It was reported that parts of the Internet crashed when the number of routes in the Internet's Inter-domain routing table (BGP) exceeded 512K routes. This presentation looks at the growth of the Internet's routing table and how this correlates to the capacity and speed of memory in hardware routers.
Today's Internet faces severe challenges including:
* IPv4 address exhaustion
* explosion of BGP tables and IP routing tables
* exponential traffic growth (which might not be a problem after all)
This is an introduction about 6RD, a protocol to transport IPv6 in IPv4 invented by Remi Despres. It is the protocol for SPs who want to provide access to their customers over an IPv4 Internal Backbone.
It is actually 6to4 protocol customized for Service Providers with a configurable prefix.
It has been deployed in 2007 by Free, a French SP and has proven its scalability and its reliability.
It is supported by CISCO in IOS and in other devices like ASR1K for the BR and in more and more cheap CPE for access as well as Linux.
For a full overview of all the principle Transition Protocols, please refer to this blog:
http://www.fastlaneus.com/blog/?p=335
And this video:
http://youtu.be/TqmKCqYsk5A
And a Video of this presentation is currently uploading on youtubes:
http://youtu.be/PrnFWgqlhj0
Fred Bovy
IPv6 Forum Gold Certified Engineer
IPv6 Forum Gold Certified Trainer
CISCO 15 years CCIE #3013
CISCO 18 years CCSI #33517 (before was #95003)Meet me on
Twitter: FredBovySkype: FredericBovyBlog: http://www.fastlaneus.com/blogEmail: fred.bovy@fastlaneus.com,
fred@fredbovy.com
May 13, 2013, Swiss IPv6 Council Member Event.
The Impact of IPv6 to Net Politics
CGN Killer IPv6
- Why CGN isn't a good concept for the future, but IPv6 is.
464XLAT Tutorial, by Masataka Mawatari.
Presented at the APNIC 40 "Hypes? Fanfares? Fads? Wading through the muddy IPv6 puddle" session, Wed 9 Sep 2015.
Today's Internet faces severe challenges including:
* IPv4 address exhaustion
* explosion of BGP tables and IP routing tables
* exponential traffic growth (which might not be a problem after all)
This is an introduction about 6RD, a protocol to transport IPv6 in IPv4 invented by Remi Despres. It is the protocol for SPs who want to provide access to their customers over an IPv4 Internal Backbone.
It is actually 6to4 protocol customized for Service Providers with a configurable prefix.
It has been deployed in 2007 by Free, a French SP and has proven its scalability and its reliability.
It is supported by CISCO in IOS and in other devices like ASR1K for the BR and in more and more cheap CPE for access as well as Linux.
For a full overview of all the principle Transition Protocols, please refer to this blog:
http://www.fastlaneus.com/blog/?p=335
And this video:
http://youtu.be/TqmKCqYsk5A
And a Video of this presentation is currently uploading on youtubes:
http://youtu.be/PrnFWgqlhj0
Fred Bovy
IPv6 Forum Gold Certified Engineer
IPv6 Forum Gold Certified Trainer
CISCO 15 years CCIE #3013
CISCO 18 years CCSI #33517 (before was #95003)Meet me on
Twitter: FredBovySkype: FredericBovyBlog: http://www.fastlaneus.com/blogEmail: fred.bovy@fastlaneus.com,
fred@fredbovy.com
May 13, 2013, Swiss IPv6 Council Member Event.
The Impact of IPv6 to Net Politics
CGN Killer IPv6
- Why CGN isn't a good concept for the future, but IPv6 is.
464XLAT Tutorial, by Masataka Mawatari.
Presented at the APNIC 40 "Hypes? Fanfares? Fads? Wading through the muddy IPv6 puddle" session, Wed 9 Sep 2015.
A presentation to help new network operators plan a project to improve their network traffic management. Useful for inbound and outbound heavy networks. Lists the things you need to do to reach routing and peering nirvana.
With the exhaustion of global IPv4 addresses, all operators cannot apply to the IPv4 address pool of the public network. All countries have adopted IPv6 as the direction of the next-generation Internet, and China has also clearly accelerated the strategy of building IPv6-based next-generation Internet.
During last years much attention was paid for process of deploying IPv6 in different regions. And with growing IPv6 adoption the requirements also grew up. Today we require not just working IPv6 but reliable IPv6. Of course this aim brings to our attention IPv6 network latency which we want to be comparable to IPv4 latency. First measurements gave community very interesting and promising results – for some networks IPv6 was faster than IPv4. But why IPv6 had less latency – there was no clear evidence. In my report I’m going to discuss reasons why in some cases IPv6 is faster than IPv4 and why it is slower in other ones.
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
APNIC Training and Technical Assistance Manager Nurul Islam discusses the design options for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth at CommunicAsia 2017.
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTSatish Kumar
MINI PPT
IPv6 (Internet Protocol version 6) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF). IPv6 is intended to succeed IPv4.
IPv6 implements a new addressing system that allows for far more addresses to be assigned than with Ipv4.
Multiprotocol Label Switching (MPLS) is deployed by many service providers for establishing their backbone networks.
The Cisco implementation of IPv6 provider edge router over MPLS is called 6PE,and it enables IPv6 sites to communicate with each other over an MPLS IPv4 core network using MPLS label switched paths.
BGP Multihoming Techniques, by Philip Smith.
A presentation given at APRICOT 2016’s BGP Multihoming Techniques (Part 1 and 2) sessions on 24 February 2016.
IPv6 deployment architecture for broadband access networksAPNIC
At CommunicAsia 2016, Training and Technical Assistance Manager Nurul Islam discussed the design option for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth.
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4. Watch more: http://telecomacadmey.com/What-is-Ipv6/ ============================================================================================================ Join us on Site: http://telecomacadmey.com/ Join us on Facebook: https://www.facebook.com/Telecom-Acad... Join us on Twitter: https://twitter.com/TelecomAcad Join us on tumblr: https://www.tumblr.com/blog/telecomac... Join us on Quora: https://www.quora.com/profile/Telecom... Join us on Google +: https://plus.google.com/u/0/104392545... Join us on Instagram: https://www.instagram.com/telecomacad/ Join us on pinterest: https://www.pinterest.com/hamzathenet...
A presentation to help new network operators plan a project to improve their network traffic management. Useful for inbound and outbound heavy networks. Lists the things you need to do to reach routing and peering nirvana.
With the exhaustion of global IPv4 addresses, all operators cannot apply to the IPv4 address pool of the public network. All countries have adopted IPv6 as the direction of the next-generation Internet, and China has also clearly accelerated the strategy of building IPv6-based next-generation Internet.
During last years much attention was paid for process of deploying IPv6 in different regions. And with growing IPv6 adoption the requirements also grew up. Today we require not just working IPv6 but reliable IPv6. Of course this aim brings to our attention IPv6 network latency which we want to be comparable to IPv4 latency. First measurements gave community very interesting and promising results – for some networks IPv6 was faster than IPv4. But why IPv6 had less latency – there was no clear evidence. In my report I’m going to discuss reasons why in some cases IPv6 is faster than IPv4 and why it is slower in other ones.
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
APNIC Training and Technical Assistance Manager Nurul Islam discusses the design options for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth at CommunicAsia 2017.
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTSatish Kumar
MINI PPT
IPv6 (Internet Protocol version 6) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF). IPv6 is intended to succeed IPv4.
IPv6 implements a new addressing system that allows for far more addresses to be assigned than with Ipv4.
Multiprotocol Label Switching (MPLS) is deployed by many service providers for establishing their backbone networks.
The Cisco implementation of IPv6 provider edge router over MPLS is called 6PE,and it enables IPv6 sites to communicate with each other over an MPLS IPv4 core network using MPLS label switched paths.
BGP Multihoming Techniques, by Philip Smith.
A presentation given at APRICOT 2016’s BGP Multihoming Techniques (Part 1 and 2) sessions on 24 February 2016.
IPv6 deployment architecture for broadband access networksAPNIC
At CommunicAsia 2016, Training and Technical Assistance Manager Nurul Islam discussed the design option for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth.
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4. Watch more: http://telecomacadmey.com/What-is-Ipv6/ ============================================================================================================ Join us on Site: http://telecomacadmey.com/ Join us on Facebook: https://www.facebook.com/Telecom-Acad... Join us on Twitter: https://twitter.com/TelecomAcad Join us on tumblr: https://www.tumblr.com/blog/telecomac... Join us on Quora: https://www.quora.com/profile/Telecom... Join us on Google +: https://plus.google.com/u/0/104392545... Join us on Instagram: https://www.instagram.com/telecomacad/ Join us on pinterest: https://www.pinterest.com/hamzathenet...
Many network operators still struggle with which type of data-plane encoding they should use for segment routing. The world is hyper-connected and we can’t afford to be late to deliver 5G. Using IPv4, IPv6 and MPLS data-plane encoding keeps us moving forward.
Many network operators still struggle with which type of data-plane encoding they should use for segment routing. The world is hyper-connected and we can’t afford to be late to deliver 5G. Using IPv6, MPLS (or even IPv4) data-plane encoding keeps us moving forward.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
High-performance 32G Fibre Channel Module on MDS 9700 Directors:Tony Antony
To better serve the new application requirements, Cisco is introducing a New high-performance Analytics ready 32G Fibre Channel Module on MDS 9700 Directors and a new 32G Host Bus Adapter for UCS C-series. The end to end 32G FC support across Cisco DC platforms set new standards for Storage Networking providing customers with choice. Along with this announcement, Cisco is also announcing NVMe over Fabric support on MDS 9000 Series enabling customers to take advantage of the performance and low latency benefits offered by the new technology to scale efficiently in the post-flash environments.
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015Bruno Teixeira
With the changing paradigm of network programmability using Software Defined Network (SDN), we are seeing new ways for monitoring, scaling and configuring network devices. With new network programability capabilities utilizing NETCONF, OpenFlow, BGP-LS, and PCEP it is vital for network architects and operations engineers to understand how these SDN related technologies can be leveraged to streamline the way we view, design, and operate our networks today. This session introduces these concepts and focuses on the use cases, implementation, and troubleshooting of these technologies on the ASR9000 platform.
APNIC Training Delivery Manager Tashi Phuntsho gave an update of global and regional IPv6 deployment, including statistics for Cambodia at the KHNOG 2 Online Webinar on 1 August 2020.
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017Bruno Teixeira
This session provides an overview of the segment routing technology and its use cases. This new routing paradigm provides high operational simplicity and maximum network scalability and flexibility. You will get an understanding of the basic concepts behind the technology and its wide applicability ranging from simple transport for MPLS services, disjoint routing, traffic engineering and its benefits in the context of software defined networking. Previous knowledge of IP routing and MPLS is required.
Respond 3 of your colleagues postings in one or more of the fol.docxaryan532920
Respond 3 of your colleagues' postings in one or more of the following ways:
· Ask a probing question.
· Share an insight from having read your colleague’s posting.
· Offer and support an opinion.
· Validate an idea with your own experience.
· Make a suggestion.
· Expand on your colleague’s posting.
Student #1
Routing protocols can be the Interior Gateway Protocol (IGP), which is for you internal networks and the exterior routing protocol is Exterior Gateway Protocol (EGP). This protocol maintains the routing information for networks (external) to your network. It only knows how to deliver data outside your network. EGP does not know how to deliver data within your network. Border Gateway Protocol (BGP) is the only EGP in use today. BGP is the routing protocol for the Internet.
Open Shortest Path First (OSPF) is starting to become the popular interior routing protocol (Tiso, 2011). If designing a new network, I would recommend OSPF or EIGRP because of the popularity, flexibility, and fast convergence. Reason I say OSPF is because there is not limitation on the hop count like there is with RIP (15). OSPF uses IP multicast to send link-state updates ("Cisco," 2014). Updates sent when routing changes occur instead of periodically. Better convergence since routing changes is instantaneously and not periodically.
My experience with OSPF occurred back in 2003 when a team I was working with was task to put in a new video teleconference network for an intelligence agency that consisted of over 250 rooms moving from H.320 to H.323. The network would consist of CONUS and OCONUS. Fourteen years later, equipment has been upgraded routers, switches, endpoints, etc. but the same routing protocol still used.
References
Cisco Networking Academy's Introduction to Routing Dynamically. (2014). Retrieved from http://www.ciscopress.com/articles/article.asp?p=2180210&seqNum=7
Tiso, J. (2011). Designing Cisco Network Service Architectures (ARCH): Developing an Optimum Design for Layer 3 (CCDP). Retrieved from http://www.ciscopress.com/articles/article.asp?p=1763921&seqNum=6
Student #2
Enhanced Interior Gateway Routing Protocol (EIGRP) is Cisco's proprietary routing protocol, based on IGRP. EIGRP is a distance-vector routing protocol, with optimizations to minimize routing instability incurred after topology changes, and the use of bandwidth and processing power in the router. Routers that support EIGRP will automatically redistribute route information to IGRP neighbours by converting the 32-bit EIGRP metric to the 24-bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL), which guarantees loop-free operation and provides fast router convergence.
Origin: Based only on Cisco’s implementation, not an Internet RFC
Type of protocol: Hybrid distance vector
Metric: Delay, bandwidth, reliability, and load, using the Diffusing Update Algorithm (DUAL)
Methodology: Sends hello packets every ...
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1. What’s so special
about the number 512?
Geoff Huston
Chief Scientist, APNIC Labs
1 September 2014
2. 12 August 2014
Newborn Panda Triplets in China
Rosetta closes in on
comet 67P/
Churyumov-
Gerasimenko
Violence continues in
the Gaza Strip
World Elephant Day
9. Routing Behaviour
Was the AS701 Route Leak the
problem?
Or was the FIB growth passing
512K entries the problem?
What does routing growth look like
anyway?
10. 20 years of routing the Internet
2011: Address Exhaustion
2005: Broadband to the Masses
2001: The Great Internet Boom and Bust
1994: Introduction of CIDR
2009: The GFC hits the Internet
11. IPv4 BGP Prefix Count 2011 - 2014
550,000
450,000
Jan
2011
Jan
2012
350,000
Jan
2013
Jan
2014
Jan
2015
13. IPv4 in 2014 – Growth is
Slowing (slightly)
• Overall
IPv4
Internet
growth
in
terms
of
BGP
is
at
a
rate
of
some
~9%-‐10%
p.a.
• Address
span
growing
far
more
slowly
than
the
table
size
(although
the
LACNIC
runout
in
May
caused
a
visible
blip
in
the
address
rate)
• The
rate
of
growth
of
the
IPv4
Internet
is
slowing
down
(slightly)
– Address
shortages?
– Masking
by
NAT
deployments?
– Saturadon
of
cridcal
market
sectors?
14. IPv6 BGP Prefix Count
20,000
10,000
2,000
Jan
2011
Jan
2012
Jan
2013
Jan
2014
0
World IPv6 Day
16. IPv6 in 2013
• Overall
IPv6
Internet
growth
in
terms
of
BGP
is
20%
-‐
40
%
p.a.
– 2012
growth
rate
was
~
90%.
(Looking
at
the
AS
count,
if
these
reladve
growth
rates
persist
then
the
IPv6
network
would
span
the
same
network
domain
as
IPv4
in
~16
years
dme
-‐-‐
2030!)
17. IPv6 in 2013 – Growth is
Slowing?
• Overall
Internet
growth
in
terms
of
BGP
is
at
a
rate
of
some
~20-‐40%
p.a.
• AS
growth
sub-‐linear
• The
rate
of
growth
of
the
IPv6
Internet
is
also
slowing
down
– Lack
of
cridcal
momentum
behind
IPv6?
– Saturadon
of
cridcal
market
sectors
by
IPv4?
– <some
other
factor>?
19. BGP Size Projections
• Generate
a
projecdon
of
the
IPv4
roudng
table
using
a
quadradc
(O(2)
polynomial)
over
the
historic
data
– For
IPv4
this
is
a
dme
of
extreme
uncertainty
• Registry
IPv4
address
run
out
• Uncertainty
over
the
impacts
of
any
amer-‐market
in
IPv4
on
the
roudng
table
which
makes
this
projecdon
even
more
speculadve
than
normal!
31. Up
and
to
the
Right
• Most
Internet
curves
are
“up
and
to
the
right”
• But
what
makes
this
curve
painful?
– The
pain
threshold
is
approximated
by
Moore’s
Law
32.
33. IPv4 BGP Table size and Moore’s Law
Moore’s Law
BGP Table Size Predictions
35. BGP Table Growth
• Nothing
in
these
figures
suggests
that
there
is
cause
for
urgent
alarm
-‐-‐
at
present
• The
overall
eBGP
growth
rates
for
IPv4
are
holding
at
a
modest
level,
and
the
IPv6
table,
although
it
is
growing
rapidly,
is
sdll
reladvely
small
in
size
in
absolute
terms
• As
long
as
we
are
prepared
to
live
within
the
technical
constraints
of
the
current
roudng
paradigm
it
will
condnue
to
be
viable
for
some
dme
yet
41. Updates in IPv4 BGP
Nothing
in
these
figures
is
cause
for
any
great
level
of
concern
…
– The
number
of
updates
per
instability
event
has
been
constant,
due
to
the
damping
effect
of
the
MRAI
interval,
and
the
reladvely
constant
AS
Path
length
over
this
interval
What
about
IPv6?
45. BGP Convergence
• The
long
term
average
convergence
dme
for
the
IPv4
BGP
network
is
some
70
seconds,
or
2.3
updates
given
a
30
second
MRAI
dmer
• The
long
term
average
convergence
dme
for
the
IPv6
BGP
network
is
some
80
seconds,
or
2.6
updates
46. Problem? Not a Problem?
It’s
evident
that
the
global
BGP
roudng
environment
suffers
from
a
certain
amount
of
neglect
and
ina5endon
But
whether
this
is
a
problem
or
not
depends
on
the
way
in
which
routers
handle
the
roudng
table.
So
lets
take
a
quick
look
at
routers…
47. Inside a router
Line Interface Card
Switch Fabric Card
Management Card
Thanks
to
Greg
Hankins
48. Inside a line card
DRAM TCAM *DRAM
CPU
PHY
Packet
Manager
Network Me
di
a
Bac
kpl
a
ne
FIB Lookup Bank
Packet Buffer
Thanks
to
Greg
Hankins
49. Inside a line card
DRAM TCAM *DRAM
CPU
PHY
Packet
Manager
Network Me
di
a
Bac
kpl
a
ne
FIB Lookup Bank
Packet Buffer
Thanks
to
Greg
Hankins
50. FIB Lookup Memory
The
interface
card’s
network
processor
passes
the
packet’s
desdnadon
address
to
the
FIB
module.
The
FIB
module
returns
with
an
outbound
interface
index
51. FIB Lookup
This
can
be
achieved
by:
– Loading
the
endre
roudng
table
into
a
Ternary
Content
Addressable
Memory
bank
(TCAM)
or
– Using
an
ASIC
implementadon
of
a
TRIE
representadon
of
the
roudng
table
with
DRAM
memory
to
hold
the
roudng
table
Either
way,
this
needs
fast
memory
52. TCAM Memory
Address
Outbound Interface identifier
192.0.2.1
I/F
3/1
192.0.0.0/16
11000000
00000000
xxxxxxxx
xxxxxxxx
3/0
192.0.2.0/24
11000000
00000000
00000010
xxxxxxxx
3/1
11000000
00000000
00000010
00000001
Longest Match
The
endre
FIB
is
loaded
into
TCAM.
Every
desdnadon
address
is
passed
through
the
TCAM,
and
within
one
TCAM
cycle
the
TCAM
returns
the
interface
index
of
the
longest
match.
Each
TCAM
bank
needs
to
be
large
enough
to
hold
the
endre
FIB.
TTCAM
cycle
dme
needs
to
be
fast
enough
to
support
the
max
packet
rate
of
the
line
card.
TCAM width depends on the chip set in
use. One popular TCAM config is 72
bits wide. IPv4 addresses consume a
single 72 bit slot, IPv6 consumes two
72 bit slots. If instead you use TCAM
with a slot width of 32 bits then IPv6
entries consume 4 times the
equivalent slot count of IPv4 entries.
53. TRIE Lookup
Address
Outbound Interface identifier
192.0.2.1
I/F
3/1
11000000
00000000
00000010
00000001
1/0
1/0
1/0
1/0
1/0
x/0000
?
?
?
?
?
…
?
ASIC
DRAM
The
endre
FIB
is
converted
into
a
serial
decision
tree.
The
size
of
decision
tree
depends
on
the
distribudon
of
prefix
values
in
the
FIB.
The
performance
of
the
TRIE
depends
on
the
algorithm
used
in
the
ASIC
and
the
number
of
serial
decisions
used
to
reach
a
decision
54. Memory Tradeoffs
TCAM
Lower
Higher
Higher
Higher
Larger
80Mbit
ASIC +
RLDRAM 3
Higher
Lower
Lower
Lower
Smaller
1Gbit
Thanks
to
Greg
Hankins
Access Speed
$ per bit
Power
Density
Physical Size
Capacity
55. Memory Tradeoffs
TCAMs
are
higher
cost,
but
operate
with
a
fixed
search
latency
and
a
fixed
add/delete
dme.
TCAMs
scale
linearly
with
the
size
of
the
FIB
ASICs
implement
a
TRIE
in
memory.
The
cost
is
lower,
but
the
search
and
add/delete
dmes
are
variable.
The
performance
of
the
lookup
depends
on
the
chosen
algorithm.
The
memory
efficiency
of
the
TRIE
depends
on
the
prefix
distribudon
and
the
pardcular
algorithm
used
to
manage
the
data
structure
56. Size
What
memory
size
do
we
need
for
10
years
of
FIB
growth
from
today?
TCAM
Trie
V4: 2M entries (1Gt)
plus
V6: 1M entries (2Gt)
2014 2019 2024
512K
25K 125K
V4: 100Mbit memory (500Mt)
plus
V6: 200Mbit memory (1Gt)
768K 1M
V4 FIB
V6 FIB 512K
“The
Impact
of
Address
Allocadon
and
Roudng
on
the
Structure
and
Implementadon
of
Roudng
Tables”,
Narayn,
Govindan
&
Varghese,
SIGCOMM
‘03
57. Scaling the FIB
BGP
table
growth
is
slow
enough
that
we
can
condnue
to
use
simple
FIB
lookup
in
linecards
without
straining
the
state
of
the
art
in
memory
capacity
However,
if
it
all
turns
horrible,
there
are
alternadves
to
using
a
complete
FIB
in
memory,
which
are
at
the
moment
variously
robust
and
variously
viable:
FIB
compression
MPLS
Locator/ID
Separadon
(LISP)
OpenFlow/Somware
Defined
Networking
(SDN)
59. Speed, Speed, Speed
What
memory
speeds
are
necessary
to
sustain
a
maximal
packet
rate?
100GE 150Mpps 6.7ns per packet
400Ge 600Mpps 1.6ns per packet
1Te 1.5Gpps 0.67ns per packet
0ns 10ns 20ns 30ns 40ns 50ns
1Te 400Ge 100Ge
60. Speed, Speed, Speed
What
memory
speeds
do
we
HAVE?
DDR3DRAM Commodity DRAM
1Te
0ns 10ns 20ns 30ns 40ns 50ns
RLDRAM
Thanks
to
Greg
Hankins
100Ge
400Ge
61. Scaling Speed
Scaling
speed
is
going
to
be
tougher
over
dme
Moore’s
Law
talks
about
the
number
of
gates
per
circuit,
but
not
circuit
clocking
speeds
Speed
and
capacity
could
be
the
major
design
challenge
for
network
equipment
in
the
coming
years
If
we
want
to
exploit
parallelism
as
an
alternadve
to
wireline
speed
for
terrabit
networks,
then
is
the
use
of
best
path
roudng
protocols,
coupled
with
desdnadon-‐based
hop-‐based
forwarding
going
to
scale?
Or
are
we
going
to
need
to
look
at
path-‐pinned
roudng
architectures
to
provide
stable
flow-‐level
parallelism
within
the
network?
h5p://www.startupinnovadon.org/research/moores-‐law/