1 Theophilus Benson*, Aditya Akella*, Aman Shaikh + *University of Wisconsin, Madison + ATT Labs Research.

Slides:



Advertisements
Similar presentations
APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
Advertisements

Chapter 1: Introduction to Scaling Networks
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Deployment of MPLS VPN in Large ISP Networks
Classical Ethernet Services, Evolution to VPLS (an L2VPN), VPLS Operation Vishal Sharma, Ph.D. Metanoia, Inc. Web:
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 Module Summary The VRF table is a virtual routing and forwarding instance separating sites.
© 2010 Cisco and/or its affiliates. All rights reserved. 1 Segment Routing Clarence Filsfils – Distinguished Engineer Christian Martin –
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring VRF Tables.
CREATING CERTAINTY Intelligent router tool, designed to create certainty in your network. 1COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
Understanding and Mitigating the Complexity in Network Configuration and Management Aditya Akella UW-Madison Joint work with Theo Benson (UW-Madison) and.
L3vpn end-system draft Pedro Marques. Overview Defines a mechanism to associate an end- system virtual interface to an L3VPN. – Co-located forwarder:
Making Routers Last Longer with ViAggre Hitesh Ballani, Paul Francis, Tuan Cao and Jia Wang Cornell University and AT&T Labs- Research Presented by Gregory.
Traffic Engineering With Traditional IP Routing Protocols
MIRED: Managing IP Routing is Extremely Difficult Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
Dynamics of Hot-Potato Routing in IP Networks Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
Network Configuration Management Nick Feamster CS 6250: Computer Networking Fall 2011 (Some slides on configuration complexity from Prof. Aditya Akella)
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Class 3: SDN Stack Theophilus Benson. Outline Background – Routing in ISP – Cloud Computing SDN application stack revisited Evolution of SDN – The end.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5#-1 MPLS VPN Implementation Configuring OSPF as the Routing Protocol Between PE and CE Routers.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—7-1 Integrating Internet Access with MPLS VPNs Implementing Internet Access as a Separate VPN.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—6-1 Complex MPLS VPNs Introducing Managed CE Router Service.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring Small-Scale Routing Protocols Between PE and CE Routers.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
MPLS VPN Security assessment
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Using MPLS VPN Mechanisms of Cisco IOS Platforms.
Theophilus Benson Aditya Akella David A Maltz
Leading Edge Climbing Equipment
27 th of SeptemberAgnes PouelePage 1 MPLS Next Generation Networking September 2000 TF-TANT MPLS TESTING.
UCSC 1 Aman ShaikhWIRED Panel on Intra-domain Routing Panel on Intra-domain Routing WIRED 2003 Workshop on Internet Routing Evolution and Design Aman Shaikh.
Software Defined-Networking. Network Policies Access control: reachability – Alice can not send packets to Bob Application classification – Place video.
Industrial Issues in Software Performance
Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,
MPLS: Power and Complexity Oscar Cetina Network Engineer at Foxtel MTIM, B.E. Telecommunications CCNA – CCIP - CCNP.
Enterprise Architecture and Infrastructure Progress Report for Committee on Technology and Architecture March 2012 Mark Day Dept. of Radiology & Biomedical.
© Synergon Informatika Rt., 1999 Chapter 12 Connecting Enterprises to an Internet Service Provider.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—6-1 Complex MPLS VPNs Introducing Overlapping VPNs.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
BGP L3VPN Virtual CE draft-fang-l3vpn-virtual-ce-01 Luyuan Fang Cisco John Evans Cisco David Ward Cisco Rex Fernando Cisco John Mullooly Cisco Ning So.
UCSC 1 Aman ShaikhWIRED Position Statement Position Statement WIRED 2003 Workshop on Internet Routing Evolution and Design Aman Shaikh University of California,
Routing and Routing Protocols
MPLS VPNs by Richard Bannister. The Topology The next two slides display both the physical and logical topology of our simple example network –Please.
D. Stiliadis F. Balus W. Henderickx N. Bitar M. Pisica Software Driven Networks: Use Cases and Framework draft-stiliadis-sdnp-framework-use-cases-01.txt.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1 MPLS Lab Physical Connection Diagram.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1 MPLS Lab Physical Connection Diagram.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
OSPF Link Overload draft-hegde-ospf-link-overload Shraddha Hegde Hannes Gredler Pushpasis Sarkar.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Inter-domain SLA Exchange
Instructor Materials Chapter 1: LAN Design
Introduction An introduction to the software and organization of the Internet Lab.
Using MPLS/VPN for Policy Routing
Introduction An introduction to the software and organization of the Internet Lab.
An introduction to the organization of the Internet Lab
An introduction to the organization of the Internet Lab
Configuring Network Devices
Extending MPLS/BGP VPNs to End-Systems
Netscope: Traffic Engineering for IP Networks
MPLS VPNs by Richard Bannister.
Kireeti Kompella Juniper Networks
Planning a Network Upgrade
An introduction to the organization of the Internet Lab
Label Switched VPNs – Scalability and Performance Analysis
Scrumium NetBrain Thursday, May 09, 2019.
Experiences with Implementing MPLS/VPN Services
Presentation transcript:

1 Theophilus Benson*, Aditya Akella*, Aman Shaikh + *University of Wisconsin, Madison + ATT Labs Research

Adoption of Network-based Services 2 ISP Core

Adoption of Network-based Services 3  “By 2015, annual global IP traffic will reach 966 exabytes” [Cisco’11]  Customers adopting new applications  ISPs upgrade and purchase new equipment  Best effort ineffective for some applications

Adoption of Network-based Services 4 Services are a crucial part of the Internet’s ecosystem ISP Core  Host-based and network-based services  “AT&T to spend $1 billion to ramp up enterprise services”  Recover cost and improve application performance

Goals  Vision:  Improve service integration/upgrades  Simplify service management  Understand impediments  Service configuration files  Complexity of configuration 5 Edge ISP Core

Configuration is a crucial component  Configuration determines  Customer functionality  ISP interactions  Configuration is complex  Most time consuming task [Feamster ‘05 ]  Most error-prone  > 50% customer problems due to configuration errors [Yankee Group ‘04] 6 OSPF BGP

Configuring a Service 7 PE CE PECE a c z ISP Core Control Plane Data plane a c z a c z

Contributions  Analyzed 2.5 years of configurations  Show how complexity evolves over time  Worsens over time  Highlight the location of complexity  Complexity exists at the edge  Identify the cause of complexity  Due to provisioning of new customers 8 PE ISP Core CE Edge Customers Edge Customers

Contributions  Identified potential ways to mitigate complexity  Showed the impact of design choices on complexity 9 Vendor Complexity #1 #2 Routing Design Complexity #1 #2 #3

Outline  Motivation  Background  Models and Data-Set  Understanding Complexity  Mitigating Complexity  Conclusion 10

Configuring the Provider’s Edge  Complexity is due to:  Dependent commands 11 PE CE PECE ISP Core Ip vrf blue Rd 23234: Route-target import 1000:1 Route-target export 1000:1 ! Interface ethernet1 Ip address /30 Ip vrf forwarding blue Services-policy output policy1 ! Policy-map policy1 Policy confirm-action transmit VRF Interface Policy- map a

Configuring the Control-Plane Core 12 PE CE PECE Router bgp Neighbor Neighbor ! Ip vrf blue Rd 23234: Route-target import 1000:1 Route-target export 1000:1 ! Router bgp Neighbor ISP Core a c z a c z a c z  Complexity is due to:  Dependent commands  Maintaining consistency

Configuring the Data-Plane Core 13 PE CE PECE a c z a c z Interface gigethernet1 Ip address /30 ! Router ospf 2 Network /24 ! Ip vrf blue Rd 23234: Route-target import 1000:1 Route-target export 1000:1 ! Interface gigethernet1 Ip address /30 ! ISP Core a  Complexity is due to:  Dependent commands  Maintaining consistency a c z

Models and Data-Set 14

Requirements for Data Models  Quantify complexity of configuration  Capture dependencies between commands  Capture consistency across devices  Use complexity metrics [Benson ‘09]  Motivated by software engineering techniques  Abstract away low level details  Abstract groups of commands  stanzas 15 Ip vrf blue Rd 23234: ! Interface ethernet1 Ip address Ip vrf forwarding blue Services-policy input policy2 !

Data Models  Referential Graph [Benson ‘09]  Syntactic dependencies operators must track  Network  graph of dependent stanzas  Metric: size of graph  Larger graph  more dependencies  Templates [Benson ‘09]  Clone detection used to capture uniformity 16 VRF Interface Policy- map

Data-Set Service% of Routers ( PE + Core) VPN48% VPLS27% VoIP5% DDoS Prev.31% Virtual Wire25% 17 Diversity allows for a comprehensive study  Collected data from tier-1 ISP for 2.5 years  5 services: VPN, VPLS, VoIP, DDoS Prev., Virtual Wire  Daily snapshots of router configuration files  Metadata (per router): vendor, role and location

Understanding Complexity  Provider Edge (PE) Complexity  Control-Plane Core Complexity  Data-Plane Core Complexity 18 PE ISP Core CE

Understanding Complexity  Provider Edge (PE) Complexity  Control-Plane Core Complexity  Data-Plane Core Complexity 19 PE ISP Core CE

PE Complexity over Time  Growth is due to worsening complexity  New devices have less dependencies 20 Over time, configuration tasks become tricky

Understanding PE Complexity  Which stanza contributes to VPLS growth? 21 Edge ISP Core VRF Interface Policy- map VRF

Understanding PE Complexity  Which stanza contributes to VPN growth? 22 Complexity caused by customer provisioning Edge ISP Core VRF Interface Policy- map

Configuration Reuse over Time 23 Specialization leads to added complexity Reuse and specialization exists Configuration overlap reduces over time –Reduction due to specialized usage of service 71% 62% 88%

Understanding Complexity  Data-Plane Core: service-agnostic and simple  Control-Plane Core: distinct across services  Growing number of adjacencies with PEs  PE is the most complex 24 PE ISP Core CE

Mitigating Complexity  Vendor Selection 25 Cost Functionality Complexity Time Complexity Time Complexity

How to Compare Vendors  Different vendors  different languages  Language impacts complexity  Difference in structure of functionality  Comparing vendor languages  Configurations representing same policy  Same customer  same policy on all PEs 26 PE CE PECE ISP Core Vendor1 Vendor2

Vendor Selection  Graph for vendor1 is consistently larger  Vendor1 requires more stanzas for same policies  Operators need to track more dependencies 27 Choice of vendor can reduce PE complexity

Conclusion  Studied the factors that impede services  Complexity grows over time  Modifications become time consuming  Most complexity lies in configuring customers  Varying requirements and specialized configuration  Framework to systematically consider complexity  Choice of vendor can reduce complexity 28

Thank You  Theophilus Benson  "Complex systems are built out of a myriad of simple components" 29