2010
DOI: 10.1109/jsac.2010.101004
|View full text |Cite
|
Sign up to set email alerts
|

Routing Scalability: An Operator's View

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(36 citation statements)
references
References 3 publications
0
35
0
Order By: Relevance
“…Furthermore, the lower bound remains firm as long as we do not have control over the allocation of node ids and thereby the order of symbols in s v is essentially random 3 . The entropy bound is computable for any graph at least empirically: we just need to obtain the forwarding functions and then evaluate the entropy over the port id distribution, which can certainly be done with enough computing power at hand; the results are verifiable as we can easily evaluate the entropy on real forwarding table traces from production routers (see later); and the model is also implementable in actual router hardware, even though current wavelet tree implementations' performance might lag behind a bit (but see [10] on how to overcome this issue).…”
Section: The Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the lower bound remains firm as long as we do not have control over the allocation of node ids and thereby the order of symbols in s v is essentially random 3 . The entropy bound is computable for any graph at least empirically: we just need to obtain the forwarding functions and then evaluate the entropy over the port id distribution, which can certainly be done with enough computing power at hand; the results are verifiable as we can easily evaluate the entropy on real forwarding table traces from production routers (see later); and the model is also implementable in actual router hardware, even though current wavelet tree implementations' performance might lag behind a bit (but see [10] on how to overcome this issue).…”
Section: The Modelmentioning
confidence: 99%
“…Yet, it seems very likely that we can cope in the long term, by leveraging Moore's Law or, say, moving BGP entirely to the cloud [2]. In reality it is the data plane, with its custom line card ASICs and SRAM modules and stringent real-time performance requirements, where Internet scalability issues manifest themselves most markedly [3,4]. And even though subject to concentrated research efforts [5] and heated debates [6,7], there is still no clear answer to the question as to whether the Internet routing architecture will scale to the foreseeable future.…”
Section: Introductionmentioning
confidence: 99%
“…Handling the initial traffic is a major concern for deploying cache mechanisms [17]. To address this issue effectively, we fill up the initial empty cache with a set of leaf prefixes from the FIB that cover the most IP addresses.…”
Section: Cache Operationsmentioning
confidence: 99%
“…One of the biggest concerns for ISPs is how to handle the initial traffic when the cache starts with an empty set [17]. Instead of a cold start, we fill the initial empty cache completely with the shortest non-overlapping prefixes if there is no history of popular prefixes available.…”
Section: Initial Traffic Handlingmentioning
confidence: 99%
See 1 more Smart Citation