one Step-2 AS cannot cause an earlier Step- 2 AS to change its mind –Decision of Step-2 AS cannot affect a Step-1 AS AS picks a peer or provider route when no customer route is available

38 Ranking and Filtering Interactions Allowing more flexibility in ranking –Allow same preference for peer and customer routes –Never choose a peer route over a shorter customer route … at the expense of stricter AS graph assumptions –Hierarchical provider-customer relationship (as before) –No private peering with (direct or indirect) providers Peering

39 Some problems Requires acyclic hierarchy (global condition) Cannot express many business relationships Abovenet Verio PSINet Sprint Customer Question: Can we relax the constraints on filtering? What happens to rankings?

40 Other Possible Local Rankings Accept only next-hop rankings –Captures most routing policies –Generalizes customer/peer/provider –Problem: system not safe Accept only shortest hop count rankings –Guarantees safety under filtering –Problem: not expressive *,2*,0* 2*,1*,0*1*, 3*, 0* Feamster, Johari, & Balakrishnan, “Implications of Autonomy for the Expressiveness of Policy Routing”, SIGCOMM 2005

41 What Rankings Violate Safety? Theorem. Permitting paths of length n+2 over paths of length n will violate safety under filtering. Theorem. Permitting paths of length n+1 over paths of length n will result in a dispute wheel. Feamster, Johari, & Balakrishnan, “Implications of Autonomy for the Expressiveness of Policy Routing”, SIGCOMM 2005