2010 Proceedings IEEE INFOCOM 2010
DOI: 10.1109/infcom.2010.5461923
|View full text |Cite
|
Sign up to set email alerts
|

On the Feasibility and Efficacy of Protection Routing in IP Networks

Abstract: With network components increasingly reliable, routing is playing an ever greater role in determining network reliability. This has spurred much activity in improving routing stability and reaction to failures, and rekindled interest in centralized routing solutions, at least within a single routing domain. Centralizing decisions eliminates uncertainty and many inconsistencies, and offers added flexibility in computing routes that meet different criteria. However, it also introduces new challenges; especially … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
72
0
2

Year Published

2011
2011
2015
2015

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 42 publications
(74 citation statements)
references
References 16 publications
0
72
0
2
Order By: Relevance
“…Protection routing [25] is different from the others in the sense that routers are only responsible for packet forwarding but routing information is stored in a central server. The server calculates a set of different routing trees, not necessarily coincident with shortest paths, accompanied with a carefully chosen set of secondary next-hops for each node that can be used when the primary next-hop disappears.…”
Section: Related Workmentioning
confidence: 99%
“…Protection routing [25] is different from the others in the sense that routers are only responsible for packet forwarding but routing information is stored in a central server. The server calculates a set of different routing trees, not necessarily coincident with shortest paths, accompanied with a carefully chosen set of secondary next-hops for each node that can be used when the primary next-hop disappears.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, there are methods, which use explicit tunneling to avoid the failed components [7,17,36,6]. Proposals in [43,37] have topological requirements, whilst the mechanism proposed in [29] uses a central server to pre-compute forwarding decisions for common failure scenarios and download them into the routers. Accordingly, at the moment none of these proposals is available in IP routers, since they need modifications to the existing protocols, making LFA the only deployable option for ISPs.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…Such analysis is crucial, as it helps uncover the graph theoretical ingredients needed for good LFA coverage. Possibly the closest to ours is the study in [12], where the authors perform a qualitative protectability analysis for a fast resilience scheme they call IP protection routing. Protection routing is appealing for such an analysis as it is theoretically much easier to approach than LFA, however, in practice it is somewhat less attractive as implementing it requires centralized control over the routing tables.…”
Section: Related Workmentioning
confidence: 99%
“…In the first part, we give new graph theoretical tools for analyzing LFA failure case coverage in operational networks. Similar protectability analyses are already available for some non-standardized IPFRR mechanisms: [11] considers the O2 method and [12] discusses a centralized destinationbased routing scheme. For LFA, only simulation-based reports have been available this far [13]- [16], but a mathematical apparatus for LFA coverage analysis is still missing.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation