LIFEGUARD: Practical Repair of Persistent Route Failures

Size: px
Start display at page:

Download "LIFEGUARD: Practical Repair of Persistent Route Failures"

Transcription

1 LIFEGUARD: Practical Repair of Persistent Route Failures Ethan Katz-Bassett (USC) Colin Scott, David Choffnes, Italo Cunha, Valas Valancius, Nick Feamster, Harsha Madhyastha, Tom Anderson, Arvind Krishnamurthy This work is generously funded in part by Google, Cisco and the NSF.

2 3

3 4

4 4

5 Long Outages Cause Most Unavailability! Monitor outages from Amazon s EC2! Fraction of outages of duration! X?! Fraction of unavailability due to outages of duration! X? 5

6 Long Outages Cause Most Unavailability! Monitor outages from Amazon s EC2! Fraction of outages of duration! X?! Fraction of unavailability due to outages of duration! X? 86% of outages last less than 5 minutes 5

7 Long Outages Cause Most Unavailability! Monitor outages from Amazon s EC2! Fraction of outages of duration! X?! Fraction of unavailability due to outages of duration! X? 86% of outages last less than 5 minutes 5

8 Long Outages Cause Most Unavailability! Monitor outages from Amazon s EC2! Fraction of outages of duration! X?! Fraction of unavailability due to outages of duration! X? 86% of outages last less than 5 minutes But longer outages account for 90% of the unavailability 5

9 Operators Struggle to Locate Failures Traffic attempting to pass through Level3 s network in the Washington, DC area is getting lost in the abyss. Here's a trace from Verizon residential to Level3. Outages mailing list, Dec

10 Operators Struggle to Locate Failures Traffic attempting to pass through Level3 s network in the Washington, DC area is getting lost in the abyss. Here's a trace from Verizon residential to Level3. Outages mailing list, Dec Mailing List User 1 1 Home router 2 Verizon in Baltimore 3 Verizon in Philly 4 Alter.net in DC 5 Level3 in DC 6 * * * 7 * * * 6

11 Operators Struggle to Locate Failures Traffic attempting to pass through Level3 s network in the Washington, DC area is getting lost in the abyss. Here's a trace from Verizon residential to Level3. Outages mailing list, Dec Mailing List User 1 1 Home router 2 Verizon in Baltimore 3 Verizon in Philly 4 Alter.net in DC 5 Level3 in DC 6 * * * 7 * * * 6 Mailing List User 2 1 Home router 2 Verizon in DC 3 Alter.net in DC 4 Level3 in DC 5 Level3 in Chicago 6 Level3 in Denver 7 * * * 8 * * *

12 Reasons for Long-Lasting Outages Long-term outages are:! Repaired over slow, human timescales! Not well understood! Caused by routers advertising paths that do not work! E.g., corrupted memory on line card causes black hole! E.g., bad cross-layer interactions cause failed MPLS tunnel! Complicated by lack of visibility into or control over routes in other ISPs 7

13 Our Approach and Outline LIFEGUARD: Locating Internet Failures Effectively and Generating Usable Alternate Routes Dynamically! Locate the ISP / link causing the problem! Suggest that other ISPs reroute around the problem 8

14 Our Approach and Outline LIFEGUARD: Locating Internet Failures Effectively and Generating Usable Alternate Routes Dynamically! Locate the ISP / link causing the problem! Building blocks! Example! Description of technique! Suggest that other ISPs reroute around the problem 8

15 Building blocks for failure isolation LIFEGUARD can use:! Ping to test reachability! Traceroute to measure forward path! Distributed vantage points (VPs)! PlanetLab for our experiments! Some can source spoof! Reverse traceroute to measure reverse path (NSDI 10)! Atlas of historical forward/reverse paths between VPs and targets 9

16 How does LIFEGUARD locate a failure? Before outage: Source: GMU Target: Smartkom! Historical atlas enables reasoning about changes! Traceroute yields only path from GMU to target! Reverse traceroute reveals path asymmetry 10

17 How does LIFEGUARD locate a failure? Before outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom! Historical atlas enables reasoning about changes! Traceroute yields only path from GMU to target! Reverse traceroute reveals path asymmetry 10

18 How does LIFEGUARD locate a failure? Before outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Historical atlas enables reasoning about changes! Traceroute yields only path from GMU to target! Reverse traceroute reveals path asymmetry 10

19 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom 11

20 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK? Source: GMU Target: Smartkom NTT Rostelecom 11

21 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? Level3 Telia TransTelecom ZSTTK? Source: GMU Target: Smartkom NTT Rostelecom 11

22 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? VP Level3 Telia TransTelecom ZSTTK? Source: GMU Target: Smartkom NTT Rostelecom 11

23 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? VP Level3 Telia TransTelecom ZSTTK? Source: GMU Target: Smartkom NTT Rostelecom 11

24 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? VP Level3 Telia TransTelecom ZSTTK Ping? Fr:VP Source: GMU? Target: Smartkom NTT Rostelecom 11

25 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? VP Level3 Telia TransTelecom ZSTTK Source: GMU? Ping? Fr:VP Target: Smartkom NTT Rostelecom 11

26 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? VP Level3 Telia TransTelecom ZSTTK Source: GMU? Ping? Fr:VP Target: Smartkom Ping! To:VP NTT Rostelecom 11

27 How does LIFEGUARD locate a failure? Ping! During outage: Problem with ZSTTK? To:VP VP Level3 Telia TransTelecom ZSTTK Source: GMU? Ping? Fr:VP Target: Smartkom NTT Rostelecom 11

28 How does LIFEGUARD locate a failure? Ping! During outage: Problem with ZSTTK? To:VP VP Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 11

29 How does LIFEGUARD locate a failure? Ping! During outage: Problem with ZSTTK? To:VP VP Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 11

30 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12

31 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12

32 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12

33 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK NTT:Ping? Fr:GMU Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12

34 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom GMU:Ping! NTT Fr:NTT Rostelecom! Forward path works 12

35 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12

36 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12

37 How does LIFEGUARD locate a failure? During outage: Rostele: Ping? Fr:GMU Source: GMU Level3 Telia TransTelecom ZSTTK Target: Smartkom NTT Rostelecom! Forward path works! Rostelcom is not forwarding traffic towards GMU 13

38 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works! Rostelcom is not forwarding traffic towards GMU 13

39 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works! Rostelcom is not forwarding traffic towards GMU 13

40 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works! Rostelcom is not forwarding traffic towards GMU 13

41 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works! Rostelcom is not forwarding traffic towards GMU 13

42 How LIFEGUARD Locates Failures LIFEGUARD: 1. Maintains background historical atlas 2. Isolates direction of failure, measures working direction 3. Tests historical paths in failing direction in order to prune candidate failure locations 4. Locates failure as being at the horizon of reachability 14

43 Our Approach and Outline LIFEGUARD: Locating Internet Failures Effectively and Generating Usable Alternate Routes Dynamically! Locate the ISP / link causing the problem! Suggest that other ISPs reroute around the problem 15

44 Our Approach and Outline LIFEGUARD: Locating Internet Failures Effectively and Generating Usable Alternate Routes Dynamically! Locate the ISP / link causing the problem! Suggest that other ISPs reroute around the problem! What would we like to add to BGP to enable this?! What can we deploy today, using only available protocols and router support? 15

45 Our Goal for Failure Avoidance! Enable content / service providers to repair persistent routing problems affecting them, regardless of which ISP is causing them Setting! Assume we can locate problem! Assume we are multi-homed / have multiple data centers! Assume we speak BGP! We use BGP-Mux to speak BGP to the real Internet: 5 US universities as providers 16

46 Self-Repair of Forward Paths Straightforward: Choose a path that avoids the problem. 17

47 Self-Repair of Forward Paths Straightforward: Choose a path that avoids the problem. 17

48 Self-Repair of Forward Paths Straightforward: Choose a path that avoids the problem. 17

49 Self-Repair of Forward Paths Straightforward: Choose a path that avoids the problem. 17

50 A Mechanism for Failure Avoidance Forward path: Choose route that avoids ISP or ISP-ISP link Reverse path: Want others to choose paths to my prefix P that avoid ISP or ISP-ISP link X! Want a BGP announcement AVOID(X,P):! Any ISP with a route to P that avoids X uses such a route! Any ISP not using X need only pass on the announcement 18

51 Ideal Self-Repair of Reverse Paths 19

52 Ideal Self-Repair of Reverse Paths AVOID(L3,WS) 19

53 Ideal Self-Repair of Reverse Paths AVOID(L3,WS) AVOID(L3,WS) 19

54 Ideal Self-Repair of Reverse Paths AVOID(L3,WS) AVOID(L3,WS) AVOID(L3,WS) 19

55 Ideal Self-Repair of Reverse Paths AVOID(L3,WS) AVOID(L3,WS) AVOID(L3,WS) 19

56 Do paths exist that AVOID problem? LIFEGUARD repairs outages by instructing others to avoid particular routes. Q: Do alternative routes exist? A: Alternate policy-compliant paths exist in 90% of simulated AVOID(X,P) announcements.! Simulated 10 million AVOIDs on actual measured routes. 20

57 Practical Self-Repair of Reverse Paths 21

58 Practical Self-Repair of Reverse Paths WS 21

59 Practical Self-Repair of Reverse Paths ATT! WS WS Qwest! WS 21

60 Practical Self-Repair of Reverse Paths L3! ATT! WS ATT! WS Sprint! Qwest! WS WS AISP! Qwest! WS Qwest! WS 21

61 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS AISP! Qwest! WS Qwest! WS 21

62 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS AISP! Qwest! WS Qwest! WS 21

63 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS AISP! Qwest! WS Qwest! WS 21

64 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS AISP! Qwest! WS Qwest! WS WS AVOID(L3,WS) 22

65 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS! L3! WS AISP! Qwest! WS Qwest! WS BGP loop prevention encourages switch to working path. 22

66 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS! L3! WS AISP! Qwest! WS Qwest! WS! L3! WS BGP loop prevention encourages switch to working path. 22

67 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS! L3! WS AISP! Qwest! WS! L3! WS Qwest! WS! L3! WS BGP loop prevention encourages switch to working path. 22

68 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint Sprint! Qwest! Qwest! WS! WS L3! WS WS! L3! WS Qwest! WS! L3! WS BGP loop prevention encourages switch to working path. 22

69 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS! L3! WS Sprint Sprint! Qwest! Qwest! WS! WS L3! WS WS! L3! WS BGP loop prevention encourages switch to working path. 22

70 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS? ATT! WS! L3! WS Sprint Sprint! Qwest! Qwest! WS! WS L3! WS WS! L3! WS BGP loop prevention encourages switch to working path. 22

71 Practical Self-Repair of Reverse Paths UW! Sprint L3! ATT! Qwest! WS! WS! L3! WS? ATT! WS! L3! WS Sprint Sprint! Qwest! Qwest! WS! WS L3! WS WS! L3! WS BGP loop prevention encourages switch to working path. 22

72 Practical Self-Repair of Reverse Paths UW! Sprint L3! ATT! Qwest! WS! WS! L3! WS? ATT! WS! L3! WS Sprint Sprint! Qwest! Qwest! WS! WS L3! WS WS! L3! WS BGP loop prevention encourages switch to working path. 22

73 Stuff I Don t Have Time to Talk About Results from real poisonings! Poisoning in the wild / poisoning anomalies! Case study of restoring connectivity Making poisoning flexible! Monitoring broken path while it is disabled! Allowing ISPs w/o alternatives to use disabled route LIFEGUARD s scalability! Overhead and speed of failure location! Router update load if many ISPs deploy our approach Alternatives to poisoning! Compatibility with secure routing (BGPSEC, etc.)! Comparing to other route control mechanisms 23

74 Can poisoning approximate AVOID effects? LIFEGUARD s poisoning repairs outages by disabling routes to induce route exploration. Q: Does poisoning disrupt working routes? A: No. As I will describe: (a) Under certain circumstances, we can disable a link without disabling the full ISP. (b) We can speed BGP convergence by carefully crafting announcements. 24

75 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O! We only want C3 to change its route, to avoid A-B2 25

76 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O! We only want C3 to change its route, to avoid A-B2 25

77 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O! We only want C3 to change its route, to avoid A-B2! Forward direction is easy: choose a different route 26

78 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O! We only want C3 to change its route, to avoid A-B2! Forward direction is easy: choose a different route 26

79 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O! We only want C3 to change its route, to avoid A-B2! Forward direction is easy: choose a different route 27

80 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP 28

81 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP 28

82 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O-O-O O-A-O O-A-O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP 29

83 What if some routes in an ISP still work? C2 A?? B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O-O-O O-A-O O-A-O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP 30

84 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! Selective advertising via just D1 is also blunt 31

85 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! Selective advertising via just D1 is also blunt 31

86 What if some routes in an ISP still work? A C2 C1 B1 O D1?? D2 B2? C3 C4 Network link Transitive link Original path New path O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! Selective advertising via just D1 is also blunt 32

87 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! If D1 and D2 (transitively) connect to different PoPs of A, selectively poison via D2 and not D1 33

88 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! If D1 and D2 (transitively) connect to different PoPs of A, selectively poison via D2 and not D1 33

89 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O-O-O O-A-O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! If D1 and D2 (transitively) connect to different PoPs of A, selectively poison via D2 and not D1 34

90 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O-O-O O-A-O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! If D1 and D2 (transitively) connect to different PoPs of A, selectively poison via D2 and not D1 35

91 Can poisoning approximate AVOID effects? LIFEGUARD s poisoning repairs outages by disabling routes to induce route exploration. Q: Does poisoning disrupt working routes? A: No. As I will describe: (a) Selective poisoning can avoid 73% of links without disabling entire AS. Real-world results from 5 provider BGP-Mux testbed (b) We can speed BGP convergence by carefully crafting announcements. 36

92 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O E-D-A-O D-A-O F-B-A-O A-O F E D C B A O B-A-O A-O O AVOID(X,P) 37

93 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O E-D-A-O D-A-O F-B-A-O A-O F E D C B A O B-A-O A-O O-X-O AVOID(X,P) 38

94 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O E-D-A-O D-A-O F-B-A-O A-O-X-O F E D C B A O B-A-O A-O-X-O O-X-O AVOID(X,P) 39

95 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O-X-O E-D-A-O D-A-O-X-O F-B-A-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 40

96 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O-X-O E-D-A-O B-A-O-X-O E-D-A-O D-A-O-X-O F-B-A-O D-A-O-X-O F-B-A-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 41

97 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O-X-O E-D-A-O B-A-O-X-O E-D-A-O D-A-O-X-O F-B-A-O D-A-O-X-O F-B-A-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 42

98 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O-X-O E-D-A-O B-A-O-X-O E-D-A-O D-A-O-X-O F-B-A-O D-A-O-X-O F-B-A-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 43

99 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O-X-O E-D-A-O-X-O D-A-O-X-O F-B-A-O-X-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 44

100 Prepend to Reduce Path Exploration! Most routing decisions based on: (1) next hop ISP (2) path length! Keep these fixed to speed convergence! Prepending prepares ISPs for later poison B-A-O-O-O E-D-A-O-O-O D-A-O-O-O F-B-A-O-O-O A-O-O-O F E D C B A O B-A-O-O-O A-O-O-O O-O-O AVOID(X,P) 45

101 Prepend to Reduce Path Exploration! Most routing decisions based on: (1) next hop ISP (2) path length! Keep these fixed to speed convergence! Prepending prepares ISPs for later poison B-A-O-O-O E-D-A-O-O-O D-A-O-O-O F-B-A-O-O-O A-O-O-O F E D C B A O B-A-O-O-O A-O-O-O O-O-O O-X-O AVOID(X,P) 46

102 Prepend to Reduce Path Exploration! Most routing decisions based on: (1) next hop ISP (2) path length! Keep these fixed to speed convergence! Prepending prepares ISPs for later poison B-A-O-O-O E-D-A-O-O-O D-A-O-O-O F-B-A-O-O-O A-O-O-O A-O-X-O F E D C B A O B-A-O-O-O A-O-X-O A-O-O-O O-O-O O-X-O AVOID(X,P) 47

103 Prepend to Reduce Path Exploration! Most routing decisions based on: (1) next hop ISP (2) path length! Keep these fixed to speed convergence! Prepending prepares ISPs for later poison B-A-O-X-O E-D-A-O-O-O D-A-O-X-O F-B-A-O-O-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 48

104 Prepend to Reduce Path Exploration! Most routing decisions based on: (1) next hop ISP (2) path length! Keep these fixed to speed convergence! Prepending prepares ISPs for later poison B-A-O-X-O E-D-A-O-X-O D-A-O-X-O F-B-A-O-X-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 49

105 Prepending Speeds Convergence Cumulative Fraction of Convergences (CDF) Prepend, no change No prepend, no change Peer Convergence Time (minutes)! With no prepend, only 65% of unaffected ISPs converge instantly! With prepending, 95% of unaffected ISPs re-converge instantly, 98%<1/2 min.! Also speeds convergence to new paths for affected peers 50

106 Conclusion! We increasingly depend on the Internet, but availability lags! Much of Internet unavailability due to long-lasting outages! LIFEGUARD: Let edge networks reroute around failures! Location challenge: Find problem, given unidirectional failures and tools that depend on connectivity! Use reverse traceroute, isolate directions, use historical view! Avoidance challenge: Reroute without participation of transit networks! BGP poisoning gives control to the destination! Well-crafted announcements ease concerns 51

Active BGP Measurement with BGP-Mux. Ethan Katz-Bassett (USC) with testbed and some slides hijacked from Nick Feamster and Valas Valancius

Active BGP Measurement with BGP-Mux. Ethan Katz-Bassett (USC) with testbed and some slides hijacked from Nick Feamster and Valas Valancius Active BGP Measurement with BGP-Mux Ethan Katz-Bassett (USC) with testbed and some slides hijacked from Nick Feamster and Valas Valancius 2 Before I Start Georgia Tech system, I am just an enthusiastic

More information

Studying Black Holes on the Internet with Hubble

Studying Black Holes on the Internet with Hubble Studying Black Holes on the Internet with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson University of Washington RIPE, May 2008 This

More information

Reverse Traceroute. NSDI, April 2010 This work partially supported by Cisco, Google, NSF

Reverse Traceroute. NSDI, April 2010 This work partially supported by Cisco, Google, NSF Reverse Traceroute Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay K. Adhikari, Colin Scott, Justine Sherry, Peter van Wesep, Arvind Krishnamurthy, Thomas Anderson NSDI, April 2010 This work partially

More information

Machiavellian Routing: Improving Internet Availability with BGP Poisoning

Machiavellian Routing: Improving Internet Availability with BGP Poisoning Machiavellian Routing: Improving Internet Availability with BGP Poisoning Ethan Katz-Bassett David R. Choffnes Ítalo Cunha Colin Scott Thomas Anderson Arvind Krishnamurthy University of Washington Technicolor

More information

Impactful Routing Research with the PEERING Testbed

Impactful Routing Research with the PEERING Testbed 1 Impactful Routing Research with the PEERING Testbed Combining intradomain emulation with real BGP connectivity Ethan Katz-Bassett (University of Southern California) with: Brandon Schlinker and Kyriakos

More information

PEERING: An AS for Us

PEERING: An AS for Us 1 : An AS for Us Ethan Katz-Bassett (University of Southern California) with: Brandon Schlinker and Kyriakos Zarifis (USC) Italo Cunha (UFMG Brazil) Nick Feamster (Georgia Tech) Supported By: : An AS for

More information

Sibyl A Practical Internet Route Oracle

Sibyl A Practical Internet Route Oracle Sibyl A Practical Internet Route Oracle Ítalo Cunha1, Pietro Marchetta2, Matt Calder3, Yi-Ching Chiu3 Brandon Schlinker3, Bruno Machado1, Antonio Pescapè2 Vasileios Giotsas4, Harsha Madhyastha5, Ethan

More information

Real-time Blackhole Analysis with Hubble

Real-time Blackhole Analysis with Hubble Real-time Blackhole Analysis with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, Thomas Anderson University of Washington NANOG 40, June 2007 1 Global Reachability

More information

JOINT NETWORK AND CONTENT ROUTING

JOINT NETWORK AND CONTENT ROUTING JOINT NETWORK AND CONTENT ROUTING OR, ON USING TRAFFIC ENGINEERING AT SERVICE LEVEL Vytautas Valancius, Bharath Ravi, Nick Feamster (Georgia Institute of Technology) Alex Snoeren (University of San Diego)

More information

Inter-Domain Routing: BGP II

Inter-Domain Routing: BGP II Inter-Domain Routing: BGP II Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 05/GZ01 4 th December 2014 BGP Protocol (cont d) BGP doesn t

More information

The Internet Measurement Toolbox. Justine Sherry, University of University of Puget Sound April 12, 2010

The Internet Measurement Toolbox. Justine Sherry, University of University of Puget Sound April 12, 2010 The Internet Measurement Toolbox Justine Sherry, University of Washington @ University of Puget Sound April 12, 2010 Research does not occur in an ivory tower of monastic isolation This work is the effort

More information

US West-Coast Future Internet Infrastructure Pacific Wave Update Pacific Research Platform International Routing Research Collaboration

US West-Coast Future Internet Infrastructure Pacific Wave Update Pacific Research Platform International Routing Research Collaboration SwitchON Workshop 16 October 2015 São Paulo, Brasil US West-Coast Future Internet Infrastructure Pacific Wave Update Pacific Research Platform International Routing Research Collaboration John Silvester,

More information

Some Foundational Problems in Interdomain Routing

Some Foundational Problems in Interdomain Routing Some Foundational Problems in Interdomain Routing Nick Feamster, Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Jennifer Rexford AT&T Labs -- Research The state of interdomain

More information

A Measurement Study of BGP Misconfiguration

A Measurement Study of BGP Misconfiguration A Measurement Study of BGP Misconfiguration Ratul Mahajan, David Wetherall, and Tom Anderson University of Washington Motivation Routing protocols are robust against failures Meaning fail-stop link and

More information

PoiRoot: Investigating the Root Cause of Interdomain Path Changes

PoiRoot: Investigating the Root Cause of Interdomain Path Changes PoiRoot: Investigating the Root Cause of Interdomain Path Changes Umar Javed University of Washington ujaved@cs.washington.edu Ethan Katz-Bassett University of Southern California ethan.kb@usc.edu Italo

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting

More information

Studying Black Holes in the Internet with Hubble

Studying Black Holes in the Internet with Hubble Studying Black Holes in the Internet with Hubble Ethan Katz-Bassett Harsha V. Madhyastha John P. John Arvind Krishnamurthy Abstract David Wetherall We present Hubble, a system that operates continuously

More information

Reverse traceroutes. Presented by F.E. Bustamante

Reverse traceroutes. Presented by F.E. Bustamante Reverse traceroutes Ethan Katz- Basse3, Harsha V. Madhyastha, Vijay K. Adhikari, Colin Sco3, JusCne Sherry, Peter van Wesep, Arvind Krishnamurthy, Thomas Anderson NSDI 2010 Presented by F.E. Bustamante

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

Pitfalls for ISP-friendly P2P design. Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD

Pitfalls for ISP-friendly P2P design. Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD Pitfalls for ISP-friendly P2P design Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD P2P & ISPs P2P systems: Large volume of traffic (20 80% of total)

More information

Measuring the Adoption of Route Origin Validation and Filtering

Measuring the Adoption of Route Origin Validation and Filtering Measuring the Adoption of Route Origin Validation and Filtering Andreas Reuter (andreas.reuter@fu-berlin.de) Joint work with Randy Bush, Ethan Katz-Bassett, Italo Cunha, Thomas C. Schmidt, and Matthias

More information

Routing on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP

Routing on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP Routing on the Internet Computer Networks Lecture 17: Inter-domain Routing and BGP In the beginning there was the ARPANET: route using GGP (Gateway-to-Gateway Protocol), a distance vector routing protocol

More information

Internet Measurements. Motivation

Internet Measurements. Motivation Internet Measurements Arvind Krishnamurthy Fall 2004 Motivation Types of measurements Understand the topology of the Internet Measure performance characteristics Tools: BGP Tables Traceroute measurements

More information

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage Lecture 16: Interdomain Routing CSE 123: Computer Networks Stefan Savage Overview Autonomous Systems Each network on the Internet has its own goals Path-vector Routing Allows scalable, informed route selection

More information

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell) A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers

More information

CS Networks and Distributed Systems. Lecture 8: Inter Domain Routing

CS Networks and Distributed Systems. Lecture 8: Inter Domain Routing CS 3700 Networks and Distributed Systems Lecture 8: Inter Domain Routing Revised 2/4/2014 Network Layer, Control Plane 2 Data Plane Application Presentation Session Transport Network Data Link Physical

More information

Practical Verification Techniques for Wide-Area Routing

Practical Verification Techniques for Wide-Area Routing Practical Verification Techniques for Wide-Area Routing Nick Feamster M.I.T. Computer Science and Artificial Intelligence Laboratory feamster@lcs.mit.edu http://nms.lcs.mit.edu/bgp/ (Thanks to Hari Balakrishnan

More information

Link State Routing & Inter-Domain Routing

Link State Routing & Inter-Domain Routing Link State Routing & Inter-Domain Routing CS640, 2015-02-26 Announcements Assignment #2 is due Tuesday Overview Link state routing Internet structure Border Gateway Protocol (BGP) Path vector routing Inter

More information

Introduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control

Introduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control Introduction Routing & Addressing: Multihoming 10/25/04 Hong Tat Tong Two attempts to control/ensure best performance over the Internet Multihoming from the endpoints Overlay with some help from middle-boxes

More information

Inter-Domain Routing: BGP II

Inter-Domain Routing: BGP II Inter-Domain Routing: BGP II Mark Handley UCL Computer Science CS 3035/GZ01 BGP Protocol (cont d) BGP doesn t chiefly aim to compute shortest paths (or minimize other metric, as do DV, LS) Chief purpose

More information

Lecture 17: Border Gateway Protocol

Lecture 17: Border Gateway Protocol Lecture 17: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren Some figures courtesy Mike Freedman Lecture 18 Overview Border Gateway Protocol (BGP) The canonical path vector protocol How

More information

Flooding Attacks by Exploiting Persistent Forwarding Loops

Flooding Attacks by Exploiting Persistent Forwarding Loops Flooding Attacks by Exploiting Persistent Forwarding Jianhong Xia, Lixin Gao, Teng Fei University of Massachusetts at Amherst {jxia, lgao, tfei}@ecs.umass.edu ABSTRACT In this paper, we present flooding

More information

Internet measurements: topology discovery and dynamics. Renata Teixeira MUSE Team Inria Paris-Rocquencourt

Internet measurements: topology discovery and dynamics. Renata Teixeira MUSE Team Inria Paris-Rocquencourt Internet measurements: topology discovery and dynamics Renata Teixeira MUSE Team Inria Paris-Rocquencourt Why measure the Internet topology? Network operators Assist in network management, fault diagnosis

More information

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Overview Business relationships between ASes Interdomain routing using BGP Advertisements Routing policy Integration with intradomain routing

More information

Interdomain Routing. EE122 Fall 2011 Scott Shenker

Interdomain Routing. EE122 Fall 2011 Scott Shenker Interdomain Routing EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC Berkeley

More information

Diagnosing Path Inflation of Mobile Client Traffic

Diagnosing Path Inflation of Mobile Client Traffic Diagnosing Path Inflation of Mobile Client Traffic Kyriakos Zarifis, Tobias Flach, Srikanth Nori, David Choffnes, Ramesh Govindan, Ethan Katz- Bassett, Z. Morley Mao, Matt Welsh University of Southern

More information

CS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013

CS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013 CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements

More information

Investigating Transparent Web Proxies in Cellular Networks

Investigating Transparent Web Proxies in Cellular Networks Investigating Transparent Web Proxies in Cellular Networks Xing Xu, Yurong Jiang, Tobias Flach, Ethan Katz-Bassett, David Choffnes, Ramesh Govindan USC & Northeastern University March 20, 2015 Introduction

More information

Routing and RFC AKA using BGP communities to influence routing

Routing and RFC AKA using BGP communities to influence routing Routing and RFC-1998 AKA using BGP communities to influence routing Routing and RFC-1998 Jason Sinclair and Bob Purdon PIPE Networks Ltd PIPE Networks What is RFC-1998? RFC-1988 discusses the use of the

More information

Interdomain Routing Reading: Sections K&R EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277)

Interdomain Routing Reading: Sections K&R EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277) Interdomain Routing Reading: Sections K&R 4.6.3 EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277) Guest Lecture by Brighten Godfrey Instructor: Vern Paxson TAs: Lisa Fowler, Daniel

More information

Towards a Logic for Wide-Area Internet Routing

Towards a Logic for Wide-Area Internet Routing Towards a Logic for Wide-Area Internet Routing Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory {feamster,hari}@lcs.mit.edu ; #, $. ', - -, * - ' * 4 *

More information

COM-208: Computer Networks - Homework 6

COM-208: Computer Networks - Homework 6 COM-208: Computer Networks - Homework 6. (P22) Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each

More information

Achieving scale: Large scale active measurements from PlanetLab

Achieving scale: Large scale active measurements from PlanetLab Achieving scale: Large scale active measurements from PlanetLab Marc-Olivier Buob, Jordan Augé (UPMC) 4th PhD School on Traffic Monitoring and Analysis (TMA) April 15th, 2014 London, UK OneLab FUTURE INTERNET

More information

Cisco. Maintaining Cisco Service Provider VPNs and MPLS Networks (MSPVM)

Cisco. Maintaining Cisco Service Provider VPNs and MPLS Networks (MSPVM) Cisco 642-780 Maintaining Cisco Service Provider VPNs and MPLS Networks (MSPVM) Download Full Version : http://killexams.com/pass4sure/exam-detail/642-780 QUESTION: 56 Which command should be used to verify

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also were

More information

Network Layer (Routing)

Network Layer (Routing) Network Layer (Routing) Border Gateway Protocol Structure of the Internet Networks (ISPs, CDNs, etc.) group with IP prefixes Networks are richly interconnected, often using IXPs Prefix E1 Net E IXP Prefix

More information

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:

More information

Lecture 19: Network Layer Routing in the Internet

Lecture 19: Network Layer Routing in the Internet Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F

More information

Lecture 18: Border Gateway Protocol

Lecture 18: Border Gateway Protocol Lecture 18: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday Some figures courtesy Mike Freedman & Craig Labovitz Lecture 18 Overview Path-vector Routing Allows scalable,

More information

Detailed Analysis of ISIS Routing Protocol on the Qwest Backbone:

Detailed Analysis of ISIS Routing Protocol on the Qwest Backbone: Detailed Analysis of ISIS Routing Protocol on the Qwest Backbone: A recipe for subsecond ISIS convergence Cengiz Alaettinoglu cengiz@packetdesign.com Stephen Casner casner@packetdesign.com Packet Design

More information

Lab - Mapping the Internet

Lab - Mapping the Internet Objectives Part 1: Test Network Connectivity Using Ping Part 2: Trace a Route to a Remote Server Using Windows Tracert Background Route tracing computer software is a utility that lists the networks data

More information

Measuring Adoption of RPKI Route Origin Validation and Filtering

Measuring Adoption of RPKI Route Origin Validation and Filtering PEERING The BGP Testbed Measuring Adoption of RPKI Route Origin Validation and Filtering Andreas Reuter (andreas.reuter@fu-berlin.de) Joint work with Randy Bush, Ethan Katz-Bassett, Italo Cunha, Thomas

More information

Backbone Networks. Networking Case Studies. Backbone Networks. Backbone Topology. Mike Freedman COS 461: Computer Networks.

Backbone Networks. Networking Case Studies. Backbone Networks. Backbone Topology. Mike Freedman COS 461: Computer Networks. Networking Case Studies Datacenter Backbone Networks Enterprise Backbone Mike Freedman COS 6: Computer Networks Cellular h>p://www.cs.princeton.edu/courses/archive/spr/cos6/ Wireless Backbone Networks

More information

Communication Networks

Communication Networks Communication Networks Spring 208 Roland Meier / Thomas Holterbach Slides: Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 9 208 Materials inspired from Scott Shenker & Jennifer Rexford Last

More information

Understanding Internet Path Failures: Location, Characterization, Correlation

Understanding Internet Path Failures: Location, Characterization, Correlation Understanding Internet Path Failures: Location, Characterization, Correlation Nick Feamster, David Andersen, Hari Balakrishnan M.I.T. Laboratory for Computer Science {feamster,dga,hari}@lcs.mit.edu Big

More information

Hot Potatoes Heat Up BGP Routing

Hot Potatoes Heat Up BGP Routing Hot Potatoes Heat Up BGP Routing Renata Teixeira Laboratoire d Informatique de Paris 6 Université Pierre et Marie Curie Amsterdam Internet Routing Architecture Verio AT&T AOL Web Server UCSD Sprint User

More information

APT: A Practical Transit-Mapping Service Overview and Comparisons

APT: A Practical Transit-Mapping Service Overview and Comparisons APT: A Practical Transit-Mapping Service Overview and Comparisons draft-jen-apt Dan Jen, Michael Meisel, Dan Massey, Lan Wang, Beichuan Zhang, and Lixia Zhang The Big Picture APT is similar to LISP at

More information

Understanding BGP Miscounfiguration

Understanding BGP Miscounfiguration Understanding Archana P Student of Department of Electrical & Computer Engineering Missouri University of Science and Technology appgqb@mst.edu 16 Feb 2017 Introduction Background Misconfiguration Outline

More information

Interdomain Routing (plus Transport Wrapup) Tom Anderson

Interdomain Routing (plus Transport Wrapup) Tom Anderson Interdomain Routing (plus Transport Wrapup) Tom Anderson A good network is one that I never have to think about Greg Minshall 2 Window TCP Known to be Suboptimal Small to moderate sized connections Intranets

More information

Interdomain Routing Reading: Sections P&D 4.3.{3,4}

Interdomain Routing Reading: Sections P&D 4.3.{3,4} Interdomain Routing Reading: Sections P&D 4.3.{3,4} EE122: Intro to Communication Networks Fall 2006 (MW 4:00-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/

More information

CMPE 151 Routing. Marc Mosko

CMPE 151 Routing. Marc Mosko CMPE 151 Routing Marc Mosko Talk Outline Routing basics Why segment networks? IP address/subnet mask The gateway decision based on dest IP address default gateway and static routing gateway discovery (DHCP,

More information

Multihoming with BGP and NAT

Multihoming with BGP and NAT Eliminating ISP as a single point of failure www.noction.com Table of Contents Introduction 1. R-NAT Configuration 1.1 NAT Configuration 5. ISPs Routers Configuration 3 15 7 7 5.1 ISP-A Configuration 5.2

More information

IP Addressing & Interdomain Routing. Next Topic

IP Addressing & Interdomain Routing. Next Topic IP Addressing & Interdomain Routing Next Topic IP Addressing Hierarchy (prefixes, class A, B, C, subnets) Interdomain routing Application Presentation Session Transport Network Data Link Physical Scalability

More information

Lecture 17: Router Design

Lecture 17: Router Design Lecture 17: Router Design CSE 123: Computer Networks Alex C. Snoeren Eample courtesy Mike Freedman Lecture 17 Overview Finish up BGP relationships Router internals Buffering Scheduling 2 Peer-to-Peer Relationship

More information

How does a router know where to send a packet next?

How does a router know where to send a packet next? How does a router know where to send a packet next? The Problem Which path should packets take from A to B? A B R2 R R4 R3 C D 2 The Internet forwards packets hop-by-hop Data IP Address Next-hop A R B

More information

SDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged

SDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged SDN Use-Cases internet exchange, home networks TELE4642: Week8 Materials from Prof. Nick Feamster is gratefully acknowledged Overview n SDX: A Software-Defined Internet Exchange n SDN-enabled Home Networks

More information

Lecture 17: Router Design

Lecture 17: Router Design Lecture 17: Router Design CSE 123: Computer Networks Alex C. Snoeren HW 3 due WEDNESDAY Eample courtesy Mike Freedman Lecture 17 Overview BGP relationships Router internals Buffering Scheduling 2 Business

More information

Quantifying Violations of Destination-based Forwarding on the Internet

Quantifying Violations of Destination-based Forwarding on the Internet Quantifying Violations of Destination-based Forwarding on the Internet Tobias Flach, Ethan Katz-Bassett, and Ramesh Govindan University of Southern California November 14, 2012 Destination-based Routing

More information

BGP#: A System for Dynamic Route Control In Data Centers

BGP#: A System for Dynamic Route Control In Data Centers BGP#: A System for Dynamic Route Control In Data Centers Chao-Chih Chen UC Davis* Lihua Yuan Albert Greenberg Randy Kern Tao Zhang Parantap Lahiri John Arnold Kevin Grady Microsoft *Also a Microsoft Intern

More information

BGP Policy violations in the data-plane

BGP Policy violations in the data-plane BGP Policy violations in the data-plane Pierre Francois, Institute IMDEA Networks Paolo Lucente, PMACCT pierre.francois@imdea.org paolo@pmacct.net Agenda Two well-known facts about routing... leading to

More information

Interdomain Routing. EE122 Fall 2012 Scott Shenker

Interdomain Routing. EE122 Fall 2012 Scott Shenker Interdomain Routing EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC Berkeley

More information

The Case for Separating Routing from Routers

The Case for Separating Routing from Routers The Case for Separating Routing from Routers Nick Feamster, Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Jennifer Rexford, Aman Shaikh, Kobus van der Merwe AT&T Labs

More information

iplane Nano: Path Prediction for Peer-to-Peer Applications

iplane Nano: Path Prediction for Peer-to-Peer Applications iplane Nano: Path Prediction for Peer-to-Peer Applications Harsha V. Madhyastha Ethan Katz-Bassett Thomas Anderson Arvind Krishnamurthy Arun Venkataramani Abstract Many peer-to-peer distributed applications

More information

Toward an Atlas of the Physical Internet

Toward an Atlas of the Physical Internet Toward an Atlas of the Physical Internet Winter 2014 Paul Barford Computer Sciences University of Wisconsin!! Motivation pb@cs.wisc.edu 1 Objectives of our work Create and maintain a comprehensive catalog

More information

Towards A Longitudinal Study of Adoption of RPKI-Based Route Filtering

Towards A Longitudinal Study of Adoption of RPKI-Based Route Filtering 1 Towards A Longitudinal Study of Adoption of RPKI-Based Route Filtering Ethan Katz-Bassett (University of Southern California) with: Andreas Reuter and Matthias Wahlisch (Freie Universität Berlin), Brandon

More information

Using BGP Communities

Using BGP Communities Using BGP Communities ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated

More information

Introduction to IP Routing. Geoff Huston

Introduction to IP Routing. Geoff Huston Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last

More information

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP) Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be

More information

CS 557 Internet Routing Policies

CS 557 Internet Routing Policies CS 557 Internet Routing Policies On Inferring and Characterizing Internet Routing Policies Feng Wang and Lixin Gao, 2003 Spring 2013 Characterizing Routing Policies Objective: Infer and characterize BGP

More information

Module 16 An Internet Exchange Point

Module 16 An Internet Exchange Point ISP Workshop Lab Module 16 An Internet Exchange Point Objective: To investigate methods for connecting to an Internet Exchange Point. Prerequisites: Modules 12 and 13, and the Exchange Points Presentation

More information

Routing Outline. EECS 122, Lecture 15

Routing Outline. EECS 122, Lecture 15 Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall

More information

Module 1b IS-IS. Prerequisites: The setup section of Module 1. The following will be the common topology used for the first series of labs.

Module 1b IS-IS. Prerequisites: The setup section of Module 1. The following will be the common topology used for the first series of labs. Module 1b IS-IS Objective: Create a basic physical lab interconnection with one IS-IS Area. Ensure that all routers, interfaces, cables and connections are working properly. Prerequisites: The setup section

More information

A Case For OneSwarm. Tom Anderson University of Washington.

A Case For OneSwarm. Tom Anderson University of Washington. A Case For OneSwarm Tom Anderson University of Washington http://oneswarm.cs.washington.edu/ With: Jarret Falkner, Tomas Isdal, Alex Jaffe, John P. John, Arvind Krishnamurthy, Harsha Madhyastha and Mike

More information

BGP Case Studies. ISP Workshops

BGP Case Studies. ISP Workshops BGP Case Studies ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated

More information

TBGP: A more scalable and functional BGP. Paul Francis Jan. 2004

TBGP: A more scalable and functional BGP. Paul Francis Jan. 2004 TBGP: A more scalable and functional BGP Paul Francis Jan. 2004 BGP: Border Gateway Protocol BGP is the top-level routing protocol in the Internet It holds the Internet together BGP allows routers to tell

More information

BGP101. Howard C. Berkowitz. (703)

BGP101. Howard C. Berkowitz. (703) BGP101 Howard C. Berkowitz hcb@clark.net (703)998-5819 What is the Problem to be Solved? Just configuring the protocol? Participating in the Internet and/or running Virtual Private Networks A Life Cycle

More information

Destination Reachability and BGP Convergence Time. Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA)

Destination Reachability and BGP Convergence Time. Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA) Destination Reachability and BGP Convergence Time Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA) Packet Delivery and Routing Dynamics The primary goal of routing is to deliver packets.

More information

CS118 Discussion 1A, Week 7. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

CS118 Discussion 1A, Week 7. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. CS118 Discussion 1A, Week 7 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Network control plane Routing Link state routing (OSPF) Distance vector routing (RIP) BGP ICMP Midterm/Project 2

More information

Moving Beyond End-to-End Path Information to Optimize CDN Performance

Moving Beyond End-to-End Path Information to Optimize CDN Performance Moving Beyond End-to-End Path Information to Optimize CDN Performance Rupa Krishnan Harsha V. Madhyastha Sridhar Srinivasan Sushant Jain Arvind Krishnamurthy Thomas Anderson Jie Gao Google Inc. University

More information

Towards root cause analysis of BGP routing dynamics. Matthew Caesar, Lakshmi Subramanian, Randy H. Katz

Towards root cause analysis of BGP routing dynamics. Matthew Caesar, Lakshmi Subramanian, Randy H. Katz Towards root cause analysis of BGP routing dynamics Matthew Caesar, Lakshmi Subramanian, Randy H. Katz mccaesar@cs.berkeley.edu Motivation Interdomain routing suffers from many problems Instability Slow

More information

A Configuration-only Approach to FIB Reduction. Paul Francis Hitesh Ballani, Tuan Cao Cornell

A Configuration-only Approach to FIB Reduction. Paul Francis Hitesh Ballani, Tuan Cao Cornell A Configuration-only Approach to FIB Reduction Paul Francis Hitesh Ballani, Tuan Cao Cornell Virtual Aggregation An approach to shrinking FIBs (and RIBs) In interface-card FIB, maybe control-card RIB Works

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 15 BGP Spring 2018 Rachit Agarwal Autonomous System (AS) or Domain Region of a network under a single administrative entity Border Routers Interior

More information

FACT: Flow-based Approach for Connectivity Tracking

FACT: Flow-based Approach for Connectivity Tracking FACT: Flow-based Approach for Connectivity Tracking Dominik Schatzmann 1, Simon Leinen 2, Jochen Kögel 3, and Wolfgang Mühlbauer 1 1 ETH Zurich, {schatzmann,muehlbauer}@tik.ee.ethz.ch 2 SWITCH, simon.leinen@switch.ch

More information

DailyCatch: A Provider-centric View of Anycast Behaviour

DailyCatch: A Provider-centric View of Anycast Behaviour DailyCatch: A Provider-centric View of Anycast Behaviour Stephen McQuistin University of Glasgow Sree Priyanka Uppu Marcel Flores Verizon Digital Media Services What is IP anycast? 2 What is IP anycast?

More information

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol) Intra-domain routing The Story So Far Routing protocols generate the forwarding

More information

Internet Infrastructure

Internet Infrastructure Internet Infrastructure Internet Infrastructure Local and inter-domain routing TCP/IP for routing and messaging BGP for routing announcements Domain Name System Find IP address from symbolic name (www.cc.gatech.edu)

More information

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.

More information

Effects of Internet Path Selection on Video-QoE

Effects of Internet Path Selection on Video-QoE Effects of Internet Path Selection on Video-QoE by Mukundan Venkataraman & Mainak Chatterjee Dept. of EECS University of Central Florida, Orlando, FL 32826 mukundan@eecs.ucf.edu mainak@eecs.ucf.edu Streaming

More information

Multihoming Complex Cases & Caveats

Multihoming Complex Cases & Caveats Multihoming Complex Cases & Caveats ISP Workshops Last updated 6 October 2011 Complex Cases & Caveats p Complex Cases n Multiple Transits n Multi-exit backbone n Disconnected Backbone n IDC Multihoming

More information