Multi-path Interdomain ROuting by Xu and Rexford Alan Dunn Topics in Network Protocol Design March 5, 2010.

Slides:



Advertisements
Similar presentations
Internetworking II: MPLS, Security, and Traffic Engineering
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Technical Aspects of Peering Session 4. Overview Peering checklist/requirements Peering step by step Peering arrangements and options Exercises.
1 Interdomain Traffic Engineering with BGP By Behzad Akbari Spring 2011 These slides are based on the slides of Tim. G. Griffin (AT&T) and Shivkumar (RPI)
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
Lecture 9 Overview. Hierarchical Routing scale – with 200 million destinations – can’t store all dests in routing tables! – routing table exchange would.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Lecture 6 Overlay Networks CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
CS 164: Global Internet Slide Set In this set... More about subnets Classless Inter Domain Routing (CIDR) Border Gateway Protocol (BGP) Areas with.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
Interdomain Routing and The Border Gateway Protocol (BGP) Courtesy of Timothy G. Griffin Intel Research, Cambridge UK
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
On Multi-Path Routing Aditya Akella 03/25/02. What is Multi-Path Routing?  Dynamically route traffic Multiple paths to a destination Path taken dependant.
14 – Inter/Intra-AS Routing
Wen Xu and Jennifer Rexford Princeton University MIRO : Multi-path Interdomain ROuting.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Computer Networks Layering and Routing Dina Katabi
Inter-domain Routing Outline Border Gateway Protocol.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Internet Routing: Measurement, Modeling, and Analysis Dr. Jia Wang AT&T Labs Research Florham Park, NJ 07932, USA
I-4 routing scalability Taekyoung Kwon Some slides are from Geoff Huston, Michalis Faloutsos, Paul Barford, Jim Kurose, Paul Francis, and Jennifer Rexford.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Introduction to BGP.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
IP is a Network Layer Protocol Physical 1 Network DataLink 1 Transport Application Session Presentation Network Physical 1 DataLink 1 Physical 2 DataLink.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
Lecture 4: BGP Presentations Lab information H/W update.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
Border Gateway Protocol
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
Network Layer4-1 Intra-AS Routing r Also known as Interior Gateway Protocols (IGP) r Most common Intra-AS routing protocols: m RIP: Routing Information.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Internet Protocol: Routing IP Datagrams Chapter 8.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
CSCI-1680 Network Layer: Inter-domain Routing Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, Rodrigo Fonseca John Jannotti.
An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many.
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Spring 2010CS 3321 Interdomain Routing. Spring 2010CS 3322 How to Make Routing Scale Flat versus Hierarchical Addresses Inefficient use of Hierarchical.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
Inter-domain Routing Outline Border Gateway Protocol.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Routing Jennifer Rexford.
Border Gateway Protocol
COMP 3270 Computer Networks
BGP supplement Abhigyan Sharma.
Interdomain Traffic Engineering with BGP
Net 323 D: Networks Protocols
Net 323 D: Networks Protocols
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks
BGP Instability Jennifer Rexford
Computer Networks Protocols
Network Layer: Internet Inter-Domain Routing
Presentation transcript:

Multi-path Interdomain ROuting by Xu and Rexford Alan Dunn Topics in Network Protocol Design March 5, 2010

Outline Motivation Protocol Description Evaluation

Motivation Examine “large scale” (interdomain) routing Involves parties with varying security and performance needs Claim: Current interdomain routing is too inflexible for current needs

Reminder: BGP – Border Gateway Protocol Standard Autonomous System (AS) level routing protocol “BGP speakers” for AS advertise complete AS paths for aggregate routes as represented by IP prefixes BGP routes combine with Interior Gateway Protocol (IGP) routing schemes (RIP, OSPF) to form full routes across Internet

BGP Example AS 7018 (AT&T) AS 1239 (Sprint) AS 18 (UT Austin) /16 next-hop = AS_PATH = AS 209 AS /16 next-hop = 1 AS_PATH = /16 next-hop = 2 AS_PATH = /16 -> /16 -> /16 -> /16 -> 2 ??? /16 next-hop = 3 AS_PATH =

BGP Strengths/Weaknesses AS level management allows tractability (16- bit AS space) Routing metric is coarse – Number of ASes: not necessarily related to path performance or length Inflexible – ASes export one path per prefix – No recourse for downstream nodes for undesirable paths

Problem Description Allow for greater flexibility in path selection Concerns: – Incrementality – hard to modify deployed system – Manageability – can’t keep track of too much data – Authority – allow for AS autonomy

Potential Solutions Source routing: Let hosts or edge routers pick route Very flexible Problems: – Ends have to know which route to take – Intermediate domains lose control

Source Routing Example Feedback Based Routing (Zhu et. al. 02) Two types of routers: Access routers and Transit routers – One access router per end organization – Transit routers in non-stub ASes Transit routers only forward packets based upon contained tokens and propagate (flood) link existence information Access routers are responsible for route computation and monitoring (select best route based upon RTT)

Potential Solutions (cont’d) Overlay routing: Impose virtual topology over the Internet Choice in routing by picking intermediate nodes from the overlay which in turn forward toward the ultimate destination Problems: – Encapsulation overhead – Little path control: dependent on underlying paths that exist between intermediate nodes (runs on top of existing Internet protocols)

MIRO Protocol Main idea: Add route negotiation to BGP – Party that desires change in routing contacts other ASes – ASes may reveal other stored routes that were not previously exported Exact form of querying – types of policy that routers will be able to understand - left unspecified

Example of MIRO Negotiation AS A wants to select a route to F that avoids AS E 1.A queries B: Any route to F avoiding E? 2. B responds to A: BCF 3. A accepts

MIRO Protocol (cont’d) How does this address our goals? Incrementality: Nodes that don’t know about MIRO simply ignore it and continue with BGP Manageability: Routing still on AS level, only new state is that of added tunnels, which should be small compared to BGP routing Authority: Intermediate ASes get to choose which routes to reveal - additionally could set conditions for revealed routes (eg: charge for traffic)

MIRO Protocol – Additional Details Negotiation Details – No special multilateral negotiation – Querying can be done by proxy – AS that receives a request can in turn query other nodes – Not necessarily clear who to query for particular request Conceptual state for established routes – When path established by negotiation, tunnel identifier created at AS that originated new route – Querying AS uses that identifier to send along the chosen AS route

MIRO State Establishment 3. A accepts route BCF 4. Confirmed, your tunnel ID is 7 Tunnel IDNext hop 7C DestinationNext hop “Prefixes with AS routes that end in F” B, id = 7

MIRO – Implementation Considerations Implementation of tunnel concept – Option 1: IP address per link – Option 2: Single link for all tunnels + additional tunnel identifier 1 2 Link addr: 3 Link addr: 4 Link addr: Tunnel addr: 3

MIRO – Implementation Considerations (cont’d) IP address per link – Easier to implement – Reveals extra topology information to upstream – Could break from changes in internal AS topology Single address and separate tunnel identifier – Reveals no extra topology information – Requires packet rewriting

Evaluation – What to Evaluate Goal: Demonstrate enough flexibility to implement some potentially desired policies Policies chosen: Avoiding an AS, load balancing

Evaluation – Difficulties Ideally, would test on Internet – Unfortunately, impossible for protocol that changes core routing Instead used RouteViews – As part of AS 6447, conducts eBGP pairings with a number of network backbones – Allowed to do this because it does not pass on any information learned – Can use this data to see which BGP routes an AS knows and further which routes it actually propagated

Evaluation – Difficulties (cont’d) AS generally not willing to export all routes Economic reasons at play: AS relationships AS relationships and their details are often not public information Four main roles (Gao 01): – Provider – Consumer – Siblings – Peers

AS Relationships Guiding principle for AS relationships: Don’t carry traffic unless it benefits your AS AB C AS_PATH = Producer: Provides service to Consumer, wants Consumer to know routes through it Consumer: Receives routes from Producers, does not want to transit traffic between them (would get charged twice!) = Provider to Consumer

AS Relationships (cont’d) Peers: Willing to cooperate to service each others customers, but not willing to transit for other peers Siblings: Full cooperation – willing to transit for other siblings AB C AS_PATH = D E F = Provider to Consumer = Siblings = Peers

AS Relationships (cont’d) Can infer AS relationships from BGP route data A B … C … D Idea: Allowed exports have a certain pattern – moved “uphill” to providers and then redistributed “downhill” to consumers AS_PATH =

Evaluation MIRO evaluated under three conditions depending on willingness of ASes to export routes: – Strict: ASes only export routes with same local preference – Respect export policy: ASes willing to export routes obeying previously described relationships – Most flexible ASes willing to export all routes (mostly hypothetical scenario)

Evaluation – Avoiding an AS For each AS, examine ability to avoid every non-neighbor AS Why is this not 100%? Although any AS path can be chosen with source routing, sometimes there is no path that can avoid an AS Probably due to distribution of number of neighbors per node

Evaluation – Cost of Avoiding an AS AS#/tuple: Number of ASes that were contacted in order to establish a new pair (= communication cost) Path#/tuple: Number of candidate paths that were considered (= server load) Note: Unclear from their work whether these include unsuccessful attempts, which could be costly

Evaluation - Incrementality Observation: Only a small number of ASes in the BGP topology are particularly well connected Deploying MIRO at these nodes may have a greater effect

Evaluation – Incrementality (cont’d) Deploying at 0.2 percent most connected nodes will yield 50% success rate

Evaluation – Load Balancing AS wants to rebalance incoming traffic among its incoming links Can do this by asking upstream node to advertise alternate routes Upstream nodes that lie on route to destination for many sources: “power nodes” A D C B Congested D: Can you use routes to me that don’t end in AD?

Evaluation – Load Balancing (cont’d) Important assumption: Equal traffic per link

Extra Slides