Saturday, June 8, 2002
Topic/Presenter |
---|
Full AbstractThis tutorial introduces service providers to some more advanced BGP features and techniques to aid with operating their networks within the Internet. After a brief recap of iBGP, eBGP, and common attributes, the tutorial will look at the various scaling techniques available, when to use BGP instead of an IGP, and examine policy options available through the use of local preference, MED, and communities. The tutorial will then briefly cover some basic multihoming techniques, before finishing with a look at some of the facilities available for debugging problems in BGP networks. Speakers |
RecordingsFull AbstractThe session is intended for anyone responsible for updating and implementing routing policies of an ISP, including NOC personnel and technical management personnel who need to understand the process of publishing routing policy. The tutorial will discuss:
Speakers |
Full AbstractA provider's success is increasingly being influenced by its ability to monitor and engineer its traffic performance - both within its domain and between its domain and other AS's. Key data required for both inter- and intra-domain traffic engineering (TE) include information on routing, traffic loads, bandwidth, and path performance. This tutorial focuses on application of TE for inter-domain purposes. This includes short-term traffic management requirements such as debugging, congestion mitigation, and routing optimization; as well as long-term planning involving capacity planning, peering analysis, and load balancing. The first half of this tutorial provides an overview of techniques that can be used by large, complex networks to expand their visibility into and control of traffic moving between their network and other domains (it recaps key points from the NANOG24 Inter-domain Traffic Engineering tutorial). The second half of the tutorial provides specific examples and case studies of inter-domain TE from commercial networks, including MFN and Global Crossing. A case example from Exodus also demonstrates how data gathered for inter-domain TE can be used for intra-domain TE purposes, e.g., use of BGPNextHop in optimizing internal routing. Speakers Andrew Lange, CW Matthew Meyer, Global Crossing Josh Wepmen, Ixia |
Sunday, June 9, 2002
Topic/Presenter |
---|
Full AbstractSpeakers |
Full AbstractSpeakers |
Full AbstractSpeakers |
|
Full AbstractThis workshop describes technologies that enable IP service providers to offer tighter Service Level Agreements. The SLA parameters that need to be tightened are defined and the technologies that should be considered are described, together with the decision criteria on where each technology should be used. The workshop is based upon practical deployment experience and includes lab and deployment results. The specific technologies discussed are fast ISIS convergence and differentiated services. Consideration is also given to how these technologies should be deployed and operated. We demonstrate network designs to improve layer 3 routing convergence and traffic engineering, as well as give data to show the costs/benefits of these improvements. A paper based on this project has been published in Computer Networks. Speakers |
Full AbstractThere are useful and quite general techniques that implementations can take advantage of for both IGP and MPLS convergence. Prior discussions at NANOG have focused on incremental SPF, but other techniques can be used as well. For example, a two-stage forwarding can allow the IGP route to change and the BGP routes that depend on it to follow with minimal changes to hardware forwarding information. Tradeoffs exist between using only an IGP vs. using MPLS. The IGP SPF takes order(LlogN), which is further reduced by incremental SPF. MPLS presents scaling limitations with respect to convergence due to the larger number of Constrained Shortest Path First (CSPF) computations that may be required if the set of unique constraints differs. These problems can be avoided through MPLS implementation techniques and network design techniques. Fast convergence for an IGP is a means to acheive faster restoration when a fault occurs. MPLS has restoration capabilities worth considering. MPLS fast reroute allows fast convergence with a complexity cost in terms of a larger number of LSPs being required. Standby LSP can support subsecond recovery with a bit less complexity. Rerouting LSPs from ingress can be done in seconds for most topologies. This latter case is where MPLS scaling issues come into play. SPF results caching and incremental CSPFs are among the techniques that can aleviate scaling problems, but these too have limits. There are problems to be solved to make incremental CSPF practical, such as finding similar CSPF results and quickly determining which links would differ for the purpose of incremental CSPF. Adjusting a CSPF for the current path of an LSP when considering rerouting it and the adjusted CSPF needed for disjoint paths present other complexities for which there are solutions. Topology and protocol usage also affects scaling on the IGP and of MPLS. Implications of area size and LSP tunneling are discussed. Speakers |
Full AbstractThe Internet consists of about 13,000 autonomous systems (AS's) that exchange routing information using the Border Gateway Protocol (BGP). Network operators must have control over the flow of traffic into, out of, and across their networks. However, BGP does not facilitate common traffic engineering tasks, such as balancing load across multiple links to a neighboring AS or directing traffic to a different neighbor.
An outline of the talk follows:
http://nms.lcs.mit.edu/~feamster/papers/paper-nanog.pdf">http://nms.lcs.mit.edu/~feamster/papers/paper-nanog.pdf Speakers |
Monday, June 10, 2002
Topic/Presenter |
---|
Full AbstractSince its introduction several years ago, the BGP community attribute [TCL96, CB96] has been used for several purposes. In this presentation, we describe a detailed study of today's utilization of the BGP community attribute [QB02a].
To cope with these limitations of the Community attribute, we describe an new type of extended community attribute [RTR01] called the redistribution communities [BCH^+02] that are currently being developed within IETF and can be used to support many of the current utilizations of the Community attribute in a more flexible manner. Furthermore, we show that the cost of supporting this new type of extended communities in a BGP router is minor based on our experience in implementing on the zebra platform [Quo02]. Acknowledgments This work was partially funded by the European Commission within the IST ATRIUM project. This work would not have been possible without the very useful information provided by the RIPE RIS project, the RIPE WHOIS database and the RouteViews project. Referencess [BCH^+02] O. Bonaventure, S. De Cnodder, J. Haas, B. Quoitin, and R. White. Controlling the redistribution of bgp routes. Internet draft, draft-ietf-ptomaine-bgp-redistribution-00.txt, work in progress, April 2002. [CB96] E. Chen and T. Bates. An Application of the BGP Community Attribute in Multi-home Routing. Internet Engineering Task Force, RFC1998, August 1996. [Mey02] D. Meyer. Route Views Archive project. University of Oregon, http://archive.routeviews.org, January 2002. [QB02a] B. Quoitin and O. Bonaventure. A survey of the utilization of bgp communities. Internet draft, draft-quoitin-bgp-comm-survey-00.txt, work in progress, February 2002. http://www.infonet.fundp.ac.be /doc/reports/Infonet-TR-2002-02.pdf. [QB02b] B. Quoitin and O. Bonaventure. Utilization of the BGP Communities attribute. http://alpha.infonet.fundp.ac.be/anabgp, January 2002. Infonet Group, University of Namur, Belgium. [Quo02] B. Quoitin. An implementation of the BGP Redistribution Communities in Zebra. http://www.infonet.fundp.ac.be/doc/tr/Infonet-TR-2002-0 3.html, February 2002. Technical Report TR-2002-3, Infonet Group, University of Namur, Belgium. [RIS02] Routing Information Service project. Réseaux IP Européens, http://www.ripe.net/ripencc/pub-services/np/ris-index.h tml, January 2002. [RIW02] Whois database. RIPE NCC, http://abcoude.ripe.net/ris/rawdata, January 2002. [RTR01] S. Ramachandra, D. Tappan, and Y. Rekhter. BGP Extended Communities Attribute. Internet draft, draft-ramachandra-bgp-ext-communities-09.txt, Work In Progress, June 2001. [TCL96] P. Traina, R. Chandrasekeran, and T. Li. BGP Communities Attribute. Internet Engineering Task Force, RFC1997, August 1996. Speakers |
Full AbstractSee Bill Woodcock's presentation at: Speakers |
RecordingsFull AbstractThe ARIN Public WHOIS server, a troubleshooting aid for applications that use resource assignment information, shows IP address space utilization. To coincide with the release of the new ARIN database and templates in summer 2002, ARIN will release a new WHOIS daemon. The new software offers many improvements, including a new format that is more machine-readable. This presentation will detail the enhancements that have been made, provide sample queries, and explain where users can test the new server. Speakers |
Full AbstractAvici Systems |
Full AbstractNow more than ever, Internet Service Providers are focusing on ways to increase the resiliency of their networks and, if at all possible, reduce their operating costs at the same time. Past research (Internet Service Providers and Peering, presented at NANOG 19, and A Business Case for Peering) demonstrates the economic tradeoffs of peering and highlight the simple but challenging first step: How to know who to talk with at an ISP to get peering set up This Peering BOF focuses on this first step using "Peering Personals." We solicit Peering Coordinators (before the meeting), asking them to characterize their networks and peering policies in general ways ("content heavy" or "access (eyeball) -heavy," "Multiple Points Required" or "Will Peer anywhere," "Peering with Content OK," etc.). From the answers we will select a set of ISP Peering Coordinators to present a 2-3 minute description of their network, what they look for in a peer, etc., allowing the audience to put a face with the name of the ISP. At the end of the Peering BOF, Peering Coordinators will have time to speak with Peering Coordinators of ISPs they seek to interconnect with. The expectation is that these interactions will lead to the Peering Negotiations stage, the first step towards a more fully meshed and therefore resilient Internet. Speakers |
Full AbstractJoin K Claffy and other members of the NANOG community to talk about your ideas for NANOG meetings (agenda topics, logistics) and the mailing list. We welcome your input! Speakers |
RecordingsFull AbstractSpeakers |
Full Abstractopportunity to discuss their perception of service provider requirements for core network design, especially in view of recent changes in the economy.
Speakers |
RecordingsFull AbstractSpeakers |
|
Full AbstractIn this talk, we analyze the BGP routes leading to root and generic Top Level Domain (gTLD) DNS servers and explore a protection mechanism for these critical routes. A fault or attack that creates a false route to these servers could deny access to millions of DNS zones or incorrectly redirect DNS queries to a malicious impostor. However, the temporary loss of a single server can be tolerated by the DNS. Our approach is to apply BGP AS path filters that make the BGP routes to these critical servers less dynamic. This provides strong protection against false routes, but some potentially valid back-up routes can be rejected. We have validated our design against over one year of BGP route logs from nine diverse ISPs. Our results show that routers using our AS path filtering could effectively detect the insertion of invalid routes, while maintaining reachability to the top level DNS servers. Speakers |
RecordingsFull AbstractIn this talk, we take a look at where we are as a community with regard to BGP security. The session will walk through the history of the technology, techniques used, realistic risk assessments, and proposals in the queue for a BGP environment that is more resistant to attack (IETF's RPSEC, SBGP, and soBGP). The presentation is based on a paper (PDF) titled "BGP Risk Assessment" (updated 4/20/04) which was created for the operations community and submitted to the US National Security Council ISP BGP & DNS Working Group. (See related slides from Avi Freedman's NANOG 25 talk.) Note: on 4/20/04 the materials in this presentation were updated based on: http://www.uniras.gov.uk/vuls/2004/236929/index.htm Speakers |
|
RecordingsFull AbstractIn early 2002, Richard Clarke of the National Security Council/White House called a meeting among ISPs, device vendors, and some government agencies. Output from the working groups that were formed at the meeting will be incorporated into the President's cyber security policy.
Speakers |
Tuesday, June 11, 2002
Topic/Presenter |
---|
RecordingsFull AbstractIncreasing market demands for improved Internet availability is requiring ISPs to more quickly evaluate routers for network deployment. Typically, the focus of this evaluation has been on protocol conformance, interoperability, and scaling. While these parameters are critical for a successful deployment, none ensure router availability once deployed. ISPs and router vendors should now consider altering the paradigm of test and evaluation to focus on router stability in a multi-protocol environment. This is achieved by implementing a test program that includes automated regression testing, topology-specific configuration testing, convergence testing, stress testing, and longevity testing with multiple protocols simultaneously configured. This presentation will detail these components for integration into existing test programs as follows:
Speakers |
RecordingsFull AbstractSpeakers |
RecordingsFull AbstractSubject: Call for Participation - Smart Routing Panel Smart Routing Panel Description: The Internet is not resilient to two types of problems: outages and data flow quality degrading. Network outages are defined as periods where traffic to a portion of the network is down. A network is identified by a network prefix. Data flow quality degradation occurs when links or routers are so overloaded that traffic does not flow through at normal rates. Normally, data flow quality has to dramatically decrease for the Enterprise to be concerned. Some companies in industries such as stock trading or insurances have time critical information. Data flow in these companies must react quickly to data flow degradation. A group of vendors of "Smart Routing" products and services proposes to route around outages and areas of poor data flow. We are soliciting participants for a panel that will discuss this at NANOG 25 (June 9-11). This panel will focus solely on the technology issues in "smart routing" and "BGP". In the finest of NANOG traditions, we will eschew any marketing content in order to focus on the interesting technical issues in this area. We are looking for participants for this panel with deployed product. Each panel member will be required to prepare the answers to the questions below and to aid in preparing a the general panel discussions. Question 1 (parts A-F) and Question 2 will form the basis of the 1st panel session that will highlight the technology behind the smart routing. Question 3: "BGP issues that Smart Routing has highlighted" will be done in a second panel discussion. The format of this panel will be - Overview of Smart Routing - Presentations by Smart Routing Vendors - Q & A on Smart Routing - BGP issues Smart Routing has Highlighted - Q & A on BGP issues If you are interested in this panel, please contact me at [email protected]. Sue Hares [email protected] (734)222-1610 Participant Questionnaire: =========================== 1) Overview of Products 1-a) The smart routing product uses BGP to routes around "problems" in the network. We would like you to discuss the following 6 components of your product. Question 1-b through 1-g give detailed questions that will aid you in presenting these 6 components. - Is your product a box or a service or both ? (Question 1-b) - Definition of "quality" of data flow (Question 1-c) - Detection of traffic flow problems (Question 1-d) - Building up of database of alternative BGP routes (Question 1-e) - Policy engines to tailor the "re-routing" to the customers' needs (Question 1-e) - Traffic steering capability (Question 1-f) - Interaction with other products (Question 1-g) Please indicate which of the following methods your product defaults to. Also indicate which of these methods your product can support. Please indicate how your product does each of these 5 tasks. For the database item, please indicate if both history and current data is being used. 1-b) What do you sell? - Box or service or both? - Do you utilize a POP in your topology? - What is in your POP? Is it 7x24x365? - Do you have a NOC for your service? - What does your product change? - IBGP routes in the Enterprise - Data traffic flow - Do you use tunneling techniques to points inside your network to "re-route" traffic to the correct site? - Do you characterize data flows by applications? - Management information - Do you tunnel management information to a management server? - What reports to you provide? 1-c) How does your product define "quality" for the Enterprise customer? - What factors are measured for quality of data flow through the Internet? - What factors are common with other Smart Routing vendors and what parts of your product are unique? - What is the default mechanism your product utilizes to set quality? - Who sets default quality - the product (by discovery) or the customer? Why did you choose your defaults? - Is the customer required to set-up quality definitions? - Is the policy you set for an enterprise set by destination address? - As single prefix or a group of prefixes? - Is the policy you set for an enterprise set on something in the packet beside the destination address? - By source address, destination address? - By other things in the IP packet? - Does the product include work load characterization mechanisms? - Application prioritization, - Traffic mixture statistics, or - Traffic type based queuing Please provide any additional information you consider as part of "quality" that these questions have not indicated. 1-d) The detection of traffic flow problems has been done with tools that ping, trace-route, sniffing on data traffic, or query statistics in the network. These tools may make use of the ICMP network functions or may be application protocols based in UDP or HTTP information. - IP Ping packages (both ICMP and non-ICMP) to determine delay in programs, - Do you use an ICMP (normal ping) program? - Do you use a proprietary UDP based ping (end to end query)? - Do you use a proprietary HTTP based ping (end-to-end query)? - How do you select the locations to be queried via ping or application UDP program? Are you using your web sites or customer machines? If you are using web sites, who owns the web site or the content? - Do you use a traceroute like packages to determine the hop-by-hop characteristics of the route? - Is the traceroute package based in ICMP, UDP, or other network protocols?] - Do you utilize a MPLS Trace-route package? - Do you display this information in visual form? Is this visual form in text or graphical? - Do you do data traffic flow monitoring or packet sniffing on a LAN? - Why do you utilize this in your product? - Do you tunnel to obtain the traffic or "listen" to wire packets? 1-f) Traffic steering and route flapping -Traffic steering involves steering traffic by inserting information in to the IBGP mix. Please indicate which of these functions you support. - Insertion of a prefix with a better local_pref, - Insertion of a longer prefix, - Insertion of BGP communities to allow the enterprise to route around the difficulty, or - Insert of changes to AS Path length. - What is your default? - If you use the insertion of a prefix with a better LOCAL_PREF value, how do you keep from the new route being the "better" route and IBGP killing the supporting route? - If you inserts two longer prefixes, what happens if the two longer prefixes are in the routing traffic already? (for example a /16 is replaced by 2 /17s) - How do you prevent flapping between two different paths for traffic flows? - How often do you change traffic flows directions (route changes)? - Why would you change routes or exit points with the Enterprise? 1-g) how does your product interact with other products in the Enterprise? - Do firewalls impact your product? - Do you run through a firewall? - Does the security or the traffic filters impact your product? - How does your product interact with existing routers? - Does it receive BGP routes? Does it send BGP routes? - Does it receive statistics? - How does your product interact with web servers or web caches? - How does it improve the web cache update? (Please be specific as this is a technical audience.) - How does the product improve web server traffic? - Does your product interact with packet optimizers? 2) What is it worth it to Customers? 2-a) Why Does the Enterprise buy smart routing? What benefits does it provide to the Enterprise customer? 2-b) Multi-homing of Enterprises - How many connections do individual Enterprises have? - Does the number of connections vary widely? - What is the range? 2-c) Return on Investment for Customer - What improvements to traffic flow can you obtain? - How can you prove to your customers that you are improving traffic? - Using the box, can or should the customer reduce the number of required connections to the Internet? 2-d) What performance problem are you fixing? - Tier 1 providers claim 5 9s of performance, where is the problem? In the "middle mile " between service providers? At the edge on access? In the Tier 1 or Tier 2 or Tier N service provider? 3) BGP issues that "Smart Routing" has highlighted 3-a) BGP selecting the Best route - What percentage of time does BGP pick the optimum route for data flow? - Is the less efficient usage based on - No policy based so the select devolves on BGP tie breaking? - Explicit policy (go through this AS) - AS Path Length policy? - How many months of BGP problem evaluation have you had? 3-b) does BGP Convergence issues cause some of these problems? - Do you see any results of the IBGP persistent route oscillation? - Do you see any MPBGP Multicast routes? http://www.multicasttech.com/status/index.html indicates that there are over 350 AS that are doing multicast. - What is the effect of Non-Stop-Forwarding on Smart Routing? At times the NSF will cause the control plane to go while you are making measurement? Do you require any coupling between the data plane and the control plane? 3-c) MPLS and BGP - What does the impact of MPLS and GMPLS cores on Smart Routing? - Do you see any Layer 3 VPNs in use in the Enterprise or by the service providers connecting to Enterprises? - Have you encountered MPLS forwarding in the Enterprise? - If so, what type: link layer or BGP VPNs? - If not, is the enterprise using Frame Relay or ATM Speakers |
Full AbstractPanel's second agenda: Speakers |
Full AbstractSpeakers |