Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)

Slides:



Advertisements
Similar presentations
Multihoming and Multi-path Routing
Advertisements

Multihoming and Multi-path Routing
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
INTERDOMAIN ROUTING POLICY COS 461: Computer Networks Spring 2010 (MW 3:00-4:20 in COS 105) Mike Freedman
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Inferring Autonomous System Relationships in the Internet Lixin Gao Dept. of Electrical and Computer Engineering University of Massachusetts, Amherst
Announcement  Slides and reference materials available at  Slides and reference materials available.
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
Can Economic Incentives Make the ‘Net Work? Jennifer Rexford Princeton University
1 Tutorial 5 Safe “Peering Backup” Routing With BGP Based on:
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
Tutorial 5 Safe Routing With BGP Based on: Internet.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
Internet Networking Spring 2004 Tutorial 5 Safe “Peering Backup” Routing With BGP.
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Internet Routing (COS 598A) Today: Interdomain Traffic Engineering Jennifer Rexford Tuesdays/Thursdays.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
1 Interdomain Routing Policy Reading: Sections plus optional reading COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford.
Interdomain Routing Policy COS 461: Computer Networks Spring 2011 Mike Freedman 1.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Interdomain Routing and the Border Gateway Protocol (BGP) Reading: Section COS 461: Computer Networks Spring 2011 Mike Freedman
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Interdomain Routing (Nick Feamster) February 4, 2008.
Computer Networks Layering and Routing Dina Katabi
Inter-domain Routing Outline Border Gateway Protocol.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
Information-Centric Networks04a-1 Week 4 / Paper 1 Open issues in Interdomain Routing: a survey –Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure.
Introduction to BGP.
Egress Route Selection for Interdomain Traffic Engineering Design considerations beyond BGP.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
CSE 461: Interdomain Routing
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Lecture 4: BGP Presentations Lab information H/W update.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
SDX: A Software-Defined Internet eXchange Jennifer Rexford Princeton University
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao,
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
Inter-domain Routing Outline Border Gateway Protocol.
CSci5221: BGP Policies1 Inter-Domain Routing: BGP, Routing Policies, etc. BGP Path Selection and Policy Routing Stable Path Problem and Policy Conflicts.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
1 Internet Routing: BGP Routing Convergence Jennifer Rexford Princeton University
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
CS 3700 Networks and Distributed Systems
CS 3700 Networks and Distributed Systems
Border Gateway Protocol
COS 561: Advanced Computer Networks
Can Economic Incentives Make the ‘Net Work?
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Policies Jennifer Rexford
COS 461: Computer Networks
COS 561: Advanced Computer Networks
Fixing the Internet: Think Locally, Impact Globally
BGP Instability Jennifer Rexford
Presentation transcript:

Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)

 Internet routing meets economic reality –Economic incentives affect basic protocol behavior  Example: stable routing without global control –Overview of the Internet architecture –Interdomain routing convergence –Routing policy guidelines –Theoretical and empirical results  Open problems and a larger question –Where should the economic incentives come in? + $$$ = ???

Internet Routing Architecture  Divided into Autonomous Systems (ASes) –Equipment managed by a single institution –Service provider, company, university, …  Hierarchy of Autonomous Systems –National or global tier-1 provider –Medium-sized regional provider –Small university or corporate network  Interaction between Autonomous Systems –Internal topology is not shared between ASes –… but, neighbors interact to coordinate routing

Autonomous Systems (ASes) Client Web server Path: 6, 5, 4, 3, 2, 1

Interdomain Routing Challenges  Scalability –Autonomous Systems: 25,000 and growing –Destination address blocks: 200,000 and growing –AS paths and routers: at least in the millions…  Flexible policy –Selecting which path your AS wants to use –Controlling who can send packets through your AS  Convergence –Routing protocol may take several minutes to converge –… and doesn’t necessarily converge at all!

Interdomain Routing: Border Gateway Protocol  ASes exchange reachability information –IP prefix: block of destination addresses –AS path: sequence of ASes along the path  Policies configured by the network operator –Path selection: which of the paths to use? –Path export: which neighbors to tell? “I can reach /24” “I can reach /24 via AS 1” data traffic

Conflicting Policies Cause Convergence Problems Pick the highest-ranked path consistent with your neighbors’ choices. Only choice! Top choice! Only choice! Better choice! Only choice! Better choice!

Global Control is Not Workable  Create a global Internet routing registry –Difficult to keep up to date  Require each AS to publish its routing policies –Difficult to get them to participate  Check for conflicting policies, and resolve conflicts –Checking is NP-complete –Re-checking for each failure scenario Need a solution that does not require global coordination.

Think Globally, Act Locally  Design goals –Flexibility: allow complex local policies –Privacy: do not require divulging policies –Backwards-compatibility: no changes to the protocol –Guarantees: convergence even when system changes  Solution: restrictions based on AS relationships –Path selection rules: which route you prefer –Export policies: who you tell about your route –AS graph structure: who is connected to who

Customer-Provider Relationship  Customer pays provider for access to the Internet –Provider exports its customer’s routes to everybody –Customer exports provider’s routes only to its customers d d AT&T Princeton AT&T Traffic to the customerTraffic from the customer advertisements traffic

Peer-Peer Relationship  Peers exchange traffic between their customers –AS exports only customer routes to a peer –AS exports a peer’s routes only to its customers DT AT&T Traffic to/from the peer and its customers d advertisements traffic Princeton MPI

Hierarchical AS Relationships  Provider-customer graph is a directed, acyclic graph –If u is a customer of v and v is a customer of w –… then w is not a customer of u u v w

Proposed Local Path Selection Rules  Classify routes based on next-hop AS –Customer routes, peer routes, and provider routes  Rank routes based on classification –Prefer customer routes over peer and provider routes  Allow any ranking of routes within a class –E.g., do not impose ranking among customer routes  Consistent with economic incentives –Customers pay for service, and providers are paid –Peer relationship contingent on balanced traffic load

Solving the Convergence Problem  Assumptions –Export policies based on AS relationships –Path selection rule that favors customer routes –Acyclic provider-customer graph  Result –Guaranteed convergence of the routing protocol –Holds under link/router failures and policy changes  Sketch of (constructive) proof –Activation sequence that leads to a stable state –Any “fair” activation sequence includes this sequence

Proof, Phase 1: Selecting Customer Routes  Activate ASes in customer-provider order –AS picks a customer route if one exists –Decision of one AS cannot cause an earlier AS to change its mind d An AS picks a customer route when one exists

Proof, Phase 2: Selecting Peer and Provider Routes  Activate rest of ASes in provider-customer order –Decision of one phase-2 AS cannot cause an earlier phase-2 AS to change its mind –Decision of phase-2 AS cannot affect a phase 1 AS AS picks a peer or provider route when no customer route is available d

Economic Incentives Affect Protocol Behavior  ASes already follow our rules, so system is stable –High-level argument »Export and topology assumptions are reasonable »Path-selection rule matches economic incentives –Empirical results »Routes for popular destinations are stable for ~10 days »Most churn due to small number of unpopular destinations  ASes should follow our rules to make system stable –Encourage operators to obey these guidelines –… and provide configuration-checking tools –Consider more complex relationships and graphs

Different Rules: More Flexible Import Policies  Allowing more flexibility in ranking routes –Allow the same rank for peer and customer routes with the same AS path length –Never choose a peer route over a shorter customer route  Stricter AS graph assumptions –Hierarchical provider-customer relationship (as before) –No private peering with (direct or indirect) providers Peer-peer

Backup Relationships  Backups: more liberal export policies –Primary and a backup provider –Peers giving backup service to each other  Extension: prefer routes with fewest backup links backup path primary provider backup provider failure Backup Provider backup path failure peer provider Peer-Peer Backup

Conclusions on Guaranteed Convergence  Avoiding convergence problems –Hierarchical AS relationships –Export policies based on commercial relationships –Guidelines for import policies based on relationships  Salient features –No global coordination (locally implementable) –No changes to BGP protocol or decision process –Guaranteed convergence, even under failures –Guidelines consistent with economic incentives

Recent Work Building on the Policy Guidelines  AS relationships and BGP convergence –Design principles for policy languages –Fundamental limits on relaxing the assumptions  Internal BGP inside an AS –Sufficient conditions for iBGP convergence –“What-if” tool for traffic engineering  AS-level analysis of the Internet –Inference of AS relationships from routing data –Characterization of AS-level topology and growth  Network design and operations –Analyzing competitors and changing BGP policies –Setting protective route filters on BGP sessions

Open Problems in Economic Incentives in Interdomain Routing

Models of How Relationships Form and Operate  Selecting a peer –Motivation: basic reachability and reducing transit costs –Making a peer pay when they need you (slightly) more –De-peering, refusing to peer, and stealing customers –Peer AS in one part of the world, but provider in another  Selecting a provider –Motivation: cost, performance, and physical proximity –Multi-homing to game one provider against another –Using third-party aggregators that negotiate with ISPs

Negotiation for Better Egress Selection  Better to cooperate –Negotiate where to send –Inbound and outbound –Mutual benefits  But, how to do it? –What info to exchange? –How to prioritize the many choices? –How prevent cheating? Customer A Customer B multiple peering points Provider A Provider B Early-exit routing

Reducing Vulnerability to Misbehaving Domains /16  Interdomain routing depends on trust –Vulnerable to malicious attack or accidental misconfiguration –Prefix hijacks lead to black hole, snooping, or impersonation

Stepping Back: Where Should the Incentives Go?  Today’s interdomain routing –Incentives do not live inside the protocol –But, rather, in how the policies are configured –However, this is indirect and perhaps even unnatural  Other possibilities… –Advertise policy preferences and options –Associate prices with route advertisements –Support negotiation between neighboring ASes –

Thank you!