BGP Behavior through Analysis of Prefix Beacons

نویسندگان

  • Matthew Guidry
  • Yashas Shankar
چکیده

We are analyzing BGP beacons which are announced and withdrawn, usually within two hour intervals. These announcements and more particularly the withdraws have an effect on neighboring prefixes and down the line to their neighbors as well. We are conducting analysis on the number of updates that are propagated as a result of these events. We then look at the number of updates which could have been eliminated if route flap damping had been installed on the routers. We also analyze the relative convergence period associated with each beacon event and how it is correlated to the number of update messages collected by RouteViews[4]. I. WHAT IS A BGP BEACON The Border Gateway Protocol (BGP) is the central agent used to conduct data through the internet. A large group of networks put together have a gateway router which communicates to the internet at large. All data packets which are not meant for the immediate network go through this gateway router into the global internet through this router. This router has a prefix which is associated with it and this is how other networks identify it. Once a packet leaves your local prefix and enters the BGP it can take a number of different paths specified at each router to reach its destination. A number of previous analytical and measurement studies have shown the existence of BGP path exploration and a slow convergence in the operational Internet routing system, which can potentially lead to sever performance problems in data delivery. [1] This path exploration suggests that some BGP routers, in response to a path failure, may try a number of transient paths before settling and declaring a new best path or declaring a destination unreachable. This may cause the entire network to take a long time to settle and converge to the final decision, which causes slow routing convergence. An example of a failed path and resulting path exploration is depicted in figure 1. Figure 1: Failed Path and Resulting Path

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BGP routing: a study at large time scale

In this paper, we conduct a longterm analysis of BGP routing properties such as path stability. Our work complements previous studies that examine the BGP routing behavior at smaller time scales such as its convergence to a routing update. We focus on properties that would reflect the BGP evolution due to growth, policy, and business reasons. We use daily snapshots of a number of BGP tables and...

متن کامل

Securing BGP Through Existing Infrastructure and Contractual Chains (CCBGP)

This paper proposes a novel approach that draws upon the existing architecture and contractual relationships and compares the approach to the main existing techniques for securing BGP against prefix hijacking. We define prefix hijacking as usurping control of IP prefixes through the manipulation of BGP routing tables resulting in a redirection of network traffic away from a correct route to a p...

متن کامل

TR-2010005: Securing BGP through Existing Infrastructure and Contractual Chains (CCBGP)

This paper proposes a novel approach that draws upon the existing architecture and contractual relationships and compares the approach to the main existing techniques for securing BGP against prefix hijacking. We define prefix hijacking as usurping control of IP prefixes through the manipulation of BGP routing tables resulting in a redirection of network traffic away from a correct route to a p...

متن کامل

Hi-BGP: A Lightweight Hijack-proof Inter-domain Routing Protocol

BGP is the cornerstone of the Internet. However, the implicit trust assumption in BGP’s design destines its inherited vulnerability. Prefix hijacking is one of the large-scale BGPspecific routing anomalies that are able to paralyze the Internet. This calls for a hijack-proof security solution. By putting the protection against prefix hijacking the top priority, we design a lightweight hijack-pr...

متن کامل

Towards Near Real-Time BGP Deep Analysis: A Big-Data Approach

BGP (Border Gateway Protocol) serves as the primary routing protocol for the Internet, enabling Autonomous Systems (individual network operators) to exchange network reachability information. Alongside significant on-going research and development efforts, there is a practical need to understand the nature of events that occur on the Internet. Network operators are acutely aware of security-rel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009