SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
4byte ASNs Test Scenarios

      - 8th TWNIC OPM
       2007/7/5, Taipei




                           許至凱
                 支援群 工程處 通訊網路部
                          kae@du.net.tw
Agenda
    http://www.seed.net.tw



                              4 bytes AS number overview
                              BGP capability in 4 bytes AS number
                              BGP attribute update
                              New BGP attribute
                              Testing scenarios
                              Reference




2
4 bytes AS number overview
    http://www.seed.net.tw



                              Original ASN encoded
                                2 bytes
                                ASN pool: 0 ~ 65535
                              ASN expansion
                                4 bytes
                                ASN pool: 0 ~ 4294967295
                                  M:N
                                     M: 0 ~ 65535
                                     N: 0 ~ 65535

                              2 bytes map to 4 bytes
                                0.0 ~ 0.65535
3
BGP capability in 4 bytes AS number
    http://www.seed.net.tw



                              BGP Capability Advertisements
                                 RFC2842
                                 Capabilities Optional Parameter




                                 BGP router supported 4 bytes ASN
                                   Capability code: 65
                                   Capability Length: 4

4
BGP attribute update
    http://www.seed.net.tw



                              AS_PATH attribute update
                                Original:
                                   AS carried in this attribute is encoded as a 2
                                   byte ASN
                                New:
                                   AS carried in this attribute is encoded as a 4
                                   byte ASN




5
BGP attribute update
    http://www.seed.net.tw



                              AS_AGGREGATOR attribute update
                                Original:
                                   AS carried in this attribute is encoded as a 2
                                   byte ASN
                                New:
                                   AS carried in this attribute is encoded as a 4
                                   byte ASN




6
New BGP attribute
    http://www.seed.net.tw



                              AS4_PATH
                                Optional transitive attribute
                                  AS_PATH is “well-known mandatory” attribute
                                AS4_PATH semantics:




                                AS carried in this attribute is encoded as a 4
                                bytes entity

7
New BGP attribute
    http://www.seed.net.tw



                              AS4_AGGREGATOR
                                Optional transitive attribute
                                  AS_AGGREGATOR is “optional transitive”
                                  attribute
                                AS4_AGGREGATOR semantics:




                                AS carried in this attribute is encoded as a 4
                                bytes entity
8
Testing scenarios
    http://www.seed.net.tw



                              NEW AS_PATH testing
                                 Peering with 4 bytes ASN is mappable to 2
                                 bytes ASN



                                      0.65000             0.65001

                                 Peering with 4 bytes ASN is NOT mappable to
                                 2 bytes ASN



                                      0.65000             2.65001
9
Testing scenarios
     http://www.seed.net.tw



                               AS4_PATH testing
                                  Peering with 4 bytes ASN is mappable to 2
                                  bytes ASN



                                       65000               0.65001

                                  Peering with 4 bytes ASN is NOT mappable to
                                  2 bytes ASN



                                       65000               2.65001
10
Testing scenarios
     http://www.seed.net.tw



                               AS4_PATH testing
                                  2 bytes ASN travel through 4 bytes ASN




                               65000              0.65001             65002




                               65000              2.65001             65002



11
Testing scenarios
     http://www.seed.net.tw



                               AS4_PATH testing
                                   4 bytes ASN travel through 2 bytes ASN




                               0.65000             65001              0.65002




                               2.65000             65001              2.65002



12
Testing scenarios
     http://www.seed.net.tw



                               NEW AS_AGGREGATOR testing



                                                    0.65002


                                0.65000   0.65001

                                                    0.65003




13
Testing scenarios
     http://www.seed.net.tw



                               AS4_AGGREGATOR testing
                                  2 bytes ASN is aggregated via 4 bytes ASN



                                                      65002


                                 65000      2.65001

                                                      65003




14
Testing scenarios
     http://www.seed.net.tw



                               AS4_AGGREGATOR testing
                                  4 bytes ASN is aggregated via 2 bytes ASN



                                                     2.65002


                                0.65000      65001

                                                     2.65003




15
Reference
     http://www.seed.net.tw



                               RFC1771
                                 Y. Rekhter, T. Li, “A Border Gateway Protocol
                                 4 (BGP-4)”, March 1995.
                               RFC4893
                                 Q. Vohra, E. Chen, quot;BGP Support for Four-
                                 octet AS Number Spacequot;, May 2007.
                               BGP support for 4-Byte AS Numbers -
                               Implementation Survey Report
                                 Geoff Huston, Asia Pacific Network
                                 Information Centre

16
Questions & Comments?




    sees your needs

Weitere ähnliche Inhalte

Andere mochten auch

Rawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web ComponentsRawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web ComponentsRawnet
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7Rawnet
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internetpagetron
 
FEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic IntroductionFEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic IntroductionKae Hsu
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS IntroductionKae Hsu
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop materialKae Hsu
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer LillJennifer Lill
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksMichael Stumpf
 
Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.Rawnet
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFVKae Hsu
 
CDN and ISP Operation
CDN and ISP OperationCDN and ISP Operation
CDN and ISP OperationKae Hsu
 
Network Design in Cloud-ready IDC
Network Design in Cloud-ready IDCNetwork Design in Cloud-ready IDC
Network Design in Cloud-ready IDCKae Hsu
 
How Internet Works
How Internet WorksHow Internet Works
How Internet WorksKae Hsu
 
Redundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointRedundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointKae Hsu
 
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' reviewRawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' reviewRawnet
 
Multimedia- How Internet Works
Multimedia- How Internet WorksMultimedia- How Internet Works
Multimedia- How Internet Workssambhenilesh
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingRozitarmizi Mohammad
 

Andere mochten auch (17)

Rawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web ComponentsRawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web Components
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internet
 
FEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic IntroductionFEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic Introduction
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS Introduction
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop material
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer Lill
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networks
 
Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.Rawnet Lightning Talk - Anyone Can Draw.
Rawnet Lightning Talk - Anyone Can Draw.
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV
 
CDN and ISP Operation
CDN and ISP OperationCDN and ISP Operation
CDN and ISP Operation
 
Network Design in Cloud-ready IDC
Network Design in Cloud-ready IDCNetwork Design in Cloud-ready IDC
Network Design in Cloud-ready IDC
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Redundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointRedundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpoint
 
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' reviewRawnet Lightning talk - 'Thinking, Fast and Slow' review
Rawnet Lightning talk - 'Thinking, Fast and Slow' review
 
Multimedia- How Internet Works
Multimedia- How Internet WorksMultimedia- How Internet Works
Multimedia- How Internet Works
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 

Mehr von Kae Hsu

FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionKae Hsu
 
TWNIC 13th OPM session
TWNIC 13th OPM sessionTWNIC 13th OPM session
TWNIC 13th OPM sessionKae Hsu
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingKae Hsu
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingKae Hsu
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingKae Hsu
 

Mehr von Kae Hsu (6)

FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
TWNIC 13th OPM session
TWNIC 13th OPM sessionTWNIC 13th OPM session
TWNIC 13th OPM session
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 
r2
r2r2
r2
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 
Suggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharingSuggestions for end users to deploy multihoming, load-balance and load-sharing
Suggestions for end users to deploy multihoming, load-balance and load-sharing
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

4 Byte As Ns Test Scenarios

  • 1. 4byte ASNs Test Scenarios - 8th TWNIC OPM 2007/7/5, Taipei 許至凱 支援群 工程處 通訊網路部 kae@du.net.tw
  • 2. Agenda http://www.seed.net.tw 4 bytes AS number overview BGP capability in 4 bytes AS number BGP attribute update New BGP attribute Testing scenarios Reference 2
  • 3. 4 bytes AS number overview http://www.seed.net.tw Original ASN encoded 2 bytes ASN pool: 0 ~ 65535 ASN expansion 4 bytes ASN pool: 0 ~ 4294967295 M:N M: 0 ~ 65535 N: 0 ~ 65535 2 bytes map to 4 bytes 0.0 ~ 0.65535 3
  • 4. BGP capability in 4 bytes AS number http://www.seed.net.tw BGP Capability Advertisements RFC2842 Capabilities Optional Parameter BGP router supported 4 bytes ASN Capability code: 65 Capability Length: 4 4
  • 5. BGP attribute update http://www.seed.net.tw AS_PATH attribute update Original: AS carried in this attribute is encoded as a 2 byte ASN New: AS carried in this attribute is encoded as a 4 byte ASN 5
  • 6. BGP attribute update http://www.seed.net.tw AS_AGGREGATOR attribute update Original: AS carried in this attribute is encoded as a 2 byte ASN New: AS carried in this attribute is encoded as a 4 byte ASN 6
  • 7. New BGP attribute http://www.seed.net.tw AS4_PATH Optional transitive attribute AS_PATH is “well-known mandatory” attribute AS4_PATH semantics: AS carried in this attribute is encoded as a 4 bytes entity 7
  • 8. New BGP attribute http://www.seed.net.tw AS4_AGGREGATOR Optional transitive attribute AS_AGGREGATOR is “optional transitive” attribute AS4_AGGREGATOR semantics: AS carried in this attribute is encoded as a 4 bytes entity 8
  • 9. Testing scenarios http://www.seed.net.tw NEW AS_PATH testing Peering with 4 bytes ASN is mappable to 2 bytes ASN 0.65000 0.65001 Peering with 4 bytes ASN is NOT mappable to 2 bytes ASN 0.65000 2.65001 9
  • 10. Testing scenarios http://www.seed.net.tw AS4_PATH testing Peering with 4 bytes ASN is mappable to 2 bytes ASN 65000 0.65001 Peering with 4 bytes ASN is NOT mappable to 2 bytes ASN 65000 2.65001 10
  • 11. Testing scenarios http://www.seed.net.tw AS4_PATH testing 2 bytes ASN travel through 4 bytes ASN 65000 0.65001 65002 65000 2.65001 65002 11
  • 12. Testing scenarios http://www.seed.net.tw AS4_PATH testing 4 bytes ASN travel through 2 bytes ASN 0.65000 65001 0.65002 2.65000 65001 2.65002 12
  • 13. Testing scenarios http://www.seed.net.tw NEW AS_AGGREGATOR testing 0.65002 0.65000 0.65001 0.65003 13
  • 14. Testing scenarios http://www.seed.net.tw AS4_AGGREGATOR testing 2 bytes ASN is aggregated via 4 bytes ASN 65002 65000 2.65001 65003 14
  • 15. Testing scenarios http://www.seed.net.tw AS4_AGGREGATOR testing 4 bytes ASN is aggregated via 2 bytes ASN 2.65002 0.65000 65001 2.65003 15
  • 16. Reference http://www.seed.net.tw RFC1771 Y. Rekhter, T. Li, “A Border Gateway Protocol 4 (BGP-4)”, March 1995. RFC4893 Q. Vohra, E. Chen, quot;BGP Support for Four- octet AS Number Spacequot;, May 2007. BGP support for 4-Byte AS Numbers - Implementation Survey Report Geoff Huston, Asia Pacific Network Information Centre 16
  • 17. Questions & Comments? sees your needs