^ Top

NANOG Meeting Presentation Abstract

Network-Wide Inter-Domain Routing Policies: Design and Realization
Meeting: NANOG34
Date / Time: 2005-05-17 10:35am - 11:05am
Room: Grand Ballroom II-III<BR>Grand Level
Presenters: Speakers:
Olaf Maennel, Technical University Munich.

Anja Feldmann, Technical University Munich

Anja Feldmann is currently a professor of network architectures in the Computer Science department at the Technische Universitaet Muenchen, Germany. From 2000 to 2002 she was a professor of computer networking at Saarland University, Germany. Before that (1995 to 1999), Anja was a member of the Networking and Distributed Systems Center at AT&T Labs -- Research in Florham Park, New Jersey. Her current research interests include Internet measurement, traffic engineering and traffic characterization, network performance debugging, and intrusion detection. She received an M.S. degree in Computer Science from the University of Paderborn, Paderborn, Germany, in 1990, and M.S. and Ph.D. degrees in Computer Science from Carnegie Mellon University in Pittsburgh, USA, in 1991 and 1995, respectively.
Christian Reiser, Technical University Munich.
Ruediger Volk, Deutsche Telekom.
Hagen Boehm, Deutsche Telekom.
Abstract: Currently the inter-domain routing policy of an autonomous system is often ill-specified, undergoes constant adjustments for reasons of traffic engineering and/or to address-specific customer wishes, and is often realized by manually configuring each router individually, an error-prone approach. This talk discusses a system that raises the abstraction level at which routing policies are specified from individual BGP statements to a network-wide routing policy.



Our system enables an autonomous system to:

  1. explicitly specify its inter-domain network-wide routing policy as first class entities, an extensible collection of individual policies and services such as a peering-policy, a filter-martians-policy, a signaled black-hole service, etc.;



  2. specify its routing policy independently of the current state of the network;



  3. automatically generate the appropriate pieces of the router configurations for all routers, including various vendors, in the network from appropriate databases;



  4. automatically generate a documentation of the current active routing policy in RPSL;



  5. enable customers of the AS to apply changes to the route-sets they announce without any explicit human-to-human interaction.




We are now able to manage the overall routing architecture rather than each individual router. Initial deployment of the system to manage the network-wide routing policy of Deutsche Telekom affirms the above advantages in an operational setting.
Files: pdfAnja Feldmann Presentation(PDF)
youtubeNetwork-Wide Inter-Domain Routing Policies: Design and Realization
Sponsors: None.

Back to NANOG34 agenda.

NANOG34 Abstracts

  • BGP Analysis Tools
    Speakers:
    Lixia ZhangUCLA; .
    Mohit LadUCLA; .
    Dan MasseyColorado State University; .
    Manish KarirMerit Network; .
  • BGP Analysis Tools
    Speakers:
    Lixia ZhangUCLA; .
    Mohit LadUCLA; .
    Dan MasseyColorado State University; .
    Manish KarirMerit Network; .
  • BGP Analysis Tools
    Speakers:
    Lixia ZhangUCLA; .
    Mohit LadUCLA; .
    Dan MasseyColorado State University; .
    Manish KarirMerit Network; .
  • BGP Analysis Tools
    Speakers:
    Lixia ZhangUCLA; .
    Mohit LadUCLA; .
    Dan MasseyColorado State University; .
    Manish KarirMerit Network; .
  • Panel: XSP Security Vulnerabilities Panel
    Moderators:
    Martin HanniganVersign; .
    Panelists:
    Patrick GilmoreAkamai Technologies; .
    Aaron HughesTerremark/NOTA; .
    Chris MalayterTDS Telecom; .
    Chris MorrowUUNET; .
    Richard SteenbergennLayer Communications; .
  • Panel: XSP Security Vulnerabilities Panel
    Moderators:
    Martin HanniganVersign; .
    Panelists:
    Patrick GilmoreAkamai Technologies; .
    Aaron HughesTerremark/NOTA; .
    Chris MalayterTDS Telecom; .
    Chris MorrowUUNET; .
    Richard SteenbergennLayer Communications; .
  • Panel: XSP Security Vulnerabilities Panel
    Moderators:
    Martin HanniganVersign; .
    Panelists:
    Patrick GilmoreAkamai Technologies; .
    Aaron HughesTerremark/NOTA; .
    Chris MalayterTDS Telecom; .
    Chris MorrowUUNET; .
    Richard SteenbergennLayer Communications; .
  • Panel: XSP Security Vulnerabilities Panel
    Moderators:
    Martin HanniganVersign; .
    Panelists:
    Patrick GilmoreAkamai Technologies; .
    Aaron HughesTerremark/NOTA; .
    Chris MalayterTDS Telecom; .
    Chris MorrowUUNET; .
    Richard SteenbergennLayer Communications; .
  • Panel: XSP Security Vulnerabilities Panel
    Moderators:
    Martin HanniganVersign; .
    Panelists:
    Patrick GilmoreAkamai Technologies; .
    Aaron HughesTerremark/NOTA; .
    Chris MalayterTDS Telecom; .
    Chris MorrowUUNET; .
    Richard SteenbergennLayer Communications; .
  • Panel: XSP Security Vulnerabilities Panel
    Moderators:
    Martin HanniganVersign; .
    Panelists:
    Patrick GilmoreAkamai Technologies; .
    Aaron HughesTerremark/NOTA; .
    Chris MalayterTDS Telecom; .
    Chris MorrowUUNET; .
    Richard SteenbergennLayer Communications; .
  • Community Meeting III
    Speakers:
    Betty BurkeMerit Network; .
    Marcia MardisMerit Network; .
    Steve FeldmanCNET; .
    Martin HanniganVeriSign; .
  • Community Meeting III
    Speakers:
    Betty BurkeMerit Network; .
    Marcia MardisMerit Network; .
    Steve FeldmanCNET; .
    Martin HanniganVeriSign; .
  • Community Meeting III
    Speakers:
    Betty BurkeMerit Network; .
    Marcia MardisMerit Network; .
    Steve FeldmanCNET; .
    Martin HanniganVeriSign; .
  • Community Meeting III
    Speakers:
    Betty BurkeMerit Network; .
    Marcia MardisMerit Network; .
    Steve FeldmanCNET; .
    Martin HanniganVeriSign; .

 

^ Back to Top