LIFEGUARD: Practical Repair of Persistent Route Failures
|
|
- Melinda Powers
- 5 years ago
- Views:
Transcription
1 LIFEGUARD: Practical Repair of Persistent Route Failures Ethan Katz-Bassett (USC) Colin Scott, David Choffnes, Italo Cunha, Valas Valancius, Nick Feamster, Harsha Madhyastha, Tom Anderson, Arvind Krishnamurthy This work is generously funded in part by Google, Cisco and the NSF.
2 3
3 4
4 4
5 Long Outages Cause Most Unavailability! Monitor outages from Amazon s EC2! Fraction of outages of duration! X?! Fraction of unavailability due to outages of duration! X? 5
6 Long Outages Cause Most Unavailability! Monitor outages from Amazon s EC2! Fraction of outages of duration! X?! Fraction of unavailability due to outages of duration! X? 86% of outages last less than 5 minutes 5
7 Long Outages Cause Most Unavailability! Monitor outages from Amazon s EC2! Fraction of outages of duration! X?! Fraction of unavailability due to outages of duration! X? 86% of outages last less than 5 minutes 5
8 Long Outages Cause Most Unavailability! Monitor outages from Amazon s EC2! Fraction of outages of duration! X?! Fraction of unavailability due to outages of duration! X? 86% of outages last less than 5 minutes But longer outages account for 90% of the unavailability 5
9 Operators Struggle to Locate Failures Traffic attempting to pass through Level3 s network in the Washington, DC area is getting lost in the abyss. Here's a trace from Verizon residential to Level3. Outages mailing list, Dec
10 Operators Struggle to Locate Failures Traffic attempting to pass through Level3 s network in the Washington, DC area is getting lost in the abyss. Here's a trace from Verizon residential to Level3. Outages mailing list, Dec Mailing List User 1 1 Home router 2 Verizon in Baltimore 3 Verizon in Philly 4 Alter.net in DC 5 Level3 in DC 6 * * * 7 * * * 6
11 Operators Struggle to Locate Failures Traffic attempting to pass through Level3 s network in the Washington, DC area is getting lost in the abyss. Here's a trace from Verizon residential to Level3. Outages mailing list, Dec Mailing List User 1 1 Home router 2 Verizon in Baltimore 3 Verizon in Philly 4 Alter.net in DC 5 Level3 in DC 6 * * * 7 * * * 6 Mailing List User 2 1 Home router 2 Verizon in DC 3 Alter.net in DC 4 Level3 in DC 5 Level3 in Chicago 6 Level3 in Denver 7 * * * 8 * * *
12 Reasons for Long-Lasting Outages Long-term outages are:! Repaired over slow, human timescales! Not well understood! Caused by routers advertising paths that do not work! E.g., corrupted memory on line card causes black hole! E.g., bad cross-layer interactions cause failed MPLS tunnel! Complicated by lack of visibility into or control over routes in other ISPs 7
13 Our Approach and Outline LIFEGUARD: Locating Internet Failures Effectively and Generating Usable Alternate Routes Dynamically! Locate the ISP / link causing the problem! Suggest that other ISPs reroute around the problem 8
14 Our Approach and Outline LIFEGUARD: Locating Internet Failures Effectively and Generating Usable Alternate Routes Dynamically! Locate the ISP / link causing the problem! Building blocks! Example! Description of technique! Suggest that other ISPs reroute around the problem 8
15 Building blocks for failure isolation LIFEGUARD can use:! Ping to test reachability! Traceroute to measure forward path! Distributed vantage points (VPs)! PlanetLab for our experiments! Some can source spoof! Reverse traceroute to measure reverse path (NSDI 10)! Atlas of historical forward/reverse paths between VPs and targets 9
16 How does LIFEGUARD locate a failure? Before outage: Source: GMU Target: Smartkom! Historical atlas enables reasoning about changes! Traceroute yields only path from GMU to target! Reverse traceroute reveals path asymmetry 10
17 How does LIFEGUARD locate a failure? Before outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom! Historical atlas enables reasoning about changes! Traceroute yields only path from GMU to target! Reverse traceroute reveals path asymmetry 10
18 How does LIFEGUARD locate a failure? Before outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Historical atlas enables reasoning about changes! Traceroute yields only path from GMU to target! Reverse traceroute reveals path asymmetry 10
19 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom 11
20 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK? Source: GMU Target: Smartkom NTT Rostelecom 11
21 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? Level3 Telia TransTelecom ZSTTK? Source: GMU Target: Smartkom NTT Rostelecom 11
22 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? VP Level3 Telia TransTelecom ZSTTK? Source: GMU Target: Smartkom NTT Rostelecom 11
23 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? VP Level3 Telia TransTelecom ZSTTK? Source: GMU Target: Smartkom NTT Rostelecom 11
24 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? VP Level3 Telia TransTelecom ZSTTK Ping? Fr:VP Source: GMU? Target: Smartkom NTT Rostelecom 11
25 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? VP Level3 Telia TransTelecom ZSTTK Source: GMU? Ping? Fr:VP Target: Smartkom NTT Rostelecom 11
26 How does LIFEGUARD locate a failure? During outage: Problem with ZSTTK? VP Level3 Telia TransTelecom ZSTTK Source: GMU? Ping? Fr:VP Target: Smartkom Ping! To:VP NTT Rostelecom 11
27 How does LIFEGUARD locate a failure? Ping! During outage: Problem with ZSTTK? To:VP VP Level3 Telia TransTelecom ZSTTK Source: GMU? Ping? Fr:VP Target: Smartkom NTT Rostelecom 11
28 How does LIFEGUARD locate a failure? Ping! During outage: Problem with ZSTTK? To:VP VP Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 11
29 How does LIFEGUARD locate a failure? Ping! During outage: Problem with ZSTTK? To:VP VP Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 11
30 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12
31 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12
32 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12
33 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK NTT:Ping? Fr:GMU Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12
34 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom GMU:Ping! NTT Fr:NTT Rostelecom! Forward path works 12
35 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12
36 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works 12
37 How does LIFEGUARD locate a failure? During outage: Rostele: Ping? Fr:GMU Source: GMU Level3 Telia TransTelecom ZSTTK Target: Smartkom NTT Rostelecom! Forward path works! Rostelcom is not forwarding traffic towards GMU 13
38 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works! Rostelcom is not forwarding traffic towards GMU 13
39 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works! Rostelcom is not forwarding traffic towards GMU 13
40 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works! Rostelcom is not forwarding traffic towards GMU 13
41 How does LIFEGUARD locate a failure? During outage: Level3 Telia TransTelecom ZSTTK Source: GMU Target: Smartkom NTT Rostelecom! Forward path works! Rostelcom is not forwarding traffic towards GMU 13
42 How LIFEGUARD Locates Failures LIFEGUARD: 1. Maintains background historical atlas 2. Isolates direction of failure, measures working direction 3. Tests historical paths in failing direction in order to prune candidate failure locations 4. Locates failure as being at the horizon of reachability 14
43 Our Approach and Outline LIFEGUARD: Locating Internet Failures Effectively and Generating Usable Alternate Routes Dynamically! Locate the ISP / link causing the problem! Suggest that other ISPs reroute around the problem 15
44 Our Approach and Outline LIFEGUARD: Locating Internet Failures Effectively and Generating Usable Alternate Routes Dynamically! Locate the ISP / link causing the problem! Suggest that other ISPs reroute around the problem! What would we like to add to BGP to enable this?! What can we deploy today, using only available protocols and router support? 15
45 Our Goal for Failure Avoidance! Enable content / service providers to repair persistent routing problems affecting them, regardless of which ISP is causing them Setting! Assume we can locate problem! Assume we are multi-homed / have multiple data centers! Assume we speak BGP! We use BGP-Mux to speak BGP to the real Internet: 5 US universities as providers 16
46 Self-Repair of Forward Paths Straightforward: Choose a path that avoids the problem. 17
47 Self-Repair of Forward Paths Straightforward: Choose a path that avoids the problem. 17
48 Self-Repair of Forward Paths Straightforward: Choose a path that avoids the problem. 17
49 Self-Repair of Forward Paths Straightforward: Choose a path that avoids the problem. 17
50 A Mechanism for Failure Avoidance Forward path: Choose route that avoids ISP or ISP-ISP link Reverse path: Want others to choose paths to my prefix P that avoid ISP or ISP-ISP link X! Want a BGP announcement AVOID(X,P):! Any ISP with a route to P that avoids X uses such a route! Any ISP not using X need only pass on the announcement 18
51 Ideal Self-Repair of Reverse Paths 19
52 Ideal Self-Repair of Reverse Paths AVOID(L3,WS) 19
53 Ideal Self-Repair of Reverse Paths AVOID(L3,WS) AVOID(L3,WS) 19
54 Ideal Self-Repair of Reverse Paths AVOID(L3,WS) AVOID(L3,WS) AVOID(L3,WS) 19
55 Ideal Self-Repair of Reverse Paths AVOID(L3,WS) AVOID(L3,WS) AVOID(L3,WS) 19
56 Do paths exist that AVOID problem? LIFEGUARD repairs outages by instructing others to avoid particular routes. Q: Do alternative routes exist? A: Alternate policy-compliant paths exist in 90% of simulated AVOID(X,P) announcements.! Simulated 10 million AVOIDs on actual measured routes. 20
57 Practical Self-Repair of Reverse Paths 21
58 Practical Self-Repair of Reverse Paths WS 21
59 Practical Self-Repair of Reverse Paths ATT! WS WS Qwest! WS 21
60 Practical Self-Repair of Reverse Paths L3! ATT! WS ATT! WS Sprint! Qwest! WS WS AISP! Qwest! WS Qwest! WS 21
61 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS AISP! Qwest! WS Qwest! WS 21
62 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS AISP! Qwest! WS Qwest! WS 21
63 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS AISP! Qwest! WS Qwest! WS 21
64 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS AISP! Qwest! WS Qwest! WS WS AVOID(L3,WS) 22
65 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS! L3! WS AISP! Qwest! WS Qwest! WS BGP loop prevention encourages switch to working path. 22
66 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS! L3! WS AISP! Qwest! WS Qwest! WS! L3! WS BGP loop prevention encourages switch to working path. 22
67 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint! Qwest! WS WS! L3! WS AISP! Qwest! WS! L3! WS Qwest! WS! L3! WS BGP loop prevention encourages switch to working path. 22
68 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS Sprint Sprint! Qwest! Qwest! WS! WS L3! WS WS! L3! WS Qwest! WS! L3! WS BGP loop prevention encourages switch to working path. 22
69 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS L3! ATT! WS ATT! WS! L3! WS Sprint Sprint! Qwest! Qwest! WS! WS L3! WS WS! L3! WS BGP loop prevention encourages switch to working path. 22
70 Practical Self-Repair of Reverse Paths UW! L3! ATT! WS? ATT! WS! L3! WS Sprint Sprint! Qwest! Qwest! WS! WS L3! WS WS! L3! WS BGP loop prevention encourages switch to working path. 22
71 Practical Self-Repair of Reverse Paths UW! Sprint L3! ATT! Qwest! WS! WS! L3! WS? ATT! WS! L3! WS Sprint Sprint! Qwest! Qwest! WS! WS L3! WS WS! L3! WS BGP loop prevention encourages switch to working path. 22
72 Practical Self-Repair of Reverse Paths UW! Sprint L3! ATT! Qwest! WS! WS! L3! WS? ATT! WS! L3! WS Sprint Sprint! Qwest! Qwest! WS! WS L3! WS WS! L3! WS BGP loop prevention encourages switch to working path. 22
73 Stuff I Don t Have Time to Talk About Results from real poisonings! Poisoning in the wild / poisoning anomalies! Case study of restoring connectivity Making poisoning flexible! Monitoring broken path while it is disabled! Allowing ISPs w/o alternatives to use disabled route LIFEGUARD s scalability! Overhead and speed of failure location! Router update load if many ISPs deploy our approach Alternatives to poisoning! Compatibility with secure routing (BGPSEC, etc.)! Comparing to other route control mechanisms 23
74 Can poisoning approximate AVOID effects? LIFEGUARD s poisoning repairs outages by disabling routes to induce route exploration. Q: Does poisoning disrupt working routes? A: No. As I will describe: (a) Under certain circumstances, we can disable a link without disabling the full ISP. (b) We can speed BGP convergence by carefully crafting announcements. 24
75 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O! We only want C3 to change its route, to avoid A-B2 25
76 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O! We only want C3 to change its route, to avoid A-B2 25
77 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O! We only want C3 to change its route, to avoid A-B2! Forward direction is easy: choose a different route 26
78 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O! We only want C3 to change its route, to avoid A-B2! Forward direction is easy: choose a different route 26
79 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O! We only want C3 to change its route, to avoid A-B2! Forward direction is easy: choose a different route 27
80 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP 28
81 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP 28
82 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O-O-O O-A-O O-A-O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP 29
83 What if some routes in an ISP still work? C2 A?? B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O-O-O O-A-O O-A-O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP 30
84 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! Selective advertising via just D1 is also blunt 31
85 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Original path New path C1 D1 D2 C4 O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! Selective advertising via just D1 is also blunt 31
86 What if some routes in an ISP still work? A C2 C1 B1 O D1?? D2 B2? C3 C4 Network link Transitive link Original path New path O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! Selective advertising via just D1 is also blunt 32
87 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! If D1 and D2 (transitively) connect to different PoPs of A, selectively poison via D2 and not D1 33
88 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! If D1 and D2 (transitively) connect to different PoPs of A, selectively poison via D2 and not D1 33
89 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O-O-O O-A-O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! If D1 and D2 (transitively) connect to different PoPs of A, selectively poison via D2 and not D1 34
90 What if some routes in an ISP still work? A C2 B1 B2 C3 Network link Transitive link Pre-poisoning path Post-poisoning path C1 D1 D2 C4 O-O-O O-A-O O! We only want C3 to change its route, to avoid A-B2! Poisoning seems blunt, disabling an entire ISP! If D1 and D2 (transitively) connect to different PoPs of A, selectively poison via D2 and not D1 35
91 Can poisoning approximate AVOID effects? LIFEGUARD s poisoning repairs outages by disabling routes to induce route exploration. Q: Does poisoning disrupt working routes? A: No. As I will describe: (a) Selective poisoning can avoid 73% of links without disabling entire AS. Real-world results from 5 provider BGP-Mux testbed (b) We can speed BGP convergence by carefully crafting announcements. 36
92 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O E-D-A-O D-A-O F-B-A-O A-O F E D C B A O B-A-O A-O O AVOID(X,P) 37
93 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O E-D-A-O D-A-O F-B-A-O A-O F E D C B A O B-A-O A-O O-X-O AVOID(X,P) 38
94 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O E-D-A-O D-A-O F-B-A-O A-O-X-O F E D C B A O B-A-O A-O-X-O O-X-O AVOID(X,P) 39
95 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O-X-O E-D-A-O D-A-O-X-O F-B-A-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 40
96 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O-X-O E-D-A-O B-A-O-X-O E-D-A-O D-A-O-X-O F-B-A-O D-A-O-X-O F-B-A-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 41
97 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O-X-O E-D-A-O B-A-O-X-O E-D-A-O D-A-O-X-O F-B-A-O D-A-O-X-O F-B-A-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 42
98 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O-X-O E-D-A-O B-A-O-X-O E-D-A-O D-A-O-X-O F-B-A-O D-A-O-X-O F-B-A-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 43
99 Naive Poisoning Causes Transient Loss! Some ISPs may have working paths that avoid problem ISP X! Naively, poisoning causes path exploration even for these ISPs! Path exploration causes transient loss B-A-O-X-O E-D-A-O-X-O D-A-O-X-O F-B-A-O-X-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 44
100 Prepend to Reduce Path Exploration! Most routing decisions based on: (1) next hop ISP (2) path length! Keep these fixed to speed convergence! Prepending prepares ISPs for later poison B-A-O-O-O E-D-A-O-O-O D-A-O-O-O F-B-A-O-O-O A-O-O-O F E D C B A O B-A-O-O-O A-O-O-O O-O-O AVOID(X,P) 45
101 Prepend to Reduce Path Exploration! Most routing decisions based on: (1) next hop ISP (2) path length! Keep these fixed to speed convergence! Prepending prepares ISPs for later poison B-A-O-O-O E-D-A-O-O-O D-A-O-O-O F-B-A-O-O-O A-O-O-O F E D C B A O B-A-O-O-O A-O-O-O O-O-O O-X-O AVOID(X,P) 46
102 Prepend to Reduce Path Exploration! Most routing decisions based on: (1) next hop ISP (2) path length! Keep these fixed to speed convergence! Prepending prepares ISPs for later poison B-A-O-O-O E-D-A-O-O-O D-A-O-O-O F-B-A-O-O-O A-O-O-O A-O-X-O F E D C B A O B-A-O-O-O A-O-X-O A-O-O-O O-O-O O-X-O AVOID(X,P) 47
103 Prepend to Reduce Path Exploration! Most routing decisions based on: (1) next hop ISP (2) path length! Keep these fixed to speed convergence! Prepending prepares ISPs for later poison B-A-O-X-O E-D-A-O-O-O D-A-O-X-O F-B-A-O-O-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 48
104 Prepend to Reduce Path Exploration! Most routing decisions based on: (1) next hop ISP (2) path length! Keep these fixed to speed convergence! Prepending prepares ISPs for later poison B-A-O-X-O E-D-A-O-X-O D-A-O-X-O F-B-A-O-X-O A-O-X-O F E D C B A O B-A-O-X-O A-O-X-O O-X-O AVOID(X,P) 49
105 Prepending Speeds Convergence Cumulative Fraction of Convergences (CDF) Prepend, no change No prepend, no change Peer Convergence Time (minutes)! With no prepend, only 65% of unaffected ISPs converge instantly! With prepending, 95% of unaffected ISPs re-converge instantly, 98%<1/2 min.! Also speeds convergence to new paths for affected peers 50
106 Conclusion! We increasingly depend on the Internet, but availability lags! Much of Internet unavailability due to long-lasting outages! LIFEGUARD: Let edge networks reroute around failures! Location challenge: Find problem, given unidirectional failures and tools that depend on connectivity! Use reverse traceroute, isolate directions, use historical view! Avoidance challenge: Reroute without participation of transit networks! BGP poisoning gives control to the destination! Well-crafted announcements ease concerns 51
Active BGP Measurement with BGP-Mux. Ethan Katz-Bassett (USC) with testbed and some slides hijacked from Nick Feamster and Valas Valancius
Active BGP Measurement with BGP-Mux Ethan Katz-Bassett (USC) with testbed and some slides hijacked from Nick Feamster and Valas Valancius 2 Before I Start Georgia Tech system, I am just an enthusiastic
More informationStudying Black Holes on the Internet with Hubble
Studying Black Holes on the Internet with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson University of Washington RIPE, May 2008 This
More informationReverse Traceroute. NSDI, April 2010 This work partially supported by Cisco, Google, NSF
Reverse Traceroute Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay K. Adhikari, Colin Scott, Justine Sherry, Peter van Wesep, Arvind Krishnamurthy, Thomas Anderson NSDI, April 2010 This work partially
More informationMachiavellian Routing: Improving Internet Availability with BGP Poisoning
Machiavellian Routing: Improving Internet Availability with BGP Poisoning Ethan Katz-Bassett David R. Choffnes Ítalo Cunha Colin Scott Thomas Anderson Arvind Krishnamurthy University of Washington Technicolor
More informationImpactful Routing Research with the PEERING Testbed
1 Impactful Routing Research with the PEERING Testbed Combining intradomain emulation with real BGP connectivity Ethan Katz-Bassett (University of Southern California) with: Brandon Schlinker and Kyriakos
More informationPEERING: An AS for Us
1 : An AS for Us Ethan Katz-Bassett (University of Southern California) with: Brandon Schlinker and Kyriakos Zarifis (USC) Italo Cunha (UFMG Brazil) Nick Feamster (Georgia Tech) Supported By: : An AS for
More informationSibyl A Practical Internet Route Oracle
Sibyl A Practical Internet Route Oracle Ítalo Cunha1, Pietro Marchetta2, Matt Calder3, Yi-Ching Chiu3 Brandon Schlinker3, Bruno Machado1, Antonio Pescapè2 Vasileios Giotsas4, Harsha Madhyastha5, Ethan
More informationReal-time Blackhole Analysis with Hubble
Real-time Blackhole Analysis with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, Thomas Anderson University of Washington NANOG 40, June 2007 1 Global Reachability
More informationJOINT NETWORK AND CONTENT ROUTING
JOINT NETWORK AND CONTENT ROUTING OR, ON USING TRAFFIC ENGINEERING AT SERVICE LEVEL Vytautas Valancius, Bharath Ravi, Nick Feamster (Georgia Institute of Technology) Alex Snoeren (University of San Diego)
More informationInter-Domain Routing: BGP II
Inter-Domain Routing: BGP II Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 05/GZ01 4 th December 2014 BGP Protocol (cont d) BGP doesn t
More informationThe Internet Measurement Toolbox. Justine Sherry, University of University of Puget Sound April 12, 2010
The Internet Measurement Toolbox Justine Sherry, University of Washington @ University of Puget Sound April 12, 2010 Research does not occur in an ivory tower of monastic isolation This work is the effort
More informationUS West-Coast Future Internet Infrastructure Pacific Wave Update Pacific Research Platform International Routing Research Collaboration
SwitchON Workshop 16 October 2015 São Paulo, Brasil US West-Coast Future Internet Infrastructure Pacific Wave Update Pacific Research Platform International Routing Research Collaboration John Silvester,
More informationSome Foundational Problems in Interdomain Routing
Some Foundational Problems in Interdomain Routing Nick Feamster, Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Jennifer Rexford AT&T Labs -- Research The state of interdomain
More informationA Measurement Study of BGP Misconfiguration
A Measurement Study of BGP Misconfiguration Ratul Mahajan, David Wetherall, and Tom Anderson University of Washington Motivation Routing protocols are robust against failures Meaning fail-stop link and
More informationPoiRoot: Investigating the Root Cause of Interdomain Path Changes
PoiRoot: Investigating the Root Cause of Interdomain Path Changes Umar Javed University of Washington ujaved@cs.washington.edu Ethan Katz-Bassett University of Southern California ethan.kb@usc.edu Italo
More informationLecture 13: Traffic Engineering
Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting
More informationStudying Black Holes in the Internet with Hubble
Studying Black Holes in the Internet with Hubble Ethan Katz-Bassett Harsha V. Madhyastha John P. John Arvind Krishnamurthy Abstract David Wetherall We present Hubble, a system that operates continuously
More informationReverse traceroutes. Presented by F.E. Bustamante
Reverse traceroutes Ethan Katz- Basse3, Harsha V. Madhyastha, Vijay K. Adhikari, Colin Sco3, JusCne Sherry, Peter van Wesep, Arvind Krishnamurthy, Thomas Anderson NSDI 2010 Presented by F.E. Bustamante
More informationDynamics of Hot-Potato Routing in IP Networks
Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)
More informationPitfalls for ISP-friendly P2P design. Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD
Pitfalls for ISP-friendly P2P design Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD P2P & ISPs P2P systems: Large volume of traffic (20 80% of total)
More informationMeasuring the Adoption of Route Origin Validation and Filtering
Measuring the Adoption of Route Origin Validation and Filtering Andreas Reuter (andreas.reuter@fu-berlin.de) Joint work with Randy Bush, Ethan Katz-Bassett, Italo Cunha, Thomas C. Schmidt, and Matthias
More informationRouting on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP
Routing on the Internet Computer Networks Lecture 17: Inter-domain Routing and BGP In the beginning there was the ARPANET: route using GGP (Gateway-to-Gateway Protocol), a distance vector routing protocol
More informationInternet Measurements. Motivation
Internet Measurements Arvind Krishnamurthy Fall 2004 Motivation Types of measurements Understand the topology of the Internet Measure performance characteristics Tools: BGP Tables Traceroute measurements
More informationLecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage
Lecture 16: Interdomain Routing CSE 123: Computer Networks Stefan Savage Overview Autonomous Systems Each network on the Internet has its own goals Path-vector Routing Allows scalable, informed route selection
More informationA configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)
A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers
More informationCS Networks and Distributed Systems. Lecture 8: Inter Domain Routing
CS 3700 Networks and Distributed Systems Lecture 8: Inter Domain Routing Revised 2/4/2014 Network Layer, Control Plane 2 Data Plane Application Presentation Session Transport Network Data Link Physical
More informationPractical Verification Techniques for Wide-Area Routing
Practical Verification Techniques for Wide-Area Routing Nick Feamster M.I.T. Computer Science and Artificial Intelligence Laboratory feamster@lcs.mit.edu http://nms.lcs.mit.edu/bgp/ (Thanks to Hari Balakrishnan
More informationLink State Routing & Inter-Domain Routing
Link State Routing & Inter-Domain Routing CS640, 2015-02-26 Announcements Assignment #2 is due Tuesday Overview Link state routing Internet structure Border Gateway Protocol (BGP) Path vector routing Inter
More informationIntroduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control
Introduction Routing & Addressing: Multihoming 10/25/04 Hong Tat Tong Two attempts to control/ensure best performance over the Internet Multihoming from the endpoints Overlay with some help from middle-boxes
More informationInter-Domain Routing: BGP II
Inter-Domain Routing: BGP II Mark Handley UCL Computer Science CS 3035/GZ01 BGP Protocol (cont d) BGP doesn t chiefly aim to compute shortest paths (or minimize other metric, as do DV, LS) Chief purpose
More informationLecture 17: Border Gateway Protocol
Lecture 17: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren Some figures courtesy Mike Freedman Lecture 18 Overview Border Gateway Protocol (BGP) The canonical path vector protocol How
More informationFlooding Attacks by Exploiting Persistent Forwarding Loops
Flooding Attacks by Exploiting Persistent Forwarding Jianhong Xia, Lixin Gao, Teng Fei University of Massachusetts at Amherst {jxia, lgao, tfei}@ecs.umass.edu ABSTRACT In this paper, we present flooding
More informationInternet measurements: topology discovery and dynamics. Renata Teixeira MUSE Team Inria Paris-Rocquencourt
Internet measurements: topology discovery and dynamics Renata Teixeira MUSE Team Inria Paris-Rocquencourt Why measure the Internet topology? Network operators Assist in network management, fault diagnosis
More informationInterdomain routing CSCI 466: Networks Keith Vertanen Fall 2011
Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Overview Business relationships between ASes Interdomain routing using BGP Advertisements Routing policy Integration with intradomain routing
More informationInterdomain Routing. EE122 Fall 2011 Scott Shenker
Interdomain Routing EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC Berkeley
More informationDiagnosing Path Inflation of Mobile Client Traffic
Diagnosing Path Inflation of Mobile Client Traffic Kyriakos Zarifis, Tobias Flach, Srikanth Nori, David Choffnes, Ramesh Govindan, Ethan Katz- Bassett, Z. Morley Mao, Matt Welsh University of Southern
More informationCS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013
CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements
More informationInvestigating Transparent Web Proxies in Cellular Networks
Investigating Transparent Web Proxies in Cellular Networks Xing Xu, Yurong Jiang, Tobias Flach, Ethan Katz-Bassett, David Choffnes, Ramesh Govindan USC & Northeastern University March 20, 2015 Introduction
More informationRouting and RFC AKA using BGP communities to influence routing
Routing and RFC-1998 AKA using BGP communities to influence routing Routing and RFC-1998 Jason Sinclair and Bob Purdon PIPE Networks Ltd PIPE Networks What is RFC-1998? RFC-1988 discusses the use of the
More informationInterdomain Routing Reading: Sections K&R EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277)
Interdomain Routing Reading: Sections K&R 4.6.3 EE122: Intro to Communication Networks Fall 2007 (WF 4:00-5:30 in Cory 277) Guest Lecture by Brighten Godfrey Instructor: Vern Paxson TAs: Lisa Fowler, Daniel
More informationTowards a Logic for Wide-Area Internet Routing
Towards a Logic for Wide-Area Internet Routing Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory {feamster,hari}@lcs.mit.edu ; #, $. ', - -, * - ' * 4 *
More informationCOM-208: Computer Networks - Homework 6
COM-208: Computer Networks - Homework 6. (P22) Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each
More informationAchieving scale: Large scale active measurements from PlanetLab
Achieving scale: Large scale active measurements from PlanetLab Marc-Olivier Buob, Jordan Augé (UPMC) 4th PhD School on Traffic Monitoring and Analysis (TMA) April 15th, 2014 London, UK OneLab FUTURE INTERNET
More informationCisco. Maintaining Cisco Service Provider VPNs and MPLS Networks (MSPVM)
Cisco 642-780 Maintaining Cisco Service Provider VPNs and MPLS Networks (MSPVM) Download Full Version : http://killexams.com/pass4sure/exam-detail/642-780 QUESTION: 56 Which command should be used to verify
More informationcs/ee 143 Communication Networks
cs/ee 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also were
More informationNetwork Layer (Routing)
Network Layer (Routing) Border Gateway Protocol Structure of the Internet Networks (ISPs, CDNs, etc.) group with IP prefixes Networks are richly interconnected, often using IXPs Prefix E1 Net E IXP Prefix
More informationInter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley
Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:
More informationLecture 19: Network Layer Routing in the Internet
Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F
More informationLecture 18: Border Gateway Protocol
Lecture 18: Border Gateway Protocol CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday Some figures courtesy Mike Freedman & Craig Labovitz Lecture 18 Overview Path-vector Routing Allows scalable,
More informationDetailed Analysis of ISIS Routing Protocol on the Qwest Backbone:
Detailed Analysis of ISIS Routing Protocol on the Qwest Backbone: A recipe for subsecond ISIS convergence Cengiz Alaettinoglu cengiz@packetdesign.com Stephen Casner casner@packetdesign.com Packet Design
More informationLab - Mapping the Internet
Objectives Part 1: Test Network Connectivity Using Ping Part 2: Trace a Route to a Remote Server Using Windows Tracert Background Route tracing computer software is a utility that lists the networks data
More informationMeasuring Adoption of RPKI Route Origin Validation and Filtering
PEERING The BGP Testbed Measuring Adoption of RPKI Route Origin Validation and Filtering Andreas Reuter (andreas.reuter@fu-berlin.de) Joint work with Randy Bush, Ethan Katz-Bassett, Italo Cunha, Thomas
More informationBackbone Networks. Networking Case Studies. Backbone Networks. Backbone Topology. Mike Freedman COS 461: Computer Networks.
Networking Case Studies Datacenter Backbone Networks Enterprise Backbone Mike Freedman COS 6: Computer Networks Cellular h>p://www.cs.princeton.edu/courses/archive/spr/cos6/ Wireless Backbone Networks
More informationCommunication Networks
Communication Networks Spring 208 Roland Meier / Thomas Holterbach Slides: Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 9 208 Materials inspired from Scott Shenker & Jennifer Rexford Last
More informationUnderstanding Internet Path Failures: Location, Characterization, Correlation
Understanding Internet Path Failures: Location, Characterization, Correlation Nick Feamster, David Andersen, Hari Balakrishnan M.I.T. Laboratory for Computer Science {feamster,dga,hari}@lcs.mit.edu Big
More informationHot Potatoes Heat Up BGP Routing
Hot Potatoes Heat Up BGP Routing Renata Teixeira Laboratoire d Informatique de Paris 6 Université Pierre et Marie Curie Amsterdam Internet Routing Architecture Verio AT&T AOL Web Server UCSD Sprint User
More informationAPT: A Practical Transit-Mapping Service Overview and Comparisons
APT: A Practical Transit-Mapping Service Overview and Comparisons draft-jen-apt Dan Jen, Michael Meisel, Dan Massey, Lan Wang, Beichuan Zhang, and Lixia Zhang The Big Picture APT is similar to LISP at
More informationUnderstanding BGP Miscounfiguration
Understanding Archana P Student of Department of Electrical & Computer Engineering Missouri University of Science and Technology appgqb@mst.edu 16 Feb 2017 Introduction Background Misconfiguration Outline
More informationInterdomain Routing (plus Transport Wrapup) Tom Anderson
Interdomain Routing (plus Transport Wrapup) Tom Anderson A good network is one that I never have to think about Greg Minshall 2 Window TCP Known to be Suboptimal Small to moderate sized connections Intranets
More informationInterdomain Routing Reading: Sections P&D 4.3.{3,4}
Interdomain Routing Reading: Sections P&D 4.3.{3,4} EE122: Intro to Communication Networks Fall 2006 (MW 4:00-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/
More informationCMPE 151 Routing. Marc Mosko
CMPE 151 Routing Marc Mosko Talk Outline Routing basics Why segment networks? IP address/subnet mask The gateway decision based on dest IP address default gateway and static routing gateway discovery (DHCP,
More informationMultihoming with BGP and NAT
Eliminating ISP as a single point of failure www.noction.com Table of Contents Introduction 1. R-NAT Configuration 1.1 NAT Configuration 5. ISPs Routers Configuration 3 15 7 7 5.1 ISP-A Configuration 5.2
More informationIP Addressing & Interdomain Routing. Next Topic
IP Addressing & Interdomain Routing Next Topic IP Addressing Hierarchy (prefixes, class A, B, C, subnets) Interdomain routing Application Presentation Session Transport Network Data Link Physical Scalability
More informationLecture 17: Router Design
Lecture 17: Router Design CSE 123: Computer Networks Alex C. Snoeren Eample courtesy Mike Freedman Lecture 17 Overview Finish up BGP relationships Router internals Buffering Scheduling 2 Peer-to-Peer Relationship
More informationHow does a router know where to send a packet next?
How does a router know where to send a packet next? The Problem Which path should packets take from A to B? A B R2 R R4 R3 C D 2 The Internet forwards packets hop-by-hop Data IP Address Next-hop A R B
More informationSDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged
SDN Use-Cases internet exchange, home networks TELE4642: Week8 Materials from Prof. Nick Feamster is gratefully acknowledged Overview n SDX: A Software-Defined Internet Exchange n SDN-enabled Home Networks
More informationLecture 17: Router Design
Lecture 17: Router Design CSE 123: Computer Networks Alex C. Snoeren HW 3 due WEDNESDAY Eample courtesy Mike Freedman Lecture 17 Overview BGP relationships Router internals Buffering Scheduling 2 Business
More informationQuantifying Violations of Destination-based Forwarding on the Internet
Quantifying Violations of Destination-based Forwarding on the Internet Tobias Flach, Ethan Katz-Bassett, and Ramesh Govindan University of Southern California November 14, 2012 Destination-based Routing
More informationBGP#: A System for Dynamic Route Control In Data Centers
BGP#: A System for Dynamic Route Control In Data Centers Chao-Chih Chen UC Davis* Lihua Yuan Albert Greenberg Randy Kern Tao Zhang Parantap Lahiri John Arnold Kevin Grady Microsoft *Also a Microsoft Intern
More informationBGP Policy violations in the data-plane
BGP Policy violations in the data-plane Pierre Francois, Institute IMDEA Networks Paolo Lucente, PMACCT pierre.francois@imdea.org paolo@pmacct.net Agenda Two well-known facts about routing... leading to
More informationInterdomain Routing. EE122 Fall 2012 Scott Shenker
Interdomain Routing EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC Berkeley
More informationThe Case for Separating Routing from Routers
The Case for Separating Routing from Routers Nick Feamster, Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Jennifer Rexford, Aman Shaikh, Kobus van der Merwe AT&T Labs
More informationiplane Nano: Path Prediction for Peer-to-Peer Applications
iplane Nano: Path Prediction for Peer-to-Peer Applications Harsha V. Madhyastha Ethan Katz-Bassett Thomas Anderson Arvind Krishnamurthy Arun Venkataramani Abstract Many peer-to-peer distributed applications
More informationToward an Atlas of the Physical Internet
Toward an Atlas of the Physical Internet Winter 2014 Paul Barford Computer Sciences University of Wisconsin!! Motivation pb@cs.wisc.edu 1 Objectives of our work Create and maintain a comprehensive catalog
More informationTowards A Longitudinal Study of Adoption of RPKI-Based Route Filtering
1 Towards A Longitudinal Study of Adoption of RPKI-Based Route Filtering Ethan Katz-Bassett (University of Southern California) with: Andreas Reuter and Matthias Wahlisch (Freie Universität Berlin), Brandon
More informationUsing BGP Communities
Using BGP Communities ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated
More informationIntroduction to IP Routing. Geoff Huston
Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet
More informationService Provider Multihoming
Service Provider Multihoming ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last
More informationImportant Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)
Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be
More informationCS 557 Internet Routing Policies
CS 557 Internet Routing Policies On Inferring and Characterizing Internet Routing Policies Feng Wang and Lixin Gao, 2003 Spring 2013 Characterizing Routing Policies Objective: Infer and characterize BGP
More informationModule 16 An Internet Exchange Point
ISP Workshop Lab Module 16 An Internet Exchange Point Objective: To investigate methods for connecting to an Internet Exchange Point. Prerequisites: Modules 12 and 13, and the Exchange Points Presentation
More informationRouting Outline. EECS 122, Lecture 15
Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall
More informationModule 1b IS-IS. Prerequisites: The setup section of Module 1. The following will be the common topology used for the first series of labs.
Module 1b IS-IS Objective: Create a basic physical lab interconnection with one IS-IS Area. Ensure that all routers, interfaces, cables and connections are working properly. Prerequisites: The setup section
More informationA Case For OneSwarm. Tom Anderson University of Washington.
A Case For OneSwarm Tom Anderson University of Washington http://oneswarm.cs.washington.edu/ With: Jarret Falkner, Tomas Isdal, Alex Jaffe, John P. John, Arvind Krishnamurthy, Harsha Madhyastha and Mike
More informationBGP Case Studies. ISP Workshops
BGP Case Studies ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated
More informationTBGP: A more scalable and functional BGP. Paul Francis Jan. 2004
TBGP: A more scalable and functional BGP Paul Francis Jan. 2004 BGP: Border Gateway Protocol BGP is the top-level routing protocol in the Internet It holds the Internet together BGP allows routers to tell
More informationBGP101. Howard C. Berkowitz. (703)
BGP101 Howard C. Berkowitz hcb@clark.net (703)998-5819 What is the Problem to be Solved? Just configuring the protocol? Participating in the Internet and/or running Virtual Private Networks A Life Cycle
More informationDestination Reachability and BGP Convergence Time. Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA)
Destination Reachability and BGP Convergence Time Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA) Packet Delivery and Routing Dynamics The primary goal of routing is to deliver packets.
More informationCS118 Discussion 1A, Week 7. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.
CS118 Discussion 1A, Week 7 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Network control plane Routing Link state routing (OSPF) Distance vector routing (RIP) BGP ICMP Midterm/Project 2
More informationMoving Beyond End-to-End Path Information to Optimize CDN Performance
Moving Beyond End-to-End Path Information to Optimize CDN Performance Rupa Krishnan Harsha V. Madhyastha Sridhar Srinivasan Sushant Jain Arvind Krishnamurthy Thomas Anderson Jie Gao Google Inc. University
More informationTowards root cause analysis of BGP routing dynamics. Matthew Caesar, Lakshmi Subramanian, Randy H. Katz
Towards root cause analysis of BGP routing dynamics Matthew Caesar, Lakshmi Subramanian, Randy H. Katz mccaesar@cs.berkeley.edu Motivation Interdomain routing suffers from many problems Instability Slow
More informationA Configuration-only Approach to FIB Reduction. Paul Francis Hitesh Ballani, Tuan Cao Cornell
A Configuration-only Approach to FIB Reduction Paul Francis Hitesh Ballani, Tuan Cao Cornell Virtual Aggregation An approach to shrinking FIBs (and RIBs) In interface-card FIB, maybe control-card RIB Works
More informationCS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal
CS4450 Computer Networks: Architecture and Protocols Lecture 15 BGP Spring 2018 Rachit Agarwal Autonomous System (AS) or Domain Region of a network under a single administrative entity Border Routers Interior
More informationFACT: Flow-based Approach for Connectivity Tracking
FACT: Flow-based Approach for Connectivity Tracking Dominik Schatzmann 1, Simon Leinen 2, Jochen Kögel 3, and Wolfgang Mühlbauer 1 1 ETH Zurich, {schatzmann,muehlbauer}@tik.ee.ethz.ch 2 SWITCH, simon.leinen@switch.ch
More informationDailyCatch: A Provider-centric View of Anycast Behaviour
DailyCatch: A Provider-centric View of Anycast Behaviour Stephen McQuistin University of Glasgow Sree Priyanka Uppu Marcel Flores Verizon Digital Media Services What is IP anycast? 2 What is IP anycast?
More informationCS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol) Intra-domain routing The Story So Far Routing protocols generate the forwarding
More informationInternet Infrastructure
Internet Infrastructure Internet Infrastructure Local and inter-domain routing TCP/IP for routing and messaging BGP for routing announcements Domain Name System Find IP address from symbolic name (www.cc.gatech.edu)
More informationCS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.
CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.
More informationEffects of Internet Path Selection on Video-QoE
Effects of Internet Path Selection on Video-QoE by Mukundan Venkataraman & Mainak Chatterjee Dept. of EECS University of Central Florida, Orlando, FL 32826 mukundan@eecs.ucf.edu mainak@eecs.ucf.edu Streaming
More informationMultihoming Complex Cases & Caveats
Multihoming Complex Cases & Caveats ISP Workshops Last updated 6 October 2011 Complex Cases & Caveats p Complex Cases n Multiple Transits n Multi-exit backbone n Disconnected Backbone n IDC Multihoming
More information