SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Downloaden Sie, um offline zu lesen
The	
  Tricks	
  of	
  the	
  Trade	
  

Understanding	
  the

Internet Peering
Playbook

                       ©2012	
  DrPeering	
  Interna9onal	
  
                       Licensed	
  material	
  –	
  sales@DrPeering.net	
  
                       h@p://DrPeering.net	
  
 	
  	
  	
  	
  	
  	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
     THE	
  INTERNET	
  PEERING	
  PLAYBOOK	
  




                                                                               The	
  Tricks	
  of	
  the	
  Trade	
   	
  	
  	
  	
  	
  	
  




                                                                                                                                  2	
  
Research “The Art of Peering”



Q: When you get no response or a “No” response to a peerign
  request, what do seasoned Peering Coordinators do?
Give up?
A: No, there are some tricks.

n  Smartest Peering Coordinator “Tricks of the Trade”
n  20 Tactics successfully used to obtain Peering where you
    otherwise might not be able to.

Disclaimer: These are NOT recommended tactics…I am simply
  documenting what has been successfully used in the field to
  obtain peering.

                                                                                 3	
  
                                     Language.Graphical notation to describe the tactics
The	
  Players	
  




                     4	
  
Internet	
  Peering,	
  Paid	
  Peering,	
  Internet	
  Transit	
  




                                                                      5	
  
ISP	
  Customers	
  




                       6	
  
Equivalent	
  Transit	
  Nota9ons	
  




                                        7	
  
Equivalent	
  Peering	
  Nota9ons	
  




                                        8	
  
Traffic	
  Flow	
  Nota9on	
  




                               9	
  
The	
  ISP	
  Peering	
  Playbook	
  


•  Where	
  ISP	
  obtained	
  peering	
  
•  Where	
  ISP	
  defended	
  its	
  posi9on	
  
•  Telecom	
  Italia	
  &	
  Deutsche	
  Telekom	
  by	
  the	
  #	
  
    –  “Last	
  night	
  we	
  had	
  another	
  19”	
  
•  Expanded	
  




                                                                         10	
  
Tac9c	
  1.	
  Extended	
  Direct	
  Approach	
  




                                                    11	
  
Top	
  10	
  Ways	
  the	
  Pros	
  Contact	
  Target	
  ISPs	
  

1.        face-­‐to-­‐face	
  at	
  informal	
  mee9ng	
  in	
  an	
  Internet	
  
          Opera9ons	
  forum	
  like	
  NANOG,	
  IETF,	
  RIPE,	
  GPF,	
  
          APNIC,	
  AFNOG,	
  etc.,	
  	
  
2.        face-­‐to-­‐face	
  at	
  Commercial	
  Peering	
  Forums	
  like	
  
          Global	
  Peering	
  Forum	
  (you	
  must	
  be	
  a	
  customer	
  of	
  
          one	
  of	
  the	
  sponsoring	
  Ixes)	
  
3.        face-­‐to-­‐face	
  at	
  IX	
  Member	
  Mee9ngs	
  like	
  DE-­‐CIX,	
  
          LINX,	
  or	
  AMS-­‐IX	
  member	
  mee9ngs.	
  
4.        introduc9ons	
  through	
  an	
  IX	
  Chief	
  Technical	
  
          Liaison	
  (or	
  a	
  peer)	
  that	
  knows	
  the	
  right	
  contacts	
  



                                                                                          12	
  
Top	
  10	
  ways	
  the	
  Pros	
  Contact	
  Target	
  ISPs	
  

5.        via	
  electronic	
  mail,	
  using	
  the	
  pseudo	
  standard	
  
          peering@ispdomain.net	
  or	
  a	
  personal	
  contact,	
  	
  
6.        from	
  contacts	
  listed	
  on	
  an	
  exchange	
  point	
  
          par9cipant	
  list,	
  or	
  peeringdb	
  registra9ons,	
  
7.        with	
  tech-­‐c	
  or	
  admin-­‐c	
  from	
  DNS	
  or	
  ASN	
  
          registries,	
  
8.        Google	
  for	
  peering	
  contact	
  $ASN	
  peering	
  ,	
  
9.        from	
  the	
  target	
  ISP	
  sales	
  force,	
  at	
  trade	
  show	
  or	
  
          as	
  part	
  of	
  sales	
  process,	
  
10.       from	
  the	
  target	
  ISP	
  NOC.	
  




                                                                                             13	
  
Email	
  Bypass	
  




                      14	
  
Maximize	
  Face	
  Time	
  




                               15	
  
Leverage	
  IXP	
  Resources	
  




                                   16	
  
Tac9c	
  2.	
  Internet	
  Transit	
  with	
  Peering	
  Migra9on	
  



•  Leverage	
  internal	
  
   advocate	
  
•  Transit	
  Contract	
  
•  If	
  peering	
  prerequisites	
  
   are	
  met,	
  migrate	
  to	
  
   peering	
  
•  If	
  not,	
  try	
  again…	
  
•  Williams	
  story	
  


                                                                        17	
  
Tac9c	
  3.	
  End	
  Run	
  Maneuver	
  


•  Minimizes	
  need	
  for	
  
   peering	
  
•  When	
  you	
  need	
  it	
  less	
  
   you	
  can	
  more	
  easily	
  get	
  
   it.	
  
•  Rather	
  peer	
  than	
  lose	
  
   customers	
  
•  Takes	
  9me	
  
•  Cherry	
  picking	
  may	
  
   annoy	
  peer	
  
                                             18	
  
Tac9c	
  4.	
  Bundle	
  Internet	
  Transit	
  with	
  Peering	
  


•  BBC	
  Internet	
  
•  Internal	
  advocate	
  
•  May	
  be	
  tough	
  to	
  
   support	
  
•  Can	
  be	
  gamed	
  




                                                                      19	
  
Tac9c	
  5.	
  Buy	
  Transit	
  from	
  most	
  Restric9ve	
  Tier	
  1	
  ISP	
  



•  Peering	
  request	
  
   process	
  
      –  Do	
  I	
  already	
  hear	
  
         these	
  routes	
  for	
  
         free?	
  
      –  Yes=deny	
  peering	
  
•  So	
  buy	
  from	
  
   someone	
  that	
  
   doesn’t	
  peer	
  
•  Minimize	
  chance	
  of	
  
   rejec9on	
  
                                                    “Once	
  a	
  customer,	
  never	
  a	
  peer”	
  –	
  UK	
  Story	
  
                                                                                                                  20	
  
Tac9c	
  6.	
  Transi9onal	
  Paid	
  Peering	
  


•  “Stepping	
  Stone”	
  to	
  
   free	
  peering	
  
•  Free	
  peering	
  when	
  
   prerequisites	
  sa9sfied	
  
•  Few	
  success	
  stories	
  




                                                    21	
  
Tac9c	
  7.	
  Par9al-­‐Route	
  Internet	
  Transit	
  


•  X	
  well	
  established	
  peer	
  
•  I	
  will	
  sell	
  you	
  IX	
  routes	
  
     –  No	
  Joining	
  Fees	
  
     –  No	
  Peering	
  legwork	
  
     –  Would	
  take	
  years	
  
•  Priced	
  cheap	
  




                                                           22	
  
Tac9c	
  8.	
  Play	
  Chicken	
  (1	
  of	
  3)	
  


•  Confronta9onal	
  

•  Upgrade-­‐Pay	
  Me	
  

•  No?	
  Disconnect	
  

•  Then…	
  



                                                       23	
  
Tac9c	
  8.	
  Play	
  Chicken	
  (2of3)	
  


•  More	
  circuitous	
  path	
  
•  Maybe	
  par99on	
  




                                               24	
  
Tac9c	
  8.	
  Play	
  Chicken	
  (3of3)	
  


•  Renego9ate	
  terms	
  
•  Exodus-­‐Genuity	
  
•  Peering	
  Ra9o	
  sidebar	
  

•    End	
  result?	
  
•    Name	
  calling	
  
•    Public	
  scru9ny	
  
•    More	
  interconnects	
  

                                               25	
  
Tac9c	
  9.	
  Traffic	
  Manipula9on	
  


•  Leverages	
  Traffic	
  
   Asymmetry	
  




                                          26	
  
Tac9c	
  9.	
  Traffic	
  Manipula9on	
  

•  Content-­‐Heavy	
  
   network	
  controls	
  
   spigot	
  
•  Understand	
  
   Mo9va9ons	
  




                                           27	
  
Tac9c	
  9.	
  Traffic	
  Manipula9on	
  Tac9c	
  


•  Force	
  traffic	
  along	
  path	
  
     that	
  ISP	
  B	
  has	
  to	
  pay	
  for	
  
	
  




                                                       28	
  
Tac9c	
  9.	
  Traffic	
  Manipula9on	
  



•  THEN	
  ask	
  for	
  peering	
  
•  “Oh	
  my!	
  How	
  did	
  that	
  
   creep	
  up	
  on	
  me?	
  
•  Yes,	
  let’s	
  peer.	
  
•  I’ll	
  save	
  $$	
  
•  I’m	
  such	
  a	
  valuable	
  PC”	
  




                                             29	
  
Tac9c	
  9.	
  Traffic	
  Manipula9on	
  

•  Unethical?	
  

•  Varia9ons:	
  
•  A	
  stops	
  announcing	
  
     reachability	
  to	
  L	
  
•  A	
  inserts	
  B	
  in	
  
     announcement	
  to	
  
     trigger	
  loop	
  
     suppression	
  
	
  
                                            30	
  
Tac9c	
  10.	
  Bluff	
  Issues	
  


•  Bluff	
  load	
  futures	
  
     –  Msw	
  
     –  Difficult	
  to	
  detect	
  
•  Bluff	
  bad	
  performance	
  
     –  Traceroute	
  
     –  Ji@er	
  
     –  latency	
  




                                      31	
  
Tac9c	
  11.	
  Be	
  Open.	
  Loudly.	
  


•  PC	
  faces	
  rejec9on	
  
•  Phone	
  calls	
  and	
  emails	
  
   go	
  unanswered	
  
•  Be	
  the	
  low	
  hanging	
  fruit	
  
•  #	
  of	
  sessions,	
  volume	
  of	
  
   traffic	
  used	
  in	
  
   performance	
  reviews	
  
•  Make	
  it	
  clear	
  you	
  will	
  
   make	
  them	
  look	
  good	
  

                                              32	
  
Tac9c	
  12.	
  Be	
  Everywhere	
  


•  Build	
  into	
  large	
  #	
  of	
  
   POPs,	
  IXPs,	
  colos	
  
•  Meet	
  geographic	
  
   distribu9on	
  
   requirements	
  
•  Signal	
  big	
  peer	
  
   volume	
  poten9al	
  




                                           33	
  
Tac9c	
  13.	
  Get	
  Traffic	
  


•  Cogent	
  
•  More	
  a@rac9ve	
  peering	
  candidate	
  




                                                  34	
  
Tac9c	
  14.	
  Friendship-­‐based	
  Peering	
  


•  Related:	
  Bro-­‐lo	
  
•  “Brother	
  can	
  you	
  
   spare	
  some	
  
   colo?”	
  
•  As	
  CTL	
  peers	
  
   became	
  friends,	
  
   introduced	
  
   newbies	
  to	
  
   “friendly”	
  peers	
  

                                                    35	
  
Tac9c	
  15.	
  Spam	
  Peering	
  Requests	
  



•  Discussion	
  lists	
  
•  “Reply	
  to	
  self”	
  
•  “Dozens	
  of	
  peering	
  
   sessions	
  resulted”	
  
    –  Mitchell	
  Rose	
  
•  Might	
  be	
  low	
  volume	
  
   peers	
  
•  Some	
  unexpected	
  
   posi9ve	
  responses	
  
                                                     36	
  
Tac9c	
  16.	
  The	
  Honey	
  Approach	
  -­‐	
  Be	
  Sweet	
  
•  Yahoo!	
  Microsow	
  desirability	
  of	
  content	
  
•  Thousands	
  of	
  webcasts,	
  personal	
  radio	
  sta9ons,	
  web	
  
   proper9es	
  your	
  eyeballs	
  want!	
  Easier	
  to	
  be	
  
   approached	
  than	
  to	
  approach.	
  




                                                                              37	
  
Tac9c	
  17.	
  Purchase	
  a	
  well-­‐peered	
  ISP	
  


•  Level	
  3	
  acquired	
  ISPs	
  to	
  
   become	
  Tier	
  1	
  
•  Telstra	
  forced	
  to	
  peer	
  
   with	
  Optus,	
  
   Connect.com,	
  and	
  Oze-­‐
   mail	
  
•  OptusàSingTel	
  
•  Connect.comàTNZ	
  
•  Oze-­‐mailàVerizon	
  
•  1990’s	
  Value~Value	
  of	
  
   peering	
                                                 38	
  
Tac9c	
  18.	
  Bait-­‐and-­‐Switch	
  



•  Large	
  parent	
  company	
  
   power	
  is	
  leveraged	
  
•  Smaller	
  company	
  gets	
  
   peered	
  




                                           39	
  
Tac9c	
  19.	
  False	
  Peering	
  Outage	
  


NOC	
  A:	
  “Hey!	
  Our	
  peering	
  
session	
  is	
  down	
  again.	
  
AGAIN!”	
  
NOC	
  B:	
  “I	
  don’t	
  see	
  any	
  
alerts”	
  
NOC	
  A:	
  “Don’t	
  make	
  wake	
  
Hans-­‐Werner	
  Braun	
  out	
  of	
  
bed	
  again.	
  Set	
  it	
  up	
  and	
  
we’ll	
  se@le	
  it	
  tomorrow”	
  
What	
  would	
  your	
  NOC	
  do?	
  
                                                      40	
  
Tac9c	
  20.	
  Leverage	
  Broader	
  Business	
  Arrangement	
  




•  As	
  with	
  the	
  Level	
  3	
  
   Comcast	
  rela9onship	
  
•  AOL	
  did	
  this	
  in	
  the	
  00’s	
  
•  Bundle	
  peering	
  with	
  
     –  Fiber	
  
     –  Colo	
  
     –  Wavelengths	
  
•  Aka	
  “Free	
  On-­‐Net”	
  

                                                                      41	
  
Tac9c	
  21.	
  Overseas	
  Power	
  Play	
  


•  Pressure	
  incumbent	
  ISP	
  
   B	
  to	
  peer	
  
•  Cut	
  transit	
  in	
  country	
  
•  Force	
  traffic	
  through	
  
   expensive	
  ISP	
  B	
  
   interna9onal	
  transit	
  link	
  
•  Expensive	
  tac9c	
  
•  Requires	
  PR	
  


                                                42	
  
Tac9c	
  21.	
  Overseas	
  Power	
  Play	
  


•  Pressure	
  incumbent	
  ISP	
  
   B	
  to	
  peer	
  
        “We	
  have	
  made	
  a	
  conscious	
  decision	
  that	
  
•  Cut	
  transit	
  in	
  country	
  
    star9ng	
  next	
  month	
  [November]	
  we	
  will	
  not	
  
•  Force	
  traffic	
  through	
  
    pay	
  anybody	
  for	
  transit	
  traffic	
  anymore.	
  So	
  if	
  
   expensive	
  ISP	
  B	
  
    you	
  don’t	
  wtant	
  to	
  ink	
   with	
  us,	
  that	
  is	
  it!	
  We	
  
   interna9onal	
   ransit	
  l            peer	
  
      will	
  not	
  tpay	
  you	
  one	
  single	
  cent	
  anymore.”	
  
•  Expensive	
   ac9c	
  
                       -­‐-­‐	
  Rudy	
  Jansen,	
  MWEB	
  CEO	
  
•  Requires	
  PR	
  


                                                                                    43	
  
Tac9c	
  22.	
  Construct	
  Peering	
  from	
  Transit	
  	
  


    Why	
  do	
  this?	
  




•  No	
  paid	
  peering	
  product	
  
•  Make	
  you	
  look	
  more	
  
   a@rac9ve	
  
    –  Like	
  paying	
  for	
  a	
  date	
  
•  Neither	
  party	
  inclined	
  to	
  
   talk	
  about	
  it	
                                               44	
  
Tac9c	
  23.	
  Do	
  Not	
  Peering	
  in	
  your	
  home	
  market	
  


•  Defensive	
  tac9c	
  
•  “The	
  desire	
  to	
  protect	
  
   one’s	
  home	
  market	
  
   dwarfs	
  any	
  benefits	
  
   peering	
  might	
  provide.”	
  
   –	
  John	
  Milburn	
  
•  KT	
  Story	
  




                                                                           45	
  
Tac9c	
  24.	
  Protect	
  Peering	
  Policy	
  


•  Defensive	
  tac9c	
  
•  Do	
  not	
  publish	
  peering	
  
   policy	
  
•  Require	
  NDAs	
  before	
  
   peering	
  discussions	
  
•  Reduces	
  unqualified	
  
   peering	
  candidate	
  
   requests	
  
•  Avoid	
  court	
  of	
  public	
  
   opinion	
  and	
  regulatory	
  
   interest	
                                      46	
  
Tac9c	
  25.	
  Change	
  and	
  Escalate	
  Peering	
  Prerequisites	
  


•  Defensive	
  tac9c	
  




                                                                               47	
  
Tac9c	
  26.	
  Make	
  it	
  Long	
  and	
  Difficult	
  (MILD)	
  


•  Defensive	
  tac9c	
  
•  Comindico	
  story	
  
    –  Telstra	
  anecdote	
  
    –  High	
  Bar	
  
    –  Reschedule	
  mtg	
  
    –  Swap	
  out	
  teams	
  
    –  More	
  docs	
  required	
  
    –  Mee9ng	
  
    –  Prereqs	
  changing	
  
    –  Comindico	
  bankrupt	
  

                                                                        48	
  
Tac9c	
  27.	
  Congest	
  Transit	
  Pipes	
  




•  Makes	
  paid	
  peering	
  look	
  pre@y	
  a@rac9ve,	
  doesn’t	
  
   it?	
  
•  Was	
  this	
  on	
  purpose?	
  
•  Or	
  just	
  a	
  bad	
  day?	
  
                                                                           49	
  
Tac9c	
  27.	
  Congest	
  Transit	
  Pipes	
  




•  Maybe	
  just	
  a	
  bad	
  day?	
  
•  30	
  day	
  view	
  


                                                  50	
  
Tac9cs	
  that	
  don’t	
  work	
  


•  Hold	
  desirable	
  content	
         •  Blind	
  peering	
  requests	
  
   hostage	
                                 with	
  largest	
  target	
  
•  Exert	
  market	
                         peers	
  first	
  
   dominance	
  in	
  a	
  foreign	
      •  Demonstra9ng	
  lack	
  of	
  
   market	
                                  knowledge	
  regarding	
  
•  Threaten	
  li9ga9on	
                    peer	
  and	
  backbone	
  
•  Public	
  name	
  calling	
  and	
        opera9ons	
  
   badgering	
                            •  Refusal	
  to	
  register	
  in	
  
                                             rou9ng	
  registries	
  

                                                                                   51	
  

Weitere ähnliche Inhalte

Ähnlich wie 11 internet peering-playbook

Daniel Beazer - what to look for from your cloud service provider / Unlocked:...
Daniel Beazer - what to look for from your cloud service provider / Unlocked:...Daniel Beazer - what to look for from your cloud service provider / Unlocked:...
Daniel Beazer - what to look for from your cloud service provider / Unlocked:...Rackspace Academy
 
Randy Bush - Routing Security Let's Get Serious
Randy Bush -  Routing Security Let's Get SeriousRandy Bush -  Routing Security Let's Get Serious
Randy Bush - Routing Security Let's Get SeriousPROIDEA
 
Natural born conversion killers - Conversion Jam
Natural born conversion killers - Conversion JamNatural born conversion killers - Conversion Jam
Natural born conversion killers - Conversion JamCraig Sullivan
 
Internet Peering and the Role of an IXP
Internet Peering and the Role of an IXPInternet Peering and the Role of an IXP
Internet Peering and the Role of an IXPJacob Dagunduro
 
The Art & Science of Bootstrapping
The Art & Science of BootstrappingThe Art & Science of Bootstrapping
The Art & Science of BootstrappingNico Perez
 
Routing Security
Routing SecurityRouting Security
Routing SecurityRIPE NCC
 
Optimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkOptimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkReza Rahimi
 
Engage 2013 - Tag Management
Engage 2013 - Tag ManagementEngage 2013 - Tag Management
Engage 2013 - Tag ManagementWebtrends
 
iPods and iTunes
iPods and iTunesiPods and iTunes
iPods and iTunesEric Moon
 
Bluffers guide to elitist jargon - Martijn Verburg, Richard Warburton, James ...
Bluffers guide to elitist jargon - Martijn Verburg, Richard Warburton, James ...Bluffers guide to elitist jargon - Martijn Verburg, Richard Warburton, James ...
Bluffers guide to elitist jargon - Martijn Verburg, Richard Warburton, James ...JAX London
 
V4 connecting to the core of the internet
V4 connecting to the core of the internetV4 connecting to the core of the internet
V4 connecting to the core of the internetWilliam Norton
 
Routing for an Anycast CDN
Routing for an Anycast CDNRouting for an Anycast CDN
Routing for an Anycast CDNTom Paseka
 
Routing Security
Routing SecurityRouting Security
Routing SecurityRIPE NCC
 
CSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 FebCSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 Febcstalks
 
Case Study in Building an Integrated IT and Telecom Solution Provider, Andrei...
Case Study in Building an Integrated IT and Telecom Solution Provider, Andrei...Case Study in Building an Integrated IT and Telecom Solution Provider, Andrei...
Case Study in Building an Integrated IT and Telecom Solution Provider, Andrei...Alan Quayle
 

Ähnlich wie 11 internet peering-playbook (20)

04 internet peering
04 internet peering04 internet peering
04 internet peering
 
06 selecting an-ixp
06 selecting an-ixp06 selecting an-ixp
06 selecting an-ixp
 
Daniel Beazer - what to look for from your cloud service provider / Unlocked:...
Daniel Beazer - what to look for from your cloud service provider / Unlocked:...Daniel Beazer - what to look for from your cloud service provider / Unlocked:...
Daniel Beazer - what to look for from your cloud service provider / Unlocked:...
 
Randy Bush - Routing Security Let's Get Serious
Randy Bush -  Routing Security Let's Get SeriousRandy Bush -  Routing Security Let's Get Serious
Randy Bush - Routing Security Let's Get Serious
 
Natural born conversion killers - Conversion Jam
Natural born conversion killers - Conversion JamNatural born conversion killers - Conversion Jam
Natural born conversion killers - Conversion Jam
 
Internet Peering and the Role of an IXP
Internet Peering and the Role of an IXPInternet Peering and the Role of an IXP
Internet Peering and the Role of an IXP
 
The Art & Science of Bootstrapping
The Art & Science of BootstrappingThe Art & Science of Bootstrapping
The Art & Science of Bootstrapping
 
Gaurab Ixp Tutorial
Gaurab Ixp TutorialGaurab Ixp Tutorial
Gaurab Ixp Tutorial
 
Routing Security
Routing SecurityRouting Security
Routing Security
 
Optimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkOptimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP Network
 
Engage 2013 - Tag Management
Engage 2013 - Tag ManagementEngage 2013 - Tag Management
Engage 2013 - Tag Management
 
iPods and iTunes
iPods and iTunesiPods and iTunes
iPods and iTunes
 
Bluffers guide to elitist jargon - Martijn Verburg, Richard Warburton, James ...
Bluffers guide to elitist jargon - Martijn Verburg, Richard Warburton, James ...Bluffers guide to elitist jargon - Martijn Verburg, Richard Warburton, James ...
Bluffers guide to elitist jargon - Martijn Verburg, Richard Warburton, James ...
 
V4 connecting to the core of the internet
V4 connecting to the core of the internetV4 connecting to the core of the internet
V4 connecting to the core of the internet
 
Routing for an Anycast CDN
Routing for an Anycast CDNRouting for an Anycast CDN
Routing for an Anycast CDN
 
02 internet transit
02 internet transit02 internet transit
02 internet transit
 
Routing Security
Routing SecurityRouting Security
Routing Security
 
CSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 FebCSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 Feb
 
Case Study in Building an Integrated IT and Telecom Solution Provider, Andrei...
Case Study in Building an Integrated IT and Telecom Solution Provider, Andrei...Case Study in Building an Integrated IT and Telecom Solution Provider, Andrei...
Case Study in Building an Integrated IT and Telecom Solution Provider, Andrei...
 
The Case Against Jumbo Frames
The Case Against Jumbo FramesThe Case Against Jumbo Frames
The Case Against Jumbo Frames
 

Mehr von William Norton

How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves SecurityWilliam Norton
 
Understanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the InternetUnderstanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the InternetWilliam Norton
 
15.1 transition create-peering-strategy
15.1 transition create-peering-strategy15.1 transition create-peering-strategy
15.1 transition create-peering-strategyWilliam Norton
 
14 the folly-of-peering-ratios
14 the folly-of-peering-ratios14 the folly-of-peering-ratios
14 the folly-of-peering-ratiosWilliam Norton
 
09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem 09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem William Norton
 
08 the 20th-century-internet-peering-ecosystem
08 the 20th-century-internet-peering-ecosystem08 the 20th-century-internet-peering-ecosystem
08 the 20th-century-internet-peering-ecosystemWilliam Norton
 
7.2 day 2 agenda opening
7.2 day 2 agenda opening7.2 day 2 agenda opening
7.2 day 2 agenda openingWilliam Norton
 
07.1 break client specific application decks
07.1 break   client specific application decks07.1 break   client specific application decks
07.1 break client specific application decksWilliam Norton
 
07 public vs-private-peering-debate
07 public vs-private-peering-debate07 public vs-private-peering-debate
07 public vs-private-peering-debateWilliam Norton
 
05 the business-case-for-internet-peering
05 the business-case-for-internet-peering05 the business-case-for-internet-peering
05 the business-case-for-internet-peeringWilliam Norton
 
04a peering simulation-game
04a peering simulation-game04a peering simulation-game
04a peering simulation-gameWilliam Norton
 
03 internet transit-playbook
03 internet transit-playbook03 internet transit-playbook
03 internet transit-playbookWilliam Norton
 
01 internet peering-workshop-agenda
01 internet peering-workshop-agenda01 internet peering-workshop-agenda
01 internet peering-workshop-agendaWilliam Norton
 

Mehr von William Norton (20)

How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves Security
 
Understanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the InternetUnderstanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the Internet
 
15.1 transition create-peering-strategy
15.1 transition create-peering-strategy15.1 transition create-peering-strategy
15.1 transition create-peering-strategy
 
14 the folly-of-peering-ratios
14 the folly-of-peering-ratios14 the folly-of-peering-ratios
14 the folly-of-peering-ratios
 
12.1 lunch break
12.1 lunch break12.1 lunch break
12.1 lunch break
 
10.1.break
10.1.break10.1.break
10.1.break
 
09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem 09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem
 
08 the 20th-century-internet-peering-ecosystem
08 the 20th-century-internet-peering-ecosystem08 the 20th-century-internet-peering-ecosystem
08 the 20th-century-internet-peering-ecosystem
 
7.2 day 2 agenda opening
7.2 day 2 agenda opening7.2 day 2 agenda opening
7.2 day 2 agenda opening
 
07.1.1 application
07.1.1 application07.1.1 application
07.1.1 application
 
07.1 break client specific application decks
07.1 break   client specific application decks07.1 break   client specific application decks
07.1 break client specific application decks
 
07 public vs-private-peering-debate
07 public vs-private-peering-debate07 public vs-private-peering-debate
07 public vs-private-peering-debate
 
05 the business-case-for-internet-peering
05 the business-case-for-internet-peering05 the business-case-for-internet-peering
05 the business-case-for-internet-peering
 
04c.1.break
04c.1.break04c.1.break
04c.1.break
 
04a peering simulation-game
04a peering simulation-game04a peering simulation-game
04a peering simulation-game
 
03.1.break
03.1.break03.1.break
03.1.break
 
03 internet transit-playbook
03 internet transit-playbook03 internet transit-playbook
03 internet transit-playbook
 
01 internet peering-workshop-agenda
01 internet peering-workshop-agenda01 internet peering-workshop-agenda
01 internet peering-workshop-agenda
 
16 peering policies
16 peering policies16 peering policies
16 peering policies
 
Access Power Peering
Access Power PeeringAccess Power Peering
Access Power Peering
 

11 internet peering-playbook

  • 1. The  Tricks  of  the  Trade   Understanding  the Internet Peering Playbook ©2012  DrPeering  Interna9onal   Licensed  material  –  sales@DrPeering.net   h@p://DrPeering.net  
  • 2.                                         THE  INTERNET  PEERING  PLAYBOOK   The  Tricks  of  the  Trade               2  
  • 3. Research “The Art of Peering” Q: When you get no response or a “No” response to a peerign request, what do seasoned Peering Coordinators do? Give up? A: No, there are some tricks. n  Smartest Peering Coordinator “Tricks of the Trade” n  20 Tactics successfully used to obtain Peering where you otherwise might not be able to. Disclaimer: These are NOT recommended tactics…I am simply documenting what has been successfully used in the field to obtain peering. 3   Language.Graphical notation to describe the tactics
  • 5. Internet  Peering,  Paid  Peering,  Internet  Transit   5  
  • 10. The  ISP  Peering  Playbook   •  Where  ISP  obtained  peering   •  Where  ISP  defended  its  posi9on   •  Telecom  Italia  &  Deutsche  Telekom  by  the  #   –  “Last  night  we  had  another  19”   •  Expanded   10  
  • 11. Tac9c  1.  Extended  Direct  Approach   11  
  • 12. Top  10  Ways  the  Pros  Contact  Target  ISPs   1.  face-­‐to-­‐face  at  informal  mee9ng  in  an  Internet   Opera9ons  forum  like  NANOG,  IETF,  RIPE,  GPF,   APNIC,  AFNOG,  etc.,     2.  face-­‐to-­‐face  at  Commercial  Peering  Forums  like   Global  Peering  Forum  (you  must  be  a  customer  of   one  of  the  sponsoring  Ixes)   3.  face-­‐to-­‐face  at  IX  Member  Mee9ngs  like  DE-­‐CIX,   LINX,  or  AMS-­‐IX  member  mee9ngs.   4.  introduc9ons  through  an  IX  Chief  Technical   Liaison  (or  a  peer)  that  knows  the  right  contacts   12  
  • 13. Top  10  ways  the  Pros  Contact  Target  ISPs   5.  via  electronic  mail,  using  the  pseudo  standard   peering@ispdomain.net  or  a  personal  contact,     6.  from  contacts  listed  on  an  exchange  point   par9cipant  list,  or  peeringdb  registra9ons,   7.  with  tech-­‐c  or  admin-­‐c  from  DNS  or  ASN   registries,   8.  Google  for  peering  contact  $ASN  peering  ,   9.  from  the  target  ISP  sales  force,  at  trade  show  or   as  part  of  sales  process,   10.  from  the  target  ISP  NOC.   13  
  • 17. Tac9c  2.  Internet  Transit  with  Peering  Migra9on   •  Leverage  internal   advocate   •  Transit  Contract   •  If  peering  prerequisites   are  met,  migrate  to   peering   •  If  not,  try  again…   •  Williams  story   17  
  • 18. Tac9c  3.  End  Run  Maneuver   •  Minimizes  need  for   peering   •  When  you  need  it  less   you  can  more  easily  get   it.   •  Rather  peer  than  lose   customers   •  Takes  9me   •  Cherry  picking  may   annoy  peer   18  
  • 19. Tac9c  4.  Bundle  Internet  Transit  with  Peering   •  BBC  Internet   •  Internal  advocate   •  May  be  tough  to   support   •  Can  be  gamed   19  
  • 20. Tac9c  5.  Buy  Transit  from  most  Restric9ve  Tier  1  ISP   •  Peering  request   process   –  Do  I  already  hear   these  routes  for   free?   –  Yes=deny  peering   •  So  buy  from   someone  that   doesn’t  peer   •  Minimize  chance  of   rejec9on   “Once  a  customer,  never  a  peer”  –  UK  Story   20  
  • 21. Tac9c  6.  Transi9onal  Paid  Peering   •  “Stepping  Stone”  to   free  peering   •  Free  peering  when   prerequisites  sa9sfied   •  Few  success  stories   21  
  • 22. Tac9c  7.  Par9al-­‐Route  Internet  Transit   •  X  well  established  peer   •  I  will  sell  you  IX  routes   –  No  Joining  Fees   –  No  Peering  legwork   –  Would  take  years   •  Priced  cheap   22  
  • 23. Tac9c  8.  Play  Chicken  (1  of  3)   •  Confronta9onal   •  Upgrade-­‐Pay  Me   •  No?  Disconnect   •  Then…   23  
  • 24. Tac9c  8.  Play  Chicken  (2of3)   •  More  circuitous  path   •  Maybe  par99on   24  
  • 25. Tac9c  8.  Play  Chicken  (3of3)   •  Renego9ate  terms   •  Exodus-­‐Genuity   •  Peering  Ra9o  sidebar   •  End  result?   •  Name  calling   •  Public  scru9ny   •  More  interconnects   25  
  • 26. Tac9c  9.  Traffic  Manipula9on   •  Leverages  Traffic   Asymmetry   26  
  • 27. Tac9c  9.  Traffic  Manipula9on   •  Content-­‐Heavy   network  controls   spigot   •  Understand   Mo9va9ons   27  
  • 28. Tac9c  9.  Traffic  Manipula9on  Tac9c   •  Force  traffic  along  path   that  ISP  B  has  to  pay  for     28  
  • 29. Tac9c  9.  Traffic  Manipula9on   •  THEN  ask  for  peering   •  “Oh  my!  How  did  that   creep  up  on  me?   •  Yes,  let’s  peer.   •  I’ll  save  $$   •  I’m  such  a  valuable  PC”   29  
  • 30. Tac9c  9.  Traffic  Manipula9on   •  Unethical?   •  Varia9ons:   •  A  stops  announcing   reachability  to  L   •  A  inserts  B  in   announcement  to   trigger  loop   suppression     30  
  • 31. Tac9c  10.  Bluff  Issues   •  Bluff  load  futures   –  Msw   –  Difficult  to  detect   •  Bluff  bad  performance   –  Traceroute   –  Ji@er   –  latency   31  
  • 32. Tac9c  11.  Be  Open.  Loudly.   •  PC  faces  rejec9on   •  Phone  calls  and  emails   go  unanswered   •  Be  the  low  hanging  fruit   •  #  of  sessions,  volume  of   traffic  used  in   performance  reviews   •  Make  it  clear  you  will   make  them  look  good   32  
  • 33. Tac9c  12.  Be  Everywhere   •  Build  into  large  #  of   POPs,  IXPs,  colos   •  Meet  geographic   distribu9on   requirements   •  Signal  big  peer   volume  poten9al   33  
  • 34. Tac9c  13.  Get  Traffic   •  Cogent   •  More  a@rac9ve  peering  candidate   34  
  • 35. Tac9c  14.  Friendship-­‐based  Peering   •  Related:  Bro-­‐lo   •  “Brother  can  you   spare  some   colo?”   •  As  CTL  peers   became  friends,   introduced   newbies  to   “friendly”  peers   35  
  • 36. Tac9c  15.  Spam  Peering  Requests   •  Discussion  lists   •  “Reply  to  self”   •  “Dozens  of  peering   sessions  resulted”   –  Mitchell  Rose   •  Might  be  low  volume   peers   •  Some  unexpected   posi9ve  responses   36  
  • 37. Tac9c  16.  The  Honey  Approach  -­‐  Be  Sweet   •  Yahoo!  Microsow  desirability  of  content   •  Thousands  of  webcasts,  personal  radio  sta9ons,  web   proper9es  your  eyeballs  want!  Easier  to  be   approached  than  to  approach.   37  
  • 38. Tac9c  17.  Purchase  a  well-­‐peered  ISP   •  Level  3  acquired  ISPs  to   become  Tier  1   •  Telstra  forced  to  peer   with  Optus,   Connect.com,  and  Oze-­‐ mail   •  OptusàSingTel   •  Connect.comàTNZ   •  Oze-­‐mailàVerizon   •  1990’s  Value~Value  of   peering   38  
  • 39. Tac9c  18.  Bait-­‐and-­‐Switch   •  Large  parent  company   power  is  leveraged   •  Smaller  company  gets   peered   39  
  • 40. Tac9c  19.  False  Peering  Outage   NOC  A:  “Hey!  Our  peering   session  is  down  again.   AGAIN!”   NOC  B:  “I  don’t  see  any   alerts”   NOC  A:  “Don’t  make  wake   Hans-­‐Werner  Braun  out  of   bed  again.  Set  it  up  and   we’ll  se@le  it  tomorrow”   What  would  your  NOC  do?   40  
  • 41. Tac9c  20.  Leverage  Broader  Business  Arrangement   •  As  with  the  Level  3   Comcast  rela9onship   •  AOL  did  this  in  the  00’s   •  Bundle  peering  with   –  Fiber   –  Colo   –  Wavelengths   •  Aka  “Free  On-­‐Net”   41  
  • 42. Tac9c  21.  Overseas  Power  Play   •  Pressure  incumbent  ISP   B  to  peer   •  Cut  transit  in  country   •  Force  traffic  through   expensive  ISP  B   interna9onal  transit  link   •  Expensive  tac9c   •  Requires  PR   42  
  • 43. Tac9c  21.  Overseas  Power  Play   •  Pressure  incumbent  ISP   B  to  peer   “We  have  made  a  conscious  decision  that   •  Cut  transit  in  country   star9ng  next  month  [November]  we  will  not   •  Force  traffic  through   pay  anybody  for  transit  traffic  anymore.  So  if   expensive  ISP  B   you  don’t  wtant  to  ink   with  us,  that  is  it!  We   interna9onal   ransit  l peer   will  not  tpay  you  one  single  cent  anymore.”   •  Expensive   ac9c   -­‐-­‐  Rudy  Jansen,  MWEB  CEO   •  Requires  PR   43  
  • 44. Tac9c  22.  Construct  Peering  from  Transit     Why  do  this?   •  No  paid  peering  product   •  Make  you  look  more   a@rac9ve   –  Like  paying  for  a  date   •  Neither  party  inclined  to   talk  about  it   44  
  • 45. Tac9c  23.  Do  Not  Peering  in  your  home  market   •  Defensive  tac9c   •  “The  desire  to  protect   one’s  home  market   dwarfs  any  benefits   peering  might  provide.”   –  John  Milburn   •  KT  Story   45  
  • 46. Tac9c  24.  Protect  Peering  Policy   •  Defensive  tac9c   •  Do  not  publish  peering   policy   •  Require  NDAs  before   peering  discussions   •  Reduces  unqualified   peering  candidate   requests   •  Avoid  court  of  public   opinion  and  regulatory   interest   46  
  • 47. Tac9c  25.  Change  and  Escalate  Peering  Prerequisites   •  Defensive  tac9c   47  
  • 48. Tac9c  26.  Make  it  Long  and  Difficult  (MILD)   •  Defensive  tac9c   •  Comindico  story   –  Telstra  anecdote   –  High  Bar   –  Reschedule  mtg   –  Swap  out  teams   –  More  docs  required   –  Mee9ng   –  Prereqs  changing   –  Comindico  bankrupt   48  
  • 49. Tac9c  27.  Congest  Transit  Pipes   •  Makes  paid  peering  look  pre@y  a@rac9ve,  doesn’t   it?   •  Was  this  on  purpose?   •  Or  just  a  bad  day?   49  
  • 50. Tac9c  27.  Congest  Transit  Pipes   •  Maybe  just  a  bad  day?   •  30  day  view   50  
  • 51. Tac9cs  that  don’t  work   •  Hold  desirable  content   •  Blind  peering  requests   hostage   with  largest  target   •  Exert  market   peers  first   dominance  in  a  foreign   •  Demonstra9ng  lack  of   market   knowledge  regarding   •  Threaten  li9ga9on   peer  and  backbone   •  Public  name  calling  and   opera9ons   badgering   •  Refusal  to  register  in   rou9ng  registries   51