2013 21st IEEE International Conference on Network Protocols (ICNP) 2013
DOI: 10.1109/icnp.2013.6733584
|View full text |Cite
|
Sign up to set email alerts
|

Using routers to build logic circuits: How powerful is BGP?

Abstract: Abstract-Because of its practical relevance, the Border Gateway Protocol (BGP) has been the target of a huge research effort since more than a decade. In particular, many contributions aimed at characterizing the computational complexity of BGPrelated problems. In this paper, we answer computational complexity questions by unveiling a fundamental mapping between BGP configurations and logic circuits. Namely, we describe simple networks containing routers with elementary BGP configurations that simulate logic g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…Deciding whether a given iBGP configuration can lead to routing instabilities is computationally hard even when no iBGP policies are applied and a single prefix is considered [24]. Nevertheless, previous work [7], [8], [25] has shown that, in the absence of iBGP policies, the intrinsic complexity of the configuration check turns out to be manageable in practice through a heuristic-based approach.…”
Section: Checker For Ibgp Policy Configurationsmentioning
confidence: 95%
“…Deciding whether a given iBGP configuration can lead to routing instabilities is computationally hard even when no iBGP policies are applied and a single prefix is considered [24]. Nevertheless, previous work [7], [8], [25] has shown that, in the absence of iBGP policies, the intrinsic complexity of the configuration check turns out to be manageable in practice through a heuristic-based approach.…”
Section: Checker For Ibgp Policy Configurationsmentioning
confidence: 95%
“…We are not the first to use simulationtechniques to investigate the computational power of restricted network types. Chiesa et al [5], for example, show how to implement arbitrary logical circuits using networks with routers implementing simple Border Gateway Protocol (BGP) configurations. The implication is that (in theory) BGP can solve the same problems as a Turing Machine.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, Perešíni and Kostić [20] show how to simulate a Rule 110 cellular automaton in a general network model (though they note that these automaton are only "the first step towards efficiently emulating tape-bounded Turing machines"-the latter being the result we achieve in our SDN model). We adopt this same general approach of simulating a more powerful computational formalism in a restricted network, but the specific techniques we use differ from [20,5,8,10] due to the different assumptions we make concerning our network's operation and/or different goals for the simulation.…”
Section: Related Workmentioning
confidence: 99%