Internet routing: More complex than you think

Network Administration - In this article we will give an in-depth analysis of Internet routing .

Since the Internet was born decades ago, there was a need for routing traffic from one computer to another and from one network to another. As the Internet grows, this routing problem is becoming more and more complicated. Today there are many protocols for routing traffic, such as the Border Gateway Protocol and Open Shortest Path First. Border Gateway Protocol is the protocol that most Internet users do not work directly with, but this hybrid protocol is necessary for Internet operation and is an important part of redundancy. In this article, we will use the Border Gateway Protocol to convey complex issues that most people don't know, or at least don't think about.

Platform of Border Gateway Protocol (BGP )

The Internet is made up of thousands of different networks. These networks are grouped together in neighborhoods called Autonomous Systems (ASes), each of which has tens of thousands of connected computers. When a computer in an autonomous network needs to send data packets to a computer within another autonomous system, this packet needs to find its way through other autonomous regions to reach the desired autonomous region. The process of packets transmitted through these autonomous regions is called routing. The protocol for implementing this routing is called the Border Gateway Protocol (BGP), see Figure 1 below to see the basics of routing between two logical autonomous regions. This Border Gateway Protocol (BGP) protocol is different from other routing protocols, such as Open Shortest Path First (OSPF), which is used for medium or large sized corporate networks. However, this OSPF protocol cannot respond to wide area networks like BGP. BGP is not restricted in routing packets between autonomous systems and can be useful for very large enterprise networks.

Internet routing: More complex than you think Picture 1
Figure 1: BGP routing between autonomous systems (AS)

BGP is often referred to as an External BGP (EBGP) when used to route packets between AS and Internal BGP (IBGP) when used inside an AS. As we mentioned, IBGP is very useful for very large enterprise networks. One reason network administrators choose to implement IBGP on their network is to take advantage of BGP's multi-home mechanism, which can improve redundancy for networks with multiple access points.

Performance issues

When large networks implement BGP, they all have to connect to each other in a full-mesh fashion, which is the type of network where each router needs to communicate with other routers in both directions. This may weigh down on the router's memory requirements. It is not necessary that it also contributes to increased network traffic. However, we have techniques that can overcome some of the problems encountered when extending the system.

One problem that the Internet had to solve a few years ago was the exponential growth of routing tables. This problem has been solved (but still quite large) with the appearance of Classless Inter-Domain Routing (CIDR). The larger the routing table, the more time it will take during the upgrade process and ultimately affect network performance. This problem also contributes to reducing CPU performance and also leads to slow routing time.

One technique that a network designer can use is called alliances. For alliances, a large enterprise network can be broken down into multiple logical ASs, each with a full-mesh connection, then routed between ASs. Basically, an enterprise network will be like a miniature Internet.

A network implementing IBGP can also implement the Router Reflecting (RR) design. In this design, a router will act as a central point as a router reflection server and other routers become reflective clients. This way significantly reduces the number of sessions each router needs to maintain and can significantly increase router performance. However, this design can lead to a reduction in routing optimization. Indeed there must always be a bid here that you have to choose to be reasonable.

Another performance issue that network designers need to consider is route flapping. Figure 2 below shows an example of route flapping. Within any large network, all BGP routing tables must be upgraded regularly because the links can crash at any time. However, for specific routers, this type of action will not be performed regularly. Sometimes routers may be misconfigured; and this often results in repeated and repeated cycles. It will then lead to redundant action with all of the routers on that peer. When a router is online, whether for the first time or after a short downtime, a re-declaration is required for other peer routers. This can lead to an effect on CPU performance in a short amount of time (several seconds). This action is called route flapping. To overcome the route flapping phenomenon, we need to have many BGP implementations to reduce the route flapping phenomenon (route flap damping).

Route flap damping is a process that attempts to limit the negative effects of route flapping. When using this technique, the system will ignore repetitive statements (when a router works again) for longer periods of time. Previously, route flap damping was seen as an effective method for reducing route flapping. But there are many problems that hinder the optimization of network performance. Many network experts still argue about route flap damping. To be safe, if you are a network administrator, it is best to manage your router effectively from the beginning!

Internet routing: More complex than you think Picture 2

Figure 2: The effect of route flapping

Architecture of routers

What makes these routers perform better to connect without route flap damping techniques? There are many obvious reasons here. First, router CPUs are getting more and more efficient like desktop CPUs. Second, the bus speed is also significantly improved. Another major change that has contributed to increased router performance has been the architectural changes that have taken place over the past few years. In particular, changes occurring in the routing table are upgraded by router processors on interface cards. Interface card processors also manage routing. The CPU manages the operating system and many other management tasks are performed by the administrator. This decentralization has significantly improved the overall performance for network routing performance.

As you can see, there are many factors that affect routing problems for large networks. These are the first suggestive thoughts about the protocol design phase, followed by the router design phase (hardware, software design and even router's overall architecture), and even far away. moreover, the network design phase, where designers and administrators use the tools available to them in the protocol and on the routers themselves to optimize routing for their networks. Please follow the following sections of this series.

4 ★ | 2 Vote

May be interested

  • Are complex passwords 'out of date'?Are complex passwords 'out of date'?
    complex passwords that use a combination of characters and change them frequently are no longer the best password management practice.
  • Routing and filtering network traffic - Part 2: Windows FirewallRouting and filtering network traffic - Part 2: Windows Firewall
    windows firewall is enabled by default. any program or service that needs to be communicated on a network must be authorized by a firewall.
  • Learn about 3D InternetLearn about 3D Internet
    3d internet or 3d internet is the successor of 2d web, using 3d graphics and social character. 3d internet has the ability to show how many more people you are reading your document.
  • What is Bach Hop? Other meanings of companionsWhat is Bach Hop?  Other meanings of companions
    in the article below, network administrator will give you an idea of ​​what it means. please read along.
  • How to Uninstall G Data InternetSecurity 2012How to Uninstall G Data InternetSecurity 2012
    do you want to change or uninstall g data internetsecurity 2012 for its newly released 2013 version of it and/or another more complex security suite like the kaspersky internet security 2013, norton internet security 2013 or avg internet...
  • How has the Internet evolved?How has the Internet evolved?
    this article brings us back in time to return to the early days of the internet, to learn the important milestones of the internet from 1960 to today.
  • 2/3 access on the Internet ... not human2/3 access on the Internet ... not human
    there are millions and even billions of people accessing the internet every day, from online utility services, social networks and online games that have become an indispensable part for any modern internet user. . however, it seems that not all internet access is made by ... people.
  • Learn about Border Gateway Protocol (BGP)Learn about Border Gateway Protocol (BGP)
    border gateway protocol (bgp) is used to exchange routing information for the internet and is the protocol used between isps (which are different ass).
  • To secure your ADSL modemTo secure your ADSL modem
    because hackers can control internet-connected devices on computers, users need to set passwords very complex and change often. in addition, it is necessary to reconfigure fpt, vdc, viettel modems in the following way.
  • What is Viettel Sim Internet? Offers of Viettel Internet simWhat is Viettel Sim Internet?  Offers of Viettel Internet sim
    viettel internet sim appeared on the market is also quite long and has been bought by many users, but now many people still do not know what sim internet viettel is what kind of simulations it has. therefore, the following article will help you answer all concerns about this new viettel sim with many unexpected utilities.