SlideShare a Scribd company logo
InteropNet LV 2013
Intro to Wide Area Routing
1Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Agenda
• Introduction
• Review concepts
• Goals of BGP
• BGP in Practice
• Conclusion
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only 2
Introduction
• The Internet is made up of a bunch of different
organizations
– Big ISPs
– Little ISPs
– Enterprises
• Everyone needs to exchange traffic with everyone
else…mostly
• Need to be able to create policy for how traffic is
sent and received, over what paths and deal with
redundancy
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013,
Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 3
Concept Review
• What is routing?
– Forwarding
• Every packet has a destination IP address
• Address is looked up in the local router’s routing table (FIB –
Forwarding Information Base)
• Packet is routed (forwarded) out the proper interface
– Routing Protocol
• Proscribes a method for how routes get into the FIB
• Many are available that fulfill different needs and situations
– Static
– IGP
» RIP
» EIGRP
» OSPF & ISIS
– EGP
» BGP
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013,
Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 4
Goals of BGP
• Tell your organization’s neighbors about the
destinations you are able to reach
• Provide controls to influence the path traffic
takes to get to you as well as how it leaves
your network
• Distribute global routing information
throughout your network
• Easily filter what you send and what you
receive
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013,
Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 5
BGP Concepts
• AS
– An autonomous system is a network typically
controlled by a single entity, usually one per
company
– Assigned a 4 byte (was 2 byte) number to identify
it, an ASN
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013,
Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 6
BGP Concepts
• iBGP (internal BGP)
– Distributes information throughout your AS
– All iBGP routers must talk directly to all other
routers or use scalability features such as route
reflectors or confederations
– iBGP is NOT an IGP, it is not intended to tell every
router about the paths in your AS, instead it tells
routers about global connectivity
– You must still run an IGP such as OSPF, as BGP
depends on it for local connectivity
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013,
Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 7
BGP Concepts
• eBGP (external BGP)
– eBGP is used to speak to your network neighbors,
usually your upstream transit provider
– Your network neighbors use eBGP to send you
routing information about reachability in the rest
of the world
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013,
Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 8
BGP in practice
• Globally all ISPs “peer” with each other
• An entire ecosystem has developed around
BGP peering, mostly based on the amount of
traffic exchanged
• Exchanges where multiple service providers
come together are located in many major
cities across the world, known as IX (Internet
eXchange)
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013,
Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 9
Routing Table Growth
• Size of the global routing table is currently
around 455,000 routes for v4 and 12,600 v6
routes
• Depletion of IPv4 address space may cause
“deaggregation” of the IPv6 global routing
table, which could result in explosive growth
• Growth of IPv6 also could result in rapid
growth of the global routing table
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013,
Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 10
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013,
Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 11
Brandon Ross – Chief Network Architect – Network Utility Force – bross@netuf.net

More Related Content

Similar to Introduction to Wide Area Network Routing

LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
APNIC
 
Manrs 7_sept__indonesia
Manrs  7_sept__indonesiaManrs  7_sept__indonesia
Manrs 7_sept__indonesia
NaveenLakshman
 
Cloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisCloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow Analysis
Alex Henthorn-Iwane
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
Pace IT at Edmonds Community College
 
Part1
Part1Part1
Internet infrastructure in the South East Asia region
Internet infrastructure in the South East Asia regionInternet infrastructure in the South East Asia region
Internet infrastructure in the South East Asia region
APNIC
 
U5CSS2 (1).pdf
U5CSS2 (1).pdfU5CSS2 (1).pdf
U5CSS2 (1).pdf
chelsi33
 
Using BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsUsing BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet Connections
Rowell Dionicio
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
Bangladesh Network Operators Group
 
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. ServinInitial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
MyNOG
 
Service location protocol (slp)
Service location protocol (slp)Service location protocol (slp)
Service location protocol (slp)
hiraniraj
 
PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)
Pace IT at Edmonds Community College
 
Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14
Russ Holmes
 
36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges
APNIC
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream Presentation
OpenDNS
 
Internet infrastructure in South Asia
Internet infrastructure in South AsiaInternet infrastructure in South Asia
Internet infrastructure in South Asia
APNIC
 
Scripting on Routers - NANOG 47
Scripting on Routers - NANOG 47Scripting on Routers - NANOG 47
Scripting on Routers - NANOG 47
Richard Steenbergen
 
Leadership Rowan Ver2
Leadership Rowan Ver2Leadership Rowan Ver2
Leadership Rowan Ver2
cmc128
 
Synthetic and Real World Web Performance Monitoring
Synthetic and Real World Web Performance Monitoring Synthetic and Real World Web Performance Monitoring
Synthetic and Real World Web Performance Monitoring
Verizon Digital Media Services
 

Similar to Introduction to Wide Area Network Routing (20)

LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
 
Manrs 7_sept__indonesia
Manrs  7_sept__indonesiaManrs  7_sept__indonesia
Manrs 7_sept__indonesia
 
Cloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisCloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow Analysis
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
 
Part1
Part1Part1
Part1
 
Internet infrastructure in the South East Asia region
Internet infrastructure in the South East Asia regionInternet infrastructure in the South East Asia region
Internet infrastructure in the South East Asia region
 
U5CSS2 (1).pdf
U5CSS2 (1).pdfU5CSS2 (1).pdf
U5CSS2 (1).pdf
 
Using BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsUsing BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet Connections
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. ServinInitial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
Initial Experiences Route Filtering at the Edge AS15169 by Arturo L. Servin
 
Service location protocol (slp)
Service location protocol (slp)Service location protocol (slp)
Service location protocol (slp)
 
PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)
 
Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14
 
36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges36th TWNIC OPM: BGP security threats and challenges
36th TWNIC OPM: BGP security threats and challenges
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream Presentation
 
Internet infrastructure in South Asia
Internet infrastructure in South AsiaInternet infrastructure in South Asia
Internet infrastructure in South Asia
 
Scripting on Routers - NANOG 47
Scripting on Routers - NANOG 47Scripting on Routers - NANOG 47
Scripting on Routers - NANOG 47
 
Leadership Rowan Ver2
Leadership Rowan Ver2Leadership Rowan Ver2
Leadership Rowan Ver2
 
Synthetic and Real World Web Performance Monitoring
Synthetic and Real World Web Performance Monitoring Synthetic and Real World Web Performance Monitoring
Synthetic and Real World Web Performance Monitoring
 

More from Network Utility Force

IPv6 Enabled WiFi: Planning, Deployment and Best Practices
IPv6 Enabled WiFi: Planning, Deployment and Best PracticesIPv6 Enabled WiFi: Planning, Deployment and Best Practices
IPv6 Enabled WiFi: Planning, Deployment and Best Practices
Network Utility Force
 
Outdoor Municipal WiFi Case Study
Outdoor Municipal WiFi Case StudyOutdoor Municipal WiFi Case Study
Outdoor Municipal WiFi Case Study
Network Utility Force
 
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNSIPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
Network Utility Force
 
The Case for IPv6: Paving the Way for the Internet of Things
The Case for IPv6: Paving the Way for the Internet of ThingsThe Case for IPv6: Paving the Way for the Internet of Things
The Case for IPv6: Paving the Way for the Internet of Things
Network Utility Force
 
How to Plan and Conduct IPv6 Field Trials
How to Plan and Conduct IPv6 Field TrialsHow to Plan and Conduct IPv6 Field Trials
How to Plan and Conduct IPv6 Field Trials
Network Utility Force
 
IPv6 Migration Infographic with IPv4 Exhaustion Timeline for 2014
IPv6 Migration Infographic with IPv4 Exhaustion Timeline for 2014IPv6 Migration Infographic with IPv4 Exhaustion Timeline for 2014
IPv6 Migration Infographic with IPv4 Exhaustion Timeline for 2014
Network Utility Force
 
Kinber ipv6-education-healthcare
Kinber ipv6-education-healthcareKinber ipv6-education-healthcare
Kinber ipv6-education-healthcare
Network Utility Force
 
IPv6 on the Interop Network
IPv6 on the Interop NetworkIPv6 on the Interop Network
IPv6 on the Interop Network
Network Utility Force
 
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsRoadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
Network Utility Force
 
Network Utility Force IPv6 training brochure
Network Utility Force IPv6 training brochureNetwork Utility Force IPv6 training brochure
Network Utility Force IPv6 training brochure
Network Utility Force
 
IPv6 Implementation and Migration
IPv6 Implementation and MigrationIPv6 Implementation and Migration
IPv6 Implementation and Migration
Network Utility Force
 

More from Network Utility Force (11)

IPv6 Enabled WiFi: Planning, Deployment and Best Practices
IPv6 Enabled WiFi: Planning, Deployment and Best PracticesIPv6 Enabled WiFi: Planning, Deployment and Best Practices
IPv6 Enabled WiFi: Planning, Deployment and Best Practices
 
Outdoor Municipal WiFi Case Study
Outdoor Municipal WiFi Case StudyOutdoor Municipal WiFi Case Study
Outdoor Municipal WiFi Case Study
 
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNSIPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
 
The Case for IPv6: Paving the Way for the Internet of Things
The Case for IPv6: Paving the Way for the Internet of ThingsThe Case for IPv6: Paving the Way for the Internet of Things
The Case for IPv6: Paving the Way for the Internet of Things
 
How to Plan and Conduct IPv6 Field Trials
How to Plan and Conduct IPv6 Field TrialsHow to Plan and Conduct IPv6 Field Trials
How to Plan and Conduct IPv6 Field Trials
 
IPv6 Migration Infographic with IPv4 Exhaustion Timeline for 2014
IPv6 Migration Infographic with IPv4 Exhaustion Timeline for 2014IPv6 Migration Infographic with IPv4 Exhaustion Timeline for 2014
IPv6 Migration Infographic with IPv4 Exhaustion Timeline for 2014
 
Kinber ipv6-education-healthcare
Kinber ipv6-education-healthcareKinber ipv6-education-healthcare
Kinber ipv6-education-healthcare
 
IPv6 on the Interop Network
IPv6 on the Interop NetworkIPv6 on the Interop Network
IPv6 on the Interop Network
 
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsRoadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
 
Network Utility Force IPv6 training brochure
Network Utility Force IPv6 training brochureNetwork Utility Force IPv6 training brochure
Network Utility Force IPv6 training brochure
 
IPv6 Implementation and Migration
IPv6 Implementation and MigrationIPv6 Implementation and Migration
IPv6 Implementation and Migration
 

Recently uploaded

leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 

Recently uploaded (20)

leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 

Introduction to Wide Area Network Routing

  • 1. InteropNet LV 2013 Intro to Wide Area Routing 1Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 2. Agenda • Introduction • Review concepts • Goals of BGP • BGP in Practice • Conclusion Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only 2
  • 3. Introduction • The Internet is made up of a bunch of different organizations – Big ISPs – Little ISPs – Enterprises • Everyone needs to exchange traffic with everyone else…mostly • Need to be able to create policy for how traffic is sent and received, over what paths and deal with redundancy Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013, Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 3
  • 4. Concept Review • What is routing? – Forwarding • Every packet has a destination IP address • Address is looked up in the local router’s routing table (FIB – Forwarding Information Base) • Packet is routed (forwarded) out the proper interface – Routing Protocol • Proscribes a method for how routes get into the FIB • Many are available that fulfill different needs and situations – Static – IGP » RIP » EIGRP » OSPF & ISIS – EGP » BGP Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013, Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 4
  • 5. Goals of BGP • Tell your organization’s neighbors about the destinations you are able to reach • Provide controls to influence the path traffic takes to get to you as well as how it leaves your network • Distribute global routing information throughout your network • Easily filter what you send and what you receive Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013, Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 5
  • 6. BGP Concepts • AS – An autonomous system is a network typically controlled by a single entity, usually one per company – Assigned a 4 byte (was 2 byte) number to identify it, an ASN Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013, Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 6
  • 7. BGP Concepts • iBGP (internal BGP) – Distributes information throughout your AS – All iBGP routers must talk directly to all other routers or use scalability features such as route reflectors or confederations – iBGP is NOT an IGP, it is not intended to tell every router about the paths in your AS, instead it tells routers about global connectivity – You must still run an IGP such as OSPF, as BGP depends on it for local connectivity Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013, Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 7
  • 8. BGP Concepts • eBGP (external BGP) – eBGP is used to speak to your network neighbors, usually your upstream transit provider – Your network neighbors use eBGP to send you routing information about reachability in the rest of the world Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013, Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 8
  • 9. BGP in practice • Globally all ISPs “peer” with each other • An entire ecosystem has developed around BGP peering, mostly based on the amount of traffic exchanged • Exchanges where multiple service providers come together are located in many major cities across the world, known as IX (Internet eXchange) Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013, Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 9
  • 10. Routing Table Growth • Size of the global routing table is currently around 455,000 routes for v4 and 12,600 v6 routes • Depletion of IPv4 address space may cause “deaggregation” of the IPv6 global routing table, which could result in explosive growth • Growth of IPv6 also could result in rapid growth of the global routing table Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013, Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 10
  • 11. Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2013, Network Utility Force LLC Company confidential information, transmittal to third parties by prior permission only 11 Brandon Ross – Chief Network Architect – Network Utility Force – bross@netuf.net