1 Policy-Based Path-Vector Routing Reading: Sections 4.3.3 COS 461: Computer Networks Spring 2006 (MW 1:30-2:50 in Friend 109) Jennifer Rexford Teaching.

Slides:



Advertisements
Similar presentations
1 Interdomain Traffic Engineering with BGP By Behzad Akbari Spring 2011 These slides are based on the slides of Tim. G. Griffin (AT&T) and Shivkumar (RPI)
Advertisements

BGP Convergence Jennifer Rexford. Outline Border Gateway Protocol (BGP) –Prefix-based routing at the AS level –Policy-based path-vector protocol –Incremental.
Border Gateway Protocol Ankit Agarwal Dashang Trivedi Kirti Tiwari.
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
Lecture 9 Overview. Hierarchical Routing scale – with 200 million destinations – can’t store all dests in routing tables! – routing table exchange would.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Border Gateway Protocol Autonomous Systems and Interdomain Routing (Exterior Gateway Protocol EGP)
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Professor Yashar Ganjali Department of Computer Science University of Toronto
INTERDOMAIN ROUTING POLICY COS 461: Computer Networks Spring 2010 (MW 3:00-4:20 in COS 105) Mike Freedman
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
BGP EE 122, Fall 2013 Sylvia Ratnasamy Material thanks to Ion Stoica, Scott Shenker, Jennifer Rexford, and many other.
Distance-Vector and Path-Vector Routing Sections , 4.3.2, COS 461: Computer Networks Spring 2011 Mike Freedman
PATH VECTOR ROUTING AND THE BORDER GATEWAY PROTOCOL READING: SECTIONS PLUS OPTIONAL READING COS 461: Computer Networks Spring 2010 (MW 3:00-4:20.
1 Interdomain Routing EE122 Fall 2011 Scott Shenker Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson.
Interdomain Routing and The Border Gateway Protocol (BGP) Courtesy of Timothy G. Griffin Intel Research, Cambridge UK
INTERDOMAIN ROUTING POLICY READING: SECTIONS PLUS OPTIONAL READING COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in COS 105) Mike Freedman.
Computer Networking Lecture 10: Inter-Domain Routing
Internet Routing (COS 598A) Today: Interdomain Traffic Engineering Jennifer Rexford Tuesdays/Thursdays.
Distance-Vector and Path-Vector Routing COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in COS 105) Michael Freedman Teaching Assistants: Wyatt Lloyd.
1 Interdomain Routing Policy Reading: Sections plus optional reading COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford.
Interdomain Routing Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Backbone Networks Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Interdomain Routing Policy COS 461: Computer Networks Spring 2011 Mike Freedman 1.
Hot Potatoes Heat Up BGP Routing Jennifer Rexford AT&T Labs—Research Joint work with Renata Teixeira, Aman Shaikh, and.
Interdomain Routing and the Border Gateway Protocol (BGP) Reading: Section COS 461: Computer Networks Spring 2011 Mike Freedman
ROUTING PROTOCOLS PART IV ET4187/ET5187 Advanced Telecommunication Network.
Border Gateway Protocol(BGP) L.Subramanian 23 rd October, 2001.
BGP CS168, Fall 2014 Sylvia Ratnasamy
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Computer Networks Layering and Routing Dina Katabi
Authors Renata Teixeira, Aman Shaikh and Jennifer Rexford(AT&T), Tim Griffin(Intel) Presenter : Farrukh Shahzad.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Chapter 9. Implementing Scalability Features in Your Internetwork.
PATH VECTOR ROUTING AND THE BORDER GATEWAY PROTOCOL 1.
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
Interdomain Routing EE 122: Intro to Communication Networks Fall 2010 (MW 4-5:30 in 101 Barker) Scott Shenker TAs: Sameer Agarwal, Sara Alspaugh, Igor.
1 CSCD 433/533 Network Programming Fall 2013 Lecture 14 Global Address Space Autonomous Systems, BGP Protocol Routing.
CSCI-1680 Network Layer: Inter-domain Routing Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, Rodrigo Fonseca John Jannotti.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol)
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
Inter-domain Routing Outline Border Gateway Protocol.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol)
1 Internet Routing: BGP Routing Convergence Jennifer Rexford Princeton University
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
CS 3700 Networks and Distributed Systems
CS 3700 Networks and Distributed Systems
Border Gateway Protocol
COS 561: Advanced Computer Networks
BGP supplement Abhigyan Sharma.
Interdomain Traffic Engineering with BGP
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
Backbone Networks Mike Freedman COS 461: Computer Networks
BGP Policies Jennifer Rexford
COS 461: Computer Networks
COS 561: Advanced Computer Networks
BGP Instability Jennifer Rexford
Computer Networks Protocols
Presentation transcript:

1 Policy-Based Path-Vector Routing Reading: Sections COS 461: Computer Networks Spring 2006 (MW 1:30-2:50 in Friend 109) Jennifer Rexford Teaching Assistant: Mike Wawrzoniak

2 Goals of Today’s Lecture Challenges of interdomain routing –Scale, privacy, and policy –Limitations of link-state and distance-vector routing Path-vector routing –Faster loop detection than distance-vector routing –More flexibility than shortest-path routing Border Gateway Protocol (BGP) –Incremental, prefix-based, path-vector protocol –Programmable import and export policies –Multi-step decision process for selecting “best” route Multiple routers within an AS BGP convergence delay

3 Interdomain Routing AS-level topology –Destinations are IP prefixes (e.g., /8) –Nodes are Autonomous Systems (ASes) –Links are connections & business relationships ClientWeb server

4 Challenges for Interdomain Routing Scale –Prefixes: 150, ,000, and growing –ASes: 20,000 visible ones, and growing –AS paths and routers: at least in the millions… Privacy –ASes don’t want to divulge internal topologies –… or their business relationships with neighbors Policy –No Internet-wide notion of a link cost metric –Need control over where you send traffic –… and who can send traffic through you

5 Shortest-Path Routing is Restrictive All traffic must travel on shortest paths All nodes need common notion of link costs Incompatible with commercial relationships Regional ISP1 Regional ISP2 Regional ISP3 Cust1 Cust3 Cust2 National ISP1 National ISP2 YES NO

6 Link-State Routing is Problematic Topology information is flooded –High bandwidth and storage overhead –Forces nodes to divulge sensitive information Entire path computed locally per node –High processing overhead in a large network Minimizes some notion of total distance –Works only if policy is shared and uniform Typically used only inside an AS –E.g., OSPF and IS-IS

7 Distance Vector is on the Right Track Advantages –Hides details of the network topology –Nodes determine only “next hop” toward the dest Disadvantages –Minimizes some notion of total distance, which is difficult in an interdomain setting –Slow convergence due to the counting-to-infinity problem (“bad news travels slowly”) Idea: extend the notion of a distance vector

8 Path-Vector Routing Extension of distance-vector routing –Support flexible routing policies –Avoid count-to-infinity problem Key idea: advertise the entire path –Distance vector: send distance metric per dest d –Path vector: send the entire path for each dest d d “d: path (2,1)” “d: path (1)” data traffic

9 Faster Loop Detection Node can easily detect a loop –Look for its own node identifier in the path –E.g., node 1 sees itself in the path “3, 2, 1” Node can simply discard paths with loops –E.g., node 1 simply discards the advertisement “d: path (2,1)” “d: path (1)” “d: path (3,2,1)”

10 Flexible Policies Each node can apply local policies –Path selection: Which path to use? –Path export: Which paths to advertise? Examples –Node 2 may prefer the path “2, 3, 1” over “2, 1” –Node 1 may not let node 3 hear the path “1, 2” 2 3 1

11 Interdomain routing protocol for the Internet –Prefix-based path-vector protocol –Policy-based routing based on AS Paths –Evolved during the past 15 years 1989 : BGP-1 [RFC 1105] –Replacement for EGP (1984, RFC 904) 1990 : BGP-2 [RFC 1163] 1991 : BGP-3 [RFC 1267] 1995 : BGP-4 [RFC 1771] –Support for Classless Interdomain Routing (CIDR) Border Gateway Protocol

12 BGP Operations Establish session on TCP port 179 Exchange all active routes Exchange incremental updates AS1 AS2 While connection is ALIVE exchange route UPDATE messages BGP session

13 Incremental Protocol A node learns multiple paths to destination –Stores all of the routes in a routing table –Applies policy to select a single active route –… and may advertise the route to its neighbors Incremental updates –Announcement  Upon selecting a new active route, add node id to path  … and (optionally) advertise to each neighbor –Withdrawal  If the active route is no longer available  … send a withdrawal message to the neighbors

14 BGP Route Destination prefix (e.g, /16) Route attributes, including –AS path (e.g., “ ”) –Next-hop IP address (e.g., ) AS 88 Princeton /16 AS path = 88 Next Hop = AS 7018 AT&T AS RIPE NCC RIS project /16 AS path = Next Hop =

15 ASPATH Attribute AS /16 AS Path = 88 AS 1239 Sprint AS 1755 Ebone AT&T AS 3549 Global Crossing /16 AS Path = /16 AS Path = AS /16 Princeton Prefix Originated AS RIPE NCC RIS project AS 1129 Global Access /16 AS Path = /16 AS Path = /16 AS Path = /16 AS Path =

16 BGP Path Selection Simplest case –Shortest AS path –Arbitrary tie break Example –Four-hop AS path preferred over a three-hop AS path –AS prefers path through Global Crossing But, BGP is not limited to shortest-path routing –Policy-based routing AS 3549 Global Crossing /16 AS Path = AS RIPE NCC RIS project AS 1129 Global Access /16 AS Path =

17 BGP Policy: Applying Policy to Routes Import policy –Filter unwanted routes from neighbor  E.g. prefix that your customer doesn’t own –Manipulate attributes to influence path selection  E.g., assign local preference to favored routes Export policy –Filter routes you don’t want to tell your neighbor  E.g., don’t tell a peer a route learned from other peer –Manipulate attributes to control what they see  E.g., make a path look artificially longer than it is

18 BGP Policy: Influencing Decisions Best Route Selection Apply Import Policies Best Route Table Apply Export Policies Install forwarding Entries for best Routes. Receive BGP Updates Best Routes Transmit BGP Updates Apply Policy = filter routes & tweak attributes Based on Attribute Values IP Forwarding Table Apply Policy = filter routes & tweak attributes Open ended programming. Constrained only by vendor configuration language

19 Import Policy: Local Preference Favor one path over another –Override the influence of AS path length –Apply local policies to prefer a path Example: prefer customer over peer AT&T Sprint Yale Tier-2 Tier-3 Local-pref = 100 Local-pref = 90

20 Import Policy: Filtering Discard some route announcements –Detect configuration mistakes and attacks Examples on session to a customer –Discard route if prefix not owned by the customer –Discard route that contains other large ISP in AS path AT&T Princeton USLEC /16

21 Export Policy: Filtering Discard some route announcements –Limit propagation of routing information Examples –Don’t announce routes from one peer to another –Don’t announce routes for network-management hosts AT&T Princeton Sprint /16 UUNET network operator

22 Export Policy: Attribute Manipulation Modify attributes of the active route –To influence the way other ASes behave Example: AS prepending –Artificially inflate the AS path length seen by others –To convince some ASes to send traffic another way AT&T Princeton USLEC /16 Sprint 88

23 BGP Policy Configuration Routing policy languages are vendor-specific –Not part of the BGP protocol specification –Different languages for Cisco, Juniper, etc. Still, all languages have some key features –Policy as a list of clauses –Each clause matches on route attributes –… and either discards or modifies the matching routes Configuration done by human operators –Implementing the policies of their AS –Business relationships, traffic engineering, security, … –

24 AS is Not a Single Node AS path length can be misleading –An AS may have many router-level hops AS 4 AS 3 AS 2 AS 1 BGP says that path 4 1 is better than path 3 2 1

25 An AS is Not a Single Node Multiple routers in an AS –Need to distribute BGP information within the AS –Internal BGP (iBGP) sessions between routers AS1 AS2 eBGP iBGP

26 Internal BGP and Local Preference Example –Both routers prefer the path through AS 100 on the left –… even though the right router learns an external path I-BGP AS 256 AS 300 Local Pref = 100 Local Pref = 90 AS 100 AS 200

27 An AS is Not a Single Node Multiple connections to neighboring ASes –Multiple border routers may learn good routes –… with the same local-pref and AS path length Multiple links

28 Hot-Potato (Early-Exit) Routing Hot-potato routing –Each router selects the closest egress point –… based on the path cost in intradomain protocol BGP decision process –Highest local preference –Shortest AS path –Closest egress point –Arbitrary tie break hot potato A B C D G E F A B dst

29 Joining BGP and IGP Information Border Gateway Protocol (BGP) –Announces reachability to external destinations –Maps a destination prefix to an egress point  /16 reached via Interior Gateway Protocol (IGP) –Used to compute paths within the AS –Maps an egress point to an outgoing link  reached via

30 Forwarding Table Joining BGP with IGP Information AS 7018 AS / BGP /16 destinationnext hop /30 destinationnext hop /16 Next Hop = /16 destinationnext hop /

31 Some Routers Don’t Need BGP Customer that connects to a single upstream ISP –The ISP can introduce the prefixes into BGP –… and the customer can simply default-route to the ISP Qwest Yale University Nail up default routes /0 pointing to Qwest Nail up routes /16 pointing to Yale /16

32 Some Routers Don’t Need BGP Routers inside a “stub” network –Border router may speak BGP to upstream ISPs –But, internal routers can simply “default route” AT&T Princeton University /16 AS 88 USLEC BGP

33 Causes of BGP Routing Changes Topology changes –Equipment going up or down –Deployment of new routers or sessions BGP session failures –Due to equipment failures, maintenance, etc. –Or, due to congestion on the physical path Changes in routing policy –Reconfiguration of preferences –Reconfiguration of route filters Persistent protocol oscillation –Conflicts between policies in different ASes

34 BGP Session Failure BGP runs over TCP –BGP only sends updates when changes occur –TCP doesn’t detect lost connectivity on its own Detecting a failure –Keep-alive: 60 seconds –Hold timer: 180 seconds Reacting to a failure –Discard all routes learned from the neighbor –Send new updates for any routes that change AS1 AS2

35 Routing Change: Before and After (1,0) (2,0) (3,1,0) (2,0) (1,2,0) (3,2,0)

36 Routing Change: Path Exploration AS 1 –Delete the route (1,0) –Switch to next route (1,2,0) –Send route (1,2,0) to AS 3 AS 3 –Sees (1,2,0) replace (1,0) –Compares to route (2,0) –Switches to using AS (2,0) (1,2,0) (3,2,0)

37 Routing Change: Path Exploration Initial situation –Destination 0 is alive –All ASes use direct path When destination dies –All ASes lose direct path –All switch to longer paths –Eventually withdrawn E.g., AS 2 –(2,0)  (2,1,0) –(2,1,0)  (2,3,0) –(2,3,0)  (2,1,3,0) –(2,1,3,0)  null (1,0) (1,2,0) (1,3,0) (2,0) (2,1,0) (2,3,0) (2,1,3,0) (3,0) (3,1,0) (3,2,0)

38 BGP Converges Slowly, if at All Path vector avoids count-to-infinity –But, ASes still must explore many alternate paths –… to find the highest-ranked path that is still available Fortunately, in practice –Most popular destinations have very stable BGP routes –And most instability lies in a few unpopular destinations Still, lower BGP convergence delay is a goal –Can be tens of seconds to tens of minutes –High for important interactive applications –… or even conventional application, like Web browsing

39 Conclusions BGP is solving a hard problem –Routing protocol operating at a global scale –With tens of thousands of independent networks –That each have their own policy goals –And all want fast convergence Key features of BGP –Prefix-based path-vector protocol –Incremental updates (announcements and withdrawals) –Policies applied at import and export of routes –Internal BGP to distribute information within an AS –Interaction with the IGP to compute forwarding tables