skip to main content
10.1145/1095921.1095927acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
Article

Achieving sub-50 milliseconds recovery upon BGP peering link failures

Published:24 October 2005Publication History

ABSTRACT

We first show by measurements that BGP peering links fail as frequently as intradomain links and usually for short periods of time. We propose a new fast-reroute technique where routers are prepared to react quickly to interdomain link failures. For each of its interdomain links, each router precomputes a protection tunnel, i.e. an IP tunnel to an alternate nexthop which can reach the same destinations as via the protected link. We propose a BGP-based auto-discovery technique that allows each router to learn the candidate protection tunnels for its links. Each router selects the best protection tunnels for its links and when it detects an interdomain link failure, it immediately encapsulates the packets to send them through the protection tunnel. Our solution is applicable for the links between large transit ISPs and also for the links between multi-homed stub networks and their providers. Furthermore, we show that transient forwarding loops (and thus the corresponding packet losses) can be avoided during the routing convergence that follows the deactivation of a protection tunnel in BGP/MPLS VPNs and in IP networks using encapsulation.

References

  1. R. Bless, G. Lichtwald, M. Schmidt, and M. Zitterbart. Fast Scoped Rerouting for BGP. In International Conference on Networks, pages 25--30. IEEE, September 2003.]]Google ScholarGoogle Scholar
  2. S. Bryant and P. Pate. Pseudo Wire Emulation Edge-to-Edge (PWE3) Architecture. RFC3985, March 2005.]]Google ScholarGoogle Scholar
  3. J. Chandrashekar, Z. Duan, Z. Zhang, and J. Krasky. Limiting path exploration in BGP. In IEEE INFOCOM, Miami, Florida, March 2005.]]Google ScholarGoogle Scholar
  4. Cisco. Prefix and Tunnel Independent FRR. http://www.cisco.com/en/US/products/ps5763/prod_release_note09186a00803%3575a.html#wp98916, November 2004.]]Google ScholarGoogle Scholar
  5. S. De Cnodder and C. Pelsser. Protection for inter-AS MPLS tunnels, July 2004. Work in progress, draft-decnodder-ccamp-interas-protection-00.txt.]]Google ScholarGoogle Scholar
  6. B. Davie and Y. Rekhter. MPLS: technology and applications. Morgan Kaufmann, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. N. Feamster, D. Andersen, H. Balakrishnan, and M. Kaashoek. Measuring the effects of Internet path faults on reactive routing. In ACM SIGMETRICS, San Diego, CA (USA), June 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Feamster, Z. Mao, and J. Rexford. BorderGuard: Detecting Cold Potatoes from Peers. In ACM Internet Measurement Conference, Taormina, Italy, October 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Feldmann, O. Maennel, M. Mao, A. Berger, and B. Maggs. Locating internet routing instabilities. In ACM SIGCOMM2004, August 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Filsfils. IGP and BGP fast convergence. Networkers'2004, Cannes, France, December 2004.]]Google ScholarGoogle Scholar
  11. C. Filsfils and J Evans. Deploying Diffserv in IP/MPLS backbone networks for Tight SLA control. IEEE Internet Computing, 9(1):58--65, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. Francois and O. Bonaventure. Avoiding transient loops during IGP convergence in IP networks. In IEEE INFOCOM'2005, Miami, Florida, USA, March 2005.]]Google ScholarGoogle ScholarCross RefCross Ref
  13. P. Francois, C. Filsfils, J. Evans, and O. Bonaventure. Achieving sub-second IGP convergence in large IP networks. SIGCOMM Comput. Commun. Rev., 35(3):35--44, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Gao and J. Rexford. Stable internet routing without global coordination. In SIGMETRICS, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. Greene and P. Smith. Cisco ISP Essentials. Cisco Press, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. T. Griffin and B. Presmore. An experimental analysis of BGP convergence time. In ICNP 2001, pages 53--61. IEEE Computer Society, November 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Gross. Modern L2 VPNs: Implementing network convergence. Presentation at NANOG33, Feb 2005.]]Google ScholarGoogle Scholar
  18. K. Gummardi, H. Madhyastha, S. Gribble, H. Leby, and D. Wetherall. Improving the reliability of Internet paths with One-hop Source Routing. In USENIX OSDI'04, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. U. Hengartner, S. Moon, R. Mortier, and C. Diot. Detection and analysis of routing loops in packet traces. In Proceedings of the second ACM SIGCOMM Workshop on Internet measurment, pages 107--112. ACM Press, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. C. Honig, D. Katz, M. Mathis, Y. Rekhter, and J. Y. Yu. Application of the Border Gateway Protocol in the Internet. Request for Comments 1164, Internet Engineering Task Force, June 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. G. Iannaccone, C-N. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot. Analysis of link failures over an IP backbone. In ACM SIGCOMM Internet Measurement Workshop, Marseilles, France, November 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Katz and D. Ward. Bidirectional Forwarding Detection. Internet draft, draft-ietf-bfd-base-03.txt, work in progress, January 2005.]]Google ScholarGoogle Scholar
  23. J. Lau, M. Townsley, and I. Goyret. Layer two tunneling protocol - version 3 (L2TPv3). Internet draft, draft-ietf-l2tpext-l2tp-base-15.txt, work in progress, December 2004.]]Google ScholarGoogle Scholar
  24. A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C. Chuah, and C. Diot. Characterization of failures in an IP backbone. In IEEE Infocom2004, Hong Kong, March 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  25. D. Pei, M. Azuma, N. Nguyen, J. Chen, D. Massey, and L. Zhang. BGP-RCN: Improving BGP convergence through Root Cause Notification. Computer Networks, 48(2):175--194, June 2005. 2005.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. C. Reichert. IP-protection for fast inter-domain resilience. Presented at IDRWS'04, May 2004.]]Google ScholarGoogle Scholar
  27. Y. Rekhter. Constructing intra-AS path segments for an inter-AS path. SIGCOMM Comput. Commun. Rev., 21(1):44--57, 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Y. Rekhter and P. Gross. Application of the Border Gateway Protocol in the Internet. Request for Comments 1655, Internet Engineering Task Force, July 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. Rexford, J. Wang, Z. Xiao, and Y. Zhang. BGP routing stability of popular destinations. In Proc. Internet Measurement Workshop, November 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. E. Rosen and Y. Rekhter. BGP/MPLS VPNs. Internet RFC2547, March 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. C. Rossenhovel. 40-Gig Router Test Results. Light Reading, November 2004. Available from http://www.lightreading.com/document.asp?site=testing&doc_id=63606&page%_number=6.]]Google ScholarGoogle Scholar
  32. S. Sangli, D. Tappan, and Y. Rekhter. BGP extended communities attribute. Internet draft, draft-ietf-idr-bgp-ext-communities-07.txt, work in progress, April 2004.]]Google ScholarGoogle Scholar
  33. G. Schollmeier, J. Charzinski, A. Kirstodter, C. Reichert, K.J. Schrodi, Y. Glickman, and C. Winkler. Improving the resilience in IP networks. In IEEE HPSR2003, pages 91--96, Torino, Italy, June 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  34. M. Shand and S. Bryant. IP Fast Reroute Framework. Internet draft, draft-ietf-rtgwg-ipfrr-framework-03.txt, work in progress, June 2005.]]Google ScholarGoogle Scholar
  35. S. Uhlig, V. Magnin, O. Bonaventure, C. Rapier, and L. Deri. Implications of the topological properties of internet traffic on traffic engineering. In ACM Symposium on Applied Computing, March 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. J.-P. Vasseur, M. Pickavet, and P. Demeester. Network Recovery: Protection and Restoration of Optical, SONET-SDH, and MPLS. Morgan Kaufmann, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. D. Watson, F. Jahanian, and C. Labovitz. Experiences with monitoring OSPF on a regional service provider network. In Proceedings of the 23rd International Conference on Distributed Computing Systems, page 204. IEEE Computer Society, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. R. White, D. McPherson, and S. Sangli. Practical BGP. Addison Wesley, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. T. Worster, Y. Rekhter, and E. Rosen. Encapsulating MPLS in IP or Generic Routing Encapsulation (GRE). Internet draft, draft-ietf-mpls-in-ip-or-gre-08.txt, work in progress, June 2004.]]Google ScholarGoogle Scholar

Index Terms

  1. Achieving sub-50 milliseconds recovery upon BGP peering link failures

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CoNEXT '05: Proceedings of the 2005 ACM conference on Emerging network experiment and technology
          October 2005
          318 pages
          ISBN:159593197X
          DOI:10.1145/1095921

          Copyright © 2005 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 October 2005

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate198of789submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader