SlideShare une entreprise Scribd logo
1  sur  19
Scaling Service Provider Backbone
using BGP Confederations for
Next Generation Networks


      Tauqir Azam, Rishika Mehta, Ashish Tanwer
      Aricent Group, Gurgaon
Contents
 Abstract
 Introduction
 Service Provider Characteristics
 SP internal architecture
 IGP Route Propagation
 BGP Confederation
 MPLS Configuration
 Virtual Routers: VPN Routing and Forwarding (VRF)
 Identifying VPN routes: The Route Discriminator Attribute
 SP Hardware design
     For Cisco
     For Juniper
 Conclusion
 References
Abstract
   Our paper outlines the details of internal architecture of
    backbone network of Service Provider.
   The Service Provider provides high performance using latest
    extensions on BGP and MPLS & is scalable enough to handle
    large number of VPN customer sites.
   BGP Confederations, Route Targets (RTs) and Route
    Discriminators (RDs) approaches have been used to optimize
    the design.
   A sample CISCO and Juniper based deployment of the SP
    (both routing and switching) considering the support of latest
    protocols, security, power optimization and future extensibility.

Next-generation network implementation is based on Internet
  technologies including Internet Protocol (IP) and multiprotocol
  label switching (MPLS). --Wikipedia
Introduction
   Service Provider is an entity that provides a specific type of
    service to its customers like Internet, Application services (like
    Cloud), Network or backbone services (basically data services)
    and Telecommunication services (different communication
    services).

   Today, SP of every size and composition are active in the
    market. Every service provider wants to increase subscribers,
    services and ultimately, revenues.
   As a result, designing better service provider architecture and
    optimization of service provider architecture is highly
    demanding task.

   Service Provider architecture should be scalable to support
    future subscribers and future technologies (Next Generation
    protocols and services).
Service Provider Characteristics
The success of a service provider depends on
Performance
Reliability
Profitability
Security
Manageability
Consistency
Scalability
Logical Design of Service Provider
Service Provider Internal
    Network Architecture
   In our framework, exterior BGP (EBGP) is used to make connection
    between customer edge (CE) and provider edge (PE).
   The routers inside the service provider use interior BGP (IBGP) to
    connect each other. Interior Gateway Protocol (IGP) is used for
    internal route propagation.
   The configuration does not redistribute BGP into IGP because IGP
    performance and convergence time suffers if large number of routes
    are carried and no IGP is capable of carrying full Internet routing
    table (exceeds 110,000 routes).
   To control the route distribution, Route Target (RT) attribute has
    been used.
   The proposed service provider will provide different MPLS based
    virtual private network (VPNs) to customer sites.
   Our service provider emulates virtual routers (VR) on physical
    router at the software and hardware levels. These VRs have
    independent IP routing and forwarding tables and they are isolated
    from each other.
   BGP confederation enables to define private autonomous systems
    with in the public autonomous system
IGP Route Propagation
   OSPF protocol is responsible to carry route to only for BGP next
    hop.
   It provides optimal path to the next hop and converges to alternate
    path so that the BGP peering is maintained.
   the framework take cares that the internet routes and not mixed by
    the service provider internal routes carried by the OSPF.
   OSPF take use of its latest Traffic Engineering (TE) Extensions to
    OSPF, to manage bandwidth of different types of traffic.
BGP Confederation
   The routing protocol IBGP requires full mesh between all BGP-
    speaking routers. So a large number of connections and hence a large
    number of TCP sessions are needed to establish IBGP connectivity.
   The traditional service provider design may suffer from unnecessarily
    duplicated routing traffic. This problem is solved by using latest
    extension of BGP, BGP confederations.
   BGP confederation enables to define private autonomous
    systems with in the public autonomous system.
MPLS Configuration
   In our architecture, MPLS works in forwarding plane while MP-BGP is used as customer
    route distribution protocol.
   To provide VPN through MPLS two MPLS labels are used.
   The Label 1 (Top label) points to the egress router assigned through Label/Tag
    Distribution Protocol (LDP/TDP).
   The Label 2 identifies the outgoing interface on the egress router or a routing table
    where a routing lookup is performed.
   In MPLS networking, a Label Switched Path (LSP) is a path through an MPLS network,
    set up by a signalling protocol such as LDP, RSVP-TE, BGP (in the architecture).
   In our architecture, the forward equivalence call (FEC) of MPLS is equal to a VPN site
    descriptor or VPN routing table.
Virtual Routers: VPN Routing
 and Forwarding (VRF)
   To maintain security, it is necessary to constrain distribution of routing information at
    PE that has sites from multiple (disjoint) VPNs attached to it.
   The solution of problem is that PE must maintain multiple Forwarding Tables, one table
    per set of directly attached sites with common VPN membership e.g., one for all the
    directly attached sites that are in just one particular VPN.
   Routes receives from other PEs (via BGP) restricted to only the routes of the VPN(s)
    the site(s) is in via route filtering based on BGP Route Target (RT) Attribute.
Identifying VPN routes: The Route
Discriminator Attribute
   To maintain security, it is necessary to constrain distribution of routing information at
    PE that has sites from multiple (disjoint) VPNs attached to it.
   Route distinguisher is used to uniquely identify VPN routes in the SP core.
   Route distinguisher, is a 64-bit value defined uniquely for each user group.
   To ensure VPNv4 route uniqueness, the customer IPv4 routes are prepended with a
    uniquely defined RD to create a distinct VPNv4 prefix.
   Every VRF configuration requires an RD to be defined. Its uniqueness guarantees
    customer VPNv4 uniqueness.
MP-BGP/MPLS VPN
Configuration
Hardware Design
Hardware Design Using CISCO Products
   PE routers requires high-performance IP/MPLS features as well as scalable
    personalized IP services at the network edge, improve operational efficiency,
    and maximize return on network investments. Cisco 7600 series routers are
    ideal for the purpose.
   The Cisco 7600 Series is the carrier-class edge router to offer integrated,
    high-density Ethernet switching, carrier-class IP/MPLS routing, and 10-Gbps
    interfaces that enables service providers to deliver both consumer and
    business services over a single converged Carrier Ethernet network.
   The processing load on CE routers is much less than that on PE routers and
    our service provider uses economical Cisco 7200 series Router for the
    purpose.
   For Layer 2 switching, the switch selected must provide the planned network
    backbone capacity. Since the capacity of service provider depends on the
    capacity of core switches. Cisco Catalyst 6500 Series Switches are ideal for
    the purpose.
   Catalyst 6500 Series Switches deliver performance of 2 terabits per second
    (Tbps). The switch fabric delivers 80 Gbps switching capacity per slot and
    scales to 4 Tbps system capacity
Hardware Design Using JUNIPER Products
   PE routers requires high-performance IP/MPLS features as well as scalable personalized
    IP services at the network edge, improve operational efficiency, and maximize return
    on network investments. Juniper MX960 3D Universal Edge Router is ideal for the
    purpose.
   The MX900 3D Universal Edge Router is a high-density Layer 2 and Layer 3 Ethernet
    platform for service provider Ethernet edge scenarios. The MX960 provides a range of
    Ethernet services, Including VPLS services for multi-point connectivity.
   The processing load on CE routers is much less than that on PE routers and our
    service provider uses MX480 3D Universal Edge Router for the purpose. Juniper
    MX960 3D Universal Edge Router is ideal for the purpose.
   The MX900 3D Universal Edge Router is a high-density Layer 2 and Layer 3 Ethernet
    platform for service provider Ethernet edge scenarios.
   Switch that can efficiently scale performance and network services, virtualize, secure,
    and manage network remotely. Juniper EX 8200 Series Switches are ideal for the
    purpose.
   The EX82xx line of modular Ethernet switches is a family of high-performance, highly
    available platforms for use in high-density 10GbE (10-Gbps) data centers, campus
    aggregations and core networks.
Conclusion
   Our paper outlines the internal architecture, network configuration
    and hardware design of backbone network of high performance SP.
   The SP design configuration implements the latest extensions on
    BGP and MPLS and is scalable enough to handle large number of
    VPN customer sites.
   Route Reflectors (RRs) have been replaced by BGP Confederations.
   Route Targets (RTs) and Route Discriminators (RDs) approaches
    have been used to Control Route Distribution and to Identify VPN
    routes. SP H/W requirements and corresponding design
   The service provider design configuration implements the latest
    extensions on BGP and MPLS and is scalable enough to handle large
    number of VPN customer
   Sample CISCO and Juniper based deployment of the service
    provider (both routing and switching) has been proposed
    considering the support of latest protocols, security, power
    optimization and future extensibility.
   The presented generic SP design can be easily modified to provide
    typically any services that need high performance Next Generation
    backbone network.
[1]
     References
              Susan Hares et al., “A Border Gateway Protocol 4 (BGP-4)”, n.d., http://tools.ietf.org/html/rfc4271
[2]           Y. Rekhter and P. Gross, “Application of the Border Gateway Protocol in the Internet”, n.d.,
http://tools.ietf.org/html/rfc1772
[3]           Curtis Villamizar, Ramesh Govindan, and Ravi Chandra, “BGP Route Flap Damping”, n.d.,
http://tools.ietf.org/html/rfc2439
[4]           Tony Bates, Enke Chen, and Ravi Chandra, “BGP Route Reflection: An Alternative to Full Mesh Internal BGP
(IBGP)”, n.d., http://tools.ietf.org/html/rfc4456
[5]           Enke Chen and Quaizar Vohra, “BGP Support for Four-octet AS Number Space”, n.d.,
http://tools.ietf.org/html/rfc4893
[6]           Yakov Rekhter and Eric C Rosen, “BGP/MPLS VPNs”, n.d., http://tools.ietf.org/html/rfc2547
[7]           Dave Katz et al., “Multiprotocol Extensions for BGP-4”, n.d., http://tools.ietf.org/html/rfc4760
[8]           Enke      Chen       <enkechen@siara.com>,         “Route      Refresh    Capability      for    BGP-4”, n.d.,
http://tools.ietf.org/html/rfc2918
[9]           Yakov Rekhter and Eric C Rosen, “BGP/MPLS IP Virtual Private Networks (VPNs)”, n.d.,
http://tools.ietf.org/html/rfc4364
[10]          Yakov      Rekhter       <yakov@juniper.net>,       “Carrying    Label    Information       in   BGP-4”, n.d.,
http://tools.ietf.org/html/rfc3107
[11]          Lou Berger et al., “Extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for Point-to-
Multipoint TE Label Switched Paths (LSPs)”, n.d., http://tools.ietf.org/html/rfc4875
[12]          Yakov Rekhter and Rahul Aggarwal, “Graceful Restart Mechanism for BGP with MPLS”, n.d.,
http://tools.ietf.org/html/rfc4781
[13]          Eric Gray <egray@zaffire.com>, “LDP Applicability”, n.d., http://tools.ietf.org/html/rfc3037
[14]          Daniel O Awduche et al., “RSVP-TE: Extensions to RSVP for LSP Tunnels”, n.d.,
http://tools.ietf.org/html/rfc3209 ; Kireeti Kompella
[15]          Dave Katz, and Derek M Yeung, “Traffic Engineering (TE) Extensions to OSPF Version 2”, n.d.,
http://tools.ietf.org/html/rfc3630
[16]          J. Moy, “OSPF Version 2”, n.d., http://tools.ietf.org/html/rfc2328
[17]          R. Hinden, Ed., “Virtual Router Redundancy Protocol (VRRP)”, nd, http://tools.ietf.org/rfc/rfc3768
QUESTIONS

Contenu connexe

Tendances

Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnmmubashirkhan
 
Mobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSMobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSCisco Canada
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
 
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...Juniper Networks
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label SwitchingJay Patel
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)Vipin Sahu
 
BGP Protocol Makes the Internet Work
BGP Protocol Makes the Internet WorkBGP Protocol Makes the Internet Work
BGP Protocol Makes the Internet WorkIT Tech
 
3 deus leaflet wp3
3 deus leaflet wp33 deus leaflet wp3
3 deus leaflet wp3imec.archive
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering pptNitin Gehlot
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsVishal Sharma, Ph.D.
 

Tendances (18)

Unified MPLS
Unified MPLSUnified MPLS
Unified MPLS
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
 
Mpls concepts. Time to Certify
Mpls concepts. Time to CertifyMpls concepts. Time to Certify
Mpls concepts. Time to Certify
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
 
Mpls te
Mpls teMpls te
Mpls te
 
Mobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSMobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLS
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
BGP Protocol Makes the Internet Work
BGP Protocol Makes the Internet WorkBGP Protocol Makes the Internet Work
BGP Protocol Makes the Internet Work
 
3 deus leaflet wp3
3 deus leaflet wp33 deus leaflet wp3
3 deus leaflet wp3
 
10 fn s26
10 fn s2610 fn s26
10 fn s26
 
10 fn s43
10 fn s4310 fn s43
10 fn s43
 
10 fn s01
10 fn s0110 fn s01
10 fn s01
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
MPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) TechnologyMPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) Technology
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
 

Similaire à Cube2012 scaling service provider backbone using bgp confederations for next generation networks

Cube2012 high capacity service provider design using gpmls for ip next genera...
Cube2012 high capacity service provider design using gpmls for ip next genera...Cube2012 high capacity service provider design using gpmls for ip next genera...
Cube2012 high capacity service provider design using gpmls for ip next genera...Ashish Tanwer
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportJatin Singh
 
Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Cisco Service Provider
 
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET Journal
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business ModelsCisco Service Provider
 
routing Protocols and Virtual private network
routing Protocols and Virtual private networkrouting Protocols and Virtual private network
routing Protocols and Virtual private networkhayenas
 
PLNOG14: Evolved Programmable Network, architektura dla sieci operatorskich -...
PLNOG14: Evolved Programmable Network, architektura dla sieci operatorskich -...PLNOG14: Evolved Programmable Network, architektura dla sieci operatorskich -...
PLNOG14: Evolved Programmable Network, architektura dla sieci operatorskich -...PROIDEA
 
IRJET- Universal Network Setup for Advanced Communication
IRJET- Universal Network Setup for Advanced CommunicationIRJET- Universal Network Setup for Advanced Communication
IRJET- Universal Network Setup for Advanced CommunicationIRJET Journal
 
SANA Shamus-new CV
SANA Shamus-new CVSANA Shamus-new CV
SANA Shamus-new CVsana shamus
 
Eigrp and ospf comparison
Eigrp and ospf comparisonEigrp and ospf comparison
Eigrp and ospf comparisonDeepak Raj
 
4G EPC architecture by saurav sarker
4G EPC architecture by saurav sarker4G EPC architecture by saurav sarker
4G EPC architecture by saurav sarkerSaurav Sarker
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSVarinder Singh Walia
 

Similaire à Cube2012 scaling service provider backbone using bgp confederations for next generation networks (20)

Cube2012 high capacity service provider design using gpmls for ip next genera...
Cube2012 high capacity service provider design using gpmls for ip next genera...Cube2012 high capacity service provider design using gpmls for ip next genera...
Cube2012 high capacity service provider design using gpmls for ip next genera...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
 
Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...
 
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
 
routing Protocols and Virtual private network
routing Protocols and Virtual private networkrouting Protocols and Virtual private network
routing Protocols and Virtual private network
 
Vp ns
Vp nsVp ns
Vp ns
 
G010314853
G010314853G010314853
G010314853
 
PLNOG14: Evolved Programmable Network, architektura dla sieci operatorskich -...
PLNOG14: Evolved Programmable Network, architektura dla sieci operatorskich -...PLNOG14: Evolved Programmable Network, architektura dla sieci operatorskich -...
PLNOG14: Evolved Programmable Network, architektura dla sieci operatorskich -...
 
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
 
IRJET- Universal Network Setup for Advanced Communication
IRJET- Universal Network Setup for Advanced CommunicationIRJET- Universal Network Setup for Advanced Communication
IRJET- Universal Network Setup for Advanced Communication
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 
SANA Shamus-new CV
SANA Shamus-new CVSANA Shamus-new CV
SANA Shamus-new CV
 
Eigrp and ospf comparison
Eigrp and ospf comparisonEigrp and ospf comparison
Eigrp and ospf comparison
 
Resume_Mahendra
Resume_MahendraResume_Mahendra
Resume_Mahendra
 
MPLS
MPLSMPLS
MPLS
 
BGP-EDS Presentation
BGP-EDS  Presentation BGP-EDS  Presentation
BGP-EDS Presentation
 
4G EPC architecture by saurav sarker
4G EPC architecture by saurav sarker4G EPC architecture by saurav sarker
4G EPC architecture by saurav sarker
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
 

Dernier

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Cube2012 scaling service provider backbone using bgp confederations for next generation networks

  • 1. Scaling Service Provider Backbone using BGP Confederations for Next Generation Networks Tauqir Azam, Rishika Mehta, Ashish Tanwer Aricent Group, Gurgaon
  • 2. Contents  Abstract  Introduction  Service Provider Characteristics  SP internal architecture  IGP Route Propagation  BGP Confederation  MPLS Configuration  Virtual Routers: VPN Routing and Forwarding (VRF)  Identifying VPN routes: The Route Discriminator Attribute  SP Hardware design  For Cisco  For Juniper  Conclusion  References
  • 3. Abstract  Our paper outlines the details of internal architecture of backbone network of Service Provider.  The Service Provider provides high performance using latest extensions on BGP and MPLS & is scalable enough to handle large number of VPN customer sites.  BGP Confederations, Route Targets (RTs) and Route Discriminators (RDs) approaches have been used to optimize the design.  A sample CISCO and Juniper based deployment of the SP (both routing and switching) considering the support of latest protocols, security, power optimization and future extensibility. Next-generation network implementation is based on Internet technologies including Internet Protocol (IP) and multiprotocol label switching (MPLS). --Wikipedia
  • 4. Introduction  Service Provider is an entity that provides a specific type of service to its customers like Internet, Application services (like Cloud), Network or backbone services (basically data services) and Telecommunication services (different communication services).  Today, SP of every size and composition are active in the market. Every service provider wants to increase subscribers, services and ultimately, revenues.  As a result, designing better service provider architecture and optimization of service provider architecture is highly demanding task.  Service Provider architecture should be scalable to support future subscribers and future technologies (Next Generation protocols and services).
  • 5. Service Provider Characteristics The success of a service provider depends on Performance Reliability Profitability Security Manageability Consistency Scalability
  • 6. Logical Design of Service Provider
  • 7. Service Provider Internal Network Architecture  In our framework, exterior BGP (EBGP) is used to make connection between customer edge (CE) and provider edge (PE).  The routers inside the service provider use interior BGP (IBGP) to connect each other. Interior Gateway Protocol (IGP) is used for internal route propagation.  The configuration does not redistribute BGP into IGP because IGP performance and convergence time suffers if large number of routes are carried and no IGP is capable of carrying full Internet routing table (exceeds 110,000 routes).  To control the route distribution, Route Target (RT) attribute has been used.  The proposed service provider will provide different MPLS based virtual private network (VPNs) to customer sites.  Our service provider emulates virtual routers (VR) on physical router at the software and hardware levels. These VRs have independent IP routing and forwarding tables and they are isolated from each other.  BGP confederation enables to define private autonomous systems with in the public autonomous system
  • 8. IGP Route Propagation  OSPF protocol is responsible to carry route to only for BGP next hop.  It provides optimal path to the next hop and converges to alternate path so that the BGP peering is maintained.  the framework take cares that the internet routes and not mixed by the service provider internal routes carried by the OSPF.  OSPF take use of its latest Traffic Engineering (TE) Extensions to OSPF, to manage bandwidth of different types of traffic.
  • 9. BGP Confederation  The routing protocol IBGP requires full mesh between all BGP- speaking routers. So a large number of connections and hence a large number of TCP sessions are needed to establish IBGP connectivity.  The traditional service provider design may suffer from unnecessarily duplicated routing traffic. This problem is solved by using latest extension of BGP, BGP confederations.  BGP confederation enables to define private autonomous systems with in the public autonomous system.
  • 10. MPLS Configuration  In our architecture, MPLS works in forwarding plane while MP-BGP is used as customer route distribution protocol.  To provide VPN through MPLS two MPLS labels are used.  The Label 1 (Top label) points to the egress router assigned through Label/Tag Distribution Protocol (LDP/TDP).  The Label 2 identifies the outgoing interface on the egress router or a routing table where a routing lookup is performed.  In MPLS networking, a Label Switched Path (LSP) is a path through an MPLS network, set up by a signalling protocol such as LDP, RSVP-TE, BGP (in the architecture).  In our architecture, the forward equivalence call (FEC) of MPLS is equal to a VPN site descriptor or VPN routing table.
  • 11. Virtual Routers: VPN Routing and Forwarding (VRF)  To maintain security, it is necessary to constrain distribution of routing information at PE that has sites from multiple (disjoint) VPNs attached to it.  The solution of problem is that PE must maintain multiple Forwarding Tables, one table per set of directly attached sites with common VPN membership e.g., one for all the directly attached sites that are in just one particular VPN.  Routes receives from other PEs (via BGP) restricted to only the routes of the VPN(s) the site(s) is in via route filtering based on BGP Route Target (RT) Attribute.
  • 12. Identifying VPN routes: The Route Discriminator Attribute  To maintain security, it is necessary to constrain distribution of routing information at PE that has sites from multiple (disjoint) VPNs attached to it.  Route distinguisher is used to uniquely identify VPN routes in the SP core.  Route distinguisher, is a 64-bit value defined uniquely for each user group.  To ensure VPNv4 route uniqueness, the customer IPv4 routes are prepended with a uniquely defined RD to create a distinct VPNv4 prefix.  Every VRF configuration requires an RD to be defined. Its uniqueness guarantees customer VPNv4 uniqueness.
  • 15. Hardware Design Using CISCO Products  PE routers requires high-performance IP/MPLS features as well as scalable personalized IP services at the network edge, improve operational efficiency, and maximize return on network investments. Cisco 7600 series routers are ideal for the purpose.  The Cisco 7600 Series is the carrier-class edge router to offer integrated, high-density Ethernet switching, carrier-class IP/MPLS routing, and 10-Gbps interfaces that enables service providers to deliver both consumer and business services over a single converged Carrier Ethernet network.  The processing load on CE routers is much less than that on PE routers and our service provider uses economical Cisco 7200 series Router for the purpose.  For Layer 2 switching, the switch selected must provide the planned network backbone capacity. Since the capacity of service provider depends on the capacity of core switches. Cisco Catalyst 6500 Series Switches are ideal for the purpose.  Catalyst 6500 Series Switches deliver performance of 2 terabits per second (Tbps). The switch fabric delivers 80 Gbps switching capacity per slot and scales to 4 Tbps system capacity
  • 16. Hardware Design Using JUNIPER Products  PE routers requires high-performance IP/MPLS features as well as scalable personalized IP services at the network edge, improve operational efficiency, and maximize return on network investments. Juniper MX960 3D Universal Edge Router is ideal for the purpose.  The MX900 3D Universal Edge Router is a high-density Layer 2 and Layer 3 Ethernet platform for service provider Ethernet edge scenarios. The MX960 provides a range of Ethernet services, Including VPLS services for multi-point connectivity.  The processing load on CE routers is much less than that on PE routers and our service provider uses MX480 3D Universal Edge Router for the purpose. Juniper MX960 3D Universal Edge Router is ideal for the purpose.  The MX900 3D Universal Edge Router is a high-density Layer 2 and Layer 3 Ethernet platform for service provider Ethernet edge scenarios.  Switch that can efficiently scale performance and network services, virtualize, secure, and manage network remotely. Juniper EX 8200 Series Switches are ideal for the purpose.  The EX82xx line of modular Ethernet switches is a family of high-performance, highly available platforms for use in high-density 10GbE (10-Gbps) data centers, campus aggregations and core networks.
  • 17. Conclusion  Our paper outlines the internal architecture, network configuration and hardware design of backbone network of high performance SP.  The SP design configuration implements the latest extensions on BGP and MPLS and is scalable enough to handle large number of VPN customer sites.  Route Reflectors (RRs) have been replaced by BGP Confederations.  Route Targets (RTs) and Route Discriminators (RDs) approaches have been used to Control Route Distribution and to Identify VPN routes. SP H/W requirements and corresponding design  The service provider design configuration implements the latest extensions on BGP and MPLS and is scalable enough to handle large number of VPN customer  Sample CISCO and Juniper based deployment of the service provider (both routing and switching) has been proposed considering the support of latest protocols, security, power optimization and future extensibility.  The presented generic SP design can be easily modified to provide typically any services that need high performance Next Generation backbone network.
  • 18. [1] References Susan Hares et al., “A Border Gateway Protocol 4 (BGP-4)”, n.d., http://tools.ietf.org/html/rfc4271 [2] Y. Rekhter and P. Gross, “Application of the Border Gateway Protocol in the Internet”, n.d., http://tools.ietf.org/html/rfc1772 [3] Curtis Villamizar, Ramesh Govindan, and Ravi Chandra, “BGP Route Flap Damping”, n.d., http://tools.ietf.org/html/rfc2439 [4] Tony Bates, Enke Chen, and Ravi Chandra, “BGP Route Reflection: An Alternative to Full Mesh Internal BGP (IBGP)”, n.d., http://tools.ietf.org/html/rfc4456 [5] Enke Chen and Quaizar Vohra, “BGP Support for Four-octet AS Number Space”, n.d., http://tools.ietf.org/html/rfc4893 [6] Yakov Rekhter and Eric C Rosen, “BGP/MPLS VPNs”, n.d., http://tools.ietf.org/html/rfc2547 [7] Dave Katz et al., “Multiprotocol Extensions for BGP-4”, n.d., http://tools.ietf.org/html/rfc4760 [8] Enke Chen <enkechen@siara.com>, “Route Refresh Capability for BGP-4”, n.d., http://tools.ietf.org/html/rfc2918 [9] Yakov Rekhter and Eric C Rosen, “BGP/MPLS IP Virtual Private Networks (VPNs)”, n.d., http://tools.ietf.org/html/rfc4364 [10] Yakov Rekhter <yakov@juniper.net>, “Carrying Label Information in BGP-4”, n.d., http://tools.ietf.org/html/rfc3107 [11] Lou Berger et al., “Extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for Point-to- Multipoint TE Label Switched Paths (LSPs)”, n.d., http://tools.ietf.org/html/rfc4875 [12] Yakov Rekhter and Rahul Aggarwal, “Graceful Restart Mechanism for BGP with MPLS”, n.d., http://tools.ietf.org/html/rfc4781 [13] Eric Gray <egray@zaffire.com>, “LDP Applicability”, n.d., http://tools.ietf.org/html/rfc3037 [14] Daniel O Awduche et al., “RSVP-TE: Extensions to RSVP for LSP Tunnels”, n.d., http://tools.ietf.org/html/rfc3209 ; Kireeti Kompella [15] Dave Katz, and Derek M Yeung, “Traffic Engineering (TE) Extensions to OSPF Version 2”, n.d., http://tools.ietf.org/html/rfc3630 [16] J. Moy, “OSPF Version 2”, n.d., http://tools.ietf.org/html/rfc2328 [17] R. Hinden, Ed., “Virtual Router Redundancy Protocol (VRRP)”, nd, http://tools.ietf.org/rfc/rfc3768