Scaling the Inter-Domain Routing System

Size: px
Start display at page:

Download "Scaling the Inter-Domain Routing System"

Transcription

1 Scaling the Inter-Domain Routing System Kaustubh Gadkari Computer Science Department Colorado State University Abstract The Internet inter-domain routing system is facing scalability issues due to the increasing sizes of the routing and forwarding tables. Several approaches have been suggested to scaling the sizes of the routing and forwarding tables. In this report, I undertake a survey of the suggested approaches and suggest a taxonomy for classifying the approaches. I then discuss the approaches in the various classes and also discuss the pros and cons of each class of solutions. 1 Introduction The inter-domain routing system is a critical infrastructural piece of the Internet. Sites connecting to the Internet are represented by a set of routing prefixes (for e.g /16 for Colorado State University). These sites utilize the Border Gateway Protocol (BGP) [1] to exchange reachability information. Each BGP speaking router maintains a routing table and a forwarding table. The routing table contains route information, while the forwarding table contains information required to forward packets on the correct router interface. For the past several years, the size of the routing and forwarding tables has been increasing at an alarming rate. Router memory and CPU processing power needs to increase to handle the increasing table sizes, forcing operators into shorter upgrade cycles for their routers. Several approaches have been suggested to manage and reduce the sizes of the routing and forwarding tables. In this report, I undertake a systematic survey of the various approaches that have been proposed and present a taxonomy of these approaches. The remainder of this report is organized as follows. In section 2, I present a brief introduction to BGP. In section 3, I present the routing scaling problem and present the solution space in section 4. In section 5, I present and compare approaches to scale the 1

2 forwarding table, while in section 6 I present and compare approaches to scale the routing table. I conclude in section 7. 2 The Border Gateway Protocol BGP is the dominant inter-domain routing protocol in use in the Internet today. Every site connected to the the Internet, known as an autonomous system (AS), has border routers that exchange reachability information with other sites via BGP. BGP maintains two tables : the Routing Information Base (RIB) and the Forwarding Information Base (FIB) to store the routing information and forwarding information, respectively. 2.1 The Routing Information Base (RIB) A BGP-speaking router maintains a routing information base (RIB) table for each router that it gets reachability information from. Each router also maintains its local RIB that is calculated from the RIB tables maintained for each peer and additional local information available to the router. 2.2 The Forwarding Information Base (FIB) Routers maintain the forwarding information base (FIB) table to store forwarding information required to forward packets to the next hop. The forwarding information consists of the outgoing router interface, next hop and other attributes. The router needs to perform a FIB lookup each time it needs to forward a packet. Therefore, routers store the FIB on fast memory on the linecards. FIB tables are calculated from the RIB tables. 3 Scaling Problems Facing the Inter-Domain Routing System It is widely recognized that the Inter-domain routing system is facing serious scaling problems [17]. This growth has been fueled by various factors, such as multihoming, traffic engineering, de-aggregation of prefixes etc. The increasing sizes of the global RIB and FIB has been a matter of study for several years. In the remainder of this section, I present previous work that studies the table growth and factors contributing to the table growth. 2

3 3.1 IAB Report on Routing and Addressing According to the report from the Internet Architecture Board s (IAB) Workshop on Routing and Addressing [17], routing scalability is the most important problem facing the Internet today. The routing scalability problem includes the size of the RIB and FIB, the implications of the growth of the RIB and FIB on routing convergence times and the cost, power and processing requirements of core router hardware. The report identifies the following factors as the main driving forces behind the growth of the RIB: Multihoming Traffic engineering Non-aggregatable address allocations Business events such as mergers and acquisitions. All of the above can lead to prefix de-aggregation and the introduction of non-aggregated/deaggregatable prefixes into the RIB. Prefix de-aggregation leads to an uncontrolled RIB growth because it takes away the ability to perform topological aggregation, which is the only known practical approach to controlling the growth of the RIB Implications of RIB Growth The size of the RIB affects the size of the FIB, since routers calculate the FIB from the FIB. Thus, the growing RIB size requires more RIB and FIB memory to be available on the routers. Apart from this, the core of the network is exposed to the dynamic nature of the edge i.e., de-aggregation leads to an increased number of BGP update messages into the core (also called update churn). As a result, additional processing is required to maintain state for the prefixes and calculate the FIB Implications of FIB Growth Conventional wisdom is that the FIB technology will scale at rates that surpass the growth rate of routing information handled by core router hardware. According to the IAB, that is not true for the low-volume, customized hardware used in core routing. As a consequence, the hardware may not scale with the increasing size of the FIB. 3

4 3.2 Factors Contributing to BGP Table Growth In [3], the authors study BGP tables from the RouteViews project [18] to determine the factors behind the growth of the routing table. In particular, the authors study the contribution of the following factors to the growth of the routing table. 1. Multihoming 2. Failure to aggregate 3. Load Balancing 4. Address Fragmentation Multihoming Many Internet sites connect to more than one provider for the purpose of fault tolerance. If a site announces a prefix p that is contained in the prefix announced by the one of the multihomed site s providers, then the site s other providers also need to announce p. To quantify the effect of multihoming on the size of the routing table, the authors count the number of multihomed and non-multihomed prefixes in the routing tables. The results show that the number of multihomed prefixes is on the rise, and that multihoming introduces 20-30% more prefixes into the routing table (figure 1). Figure 1: Contribution of multihoming to routing table size [3] 4

5 3.2.2 Failure to Aggregate To quantify the effect of the ISPs failure to aggregate prefixes, the authors aggregate all prefixes that are originated by the same AS and are announced identically. By comparing the sizes of the tables before and after aggregation, the authors find that approximately 15-20% more prefixes can be aggregated, beyond what the ISPs already aggregate, as shown in figure 2. Figure 2: Contributions to routing table growth [3] Load Balancing Often, ASes will de-aggregate otherwise aggregatable prefixes for the sake of load balacing. To quantify the effect of load balancing on the size of the routing table, the authors compute the number of prefixes resulting from aggregating all prefixes originated by the same AS, independent of whether those prefixes are announced independently or not. By comparing the total number of prefixes after aggregation with the number of prefixes excluding those introduced by the failure to aggregate, the authors quantify the effect of load balancing to the table size. They find that load balancing introduces an additional 20-25% more prefixes, as can be seen in figure Address Fragmentation To quantify the effect of address fragmentation, the authors classify prefixes into prefix clusters, in each of which prefixes are originated by the same AS and are announced identically. Then, by comparing the number of prefix clusters with the number of prefixes excluding 5

6 those contributed by the failure to aggregate and load balancing, the authors find that address fragmentation contributes to more than 75% of the routing table size and is the single largest contributor Growth Rate of Contributors Apart from quantifying the effect of various contributors to the table size growth, the authors also calculated how fast each contributor was growing. The results show that load balancing is the fastest growing contributor. Also, load balancing and multihoming contributions grow faster than the growth of the table itself (figure 3). Figure 3: Growth rate of contributors [3] 3.3 Router Requirements for Increasing RIBs In [12], Huston et.al. study BGP update messages to discover trends in demands for router processing power. Based on the trends in the update messages, the authors also make predictions about the size of the routing table on various dates. The results from the paper follow BGP Update Message Trends The authors observed nearly 146 million messages throughout 2005 at their BGP measurement point. The important results from the study are as follows: 1. The size of the routing table grew from 148,000 entries in the beginning of 2005 to 175,400 entries at the end of 2005, which is a growth of 18%. 6

7 2. The number of BGP update messages nearly doubled through the measurement period, from approximately 260K messages per day at the beginning of 2005 to approximately 550K messages per day at the end of The average number of prefixes in each update message decreased from 2.4 at the beginning of 2005 to 2.3 at the end of This is indicative of fine-grained routing policies in place. 4. Some prefixes generate a disproportionately high number of update messages per day Predictions for Routing Table Growth Based on the study of BGP update messages, the authors were able to predict the size of the BGP routing table for various dates. Figure 4 shows the predicted trend in the routing table size. Figure 4: BGP Table Size Projection [12] The projected table size is 370,000 entries by the end of According to [11], the routing table has approximately 343,000 entries today. Thus, the projected table size is within 10% of the actual table size. As the table sizes are projected to grow, the routers will need increasing amounts of memory to store the tables. Also, since the sheer number of updates is increasing along with the granularity of the updates, routers will need more processing power to handle the updates. 3.4 Summary In this section, I have shown previous work that 7

8 Establishes the routing scaling problem Establishes and describes the factors responsible for the routing scaling problem Looked at the contribution of the factors to the routing table growth In the next section, I will present and compare approaches that seek to solve the routing scaling problem. 4 Solutions To The Routing Scaling Problem The proposed solutions to the routing scaling problem fall into two broad categories, according to the table they scale. FIB scaling solutions RIB scaling solutions The proposed solutions can also be classified as: Configuration-only solutions Architectural solutions There are, therefore, four types of solutions to the routing scaling problem: 1. Configuration-only FIB scaling solutions 2. Architectural FIB scaling solutions 3. Configuration-only RIB scaling solutions 4. Architectural RIB scaling solutions 5 FIB Scaling Solutions Scaling the FIB size is arguably the more immediate problem facing the inter-domain routing system today. Routers store FIBs on fast, expensive line card memory. As the IAB report shows [17], this memory may not scale with the increasing size of the FIB. Since routers need to perform lookups when forwarding packets, the increasing FIB size makes lookups more expensive. Also, it forces ISPs into shorter upgrade cycles, increasing the operational cost. FIB scaling solutions must ensure forwarding correctness i.e., they should ensure packet delivery and not change the path that packets take. Forwarding correctness is of two types, strong and weak. 8

9 Strong Forwarding Correctness: The longest-match lookup for any destination address should be the same before and after the scaling algorithm is applied. Weak Forwarding Correctness: For destination addresses which have a next hop (next hop is non-null), the longest-match lookup should be the same before and after the scaling algorithm is applied. 5.1 Configuration-only FIB Scaling Solutions Configuration-only solutions to FIB scaling collapse the FIB without requiring any changes to the architecture or hardware implementation of the FIB. Instead, they rely on configuration updates to router software to implement the scaling algorithms. All the solutions discussed ([22], [15] and [2]) collapse the FIB by aggregating the FIB entries, either by replacing the actual FIB entries by aggregate entries, or by using virtual prefixes to aggregate real FIB entries FIB Aggregation In [22], Zhao et. al. propose a purely local solution: FIB aggregation, to reduce the FIB size. FIB aggregation eliminates and aggregates entries based on next-hop router information. At the same time, it ensures forwarding correctness. The authors propose four FIB aggregation levels. Level 1 Aggregation: This is the simplest form of aggregation. Prefixes that share the same next hop with their immediate ancestor prefixes are eliminated from the FIB, as shown in figure 5. Figure 5: Level 1 Aggregation Since prefix 10.1/16 shares the same next hop A as it s immediate ancestor prefix 10/8, it can be removed from the FIB. Level 1 aggregation satisfies strong forwarding correctness. Results show that this simple aggregation scheme can reduce the FIB size by 30-50%. 9

10 Level 2 Aggregation: In level 2 aggregation, apart from performing level 1 aggregation, sibling prefixes that share the next hop are combined into a single parent prefix, as illustrated in figure 6. This is possible only if the parent prefix does not already exist in the FIB. Figure 6: Level 2 Aggregation In this scheme, prefixes 10.1/16 and 10.2/16 are collapsed into their parent prefix 10/8, since they have the same next hope A and the prefix 10/8 does not exist in the forwarding table. Level 2 aggregation satisfies strong forwarding correctness. Level 3 Aggregation: In level 3 aggregation, apart from performing level 1 and 2 aggregation, a set of non-sibling prefixes that have the same next hop is combined into a super-prefix, as illustrated in figure 7. Figure 7: Level 3 Aggregation The prefixes /24 and /24 are not siblings, since they do not have the same parent. However, since they share the same next hop A, they can be collapsed into a singe super-prefix (the super-prefix cannot already exist in the FIB). However, this newly inserted super prefix covers some previously non-routable space (denoted by the red nodes in figure 7). Thus, some traffic which would previously have been dropped by the router is now forwarded along the same next hop as the new aggregate prefix. This is not always desirable. Thus, level 3 aggregation satisfies weak forwarding correctness, but not strong forwarding correctness. 10

11 Level 4 Aggregation: Level 4 aggregation aggregation is similar to level 3 aggregation, since it too combines non-sibling prefixes into a single aggregate prefix. However, unlike level 3 aggregation, level 4 aggregation permits other prefixes with different next hops between the non-sibling prefixes to be aggregated. Figure 8 illustrates level 4 aggregation. Figure 8: Level 4 Aggregation In figure 8, prefixes /24 and /24 share the same next hop A and are aggregated into the super-prefix 10/8. However, prefix /24 has a different next hop B, which means it cannot be covered by the super-prefix 10/8 and has to announced separately. Thus, B punches a hole in the aggregate prefix 10/8. Like level 3 aggregation, level 4 aggregation also introduces extra routable space that was previously unrouteable. Results show that level 4 aggregation can shrink the FIB by 60-90%. Level 4 aggregation satisfies weak forwarding correctness, but not strong forwarding correctness Incremental FIB Aggregation The level 1-4 aggregation algorithms described above do not handle routing updates efficiently. After each routing update, the FIB needs to be re-aggregated. Therefore, in [15], Liu et. al. investigate aggregation algorithms that are able to handle updates incrementally. They modify the optimal routing table constructor (ORTC) algorithm described in [6] to handle incremental updates. They design two such modifications, one that minimizes the amount of computation time required to process routing messages and update the FIB at each line card (the minimal time scheme), and another one that maintains the optimum aggregated FIB size (the optimal size scheme). The authors then compare the ORTC-based algorithms to the level 2 aggregation described in [22] and discussed above. To compare the performance of the ORTC-based algorithms with the level 2 aggregation scheme, the authors use the following metrics: Aggregation Ratio: The ratio of the size of the aggregated FIB to the size of the unaggregated FIB. A lower aggregation ratio implies better aggregation. 11

12 Computation Time: The time cost of aggregating the initial FIB and updating the aggregated FIB. As can be seen from figure 9, the optimal size scheme performs better than the level 2 aggregation scheme from [22], reducing the FIB size by 10% more. Like level 2 aggregation, the optimal size scheme satisfies strong forwarding correctness. However, this scheme takes almost three times longer to aggregate the FIB than level 2 aggregation. Figure 9: Aggregation Ratio (ORTC vs. Level-2) [15] As figure 10 shows, the minimal time scheme is consistently faster than level 2 aggregation. Like level 2 aggregation, the minimal time scheme also satisfies strong forwarding correctness. This algorithm is over 7 times faster than the ORTC-based optimal size scheme. However, the FIB is about 13% larger. Compared to the level 2 aggregation scheme which takes 200ms, this scheme takes 75ms Virtual Aggregation (ViAggre) Ballani et. al. argue in [2] that it may be not practical to undertake a major architectural change. Instead, it may be more pragmatic to undertake a series of incremental, individually cost-effective changes. They propose Virtual Aggregation (ViAggre) as a FIB scalability technique. ViAggre design has two major goals. 1. No changes to router software and routing protocols should be required. 2. ViAggre adoption should be transparent to external networks. 12

13 Figure 10: Computation Time (ORTC vs. Level-2) [15] The authors present two designs for ViAggre deployment. Design 1 performs only FIB suppression, while design 2 suppresses the RIB as well as the FIB. I discuss design 2 as a configuration-only RIB scaling solution in next section 6.1. An ISP adopting ViAggre can divide the global address space into a set of virtual prefixes such that the virtual prefixes are larger than any aggregatable (real) prefix being advertised today. For example, an ISP could divide the IPv4 address space into 128 parts, with a /7 virtual prefix representing each part. Since these virtual prefixes are not topologically aggregatable, ViAggre aggregates them by organizing virtual networks, one for each virtual prefix. This virtual topology makes the virtual prefixes aggregatable and shrinks the size of the FIB. To create a virtual network, each ISP designates some routers to be within the virtual network. These routers maintain routes for all prefixes in the virtual prefix corresponding to the virtual network and are said to be aggregation points for the virtual prefix. A router can be an aggregation point for multiple virtual prefixes, and is required to only maintain routes for prefixes in the virtual prefixes it is the aggregation point for. When a router receives a packet destined to a prefix it is aggregating, it performs a FIB lookup to determine the route for the packet. Since a router that is not a aggregation point for the virtual prefix may forward the packet back to the aggregation point, causing a loop, such a packet is tunneled from the aggregation point to the next hop (ViAggre uses MPLS Label Switched Paths (LSPs) as the tunneling mechanism). This procedure is illustrated in figure 11. The packets are destine to prefix 4/24 between routers A and E, through an ISP with ViAggre. Router C is an aggregation point for virtual prefix 4/7. The authors applied ViAggre to the FIBs from several ISPs and compared the unaggregated FIB size to the ViAggre FIB size. The results are shown in figure 12. It is clear that even in the worst case, the FIB size is approximately 14-16% of the original FIB size. 13

14 Figure 11: Path of Packets Destined to 4/24 [2] Figure 12: FIB Sizes for Various ISPs Using ViAggre [2] 5.2 Architectural FIB Scaling Solutions FIB lookups are a time consuming step of packet forwarding, and lookups get more expensive as the FIB size increases. In configuration-only solutions, efficient lookups are a consequence of the reduction in FIB size. Architectural solutions, on the other hand, employ caches to reduce the number of FIB lookups that need to be performed. The often-used FIB entries are stored in a fast, small cache on line cards for efficient retrieval, while the full FIB can be stored on slower, larger memories. Thus, architectural solutions require changes to core router hardware Use of Caching to Improve Gateway Performance Route caching has been suggested as a means for improving router performance for a long time. In [10], Feldmeier investigated the use of caches to improve the performance of gateways. His results show that a fully-associative least recently used (LRU) caching scheme that caches source/destination pairs performs the best. As figure 13 shows, the cache size required for a hit rate of 0.9 is only 7. Other results show that it is possible to reduce table lookup-time by about 65%. 14

15 Figure 13: Hit Rate vs. Cache Size Uni-class Caching Feldmeier [10] showed in 1988 that by employing caches, the performance of routers can be improved significantly. He did not, however, suggest the architecture or implementation of such a route cache. Kim et. al. propose a caching architecture in [14]. In this architecture, a line card incorporates a hierarchical, two level memory. The first level is a route cache, which is implemented as a small, but fast memory that stores only a small subset of forwarding entries. The second level is a slow, but large memory that stores all forwarding entries. Once a packet arrives for a destination, the forwarding unit first looks up the destination address in the cache. If it finds a match, it forwards the packet based on the cache lookup. If not, the forwarding unit forwards the packet along a backup route, while it updates the cache by retrieving the route from the full forwarding table. However, this approach cannot be directly applied to normal, variable length prefixes due to the cache hiding problem described below. Suppose that the full forwarding table consists of two entries, prefix 10.1/16 associated with output interface A and prefix /24 associated with output interface B. If a packet arrives for destination address , the router will perform a longest prefix match for the destination address, which is 10.1/16, and install the forwarding entry 10.1/16 -> A in the cache. Now, if a packet arrives for destination , the router will discover the 10.1/16 -> A entry in the cache and forward the packet along interface A. However, this is 15

16 incorrect since the longest prefix match for is /24 and hence the packet should have been sent to interface B. Solutions to this problem involve either a complicated data structure with on-the-fly computation to eliminate inter-dependency between prefixes, or grouping all prefixes containing a destination address as an atomic unit for cache operations. However, the latter approach may lead to cache thrashing, since the size of an atomic group can be of the order of 25,000 prefixes [14]. The authors, therefore, propose to split all prefixes into their constituent /24 prefixes. The cache stores only these /24 prefixes. This model is known as the uni-class model. In the uni-class model, a prefix is considered to be a collection of 256 independent /24 prefixes. While the full forwarding table only contains an entry for the original prefix, the cache stores only the /24 prefix corresponding to the destination address of the packet being forwarded. To de-aggregate the 305K prefixes advertised in the Internet during the time of writing [14], 9.3 million unique /24 prefixes were required. Of these, roughly one tenth (i.e M) prefixes account for nearly 97% of the traffic. The authors evaluated the performance of uni-class caches implemented using the LRU and LFU caching strategies and compared them to the optimal strategy. The results are shown in figure 14. Figure 14: Miss Rate vs. Cache Size It can be seen that the performance of a LRU cache comes closest to the optimal strategy. Also, the size of the required cache is modest (approximately 500K entries) for a miss rate of 1%, compared to the number of /24 prefixes. 16

17 5.3 Comparison of Configuration-only and Architectural FIB Scaling Solutions Previously, I have discussed configuration-only and architectural solutions to FIB scaling. The goal of both approaches is different : whereas configuration-only approaches seek to control the number of entries in the FIB, architectural solutions seek to make lookups efficient by employing caches. Reduction in lookup time in configuration-only approaches is a consequence of reducing the number of entries. The pros (+) and cons (-) of the configuration-only approaches are as follows: (+) Can be implemented as software updates to routers. No hardware updates are required. (+) Can be implemented by an ISP locally, independent of other ISPs. (+) ISPs can implement these approaches immediately. (+) Results indicate that a significant size reduction (50-70%) can be achieved. (-) Level of aggregation depends on the local forwarding table at the router. Some tables might have entries that cannot be aggregated. (-) May not preserve forwarding correctness. The pros (+) and cons (-) of architectural solutions are as follows: (-) Require changes to router hardware. (+) Can be implemented by an ISP locally, independent of other ISPs. (-) Cannot be implemented immediately, as router hardware needs to be updated. (-) Does not reduce size of the FIB. (+) Make lookups more efficient. (+) Reduce the amount of fast line card memory required, thus increasing time between updates. (+) Preserve forwarding correctness. 17

18 6 RIB Scaling Solutions Although FIB scaling is the immediate matter of concern for ISPs, the FIB size ultimately depends on the size of RIB. Since routers calculate the FIB from the RIB and any local knowledge that they have, reducing the number of RIB entries will reduce the number of FIB entries as well. Hence, scaling the RIB is the long-term solution to the routing scaling problem. Like FIB scaling solutions, RIB scaling solutions can also be either configuration-only or architectural. Since configuration-only solutions make incremental changes to the existing architecture, they are also known as dirty-slate designs. On the other hand, architectural solutions seek to change the fundamental architecture of the routing system. These solutions are therefore called clean-slate designs. 6.1 Configuration-only RIB Scaling Solutions ViAggre [2], introduced in section as a configuration-only FIB scaling solution also provides a design to scale the RIB (called design 2). In this design, the task of storing the full RIB is offloaded to devices that are not on the data path. Since many ISPs already employ per-point of presence (PoP) route reflectors for scalable internal route distribution, ViAggre leverages these route reflectors to store the full RIB. The external routers associated with a PoP are made to peer with the PoP s route reflector. The route reflector also peers with other route reflectors and routers in the PoP. By using egress filters on the route reflector s peerings with the PoP s routers, the ISP can ensure that each router only gets routes to prefixes it is aggregating. This shrinks the RIB and FIB on the routers. The packet forwarding mechanism remains the same as previously described in Both ViAggre designs introduce additional stretch for the aggregated prefixes, due to the use of aggregation points i.e. packets in ViAggre can take longer paths than the native paths. Apart from the longer paths, the packets can also incur queuing delays at the extra hops. The extra hops also result in an increase in the load on the ISPs routers and links and a change in the distribution of traffic across them. To overcome this problem, ViAggre leverages the fact that a large majority of the Internet traffic is destined to a very small fraction of the prefixes [7, 9, 20, 19]. For the design described in 5.1.3, each router s FIB is pre-configured with the set of popular prefixes that should not be suppressed. In design 2, the PoP s route reflectors are configured to not filter advertisements for popular prefixes from the PoP s routers. As described in section 5.1.3, the design goals of ViAggre are: 1. No changes to router software and routing protocols should be required. 18

19 2. ViAggre adoption should be transparent to external networks. Design 2 requires reconfiguration of the PoP s external BGP peerings. violates the design goal of not impacting other ISPs. It, therefore, 6.2 Architectural RIB Scaling Solutions As observed in [17], using a single address field for identifying a device and for determing the topological location of the device in the network are conflicting goals. Efficient routing requires topological assignment of addresses, while effective management of devices without renumbering in response to topological changes (such as those caused by mobility events, adding/removing network attachment points), the address must be independent of the topology. The locator/id separation protocol (LISP) [8] replaces the address field (usually an IP address) with two new types of numbers. Routing Locators (RLOCs) are topologically assigned to network attachment points and are therefore easy to aggregate. The RLOCs are used to forward packets through the network. Endpoint Identifiers (EIDs) are used to number devices inside administrative boundaries. EIDs are not routable. Figure 15: LISP Architecture [4] Since EIDs are non-routable, LISP defines a mapping function between the RLOC space and EID space. LISP also defines a function for encapsulating traffic originated by devices 19

20 using non-routable EIDs across a network infrastructure that routes and forwards traffic using RLOCs. Although EIDs and RLOCs are syntactically similar to IP addresses, the usage semantics are different. LISP is representative of a class of RIB scaling solutions called map-n-encap solutions [5]. Other map-n-encap solutions include [16] and [21]. Figure 15 shows a network infrastructure running LISP. Suppose the source S with EID wants to send a packet to the destination D with EID The packet arrives at the ingress tunnel router S2, which does not have the EID-to-RLOC mapping for S2 therefore encapsulates the packet in a LISP header, with the destination as its RLOC ( ). The RLOC forwards the packet using the normal BGP path to the egress tunnel router D2, which decapsulates the packet and forwards it to D. This data packet acts as a mapping request. In response, D2 sends the mapping information to S2, which is cached at S2. When the next packet arrives for D (or any destination within the same EID block), S2 will directly tunnel the packet to D2. The external routers (ITRs and ETRs) need to store only the paths to the RLOCs. Since the number of RLOCs is limited, and RLOCs are easily aggregatable, the size of the routing tables required is reduced significantly Cost of Caching EID-to-RLOC Mappings Since routers cache EID-to-RLOC mappings, it is worth studying the overhead introduced by this cache. In [13], Iannone et. al. emulate a LISP cache to study the cost of caching the EID-to-RLOC mappings. The important results from the study are as follows. 1. The size of the cache can be controlled by using a small timeout value for stale entries. This introduces a non-negligible amount of traffic overhead to perform the mapping lookups; the smaller the cache, the higher the number of lookups and the bandwidth required for the lookups. 2. This bandwidth requirement is similar to existing DNS lookup bandwidth, which implies that the LISP mapping mechanism can scale. 3. The overhead introduced by tunneling packets to and from the ITRs and ETRs is negligible. 6.3 Comparison of Configuration-only and Architectural RIB Scaling Solutions Both configuration-only as well as architectural solutions seek to reduce the number of RIB entries. However, the mechanisms used to achieve this are vastly different. Configurationonly approaches reduce the number of entries in the RIB by making the routers maintain 20

21 routes to only a few virtual prefixes, whereas architectural approaches reduce the number of entries in the RIB by separating the edge of the network from the core. Since the core network routers need to only store routes to other core network routers, the number of routes they need to maintain is small. The pros (+) and cons (-) of the configuration-only approach are follows. (+) Make only incremental changes to the existing routing architecture. (+) Can be independently and incrementally deployed by ISPs. (-) ISPs may need to reconfigure peering sessions with other ISPs. (+) Do not restrict an ISPs routing policies and route selection. (+) Control plane processing at routers is reduced. (-) May introduce stretch into the data path for packets. (-) Additional management overhead regarding virtual prefixes to deploy and aggregation points for each virtual prefix. (-) May influence important aspects of an ISP s day-to-day operation, such as maintenance and debugging. The pros (+) and cons (-) of the architectural approach is as follows. (-) Requires fundamental changes to the exiting routing and addressing infrastructure. (+) Can be independently and incrementally deployed by ISPs. (+) The network core is isolated from edge dynamics. (+) The cost of renumbering devices (if required) is reduced. (+) Provides better support for mobility than the current infrastructure. (-) Separation of the edge from the core requires an additional mapping step. (-) Encapsulation and tunneling packets introduces overhead. 21

22 7 Conclusion The inter-domain routing system of the Internet faces scalability problems due to the increasing sizes of the routing and forwarding tables. Several approaches have been proposed to scale the routing and forwarding tables. As size of the forwarding table is the pressing concern, more work has focused on scaling the forwarding table and making table lookups more efficient. However, although scaling the forwarding table is important in the short term, the size of the forwarding table ultimately depends on the size of the routing table. Hence, scaling the size of the routing table is the long-term solution to the routing-scaling problem. Some approaches scale the tables using small, incremental changes to the routing and forwarding architecture, whereas other other approaches scale the tables by fundamentally changing the routing and forwarding architecture. However, none of the scaling approaches discussed in this survey have been widely adopted. 8 Acknowledgements I would like to thank Mikhail Strizhov, Vamsi Kambhampati and Steve DiBenedetto for their editorial help in writing this report and the oral presentation. References [1] A border gateway protocol 4 (bgp-4). [2] H. Ballani, P. Francis, T. Cao, and J. Wang. Making routers last longer with viaggre. In NSDI 09: Proceedings of the 6th USENIX symposium on Networked systems design and implementation, pages , Berkeley, CA, USA, USENIX Association. [3] T. Bu, L. Gao, and D. Towsley. On characterizing bgp routing table growth. Comput. Netw., 45(1):45 54, [4] Cisco. Lisp data path. ipj/ipj_11-1/111_lisp_fig3_lg.jpg. [5] S. Deering. The map and encap scheme for scalable ipv4 routing with portable site prefixes. [6] R. Draves, C. King, S. Venkatachary, and B. Zill. Constructing optimal ip routing tables. In INFOCOM 99. Eighteenth Annual Joint Conference of the IEEE Computer 22

23 and Communications Societies. Proceedings. IEEE, volume 1, pages vol.1, mar [7] W. Fang and L. Peterson. Inter-as traffic patterns and their implications. In Proc. IEEE GLOBECOM, [8] D. Farinacci, V. Fuller, D. Meyer, and D. Lewis. Locator/ID Separation Protocol (LISP). draft-ietf-lisp-08.txt, [9] A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True. Deriving traffic demands for operational ip networks: methodology and experience. SIGCOMM Comput. Commun. Rev., 30(4): , [10] D. Feldmeier. Improving gateway performance with a routing-table cache. pages , mar [11] G. Huston. Bgp analysis reports. [12] G. Huston and G. Armitage. Projecting future ipv4 router requirements from trends in dynamic bgp behaviour. In Australian Telecommunication Networks and Applications Conference (ATNAC), [13] L. Iannone and O. Bonaventure. On the cost of caching locator/id mappings. In CoNEXT 07: Proceedings of the 2007 ACM CoNEXT conference, pages 1 12, New York, NY, USA, ACM. [14] C. Kim, M. Caesar, A. Gerber, and J. Rexford. Revisiting route caching: The world should be flat. In PAM 09: Proceedings of the 10th International Conference on Passive and Active Network Measurement, pages 3 12, Berlin, Heidelberg, Springer- Verlag. [15] Y. Liu, X. Zhao, K. Nam, L. Wang, and B. Zhang. Incremental forwarding table aggregation. In GlobeCom 2010, Dec [16] D. Massey, L. Wang, B. Zhang, and L. Zhang. Proposal for scalable internet routing and addressing. draft-wang-ietf-efit-00.txt, [17] D. Meyer, L. Zhang, and K. Fall. Report from the IAB Workshop on Routing and Addressing, [18] U. of Oregon. The routeviews project. Advanced Network Topology Center and University of Oregon. 23

24 [19] J. Rexford, J. Wang, Z. Xiao, and Y. Zhang. Bgp routing stability of popular destinations. In Proc. Internet Measurement Workshop, [20] N. Taft, S. Bhattacharyya, J. Jetcheva, and C. Diot. Understanding traffic dynamics at a backbone pop. Scalability and Traffic Control in IP Networks, 4526(1): , [21] X. Zhang, P. Francis, J. Wang, and K. Yoshida. Scaling ip routing with the core routerintegrated overlay. In ICNP 06: Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols, pages , Washington, DC, USA, IEEE Computer Society. [22] X. Zhao, Y. Liu, L. Wang, and B. Zhang. On the aggregatability of router forwarding tables. In INFOCOM, 2010 Proceedings IEEE, pages 1 9, Mar

Public Review for Efficient FIB Caching using Minimal Non-overlapping Prefixes. Yaoqing Liu, Syed Obaid Amin, and Lan Wang

Public Review for Efficient FIB Caching using Minimal Non-overlapping Prefixes. Yaoqing Liu, Syed Obaid Amin, and Lan Wang a c m Public Review for Efficient FIB Caching using Minimal Non-overlapping Prefixes Yaoqing Liu, Syed Obaid Amin, and Lan Wang The sizes of the Routing Information Base (RIB) and the associated Internet

More information

On characterizing BGP routing table growth

On characterizing BGP routing table growth University of Massachusetts Amherst From the SelectedWorks of Lixin Gao 00 On characterizing BGP routing table growth T Bu LX Gao D Towsley Available at: https://works.bepress.com/lixin_gao/66/ On Characterizing

More information

LISP: What and Why. RIPE Berlin May, Vince Fuller (for Dino, Dave, Darrel, et al)

LISP: What and Why. RIPE Berlin May, Vince Fuller (for Dino, Dave, Darrel, et al) LISP: What and Why RIPE Berlin May, 2008 Vince Fuller (for Dino, Dave, Darrel, et al) http://www.vaf.net/prezos/lisp-ripe-long.pdf Agenda What is the problem? What is LISP? Why Locator/ID Separation? Data

More information

Locator ID Separation Protocol (LISP) Overview

Locator ID Separation Protocol (LISP) Overview Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use of two namespaces instead of a single IP address: Endpoint identifiers (EIDs) assigned to end hosts.

More information

Evaluating the Benefits of the Locator/Identifier Separation

Evaluating the Benefits of the Locator/Identifier Separation Evaluating the Benefits of the Locator/Identifier Separation Bruno Quoitin IP Networking Lab Computer Science and Engineering Dept. Université catholique de Louvain, Belgium (bruno.quoitin@uclouvain.be)

More information

A FRESH LOOK AT SCALABLE FORWARDING THROUGH ROUTER FIB CACHING. Kaustubh Gadkari, Dan Massey and Christos Papadopoulos

A FRESH LOOK AT SCALABLE FORWARDING THROUGH ROUTER FIB CACHING. Kaustubh Gadkari, Dan Massey and Christos Papadopoulos A FRESH LOOK AT SCALABLE FORWARDING THROUGH ROUTER FIB CACHING Kaustubh Gadkari, Dan Massey and Christos Papadopoulos Problem: RIB/FIB Growth Global RIB directly affects FIB size FIB growth is a big concern:

More information

LISP: Intro and Update

LISP: Intro and Update LISP: Intro and Update RIPE Berlin May, 2008 Vince Fuller (for Dino, Dave, Darrel, et al) http://www.vaf.net/prezos/lisp-ripe-short.pdf Agenda What is LISP? What problem is LISP solving? www.vaf.net/prezos/rrg-prague.pdf

More information

APT: A Practical Transit-Mapping Service Overview and Comparisons

APT: A Practical Transit-Mapping Service Overview and Comparisons APT: A Practical Transit-Mapping Service Overview and Comparisons draft-jen-apt Dan Jen, Michael Meisel, Dan Massey, Lan Wang, Beichuan Zhang, and Lixia Zhang The Big Picture APT is similar to LISP at

More information

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell) A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

Scalable Support of Interdomain Routes in a Single AS

Scalable Support of Interdomain Routes in a Single AS Scalable Support of Interdomain Routes in a Single AS Cristel Pelsser*, Akeo Masuda and Kohei Shiomoto NTT Network Service Systems Laboratories, NTT Corporation, Japan Abstract The Internet has grown extremely

More information

A Configuration-only Approach to FIB Reduction. Paul Francis Hitesh Ballani, Tuan Cao Cornell

A Configuration-only Approach to FIB Reduction. Paul Francis Hitesh Ballani, Tuan Cao Cornell A Configuration-only Approach to FIB Reduction Paul Francis Hitesh Ballani, Tuan Cao Cornell Virtual Aggregation An approach to shrinking FIBs (and RIBs) In interface-card FIB, maybe control-card RIB Works

More information

Future Routing and Addressing Models

Future Routing and Addressing Models Future Routing and Addressing Models Rob Evans JANET(UK) The JNT Association 2008 Networkshop 36 1 If it ain't broke... BGP is the inter-domain protocol of choice. Not that there's much choice. Carries

More information

Improvements to LISP Mobile Node

Improvements to LISP Mobile Node Improvements to LISP Mobile Node Michael Menth, Dominik Klein, and Matthias Hartmann University of Würzburg, Institute of Computer Science, Germany Abstract The Locator/Identifier Separation Protocol (LISP)

More information

APT Incremental Deployment

APT Incremental Deployment APT Incremental Deployment Dan Jen, Michael Meisel, Daniel Massey, Lan Wang, Beichuan Zhang, Lixia Zhang http://www.cs.ucla.edu/~meisel/draft-apt-incremental-00.txt 1 Why This Talk Incrememtal deployability

More information

On Routing Table Growth

On Routing Table Growth 1 On Routing Table Growth Tian Bu 1, Lixin Gao, and Don Towsley 1 1 Department of Computer Science University of Massachusetts Amherst ftbu,towsleyg@cs.umass.edu Department of Electrical and Computer Engineering

More information

Improving Internet Routing Scalability with AS Landmarks

Improving Internet Routing Scalability with AS Landmarks Improving Internet Routing Scalability with AS Landmarks Yangyang Wang, Jun Bi Institute for Network Sciences and Cyberspace, Tsinghua University Department of Computer Science, Tsinghua University Tsinghua

More information

Validation of a LISP Simulator

Validation of a LISP Simulator Validation of a LISP Simulator Albert Cabellos-Aparicio, Jordi Domingo-Pascual Technical University of Catalonia Barcelona, Spain Damien Saucez, Olivier Bonaventure Université catholique de Louvain Louvain-La-Neuve,

More information

Making Routers Last Longer with ViAggre

Making Routers Last Longer with ViAggre Making Routers Last Longer with ViAggre Hitesh Ballani Cornell University Paul Francis Cornell University Tuan Cao Cornell University Jia Wang AT&T Labs Research Abstract This paper presents ViAggre (Virtual

More information

Locator/ID Separation Protocol (LISP)

Locator/ID Separation Protocol (LISP) Locator/ID Separation Protocol (LISP) Damien Saucez* INRIA Sophia Antipolis FRNOG 18, December 2 th, 2011 * special thanks to Olivier Bonaventure, Luigi Iannone and Dino Farinacci Disclaimer Not a vendor

More information

A New Addressing and Forwarding Architecture for the Internet

A New Addressing and Forwarding Architecture for the Internet A New Addressing and Forwarding Architecture for the Internet by Cong Guo A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics

More information

Cisco IOS LISP Application Note Series: Access Control Lists

Cisco IOS LISP Application Note Series: Access Control Lists Cisco IOS LISP Application Note Series: Access Control Lists Version 1.1 (28 April 2011) Background The LISP Application Note Series provides targeted information that focuses on the integration and configuration

More information

Distributed Route Aggregation (DRAGON)

Distributed Route Aggregation (DRAGON) Distributed Route Aggregation on the GlObal Network (DRAGON) João Luís Sobrinho 1 Laurent Vanbever 2, Franck Le 3, Jennifer Rexford 4 ACM CoNEXT 2014, Sydney 1 Instituto de Telecomunicações, 1 IST Universidade

More information

Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995

Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995 Network Working Group Y. Rekhter Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995 Status of this Memo Routing in a Multi-provider Internet This memo

More information

E : Internet Routing

E : Internet Routing E6998-02: Internet Routing Lecture 16 Border Gateway Protocol, Part V John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures

More information

A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility

A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility Mukankunga Bisamaza Angel and Choong Seon Hong Departement of Computer Engineering Kyung Hee University 1 Seocheon,

More information

LISP Locator/ID Separation Protocol

LISP Locator/ID Separation Protocol LISP Locator/ID Separation Protocol Hernán Contreras G. Consulting Systems Engineer hcontrer@cisco.com LISP Next Gen Routing Architecture Locator-ID Separation Protocol (LISP) Elevator Pitch LISP is a

More information

Internet Engineering Task Force (IETF) Request for Comments: Cisco Systems January 2013

Internet Engineering Task Force (IETF) Request for Comments: Cisco Systems January 2013 Internet Engineering Task Force (IETF) Request for Comments: 6831 Category: Experimental ISSN: 2070-1721 D. Farinacci D. Meyer J. Zwiebel S. Venaas Cisco Systems January 2013 The Locator/ID Separation

More information

Reducing FIB Size with Virtual Aggregation (VA)

Reducing FIB Size with Virtual Aggregation (VA) Reducing FIB Size with Virtual Aggregation (VA) Paul Francis, MPI-SWS Xiaohu Xu, Huawei, Hitesh Ballani, Cornell Dan Jen, UCLA Robert Raszuk, Cisco Lixia Zhang, UCLA ISPs often want to extend the life

More information

Making Routers Last Longer with ViAggre

Making Routers Last Longer with ViAggre Making Routers Last Longer with ViAggre Hitesh Ballani, Paul Francis, Tuan Cao and Jia Wang Cornell University AT&T Labs Research Abstract This paper presents ViAggre (Virtual Aggregation), a configuration-only

More information

On the Dynamics of Locators in LISP

On the Dynamics of Locators in LISP On the Dynamics of Locators in LISP Damien Saucez 1 and Benoit Donnet 2 1 INRIA, Sophia Antipolis, France 2 Université deliège, Liège, Belgium Abstract. In the Internet, IP addresses play the dual role

More information

Prototype Design for Scalable Support of Interdomain Routes in a Single AS

Prototype Design for Scalable Support of Interdomain Routes in a Single AS Prototype Design for Scalable Support of Interdomain Routes in a Single AS Akeo Masuda NTT Network Service Systems Laboratories NTT Corporation, Japan Cristel Pelsser Internet Initiative Japan* Kohei Shiomoto

More information

Future Internet Technologies

Future Internet Technologies Future Internet Technologies Future Internet Research Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer New requirements on TCP/IP Growth

More information

An Approach to a Fault Tolerance LISP Architecture 1

An Approach to a Fault Tolerance LISP Architecture 1 An Approach to a Fault Tolerance LISP Architecture 1 A.Martínez, W.Ramírez, M.Germán, R.Serral, E.Marín M.Yannuzzi, X.Masip-Bruin Advanced Network Architectures Lab (CRAAX), Universitat Politècnica de

More information

Internet Research Task Force (IRTF) Category: Informational May 2011 ISSN:

Internet Research Task Force (IRTF) Category: Informational May 2011 ISSN: Internet Research Task Force (IRTF) T. Li, Ed. Request for Comments: 6227 Cisco Systems, Inc. Category: Informational May 2011 ISSN: 2070-1721 Abstract Design Goals for Scalable Internet Routing It is

More information

Routing Basics ISP/IXP Workshops

Routing Basics ISP/IXP Workshops Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting

More information

Internet Engineering Task Force (IETF) Request for Comments: D. Lewis Cisco Systems January 2013

Internet Engineering Task Force (IETF) Request for Comments: D. Lewis Cisco Systems January 2013 Internet Engineering Task Force (IETF) Request for Comments: 6836 Category: Experimental ISSN: 2070-1721 V. Fuller D. Farinacci D. Meyer D. Lewis Cisco Systems January 2013 Locator/ID Separation Protocol

More information

Identifier and Locator separation in IP network

Identifier and Locator separation in IP network Identifier and Locator separation in IP network July 10, 2007 Taewan You (twyou@etri.re.kr) ETRI, PEC Contents IP Addresses in Internet Architecture Overloaded semantic Issues of ID/Loc separation Standardization

More information

Routing Basics. ISP Workshops. Last updated 10 th December 2015

Routing Basics. ISP Workshops. Last updated 10 th December 2015 Routing Basics ISP Workshops Last updated 10 th December 2015 1 Routing Concepts p IPv4 & IPv6 p Routing p Forwarding p Some definitions p Policy options p Routing Protocols 2 IPv4 p Internet still uses

More information

LISP: A Level of Indirection for Routing

LISP: A Level of Indirection for Routing LISP: A Level of Indirection for Routing ESCC/Internet2 Joint Techs Workshop University of Hawaii January 20-24, 2008 David Meyer & A Cast of 1000s (Vince Fuller, Darrel Lewis, Eliot Lear, Scott Brim,

More information

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0

More information

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Shim6: Network Operator Concerns Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Not Currently Supporting IPv6? Many parties are going forward with IPv6 Japan

More information

MPLS VPN--Inter-AS Option AB

MPLS VPN--Inter-AS Option AB The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) service provider

More information

Multihoming: An Overview & a brief introduction to GSE(8+8) Single Home

Multihoming: An Overview & a brief introduction to GSE(8+8) Single Home Multihoming: An Overview & a brief introduction to GSE(8+8) Lixia Zhang APRICOT 2006 Perth, Australia 3/2/06 IAB BOF @ APRICOT 1 Customer network 1 1.1.16.0/20 Single Home 1.1.0.0/16. Customer network

More information

Routing Lookup Algorithm for IPv6 using Hash Tables

Routing Lookup Algorithm for IPv6 using Hash Tables Routing Lookup Algorithm for IPv6 using Hash Tables Peter Korppoey, John Smith, Department of Electronics Engineering, New Mexico State University-Main Campus Abstract: After analyzing of existing routing

More information

Routing Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing

Routing Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing Routing Concepts IPv4 Routing Routing Basics ISP/IXP Workshops Forwarding Some definitions Policy options Routing Protocols 1 2 IPv4 IPv4 address format Internet uses IPv4 addresses are 32 bits long range

More information

INTRODUCTION 2 DOCUMENT USE PREREQUISITES 2

INTRODUCTION 2 DOCUMENT USE PREREQUISITES 2 Table of Contents INTRODUCTION 2 DOCUMENT USE PREREQUISITES 2 LISP MOBILITY MODES OF OPERATION/CONSUMPTION SCENARIOS 3 LISP SINGLE HOP SCENARIO 3 LISP MULTI- HOP SCENARIO 3 LISP IGP ASSIT MODE 4 LISP INTEGRATION

More information

Enhanced Mobility Control in Mobile LISP Networks

Enhanced Mobility Control in Mobile LISP Networks Enhanced Mobility Control in Mobile LISP Networks Moneeb Gohar School of Computer Science and Engineering Kyungpook National University Daegu, South Korea moneebgohar@gmail.com Ji In Kim School of Computer

More information

MPLS VPN Inter-AS Option AB

MPLS VPN Inter-AS Option AB First Published: December 17, 2007 Last Updated: September 21, 2011 The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol

More information

ICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016)

ICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) ICN IDENTIFIER / LOCATOR Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) 1 A brief review of ID/Locators in IETF It s long, and we ll skim over it Then we discuss the CCNx & NDN

More information

ID/LOC Separation Network Architecture for Mobility Support in Future Internet

ID/LOC Separation Network Architecture for Mobility Support in Future Internet ID/LOC Separation Network Architecture for Mobility Support in Future Internet Nakjung Choi, Taewan You, Jungsoo Park, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering, Seoul

More information

Routing Basics. Campus Network Design & Operations Workshop

Routing Basics. Campus Network Design & Operations Workshop Routing Basics Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Deploying LISP Host Mobility with an Extended Subnet

Deploying LISP Host Mobility with an Extended Subnet CHAPTER 4 Deploying LISP Host Mobility with an Extended Subnet Figure 4-1 shows the Enterprise datacenter deployment topology where the 10.17.1.0/24 subnet in VLAN 1301 is extended between the West and

More information

IP Routing: LISP Configuration Guide, Cisco IOS Release 15M&T

IP Routing: LISP Configuration Guide, Cisco IOS Release 15M&T First Published: 2012-07-27 Last Modified: 2013-03-29 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

An Identifier / Locator Split Architecture for Multi-homing and Mobility Support

An Identifier / Locator Split Architecture for Multi-homing and Mobility Support IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 13 An Identifier / Locator Split Architecture for Multi-homing and Mobility Support Joonsuk KANG and Koji OKAMURA,

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology internet technologies and standards Piotr Gajowniczek BGP (Border Gateway Protocol) structure of the Internet Tier 1 ISP Tier 1 ISP Google

More information

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering Hema T. Kaur, Shivkumar Kalyanaraman ECSE Department, Rensselaer Polytechnic Institute, Troy, NY-12180 {hema,shivkuma}@networks.ecse.rpi.edu

More information

IPv6 Switching: Provider Edge Router over MPLS

IPv6 Switching: Provider Edge Router over MPLS Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4

More information

LISP Router IPv6 Configuration Commands

LISP Router IPv6 Configuration Commands ipv6 alt-vrf, page 2 ipv6 etr, page 4 ipv6 etr accept-map-request-mapping, page 6 ipv6 etr map-cache-ttl, page 8 ipv6 etr map-server, page 10 ipv6 itr, page 13 ipv6 itr map-resolver, page 15 ipv6 map-cache-limit,

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information

Introduction to Segment Routing

Introduction to Segment Routing Segment Routing (SR) is a flexible, scalable way of doing source routing. Overview of Segment Routing, page 1 How Segment Routing Works, page 2 Examples for Segment Routing, page 3 Benefits of Segment

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 05 MULTIPROTOCOL LABEL SWITCHING (MPLS) AND LABEL DISTRIBUTION PROTOCOL (LDP) 1 by Xantaro IP Routing In IP networks, each router makes an independent

More information

Routing Basics. ISP Workshops

Routing Basics. ISP Workshops Routing Basics ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 26

More information

LISP (Locator/Identifier Separation Protocol)

LISP (Locator/Identifier Separation Protocol) LISP (Locator/Identifier Separation Protocol) Damien Saucez* June 28 th, 2010 http://inl.info.ucl.ac.be *Thanks to Olivier Bonaventure and Pierre François Department of Computing Science and Engineering

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Internet Engineering Task Force (IETF) Category: Experimental ISSN: D. Meyer D. Lewis. Cisco Systems. January 2013

Internet Engineering Task Force (IETF) Category: Experimental ISSN: D. Meyer D. Lewis. Cisco Systems. January 2013 Internet Engineering Task Force (IETF) Request for Comments: 6830 Category: Experimental ISSN: 2070-1721 D. Farinacci Cisco Systems V. Fuller D. Meyer D. Lewis Cisco Systems January 2013 The Locator/ID

More information

Multiprotocol Label Switching (MPLS) on Cisco Routers

Multiprotocol Label Switching (MPLS) on Cisco Routers Multiprotocol Label Switching (MPLS) on Cisco Routers This document describes commands for configuring and monitoring Multiprotocol Label Switching (MPLS) functionality on Cisco routers and switches. This

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

Back to basics J. Addressing is the key! Application (HTTP, DNS, FTP) Application (HTTP, DNS, FTP) Transport. Transport (TCP/UDP) Internet (IPv4/IPv6)

Back to basics J. Addressing is the key! Application (HTTP, DNS, FTP) Application (HTTP, DNS, FTP) Transport. Transport (TCP/UDP) Internet (IPv4/IPv6) Routing Basics Back to basics J Application Presentation Application (HTTP, DNS, FTP) Data Application (HTTP, DNS, FTP) Session Transport Transport (TCP/UDP) E2E connectivity (app-to-app) Port numbers

More information

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 R1. Let s review some of the terminology used in this textbook. Recall that

More information

A Scalable Routing System Design for the Future Internet

A Scalable Routing System Design for the Future Internet A Scalable Routing System Design for the Future Internet Dan Massey (Colorado State University) Lan Wang (University of Memphis) Beichuan Zhang (University of Arizona) Lixia Zhang (UCLA) 1 Where We Are

More information

Introduction to IP Routing. Geoff Huston

Introduction to IP Routing. Geoff Huston Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet

More information

Vers un renforcement de l architecture Internet : le protocole LISP ( Locator/ID Separation Protocol )

Vers un renforcement de l architecture Internet : le protocole LISP ( Locator/ID Separation Protocol ) Vers un renforcement de l architecture Internet : le protocole LISP ( Locator/ID Separation Protocol ) JCSA 2013" " " Luigi Iannone! 1 Institut Mines-Télécom Road Map" - Why LISP???! - LISP Data Plane!

More information

IP Mobility Design Considerations

IP Mobility Design Considerations CHAPTER 4 The Cisco Locator/ID Separation Protocol Technology in extended subnet mode with OTV L2 extension on the Cloud Services Router (CSR1000V) will be utilized in this DRaaS 2.0 System. This provides

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Routing Basics ISP/IXP Workshops

Routing Basics ISP/IXP Workshops Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

IPv6 Switching: Provider Edge Router over MPLS

IPv6 Switching: Provider Edge Router over MPLS Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4

More information

TTL Propagate Disable and Site-ID Qualification

TTL Propagate Disable and Site-ID Qualification The TTL Propagate Disable feature supports disabling of the TTL (Time-To-Live) propagation for implementing the traceroute tool in a LISP network when RLOC and EID belong to different address-family. The

More information

Internet Routing Basics

Internet Routing Basics Internet Routing Basics Back to basics J Application Presentation Application (HTTP, DNS, FTP) Data Application (HTTP, DNS, FTP) Session Transport Transport (TCP/UDP) E2E connectivity (app-to-app) Port

More information

Implications of Global IPv4/v6 Routing Table Growth

Implications of Global IPv4/v6 Routing Table Growth Implications of Global IPv4/v6 Routing Table Growth 10/01/2007 2006 Verizon. All Rights Reserved. PT10906. 01/09/06 Jason Schiller schiller@uu.net Sven Maduschke sven.maduschke@verizonbusiness.com IP Core

More information

Interdomain Traffic Engineering in a Locator/Identifier Separation Context

Interdomain Traffic Engineering in a Locator/Identifier Separation Context 1 Interdomain Traffic Engineering in a Locator/Identifier Separation Context Damien Saucez, Benoit Donnet, Luigi Iannone, Olivier Bonaventure Université catholique de Louvain, Belgium Abstract The Routing

More information

BGP Issues. Geoff Huston

BGP Issues. Geoff Huston BGP Issues Geoff Huston Why measure BGP?! BGP describes the structure of the Internet, and an analysis of the BGP routing table can provide information to help answer the following questions:! What is

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including

More information

On the Cost of Supporting Mobility and Multihoming

On the Cost of Supporting Mobility and Multihoming On the Cost of Supporting Mobility and Multihoming VATCHE ISHAKIAN IBRAHIM MATTA JOSEPH AKINWUMI COMPUTER SCIENCE DEPARTMENT, BOSTON UNIVERSITY {visahak, matta, akin}@cs.bu.edu Abstract As the Internet

More information

A Dirty-Slate Approach to Routing Scalability

A Dirty-Slate Approach to Routing Scalability 1 A Dirty-Slate Approach to Routing Scalability Hitesh Ballani, Paul Francis, Jia Wang and Tuan Cao Cornell University and ATT-Research Abstract This paper presents Virtual Aggregation, an architecture

More information

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING James J. Rooney 1 José G. Delgado-Frias 2 Douglas H. Summerville 1 1 Dept. of Electrical and Computer Engineering. 2 School of Electrical Engr. and Computer

More information

Interdomain Routing Reading: Sections K&R EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277)

Interdomain Routing Reading: Sections K&R EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277) Interdomain Routing Reading: Sections K&R 4.6.3 EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277) Guest Lecture by Brighten Godfrey Instructor: Vern Paxson TAs: Lisa Fowler, Daniel

More information

Dynamic Routing Tables Using Simple Balanced. Search Trees

Dynamic Routing Tables Using Simple Balanced. Search Trees Dynamic Routing Tables Using Simple Balanced Search Trees Y.-K. Chang and Y.-C. Lin Department of Computer Science and Information Engineering National Cheng Kung University Tainan, Taiwan R.O.C. ykchang@mail.ncku.edu.tw

More information

! Distance vector routing! Link state routing.! Path vector routing! BGP: Border Gateway Protocol! Route aggregation

! Distance vector routing! Link state routing.! Path vector routing! BGP: Border Gateway Protocol! Route aggregation ! Distance vector routing! Link state routing Information Network I Youki Kadobayashi! IGP and EGP Intra-domain routing protocol, inter-domain routing protocol! Path vector routing! BGP: Border Gateway

More information

EULER Project Path-Vector Routing Stability Analysis

EULER Project Path-Vector Routing Stability Analysis EULER Project Path-Vector Routing Stability Analysis Florin Coras, Albert Lopez, Albert Cabellos UPC Dimitri Papadimitriou Alcatel-Lucent Introduction BGP Inter-domain routing protocol used in the Internet

More information

Routing Basics. SANOG July, 2017 Gurgaon, INDIA

Routing Basics. SANOG July, 2017 Gurgaon, INDIA Routing Basics SANOG 30 14-18 July, 2017 Gurgaon, INDIA Back to basics J Application Presentation Application (HTTP, DNS, FTP) Data Application (HTTP, DNS, FTP) Session Transport Transport (TCP/UDP) E2E

More information

Cisco IOS LISP Application Note Series: Lab Testing Guide

Cisco IOS LISP Application Note Series: Lab Testing Guide Cisco IOS LISP Application Note Series: Lab Testing Guide Version 3.0 (28 April 2011) Background The LISP Application Note Series provides targeted information that focuses on the integration configuration

More information

Interdomain Routing Design for MobilityFirst

Interdomain Routing Design for MobilityFirst Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network

More information

The NAROS Approach for IPv6 Multihoming with Traffic Engineering

The NAROS Approach for IPv6 Multihoming with Traffic Engineering The NAROS Approach for IPv6 Multihoming with Traffic Engineering Cédric de Launois,OlivierBonaventure,andMarcLobelle Université catholiquedelouvain Department of Computing Science and Engineering http://www.info.ucl.ac.be

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Stability and Consistency of the LISP Pull Routing Architecture

Stability and Consistency of the LISP Pull Routing Architecture Stability and Consistency of the LISP Pull Routing Architecture Yue Li, Damien Saucez, Luigi Iannone, Benoit Donnet Telecom ParisTech France Université Côte d Azur, Inria France Université de Liège, Montefiore

More information

Network Working Group Request for Comments: 2519 Category: Informational Juniper February A Framework for Inter-Domain Route Aggregation

Network Working Group Request for Comments: 2519 Category: Informational Juniper February A Framework for Inter-Domain Route Aggregation Network Working Group Request for Comments: 2519 Category: Informational E. Chen Cisco J. Stewart Juniper February 1999 Status of this Memo A Framework for Inter-Domain Route Aggregation This memo provides

More information

BGP Routing Stability of Popular Destinations

BGP Routing Stability of Popular Destinations BGP Routing Stability of Popular Destinations Jennifer Rexford, Jia Wang, Zhen Xiao, and Yin Zhang AT&T Labs Research; Florham Park, NJ Abstract The Border Gateway Protocol (BGP) plays a crucial role in

More information