2010
DOI: 10.1016/j.comcom.2010.01.011
|View full text |Cite
|
Sign up to set email alerts
|

BGP route prediction within ISPs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…Nevertheless, previous work [7], [8], [25] has shown that, in the absence of iBGP policies, the intrinsic complexity of the configuration check turns out to be manageable in practice through a heuristic-based approach. In the following, we show that, luckily, routing instabilities can be efficiently detected even in the presence of iBGP policies.…”
Section: Checker For Ibgp Policy Configurationsmentioning
confidence: 95%
See 1 more Smart Citation
“…Nevertheless, previous work [7], [8], [25] has shown that, in the absence of iBGP policies, the intrinsic complexity of the configuration check turns out to be manageable in practice through a heuristic-based approach. In the following, we show that, luckily, routing instabilities can be efficiently detected even in the presence of iBGP policies.…”
Section: Checker For Ibgp Policy Configurationsmentioning
confidence: 95%
“…Configuration languages also allow operators to configure policies in iBGP by instructing routers to change attributes in BGP messages. Both theoretical [4] and practical [7], [8] previous contributions assumed that BGP messages are exclusively manipulated at the border of ISPs' networks to express eBGP policies. The possibility to change iBGP attributes en route is taken into account only in [9].…”
Section: Introductionmentioning
confidence: 99%
“…Most of the existing literature (e.g., [2], [7], [9]) assumes that iBGP acts as a simple dispatcher of inter-domain routes, with routing policies applied exclusively to eBGP sessions. However, a significant amount of ISPs do apply iBGP policies [3], in the sense that they intentionally modify attributes on iBGP messages, e.g., to increase internal routing flexibility and improve traffic engineering.…”
Section: Ibgp Policiesmentioning
confidence: 99%
“…While eBGP routing policies are deeply studied (e.g., [2], [4], [5]), few things are known about iBGP policies. Nevertheless, estimating the popularity of iBGP policies has important implications [6] on the applicability of previously proposed theoretical insights (e.g., [7]), protocol enhancements (e.g., [8]), and tools (e.g., [9]), which assume that policies are applied solely in eBGP.…”
Section: Introductionmentioning
confidence: 99%
“…Results of such an effort encompass formal analyses of the protocol (e.g., [2], [3]), experimental measurements of disruptions due to BGP (e.g., [4], [5]), proposal of configuration guidelines (e.g., [6]) and of protocol modifications (e.g., [7]), and practical approaches to check a given configuration for correctness (e.g., [8], [9]). However, all previous studies missed a fundamental analogy: Basic BGP configurations can encode elementary logic gates but also, memory and clock components.…”
Section: Introduction and Related Workmentioning
confidence: 99%