Professional Documents
Culture Documents
What is Anycast?
Just a conguration methodology. Mentioned, although not described in detail, in numerous RFCs since time immemorial. Its been the basis for large-scale contentdistribution networks since at least 1995. Its gradually taking over the core of the DNS infrastructure, as well as much of the periphery of the world wide web.
Example
Router 2 Client Router 1 Router 3 Router 4 Server Instance B Server Instance A
Example
192.168.0.1 10.0.0.1
Server Instance A
Router 4
10.0.0.1
Server Instance B
Example
192.168.0.1 10.0.0.1
Server Instance A
Router 4
10.0.0.1
Server Instance B
Example
192.168.0.1 10.0.0.1
Server Instance A
Router 4
10.0.0.1
Server Instance B
Routing Table from Router 1: Destination 192.168.0.0 10.0.0.1 10.0.0.1 Mask /29 /32 /32 Next-Hop 127.0.0.1 192.168.0.1 192.168.0.2 Distance 0 1 2
Example
192.168.0.1 10.0.0.1
Server Instance A
Router 4
10.0.0.1
Server Instance B
Routing Table from Router 1: Destination 192.168.0.0 10.0.0.1 10.0.0.1 Mask /29 /32 /32 Next-Hop 127.0.0.1 192.168.0.1 192.168.0.2 Distance 0 1 2
Example
192.168.0.1 10.0.0.1
Server Instance A
Router 4
10.0.0.1
Server Instance B
Routing Table from Router 1: Destination 192.168.0.0 10.0.0.1 10.0.0.1 Mask /29 /32 /32 Next-Hop 127.0.0.1 192.168.0.1 192.168.0.2 Distance 0 1 2
Example
What the routers think the topology looks like:
192.168.0.1
Router 2
10.0.0.1
Client
Router 1 Router 3
192.168.0.2
Server Router 4
Routing Table from Router 1: Destination 192.168.0.0 10.0.0.1 10.0.0.1 Mask /29 /32 /32 Next-Hop 127.0.0.1 192.168.0.1 192.168.0.2 Distance 0 1 2
Example
BGP
Redistribution
IGP
Eth0 192.168.1.2/30
Server Instance A
Lo0 10.0.0.1/32
Router
Eth0 192.168.2.2/30
Server Instance B
Lo0 10.0.0.1/32
Eth0 192.168.3.2/30
Server Instance C
Lo0 10.0.0.1/32
Example
BGP
Redistribution
IGP
Eth0 192.168.1.2/30
Server Instance A
Lo0 10.0.0.1/32
Router
Eth0 192.168.2.2/30
Server Instance B
Lo0 10.0.0.1/32
Eth0 192.168.3.2/30 Destination 0.0.0.0 192.168.1.0 192.168.2.0 192.168.3.0 10.0.0.1 10.0.0.1 10.0.0.1 Mask /0 /30 /30 /30 /32 /32 /32 Next-Hop 127.0.0.1 192.168.1.1 192.168.2.1 192.168.3.1 192.168.1.2 192.168.2.2 192.168.3.2 Dist 0 0 0 0 1 1 1
Server Instance C
Lo0 10.0.0.1/32
Example
BGP
Redistribution
IGP
Eth0 192.168.1.2/30
Server Instance A
Lo0 10.0.0.1/32
Router
Eth0 192.168.2.2/30
Server Instance B
Lo0 10.0.0.1/32
Eth0 192.168.3.2/30 Destination 0.0.0.0 192.168.1.0 192.168.2.0 192.168.3.0 10.0.0.1 10.0.0.1 10.0.0.1 Mask /0 /30 /30 /30 /32 /32 /32 Next-Hop 127.0.0.1 192.168.1.1 192.168.2.1 192.168.3.1 192.168.1.2 192.168.2.2 192.168.3.2 Dist 0 0 0 0 1 1 1
Server Instance C
Lo0 10.0.0.1/32
Building a Global Network of Clusters Once a cluster architecture has been established, additional clusters can be added to gain performance. Load distribution, fail-over between clusters, and content synchronization become the principal engineering concerns.
Se rv er In st an ce A er In st a nc
Se rv er In
Se rv e
R
Se rv Se rv er In st
ou te r3
r Se ve rI er In a st nc an ce G
te
r1
ou
nc e
st a B
Example
Router 2
ns ta e nc I e H
Se rv er In st an ce A er In st a nc
R
Se rv Se rv er In st
ou te r3
r Se ve rI er In a st nc an ce G
te
r1
ou
nc e
Region 1
Se rv er In st a B e Se rv
Router 2
Example
ns
Region 3
ta
e nc
Region 2
Example
BGP Announcements
ou te r3 R
Se
R ou te r1
B e A st an ce
r Se ve rI
In
nc
ns
rv er
er
st a
ta
Se
Se rv
e nc
In
er
st a
Router 2
Server Instance D Server Instance E Server Instance F
In
rv
nc
a st nc
er
Se rv
In
In
st
er
an
Se rv
ce G
Example
IGP 1 Announcements
ou te r3 R
Se
R ou te r1
B e A st an ce
r Se ve rI
In
nc
ns
rv er
er
st a
ta
Se
Se rv
e nc
In
er
st a
Router 2
Server Instance D Server Instance E Server Instance F
In
rv
nc
a st nc
er
Se rv
In
In
st
er
an
Se rv
ce G
10.0.0.1 /32 10.0.0.1 /32 10.0.0.1 /32 192.168.1.0 /30 192.168.2.0 /30 192.168.3.0 /30
10.0.0.1 /32 10.0.0.1 /32 10.0.0.1 /32 192.168.5.0 /30 192.168.6.0 /30 192.168.7.0 /30
10.0.0.1 /32 10.0.0.1 /32 10.0.0.1 /32 192.168.9.0 /30 192.168.10.0 /30 192.168.11.0 /30
Example
IGP 2 Announcements
ou te r3 R
Se
R ou te r1
B e A st an ce
r Se ve rI
In
nc
ns
rv er
er
st a
ta
Se
Se rv
e nc
In
er
st a
Router 2
Server Instance D Server Instance E Server Instance F
In
rv
nc
a st nc
er
Se rv
In
In
st
er
an
Se rv
ce G
Example
Geographic plot of user population density
Example
Geographic plot of user population density
Server deployment
Example
Geographic plot of user population density
Example
Geographic plot of user population density
Example
Geographic plot of user population density
Example
Geographic plot of user population density
Example
Drawing trafc growth away from a hot-spot
Example
Drawing trafc growth away from a hot-spot
Example
Drawing trafc growth away from a hot-spot
Example
Drawing trafc growth away from a hot-spot
Example
Drawing trafc growth away from a hot-spot
Example
Drawing trafc growth away from a hot-spot
Topological watershed
Example
Drawing trafc growth away from a hot-spot
Identifying Problematic Server Instances Some protocols may not include an easy in-band method of identifying the server which persists beyond the duration of the connection. Traceroute always identies the current server instance, but end-users may not even have traceroute.
A Security Ramification
Anycast server clouds have the useful property of sinking DOS attacks at the instance nearest to the source of the attack, leaving all other instances unaffected. This is still of some utility even when DOS sources are widely distributed.
www.pch.net/documents/tutorials/anycast