Routing Policy CS 6250 Nick Feamster Fall 2011. BGP Policies in ISP Networks Introduced as fairly simple path vector protocol Many incremental modifications.

Slides:



Advertisements
Similar presentations
Objectives Know why companies use distribution channels and understand the functions that these channels perform. Learn how channel members interact and.
Advertisements

1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Improving Internet Availability. Some Problems Misconfiguration Miscoordination Efficiency –Market efficiency –Efficiency of end-to-end paths Scalability.
Internet Availability Nick Feamster Georgia Tech.
AGORA: A Market for Internet Connectivity Nick Feamster, Georgia Tech Ramesh Johari, Stanford Vijay Vazirani, Georgia Tech.
Multihoming and Multi-path Routing
CS 4251: Computer Networking II Nick Feamster Spring 2008
MINT: A Market for Internet Transit Nick Feamster Georgia Tech Joint work with Vytautas Valancius, Ramesh Johari, Vijay Vazirani.
Cabo: Concurrent Architectures are Better than One Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton.
Multihoming and Multi-path Routing
Chapter 1: Introduction to Scaling Networks
Selecting an IXP Where to peer?. THE TOP 10 IXP SELECTION CRITERIA How do network operators choose an Internet Exchange Point? 2.
Evolution 0.9: The Evolution of the U.S. Peering Ecosystem Gigabit Peering Forum VII Herndon, VA September 9, 2003 William B. Norton Co-Founder & Chief.
Multihoming and Multi-path Routing CS 7260 Nick Feamster January
1 Interdomain Traffic Engineering with BGP By Behzad Akbari Spring 2011 These slides are based on the slides of Tim. G. Griffin (AT&T) and Shivkumar (RPI)
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
INTERDOMAIN ROUTING POLICY COS 461: Computer Networks Spring 2010 (MW 3:00-4:20 in COS 105) Mike Freedman
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Announcement  Slides and reference materials available at  Slides and reference materials available.
INTERDOMAIN ROUTING POLICY READING: SECTIONS PLUS OPTIONAL READING COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in COS 105) Mike Freedman.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Internet Routing (COS 598A) Today: Multi-Homing Jennifer Rexford Tuesdays/Thursdays 11:00am-12:20pm.
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Interdomain Routing Policy COS 461: Computer Networks Spring 2011 Mike Freedman 1.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Interdomain Routing (Nick Feamster) February 4, 2008.
Interdomain Routing David Andersen Spring 2007 Carnegie Mellon University.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
The Art of Peering: The Peering Playbook William B. Norton Co-Founder & Chief Technical Liaison Equinix, Inc. NaMeX Member Meeting October 7, 2005 Rome,
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
Commercial Peering Service Community Attribute Use in Internet2 CPS Caren Litvanyi lead network engineer peering team Internet2 NOC GigaPoP Geeks BOF January.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Policies for Peering and Internet Exchanges AFIX Technical Workshop Session 8.
Peering BOF – Peering Personal NANOG 25 Richmond Hill, CA June 10, 2002.
Peering Concepts and Definitions Terminology and Related Jargon.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
Why SingTel Won’t Peer William B. Norton Co-Founder & Chief Technical Liaison Equinix, Inc. Asia Pacific Peering Forum Singapore, Oct. 5, 2006 Slide Set.
A Business Case for Peering in 2004 (v0.7) William B. Norton Co-Founder & Chief Technical Liaison Equinix, Inc. (V0.7), XChangePoint Europe October 28,
Border Gateway Protocol (BGP) (Bruce Maggs and Nick Feamster)
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
Peering and Interconnection Economics Introduction to Internet Transit and Peering.
CSci5221: BGP Policies1 Inter-Domain Routing: BGP, Routing Policies, etc. BGP Path Selection and Policy Routing Stable Path Problem and Policy Conflicts.
15-849: Hot Topics in Networking Policy and Networks Srinivasan Seshan 1.
A Business Case for Peering
CS 3700 Networks and Distributed Systems
CS 3700 Networks and Distributed Systems
Securing BGP Bruce Maggs.
Border Gateway Protocol
Interdomain Routing (Nick Feamster).
COS 561: Advanced Computer Networks
Interdomain Traffic Engineering with BGP
Inter-Domain Routing: BGP, Routing Policies, etc.
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
The Art of Peering: The Peering Playbook
COS 561: Advanced Computer Networks
A Business Case for Peering in 2004 (v0.7)
COS 461: Computer Networks
Securing BGP Bruce Maggs.
COS 561: Advanced Computer Networks
BGP Instability Jennifer Rexford
Border Gateway Protocol (BGP)
Presentation transcript:

Routing Policy CS 6250 Nick Feamster Fall 2011

BGP Policies in ISP Networks Introduced as fairly simple path vector protocol Many incremental modifications added over time Many policies used by operators; cant enumerate them all –Nevertheless, some patterns emerge 2

How is Policy Implemented? Preference: Which route will be chosen for each destination? –Adding/deleting/modifying route attributes Filtering: Eliminates certain routes from consideration –Can be done on inbound or outbound Tagging: Adding state to a route –Tagging with community attribute 3

4 Filtering and Rankings Ranking: route selection Filtering: route advertisement Customer Competitor Primary Backup

5 Internet Business Relationships(Simplified) Customer/Provider: One AS pays another for reachability to some set of destinations Settlement-free Peering: Bartering. Two ASes exchange routes with one another. Provider Peer Customer Preferences implemented with local preference manipulation Destination Pay to use Get paid to use Free to use

6 Rankings Routes from customers over routes from peers Routes from peers over routes from providers provider peer customer

Traffic Engineering Outbound traffic control: Control the way traffic leaves the network –Via local preference and IGP costs Inbound traffic control: Control the way traffic enters the network –Via AS prepending and MED Remote control: Control the preferences of a remote AS –Through the community attribute 7

8 Policy Interactions Varadhan, Govindan, & Estrin, Persistent Route Oscillations in Interdomain Routing, 1996

9 Strawman: Global Policy Check Require each AS to publish its policies Detect and resolve conflicts Problems: ASes typically unwilling to reveal policies Checking for convergence is NP-complete Failures may still cause oscillations

10 Think Globally, Act Locally Key features of a good solution –Safety: guaranteed convergence –Expressiveness: allow diverse policies for each AS –Autonomy: do not require revelation/coordination –Backwards-compatibility: no changes to BGP Local restrictions on configuration semantics –Ranking –Filtering

11 Can BGP Be Made Stable? Permit only two business arrangements –Customer-provider –Peering Constrain both filtering and ranking based on these arrangements to guarantee safety Surprising result: these arrangements correspond to todays (common) behavior Gao & Rexford, Stable Internet Routing without Global Coordination, IEEE/ACM ToN, 2001

12 Relationship #1: Customer-Provider Filtering –Routes from customer: to everyone –Routes from provider: only to customers providers customer From the customer To other destinations advertisements traffic From other destinations To the customer customer providers

13 Relationship #2: Peering Filtering –Routes from peer: only to customers –No routes from other peers or providers advertisements traffic customer peer

How Do Business Relationships Appear in Policy? Local preference: influence the decision process to prefer customer routes Controlling route export: prevent neighbors from sending traffic to some destinations Defensive programming: prevent neighboring AS from influencing its choice of routes 14

Physical Interconnections Public peering (IXP): Across a layer-2 access technology (typically, port on shared fabric). –Larger number of smaller peers –Trial peering Private peering: Direct interconnection between only two networks. –Previously: Circuit between two facilities –Today: Typically occur at carrier hotels 15

16

The Art of Peering: The Peering Playbook William B. Norton Co-Founder & Chief Technical Liaison Equinix, Inc. NaMeX Member Meeting October 7, 2005 Rome, Italy

Research The Art of Peering Follow up to the first three white papers. Q: When to generates no response, what do Seasoned Peering Coordinators do? Smartest Peering Coordinator: Tricks of the Trade 20 Tactics successfully used to obtain Peering where you otherwise might not be able to. Disclaimer: These are NOT recommended tactics…I am simply documenting what has been successfully used in the field to obtain peering.

P? Graphical Notation of Tactics BA ISP InitiatorISP Target AB ISP A Customers ISP B Customers Larger Circle=More Customer Prefixes Thicker Lines=More Traffic P?=Peering Request w/ Peering Coordinator Peering Negotiation T?=Transit Request To Sales Person Transit Negotiations A PC B PC P? A PC BSBS T? A PC B PC A PC BSBS T? $ $ To Portray Peering Plays Pictorially…

Transit and Peering Sessions AB T AB P T=Established Transit Session (Selling Access to entire Internet) Size indicates effective size of transport Supporting the session P=Established Peering Session (Reciprocal Access to each others customers) Size indicates effective size of transport Supporting the session AB P AB T $ $ Graphical Display of Routing Announcements Represents the rest of the Internet

Traffic over Transit and Peering Sessions AB T AB P Traffic showed as directed lines Thickness of line indicates amount of Traffic in relevant direction AB P AB T $ $ Other Variations P->T = Transition of Relationship P | T = Either Peering or Transit apply = Traffic destined anywhere = Fictitious Traffic = Packet Loss ridden Traffic = Traffic destined to green network = Traffic destined to brown network

Other Graphical Symbols Peering Point Exchange Point, Telco Hotel Tied with Indicates two or more Elements tied with relationship Indicates a ordering: a sequence to be followed in the Peering Tactic or

1) The Direct Approach uses phone calls, face to face meetings, or otherwise direct interactions with Peering Coordinators to establish peering. P? P?=Peering Request To Peering Coordinator(s) Peering Negotiation Leading to Peering Session A PC B PC P? A PC B PC AB P {null} -or- {No,null}

2) The Transit with Peering Migration tactic leverages an internal advocate to buy transit with a contractual migration to peering at a later time. A PC BSBS T? A PC BSBS T? A PC B S+ B PC T->P? AB T->P $ AB P Transit Negotiations with Sales leads to Peering (…if peering prerequisites be met…) $ $ $

3) The End Run Tactic minimizes the need for transit by enticing a direct relationship with the target ISPs largest traffic volume customers. A PC B T?/P? $

4) In Europe the Dual Transit/Peering separates the peering traffic from the transit traffic using separate interface cards and/or routers. AB P T$

A 5) Purchasing Transit *Only* from Large Tier 2 ISPs is an approach to reduce the risk of being a customer of a potential peer on the road to Tier 1 status. AB T XYZ P Tier 1 ISPs (who do not buy Transit) Tier 2 ISPs (who buy Transit) P? $ Since A peering with any Tier 1 wont affect transit revenue with Tier 1s There is no financial consequence to peering. (One less barrier to overcome during peering negotiations.)

6) Paid Peering as a maneuver is positioned by some as a stepping stone to peering for those who dont immediately meet the peering prerequisites. AB P AB P $

Peering Point 7) In the Partial Transit tactic, the routes learned at an exchange point are exchanged with the peer for a price slightly higher than transport costs. $ AB E G D C F H I J K L M Routing Announcements Forwarding all customer & Peering Pt Routes (almost peering – maybe costs less) Geographically Remote Router pt

8) The Chicken tactic involves de-peering in order to make the other peer adjust the relationship. AB P AB P Who will blink first? A B Traffic has to go somewhere YX T T $ $ AB T or $

31 The Business Game and Depeering Cooperative competition (brinksmanship) Much more desirable to have your peers customers –Much nicer to get paid for transit Peering tiffs are relatively common 31 Jul 2005: Level 3 Notifies Cogent of intent to disconnect. 16 Aug 2005: Cogent begins massive sales effort and mentions a 15 Sept. expected depeering date. 31 Aug 2005: Level 3 Notifies Cogent again of intent to disconnect (according to Level 3) 5 Oct :50 UTC: Level 3 disconnects Cogent. Mass hysteria ensues up to, and including policymakers in Washington, D.C. 7 Oct 2005: Level 3 reconnects Cogent During the outage, Level 3 and Cogents singly homed customers could not reach each other. (~ 4% of the Internets prefixes were isolated from each other)

32 Depeering Continued Resolution… …but not before an attempt to steal customers! As of 5:30 am EDT, October 5th, Level(3) terminated peering with Cogent without cause (as permitted under its peering agreement with Cogent) even though both Cogent and Level(3) remained in full compliance with the previously existing interconnection agreement. Cogent has left the peering circuits open in the hope that Level(3) will change its mind and allow traffic to be exchanged between our networks. We are extending a special offering to single homed Level 3 customers. Cogent will offer any Level 3 customer, who is single homed to the Level 3 network on the date of this notice, one year of full Internet transit free of charge at the same bandwidth currently being supplied by Level 3. Cogent will provide this connectivity in over 1,000 locations throughout North America and Europe.

+network+status+cogent&hl=it

What tactic is this?

36

AB L G P T T T $ $ $ A forces traffic Over Bs transit 9) In the Traffic Manipulation tactic, ISPs or content players force traffic along the network path that makes peering appear most cost effective. A PC B PC L G P T T T $ $ $ P? 1 MONTH LATER Contact PC-We should Peer! B hears As route for free through Peer L CH ISP i.e.Yahoo! AB L G P T T T $ $ $

$ $ $ A PC B PC L G P T T T AB L G P T T T AB L G P T T T 9b) For Access Heavy Guys…In the Traffic Manipulation tactic, Access ISP a) stop announcing routes, or b) insert Target AS# into announcement to trigger BGP Loop Suppression to force traffic along the network path that makes peering appear most cost effective. $ $ $ $ $ $ P? 1 MONTH LATER Contact PC-We should Peer! B hears As route for free through Peer L A forces traffic Over Bs transit Access ISP i.e. Verizon

10) The Bluff maneuver is simply overstating future traffic volumes or performance issues to make peering appear more attractive. AB P? ABLG T P T $ $ Fictitious Performance Problems Overstating Traffic FuturesYou better peer with me now cause… Lots of transit fees coming otherwise!

11) The Wide Scale Open Peering Policy as a tactic signals to the Peering Coordinator Community the willingness to peer and therefore increases the likelihood of being contacted for peering by other ISPs. A PC P? From the highest mountain We will Peer with Anyone! To anyone who will listen!

12) The Massive Colo Build tactic seeks to meet the collocation prerequisites of as many ISPs as possible by building POPs into as many exchange points as possible. A IX A A A A A A A A A A A A A A Meet us in 3 Time Zones Pacific TimeZone Eastern TimeZone M C

13) The Aggressive Traffic Buildup tactic increases the traffic volume by large scale market and therefore traffic capture to make peering more attractive. AB P? Cheap Transit for sale $20/Mbps!

14) Friendship-based Peering leverages contacts in the industry to speed along and obtain peering where the process may not be in place for a peering. A PC P? B PC Forums to meet Peering Coordinators GPF NANOG APRICOT RIPE IETF :

15) The Spam Peering Requests tactic is a specific case of the Wide Scale Open Peering tactic using the exchange point contact lists to initiate peering. A PC P? IX Participants List ::::

16) The Honey Approach Easier to lure flies with honey…than with Vinegar Publicly promote the attractiveness of Peering with the candidate. Example: Yahoo! –Policy=Yes, millions of streaming hours Example: Rogers –650K Internet subs, 2.3M cable subs –Largest Cable company in Canada

17) Purchasing Legacy Peering provides an immediate set of peering partners. GAGAU P PAPAB P AGU P PB P A A Purchases G and P A Legacy (early Internet day) Peering

18) The Bait and Switch tactic leverages a large corporate identity to obtain peering even though ultimately only a small subset or unrelated set of routes are actually announced. AB P? AB AB P a New Startup Subsidiary

19) The False Peering Outage tactic involves deceiving an ill- equipped NOC into believing a non-existing peering session is down. A NOC B NOC Peering Point X A NOC : Hey – Emergency! A NOC : Our Peering Session with you Went Down! B NOC : Strange. I dont see it configured. A NOC : It was. Dont make me escalate to B NOC : Ah – I bet is was that last config run that trashed it. B NOC : Give me a few minutes to fix it on both ends.

20) The Leverage Broader Business Arrangement takes advantage of other aspects of the relationship between two companies to obtain peering in exchange for something else. A PC BSBS P? AB P AB Other A PC BSBS P? Peering Tied with Other +Fiber deal +Dial-in deal +Racks +Transport +Strategic deal : Tied with

50 Additional Assumption: Hierarchy Disallowed!

51 Safety: Proof Sketch System state: the current route at each AS Activation sequence: revisit some routers selection based on those of neighboring ASes

52 Activation Sequence: Intuition Activation: emulates a message ordering –Activated router has received and processed all messages corresponding to the system state Fair activation: all routers receive and process outstanding messages

53 Safety: Proof Sketch State: the current route at each AS Activation sequence: revisit some routers selection based on those of neighboring ASes Goal: find an activation sequence that leads to a stable state Safety: satisfied if that activation sequence is contained within any fair activation sequence

54 Proof, Step 1: Customer Routes Activate ASes from customer to provider –AS picks a customer route if one exists –Decision of one AS cannot cause an earlier AS to change its mind An AS picks a customer route when one exists

55 Proof, Step 2: Peer & Provider Routes Activate remaining ASes from provider to customer –Decision of one Step-2 AS cannot cause an earlier Step- 2 AS to change its mind –Decision of Step-2 AS cannot affect a Step-1 AS AS picks a peer or provider route when no customer route is available