SlideShare a Scribd company logo
BGP Peering Engineering
Automation challenges and enablers
Paolo Lucente
November 2015
Cloud & Virtualization Group
Introduction
• Inter-domain traffic includes all traffic crossing the boundary of
networks
• BGP is used to exchange reachability information among networks
• Inter-domain traffic engineering has been historically hard:
 Control traffic to meet objectives
 Estimate the effects of changes
• We describe these problems and discuss potential solutions
• Main objective being (semi-)automation
AS1
RR
Observed backbone
R1
R2
R3
R4
R5
Neighboring ASes
AS2
AS3
AS4
AS5
R1
Ingress
Traffic
Focus
Some high-level use-cases
• Design/architectural/business:
 Simulate optimal placement of interconnects
 Simulate impact of interconnect failures
• Operational:
 Simulate impact of (BGP policy) changes without disrupting live traffic
Egress / Ingress differences
• Egress and ingress traffic are differently managed
• Egress traffic:
 Operators have control on the paths they would like to use for their traffic
• Ingress traffic:
 Depends on how the other networks decide
 Operators can try to influence the decision of others
Egress traffic
• Routers decide the best path using the BGP decision process
• Operators change attributes of the paths to reflect their policy
• The typical egress TE process consists in tweaking attributes to steer
traffic as desired
• Old problem:
 Feamster et al. “Guidelines for interdomain traffic engineering”. CCR. 2003.
 Nanog presentations (e.g. Wepman, 2004; Roisman, 2009; etc.)
• Proposed workflow: collection, simulation, optimization, deployment
EPE Challenges: Collection
• Requires the collection of different sources of data:
 BGP paths, traffic, policy
• Over time mostly non-standard or mature APIs:
 BGP paths (BGP Add-Path, BMP)
 Traffic (Netflow/IPFIX, sFlow)
 Policy (Tail-f, Openconfig project)
Collection Simulation Optimization Deployment
EPE Challenges: Simulation
• What-if scenarios hard to simulate
• BGP decision process is complex:
 RRs add a level of complexity
 Not always deterministic
 Proper network design
• Focus on the important prefixes
 Identify importance, ie. by service or by IP prefixes/paths making more traffic
 Prioritize or exclude
Collection Simulation Optimization Deployment
EPE Challenges: Optimization
• Not easy to move traffic in a granular way:
 Changing LP, MED changes everything
 Need to include IGP into account
 iBGP policies are typically not desirable
• Complex metrics:
 For example: latency, bit-miles calculations
 No standard way to include in the optimization process
Collection Simulation Optimization Deployment
EPE Challenges: Deployment
• Alternatives to deploy:
 Operate changes (ie. policies) at network edges
 Injection of best paths via a BGP controller
• Using controllers to operate changes:
 Collection would be similar
 Southbound interface might vary (BGP itself, Openflow, etc.)
 Segment Routing as a solution
Collection Simulation Optimization Deployment
Segment Routing: very quick intro (1/3)
• Segment Routing uses Segment IDs to identify links (or services)
• MPLS or IPv6 to define the labels
• Ingress routers and can use SR to control internal path and external
path
• Filsfils et al. “The Segment Routing Architecture”. Globecomm. 2015.
• For inter-domain traffic, SR allows for granularly steering traffic
without being impacted by IGP or other metrics
Segment Routing: very quick intro (2/3)
Segment Routing: very quick intro (3/3)
Ingress traffic
• An operator attempts to attract traffic over specific links
• Complex by design: the Internet is formed by networks with different
policies:
 Conflicts could be unsolvable
 Some Content providers don’t even use BGP to select a source and path
• Proposed workflow: deployment, collection, assessment, negotiation
Ingress: Deploy
• Different tools can be used to influence other ASNs:
 AS-Path prepending
 MEDs, Communities
 Prefix de-aggregation or hiding
• Other routers paradigms such as LISP provide more direct ways of
influencing the inbound path:
 But policies would still prevail
Deployment Collection Assessment Negotiation
Ingress: Collect, Assess, Negotiate
• Collect:
 Similar to the egress case
 External data might be useful
• Assess:
 Keep track of the implemented mechanism. Ensure that it works
• Negotiate:
 Talk to your neighbors. They might be willing to cooperate
Deployment Collection Assessment Negotiation
Conclusions and closing words
• Take control of your data
• Security was not discussed, but it is an important issue:
 New data to monitor
 more decisions to make
 (Discard a route with problems or lower its preference?)
【EPN Seminar Nov.10. 2015】 パネルディスカッション その2: BGP Peering Engineering Automation challenges and enablers

More Related Content

What's hot

DEVNET-1006 Getting Started with OpenDayLight
DEVNET-1006	Getting Started with OpenDayLightDEVNET-1006	Getting Started with OpenDayLight
DEVNET-1006 Getting Started with OpenDayLight
Cisco DevNet
 
SDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural EvolutionSDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural Evolution
APNIC
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
Rasoul Mesghali, CCIE RS
 
CCNA Training Tutorial in bangaore
CCNA Training Tutorial in bangaoreCCNA Training Tutorial in bangaore
CCNA Training Tutorial in bangaore
rajkamaltibacademy
 
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment RoutingPLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PROIDEA
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
Segment routing tutorial
Segment routing tutorialSegment routing tutorial
Segment routing tutorial
Yi-Sung Chiu
 
Innovation is back in the transport and network layers
Innovation is back in the transport and network layersInnovation is back in the transport and network layers
Innovation is back in the transport and network layers
Olivier Bonaventure
 
Catena
CatenaCatena
Catena
Samar Sharma
 
WAN SDN meet Segment Routing
WAN SDN meet Segment RoutingWAN SDN meet Segment Routing
WAN SDN meet Segment Routing
APNIC
 
IPv6 Entreprise Multihoming
IPv6 Entreprise MultihomingIPv6 Entreprise Multihoming
IPv6 Entreprise Multihoming
Olivier Bonaventure
 
PLNOG 13: Michał Dubiel: OpenContrail software architecture
PLNOG 13: Michał Dubiel: OpenContrail software architecturePLNOG 13: Michał Dubiel: OpenContrail software architecture
PLNOG 13: Michał Dubiel: OpenContrail software architecture
PROIDEA
 
Intel omni path architecture
Intel omni path architectureIntel omni path architecture
Intel omni path architecture
Ashay Shirwadkar
 
Prefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul IslamPrefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul IslamMyNOG
 
0-RTT TCP converters
0-RTT TCP converters0-RTT TCP converters
0-RTT TCP converters
Olivier Bonaventure
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
hamsa nandhini
 
PLB
PLBPLB
SDN Project PPT
SDN Project PPTSDN Project PPT
SDN Project PPT
Matthew Chang
 
Scaling Networks with Segment Routing
Scaling Networks with Segment RoutingScaling Networks with Segment Routing
Scaling Networks with Segment Routing
APNIC
 

What's hot (20)

DEVNET-1006 Getting Started with OpenDayLight
DEVNET-1006	Getting Started with OpenDayLightDEVNET-1006	Getting Started with OpenDayLight
DEVNET-1006 Getting Started with OpenDayLight
 
SDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural EvolutionSDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural Evolution
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
 
CCNA Training Tutorial in bangaore
CCNA Training Tutorial in bangaoreCCNA Training Tutorial in bangaore
CCNA Training Tutorial in bangaore
 
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment RoutingPLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
SEGMENT Routing
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
 
Segment routing tutorial
Segment routing tutorialSegment routing tutorial
Segment routing tutorial
 
Innovation is back in the transport and network layers
Innovation is back in the transport and network layersInnovation is back in the transport and network layers
Innovation is back in the transport and network layers
 
Catena
CatenaCatena
Catena
 
WAN SDN meet Segment Routing
WAN SDN meet Segment RoutingWAN SDN meet Segment Routing
WAN SDN meet Segment Routing
 
IPv6 Entreprise Multihoming
IPv6 Entreprise MultihomingIPv6 Entreprise Multihoming
IPv6 Entreprise Multihoming
 
PLNOG 13: Michał Dubiel: OpenContrail software architecture
PLNOG 13: Michał Dubiel: OpenContrail software architecturePLNOG 13: Michał Dubiel: OpenContrail software architecture
PLNOG 13: Michał Dubiel: OpenContrail software architecture
 
Intel omni path architecture
Intel omni path architectureIntel omni path architecture
Intel omni path architecture
 
Prefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul IslamPrefix Filtering Design Issues and Best Practise by Nurul Islam
Prefix Filtering Design Issues and Best Practise by Nurul Islam
 
0-RTT TCP converters
0-RTT TCP converters0-RTT TCP converters
0-RTT TCP converters
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
PLB
PLBPLB
PLB
 
SDN Project PPT
SDN Project PPTSDN Project PPT
SDN Project PPT
 
Scaling Networks with Segment Routing
Scaling Networks with Segment RoutingScaling Networks with Segment Routing
Scaling Networks with Segment Routing
 

Similar to 【EPN Seminar Nov.10. 2015】 パネルディスカッション その2: BGP Peering Engineering Automation challenges and enablers

Routing, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of AnalyticsRouting, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of Analytics
APNIC
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
Bangladesh Network Operators Group
 
network design 8.pptx
network design 8.pptxnetwork design 8.pptx
network design 8.pptx
aida alsamawi
 
Monitoring Route Changes
Monitoring Route ChangesMonitoring Route Changes
Monitoring Route Changes
ThousandEyes
 
15 coms 525 tcpip - border gateway protocols
15    coms 525 tcpip - border gateway protocols15    coms 525 tcpip - border gateway protocols
15 coms 525 tcpip - border gateway protocols
Palanivel Kuppusamy
 
Sept 2017 dynamic routing
Sept 2017   dynamic routingSept 2017   dynamic routing
Sept 2017 dynamic routing
shahin raj
 
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
MyNOG
 
bgp(border gateway protocol)
bgp(border gateway protocol)bgp(border gateway protocol)
bgp(border gateway protocol)
Noor Ul Hudda Memon
 
Border gateway protocol
Border gateway protocolBorder gateway protocol
Border gateway protocol
azlerabby
 
E rou01 routing_basics
E rou01 routing_basicsE rou01 routing_basics
E rou01 routing_basicstanawan44
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
gebreyesusweldegebri2
 
SDN/NETWORK AUTOMATION THROWDOWN COMPETITION
SDN/NETWORK AUTOMATION THROWDOWN COMPETITIONSDN/NETWORK AUTOMATION THROWDOWN COMPETITION
SDN/NETWORK AUTOMATION THROWDOWN COMPETITION
Siddharth Shah
 
Working with Northstar
Working with NorthstarWorking with Northstar
Working with Northstar
Manasa Suresh
 
2 routing
2 routing2 routing
2 routing
Jadavsejal
 
PLNOG 3: John Evans - Best Practices in Network Planning
PLNOG 3: John Evans - Best Practices in Network PlanningPLNOG 3: John Evans - Best Practices in Network Planning
PLNOG 3: John Evans - Best Practices in Network Planning
PROIDEA
 
routing basics - (static-default-dynamic)
routing basics - (static-default-dynamic)routing basics - (static-default-dynamic)
routing basics - (static-default-dynamic)
Shanza Sohail
 
Lecture 04 networking
Lecture 04 networkingLecture 04 networking
Lecture 04 networking
HNDE Labuduwa Galle
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
Pace IT at Edmonds Community College
 

Similar to 【EPN Seminar Nov.10. 2015】 パネルディスカッション その2: BGP Peering Engineering Automation challenges and enablers (20)

Routing, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of AnalyticsRouting, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of Analytics
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
network design 8.pptx
network design 8.pptxnetwork design 8.pptx
network design 8.pptx
 
Monitoring Route Changes
Monitoring Route ChangesMonitoring Route Changes
Monitoring Route Changes
 
15 coms 525 tcpip - border gateway protocols
15    coms 525 tcpip - border gateway protocols15    coms 525 tcpip - border gateway protocols
15 coms 525 tcpip - border gateway protocols
 
Sept 2017 dynamic routing
Sept 2017   dynamic routingSept 2017   dynamic routing
Sept 2017 dynamic routing
 
CCCNP ROUTE v6_ch05
CCCNP ROUTE  v6_ch05CCCNP ROUTE  v6_ch05
CCCNP ROUTE v6_ch05
 
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj UpadhayaInternet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
Internet Measurement Tools & Their Usefulness by Gaurab Raj Upadhaya
 
bgp(border gateway protocol)
bgp(border gateway protocol)bgp(border gateway protocol)
bgp(border gateway protocol)
 
Border gateway protocol
Border gateway protocolBorder gateway protocol
Border gateway protocol
 
CCCNP ROUTE v6_ch04
CCCNP ROUTE  v6_ch04CCCNP ROUTE  v6_ch04
CCCNP ROUTE v6_ch04
 
E rou01 routing_basics
E rou01 routing_basicsE rou01 routing_basics
E rou01 routing_basics
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
SDN/NETWORK AUTOMATION THROWDOWN COMPETITION
SDN/NETWORK AUTOMATION THROWDOWN COMPETITIONSDN/NETWORK AUTOMATION THROWDOWN COMPETITION
SDN/NETWORK AUTOMATION THROWDOWN COMPETITION
 
Working with Northstar
Working with NorthstarWorking with Northstar
Working with Northstar
 
2 routing
2 routing2 routing
2 routing
 
PLNOG 3: John Evans - Best Practices in Network Planning
PLNOG 3: John Evans - Best Practices in Network PlanningPLNOG 3: John Evans - Best Practices in Network Planning
PLNOG 3: John Evans - Best Practices in Network Planning
 
routing basics - (static-default-dynamic)
routing basics - (static-default-dynamic)routing basics - (static-default-dynamic)
routing basics - (static-default-dynamic)
 
Lecture 04 networking
Lecture 04 networkingLecture 04 networking
Lecture 04 networking
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 

More from シスコシステムズ合同会社

Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)
シスコシステムズ合同会社
 
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用
シスコシステムズ合同会社
 
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)
シスコシステムズ合同会社
 
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコシステムズ合同会社
 
IOS/IOS-XE 運用管理機能アップデート
IOS/IOS-XE 運用管理機能アップデートIOS/IOS-XE 運用管理機能アップデート
IOS/IOS-XE 運用管理機能アップデート
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 ShowNet - SSS-17 : ShowNet 2016 を支える シスコの最新テクノロジー
【Interop Tokyo 2016】 ShowNet - SSS-17 :  ShowNet 2016 を支えるシスコの最新テクノロジー【Interop Tokyo 2016】 ShowNet - SSS-17 :  ShowNet 2016 を支えるシスコの最新テクノロジー
【Interop Tokyo 2016】 ShowNet - SSS-17 : ShowNet 2016 を支える シスコの最新テクノロジー
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...
【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...
【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス
【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス
【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢
【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢
【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...
【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...
【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション
【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション
【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング
【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング
【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 ネットワーク モデリングと自動制御
【Interop Tokyo 2016】 ネットワーク モデリングと自動制御【Interop Tokyo 2016】 ネットワーク モデリングと自動制御
【Interop Tokyo 2016】 ネットワーク モデリングと自動制御
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)
【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)
【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス
【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス
【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...
【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...
【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化
【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化
【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要
【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要
【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要
シスコシステムズ合同会社
 
【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介
【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介
【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介
シスコシステムズ合同会社
 

More from シスコシステムズ合同会社 (20)

Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(応用編)
 
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(基礎編)配布用
 
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)
 
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
 
IOS/IOS-XE 運用管理機能アップデート
IOS/IOS-XE 運用管理機能アップデートIOS/IOS-XE 運用管理機能アップデート
IOS/IOS-XE 運用管理機能アップデート
 
【Interop Tokyo 2016】 ShowNet - SSS-17 : ShowNet 2016 を支える シスコの最新テクノロジー
【Interop Tokyo 2016】 ShowNet - SSS-17 :  ShowNet 2016 を支えるシスコの最新テクノロジー【Interop Tokyo 2016】 ShowNet - SSS-17 :  ShowNet 2016 を支えるシスコの最新テクノロジー
【Interop Tokyo 2016】 ShowNet - SSS-17 : ShowNet 2016 を支える シスコの最新テクノロジー
 
【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...
【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...
【Interop Tokyo 2016】 Seminar - EA-18 : 「Cisco の先進セキュリティ ソリューション」 Shownet 2016...
 
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
 
【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス
【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス
【Interop Tokyo 2016】 Seminar - EA-09 : エンタープライズ ワイヤレス:デジタル世界のための信頼性と汎用性に優れたアクセス
 
【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢
【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢
【Interop Tokyo 2016】 Seminar - EA-08 : シスコ データセンターSDN戦略、3本の矢
 
【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...
【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...
【Interop Tokyo 2016】 Seminar - EA-05 : 「Cisco の先進コア ネットワーク ソリューション」 Shownet 2...
 
【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション
【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション
【Interop Tokyo 2016】 SP ネットワークの変革を支える技術イノベーション
 
【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング
【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング
【Interop Tokyo 2016】 新たなルーティング パラダイム セグメントルーティング
 
【Interop Tokyo 2016】 ネットワーク モデリングと自動制御
【Interop Tokyo 2016】 ネットワーク モデリングと自動制御【Interop Tokyo 2016】 ネットワーク モデリングと自動制御
【Interop Tokyo 2016】 ネットワーク モデリングと自動制御
 
【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)
【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)
【Interop Tokyo 2016】 次世代サービス チェイニング NSH (Network Service Header)
 
【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス
【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス
【Interop Tokyo 2016】 ビッグデータ解析手法による脅威分析サービス
 
【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...
【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...
【Interop Tokyo 2016】 Cisco Advanced Malware Protection(AMP)/ レトロ スペクティブで見えてくる...
 
【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化
【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化
【Interop Tokyo 2016】 世界最大級の脅威情報と自社ネットワークの脅威可視化
 
【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要
【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要
【Interop Tokyo 2016】 初心者でもわかるCisco SDNの概要
 
【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介
【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介
【Interop Tokyo 2016】 LAN/WAN向けSDNコントローラ APIC-EMのご紹介
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

【EPN Seminar Nov.10. 2015】 パネルディスカッション その2: BGP Peering Engineering Automation challenges and enablers

  • 1. BGP Peering Engineering Automation challenges and enablers Paolo Lucente November 2015 Cloud & Virtualization Group
  • 2. Introduction • Inter-domain traffic includes all traffic crossing the boundary of networks • BGP is used to exchange reachability information among networks • Inter-domain traffic engineering has been historically hard:  Control traffic to meet objectives  Estimate the effects of changes • We describe these problems and discuss potential solutions • Main objective being (semi-)automation
  • 4. Some high-level use-cases • Design/architectural/business:  Simulate optimal placement of interconnects  Simulate impact of interconnect failures • Operational:  Simulate impact of (BGP policy) changes without disrupting live traffic
  • 5. Egress / Ingress differences • Egress and ingress traffic are differently managed • Egress traffic:  Operators have control on the paths they would like to use for their traffic • Ingress traffic:  Depends on how the other networks decide  Operators can try to influence the decision of others
  • 6. Egress traffic • Routers decide the best path using the BGP decision process • Operators change attributes of the paths to reflect their policy • The typical egress TE process consists in tweaking attributes to steer traffic as desired • Old problem:  Feamster et al. “Guidelines for interdomain traffic engineering”. CCR. 2003.  Nanog presentations (e.g. Wepman, 2004; Roisman, 2009; etc.) • Proposed workflow: collection, simulation, optimization, deployment
  • 7. EPE Challenges: Collection • Requires the collection of different sources of data:  BGP paths, traffic, policy • Over time mostly non-standard or mature APIs:  BGP paths (BGP Add-Path, BMP)  Traffic (Netflow/IPFIX, sFlow)  Policy (Tail-f, Openconfig project) Collection Simulation Optimization Deployment
  • 8. EPE Challenges: Simulation • What-if scenarios hard to simulate • BGP decision process is complex:  RRs add a level of complexity  Not always deterministic  Proper network design • Focus on the important prefixes  Identify importance, ie. by service or by IP prefixes/paths making more traffic  Prioritize or exclude Collection Simulation Optimization Deployment
  • 9. EPE Challenges: Optimization • Not easy to move traffic in a granular way:  Changing LP, MED changes everything  Need to include IGP into account  iBGP policies are typically not desirable • Complex metrics:  For example: latency, bit-miles calculations  No standard way to include in the optimization process Collection Simulation Optimization Deployment
  • 10. EPE Challenges: Deployment • Alternatives to deploy:  Operate changes (ie. policies) at network edges  Injection of best paths via a BGP controller • Using controllers to operate changes:  Collection would be similar  Southbound interface might vary (BGP itself, Openflow, etc.)  Segment Routing as a solution Collection Simulation Optimization Deployment
  • 11. Segment Routing: very quick intro (1/3) • Segment Routing uses Segment IDs to identify links (or services) • MPLS or IPv6 to define the labels • Ingress routers and can use SR to control internal path and external path • Filsfils et al. “The Segment Routing Architecture”. Globecomm. 2015. • For inter-domain traffic, SR allows for granularly steering traffic without being impacted by IGP or other metrics
  • 12. Segment Routing: very quick intro (2/3)
  • 13. Segment Routing: very quick intro (3/3)
  • 14. Ingress traffic • An operator attempts to attract traffic over specific links • Complex by design: the Internet is formed by networks with different policies:  Conflicts could be unsolvable  Some Content providers don’t even use BGP to select a source and path • Proposed workflow: deployment, collection, assessment, negotiation
  • 15. Ingress: Deploy • Different tools can be used to influence other ASNs:  AS-Path prepending  MEDs, Communities  Prefix de-aggregation or hiding • Other routers paradigms such as LISP provide more direct ways of influencing the inbound path:  But policies would still prevail Deployment Collection Assessment Negotiation
  • 16. Ingress: Collect, Assess, Negotiate • Collect:  Similar to the egress case  External data might be useful • Assess:  Keep track of the implemented mechanism. Ensure that it works • Negotiate:  Talk to your neighbors. They might be willing to cooperate Deployment Collection Assessment Negotiation
  • 17. Conclusions and closing words • Take control of your data • Security was not discussed, but it is an important issue:  New data to monitor  more decisions to make  (Discard a route with problems or lower its preference?)