What is a Peering Coordinator? May 26, 2008 Copyright © 2008 Limelight Networks. All rights reserved.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Jack Jedwab Association for Canadian Studies September 27 th, 2008 Canadian Post Olympic Survey.
Symantec 2010 Windows 7 Migration EMEA Results. Methodology Applied Research performed survey 1,360 enterprises worldwide SMBs and enterprises Cross-industry.
Symantec 2010 Windows 7 Migration Global Results.
Chapter 5 Transfer of Training
3rd Annual Plex/2E Worldwide Users Conference 13A Batch Processing in 2E Jeffrey A. Welsh, STAR BASE Consulting, Inc. September 20, 2007.
AP STUDY SESSION 2.
1
Flexible Budgets, Variances, and Management Control: II
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module D (Office 2007 Version) Decision Analysis.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
Processes and Operating Systems
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Multihoming and Multi-path Routing
Multihoming and Multi-path Routing
Slide 1 FastFacts Feature Presentation October 16 th, 2008 We are using audio during this session, so please dial in to our conference line… Phone number:
1 Hyades Command Routing Message flow and data translation.
1 Introducing the Specifications of the Metro Ethernet Forum MEF 19 Abstract Test Suite for UNI Type 1 February 2008.
1. 2 Begin with the end in mind! 3 Understand Audience Needs Stakeholder Analysis WIIFM Typical Presentations Expert Peer Junior.
Joint ITU/ECA Regional Workshop on Information and Communication Technologies (ICT) Indicators Gaborone, Botswana October 2004
Prepared by: Workforce Enterprise Services For: The Illinois Department of Commerce and Economic Opportunity Bureau of Workforce Development ENTRY OF EMPLOYER.
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
CALENDAR.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt RhymesMapsMathInsects.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Wants.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
Week 2 The Object-Oriented Approach to Requirements
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
Student & Work Study Employment Facts & Time Card Training
Break Time Remaining 10:00.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
1. 2 Its almost time to take the FCAT 2.0! Here are some important explanations and reminders to help you do your very best.
PP Test Review Sections 6-1 to 6-6
Chapter 6 Tariffs. Copyright © 2007 Pearson Addison-Wesley. All rights reserved. 6-2 Topics to be Covered Types of Commercial Policies Tariffs and Types.
1 Atomic Routing Games on Maximum Congestion Costas Busch Department of Computer Science Louisiana State University Collaborators: Rajgopal Kannan, LSU.
User Friendly Price Book Maintenance A Family of Enhancements For iSeries 400 DMAS from Copyright I/O International, 2006, 2007, 2008, 2010 Skip Intro.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Outline Minimum Spanning Tree Maximal Flow Algorithm LP formulation 1.
Bellwork Do the following problem on a ½ sheet of paper and turn in.
Success Planner PREPARE FOR EXAMINATIONS Student Wall Planner and Study Guide.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
 Copyright I/O International, 2013 Visit us at: A Feature Within from Item Class User Friendly Maintenance  Copyright.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 10 Routing Fundamentals and Subnets.
Adding Up In Chunks.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
GEtServices Services Training For Suppliers Requests/Proposals.
2004 EBSCO Publishing Presentation on EBSCOadmin.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Copyright © 2008 Pearson Addison-Wesley. All rights reserved. Chapter 10 A Monetary Intertemporal Model: Money, Prices, and Monetary Policy.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
Essential Cell Biology
Converting a Fraction to %
Clock will move after 1 minute
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
Chapter 11 Creating Framed Layouts Principles of Web Design, 4 th Edition.
Physics for Scientists & Engineers, 3rd Edition
Import Tracking and Landed Cost Processing An Enhancement For AS/400 DMAS from  Copyright I/O International, 2001, 2005, 2008, 2012 Skip Intro Version.
Copyright Tim Morris/St Stephen's School
Page 1 Orchard Harvest ™ LIS Find a Patient Training.
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
Registry and Referral System HCW/PSW Staff User Manual
PeeringDB and Role of Peering Coordinators. The PeeringDB.
Presentation transcript:

What is a Peering Coordinator? May 26, 2008 Copyright © 2008 Limelight Networks. All rights reserved.

2 Presentation agenda What is a Peering Coordinator? Why do I need one? What is a Peering Policy? Do I need one? What is in play at a peering discussion? What is a successful peering agreement? Homework before starting a peering discussion. Peering db, what it is and how to use it. Meetings to attend.

3 What is a peering coordinator?

4 What is a Peering Coordinator? More than almost anyone at your company, a peering coordinator is responsible for the performance of the network. Peering coordinators ensure that their customers traffic gets to and from its destination in the best possible manner. Public face to your company.

5 What a Peering Coordinator is not… Salesman Product manager BGP expert Network architect

6 Why do I need a Peering Coordinator? A good peering coordinator not only brings on new peering, he/she makes your existing peering more robust. While a network engineer or a NOC can handle turning up new peers, these people have other job responsibilities that are their primary focus. You need someone devoted to your peering strategy. Having a single point of contact for people to communicate with simplifies the peering process.

7 What is peering?

8 Peering involves two networks coming together to exchange traffic with each other freely, and for mutual benefit. This 'mutual benefit' is most often the motivation behind peering, which is often described solely by "reduced costs for transit services". Other less tangible motivations can include: Increased capacity for extremely large amounts of traffic (distributing traffic across many networks). Increased control over your traffic (reducing dependence on one or more transit providers).

9 What is peering? (continued) Improved performance (attempting to bypass potential bottlenecks with a "direct" path). Improved perception of your network (being able to claim a "higher tier"). Government regulations, or the desire to avoid the appearance of being a monopoly. Increased billable customer traffic. Another common way to look at peering is, Would either side be more hurt if the peering does not exist?

10 Peering policies

11 Peering policies A peering policy is designed to help both your organization and external organizations understand what the minimum requirements are for connecting to your network Peering policies should be shaped by a companys engineering, sales and product management departments

12 Types of peering policies Open Network will generally peer with anyone Selective Network will peer if certain requirements are met Restrictive Network will generally not peer with anyone

13 Open peering policies Networks that have traffic profiles that are very imbalanced (either inbound or outbound) Networks that do not have an overwhelming market share or have lower traffic volumes Networks that are more concerned with performance than top line revenue

14 Selective peering policies Carrier networks that have traffic profiles that are imbalanced (either inbound or outbound) Networks that do not have an overwhelming market share but with higher traffic volumes Networks that are most concerned with bottom line revenue

15 Restrictive peering policies Carrier networks that have traffic profiles that are very balanced Networks that have close to monopolistic market share Networks that are more concerned with top line revenue than performance

16 Sample peering policies

17 Sample peering policy Network must have backbone circuits of X size The network considering the peering wants to know that there is sufficient network between each of your POPs to handle both day-to-day operations as well as be able to route during failure/maintenance conditions. Also shows that your network is large enough to be considered a peer. Network must interconnect in X locations The network considering the peering is not interested in carrying all the traffic to or from you. With multiple interconnection points, there will be some hot-potatoing of traffic that will be in their best interest. Also shows that your network is large enough to be considered a peer.

18 Sample peering policy Network must exchange X amount of traffic Peering can get expensive for larger networks, in capital expenditure (capex), operational expenditure (opex) as well as overhead (oh). Another metric designed to show that your network is large enough to be considered a peer. Network may not be a customer simultaneously If your company is already paying the network you are applying for peering with to exchange traffic, what is their motivation to make it free? Even if you are not sending them any traffic to their customers, its still a threat to their revenue.

19 Sample peering policy Network must have 24/7 NOC The network considering the peering wants to know that you take your IP platform as serious as they do. There is also usually a stipulation that complaints be looked at withing X hours. Also shows that your network is large enough to be considered a peer. Network must maintain abuse desk Similar to a 24/7 NOC, an abuse desk is vital for IP operations. Directly connecting to a network creates some additional security risk for a network. Both sides should have a way to handle those risks.

20 Sample peering policy Network may only announce customer routes The definition of Settlement Free Interconnect (SFI) is that each network only announces their customer routes to each other, but there are networks that would announce other routes to influence peering metrics. Network may not point default route to other network Needing to point default route at another network is a clear sign that there is an imbalance in networks. Networks that have been discovered to point default are immediately depeered and publicly shamed.

21 Sample peering policy Network must filter their customers announcements For many networks, maintaining a prefix-list access-list or even an as-path access-list does not scale. There is a certain degree of trust among peers when they exchange Network Layer Reachability Information (NLRI). Network must announce routes consistently By selectively announcing or withdrawing routes from particular peering points, a network can force their peering partner to carry more traffic than they should. Consistent announcements allows both sides to handle their own TE.

22 Sample peering policy Network must maintain X ratio of traffic For some networks, there is a belief that the ratio of traffic exchanged indicates whether another network is a peer or a customer. An imbalance in either direction can indicate that the network will have to carry more of the burden of traffic delivery than the other network. There is a long standing debate whether ratios should be a peering metric or not, and its an emotional subject for many. With increase of peer to peer traffic, many ISPs have much more balanced traffic than before! e.g. You send 200Mb, You get 100Mb: 2:1 ratio

23 Lesser used peering policy items Network must transit X amount of ASNs To some networks, this is an indication that your network is large enough to peer with. Network must maintain single global ASN Like the requirement about consistent announcements, a peering manager wants to make sure that they would get all routes in all locations with identical route characteristics. Network must aggregate their routes Similar to global ASN and consistent announcements, this requirement ensures that the network applying for peering carries its fair share of traffic.

24 Lesser used peering policy items Network must register routes with routing registry Most network wont actually filter based on routes registered in a route registry, but if everyone did, the internet would be a lot more secure. This shows that the applying network is at least attempting to filter its customers. Network must interconnect with interfaces of at least X size Ensures that traffic will not be bottle-necked based on the physical interconnections themselves. Also shows that your network is large enough to be considered a peer.

25 Lesser used peering policy items Network must peer with each other in all locations that they operate (including home market) This is assumed by most peering policies as it seems almost obvious, but there are networks that refuse to peer in their home markets, and if they do, they will not qualify for peering with networks that either have this stipulation in writing or implication. Network must have peering.db entry It is difficult to keep contact information up to date for many network operators, so having a central database of network and contact information is critical for many networks.

26 Peering physical interconnections

27 Peering physical interconnections Public Interconnections Internet eXchange Platforms (IXPs) are often times a very economical method of exchanging traffic, assuming the peering policy is at least selective. Generally done by multiple networks connecting to an ethernet switch or fabric. Private Interconnections Often referred to as Private Network Interconnections (PNIs). Can be either be ethernet or sonet/sdh based, but the key is that its a Point To Point (PTP) circuit.

28 Multilateral vs Bilateral IXPs Bilateral BGP sessions Peering coordinators can pick and choose which networks to peer with. Some IXs with hundreds of networks makes this difficult for operations departments to keep up with flapping peers, maintenances, etc. Multilateral BGP sessions An option at many IXs around the world, but for some reason, required at many LATAM IXs. Discourages networks from connecting with selective or restrictive peering policies. Beneficial if governmental mandate that all local ISPs must connect to the IX. Low administrative overhead.

29 Notable IXPs for South America FAPESP/NapDoBrasil- established 1989 PTTBrasil- established 2004 CABASE- established 1989 NOTA- established 2001 NAP Chile- established 1997 NAP Peru- established 2000 NAP Colombia- established 1998 NAP Ecuador- established 2001

30 Sample peering fabric (AMSIX)

31 What is peering.db?

32 Peering.db A peering database that everyone should have an entry in and keep maintained. Created by and for peering coordinators. A chance to publish information to let other companies know about your network and how to contact you. A reference of Internet eXchange (IX) points and colocation facilities.

33 Peering.db homepage

34 Peering.db networks view

35 Peering.db facilities view

36 Peering.db exchange point view

37 Getting started with peering.db Navigate to and register a user account. Use your work address. You will then be prompted to attach your user record to a network record. If one already exists for your company, you will need to be verified by the creator of the account. If one doesnt exist, you can create your company record. Putting more information into your company record will ensure more people will know about you and contact you!

38 Meetings to attend

39 Conferences to attend LACNIC Best concentration of Latin American network operators and peering coordinators. But you already know that, youre here GPF (Global Peering Forum) Good mix of North American, European, Asian, and Latin American peering coordinators. GTM (Global Telecommunications Meeting) Executive level meetings with global carriers. NANOG Mostly North American operators and peering coordinators.

40 Tips for successful conferences Know who is attending Check the attendee list and make a list of people that work at networks that you work or want to work with. Ask the meeting coordinators to help with introductions if necessary. Schedule meetings before you arrive The best way to ensure you speak to everyone you want to is to them and fill up your appointment calendar. Send out-going, friendly, English speaking people A lot can get done at the actual meetings, but a good company representative can make the initial contacts and pass along contact information as well.

41 Peering negotiations

42 First and foremost, know your network Who are your marquee customers? Your customers make you interesting. Its OK if you dont have transit customers, traffic sourced or destined to your network can many times be interesting enough. Singly-homed traffic gives you power. There is only one place to get that traffic from, YOU! What markets and networks does your traffic come from? Where is it going? Does your network architecture/hardware allow you to expand into many or few sites? Have facts and figures of your network profile.

43 I know who am I, who are you? How do you know where your traffic is coming from/going to? You may have a gut feeling, but is your company going to spend millions of dollars on a feeling? Use flow-based tools to find out for sure, you may be surprised. Create a list of top networks that you exchange traffic with that you are not currently peering with, and rank them by amount of traffic.

44 Know your target peers network Now you know who you want to peer with, what next? Before you contact them, find out where they have network POPs. Check company website for network maps. Check peering.db for a list of facilities and IXs. If possible, find out what size the network is You may only be exchanging 1Gbps of traffic, but that may be 10% of their traffic. Most networks would welcome peering off that percentage of traffic. What type of peering strategy do they have?

45 The actual negotiation (part 1) Most networks have open peering policies, so if youre both connected to an IX, peering can begin within hours or days of initial contact. What if someone has a selective policy? Chances are if you have an interesting enough network or if they dont sell transit in your home market, youll be able to peer. Many selective networks have peering policies that they expect you to meet.

46 The actual negotiation (part 2) The most difficult network to get peering from is the restrictive network. Timing is everything. Some restrictive networks are forced to maintain a certain number of peered networks due to merger regulations. In these cases, smaller traffic flows are in your favor. Depending on who your upstream is, there may be congestion or ratio issues with their peering partner, so to help alleviate those concerns, you may qualify for peering. You cant get what you dont ask for. To the bold goes the spoils!

47 Network expansion?

48 Expanding your network for peering Theoretically, you now know that if you expand into a new POP, you could pick up X amount of peering, time to start making introductions. But who do you talk to? Contact the colocation provider and IXP operators in the target city. They usually have contacts at all the networks they provide services to. Plus, more peering for you means more business for them, so they have business reasons to want you to join and exchange traffic. Many networks use generic mailing lists for common tasks, such as or

49 Expanding your network for peering either the contacts you gather or as a worst case scenario, the list alias. Include a description of your network is and why they should want to peer with you. This is your opportunity to brag about your network. Create a list of favorable responses and how much traffic that represents. Now the important part, find out whether it makes sense for you to expand your network in order to peer!

50 Building a business case Get quotes from colocation providers and transport providers and compute how much its going to cost to build a new POP. Divide that cost by how much traffic you believe you will be able to peer. If that cost is lower than how much you pay for transit, you have a good case to expand your network. Transit may cost less. Its not always cheaper to peer. Consider other factors like performance, redundancy, ability to meet previously unattainable peering policies.

51 In summary

52 Summary Devote one person to peering at your company, its a full time job! Design your network so that you are flexible enough to achieve your traffic engineering goals. Create a viable peering strategy that fits your network. The more visible you are, the more successful your peering will be. This includes using industry standard mailing list aliases and joining peering.db! Know as much about your target network as you can. Send the right people to the right meetings. Remember that in the end, its all dollars and sense.

Questions? Guy Tal Director of Strategic Planning Copyright © 2008 Limelight Networks. All rights reserved.