2008
DOI: 10.1109/mnet.2008.4626233
|View full text |Cite
|
Sign up to set email alerts
|

Improving the Performance of Route Control Middleboxes in a Competitive Environment

Abstract: 56 0890-8044/08/$25.00 © 2008 IEEE oday, the vast majority of the communications on the Internet are between nodes located in non-transit (i.e., stub) networks. Stub networks are primarily composed of medium and large enterprise customers, universities, public administrations, content service providers (CSPs), and small Internet service providers (ISPs). These networks exploit a widespread practice called multihoming, which consists of using multiple external links to connect to different transit providers. By… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…In this regard, our basic idea is to benefit from the LISP Map-Server functionality and related protocols, which enable us to build mapping strategies to conceal intra and interdomain traffic engineering objectives, using our previous experience in Intelligent Route Control (IRC) [16] and PCEbased TE [17]. Online computation and provisioning of mappings based on TE policies may be achieved using IRClike techniques, Constraint-Based Routing algorithms and/or classical optimization techniques, such as the IDIPS prototype implementation [18].…”
Section: Discussionmentioning
confidence: 99%
“…In this regard, our basic idea is to benefit from the LISP Map-Server functionality and related protocols, which enable us to build mapping strategies to conceal intra and interdomain traffic engineering objectives, using our previous experience in Intelligent Route Control (IRC) [16] and PCEbased TE [17]. Online computation and provisioning of mappings based on TE policies may be achieved using IRClike techniques, Constraint-Based Routing algorithms and/or classical optimization techniques, such as the IDIPS prototype implementation [18].…”
Section: Discussionmentioning
confidence: 99%
“…Some work deals with fixing the oscillation problems that may arise when multiple MRC devices serving different stub networks operate in parallel [20,41]. As the controllers of each MRC device are selfish, it may occur that all devices coincide in rerouting traffic to the best available path.…”
Section: Related Workmentioning
confidence: 99%
“…We argue that tools like constraintbased routing (CBR) (for the intradomain part) and an IRM engine borrowing concepts from IRC techniques [6] (for the interdomain part) can work together to accomplish these objectives. At least two appealing solutions can be sketched to drive the intradomain traffic according to the ISP policies.…”
Section: Lisp-based Te Opportunities For Lamentioning
confidence: 99%
“…The algorithms used to determine the ingress RLOC (RLOC S ) are inherently the same used today by IRC techniques [6]. The E Sto-RLOC S mapping computation is performed by the IRM module of LCB S .…”
Section: Architecturementioning
confidence: 99%
See 1 more Smart Citation