SlideShare a Scribd company logo
1 of 18
BGP Peering Engineering
Automation challenges and enablers
Paolo Lucente
November 2015
Cloud & Virtualization Group
Introduction
• Inter-domain traffic includes all traffic crossing the boundary of
networks
• BGP is used to exchange reachability information among networks
• Inter-domain traffic engineering has been historically hard:
 Control traffic to meet objectives
 Estimate the effects of changes
• We describe these problems and discuss potential solutions
• Main objective being (semi-)automation
AS1
RR
Observed backbone
R1
R2
R3
R4
R5
Neighboring ASes
AS2
AS3
AS4
AS5
R1
Ingress
Traffic
Focus
Some high-level use-cases
• Design/architectural/business:
 Simulate optimal placement of interconnects
 Simulate impact of interconnect failures
• Operational:
 Simulate impact of (BGP policy) changes without disrupting live traffic
Egress / Ingress differences
• Egress and ingress traffic are differently managed
• Egress traffic:
 Operators have control on the paths they would like to use for their traffic
• Ingress traffic:
 Depends on how the other networks decide
 Operators can try to influence the decision of others
Egress traffic
• Routers decide the best path using the BGP decision process
• Operators change attributes of the paths to reflect their policy
• The typical egress TE process consists in tweaking attributes to steer
traffic as desired
• Old problem:
 Feamster et al. “Guidelines for interdomain traffic engineering”. CCR. 2003.
 Nanog presentations (e.g. Wepman, 2004; Roisman, 2009; etc.)
• Proposed workflow: collection, simulation, optimization, deployment
EPE Challenges: Collection
• Requires the collection of different sources of data:
 BGP paths, traffic, policy
• Over time mostly non-standard or mature APIs:
 BGP paths (BGP Add-Path, BMP)
 Traffic (Netflow/IPFIX, sFlow)
 Policy (Tail-f, Openconfig project)
Collection Simulation Optimization Deployment
EPE Challenges: Simulation
• What-if scenarios hard to simulate
• BGP decision process is complex:
 RRs add a level of complexity
 Not always deterministic
 Proper network design
• Focus on the important prefixes
 Identify importance, ie. by service or by IP prefixes/paths making more traffic
 Prioritize or exclude
Collection Simulation Optimization Deployment
EPE Challenges: Optimization
• Not easy to move traffic in a granular way:
 Changing LP, MED changes everything
 Need to include IGP into account
 iBGP policies are typically not desirable
• Complex metrics:
 For example: latency, bit-miles calculations
 No standard way to include in the optimization process
Collection Simulation Optimization Deployment
EPE Challenges: Deployment
• Alternatives to deploy:
 Operate changes (ie. policies) at network edges
 Injection of best paths via a BGP controller
• Using controllers to operate changes:
 Collection would be similar
 Southbound interface might vary (BGP itself, Openflow, etc.)
 Segment Routing as a solution
Collection Simulation Optimization Deployment
Segment Routing: very quick intro (1/3)
• Segment Routing uses Segment IDs to identify links (or services)
• MPLS or IPv6 to define the labels
• Ingress routers and can use SR to control internal path and external
path
• Filsfils et al. “The Segment Routing Architecture”. Globecomm. 2015.
• For inter-domain traffic, SR allows for granularly steering traffic
without being impacted by IGP or other metrics
Segment Routing: very quick intro (2/3)
Segment Routing: very quick intro (3/3)
Ingress traffic
• An operator attempts to attract traffic over specific links
• Complex by design: the Internet is formed by networks with different
policies:
 Conflicts could be unsolvable
 Some Content providers don’t even use BGP to select a source and path
• Proposed workflow: deployment, collection, assessment, negotiation
Ingress: Deploy
• Different tools can be used to influence other ASNs:
 AS-Path prepending
 MEDs, Communities
 Prefix de-aggregation or hiding
• Other routers paradigms such as LISP provide more direct ways of
influencing the inbound path:
 But policies would still prevail
Deployment Collection Assessment Negotiation
Ingress: Collect, Assess, Negotiate
• Collect:
 Similar to the egress case
 External data might be useful
• Assess:
 Keep track of the implemented mechanism. Ensure that it works
• Negotiate:
 Talk to your neighbors. They might be willing to cooperate
Deployment Collection Assessment Negotiation
Conclusions and closing words
• Take control of your data
• Security was not discussed, but it is an important issue:
 New data to monitor
 more decisions to make
 (Discard a route with problems or lower its preference?)
【EPN Seminar Nov.10. 2015】 パネルディスカッション その2: BGP Peering Engineering Automation challenges and enablers

More Related Content

What's hot

Prefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul IslamPrefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul Islam
MyNOG
 

What's hot (20)

DEVNET-1006 Getting Started with OpenDayLight
DEVNET-1006	Getting Started with OpenDayLightDEVNET-1006	Getting Started with OpenDayLight
DEVNET-1006 Getting Started with OpenDayLight
 
SDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural EvolutionSDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural Evolution
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
 
CCNA Training Tutorial in bangaore
CCNA Training Tutorial in bangaoreCCNA Training Tutorial in bangaore
CCNA Training Tutorial in bangaore
 
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment RoutingPLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
SEGMENT Routing
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
 
Segment routing tutorial
Segment routing tutorialSegment routing tutorial
Segment routing tutorial
 
Innovation is back in the transport and network layers
Innovation is back in the transport and network layersInnovation is back in the transport and network layers
Innovation is back in the transport and network layers
 
Catena
CatenaCatena
Catena
 
WAN SDN meet Segment Routing
WAN SDN meet Segment RoutingWAN SDN meet Segment Routing
WAN SDN meet Segment Routing
 
IPv6 Entreprise Multihoming
IPv6 Entreprise MultihomingIPv6 Entreprise Multihoming
IPv6 Entreprise Multihoming
 
PLNOG 13: Michał Dubiel: OpenContrail software architecture
PLNOG 13: Michał Dubiel: OpenContrail software architecturePLNOG 13: Michał Dubiel: OpenContrail software architecture
PLNOG 13: Michał Dubiel: OpenContrail software architecture
 
Intel omni path architecture
Intel omni path architectureIntel omni path architecture
Intel omni path architecture
 
Prefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul IslamPrefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul Islam
 
0-RTT TCP converters
0-RTT TCP converters0-RTT TCP converters
0-RTT TCP converters
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
PLB
PLBPLB
PLB
 
SDN Project PPT
SDN Project PPTSDN Project PPT
SDN Project PPT
 
Scaling Networks with Segment Routing
Scaling Networks with Segment RoutingScaling Networks with Segment Routing
Scaling Networks with Segment Routing
 

Similar to 【EPN Seminar Nov.10. 2015】 パネルディスカッション その2: BGP Peering Engineering Automation challenges and enablers

E rou01 routing_basics
E rou01 routing_basicsE rou01 routing_basics
E rou01 routing_basics
tanawan44
 

Similar to 【EPN Seminar Nov.10. 2015】 パネルディスカッション その2: BGP Peering Engineering Automation challenges and enablers (20)

Routing, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of AnalyticsRouting, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of Analytics
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
network design 8.pptx
network design 8.pptxnetwork design 8.pptx
network design 8.pptx
 
Monitoring Route Changes
Monitoring Route ChangesMonitoring Route Changes
Monitoring Route Changes
 
15 coms 525 tcpip - border gateway protocols
15    coms 525 tcpip - border gateway protocols15    coms 525 tcpip - border gateway protocols
15 coms 525 tcpip - border gateway protocols
 
Sept 2017 dynamic routing
Sept 2017   dynamic routingSept 2017   dynamic routing
Sept 2017 dynamic routing
 
CCCNP ROUTE v6_ch05
CCCNP ROUTE  v6_ch05CCCNP ROUTE  v6_ch05
CCCNP ROUTE v6_ch05
 
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
 
bgp(border gateway protocol)
bgp(border gateway protocol)bgp(border gateway protocol)
bgp(border gateway protocol)
 
Border gateway protocol
Border gateway protocolBorder gateway protocol
Border gateway protocol
 
CCCNP ROUTE v6_ch04
CCCNP ROUTE  v6_ch04CCCNP ROUTE  v6_ch04
CCCNP ROUTE v6_ch04
 
E rou01 routing_basics
E rou01 routing_basicsE rou01 routing_basics
E rou01 routing_basics
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
Working with Northstar
Working with NorthstarWorking with Northstar
Working with Northstar
 
SDN/NETWORK AUTOMATION THROWDOWN COMPETITION
SDN/NETWORK AUTOMATION THROWDOWN COMPETITIONSDN/NETWORK AUTOMATION THROWDOWN COMPETITION
SDN/NETWORK AUTOMATION THROWDOWN COMPETITION
 
2 routing
2 routing2 routing
2 routing
 
PLNOG 3: John Evans - Best Practices in Network Planning
PLNOG 3: John Evans - Best Practices in Network PlanningPLNOG 3: John Evans - Best Practices in Network Planning
PLNOG 3: John Evans - Best Practices in Network Planning
 
routing basics - (static-default-dynamic)
routing basics - (static-default-dynamic)routing basics - (static-default-dynamic)
routing basics - (static-default-dynamic)
 
Lecture 04 networking
Lecture 04 networkingLecture 04 networking
Lecture 04 networking
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 

More from シスコシステムズ合同会社

More from シスコシステムズ合同会社 (20)

Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)
 
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用
 
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)
 
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
 
IOS/IOS-XE 運用管理機能アップデート
IOS/IOS-XE 運用管理機能アップデートIOS/IOS-XE 運用管理機能アップデート
IOS/IOS-XE 運用管理機能アップデート
 
【Interop Tokyo 2016】 ShowNet - SSS-17 : ShowNet 2016 を支える シスコの最新テクノロジー
【Interop Tokyo 2016】 ShowNet - SSS-17 :  ShowNet 2016 を支えるシスコの最新テクノロジー【Interop Tokyo 2016】 ShowNet - SSS-17 :  ShowNet 2016 を支えるシスコの最新テクノロジー
【Interop Tokyo 2016】 ShowNet - SSS-17 : ShowNet 2016 を支える シスコの最新テクノロジー
 
【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...
【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...
【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...
 
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
 
【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス
【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス
【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス
 
【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢
【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢
【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢
 
【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...
【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...
【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...
 
【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション
【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション
【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション
 
【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング
【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング
【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング
 
【Interop Tokyo 2016】 ネットワーク モデリングと自動制御
【Interop Tokyo 2016】 ネットワーク モデリングと自動制御【Interop Tokyo 2016】 ネットワーク モデリングと自動制御
【Interop Tokyo 2016】 ネットワーク モデリングと自動制御
 
【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)
【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)
【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)
 
【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス
【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス
【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス
 
【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...
【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...
【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...
 
【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化
【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化
【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化
 
【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要
【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要
【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要
 
【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介
【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介
【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

【EPN Seminar Nov.10. 2015】 パネルディスカッション その2: BGP Peering Engineering Automation challenges and enablers

  • 1. BGP Peering Engineering Automation challenges and enablers Paolo Lucente November 2015 Cloud & Virtualization Group
  • 2. Introduction • Inter-domain traffic includes all traffic crossing the boundary of networks • BGP is used to exchange reachability information among networks • Inter-domain traffic engineering has been historically hard:  Control traffic to meet objectives  Estimate the effects of changes • We describe these problems and discuss potential solutions • Main objective being (semi-)automation
  • 4. Some high-level use-cases • Design/architectural/business:  Simulate optimal placement of interconnects  Simulate impact of interconnect failures • Operational:  Simulate impact of (BGP policy) changes without disrupting live traffic
  • 5. Egress / Ingress differences • Egress and ingress traffic are differently managed • Egress traffic:  Operators have control on the paths they would like to use for their traffic • Ingress traffic:  Depends on how the other networks decide  Operators can try to influence the decision of others
  • 6. Egress traffic • Routers decide the best path using the BGP decision process • Operators change attributes of the paths to reflect their policy • The typical egress TE process consists in tweaking attributes to steer traffic as desired • Old problem:  Feamster et al. “Guidelines for interdomain traffic engineering”. CCR. 2003.  Nanog presentations (e.g. Wepman, 2004; Roisman, 2009; etc.) • Proposed workflow: collection, simulation, optimization, deployment
  • 7. EPE Challenges: Collection • Requires the collection of different sources of data:  BGP paths, traffic, policy • Over time mostly non-standard or mature APIs:  BGP paths (BGP Add-Path, BMP)  Traffic (Netflow/IPFIX, sFlow)  Policy (Tail-f, Openconfig project) Collection Simulation Optimization Deployment
  • 8. EPE Challenges: Simulation • What-if scenarios hard to simulate • BGP decision process is complex:  RRs add a level of complexity  Not always deterministic  Proper network design • Focus on the important prefixes  Identify importance, ie. by service or by IP prefixes/paths making more traffic  Prioritize or exclude Collection Simulation Optimization Deployment
  • 9. EPE Challenges: Optimization • Not easy to move traffic in a granular way:  Changing LP, MED changes everything  Need to include IGP into account  iBGP policies are typically not desirable • Complex metrics:  For example: latency, bit-miles calculations  No standard way to include in the optimization process Collection Simulation Optimization Deployment
  • 10. EPE Challenges: Deployment • Alternatives to deploy:  Operate changes (ie. policies) at network edges  Injection of best paths via a BGP controller • Using controllers to operate changes:  Collection would be similar  Southbound interface might vary (BGP itself, Openflow, etc.)  Segment Routing as a solution Collection Simulation Optimization Deployment
  • 11. Segment Routing: very quick intro (1/3) • Segment Routing uses Segment IDs to identify links (or services) • MPLS or IPv6 to define the labels • Ingress routers and can use SR to control internal path and external path • Filsfils et al. “The Segment Routing Architecture”. Globecomm. 2015. • For inter-domain traffic, SR allows for granularly steering traffic without being impacted by IGP or other metrics
  • 12. Segment Routing: very quick intro (2/3)
  • 13. Segment Routing: very quick intro (3/3)
  • 14. Ingress traffic • An operator attempts to attract traffic over specific links • Complex by design: the Internet is formed by networks with different policies:  Conflicts could be unsolvable  Some Content providers don’t even use BGP to select a source and path • Proposed workflow: deployment, collection, assessment, negotiation
  • 15. Ingress: Deploy • Different tools can be used to influence other ASNs:  AS-Path prepending  MEDs, Communities  Prefix de-aggregation or hiding • Other routers paradigms such as LISP provide more direct ways of influencing the inbound path:  But policies would still prevail Deployment Collection Assessment Negotiation
  • 16. Ingress: Collect, Assess, Negotiate • Collect:  Similar to the egress case  External data might be useful • Assess:  Keep track of the implemented mechanism. Ensure that it works • Negotiate:  Talk to your neighbors. They might be willing to cooperate Deployment Collection Assessment Negotiation
  • 17. Conclusions and closing words • Take control of your data • Security was not discussed, but it is an important issue:  New data to monitor  more decisions to make  (Discard a route with problems or lower its preference?)