6.898 Advanced Topics in Service Provider Networking. Final Paper. Durga Prasad Pandey May 14, Instructor: Dr Bruce Davie

Size: px
Start display at page:

Download "6.898 Advanced Topics in Service Provider Networking. Final Paper. Durga Prasad Pandey May 14, Instructor: Dr Bruce Davie"

Transcription

1 6.898 Advanced Topics in Service Provider Networking Final Paper Durga Prasad Pandey May 14, 2007 Instructor: Dr Bruce Davie

2 Paper 1: Defending Against BGP Prefix Hijacking 1. Summary BGP Prefix Hijacking is a serious problem when a router, either intentionally or unwittingly, originates a route to an IP prefix not owned by it. Malicious BGP routers could do this for reasons such as using the stolen identities to launch spam and DDoS attacks without getting identified, or disrupting the reachability of the hosts legitimately numbered with those set of IP addresses. There is at least one instance (reference [9] in paper) of a network operator s BGP router originating routes to prefixes it didn t own without having intended to, apparently because of some fault in the router. Irrespective of the cause of prefix hijack, it is a serious problem and needs immediate redressal. Mao et al (reference [18] in paper) have made a good start in this area by developing practical techniques to detecting prefix hijacking attacks in real time. This paper is a logical next step to Mao s work and nicely complements it. It proposes an approach to mitigating the effect of prefix hijacking using two novel techniques: Route purging/promotion based mitigation, and NoSub-based subprefix hijack prevention. Route purging derives its power by purging bogus routes from Lifesaver ASes on detecting a prefix hijack, which are a predetermined set of Tier-1 ISPs so they have a high degree of connectivity and are closer to most other ASes. This is followed by the selection of a promoter AS from the lifesaver ASes that promotes a legitimate route to the victim. The promoter AS makes the new route more attractive by essentially shortening it, using an AS set for route aggregation. This is the direct opposite of appending one s AS to a route several times, which is a common practice among ASes to make a route low priority. The selection of the promotion AS is done after a hijack is detected, and can be based on different strategies such as the nearest distance to the attacker AS, or the farthest from the victim AS or random, or the random selection from a tier-2 lifesaver, if any The second technique deals with subprefix hijacking, where attackers hijack subprefixes, which is a deadlier attack because of the practice of choosing BGP routes using longest prefix matching. The authors present a technique that involves tagging prefix route announcements as NoSub, if there are no legitimate route announcements for subprefixes of those prefixes. So when a route announcement is received from an AS for such an illegitimate subprefix, the hijack is detected, and the AS purges the bogus route and lowers the priority of prefix announcements from that neighbor which might have been used to propagate the attack.

3 This paper sheds light on how DDoS attackers might hijack prefixes to launch attacks while concealing their identity, as was discussed in class using Barford et al s work on Botnets, and Mao et al s work on analyzing large DDoS attacks. 2. Strengths: What struck me as neat about the paper are the following: - The combined strategy for hijack mitigation using route purging + promotion. Route purging by itself significantly reduces pollution, but promotion boosts up the effect by offering an attractive alternative to the polluted route. The analysis of various ways of selecting promoters also fascinated me, and it was insightful to see the results of the tradeoff between maximizing connectivity for purge and resilience for promotion. - The approach is simple and has no reliance on strong cryptography, unlike some other work in this area, thus avoiding the problem of computational overhead. - The comparison between the pure and profit driven models is striking, though it was a little disappointing to see that the profit driven model is actually less resilient. The real world is profit driven however, and hence its inclusion and analysis is appropriate. The paper also presents results on what strategy works best in each model. - The idea of NoSub tagging is a clever one, and the insight that covering-prefix hijacks won t sabotage NoSub tagging because valid routes are always present before the bogus covering-prefix is announced, is important. 3. Weaknesses The results of this paper are promising. However one is left wondering how much grounded it is in reality given that no accurate AS topology model of the Internet has been made so far. The authors have clearly anticipated this limitation, but the issue remains to be addressed. It would be interesting if the authors actually found a way to test this system in a real life setting that would make the results far more credible. Perhaps testing it on a network testbed such as PlanetLab(with 40 ASes) would be one way? 4. Your evaluation of the novelty of the paper - a score from 1 (low) to 5 (high) with a few sentences of explanation Score: 5

4 The combination of purge and promotion, and the idea of NoSub tagging introduced in this paper are novel and substantial. As seen from the simulations, they promise to potentially tackle prefix hijacking in a powerful way, using simple ideas. 5. Detailed critique and suggestions The paper is recommended for acceptance. It presents new ideas in dealing with prefix hijacks, and a detailed theoretical analysis with supporting simulations and explanation. In the introduction, the paper mentions that with 20 participating ASes, the number of polluted ASes reduces to 15%. However it fails to mention that the reduction happens from an initial pollution value of about 55%. Section IV doesn t describe the implications of the comparison between predicted and observed value of Length Match and Exact Match. The comparison between pure and profit driven makes sense, but its not clear if the numbers themselves lend any insight to this work. In section V.F.3, there is a confusing use of the word resilience. Initially resilience was used to refer to tier-2 ASes with highest number of providers. However in this section, the highest degree ASes are called the most resilient ASes. Finally, the comparison with customer route filtering adds credibility to the paper. Route purge turns out to be superior to route filtering, and the authors correctly intuit the reason for this: route filtering is helpless against bogus routes originated from the customer cone. Also, it doesn t perform filtering on routes originated from its peer or provider. 6. A numerical evaluation of the paper's overall contribution and relevance to the service provider networking area - again 1 is low, 5 is high. Score: 5

5 Paper 2: Consistent BGP: A Domain Divided Against Itself Cannot Stand 1. Summary The issue of improving BGP convergence time has been an unsolved problem for long, with marginal improvements. While intra-as routing protocols are moving close to sub second convergence, BGP s convergence times are still outrageously high(up to 2 minutes). This paper proposes an approach that promises to substantially cut down the convergence time by making information about various external routes consistently available in a network. To accomplish this, this paper proposes adding an extra bit called the Potentially offer Primary or POP bit to BGP route withdrawals, which indicates that an alternative route is present at the sender. Any withdrawal with the POP bit set, is called a POP withdrawal. The paper also introduces three mechanisms to ensure that C-BGP works in different situations: - When sending ibgp withdrawals, the POP bit is set if the sender still knows a valid external path - If the routers primary path is through an internal peer, and it has an available external path, then all packets received over the internal tunnels are forwarded along the best external path - Routers send a POP withdrawal to all peers when using an internal path and an external path becomes available. Routers move to POP withdrawal paths from non-pop withdrawal paths if available. The first mechanism ensures that disconnectivity does not happen when a new route comes up. When a new route is announced, the current path is withdrawn and this creates a race condition. If a router on the network receives the route withdrawal before the new route announcement, disconnectivity occurs. C-BGP ensures that routers keeps forwarding their packets to the POP withdrawn router since it still knows a path, until the other routers get the route announcement for the new path. The second mechanism ensures that loops do not form between border routers that are connected to the same provider at different places, when the provider announces a new, potentially longer route that some other customer has advertised. In such a situation, routers might start forwarding data back and forth between each other. C-BGP prevents this by forwarding data received from a primary internal path to its best external path.

6 The third mechanism ensures that information about external path availability is broadcast using POP withdrawal to all routers in the AS. Thus if an existing link comes down, routers immediately switch to the external path that was advertised using the POP withdrawal. This results in consistency across the AS: routers are being informed of external routes as soon as one is discovered using POP withdrawals. So data is not lost because of ignorance about existing external routes. 2. Strengths This paper has various strengths: - A key result of this paper is the sharp reduction in BGP convergence time. While there have been various attempts to reduce convergence time, this paper has achieved in maximizing the reduction of convergence time very substantially. Only running intra-domain C-BGP across all ASes with no coordination across the ASes reduces the convergence time by 85%. Coordination across domains brings it down to 0%. This is a remarkable result. - The inference that intradomain inconsistency is still the major contributor to BGP convergence delay, compared to interdomain consistency is a keen insight. - The modification that this paper seeks to route announcements just one bi, is simple yet powerful. - The technique presented in the paper is incrementally deployable, with immediate benefits. - The comparison with R-BGP is appropriate and interesting. It is encouraging to see that running C-BGP within an ASes performs better than running R-BGP across domains. 3. Weaknesses One weakness of the paper is that the success of C-BGP depends on routers being POP aware. This implies that C-BGP would not be able to work on legacy routers. Also, the paper falls short of its promise of using just one bit when trying to avoid interdomain loops; it introduces an additional custpop bit to indicate whether they know an alternative external customer path. 4. Your evaluation of the novelty of the paper - a score from 1 (low) to 5 (high) with a few sentences of explanation Score: 4 The idea of just adding one bit that achieves such benefit is definitely elegant. By adding this extra bit and following the three key mechanisms,

7 this C-BGP achieves in providing consistency across an AS about various available external paths. This is an impressive accomplishment. 5. Detailed critique and suggestions This paper is recommended for acceptance. This paper complements R-BGP in a solid way. R-BGP assumes that the AS is a consistent system, like a single router. C-BGP makes this assumption true by ensuring consistency across the AS using its three mechanisms. The combination of these two approaches would potentially reduce transient disconnectivity in ASes substantially. Given the weakness of a lot of BGP modifications that rely on global acceptance to be effective, C-BGP provides strong benefits even when its deployed only partially, thus providing incentives for ASes to deploy it. If no customer path were available, then wouldn t custpop allow routing through non-customer paths, leading potentially to loop formation? This paper also addresses path visibility faults, that Feamster et al discuss in their rcc paper (discussed in class). rcc is a useful tool to detect such faults using static analysis, but C-BGP tries to ensure that paths are visible in real time without the need for an external configuration checker. 6. A numerical evaluation of the paper's overall contribution and relevance to the service provider networking area - again 1 is low, 5 is high. Score: 5

8 Paper 3: Diagnosing Spatio-Temporal Internet Congestion Properties 1. Summary Active network measurements are usually classified into end-to-end and router-response based approaches. End-to-end approaches send single, pair or multiple packets and measure end to end parameters, while router-response approaches probe intermediate routers and measure link level properties. An example of active measurement is the work by Mao et al on BGP beacons(discussed in class) used in the analysis of convergence delays, route flap damping and update inter-arrival times. This paper presents an integrated approach, combining both these approaches to infer spatio-temporal properties of congestion. In doing so, the authors introduce a number of important concepts and approaches. The paper proposes using multiple probing methods using 4, 3 or 2 packets per node based on the shared congested path segments. The priority of choosing the probing technique is based on the tightness of delay bound, with the 4-packet probe giving the best bound. Probes are scheduled sequentially to various nodes on a link (and repeated every time period I, where I ε [0.5,1] seconds) to increase the accuracy of both spatial and temporal measurements. A switch point approach is used for identifying link segments, which are congestion candidates. The paper introduces a Quality of Measurability(QoM) that uses an exponentially weighted moving average of delay values to continuously monitor which is the best probing mechanism, and hops to that probing technique if its condition is met well. The paper defines measurable pairs as pairs of intermediate nodes for which there are specific relationships between the queuing delays. When this is not the case, measurable points are used instead. Congestion is inferred based on congestion probability on a link, which depends on how the delay range on the link is, compared to a threshold that s self adaptive for different kinds of links. A congestion intensity, CI(x, T) is defined for a path segment x, and time period T to indicate how often the segment is congested over an interval T. The paper defines congestion spikes, which is a duration during which the delay on a link is continuously above a threshold. A congestion spike starts when the congestion intensity exceeds 0.2.

9 Links are divided into core and edge links based on their location. Using 0% for source and 100% for destination, links between 20 to 80 % are considered core links while the rest are considered edge links. 2. Strengths - The paper introduces several important concepts that are outlined in the previous section such as probing methods, intelligent congestion point location with high precision, adaptive tuning of measurement parameters, measure of congestion intensity and path-level congestion analysis. - This work was carried out on a PlanetLab testbed, which though not quite representative of the Internet, is much more credible that simulations. - The paper is well written and observations are well explained - The paper is the first I know of that takes spatial and temporal measurements, using a novel combination of end-to-end and route-response based approaches and proposing and utilizing various innovative techniques. - The paper identifies sources of measurement errors such as route alterations, clock skew/jumps and ICMP queuing, and explains how they are handled. 3. Weaknesses I wasn t totally sure if the rationale for dividing links into core(20% to 80% based on location) and edge links(remaining links) was justified. The authors simply assert that they did this based on their observations but provide no details or justification. Since a number of inferences are then comparisons between core and edge links, it would have been proper to justify the classification and show how it represents reality. Also the rationale for choosing 0.02 as the congestion intensity over which a congestion spike occurs is not provided. The self consistency methodology and results look convincing, but one is left wondering if it d have been better to present results about more than the top 8 links shared by most paths. True, it validates the point that these links were detected to be congested by all the path probes, but perhaps these were overly congested? How good was the technique in detecting less congested links then, which were perhaps traversed by fewer paths? 4. Your evaluation of the novelty of the paper - a score from 1 (low) to 5 (high) with a few sentences of explanation

10 Score: 5 Overall this paper does a great job of combining existing approaches and introducing novel techniques and detailed engineering analysis to understanding congestion in the Internet. Some of the threshold values seem to be chosen without proper explanation, but that doesn t reduce the value of the fundamentally new ideas presented in this work. An impressive element is the high resolution in detecting the location, frequency and duration of congestion, and an adaptive measurement mechanism that self monitors and hops between different probing methods. The results are well analyzed and presented. 5. Detailed critique and suggestions This paper is recommended for acceptance. The inferences on delay bounds for various segments made in various subsections in section 2.1 are not obvious to me; it would make it easier to understand the paper if the steps in this inference are shown perhaps in an appendix. All the figures in this paper are clear except figure 6 that shows the components of Pong. The paper makes a passing reference to this diagram but do not explain it. The diagram also has certain terms whose meaning is not immediately obvious. It is not clear how Pong does the sender-to-receiver pairings and automatically handles conflicts. In section 4.2, paragraph 2, the meaning of the line about congestion samples residing exclusively on physical links is not obvious. While discussing results in section 4.4, the reversal of congestion trends between inter and intra AS inside the core, compared to outside is not explained. The word novel is used a bit too often. Perhaps it might be better to use it sparingly. Reference number [30] is incorrectly spelled. Consistency should be replaced by constancy. 6. A numerical evaluation of the paper's overall contribution and relevance to the service provider networking area - again 1 is low, 5 is high. Score: 4

Routing Support for Wide Area Network Mobility. Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan

Routing Support for Wide Area Network Mobility. Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan Routing Support for Wide Area Network Mobility Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan 1 Outline Introduction Inter-AS Mobility Support Intra-AS Mobility

More information

Homework Assignment #3b Due 11/22 at 3:50pm EE122 Fall 2010

Homework Assignment #3b Due 11/22 at 3:50pm EE122 Fall 2010 Homework Assignment #3b Due 11/22 at 3:50pm EE122 Fall 2010 Please submit your solutions using BSpace (https://bspace.berkeley.edu/). Log in to BSpace with your CalNet ID, click on the EL ENG 122 Fa10

More information

Taming BGP. An incremental approach to improving the dynamic properties of BGP. Geoff Huston. CAIA Seminar 18 August

Taming BGP. An incremental approach to improving the dynamic properties of BGP. Geoff Huston. CAIA Seminar 18 August Taming BGP An incremental approach to improving the dynamic properties of BGP Geoff Huston BGP is The inter-domain routing protocol for the Internet An instance of a Distance Vector Protocol with explicit

More information

Preventing the unnecessary propagation of BGP withdraws

Preventing the unnecessary propagation of BGP withdraws Preventing the unnecessary propagation of BGP withdraws V. Van den Schrieck, P. François, C. Pelsser, O.Bonaventure http://inl.info.ucl.ac.be Networking 2009, May 13th Agenda Introduction Presentation

More information

Interdomain Routing Design for MobilityFirst

Interdomain Routing Design for MobilityFirst Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network

More information

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Overview Business relationships between ASes Interdomain routing using BGP Advertisements Routing policy Integration with intradomain routing

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 12: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 15 BGP Spring 2018 Rachit Agarwal Autonomous System (AS) or Domain Region of a network under a single administrative entity Border Routers Interior

More information

Multihoming Complex Cases & Caveats

Multihoming Complex Cases & Caveats Multihoming Complex Cases & Caveats ISP Workshops Last updated 6 October 2011 Complex Cases & Caveats p Complex Cases n Multiple Transits n Multi-exit backbone n Disconnected Backbone n IDC Multihoming

More information

Active BGP Probing. Lorenzo Colitti. Roma Tre University RIPE NCC

Active BGP Probing. Lorenzo Colitti. Roma Tre University RIPE NCC Active BGP Probing Lorenzo Colitti Roma Tre University RIPE NCC Lorenzo Colitti. RIPE 50, 5 May 2005. colitti@dia.uniroma3.it lorenzo@ripe.net 1 Agenda Our techniques Primitives Applications Results Operational

More information

COM-208: Computer Networks - Homework 6

COM-208: Computer Networks - Homework 6 COM-208: Computer Networks - Homework 6. (P22) Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Jian Wu (University of Michigan) Z. Morley Mao (University of Michigan) Jennifer Rexford (Princeton University)

More information

COMP/ELEC 429 Introduction to Computer Networks

COMP/ELEC 429 Introduction to Computer Networks COMP/ELEC 429 Introduction to Computer Networks Lecture 11: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at

More information

Lecture outline. Internet Routing Security Issues. Previous lecture: Effect of MinRouteAdver Timer. Recap of previous lecture

Lecture outline. Internet Routing Security Issues. Previous lecture: Effect of MinRouteAdver Timer. Recap of previous lecture Lecture outline Internet Routing Security Issues Z. Morley Mao Lecture 3 Jan 14, 2003 Recap of last lecture, any questions? Existing routing security mechanisms - SBGP General threats to routing protocols

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011 Lecture 4: Intradomain Routing CS 598: Advanced Internetworking Matthew Caesar February 1, 011 1 Robert. How can routers find paths? Robert s local DNS server 10.1.8.7 A 10.1.0.0/16 10.1.0.1 Routing Table

More information

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

CS 43: Computer Networks. 24: Internet Routing November 19, 2018 CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Inter-Domain Routing Internet is a network of networks Hierarchy

More information

Routing on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP

Routing on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP Routing on the Internet Computer Networks Lecture 17: Inter-domain Routing and BGP In the beginning there was the ARPANET: route using GGP (Gateway-to-Gateway Protocol), a distance vector routing protocol

More information

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell) A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers

More information

Outline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure

Outline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure Outline 15-441 15-441 Computer Networking 15-641 Lecture 10: Inter-Domain outing Border Gateway Protocol -BGP Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 outing hierarchy Internet structure

More information

Routing(2) Inter-domain Routing

Routing(2) Inter-domain Routing Routing(2) Inter-domain Routing Information Network I Youki Kadobayashi 1 Outline! Distance vector routing! Link state routing! IGP and EGP Intra-domain routing protocol, inter-domain routing protocol!

More information

Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing

Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing Ying Zhang University of Michigan wingying@umich.edu Z. Morley Mao University of Michigan zmao@umich.edu Jia Wang AT&T Labs Research jiawang@research.att.com

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.15 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

TELE 301 Network Management

TELE 301 Network Management TELE 301 Network Management Lecture 24: Exterior Routing and BGP Haibo Zhang Computer Science, University of Otago TELE301 Lecture 16: Remote Terminal Services 1 Today s Focus How routing between different

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and

More information

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP) Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be

More information

! Distance vector routing! Link state routing.! Path vector routing! BGP: Border Gateway Protocol! Route aggregation

! Distance vector routing! Link state routing.! Path vector routing! BGP: Border Gateway Protocol! Route aggregation ! Distance vector routing! Link state routing Information Network I Youki Kadobayashi! IGP and EGP Intra-domain routing protocol, inter-domain routing protocol! Path vector routing! BGP: Border Gateway

More information

A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance

A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance Feng Wang University of Mass., Amherst fewang@ecs.umass.edu Zhuoqing Morley Mao University of Michigan zmao@eecs.umich.edu

More information

BGP Attributes and Policy Control

BGP Attributes and Policy Control BGP Attributes and Policy Control ISP/IXP `2005, Cisco Systems, Inc. All rights reserved. 1 Agenda BGP Attributes BGP Path Selection Applying Policy 2 BGP Attributes The tools available for the job `2005,

More information

On the State of the Inter-domain and Intra-domain Routing Security

On the State of the Inter-domain and Intra-domain Routing Security On the State of the Inter-domain and Intra-domain Routing Security Mingwei Zhang April 19, 2016 Mingwei Zhang Internet Routing Security 1 / 54 Section Internet Routing Security Background Internet Routing

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther

More information

BGP Attributes and Policy Control

BGP Attributes and Policy Control BGP Attributes and Policy Control ISP/IXP Workshops 1 Agenda BGP Attributes BGP Path Selection Applying Policy 2 BGP Attributes The tools available for the job 3 What Is an Attribute?... Next Hop......

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

Interdomain Routing. Networked Systems (H) Lecture 11

Interdomain Routing. Networked Systems (H) Lecture 11 Interdomain Routing Networked Systems (H) Lecture 11 Lecture Outline Interdomain routing Autonomous systems and the Internet AS-level topology BGP and Internet routing 2 Interdomain Unicast Routing Tier-1

More information

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost

More information

The Transition to BGP Security Is the Juice Worth the Squeeze?

The Transition to BGP Security Is the Juice Worth the Squeeze? The Transition to BGP Security Is the Juice Worth the Squeeze? RPKI Sharon Goldberg Boston University November 2013 Work with Kyle Brogle (Stanford), Danny Cooper (BU), Ethan Heilman (BU), Robert Lychev

More information

Configuring BGP. Cisco s BGP Implementation

Configuring BGP. Cisco s BGP Implementation Configuring BGP This chapter describes how to configure Border Gateway Protocol (BGP). For a complete description of the BGP commands in this chapter, refer to the BGP s chapter of the Network Protocols

More information

IP Addressing & Interdomain Routing. Next Topic

IP Addressing & Interdomain Routing. Next Topic IP Addressing & Interdomain Routing Next Topic IP Addressing Hierarchy (prefixes, class A, B, C, subnets) Interdomain routing Application Presentation Session Transport Network Data Link Physical Scalability

More information

Network Security - ISA 656 Routing Security

Network Security - ISA 656 Routing Security Network Security - ISA 656 Angelos Stavrou December 4, 2007 What is? What is Routing Security? History of Routing Security Why So Little Work? How is it Different? The Enemy s Goal? Bad guys play games

More information

Implementing Cisco IP Routing

Implementing Cisco IP Routing ROUTE Implementing Cisco IP Routing Volume 3 Version 1.0 Student Guide Text Part Number: 97-2816-02 DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED AS IS. CISCO MAKES AND YOU RECEIVE NO WARRANTIES

More information

Securing BGP. Geoff Huston November 2007

Securing BGP. Geoff Huston November 2007 Securing BGP Geoff Huston November 2007 Agenda An Introduction to BGP BGP Security Questions Current Work Research Questions An Introduction to BGP Background to Internet Routing The routing architecture

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 3035/GZ01 4 th December 2014 Outline Context: Inter-Domain Routing

More information

Differentiated BGP Update Processing for Improved Routing Convergence

Differentiated BGP Update Processing for Improved Routing Convergence Differentiated BGP Update Processing for Improved Routing Convergence Wei Sun, Zhuoqing Morley Mao, Kang G. Shin University of Michigan {wsunz, zmao, kgshin}@eecs.umich.edu Abstract Internet routers today

More information

CS519: Computer Networks. Lecture 4, Part 5: Mar 1, 2004 Internet Routing:

CS519: Computer Networks. Lecture 4, Part 5: Mar 1, 2004 Internet Routing: : Computer Networks Lecture 4, Part 5: Mar 1, 2004 Internet Routing: AS s, igp, and BGP As we said earlier, the Internet is composed of Autonomous Systems (ASs) Where each AS is a set of routers, links,

More information

CS 268: Computer Networking. Next Lecture: Interdomain Routing

CS 268: Computer Networking. Next Lecture: Interdomain Routing CS 268: Computer Networking L-3 BGP Next Lecture: Interdomain Routing BGP Assigned Reading MIT BGP Class Notes [Gao00] On Inferring Autonomous System Relationships in the Internet 2 Outline Need for hierarchical

More information

Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016

Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016 Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016 Answer TWO questions from Part ONE on the answer booklet containing lined writing paper, and answer ALL questions in Part TWO on the multiple-choice

More information

Accurate Real-time Identification of IP Hijacking. Presented by Jacky Mak

Accurate Real-time Identification of IP Hijacking. Presented by Jacky Mak Accurate Real-time Identification of IP Hijacking Presented by Jacky Mak Outline Problem and Objectives Interdomain Routing and BGP Basics Attack Model of IP Hijacking Real-time Detection Techniques Implementation

More information

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering Auburn Information Assurance Laboratory J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering 107 Dunstan Hall Auburn

More information

Internet Protocols Fall Lectures Inter-domain routing, mobility support, multicast routing Andreas Terzis

Internet Protocols Fall Lectures Inter-domain routing, mobility support, multicast routing Andreas Terzis Internet Protocols Fall 2006 Lectures 11-12 Inter-domain routing, mobility support, multicast routing Andreas Terzis Outline Inter-domain Internet Routing BGP Routing for mobile nodes Multicast routing

More information

Interdomain Routing (plus Transport Wrapup) Tom Anderson

Interdomain Routing (plus Transport Wrapup) Tom Anderson Interdomain Routing (plus Transport Wrapup) Tom Anderson A good network is one that I never have to think about Greg Minshall 2 Window TCP Known to be Suboptimal Small to moderate sized connections Intranets

More information

Routing(2) Inter-domain Routing

Routing(2) Inter-domain Routing Routing(2) Inter-domain Routing Information Network I Youki Kadobayashi 1 Outline Continued from previous lecture on: Distance vector routing Link state routing IGP and EGP Interior gateway protocol, Exterior

More information

BGP Routing and BGP Policy. BGP Routing. Agenda. BGP Routing Information Base. L47 - BGP Routing. L47 - BGP Routing

BGP Routing and BGP Policy. BGP Routing. Agenda. BGP Routing Information Base. L47 - BGP Routing. L47 - BGP Routing BGP Routing and BGP Policy BGP Routing The BGP Routing Principles and Route Decisions based on AS-Path in a simple topology of AS s routing policy is reduced to a minimal function demonstrated in example

More information

Security in inter-domain routing

Security in inter-domain routing DD2491 p2 2011 Security in inter-domain routing Olof Hagsand KTH CSC 1 Literature Practical BGP pages Chapter 9 See reading instructions Beware of BGP Attacks (Nordström, Dovrolis) Examples of attacks

More information

Configuring Internal BGP Features

Configuring Internal BGP Features This module describes how to configure internal Border Gateway Protocol (BGP) features. Internal BGP (ibgp) refers to running BGP on networking devices within one autonomous system. BGP is an interdomain

More information

Network Layer (Routing)

Network Layer (Routing) Network Layer (Routing) Border Gateway Protocol Structure of the Internet Networks (ISPs, CDNs, etc.) group with IP prefixes Networks are richly interconnected, often using IXPs Prefix E1 Net E IXP Prefix

More information

The Internet now-a-days has become indispensable to each and everyone. It is vulnerable to

The Internet now-a-days has become indispensable to each and everyone. It is vulnerable to CHAPTER 5 NETWORK AVAILABILITY IN INTERDOMAIN ROUTING The Internet now-a-days has become indispensable to each and everyone. It is vulnerable to node failures, link failures, and fluctuations due to many

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics:

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: Appendix C BGP Supplement This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: BGP Route Summarization Redistribution with IGPs Communities Route

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 14, 2013 1 Reading Quiz Hierarchical routing Our routing study thus far - idealization all routers identical network flat

More information

CSC 4900 Computer Networks: Routing Protocols

CSC 4900 Computer Networks: Routing Protocols CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do

More information

A Survey of BGP Security Review

A Survey of BGP Security Review A Survey of BGP Security Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being interesting Border

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 16, 2017 1 Hierarchical routing Our routing study thus far - idealization all routers identical network flat not true in

More information

WITH the deployment of native multicast in commercial

WITH the deployment of native multicast in commercial IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 5, OCTOBER 2004 795 Tracetree: A Scalable Mechanism to Discover Multicast Tree Topologies in the Internet Kamil Sarac, Member, IEEE, and Kevin C. Almeroth,

More information

BGP Commands. Network Protocols Command Reference, Part 1 P1R-355

BGP Commands. Network Protocols Command Reference, Part 1 P1R-355 BGP Commands Use the commands in this chapter to configure and monitor Border Gateway Protocol (BGP). For BGP configuration information and examples, refer to the Configuring BGP chapter of the Network

More information

Internet Routing : Fundamentals of Computer Networks Bill Nace

Internet Routing : Fundamentals of Computer Networks Bill Nace Internet Routing 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Looking Ahead Lab #2 just due Quiz #2

More information

CNT Computer and Network Security: BGP Security

CNT Computer and Network Security: BGP Security CNT 5410 - Computer and Network Security: BGP Security Professor Kevin Butler Fall 2015 Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means

More information

Network Security - ISA 656 Routing Security

Network Security - ISA 656 Routing Security What is? Network Security - ISA 656 Angelos Stavrou What is Routing Security? History of Routing Security Why So Little Work? How is it Different? Bad guys play games with routing protocols. Traffic is

More information

CSCI Topics: Internet Programming Fall 2008

CSCI Topics: Internet Programming Fall 2008 CSCI 491-01 Topics: Internet Programming Fall 2008 Network Layer Derek Leonard Hendrix College November 17, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 4: Roadmap 4.1 Introduction

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

The Case for Separating Routing from Routers

The Case for Separating Routing from Routers The Case for Separating Routing from Routers Nick Feamster, Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Jennifer Rexford, Aman Shaikh, Kobus van der Merwe AT&T Labs

More information

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering Hema T. Kaur, Shivkumar Kalyanaraman ECSE Department, Rensselaer Polytechnic Institute, Troy, NY-12180 {hema,shivkuma}@networks.ecse.rpi.edu

More information

Routing. Jens A Andersson Communication Systems

Routing. Jens A Andersson Communication Systems Routing Jens A Andersson Communication Systems R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 R5 10 Router A router is a type of internetworking device that passes data

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

How the Internet works? The Border Gateway Protocol (BGP)

How the Internet works? The Border Gateway Protocol (BGP) Chair of Network Architectures and Services - Prof. Carle Department of Computer Science Technical University of Munich How the Internet works? The Border Gateway Protocol (BGP) Edwin Cordeiro ilab2 Lecture

More information

Combining Speak-up with DefCOM for Improved DDoS Defense

Combining Speak-up with DefCOM for Improved DDoS Defense Combining Speak-up with DefCOM for Improved DDoS Defense Mohit Mehta, Kanika Thapar, George Oikonomou Computer and Information Sciences University of Delaware Newark, DE 19716, USA Jelena Mirkovic Information

More information

Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System

Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System School of Computer,

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!

More information

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage Lecture 16: Interdomain Routing CSE 123: Computer Networks Stefan Savage Overview Autonomous Systems Each network on the Internet has its own goals Path-vector Routing Allows scalable, informed route selection

More information

On Demand secure routing protocol resilient to Byzantine failures

On Demand secure routing protocol resilient to Byzantine failures On Demand secure routing protocol resilient to Byzantine failures Primary Reference: B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures,

More information

BGP Attributes and Policy Control

BGP Attributes and Policy Control BGP Attributes and Policy Control ISP/IXP Workshops 1 Agenda BGP Attributes BGP Path Selection Applying Policy 2 BGP Attributes The tools available for the job 3 What Is an Attribute?... Next Hop......

More information

BGP Routing inside an AS

BGP Routing inside an AS Hot Potatoes Heat Up BGP Routing Renata Teixeira (UC San Diego) http://www-cse.ucsd.edu/~teixeira with Aman Shaikh (AT&T), Tim Griffin(Intel), and Jennifer Rexford(AT&T) 30 th NANOG Miami, Florida BGP

More information

Link State Routing & Inter-Domain Routing

Link State Routing & Inter-Domain Routing Link State Routing & Inter-Domain Routing CS640, 2015-02-26 Announcements Assignment #2 is due Tuesday Overview Link state routing Internet structure Border Gateway Protocol (BGP) Path vector routing Inter

More information

Making an AS Act Like a Single Node: Toward Intrinsically Correct Interdomain Routing

Making an AS Act Like a Single Node: Toward Intrinsically Correct Interdomain Routing Making an AS Act Like a Single Node: Toward Intrinsically Correct Interdomain Routing Rui Zhang-Shen, Yi Wang, and Jennifer Rexford Princeton University ABSTRACT Although interconnecting independently-administered

More information

Intelligent Routing Platform

Intelligent Routing Platform WHITE PAPER Bring Intelligence to your Network Copyright 2018 Noction Inc. Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics. EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect

More information

Destination Reachability and BGP Convergence Time. Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA)

Destination Reachability and BGP Convergence Time. Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA) Destination Reachability and BGP Convergence Time Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA) Packet Delivery and Routing Dynamics The primary goal of routing is to deliver packets.

More information

Next Lecture: Interdomain Routing : Computer Networking. Outline. Routing Hierarchies BGP

Next Lecture: Interdomain Routing : Computer Networking. Outline. Routing Hierarchies BGP Next Lecture: Interdomain Routing BGP 15-744: Computer Networking L-3 BGP Assigned Reading MIT BGP Class Notes [Gao00] On Inferring Autonomous System Relationships in the Internet Ooops 2 Outline Need

More information

BGP Protocol & Configuration. Scalable Infrastructure Workshop AfNOG2008

BGP Protocol & Configuration. Scalable Infrastructure Workshop AfNOG2008 BGP Protocol & Configuration Scalable Infrastructure Workshop AfNOG2008 Border Gateway Protocol (BGP4) Case Study 1, Exercise 1: Single upstream Part 6: BGP Protocol Basics Part 7: BGP Protocol - more

More information

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming ISP Workshops Last updated 18 September 2013 1 Service Provider Multihoming p Previous examples dealt with loadsharing inbound traffic n Of primary concern at Internet edge

More information

Lecture 18: Border Gateway Protocol

Lecture 18: Border Gateway Protocol Lecture 18: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday Some figures courtesy Mike Freedman & Craig Labovitz Lecture 18 Overview Path-vector Routing Allows scalable,

More information

A Measurement Study of BGP Misconfiguration

A Measurement Study of BGP Misconfiguration A Measurement Study of BGP Misconfiguration Ratul Mahajan, David Wetherall, and Tom Anderson University of Washington Motivation Routing protocols are robust against failures Meaning fail-stop link and

More information