2011
DOI: 10.1145/2043164.2018473
|View full text |Cite
|
Sign up to set email alerts
|

Seamless network-wide IGP migrations

Abstract: Network-wide migrations of a running network, such as the replacement of a routing protocol or the modification of its configuration, can improve the performance, scalability, manageability, and security of the entire network. However, such migrations are an important source of concerns for network operators as the reconfiguration campaign can lead to long and service-affecting outages. In this paper, we propose a methodology which addresses the problem of seamlessly modifying the configuration of commonly use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…We then generate a replacement constraint forcing any of the nodes in L init to be updated before any of the nodes in L f in . This has already been proved to prevent evil loops during the update [30]. Also, we generalize the intuition used in Fig.…”
Section: A Forwarding Correctness Constraintsmentioning
confidence: 70%
See 1 more Smart Citation
“…We then generate a replacement constraint forcing any of the nodes in L init to be updated before any of the nodes in L f in . This has already been proved to prevent evil loops during the update [30]. Also, we generalize the intuition used in Fig.…”
Section: A Forwarding Correctness Constraintsmentioning
confidence: 70%
“…Consider any potential evil loop L for flow f , as obtained by enumerating cycles in the graph G i f ∪ G t f . For replacement constraints, we adopt an approach similar to [30]:…”
Section: A Forwarding Correctness Constraintsmentioning
confidence: 99%
“…There is a considerable amount of prior work on modeling individual routing protocols, particularly BGP [3,8,12,14], and also OSPF [21], to ensure correct, safe, and efficient behaviors from these protocols. There is also recent progress on safe migration of IGP protocols [25] and on modeling the interaction between multiple routing algorithms deployed in the same network [4]. In contrast, our work analyzes how specific routing protocols and primitives should be combined to meet a given set of design objectives, and the focus is on minimizing the complexity of the resulting design.…”
Section: Related Workmentioning
confidence: 99%
“…A top-down approach such as ours has several advantages. By working with design primitives directly (independent of router configuration files), the model is useful not only for analyzing an existing network, but also for "what if" analysis capable of optimizing the design of a new network and similarly, a network migration [25], or evaluating the potential impact of a change to network design. Further, our models help provide a conceptual framework to understand the underlying factors that contribute to configuration complexity.…”
Section: Introductionmentioning
confidence: 99%
“…Gabner et al (2011) investigated service component migration between the mobile client and the infrastructure-based cloud as a means to avoid service failures and improve service performance. Vanbever et al (2011) proposed router grafting, where parts of a router are seamlessly removed from one router and merged into another, allowing a network operator to rehome a customer with no disruption. To improve the reliability and efficiency of a system in the pervasive computing domain, Cai et al (2013) proposed a service-oriented intelligent seamless migration (SOISM) mechanism and algorithm.…”
Section: Introductionmentioning
confidence: 99%