Inferring and Characterizing Internet Routing Policies

نویسندگان

  • Feng Wang
  • Lixin Gao
چکیده

Border Gateway Protocol allows Autonomous Systems (ASs) to apply diverse routing policies for selecting routes and for propagating reachability information to other ASs. Although a significant number of studies have been focused on the Internet topology, little is known about what routing policies network operators employ to configure their networks. In this paper, we infer and characterize routing policies employed in the Internet. We find that routes learned from customers are preferred over those from peers and providers, and those from peers are typically preferred over those from providers. We present an algorithm for inferring and characterizing export policies. We show that ASs announce their prefixes to a selected subset of providers. The main reasons for the selective announcement are due to traffic engineering strategy for controlling incoming traffic. The impact of these routing policies might be significant. For example, many Tier-1 ASs reach their (direct or indirect) customers via their peers instead of customers. Furthermore, the selective announcement routing policies imply that there are much less available paths in the Internet than shown in the AS connectivity graph. We hope that our findings will caution network operators in choosing the selective announcement routing policy for traffic engineering. Finally, we study export policies to peers and find that ASs tend to announce all of their prefixes to other peers. To the best of our knowledge, this is the first study on systematically understanding routing policies applied in the Internet. Keywords— Routing Policies, BGP, Selective Announcement, Traffic Engineering

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Inference of AS-Level Paths in the Internet

Routing protocols maintain connectivity of Internet routers and hosts and determine the path that a packet traverses. Inferring Internet paths is critical for evaluating the performance of Internet applications and services, such as cloud services and content delivery. Unlike intra-domain routing protocols, which typically use the shortest paths, inte-domain routing protocol apply local policie...

متن کامل

Inferring Internet AS Relationships Based on BGP Routing Policies

The type of business relationships between the Internet autonomous systems (AS) determines the BGP interdomain routing. Previous works on inferring AS relationships relied on the connectivity information between ASes. In this paper we infer AS relationships by analysing the routing polices of ASes encoded in the BGP attributes Communities and the Locpref. We accumulate BGP data from RouteViews,...

متن کامل

Characterizing the Internet Hierarchy from Multiple Vantage Points

About the Talk The delivery of traffic through the Internet depends on the complex interactions between thousands of Autonomous Systems (ASes) that exchange routing information using the Border Gateway Protocol (BGP). This talk investigates the topological structure of the Internet in terms of customer-provider and peer-peer relationships between ASes, as manifested in BGP routing policies. We ...

متن کامل

On Inferring Autonomous System in the Internet

-The Internet consists of rapidly increasing number of hosts interconnected by constantly evolving networks of links and routers. Interdomain routing in the Internet is coordinated by the Border Gateway Protocol (BGP). BGP allows each autonomous system (AS) to choose its own administrative policy in selecting routes and propagating reachability information to others. These routing policies are ...

متن کامل

Characterizing Reservation Management for Media Gateway Controller (Performance and Reliability)

In this paper, analysis and simulation of Media Gateway Controller (MEGACO) based COPS (Common Open Policy Server) which is a protocol defined in IETF (Internet Engineering Task Force) to transport configuration requests and deliver the policies is presented. For this scenario, three queuing models include M/M/1, M/M/c and M/D/c were applied . Then, some of the key performance benchmarks look l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003