skip to main content
article

Improving network agility with seamless BGP reconfigurations

Authors Info & Claims
Published:01 June 2013Publication History
Skip Abstract Section

Abstract

The network infrastructure of Internet service providers (ISPs) undergoes constant evolution. Whenever new requirements arise (e.g., the deployment of a new Point of Presence or a change in the business relationship with a neighboring ISP), operators need to change the configuration of the network. Due to the complexity of the Border Gateway Protocol (BGP) and the lack of methodologies and tools, maintaining service availability during reconfigurations that involve BGP is a challenge for operators. In this paper, we show that the current best practices to reconfigure BGP do not provide guarantees with respect to traffic disruptions. Then, we study the problem of finding an operational ordering of BGP reconfiguration steps that guarantees no packet loss. Unfortunately, finding such an operational ordering, when it exists, is computationally hard. To enable lossless reconfigurations, we propose a framework that extends current features of carrier-grade routers to run two BGP control planes in parallel. We present a prototype implementation and show the effectiveness of our framework through a case study.

References

  1. Y. Rekhter, T. Li, and S. Hares, "A Border Gateway Protocol 4 (BGP- 4)," RFC 4271, 2006.Google ScholarGoogle Scholar
  2. L. Vanbever, S. Vissicchio, C. Pelsser, P. Francois, and O. Bonaventure, "Seamless network-wide IGP migrations," in Proc. SIGCOMM, 2011, pp. 314-325. Google ScholarGoogle Scholar
  3. B. Fortz and M. Thorup, "Optimizing OSPF/IS-IS weights in a changing world," IEEE J. Sel. Areas Commun., vol. 20, no. 4, pp. 756-767, May 2002. Google ScholarGoogle Scholar
  4. T. Griffin and G.Wilfong, "On the correctness of iBGP configuration," in Proc. SIGCOMM, 2002, pp. 17-29. Google ScholarGoogle Scholar
  5. S. Vissicchio, L. Cittadini, L. Vanbever, and O. Bonaventure, "iBGP deceptions: More sessions, fewer routes," in Proc. IEEE INFOCOM, 2012, pp. 2122-2130.Google ScholarGoogle Scholar
  6. S. Balon and G. Leduc, "Combined intra- and inter-domain traffic engineering using hot-potato aware link weights optimization," in Proc. SIGMETRICS, 2008, pp. 441-442. Google ScholarGoogle Scholar
  7. M. Brown, C. Hepner, and A. Popescu, "Internet captivity and de-peering," presented at the NANOG 45, 2009.Google ScholarGoogle Scholar
  8. S. Lee, T. Wong, and H. Kim, "To automate or not to automate: On the complexity of network configuration," in Proc. IEEE ICC, Beijing, China, May 2008, pp. 5726-5731.Google ScholarGoogle Scholar
  9. P. Smith, "BGP techniques for service providers," presented at the NANOG 50, 2010.Google ScholarGoogle Scholar
  10. G. Herrero and J. van der Ven, Network Mergers and Migrations: Junos Design and Implementation. Hoboken, NJ: Wiley, 2010. Google ScholarGoogle Scholar
  11. R. Zhang and M. Bartell, BGP Design and Implementation. San Jose, CA: Cisco Press, 2003. Google ScholarGoogle Scholar
  12. Equinix, Inc., Redwood City, CA, "Equinix Direct," [Online]. Available: http://www.equinix.com/solutions/regional-solutions/ americas/equinix-direct/Google ScholarGoogle Scholar
  13. T. Bates, E. Chen, and R. Chandra, "BGP route reflection: An alternative to full mesh internal BGP (iBGP)," RFC 4456, 2006.Google ScholarGoogle Scholar
  14. N. Feamster and H. Balakrishnan, "Detecting BGP configuration faults with static analysis," in Proc. NSDI, 2005, pp. 43-56. Google ScholarGoogle Scholar
  15. T. G. Griffin, F. B. Shepherd, and G. Wilfong, "The stable paths problem and interdomain routing," IEEE/ACM Trans. Netw., vol. 10, no. 2, pp. 232-243, Apr. 2002. Google ScholarGoogle Scholar
  16. T. Griffin and G. T. Wilfong, "Analysis of the MED oscillation problem in BGP," in Proc. IEEE ICNP, 2002, pp. 90-99. Google ScholarGoogle Scholar
  17. M.-O. Buob, S. Uhlig, and M. Meulle, "Designing optimal iBGP route-reflection topologies," in Proc. Netw., 2008, pp. 542-553. Google ScholarGoogle Scholar
  18. C. Villamizar, R. Chandra, and R. Govindan, "BGP route flap damping," Internet Engineering Task Force, RFC 2439, 1998. Google ScholarGoogle Scholar
  19. S. Vissicchio, "Governing routing in the evolving Internet" Ph.D. dissertation, Roma Tre Univ., Rome, Italy, 2012 [Online]. Available: http://www.dia.uniroma3.it/~compunet/www/docs/vissicchio-thesis-text.pdfGoogle ScholarGoogle Scholar
  20. B. Quoitin and S. Uhlig, "Modeling the routing of an autonomous system with C-BGP," IEEE Netw., vol. 19, no. 6, pp. 12-19, Nov. 2005. Google ScholarGoogle Scholar
  21. C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, and F. Jahanian, "Internet inter-domain traffic," in Proc. SIGCOMM, 2010, pp. 75-86. Google ScholarGoogle Scholar
  22. S. Uhlig and S. Tandel, "Quantifying the BGP routes diversity inside a tier-1 network," in Proc. Netw., 2006, pp. 1002-1013. Google ScholarGoogle Scholar
  23. Cisco Systems, Inc., San Jose, CA, "Configuring virtual routing and forwarding," Official Cisco Documentation, 2010 [Online]. Available: http://www.cisco.comGoogle ScholarGoogle Scholar
  24. V. Valancius and N. Feamster, "Multiplexing BGP sessions with BGP-Mux," in Proc. CoNEXT, 2007, Article no. 44. Google ScholarGoogle Scholar
  25. P. Francois, B. Decraene, C. Pelsser, K. Patel, and C. Filsfils, "Graceful BGP session shutdown," Internet-Draft, Dec. 2011.Google ScholarGoogle Scholar
  26. DANTE, Cambridge, U.K., "GEANT backbone topology," 2011 [On-line]. Available: http://www.geant.netGoogle ScholarGoogle Scholar
  27. "Seamless BGP reconfigurations," 2012 [Online]. Available: http://inl. info.ucl.ac.be/softwares/Google ScholarGoogle Scholar
  28. H. Ballani, P. Francis, T. Cao, and J.Wang, "Making routers last longer with ViAggre," in Proc. NSDI, 2009, pp. 453-466. Google ScholarGoogle Scholar
  29. RIPE NCC, Amsterdam, The Netherlands, "RIPE routing information service (RIS)," [Online]. Available: http://www.ripe.net/risGoogle ScholarGoogle Scholar
  30. M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and J. van der Merwe, "Design and implementation of a routing control platform," in Proc. NSDI, 2005, pp. 15-28. Google ScholarGoogle Scholar
  31. R. Chen, A. Shaikh, J. Wang, and P. Francis, "Address-based route reflection," in Proc. CoNEXT, 2011, Article no. 5. Google ScholarGoogle Scholar
  32. R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in Proc. SIGCOMM, 2002, pp. 3-16. Google ScholarGoogle Scholar
  33. A. Rawat and M. A. Shayman, "Preventing persistent oscillations and loops in iBGP configuration with route reflection," Comput. Netw., vol. 50, pp. 3642-3665, Dec. 2006. Google ScholarGoogle Scholar
  34. M. Vutukuru, P. Valiant, S. Kopparty, and H. Balakrishnan, "How to construct a correct and scalable iBGP configuration," in Proc. IEEE INFOCOM, 2006, pp. 1-12.Google ScholarGoogle Scholar
  35. T. Griffin and J. L. Sobrinho, "Metarouting," in Proc. SIGCOMM, 2005, pp. 1-12. Google ScholarGoogle Scholar
  36. R. Alimi, Y. Wang, and Y. R. Yang, "Shadow configuration as a network management primitive," in Proc. SIGCOMM, 2008, pp. 111-122. Google ScholarGoogle Scholar
  37. E. Chen, "Route refresh capability for BGP-4," RFC 2918, 2000. Google ScholarGoogle Scholar
  38. Y. Wang, E. Keller, B. Biskeborn, J. van der Merwe, and J. Rexford, "Virtual routers on the move: Live router migration as a network-management primitive," in Proc. SIGCOMM, 2008, pp. 231-242. Google ScholarGoogle Scholar
  39. E. Keller, J. Rexford, and J. Van DerMerwe, "Seamless BGP migration with router grafting," in Proc. NSDI, 2010, pp. 235-248. Google ScholarGoogle Scholar
  40. M. Reitblatt, N. Foster, J. Rexford, and D.Walker, "Consistent updates for software-defined networks: Change you can believe in!," in Proc. HotNets-X, 2011, pp. 1-6. Google ScholarGoogle Scholar
  41. S. Raza, Y. Zhu, and C.-N. Chuah, "Graceful network state migrations," IEEE/ACM Trans. Netw., vol. 19, no. 4, pp. 1097-1110, Aug. 2011. Google ScholarGoogle Scholar

Index Terms

  1. Improving network agility with seamless BGP reconfigurations
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader