Home
Explore
Submit Search
Upload
Login
Signup
Advertisement
Check these out next
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
Odinot Stanislas
Request routing in CDN
Sandeep Kath
Next Generation Service Edge Platform Amos_K.
Amos Kohn
ApacheCon-Flume-Kafka-2016
Jayesh Thakrar
LINE's Infrastructure Platform: How It Scales Massive Services and Maintains ...
LINE Corporation
LISP and NSH in Open vSwitch
mestery
Private cloud networking_cloudstack_days_austin
Chiradeep Vittal
Rina2020 michal
Eduard Grasa
1
of
45
Top clipped slide
Traffic Engineering for CDNs
Nov. 3, 2015
•
0 likes
1 likes
×
Be the first to like this
Show More
•
2,615 views
views
×
Total views
0
On Slideshare
0
From embeds
0
Number of embeds
0
Download Now
Download to read offline
Report
Internet
Traffic Engineering for CDNs
Bangladesh Network Operators Group
Follow
bdNOG
Advertisement
Advertisement
Advertisement
Recommended
Traffic Engineering for CDNs by Matt Jansen [APRICOT 2015]
APNIC
707 views
•
41 slides
Federated CDNs: What every service provider should know
Patrick Hurley
3.2K views
•
12 slides
Edge to Instance - AWS Networking
Amazon Web Services
1.6K views
•
52 slides
L4-L7 services for SDN and NVF by Youcef Laribi
buildacloud
2.1K views
•
51 slides
GPX Data ingestion & DX Presentataion at AWS Mumbai Summit 2017
Cloudxchange.io
305 views
•
23 slides
Building AWS Compatible Cloud Services
Shinichiro Kashiwagi
1.5K views
•
22 slides
More Related Content
Slideshows for you
(20)
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
Odinot Stanislas
•
5.7K views
Request routing in CDN
Sandeep Kath
•
6.3K views
Next Generation Service Edge Platform Amos_K.
Amos Kohn
•
332 views
ApacheCon-Flume-Kafka-2016
Jayesh Thakrar
•
1.9K views
LINE's Infrastructure Platform: How It Scales Massive Services and Maintains ...
LINE Corporation
•
2.9K views
LISP and NSH in Open vSwitch
mestery
•
6.8K views
Private cloud networking_cloudstack_days_austin
Chiradeep Vittal
•
1.7K views
Rina2020 michal
Eduard Grasa
•
606 views
Autoscaling Distributed System with BOSH (Cloud Foundry Summit 2014)
VMware Tanzu
•
5.8K views
Interconnection in Regional Markets
Tom Paseka
•
2.1K views
20190727 HashiCorp Consul Workshop: 管管你們家 config 啦
Jiun-Yi Chen
•
1.1K views
New Zealand and the world as a CDN
Tom Paseka
•
666 views
Apache Flume - DataDayTexas
Arvind Prabhakar
•
6.2K views
How Apache Pulsar Helps Tencent Process Tens of Billions of Transactions Effi...
StreamNative
•
426 views
16482038 dnl marketing2016
Anne Kwong
•
630 views
Multi-Tenancy Kafka cluster for LINE services with 250 billion daily messages
LINE Corporation
•
2.5K views
MSB Deep Dive
Huabing Zhao
•
988 views
Webinar: Flink SQL in Action - Fabian Hueske
Ververica
•
1K views
Cdn technology overview
Yoohyun Kim
•
92 views
Data center network architectures v1.3
Jeong, Wookjae
•
4.2K views
Viewers also liked
(20)
EDNS0 Client-Subnet for DNS Based CDNs
Bangladesh Network Operators Group
•
1.1K views
Dot BD Domain and Shared Registry Model- A Policy Proposal
Bangladesh Network Operators Group
•
750 views
bdCERT Activities Update
Bangladesh Network Operators Group
•
742 views
ISOC Engagement Activities
Bangladesh Network Operators Group
•
459 views
ICANN Engagement Update
Bangladesh Network Operators Group
•
726 views
bdNOG Conference Report
Bangladesh Network Operators Group
•
659 views
IPv6 Address & Deployment Planning
Bangladesh Network Operators Group
•
1K views
Securing Asterisk: A practical approach
Bangladesh Network Operators Group
•
1.5K views
Converged & Efficient Licensing Framework
Bangladesh Network Operators Group
•
1.1K views
APNIC42 Announcement
Bangladesh Network Operators Group
•
485 views
Best Current Operational Practice (BCOP) - Updates from around the world
Bangladesh Network Operators Group
•
560 views
OpenStack Cloud Administration Through Live Demonstration
Bangladesh Network Operators Group
•
818 views
Inter-AS MPLS VPN Deployment
Bangladesh Network Operators Group
•
2.9K views
Resource Public Key Infrastructure (RPKI)
Bangladesh Network Operators Group
•
774 views
Community Tools to Fight Against DDoS
Bangladesh Network Operators Group
•
1.2K views
Broadband for Digital Bangladesh & recommendation from ISPAB
Bangladesh Network Operators Group
•
2K views
Awareness of Children Internet Addiction
Bangladesh Network Operators Group
•
3K views
Challenges of L2 NID Based Architecture for vCPE and NFV Deployment
Bangladesh Network Operators Group
•
2.4K views
APNIC Policy Update
Bangladesh Network Operators Group
•
847 views
Shikkhok.com, An ISIF awarded project
Bangladesh Network Operators Group
•
979 views
Advertisement
Similar to Traffic Engineering for CDNs
(20)
Traffic Engineering for CDNs
MyNOG
•
1.7K views
BGP and Traffic Engineering with Akamai
Internet Society
•
4.3K views
EDNS0 Client-Subnet for DNS based CDNs by Matt Jansen
MyNOG
•
1.9K views
40 - IDNOG03 - Bob Lau (Akamai) - BGP and Traffic Engineering
Indonesia Network Operators Group
•
878 views
16 (IDNOG01) EDNS0 / How CDNS works by Matt Jansen
Indonesia Network Operators Group
•
4.4K views
Akamai company profile
rahulp9999
•
1.4K views
PLNOG 6: Christian Kaufmann - How Akamai delivers your packets - the insight
PROIDEA
•
107 views
PLNOG 6: Christian Kaufmann - How Akamai delivers your packets - the insight
PROIDEA
•
16 views
Multi cloud network leveraging sd-wan reference architecture
Matsuo Sawahashi
•
282 views
Business Models for Dynamically Provisioned Optical Networks
Tal Lavian Ph.D.
•
392 views
The Path to 100+ IXes
APNIC
•
540 views
Routing for an Anycast CDN
Tom Paseka
•
4.5K views
打破時空藩籬,輕鬆存取您的雲端工作負載
Amazon Web Services
•
814 views
打破時空藩籬-輕鬆存取您的雲端工作負載
Amazon Web Services
•
415 views
Scalable Web Applications in AWS, 2014
Vadim Zendejas
•
98 views
CDN
SN Chakraborty
•
211 views
Content Growth by Kams Yueng
MyNOG
•
3.8K views
Oracle E-Business Suite On Oracle Cloud
pasalapudi
•
444 views
Tổng quan công nghệ Net backup - Phần 2
NguyenDat Quoc
•
225 views
06 - IDNOG04 - Dion Leung (Coriant) - Emerging Trends & Real Deployments for ...
Indonesia Network Operators Group
•
619 views
More from Bangladesh Network Operators Group
(20)
IPv6 Deployment in South Asia 2022
Bangladesh Network Operators Group
•
38 views
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
•
79 views
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
•
37 views
An Overview about open UDP Services
Bangladesh Network Operators Group
•
208 views
12 Years in DNS Security As a Defender
Bangladesh Network Operators Group
•
93 views
Contents Localization Initiatives to get better User Experience
Bangladesh Network Operators Group
•
61 views
BdNOG-20220625-MT-v6.0.pptx
Bangladesh Network Operators Group
•
67 views
Route Leak Prevension with BGP Community
Bangladesh Network Operators Group
•
94 views
Tale of a New Bangladeshi NIX
Bangladesh Network Operators Group
•
65 views
MANRS for Network Operators
Bangladesh Network Operators Group
•
42 views
Re-define network visibility for capacity planning & forecasting with Grafana
Bangladesh Network Operators Group
•
81 views
RPKI ROA updates
Bangladesh Network Operators Group
•
19 views
Blockchain Demystified
Bangladesh Network Operators Group
•
72 views
Measuring the Internet Economy: How Networks Create Value
Bangladesh Network Operators Group
•
256 views
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
•
151 views
Route Origin Validation - A MANRS Approach
Bangladesh Network Operators Group
•
157 views
31, Get more from your IPv4 resources
Bangladesh Network Operators Group
•
3.1K views
The Post Covid-19 Cybersecurity World - Where Is It Headed?
Bangladesh Network Operators Group
•
144 views
Secured Internet Gateway for ISP with pfsense & FRR
Bangladesh Network Operators Group
•
502 views
EVPN Introduction
Bangladesh Network Operators Group
•
690 views
Advertisement
Recently uploaded
(20)
How to make money blogging
Abdul Waseem
•
0 views
如何办理一份高仿沃特福德理工学院毕业证成绩单?
aazepp
•
4 views
BKNIX Peering Forum 2023: APNIC Measurement Update
APNIC
•
6 views
【本科生、研究生】澳洲澳大利亚国立大学毕业证文凭购买指南
sutseu
•
0 views
6 Tips for Safeguarding Your Smartphone a.pdf
SofiyaBell
•
3 views
【本科生、研究生】英国西敏大学毕业证文凭购买指南
sutseu
•
0 views
英国阿斯顿大学毕业证文凭成绩单制作指南
abecue
•
3 views
英国纽卡斯尔大学毕业证文凭成绩单制作指南
abecue
•
2 views
美国霍华德大学毕业证文凭成绩单制作指南
abecue
•
2 views
学历证书制作学分不够如何办理中央大学毕业证成绩单
bazgeae
•
0 views
Presentation of application,Network And transport layer protocols Created by ...
sadafkoondhar
•
2 views
【本科生、研究生】意大利罗马美术学院毕业证文凭购买指南
sutseu
•
0 views
加拿大尼皮辛大学毕业证文凭成绩单制作指南
abecue
•
2 views
ThaiNOG 5: Security Tutorial
APNIC
•
46 views
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
ssuser01a66e
•
0 views
OUATTARAAboulaye-GL23_SRWE_02-certificate.pdf
AboulayeOuattara2
•
1 view
如何办理一份高仿西南俄克拉荷马州立大学毕业证成绩单?
t4x808fi
•
0 views
加拿大魁北克大学毕业证文凭成绩单制作指南
abecue
•
2 views
【本科生、研究生】美国科罗拉多高地大学毕业证文凭购买指南
sutseu
•
0 views
nanotechinagri-140412145811-phpapp02.pptx
KrishaksurajSingh
•
0 views
Traffic Engineering for CDNs
Traffic Engineering for
CDNs Matt Jansen Akamai Technologies BDNOG3
©2012 AKAMAI |
FASTER FORWARDTM The world’s largest on-demand, distributed computing platform delivers all forms of web content and applications The Akamai Intelligent Platform Typical daily traffic: • More than 2 trillion requests served • Delivering over 25 Terabits/second • 15-30% of all daily web traffic The Akamai Intelligent Platform: 170,000+ Servers 2,000+ Locations 102+ Countries 1,300+ Networks 700+ Cities
©2012 AKAMAI |
FASTER FORWARDTM When content is requested from CDNs, the user is directed to the optimal server to serve this user There’s 2 common ways to do that: • anycast: the content is served from the location the request is received (easy to build, requires symmetric routing to work well) • DNS based: the CDN decides where to best serve the content from based on the resolver it receives the request from, and replies with the optimal server How CDNs Work
©2012 AKAMAI |
FASTER FORWARDTM Users querying a DNS-based CDNs will be returned different A (and AAAA) records for the same hostname depending on the resolver the request comes from This is called “mapping” The better the mapping, the better the CDN How DNS based CDNs Work
©2012 AKAMAI |
FASTER FORWARDTM Example of Akamai mapping • Notice the different A records for different locations: [NYC]% host www.symantec.com www.symantec.com CNAME e5211.b.akamaiedge.net. e5211.b.akamaiedge.net. A 207.40.194.46 e5211.b.akamaiedge.net. A 207.40.194.49 [Boston]% host www.symantec.com www.symantec.com CNAME e5211.b.akamaiedge.net. e5211.b.akamaiedge.net. A 81.23.243.152 e5211.b.akamaiedge.net. A 81.23.243.145 DNS based Mapping Example
©2012 AKAMAI |
FASTER FORWARDTM CDNs use multiple criteria to choose the optimal server • These include standard network metrics: • Latency • Throughput • Packet loss • as well as internal ones such as: • CPU load on the server • HD space • network utilization How DNS based CDNs Work
©2012 AKAMAI |
FASTER FORWARDTM DNS based Mapping 1) end-user requests www.example.com from ISP NS 2) ISP NS recursively (multiple iterations) looks up www.example.com being referred to authoritative CDN NS (by CNAME) 3) ISP NS asks authoritative CDN NS 4) CDN NS looks up IP of requestor (ISP NS) and replies with IP of optimal cluster to serve content (closest cluster for that ISP) 5) ISP NS replies to end-user who 6) requests content from local Cluster end-user ISP NS 1.2.3.4 root/tld/intermediate NS (recursive lookup until reaching authoritative NS) CDN NS Closest cluster 5.6.7.8 example.com? example.com? a212.g.akamai.net 5.6.7.8 1 3 6 2 NS 1.2.3.4? best cluster = 5.6.7.8 4 5
©2012 AKAMAI |
FASTER FORWARDTM Types of CDN Deployments (simplified) end-user ISP Internet IX Transit Embedded cluster in ISP Colocated Cluster with IX Infrastructure Cluster with Transit Backend Mapping system
©2012 AKAMAI |
FASTER FORWARDTM DNS based CDNs don’t necessarily have a backbone Those clusters can be standalone ‘Islands’ with no connectivity between them! DNS based CDNs usually don’t announce large blocks of address space as this will only be the local servers • it is not uncommon to see a single /24 from Akamai at an IX • you will receive a different set of prefixes on each peering This does not mean you will not see a lot of traffic • how many servers do you need to serve 10g nowadays? Typical DNS based Topology
©2012 AKAMAI |
FASTER FORWARDTM • no single cluster can accommodate all content • caches get more efficient with with size • some content requires specialized servers only present in Infrastructure clusters • some content is only present in specific geographies • CDNs might prefer on-net cluster over peering Why don’t I get all CDN Traffic locally?
©2012 AKAMAI |
FASTER FORWARDTM Performance • getting as close as possible to the end-user (removing intermediate ASNs) decreasing latency/increasing troughput Burstability • for large event peaks direct connectivity to multiple networks allows for higher burstability than a single connection to a transit provider Redundancy • Serve as overflow and backup for embedded on-net clusters Scale • Large deployment at an IX can serve traffic that does not ‘fit’ into smaller embedded clusters Why CDNs peer
©2012 AKAMAI |
FASTER FORWARDTM Performance • ISP’s end-users benefit from direct connectivity Competitive Advantages • improving performance over competitors • additional revenue from downstreams Cost Reduction • Save on transit bill and potential backbone costs Redundancy • Serve as overflow and backup for embedded on-net clusters Why ISPs peer with CDNs
©2012 AKAMAI |
FASTER FORWARDTM Transit Peer • Akamai does not have a backbone, each IX instance is independent • Cluster uses transit to fetch content origin • Content is served to peers over the IX • BGP session serves 2 purposes: • Route traffic strictly within the local instance • Tell our system which prefixes this cluster is allowed to serve • New prefixes being picked up by the system can take up to 24hrs Origin Server IX Content Typical large IX deployment Origin
Scenario 1: prefix
withdrawal
©2012 AKAMAI |
FASTER FORWARDTM Attempting to shift traffic to another path ISP peers with CDN over 2 IXs • wants to shift traffic from A to B due to reduce backbone traffic • Typical BGP based techniques: 1) AS-Path prepending 2) MEDs 3) more/less specific announcements None of the above have the desired effect! • no network between clusters, any BGP parameters are only locally relevant • Might have undesired effect of shifting traffic to a upstream/competitor on the same IX end-user ISP A IX A IX B
©2012 AKAMAI |
FASTER FORWARDTM Problem solved… end-user IX B ISP withdraws some of their prefixes over IX A • Traffic falls back to transit on the same cluster (provided that still has the best performance) • this might result in them receiving the traffic in another location in their network so they’re happy Transit ISP A IX A
©2012 AKAMAI |
FASTER FORWARDTM …but not for long within 24hrs • The CDN backend system processes the fact that they don’t receive their prefixes at the IX A cluster • Traffic switches to another cluster where they do receive them (this might be one of their upstreams they have a PNI with in the same city) • Traffic comes back into their network again at the same router! Upstream of ISP A end-user Transit ISP A IX A
©2012 AKAMAI |
FASTER FORWARDTM Issues • BGP parameters only locally relevant • Delayed effect of BGP announcements on Mapping System • CDNs typically see your prefixes in many different locations
©2012 AKAMAI |
FASTER FORWARDTM Better solution • Talk to the CDN if you have issues with their traffic in a specific location • You can work together to achieve the result you’re looking for • Get a local embedded cluster
Scenario 2: more
specific Route Announcement
©2012 AKAMAI |
FASTER FORWARDTM • ISP A is multi-homed to Transit Providers AS2002 and AS3003 • Transit Provider AS2002 peers with CDN • Transit Provider AS3003 does not peer with CDN • CDN sends traffic to ISP A via Transit Provider AS2002 ISP A AS1001 CDN AS20940 Transit Provider AS2002 Transit Provider AS3003 100.100.96.0/20 100.100.96.0/20 0.0.0.0/0 Transit Provider AS4003 Consistent Announcements IX
©2012 AKAMAI |
FASTER FORWARDTM • ISP A would like to balance traffic between the two upstream providers • ISP A prepends, then applies MED to Transit Provider AS2002. This has no effect on CDN traffic. • Eventually, ISP A de-aggregates the /20 and advertises more specific routes to Transit Provider AS3003 • What will happen? Loadbalancing
©2012 AKAMAI |
FASTER FORWARDTM • ISP A announces more specific routes to Transit Provider AS3003 • Transit Provider AS3003 announces new /24 to AS2002 • CDN IX router does not have a full-table, so traffic continue route to the /20 of AS2002 • ISP A is happy with the balanced traffic on dual Transit Providers ISP A AS1001 CDN AS20940 Transit Provider AS2002 Transit Provider AS3003 100.100.96.0/20 AS2002 Routing Table 100.100.100.0/24 AS3003 AS1001 100.100.99.0/24 AS3003 AS1001 100.100.96.0/20 AS1001 CDN AS20940 Routing Table 100.100.96.0/20 AS2002 AS1001 0.0.0.0/0 AS4003 100.100.96.0/20 0.0.0.0/0 Transit Provider AS4003 Loadbalancing works... IX Peering
©2012 AKAMAI |
FASTER FORWARDTM • Lost of revenue for Transit Provider AS2002 even though their peering/backbone is utilized • What happens if AS2002 does not like the traffic from one peer to the other? …but
©2012 AKAMAI |
FASTER FORWARDTM Transit provider filters traffic • In order to get rid of traffic between peers, Transit Provider AS2002 implements an ACL on IX port facing AS3003 • Traffic gets blackholed, ISP A’s eyeballs don’t receive traffic anymore! ISP A AS1001 CDN AS20940 Transit Provider AS2002 Transit Provider AS3003 100.100.96.0/20 100.100.96.0/20 ACL 0.0.0.0/0 Transit Provider AS4003 hostname AS2002-R1 ! interface TenGigabitEthernet1/1 ip access-group 101 out ! access-list 101 deny ip any 100.100.100.0 0.0.0.255 access-list 101 deny ip any 100.100.99.0 0.0.0.255 access-list 101 permit ip any any IX Peering
©2012 AKAMAI |
FASTER FORWARDTM • CDN observes ISP A end-users are unable to access some websites • CDN stops serving unreliable prefixes received from Transit Provider AS2002, traffic shifts from IX to Transit Provider AS4003 • ISP A can access all websites happily • Transit Provider AS2002 loses revenue ISP A AS1001 CDN AS20940 Transit Provider AS2002 Transit Provider AS3003 100.100.96.0/20 100.100.96.0/20 ACL 0.0.0.0/0 Transit Provider AS4003 Unintended Result IX Peering
©2012 AKAMAI |
FASTER FORWARDTM Issues • Don’t assume a full-table on any device on the internet • Filtering traffic results in: • short term traffic blackholing! • long term widthdrawal of traffic resulting in revenue loss
©2012 AKAMAI |
FASTER FORWARDTM • AS2002 filters the specific prefixes instead of the actual traffic • work with upstreams and/or CDN for finetuning • Get Transit Provider AS3003 to peer with CDN directly ;) • Get a local embedded cluster ISP A AS1001 CDN AS20940 Transit Provider AS2002 Transit Provider AS3003 100.100.96.0/20 100.100.96.0/20 Filter Specific route 100.100.99.0/24 100.100.100.0/24 0.0.0.0/0 Transit Provider AS4003 neighbor PEER-GROUP prefix-list DENY-SPECIFIC in ! ip prefix-list DENY-SPECIFIC seq 5 deny 100.100.100.0/24 ip prefix-list DENY-SPECIFIC seq 10 deny 100.100.99.0/24 ip prefix-list DENY-SPECIFIC seq 100 permit 0.0.0.0/0 le 32 Better solutions IX Peering
©2012 AKAMAI |
FASTER FORWARDTM • ISP A is single homed to Transit Provider AS2002 • ISP A obtains a /24 from Transit Provider AS2002’s address space • all works well ISP A AS1001 CDN AS20940 Transit Provider AS2002 100.100.97.0/24100.100.96.0/20 100.100.96.0/20 0.0.0.0/0 Transit Provider AS4003 100.100.97.0/24 CDN AS20940 Routing Table 100.100.96.0/20 AS2002 100.100.97.0/24 AS2002 AS1001 0.0.0.0/0 AS4003 100.100.97.0/24 Another variation of this Scenario IX
©2012 AKAMAI |
FASTER FORWARDTM • ISP A moves to new Transit Provider AS3003, but keeps using his previously assigned prefix 100.100.96.0/24 • CDN keeps serving traffic to ISP A via Transit Provider AS2002 due to the /20 being received there ISP A AS1001 CDN AS20940 Transit Provider AS2002 100.100.97.0/24 100.100.96.0/20 100.100.96.0/20 0.0.0.0/0 Transit Provider AS4003 100.100.97.0/24 CDN AS20940 Routing Table 100.100.96.0/20 AS2002 0.0.0.0/0 AS4003 Transit Provider AS3003 Provider Change Peering IX
©2012 AKAMAI |
FASTER FORWARDTM • Lost of revenue for Transit Provider AS2002 even though their peering/backbone is utilized • What happens if AS2002 does not like the traffic from one peer to the other? …but
©2012 AKAMAI |
FASTER FORWARDTM • In order to get rid of traffic between peers, Transit Provider AS2002 implements an ACL on IX port facing AS3003 • Traffic gets blackholed, ISP A’s eyeballs don’t receive traffic anymore! ISP A AS1001 CDN AS20940 Transit Provider AS2002 100.100.97.0/24 100.100.96.0/20 100.100.96.0/20 0.0.0.0/0 Transit Provider AS4003 100.100.97.0/24 CDN AS20940 Routing Table 100.100.96.0/20 AS2002 0.0.0.0/0 AS4003 Transit Provider AS3003 ACL hostname AS2002-R1 ! interface TenGigabitEthernet1/1 ip access-group 101 out ! access-list 101 deny ip any 100.100.97.0 0.0.0.255 access-list 101 permit ip any any Transit provider filters traffic IX Peering
©2012 AKAMAI |
FASTER FORWARDTM • CDN observes ISP A end-users are unable to access some websites • CDN stops serving unreliable prefixes received from Transit Provider AS2002, traffic shifts from IX to Transit Provider AS4003 • ISP A can access all websites happily • Transit Provider AS2002 loses revenue ISP A AS1001 CDN AS20940 Transit Provider AS2002 100.100.97.0/24 100.100.96.0/20 100.100.96.0/20 0.0.0.0/0 Transit Provider AS4003 100.100.97.0/24 CDN AS20940 Routing Table 100.100.96.0/20 AS2002 0.0.0.0/0 AS4003 Transit Provider AS3003 ACL hostname AS2002-R1 ! interface TenGigabitEthernet1/1 ip access-group 101 out ! access-list 101 deny ip any 100.100.97.0 0.0.0.255 access-list 101 permit ip any any Unintended Result Peering IX
©2012 AKAMAI |
FASTER FORWARDTM Issues • Don’t assume a full-table on any device on the internet • If you do announce a prefix others expect you to be able to serve traffic to all of it • Don’t allow customers to use your PA space as PI • Filtering traffic results in: • short term traffic blackholing! • long term widthdrawal of traffic resulting in revenue loss
©2012 AKAMAI |
FASTER FORWARDTM • Deaggregate the /20 if you can’t/won’t serve all of it • Only announce address space you will serve traffic to • Get a local embedded cluster ISP A AS1001 CDN AS20940 Transit Provider AS2002 100.100.97.0/24 100.100.96.0/24 0.0.0.0/0 Transit Provider AS4003 100.100.97.0/24 CDN AS20940 Routing Table 100.100.96.0/24 AS2002 100.100.98.0/23 AS2002 100.100.100.0/22 AS2002 100.100.104.0/21 AS2002 0.0.0.0/0 AS4003 Transit Provider AS3003 100.100.98.0/23 100.100.100.0/22 100.100.104.0/21 Better solutions IX Peering
Scenario 3: Split
Route Announcement
©2012 AKAMAI |
FASTER FORWARDTM • ISP A is multi-homed to Transit Providers AS2002 and AS3003 • Transit Provider AS2002 peers with CDN • Transit Provider AS3003 does not peer with CDN • ISP A announces different prefix to different ISP • ISP A can access full internet ISP A AS1001 CDN AS20940 Transit Provider AS2002 Transit Provider AS3003 100.100.96.0/20 100.100.96.0/22 100.100.100.0/22 0.0.0.0/0 Transit Provider AS4003 CDN AS20940 Routing Table 100.100.96.0/22 AS2002 AS1001 100.100.100.0/22 AS2002 AS1001 0.0.0.0/0 AS4003 Split announcement IX
©2012 AKAMAI |
FASTER FORWARDTM • End Users are using IP Addresses 100.100.96.0/22, 100.100.100.0/22, 100.100.104.0/22, 100.100.108.0/22 • End Users are using ISP A NS 100.100.100.100 • CDN receives the NS Prefix 100.100.100.0/22 from AS2002 and maps the traffic for ISP A to this cluster • 100.100.96.0/22 100.100.100.0/22 traffic is routed via AS2002 while 100.100.104.0/22 100.100.108.0/22 traffic falls back to default route via AS4003, AS3003 ISP A AS1001 CDN AS20940 Transit Provider AS2002 Transit Provider AS3003 100.100.96.0/20 0.0.0.0/0 Transit Provider AS4003 ISP A AS1001 End User IP: 100.100.96.0/24 End User IP: 100.100.108.0/24 DNS: 100.100.100.100 100.100.96.0/22 100.100.100.0/22 Split announcement IX
©2012 AKAMAI |
FASTER FORWARDTM • This can work perfectly fine • But the path via the transit providers AS4003 & AS3003 might not be as good as the direct peering, 100.100.100.108.0/22 end users could have significantly worse performance • What will ISP A do if the user complain? Differing performance
©2012 AKAMAI |
FASTER FORWARDTM • ISP A swaps the route announcements • Both 100.100.96.0/22 and 100.100.108.0/22 are routed via AS2002 and end-users have the same performance • The end-user is happy and closes the ticket ISP A AS1001 CDN AS20940 Transit Provider AS2002 Transit Provider AS3003 100.100.96.0/20 0.0.0.0/0 Transit Provider AS4003 ISP A AS1001 End User IP: 100.100.96.0/24 End User IP: 100.100.108.0/24 DNS: 100.100.100.100 100.100.96.0/22 100.100.108.0/22 Problem solved… IX
©2012 AKAMAI |
FASTER FORWARDTM 24hrs later: • CDN no longer receives NS prefix 100.100.100.0/22 from AS2002 • CDN maps the traffic of ISP A to Cluster B (where they see AS3003’s prefixes) instead of Cluster A (which only peers with AS2002) • ISP A will receive the traffic from a completely different source potentially all via AS3003 now negating all the TE efforts DO NOT split nameserver and end-user prefixes when traffic engineering …but
Scenario 4: (Attempted)
Content Filtering
©2012 AKAMAI |
FASTER FORWARDTM ISPs do receive requests from Government organizations to filter specific content The default action is often to block a specific source IP If this content is hosted by a CDN this will not do what you expect! Content filtering what it WILL DO: what it will NOT: blackhole random content to your end-users filter any specific content get your cluster suspended because of observed loss and all traffic served from upstream
©2012 AKAMAI |
FASTER FORWARDTM • Standard BGP traffic engineering will not have the expected results • Changes in announcements may have a delayed effect • Where mapping is based on NS, splitting nameserver and end-user prefixes over different providers will have unexpected effects • Not all clusters have a full table • splitting more specific announcements over different links can cause unintended behavior • Announcing prefixes with holes results in blackholing traffic • Talk to your CDN partners for finetuning traffic • DO NOT filter traffic by IP Summary
©2012 AKAMAI |
FASTER FORWARDTM Matt Jansen mj@akamai.com as20940.peeringdb.com Questions?
Advertisement