peering in an ip world - technology requirements (3-nov, 2009)

20
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 20091103 OPASTCO Peering - sulrich Peering in an IP world Technology Requirements OPASTCO 2009 Technical & Marketing Symposium steve ulrich - consulting systems engineer [email protected] 1

Upload: steve-ulrich

Post on 18-Dec-2014

169 views

Category:

Technology


0 download

DESCRIPTION

an overview of various considerations relative to IP peering

TRANSCRIPT

Page 1: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public20091103 OPASTCO Peering - sulrich

Peering in an IP worldTechnology Requirements

OPASTCO 2009 Technical & Marketing Symposiumsteve ulrich - consulting systems engineer

[email protected]

1

Page 2: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 2

Internet structuretraditional assumption is that the Internet is based on a well ordered provider-client hierarchy

LocalISP

LocalISP

LocalISP

LocalISP

LocalISP

TransitISP

TransitISP

NationalISP

NationalISP

NationalISP

RegionalISP

RegionalISP

RegionalISP

RegionalISP

Page 3: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 3

Internet structure

§ unordered subset of interconnects

§ driven by business requirements underpinned by performance

§ non-disclosure and bi-lateral agreements

§ peering is now considered a corporate asset and legal concern

reality is not so ideal

NationalISP

NationalISP

NationalISP

TransitISP

TransitISP

RegionalISP

RegionalISP

RegionalISP

RegionalISP

LocalISP

LocalISP

LocalISP

LocalISP

LocalISP

§ the Internet is an interconnection of ~ 30,000 (semi-) autonomous service providers

§ there is no central coordination for the management of interconnections, services, and tariffs

§ Internet peering ecosystem includesmany policies / many services / one Internet

Page 4: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 4

transit - definition§ transit is the business relationship where one ISP provides reach-ability to

all destinations in its routing table to its customers

§ transit provides connectivity to a superset of all destinations

Client Net

Client Net

Client Net

Client Net

ISP C

ISP B

ISP D

Client Net

Client Net

Client Net

Client Net

ISP A Can Reach All Destinations via Transit

Provider ISP D

Peers

Peers

ISP A Transit

Page 5: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 5

Peers

Peers

Transit

peering - definition§ peering is the business relationship where ISPs provide to each other

reach-ability to each predefined portions of their routing table

§ peering provides connectivity to a subset of a provider’s customer destinations

Client Net

Client Net

Client Net

Client Net

ISP C

ISP B

ISP AClient Net

Access to ISP B Prefixes Only

ISP D

Client Net

Client Net

Client Net

Page 6: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 6

traditional Internet peering model

§ tier 1 providers have access to the entire Internet (region) routing table solely through peering relationships

§ tier 2 providers must buy some transit from tier 1 providers

§ content providers buy transit (primarily from tier 1) to provide content

Tier 1 Tier 1

Tier 2 Tier 2

Enterprise Content Enterprise

Page 7: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 7

Internet peering evolution

§ tier 1 providers have access to the entire Internet (region) routing table solely through peering relationships

§ tier 2 providers must buy some transit from tier 1 providers

§ content providers peer (increasingly with tier 2) providing content directly onto the broadband networks

IOC / RLEC contentprovider Enterprise

Tier 1 Tier 1

Tier 2 Tier 2CDN

contentprovider

Page 8: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 8

peering rationale

§ commonly estimated, 10 - 20% of traffic can be peered away

§ even under congestion, capacity can be upgraded and managed more effectively

for the ISP§ improve application

performance, reduction in latency

§ improvement in throughput

§ CDNs as content providers ...peering at NAPs or with ISPs improves burstabilitybackup for on-net serversmarketing - CDNs tout the number of interconnections they have to their customers

for the content providers

§ reduce transit ISP service costs§ upgrades require less planning and costs§ greater control over routing and traffic load balancing

common to both

Page 9: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 9

Internet peering interconnection

ISP #1

ISP #6

ISP #5

ISP #4

ISP #3

ISP #2

switched ethernet

ISP #2ISP #1

ethernet / POS

public / shared peering

private peering

§ peering between equivalent sizes of service providers (e.g. tier 2 to tier 2)

shared cost private interconnection, equal traffic flows“no cost peering”

§ peering across exchange points

if convenient, of mutual benefit, technically feasible

§ fee based peeringunequal traffic flows, “market position”

Page 10: Peering in an IP World - Technology Requirements (3-nov, 2009)

§ if you’re not in an Internet exchange (IX) location alreadyIX Colo / Power / transport to IX

§ IX Port and/or cross-connect fees

§ CapEx: routers, switches, optics, ports

§ OpEx: Network Engineers

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich

peering requirements / costs

10

ISP-A

ISP-A

ISP-B

Telco/ISP

Access NetworkPOP <> IX Transport

Internet eXchange

∑ CAPEX + OPEX

Page 11: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich

peering technical requirements§ platform capacity

increasingly oriented around 1GE and 10GE interfaces

§ instrumentationwhat traffic is traversing your network and who’s sending it to you? peering requires accounting on peering interconnect traffic based on its source, destination and their traversed AS path, grouping or service category

this requires high performance and scalable NetFlow

§ routing policy expression / peering policy enforcement announce what you need, to who you need to and apply policy to what you receive from your peers

utilize hierarchical QoS policies on ingress and egress, to enforce peering policy. couple this to peering interfaces with QPPB

§ advanced and high performance security measuresACL application at line rate - drop spoofed traffic and mitigate DDoS attacks

automated and self-activated control-plane protection mechanisms

11

Page 12: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich

platform capacity§ highly Ethernet oriented connectivity

§ GE increasingly minimum peering interface

§ sub-rate 10GE peering quite commonw/sub-rate provided via policing and/or QoS policy on a per-VLAN basis

§ 10GE common on private connections or in peering fabrics

§ requires line-rate application of various featuresACLs - auto-generated ACLs of very large size (1000s of lines)common - require hardware based application

QoS application must take place in hardware

hardware based control-plane protection mechanisms

12

Page 13: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 13

instrumentation - NetFlow

NetFlowExport Packets

Reporting

Page 14: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 14

instrumentation - NetFlow - available info

•Source IP Address•Destination IP Address

• Packet count• Byte count

Usage

QoS

Timeof day

Application

Portutilization

From/to

Routing and

peering

• Input ifIndex• Output ifIndex

• Type of Service• TCP flags• Protocol

• Start sysUpTime• End sysUpTime

• Source TCP/UDP port• Destination TCP/UDP port

• Next hop address• Source AS number• Dest. AS number• Source Prefix mask• Dest. Prefix mask

• Source IP address• Destination IP address

v5 used extensively today - v9 provides interesting and notable enhancements

Page 15: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 15

instrumentation - NetFlow - reporting tools

Product Name Primary Use Comment OSCflowd Traffic Analysis No longer supported UNIX

Flow-tools Collector Device Scalable UNIX

Flowd Collector Device Support V9 BSD, Linux

FlowScan Reporting for Flow-Tools UNIX

IPFlow Traffic Analysis Support V9, IPv4, IPv6, MPLS, SCTP, etc..

Linux, FreeBSD, Solaris

NetFlow Guide Reporting Tools BSD, Linux

NetFlow Monitor Traffic Analysis Supports V9 UNIX

Netmet Collector Device V5, support v9 Linux

NTOP Security Monitoring UNIX

Stager Reporting for Flow-Tools UNIX

Nfdump/nfsen Traffic Analysis Support V5 and v9 UNIX

note: there are many open source NetFlow reporting tools available

Page 16: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 16

Traffic

Traffic

enforcing IP peering destination policy

Guarded TrustISP A trust ISP B to send X prefixes from the Global Internet Route Table.

ISP B Creates a egress filter to insure only X prefixes are sent to ISP A.

ISP A creates a mirror image ingress filter to insure ISP B only sends X prefixes.

ISP A’s ingress filter reinforces ISP B’s egress filter.

ISP A ISP B

Prefixes

Prefixes

Ingress FilterEgress Filter

Page 17: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 17

Traffic

Traffic

enforcing IP peering source policy

Enforcing Source Policy – requires a sophisticated tool kitISP A trust ISP B each other to send packets that match their peering agreement.

reality is that there is nothing to stop the ISPs from sending anything they want. hence, traffic dumpingtools like Netflow and BGP Policy Accounting are used identify abuses, data plane enforcement takes place with ACLs

ISP A ISP B

Prefixes

Prefixes

Receive AnythingSend Anything

Page 18: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 18

IFIBPre-IFIB

ACL

CPU

L2 Congestion Control

security mechanisms

§ layered control plane protection using multiple policers

L2 congestion controlline rate ACL filteringcontrol-plane session validation using pre-filter mechanismsadjustable performance for trusted control plane session treatmentmultiple queues to CPU

§ support MD5 authentication for routing protocols§ defend against TCP finger printing § priority in switch fabric ensures control traffic will never be

dropped§ support GTSM RFC 3682 (formerly BTSH)

Page 19: Peering in an IP World - Technology Requirements (3-nov, 2009)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential20091103 OPASTCO Peering - sulrich 19

peering requirements summary

peering requirement relevant technology scale / notes / etc.peering accounting MAC and BGP policy accounting support for line rate accounting

peering billing, flow monitoring NetFlow sampled NetFlow (better than 1:1000 sampling granularity )

peering bandwidth guarantee and traffic separation

Hierarchical QoS Per Vlan Policy requires scalable line rate policy application within hardware

security, DDoS mitigation uRPF line-rate applicationsecurity, DDoS mitigation

Control-Plane Policing requires an automated and self activated hardware based policer

security, DDoS mitigation

In and out ACL high-ACE count - > 32K line rate application

peering policy enforcement QPPB source and destination based FIB lookup for H-QoS classification and policing

support for line rate QoS classification application and QPPB binding

peering link fault detection and integrity BFD detection requires distributed BFD implementations with sub-second timer granularity

large network resilience techniques fast convergence BGP PIC, Fast IGP, IP FRR support for RIB/FIB scale from 1M - 2M routes

Page 20: Peering in an IP World - Technology Requirements (3-nov, 2009)