• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

LOUP: The Principles and Practice of Intra-Domain Route Dissemination (2013)

by N Gvozdiev, B Karp, M Handley
Venue:In NSDI
Add To MetaCart

Tools

Sorted by:
Results 1 - 3 of 3

PoiRoot: Investigating the Root Cause of Interdomain Path Changes

by Umar Javed, Ethan Katz-bassett, Italo Cunha, De Minas Gerais, Thomas Anderson, David R. Choffnes, Arvind Krishnamurthy
"... Interdomain path changes occur frequently. Because routing protocols expose insufficient information to reason about all changes, the general problem of identifying the root cause remains unsolved. In this work, we design and evaluate PoiRoot, a real-time system that allows a provider to accurately ..."
Abstract - Cited by 8 (2 self) - Add to MetaCart
Interdomain path changes occur frequently. Because routing protocols expose insufficient information to reason about all changes, the general problem of identifying the root cause remains unsolved. In this work, we design and evaluate PoiRoot, a real-time system that allows a provider to accurately isolate the root cause (the network responsible) of path changes affecting its prefixes. First, we develop a new model describing path changes and use it to provably identify the set of all potentially responsible networks. Next, we develop a recursive algorithm that accurately isolates the root cause of any path change. We observe that the algorithm requires monitoring paths that are generally not visible using standard measurement tools. To address this limitation, we combine existing measurement tools in new ways to acquire path information required for isolating the root cause of a path change. We evaluate PoiRoot on path changes obtained through controlled Internet experiments, simulations, and ‘in the wild ’ measurements. We demonstrate that Poi-Root is highly accurate, works well even with partial information, and generally narrows down the root cause to a single network or two neighboring ones. On controlled experiments PoiRoot is 100% accurate, as opposed to prior work which is accurate only 61.7 % of the time.
(Show Context)

Citation Context

...isibility into the policies in use [23]. An understanding of how path changes ripple through the Internet could prove helpful in developing new protocols for routing, for distributing routing updates =-=[14]-=-, or for moving toward a more stable Internet. The goal of this work is to accurately isolate the root cause of a path change within minutes of it happening. For our purposes, the root cause is the ne...

LOUP: Who’s Afraid of the Big Bad Loop?

by Nikola Gvozdiev, Brad Karp, Mark H
"... We consider the intra-AS route dissemination problem from first principles, and illustrate that when known route dissemination techniques propagate even a single external routing change, they can cause transient anomalies. These anomalies are not fundamental; they are artifacts of the order in which ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
We consider the intra-AS route dissemination problem from first principles, and illustrate that when known route dissemination techniques propagate even a single external routing change, they can cause transient anomalies. These anomalies are not fundamental; they are artifacts of the order in which existing proposals disseminate routes. We show that carefully ordering route updates avoids transient looping and black holes. Perhaps surprisingly, this ordering may be enforced in a completely distributed fashion, while retaining familiar correctness, scalability, and convergence properties.
(Show Context)

Citation Context

...equences updates before sending, and all routers store changes in log-like structures to deal with message loss which may occur in the presence of failures. We have tested this mechanism exhaustively =-=[7]-=-. Note that LOUP is only concerned with distribution of routing information within the AS. It is entirely compatible with eBGP, does not change the decision process and works with any attribute, inclu...

PEERING: An AS for Us

by On Schlinker, Kyriakos Zarifis, Italo Cunha, Nick Feamster, Ethan Katz-bassett
"... Internet routing suffers from persistent and transient failures, circuitous routes, oscillations, and prefix hijacks. A ma-jor impediment to progress is the lack of ways to conduct impactful interdomain research. Most research is based ei-ther on passive observation of existing routes, keeping re-se ..."
Abstract - Add to MetaCart
Internet routing suffers from persistent and transient failures, circuitous routes, oscillations, and prefix hijacks. A ma-jor impediment to progress is the lack of ways to conduct impactful interdomain research. Most research is based ei-ther on passive observation of existing routes, keeping re-searchers from assessing how the Internet will respond to route or policy changes; or simulations, which are restricted by limitations in our understanding of topology and policy. We propose a new class of interdomain research: re-searchers can instantiate an AS of their choice, including its intradomain topology and interdomain interconnectivity, and connect it with the “live ” Internet to exchange routes and traffic with real interdomain neighbors. Instead of be-ing observers of the Internet ecosystem, researchers become members. Towards this end, we present the PEERING testbed. In its nascent stage, the testbed has proven extremely useful, resulting in a series of studies that were nearly impossible for researchers to conduct in the past. In this paper, we present a vision of what the testbed can provide. We sketch how to extend the testbed to enable future innovation, taking advan-tage of the rise of IXPs to expand our testbed.
(Show Context)

Citation Context

...or only on interacting with other ASes [37, 52]. Example research. Without a testbed with both capabilities, earlier work on the interplay between interdomain and intradomain routing used simulations =-=[20]-=-. In contrast, a researcher is using PEERING to study man-in-the-middle hijacks, in which an attacker uses BGP to intercept traffic to inspect before forwarding it to the destination [44]. Emulating a...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University