Understanding Opera.onal Rou.ng (part II) Geoffrey Xie Naval Postgraduate School
|
|
- Marshall McGee
- 5 years ago
- Views:
Transcription
1 Understanding Opera.onal Rou.ng (part II) Geoffrey Xie Naval Postgraduate School July 6, 2011
2 Route Aggrega.on Child Route Unallocated Child Prefix: e.g., / Aggregate Route / / /24 Des.na.on Next hop / / / RA Des.na.on Next hop / Route Aggrega.on reduces size of rou.ng tables and contains propaga.on of route flaps 2
3 Challenges for Understanding RA White box ISPs do not disclose details of incidents nor configura.ons Difficult to assess prevalence of anomalies and to what extent RA contributes to them Black box Can expose anomalies but difficult to iden.fy root causes Studies discovered loops, and conjectured RA to be responsible for them 3
4 Proposed Approach Study RA behavior as implemented in today s routers No precise specifica.on of RA behaviors Many ques.ons le^ unanswered Propose a model to analyze and reason about RA, iden.fy rou.ng abnormali.es that can be root caused to route aggrega.on, and design and prove more formal and comprehensive RA guidelines to ensure safe rou.ng 4
5 Main Results on RA A set of experiments to characterize RA behaviors Behaviors vary significantly across protocols and vendors A canonical router model with two new router primi.ves New model captures diversity of RA behaviors A comprehensive analysis of RA Expose four new types of rou.ng anomaly (e.g., route loss) Iden.fy the root causes for each anomaly Explain shortcoming of current vendor guidelines Present sufficient condi.ons for the RA to guarantee rou.ng safety A clean slate proposal for RA 5
6 Part 2 Outline Background Experiments Model Anomalies & Root Causes Analysis of Exis.ng Solu.ons New Safety Condi.ons Clean Slate Approach 6
7 Persistent Forwarding Loop Internet Service Provider Des.na.on Next hop / / / Enterprise Network /16 Des.na.on Next hop / / /
8 Persistent Forwarding Loop ISP Des.na.on Next hop / / / Enterprise Network /16 Des.na.on Next hop / / /
9 Blackhole / / / /24 9
10 Blackhole / / / /24 10
11 Blackhole / / / /24 11
12 Outline Background Experiments Model Anomalies & Root Causes Analysis of Exis.ng Solu.ons New Safety Condi.ons Clean Slate Approach 12
13 Experiment Setup Input Child routes Aggrega.on Router Output Aggregate route 13
14 RA Behaviors Cisco EIGRP Y Interface min() Y 5 RIP Y Interface min() N N/A OSPF N Area min(), max() Y 110 BGP Y AS Origin/ AS SET Juniper * N Crea.on per router; advmt per instance Y 200 Customizable Y
15 Outline Background Experiments Model Anomalies & Root Causes Analysis of Exis.ng Solu.ons New Safety Condi.ons Clean Slate Approach 15
16 Model Mo.va.on Ad hoc nature of current design & implementa.on Unified model to reason about RA and iden.fy root cause of anomalies Insight Diversity of behaviors can be captured by two primi.ves Outcomes depend on where those two primi.ves are applied (RIB, FIB, etc.) 16
17 RA Primi.ves add sink( ) Creates* sink route Assigns specific AD value * Sink route may not get installed in FIB adv aggr( ) Cisco only; handles adver.sement of aggregate routes Performed for each protocol instance and per rou.ng process Loca.on where the primi.ve examines for presence of child routes differs depending on implementa.on JUNOS implementa.ons rely on export policies to announce aggregate routes 17
18 Canonical Router Model (Cisco IOS) Local RIB EIGRP RIBin RIP RIBin Rou.ng Protocol Route Selec.on Alg. Router wide Route Selec.on Route Selec.on FIB RR RR add sink( ) EIGRP RIBout RIP RIBout adv aggr( ) adv aggr( ) adv aggr( ) 18
19 Canonical Router Model (Juniper JUNOS) Local RIB BGP RIBin RIP RIBin Rou.ng Protocol Route Selec.on Alg. Router wide Route Selec.on Route Selec.on RR RR add sink() BGP RIBout RIP RIBout Model allows us to infer whether a route is installed in FIB and how it may be adver.sed by a router FIB 19
20 Unexpected Route Loss r 1 : /24 r 2 : /16 I 1 I 2 r 3 : /16 I 3 r 4 : /8 I 4 r 1 r 2 Local RIB EIGRP RIBin Rou.ng Protocol Route Selec.on Alg. Route Selec.on FIB {r 3, r 4 } RR add sink( ) {r 1, r 2 }, {r 3, r 4 } EIGRP RIBout adv aggr( ) adv aggr( ) adv aggr( ) I 2 I 3 I 4 Des.na.on route (AD) /24 r1 (90) /16 r2 (90) r3 (5) /8 r4 (5)
21 Unexpected Route Loss r 1 : /24 r 2 : /16 I 1 I 2 r 3 : /16 I 3 r 4 : /8 I 4 r 1 r 2 Local RIB EIGRP RIBin Rou.ng Protocol Route Selec.on Alg. Route Selec.on FIB {r 3, r 4 } RR Add sink() {r 1, {r r 3, 1, r 24 }, {r 3, r 4 } {r 1, r 3, r 4 } EIGRP RIBout {r 1, r 3, r 4 } {r 1, r 3, r 4 } Adv aggr() Adv aggr() Adv aggr() I 2 I 3 I 4 r 3 r 4 r 1 No RA on I 4 Two routes r 1 and r 2 received to different prefixes One would expect both routes to be adver.sed on I 4 Des.na.on route (AD) /24 r1 (90) /16 r2 (90) r3 (5) /8 r4 (5)
22 Outline Background Experiments Model Anomalies & Root Causes Analysis of Exis.ng Solu.ons New Safety Condi.ons Clean Slate Approach 22
23 Anomalies In depth analysis based on model 1. Iden.fy root causes of known anomalies 2. Disclose four new anomalies Key findings 1. Sink route crea.on does not guarantee installa.on in FIB 2. Sink routes do not mean anomaly free rou.ng (e.g., route loss) 23
24 Root Causes of Known Anomalies Strict Monotonicity : A route s preference should strictly decrease when propagated Forwarding loops for unallocated child prefixes: Lack of sink routes Router adver.ses aggregate routes with holes Propaga.on of non existent routes, which should be least preferred Viola.on of SM Blackholes for some child prefixes: Interac.ons between mul.ple routers More difficult to iden.fy 24
25 New Anomalies Previously known: Forwarding loops (unallocated prefixes) Blackholes New discoveries: Route Loss Forwarding loops (allocated prefixes) Route Oscilla.ons Perpetual Count to Infinity 25
26 Perpetual Count to Infinity Core Network C 10.2/16, m: /24 D B A 10.2/16, m: /24 Access Network Des.na.on Next hop (AD) /24 A (110) Access Network /16 A (130) D (110) Adver.sement cycle con.nues un.l metric reaches max value; route is discarded, sink route is installed again, Perpetual count to infinity 26
27 Outline Background Experiments Model Anomalies & Root Causes Analysis of Exis.ng Solu.ons New Safety Condi.ons Clean Slate Approach 27
28 Inadequacy of Vendor Guidelines Installa.on of sink routes Topology specific guidelines 28
29 Vendor Guidelines: Sink Routes A router that generates an aggregate route for mul6ple, more specific routes must discard packets that match the aggregate route, but not any of the more specific routes. In other words, the next hop for the aggregate route should be the null des6na6on. This is necessary to prevent forwarding loops when some addresses covered by the aggregate are not reachable. Correctness criterion, but how to meet it? Crea.on of sink route does not guarantee installa.on in FIB Also, Installa.on of sink route in FIB can create blackholes 29
30 Vendor Guidelines: Topology Specific Approach 1 Add links Approach 2 Only choke point can act as aggrega.on router / / / /24 30
31 Difficulty of Anomaly Detec.on Theorem: The problem of determining whether the collec6on of route aggrega6on configura6ons in a network is vulnerable to persistent forwarding loops is NP hard. 31
32 Outline Background Experiments Model Anomalies & Root Causes Analysis of Exis.ng Solu.ons New Safety Condi.ons Clean Slate Approach 32
33 New Safety Condi.ons Desired Proper.es 1. Convergence 2. Loop free packet forwarding paths 3. No blackholes 4. No unexpected route losses Challenges network wide coordina.on stringent requirement on router 33
34 Sufficient Condi.ons 1. Convergence and loop free paths For an aggregate prefix, a sink route is added and always possesses the lowest unique AD value 2. Blackhole Preven.on A router adver6ses an aggregate route only if a set of routes that fully covers the address space of the aggregate route is present in the FIB 3. Preven.on of Route Loss add sink() and adv aggr() should not create a new route in the presence of another route in the router FIB adver6sing the same prefix as the aggregate. 34
35 Outline Background Experiments Model Anomalies & Root Causes Analysis of Exis.ng Solu.ons New Safety Condi.ons Clean Slate Approach 35
36 Mo.va.on RA reduces FIB sizes, by relying on the hierarchical IP addressing allowing routers to treat mul.ple des.na.on networks collec.vely as a single logical des.na.on 36
37 Seman.cs of Route A route implies all des6na6ons included in the adver6sed prefix to be reachable Route aggrega.on violates this assump.on Forwarding loops, blackholes, etc. 37
38 Proposed Solu.on Novel concept of nega6ve route It allows a router to indicate subsets of prefixes for which it does not have a route Difference from exis.ng invalid routes: a router removes an invalid route if it is present in Nega.ve routes are stored in RIB and FIB. the rou.ng table It eliminates all anomalies due to unreachable sub prefixes in aggregate route. 38
39 RA Conclusions RA is essen.al for Internet rou.ng scalability Current design is prone to anomalies Forwarding loops, perpetual count to infinity, unexpected route loss, blackholes, etc. We proposed the first analy.cal model to reason about RA Needs more asen.on from community 39
40 A Final Remark guide guide 40
41 More details of the RA analysis are in 1. [TR 11] Franck Le, Geoffrey G. Xie, and Hui Zhang, Understanding route aggrega.on. Technical Report, Carnegie Mellon University, CMU CS ,2010. Revised June
42 Related Work [XGF 07] J. Xia, L. Gao, and T. Fei. A Measurement Study of Persistent Forwarding Loops on the Internet. Computer Networks, [WSR 05] R. White, D. Slice, and A. Retana. Op6mal Rou6ng Design. Cisco Press, [KMJKWA 08] E. Katz Basses, H. V. Madhyastha, J. P. John, A. Krishnamurthy, D. Wetherall, and T. Anderson. Studying Black Holes in the Internet with Hubble. In Proc. USENIX NSDI Conference, [BFCW 09] H. Ballani, P. Francis, T. Cao, and J. Wang. Making Routers Last Longer with ViAggre. In Proc. USNIX NSDI Conference,
43 43
44 add sink() primi.ve 44
45 adv aggr() primi.ve 45
Understanding Route Aggregation
Understanding Route Aggregation Franck Le Geoffrey G. Xie Hui Zhang March 9, 2010 CMU-CS-10-106 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Electrical and Computer Engineering,
More informationNext hop in rou-ng Summary of Future Internet WP1 work. Hannu Flinck
Next hop in rou-ng Summary of Future Internet WP1 work Hannu Flinck Original focus on Rou-ng Scalability Mo$va$on: Internet Architecture Board stated (in RFC 4984): rou-ng scalability is the most important
More informationAbstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School
Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School xie@nps.edu It started in 2004 A sabbatical at CMU Joined a collaborative project with AT&T
More informationOPTIMAL ROUTING VS. ROUTE REFLECTOR VNF - RECONCILE THE FIRE WITH WATER
OPTIMAL ROUTING VS. ROUTE REFLECTOR VNF - RECONCILE THE FIRE WITH WATER Rafal Jan Szarecki #JNCIE136 Solu9on Architect, Juniper Networks. AGENDA Route Reflector VNF - goals Route Reflector challenges and
More informationCS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal
CS4450 Computer Networks: Architecture and Protocols Lecture 15 BGP Spring 2018 Rachit Agarwal Autonomous System (AS) or Domain Region of a network under a single administrative entity Border Routers Interior
More informationNew World BGP. Geoff Huston January2010 APNIC
New World BGP Geoff Huston January2010 APNIC 16- bit AS Number Map 16- bit AS Number Map Unadvertised AS Numbers RIR Pool AS Numbers Advertised AS Numbers IANA Pool 16- bit AS Number Map Unadvertised AS
More informationFlooding Attacks by Exploiting Persistent Forwarding Loops
Flooding Attacks by Exploiting Persistent Forwarding Jianhong Xia, Lixin Gao, Teng Fei University of Massachusetts at Amherst {jxia, lgao, tfei}@ecs.umass.edu ABSTRACT In this paper, we present flooding
More informationLink State Rou.ng Reading: Sec.ons 4.2 and 4.3.4
Link State Rou.ng Reading: Sec.ons. and.. COS 6: Computer Networks Spring 009 (MW :0 :50 in COS 05) Michael Freedman Teaching Assistants: WyaN Lloyd and Jeff Terrace hnp://www.cs.princeton.edu/courses/archive/spring09/cos6/
More informationVendor: Alcatel-Lucent. Exam Code: 4A Exam Name: Alcatel-Lucent Border Gateway Protocol. Version: Demo
Vendor: Alcatel-Lucent Exam Code: 4A0-102 Exam Name: Alcatel-Lucent Border Gateway Protocol Version: Demo QUESTION 1 Upon the successful establishment of a TCP session between peers, what type of BGP message
More informationCarnegie Mellon University
Carnegie Mellon University CARNEGIE INSTITUTE OF TECHNOLOGY THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY TITLE Routing Connecting Primitives: Theory
More informationRouting Basics. Campus Network Design & Operations Workshop
Routing Basics Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationDistance Vector Routing Protocols
Distance Vector Routing Protocols Routing Protocols and Concepts Chapter 4 Version 4.0 1 Objectives Identify the characteristics of distance vector routing protocols. Describe the network discovery process
More informationTowards Systematic Design of Enterprise Networks
Towards Systematic Design of Enterprise Networks Geoffrey Xie Naval Postgraduate School In collaboration with: Eric Sung, Xin Sun, and Sanjay Rao (Purdue Univ.) David Maltz (MSR) Copyright 2008 AT&T. All
More informationRouting Basics. ISP Workshops. Last updated 10 th December 2015
Routing Basics ISP Workshops Last updated 10 th December 2015 1 Routing Concepts p IPv4 & IPv6 p Routing p Forwarding p Some definitions p Policy options p Routing Protocols 2 IPv4 p Internet still uses
More informationInternet Protocol (IP)
(IP) Guevara Noubir Textbook: Chapter 4. Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Lecture Outline Addressing IP over LAN Rou;ng IPv6 IP Internet Concatena;on of Networks
More informationNetworking: Hardware, Rou?ng and new Challenges
Mestrado em Engenharia Informá?ca e de Computadores Master Degree (MSc) in Informa?on Systems and Computer Engineering Administração e Gestão de Infra-estruturas de IT IT Infrastructure Management and
More informationRouting Basics. ISP Workshops
Routing Basics ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 26
More informationBTEC Level 3 Extended Diploma
BTEC Level 3 Extended Diploma Unit 9 Computer Network Routing and Routing Protocols BTEC Level 3 Extended Diploma Introduction to Routing Routing is the process that a router uses to forward packets toward
More informationInternet inter-as routing: BGP
Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability
More informationCellular Networks and Mobile Compu5ng COMS , Spring 2012
Cellular Networks and Mobile Compu5ng COMS 6998-8, Spring 2012 Instructor: Li Erran Li (lierranli@cs.columbia.edu) hkp://www.cs.columbia.edu/~coms6998-8/ 3/26/2012: Cellular Network and Traffic Characteriza5on
More informationNetwork Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1
Network Protocols Routing TDC375 Autumn 03/04 John Kristoff - DePaul University 1 IPv4 unicast routing All Internet hosts perform basic routing for local net destinations, forward to local host for non-local
More informationKey Nego(a(on Protocol & Trust Router
Key Nego(a(on Protocol & Trust Router dra6- howle:- radsec- knp ABFAB, IETF 80 31 March, Prague. Introduc(on The ABFAB architecture does not require any par(cular AAA strategy for connec(ng RPs to IdPs.
More informationA Configuration-only Approach to FIB Reduction. Paul Francis Hitesh Ballani, Tuan Cao Cornell
A Configuration-only Approach to FIB Reduction Paul Francis Hitesh Ballani, Tuan Cao Cornell Virtual Aggregation An approach to shrinking FIBs (and RIBs) In interface-card FIB, maybe control-card RIB Works
More informationTopic. How rou=ng protocols work with IP. The Host/Router dis=nc=on. I don t! I route. CSE 461 University of Washington 1
Topic How rou=ng protocols work with IP The Host/Router dis=nc=on I route I don t! CSE 461 University of Washington 1 Recap In the Internet: Hosts on same network have IP addresses in the same IP prefix
More informationTDC 363 Introduction to LANs
TDC 363 Introduction to LANs Routing Protocols and RIP Greg Brewster DePaul University TDC 363 1 Dynamic Routing Routing Protocols Distance Vector vs. Link State Protocols RIPv1 & RIPv2 RIP Problems Slow
More information5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet
Chapter 5: outline 5.1 introduction 5.5 The SDN control 5.2 routing protocols plane link state 5.6 ICMP: The Internet distance vector Control Message 5.3 intra-as routing in Protocol the Internet t 5.7
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationDynamics of Hot-Potato Routing in IP Networks
Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)
More informationNetwork layer overview
Network layer overview understand principles behind layer services: layer service models forwarding versus rou:ng how a router works rou:ng (path selec:on) broadcast, mul:cast instan:a:on, implementa:on
More informationExample: Conditionally Generating Static Routes
1 of 5 9/30/2012 5:46 PM Example: Conditionally Generating Static Routes Understanding Conditionally Generated Routes Example: Configuring a Conditional Default Route Policy Understanding Conditionally
More informationSome Thoughts on Multi-Domain Routing Ross Callon
Internet Draft R. Callon Digital Equipment Corporation July, 1991 Some Thoughts on Multi-Domain Routing Ross Callon Digital Equipment Corporation July, 1991 Status of this Memo This internet draft is an
More informationReal-time Blackhole Analysis with Hubble
Real-time Blackhole Analysis with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, Thomas Anderson University of Washington NANOG 40, June 2007 1 Global Reachability
More informationSEMESTER 2 Chapter 3 Introduction to Dynamic Routing Protocols V 4.0
SEMESTER 2 Chapter 3 Introduction to Dynamic Routing Protocols V 4.0 3.1.1 What are the four routing RIP, RIPv2, EIGRP, OSPFv2 protocols that are the focus of this course? 3.1.1.2 What are routing protocols?
More informationCS 43: Computer Networks. 24: Internet Routing November 19, 2018
CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small
More informationDistributed Route Aggregation (DRAGON)
Distributed Route Aggregation on the GlObal Network (DRAGON) João Luís Sobrinho 1 Laurent Vanbever 2, Franck Le 3, Jennifer Rexford 4 ACM CoNEXT 2014, Sydney 1 Instituto de Telecomunicações, 1 IST Universidade
More informationA configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)
A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers
More informationLink State Rou.ng Reading: Sec.ons 4.2 and 4.3.4
Link State Rou.ng Reading: Sec.ons. and.. COS 6: Computer Networks Spring 0 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring/cos6/ Inside a router Goals of Today s Lecture Control plane:
More informationLink State Routing & Inter-Domain Routing
Link State Routing & Inter-Domain Routing CS640, 2015-02-26 Announcements Assignment #2 is due Tuesday Overview Link state routing Internet structure Border Gateway Protocol (BGP) Path vector routing Inter
More informationInternet Routing : Fundamentals of Computer Networks Bill Nace
Internet Routing 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Looking Ahead Lab #2 just due Quiz #2
More informationIntroduc)on to Computer Networks
Introduc)on to Computer Networks COSC 4377 Lecture 15 Spring 2012 March 19, 2012 Announcements HW7 due this week HW8 due 3/28 Exam 2 on 4/23 HW7 RIP (Rou)ng Informa)on Protocol) Components Forwarding Rou)ng
More informationRouting Basics ISP/IXP Workshops
Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to
More informationModeling the Complexity of Enterprise Routing Design
Modeling the Complexity of Enterprise Routing Design Xin Sun (Florida International U.), Sanjay G. Rao (Purdue U.) and Geoffrey G. Xie (Naval Postgraduate School) 1 The costs of complexity We propose that
More informationMFTP: a Clean- Slate Transport Protocol for the Informa8on Centric MobilityFirst Network
MFTP: a Clean- Slate Transport Protocol for the Informa8on Centric MobilityFirst Network Kai Su (presen8ng), Francesco Bronzino, K. K. Ramakrishnan*, and Dipankar Raychaudhuri WINLAB, Rutgers University
More informationMul7cast protocols. IP Mul7cast and IGMP SRM (Scalable Reliable Mul7cast) PGM (Pragma7c General Mul7cast)
IP ANYCAST and MULTICAST; OVERLAYS and UNDERLAYS 1 IP Anycast Outline today Mul7cast protocols IP Mul7cast and IGMP SRM (Scalable Reliable Mul7cast) PGM (Pragma7c General Mul7cast) Overlay networks Tunnels
More informationInter-Autonomous-System Routing: Border Gateway Protocol
Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano June 14, 2005 Outline Hierarchical routing BGP Routing Routing Goal: each router u
More informationA Software Toolkit for Visualizing Enterprise Routing Design
A Software Toolkit for Visualizing Enterprise Routing Design Xin Sun, Jinliang Wei, Sanjay G. Rao, and Geoffrey G. Xie School of Electrical and Computer Engineering, Purdue University Department of Computer
More informationName-Based Content Routing in Information Centric Networks Using Distance Information
Name-Based Content Routing in Information Centric Networks Using Distance Information J.J. Garcia-Luna-Aceves Palo Alto Research Center UC Santa Cruz jj@soe.ucsc.edu Origins of Routing for Packet Switching
More informationInter-domain Routing. Outline. Border Gateway Protocol
Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea CS 640 2 Internet Structure Today CS 640 3 Route Propagation in the Internet Autonomous System (AS) corresponds to
More informationImportant Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)
Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be
More informationNetwork Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics:
Network Forensics: Network OS Fingerprinting Prefix Hijacking Analysis Scott Hand September 30 th, 2011 Outline 1 Network Forensics Introduction OS Fingerprinting 2 Prefix Hijacking Theory BGP Background
More informationIP Reachability Differences: Myths and Reali<es
IP Reachability Differences: Myths and Reali
More informationRouting Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing
Routing Concepts IPv4 Routing Routing Basics ISP/IXP Workshops Forwarding Some definitions Policy options Routing Protocols 1 2 IPv4 IPv4 address format Internet uses IPv4 addresses are 32 bits long range
More informationTowards a Logic for Wide-Area Internet Routing
Towards a Logic for Wide-Area Internet Routing Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory {feamster,hari}@lcs.mit.edu ; #, $. ', - -, * - ' * 4 *
More informationLecture 19: Network Layer Routing in the Internet
Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F
More informationProAc&ve Rou&ng In Scalable Data Centers with PARIS
ProAc&ve Rou&ng In Scalable Data Centers with PARIS Theophilus Benson Duke University Joint work with Dushyant Arora + and Jennifer Rexford* + Arista Networks *Princeton University Data Center Networks
More informationECE 1749H: Interconnec1on Networks for Parallel Computer Architectures: Rou1ng. Prof. Natalie Enright Jerger
ECE 1749H: Interconnec1on Networks for Parallel Computer Architectures: Rou1ng Prof. Natalie Enright Jerger Announcements Feedback on your project proposals This week Scheduled extended 1 week Next week:
More informationLOUP: The Principles and Practice of Intra-Domain Route Dissemination. Nikola Gvozdiev, Brad Karp, Mark Handley
LOUP: The Principles and Practice of Intra-Domain Route Dissemination Nikola Gvozdiev, Brad Karp, Mark Handley The Rising Tide of Reachability Expectations Internet users expect any-to-any reachability:
More informationUnit 3: Dynamic Routing
Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about
More informationStudying Black Holes on the Internet with Hubble
Studying Black Holes on the Internet with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson University of Washington RIPE, May 2008 This
More informationRouting Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols
Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0
More informationAbstrac(ons for Model Checking SDN Controllers. Divjyot Sethi, Srinivas Narayana, Prof. Sharad Malik Princeton University
Abstrac(ons for Model Checking SDN s Divjyot Sethi, Srinivas Narayana, Prof. Sharad Malik Princeton University Tradi(onal Networking Swt 1 Swt 2 Talk OSPF, RIP, BGP, etc. Swt 3 Challenges: - Difficult
More informationNetwork Protocols. Routing. TDC375 Winter 2002 John Kristoff - DePaul University 1
Network Protocols Routing TDC375 Winter 2002 John Kristoff - DePaul University 1 IP routing Performed by routers Table (information base) driven Forwarding decision on a hop-by-hop basis Route determined
More informationBackbone Networks. Networking Case Studies. Backbone Networks. Backbone Topology. Mike Freedman COS 461: Computer Networks.
Networking Case Studies Datacenter Backbone Networks Enterprise Backbone Mike Freedman COS 6: Computer Networks Cellular h>p://www.cs.princeton.edu/courses/archive/spr/cos6/ Wireless Backbone Networks
More informationThe Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery
The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery Evan Cooke *, Michael Bailey *, Farnam Jahanian *, Richard Mortier *University of Michigan Microsoft Research - 1 - NSDI 2006
More informationChapter 7: Routing Dynamically. Routing & Switching
Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based
More informationModule 6 Implementing BGP
Module 6 Implementing BGP Lesson 1 Explaining BGP Concepts and Terminology BGP Border Gateway Protocol Using BGP to Connect to the Internet If only one ISP, do not need BGP. If multiple ISPs, use BGP,
More informationOverview. Information About Layer 3 Unicast Routing. Send document comments to CHAPTER
CHAPTER 1 This chapter introduces the basic concepts for Layer 3 unicast routing protocols in Cisco NX-OS. This chapter includes the following sections: Information About Layer 3 Unicast Routing, page
More informationCS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017
CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 16, 2017 1 Hierarchical routing Our routing study thus far - idealization all routers identical network flat not true in
More informationBGP Anomaly Detection. Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage.
BGP Anomaly Detection Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage balmusawi@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University
More informationMRT- FRR: Architecture, Algorithms, Analysis, and Extensions
MRT- FRR: Architecture, Algorithms, Analysis, and Extensions Alia Atlas, Gabor Enyedi, Andras Csaszar, Bob Kebler, Shraddha Hegde, Chris Bowers, Jeff Tantsura, Abishek Gopalan, Kishore Tiruveedhula, Russ
More informationCisco Training - HD Telepresence MPLS: Implementing Cisco MPLS V3.0. Upcoming Dates. Course Description. Course Outline
Cisco Training - HD Telepresence MPLS: Implementing Cisco MPLS V3.0 From the technology basics to advanced VPN configuration. $3,995.00 5 Days Upcoming Dates Dec 10 - Dec 14 Mar 25 - Mar 29 Course Description
More informationIntroduction to IP Routing. Geoff Huston
Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet
More informationComparative Study of Routing Protocols Convergence using OPNET Chapter Three: Simulation & Configuration
3.1 Optimized Network Engineering Tools:- Optimized Network Engineering Tools () Modeler is the industry s leading simulator specialized for network research and development. It allows users to design
More informationChapter 21 RIP Configuration Guidelines
Chapter 21 RIP Configuration Guidelines To configure the Routing Information Protocol (RIP), you include the following statements: protocols { rip { any-sender; authentication-key password; authentication-type
More information2008 NDP Lectures 7 th Semester
2008 NDP Lectures 7 th Semester Neeli R. Prasad, Associate Professor Head of Wireless Security and Sensor Networks Group Networking and Security Aalborg University Niels Jernes Vej 12, 9220 Aalborg East,
More informationCS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol) Intra-domain routing The Story So Far Routing protocols generate the forwarding
More informationVerifying Wide-Area Routing Configuration
Verifying Wide-Area Routing Configuration Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory {feamster,hari}@csail.mit.edu http://nms.lcs.mit.edu/bgp/ BGP
More informationSEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 RIP, IGRP, EIGRP
SEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 4.1.1 What are the three distance vector routing protocols? What are the key characteristics of RIP? What are the key characteristics of IGRP?
More informationECE 1749H: Interconnec1on Networks for Parallel Computer Architectures: Rou1ng. Prof. Natalie Enright Jerger
ECE 1749H: Interconnec1on Networks for Parallel Computer Architectures: Rou1ng Prof. Natalie Enright Jerger Rou1ng Overview Discussion of topologies assumed ideal rou1ng In prac1ce Rou1ng algorithms are
More informationModeling Complexity of Enterprise Routing Design
Purdue University Purdue e-pubs ECE Technical Reports Electrical and Computer Engineering 10-31-2012 Modeling Complexity of Enterprise Routing Design Xin Sun Florida International University, xinsun@cs.fiu.edu
More informationÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Link State Routing. Jean Yves Le Boudec 2015
ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Link State Routing Jean Yves Le Boudec 2015 1 Contents 1. Link state 2. OSPF and Hierarchical routing with areas 3. Dynamic metrics and Braess paradox 2 1. Link
More informationData-Driven Network Opera1ons. France-IX 2016 Avi Freedman
Data-Driven Network Opera1ons France-IX 2016 Avi Freedman Summary Why Data-Driven Network Opera1ons? The food: data types and sources Requirements and tool types Data Fusion Business-driven use cases:
More informationInter-Domain Routing: BGP
Inter-Domain Routing: BGP Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Inter-Domain Routing Internet is a network of networks Hierarchy
More informationROUTING PROTOCOLS. Mario Baldi Routing - 1. see page 2
ROUTING PROTOCOLS Mario Baldi www.baldi.info Routing - 1 Copyright Notice This set of transparencies, hereinafter referred to as slides, is protected by copyright laws and provisions of International Treaties.
More informationCOMP/ELEC 429 Introduction to Computer Networks
COMP/ELEC 429 Introduction to Computer Networks Lecture 11: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at
More informationTag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER
CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the
More informationCS4700/CS5700 Fundamentals of Computer Networks
CS4700/CS5700 Fundamentals of Computer Networks Lecture 12: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu
More informationNetwork Policy Enforcement
CHAPTER 6 Baseline network policy enforcement is primarily concerned with ensuring that traffic entering a network conforms to the network policy, including the IP address range and traffic types. Anomalous
More informationPractical Verification Techniques for Wide-Area Routing
Practical Verification Techniques for Wide-Area Routing Nick Feamster M.I.T. Computer Science and Artificial Intelligence Laboratory feamster@lcs.mit.edu http://nms.lcs.mit.edu/bgp/ (Thanks to Hari Balakrishnan
More informationImplementing Static Routes
This module describes how to implement static routes. Static routes are user-defined routes that cause packets moving between a source and a destination to take a specified path. Static routes can be important
More informationSeman&c Aware Anomaly Detec&on in Real World Parking Data
Seman&c Aware Anomaly Detec&on in Real World Parking Data Arnamoy Bha+acharyya 1, Weihan Wang 2, Chris&ne Tsang 2, Cris&ana Amza 1 1 University of Toronto, 2 Smarking Inc Mo&va&on Mo&va&on heps://www.engadget.com/2017/01/17/google-
More informationDesigning Mul+- Tenant Data Centers using EVPN- IRB. Neeraj Malhotra, Principal Engineer, Cisco Ahmed Abeer, Technical Marke<ng Engineer, Cisco
Designing Mul+- Tenant Data Centers using EVPN- IRB Neeraj Malhotra, Principal Engineer, Cisco Ahmed Abeer, Technical Marke
More informationRequest for Comments: 3277 Category: Informational April Intermediate System to Intermediate System (IS-IS) Transient Blackhole Avoidance
Network Working Group D. McPherson Request for Comments: 3277 TCB Category: Informational April 2002 Status of this Memo Intermediate System to Intermediate System (IS-IS) Transient Blackhole Avoidance
More informationDeploying MPLS L3VPN. Apricot Cisco and/or its affiliates. All rights reserved. Cisco Public
Deploying MPLS L3VPN 1 Abstract This session describes the implementation of IP Virtual Private Networks (IP VPNs) using MPLS. It is the most common Layer 3 VPN technology, as standardized by IETF RFC2547/4364,
More informationChapter 3. Introduction to Dynamic Routing Protocols. CCNA2-1 Chapter 3
Chapter 3 Introduction to Dynamic Routing Protocols CCNA2-1 Chapter 3 Introduction to Dynamic Routing Protocols Introduction to Dynamic Routing Protocols CCNA2-2 Chapter 3 Perspective and Background Dynamic
More informationInternet Routing Protocols Lecture 01 & 02
Internet Routing Protocols Lecture 01 & 02 Advanced Systems Topics Lent Term, 2010 Timothy G. Griffin Computer Lab Cambridge UK Internet Routing Outline Lecture 1 : Inter-domain routing architecture, the
More informationTopology. Youki Kadobayashi NAIST. Outline. Routing system: its function. Gateway Model Revisited. Routing system: its structure
Information Network 1 Routing (1) Topology Topology 1: 2a (1): a branch of mathematics concerned with those properties of geometric configurations (as point sets) which are unaltered by elastic deformations
More informationOn the State of the Inter-domain and Intra-domain Routing Security
On the State of the Inter-domain and Intra-domain Routing Security Mingwei Zhang April 19, 2016 Mingwei Zhang Internet Routing Security 1 / 54 Section Internet Routing Security Background Internet Routing
More informationMPLS VPN Carrier Supporting Carrier Using LDP and an IGP
MPLS VPN Carrier Supporting Carrier Using LDP and an IGP Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) Carrier Supporting Carrier (CSC) enables one MPLS VPN-based service provider
More informationChapter 4: Manipulating Routing
: Manipulating Routing Updates CCNP ROUTE: Implementing IP Routing ROUTE v6 1 Objectives Describe network performance issues and ways to control routing updates and traffic (3). Describe the purpose of
More information