nira a new inter domain routing architecture
play

NIRA: A New Inter-Domain Routing Architecture Xiaowei Yang, David - PowerPoint PPT Presentation

NIRA: A New Inter-Domain Routing Architecture Xiaowei Yang, David Clark, Arthur W. Berger Rachit Agarwal (Results are by others, any errors are by me) (Animated slides shamelessly stolen from Prasads slides (CS495, Northwestern


  1. NIRA: A New Inter-Domain Routing Architecture Xiaowei Yang, David Clark, Arthur W. Berger Rachit Agarwal (Results are by others, any errors are by me) (‘Animated’ slides shamelessly stolen from Prasad’s slides (CS495, Northwestern University), Thanks Google!)

  2. What this paper talks about! • Routing at domain level – Giving more control to the user over the route • Fosters competition among ISPs • Routes chosen by BGP not the most efficient • Only users know whether a path suits his/her application

  3. What this paper talks about! • Claims to answer the questions: • Supporting user choice • provider compensation • scalable route discovery • efficient route representation • fast route fail-over • security

  4. What this paper does not talk about! • Acknowledged Issues: – Autonomy Issues (why would an ISP allow that?) – Potential performance problems • Issues not acknowledged: – Where is “design for tussle”? (stronger users means stronger attacks?)

  5. NIRA

  6. Core • tier-I ISPs: ISPs that have no providers • Core: Region where tier-I ISPs interconnect • Up-graph (of an user): network of user’s providers, provider’s providers (and peers) until the core is reached

  7. Cindy Alice N9 N3 Example: Core R3 B2 B3 R7 N2 core R2 R8 B4 B1 R1 N1 N18 Bob

  8. NIRA in a nutshell ! • Every node gets a path from its up-graph to the core • All these paths get stored in a DNS-like database (NRLS) • Path Selection: – Choose your up-graph as part of the route – Query name-to-route look-up service (NRLS) for destination’s up-graph – Combine the two to get a path to the destination • User’s route not selected by the user, but by both user and destination!

  9. Example: NIRA in a nutshell ! Cindy N11 N12 N10 N13 N14 N9 N8 R8 R7 R9 R6 N7 N15 core N6 B4 B3 R5 N16 R10 N5 B1 B2 R4 N17 N4 R1 R3 R2 N18 Alice Bob N1 N3 N2

  10. Some Interesting Details Addressing

  11. Addressing • Hierarchical address assignment • Providers in the Core obtain a globally unique address prefix • Provider then allocates non-overlapping subdivisions of the address prefix to each of its customers Discussion: Practical addressing scheme? One can infer ISP relationships!

  12. Example: Addressing Core B2 B1 1::/16 2::/16 1:3::/32 1:1::/32 2:1::/32 1:2::/32 R3 R2 R1 1:3:1::/48 1:1:1::/48 2:1:1::/48 1:2:1::/48 N3 1:2:2::/48 N1 N2 Alice Bob 1:1:1::1000 1:3:1::2000 1:2:1::1000 2:1:1::2000 • Note: An address represents a valid route to the core.

  13. Forwarding Tables Uphill table Core B1 B2 1::/16 2::/16 1::/16 B1 1:3::/32 1:1::/32 2:1::/32 1:2::/32 Downhill table R1 R2 R3 1:1:1::/48 1:3:1::/48 1:1:1::/48 N1 1:2:1::/48 2:1:1::/48 1:1::/96 self 1:2:2::/48 N3 N1 N2 Alice Bob 1:1:1::1000 1:3:1::2000 1:2:1::1000 2:1:1::2000 • Uphill table: providers • Downhill table: customers, self • Bridge table: all others • Scalability: Size of core limited (financial factors), Provider hierarchy is shallow (domains have limited number of providers)

  14. Hierarchical Addresses • Provider-rooted hierarchical address – User can use a source and a destination address to compactly represent a “valley-free” route – Switch routes by switching addresses – Both source and destination addresses used for forwarding • Limits source address spoofing – Router may not find an address with an arbitrary source address

  15. Efficient Route Representation

  16. Example: Route Representation Cindy N11 N12 N10 N13 N14 N9 N8 R8 R7 R9 R6 N7 N15 core N6 B4 B3 R5 N16 R10 N5 B1 B2 R4 N17 N4 R1 R3 R2 N18 Alice Bob N1 N3 N2

  17. Efficient Route Representation Core B1 B2 1::/16 2::/16 1:3::/32 1:1::/32 2:1::/32 1:2::/32 R1 R2 R3 1:3:1::/48 1:1:1::/48 2:1:1::/48 1:2:1::/48 1:2:2::/48 N3 N1 N2 Alice Bob 1:1:1::1000 1:3:1::2000 1:2:1::1000 2:1:1::2000 • A source and a destination address unambiguously represent a route.

  18. Forwarding

  19. Overview • Packet first forwarded along the sequence of domains that allocate the source address • Within the core (from source’s provider to destination’s provider) • Finally, along the sequence of domains that allocate the destination address

  20. Forwarding Core B1 B2 1::/16 2::/16 1:3::/32 1:1::/32 2:1::/32 1:2::/32 R1 R2 R3 1:3:1::/48 1:1:1::/48 1:1:1::1000 up 2:1:1::/48 1:2:1::/48 1:2:2::/48 N3 down 1:3:1::2000 N1 N2 Alice Bob 1:3:1::2000 1:1:1::1000 2:1:1::2000 1:2:1::1000 • Look up destination address in the downhill table. If no match: • Look up the source address in the uphill table.

  21. Discussion • Scalability? – Consider each ISP having two providers. An user at level ‘k’ will have O(2 k ) paths. • User control? • How to exploit this control? – How to measure “goodness” of a domain-level route? • Security: – Does “stronger users” necessarily mean “stronger attacks”? • Mobility?

  22. (TIPP and Route Failures) Back-up slides

  23. Topology Information Propagation Protocol (TIPP) • Path-vector component – Propagating domain level routes – Providers propagate routes to their customers, which in turn propagate routes to their customers – No route selection (no policy-enforcement) • Link-state component – Information about dynamic network changes – Link-state messages could potentially be propagated only down the hierarchy (no message from a customer to provider required)

  24. Handling Route Failures

  25. Route Failures • Problem: – TIPP messages do not propagate globally • The sender might not have up-to-date information about destination’s path (when the destination does not update its routes in NRLS very frequently) • Solution: – If the route in the packet header is unavailable, inform the sender! – If no information received, use timeout!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend