1993
DOI: 10.17487/rfc1519
|View full text |Cite
|
Sign up to set email alerts
|

Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
159
0
8

Year Published

1995
1995
2007
2007

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 312 publications
(168 citation statements)
references
References 1 publication
1
159
0
8
Order By: Relevance
“…To minimize the size of the routing table, IP addresses are assigned in blocks based on their prefixes [41]. As a result, the size of the largest routing tables today is about 70,000 entries [122], which is three orders of magnitude smaller than the total number of hosts, which is about 72 million [89].…”
Section: Routing Lookupmentioning
confidence: 99%
See 1 more Smart Citation
“…To minimize the size of the routing table, IP addresses are assigned in blocks based on their prefixes [41]. As a result, the size of the largest routing tables today is about 70,000 entries [122], which is three orders of magnitude smaller than the total number of hosts, which is about 72 million [89].…”
Section: Routing Lookupmentioning
confidence: 99%
“…While this factor may not be significant if k is small, a more serious issue that potentially limits the scalability of the algorithm is that in its basic form it requires that an entry be maintained for each destination, where in reality, to achieve scalability, routers really maintain the longest-prefix of a group of destinations that share the same route [41]. Since our algorithm works in the context of one ISP, we can maintain an entry for each egress node instead of each destination.…”
Section: Scalabilitymentioning
confidence: 99%
“…The simplest example of such dependency can be seen in an IP address following the Classless Inter-Domain Routing (CIDR) scheme [10], [16] Access lists illustrate yet another parameter relationship: once an access list is created, an identifier is provided for it. This identifier must then be used to attach the access list to a specific interface.…”
Section: Dependencies At Service Configuration Levelmentioning
confidence: 99%
“…Extrapolations showed that with continued growth, this would inevitably lead to routing tables and routing traffic throughout the Internet expanding beyond all reasonable bounds. [20]. Secondly, address blocks are now in general allocated to Internet service providers, not directly to user sites.…”
Section: Scaling the Current Routing And Addressing Systemmentioning
confidence: 99%