Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
DOI: 10.1109/infcom.2005.1498520
|View full text |Cite
|
Sign up to set email alerts
|

Limiting path exploration in GBP

Abstract: Slow convergence in the lnternet can be directly attributed to the "path exploration" phenomenon, inherent in aU path vector protocols. The root cause €or path exploration is the dependency among paths propagated through the network. Addressing this problem in BGP is particularly dimcult as the AS paths exchanged between BGP routers are highly summarized. In this paper, we describe why path exploration cannot be countered effectively within the existing BGP framework, and propose a simple, novel mechanism-forw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
73
0
2

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 64 publications
(75 citation statements)
references
References 17 publications
0
73
0
2
Order By: Relevance
“…We also carried out simulations with different topologies and failure scenarios, which we had to omit for lack of space. These results are presented in a related paper [4]. …”
Section: Service Gateway Routing Protocolmentioning
confidence: 76%
See 2 more Smart Citations
“…We also carried out simulations with different topologies and failure scenarios, which we had to omit for lack of space. These results are presented in a related paper [4]. …”
Section: Service Gateway Routing Protocolmentioning
confidence: 76%
“…This is a departure from the IP addressing scheme, where a "cloud" (network domain) is assigned a contiguous range of addresses (address block or network prefix). Each service cloud can be roughly thought of as corresponding to an organization currently having a second tier (e.g., yahoo.com, msn.com, real.com) or third tier (e.g., shop.msn.com, nu.ac.cn) domain name 4 . Such domain names will be retained in our SOI architecture as the names of service clouds, and are referred to as service names.…”
Section: Addressing and Name Resolutionmentioning
confidence: 99%
See 1 more Smart Citation
“…These solutions rely on the utilization of new BGP attributes. The most complete ones are BGP RCN proposed by Pei et al [19] and EPIC proposed by Chandrashekar et al [20], but are not currently deployed. Our solution complements these approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Importantly, TIDR will not create traffic black-holes due to the localization of transient failures. By combining these two mechanisms, TIDR achieves superior performance over BGP and other existing enhancements to BGP including Ghost Flushing and EPIC [12], [13] in terms of Internet routing stability.…”
Section: Introductionmentioning
confidence: 99%