skip to main content
10.1145/1015467.1015472acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

Routing design in operational networks: a look from the inside

Published:30 August 2004Publication History

ABSTRACT

In any IP network, routing protocols provide the intelligence that takes a collection of physical links and transforms them into a network that enables packets to travel from one host to another. Though routing design is arguably the single most important design task for large IP networks, there has been very little systematic investigation into how routing protocols are actually used in production networks to implement the goals of network architects. We have developed a methodology for reverse engineering a coherent global view of a network's routing design from the static analysis of dumps of the local configuration state of each router. Starting with a set of 8,035 configuration files, we have applied this method to 31 production networks. In this paper we present a detailed examination of how routing protocols are used in operational networks. In particular, the results show the conventional model of "interior" and "exterior" gateway protocols is insufficient to describe the diverse set of mechanisms used by architects, and we provide examples of the more unusual designs and examine their trade-offs. We discuss the strengths and weaknesses of our methodology, and argue that it opens paths towards new understandings of network behavior and design.

References

  1. D. Eastlake 3rd and P. Jones. RFC 3174 - US Secure Hash Algorithm 1 (SHA1), 2001. Available from http://www.ietf.org/rfcs/rfc3174.html.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. CAIDA. http://www.caida.org/tools/measurement/skitter/, 2000.]]Google ScholarGoogle Scholar
  3. Don Caldwell, Anna Gilbert, Joel Gottlieb, Albert Greenberg, Gisli Hjalmtysson, and Jennifer Rexford. The cutting EDGE of IP router configuration. In Second Workshop on Hot Topics in Networks (HotNets-II), November 2003.]]Google ScholarGoogle Scholar
  4. R. Callon. RFC 1195 - Use of OSI IS-IS for routing in TCP/IP and dual environments, 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Anja Feldmann, Albert Greenberg, Carsten Lund, Nick Reingold, and Jennifer Rexford. Netscope: Traffic engineering for IP networks. IEEE Network Magazine, pages 11--19, March 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. Internet Engineering Task Force, January 1998. RFC 2267.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lixin Gao and Feng Wang. The extent of AS path inflation by routing policies. In Proceedings of Global Internet 2002, 2002.]]Google ScholarGoogle Scholar
  8. Ramesh Govindan and Hongsuda Tangmunarunkit. Heuristics for internet map discovery. In IEEE INFOCOM 2000, pages 1371--1380, Tel Aviv, Israel, March 2000. IEEE.]]Google ScholarGoogle ScholarCross RefCross Ref
  9. Timothy Griffin, F. Bruce Shepherd, and Gordon T. Wilfong. Policy disputes in path-vector protocols. In Proceedings of the 7th Annual International Conference on Network Protocols, pages 21--30, Toronto, Canada, November 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Timothy G. Griffin and Gordon T. Wilfong. An analysis of BGP convergence properties. In Proceedings of SIGCOMM, pages 277--288, Cambridge, MA, August 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. DMTF Networks~Working Group. http://www.dmtf.org/standards/cim/cim_schema_v27.]]Google ScholarGoogle Scholar
  12. Sam Halabi and Danny McPherson. Internet Routing Architectures. Cisco Press, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Hedrick. RFC 1058 - Routing Information Protocol, 1988.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. OPNET~Technologies Inc. http://www.mil3.com/products/home.html.]]Google ScholarGoogle Scholar
  15. Packet~Design Inc. http://www.packetdesign.com.]]Google ScholarGoogle Scholar
  16. D. E. Knuth. An empirical study of FORTRAN programs. Software - Practice and Experience, 1(2):105--133, April-June 1971.]]Google ScholarGoogle ScholarCross RefCross Ref
  17. David A. Maltz, Jibin Zhan, Geoffrey Xie, Hui Zhang, Gisli Hjalmtysson, Albert Greenberg, and Jennifer Rexford. Structure preserving anonymization of router configuration data. Technical Report CMU-CS-04-149, Carnegie Mellon University, 2004.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. David Meyer and University of~Oregon Route Views~Project. http://antc.uoregon.edu/route-views/.]]Google ScholarGoogle Scholar
  19. Greg Minshall. tcpdpriv - remove private information from a tcpdump -w file. Software distribution available from http://ita.ee.lbl.gov/html/contrib/tcpdpriv.html, 1997.]]Google ScholarGoogle Scholar
  20. J. Moy. RFC 2178 - OSPF Version 2, 1997.]]Google ScholarGoogle Scholar
  21. Vern Paxson. End-to-end routing behavior in the Internet. IEEE\slash ACM Transactions on Networking, 5(5):601--615, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Y. Rekhter and T. Li. RFC 1771 - A Border Gateway Protocol 4 (BGP-4), 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. ITU-T M series recommendations. http://www.itu.int/rec/recommendation.asp-?type=products&lang=e&parent=T-REC-M.]]Google ScholarGoogle Scholar
  24. A. Shaikh, L. Kalampoukas, R. Dube, and A. Varma. Routing stability in congested networks: Experimentation and analysis. In Proc. ACM SIGCOMM'00, pages 163--174, Stockholm, Sweden, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. N. Spring, R. Mahajan, and D. Wetherall. Measuring ISP topologies with Rocketfuel. In Proc. ACM SIGCOMM, August 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Cisco Systems. Enhanced IGRP. http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/en_igrp.htm.]]Google ScholarGoogle Scholar
  27. Geoffrey Xie, Jibin Zhan, David~A. Maltz, Hui Zhang, Albert Greenberg, Gisli Hjalmtysson, and Jennifer Rexford. On static reachability analysis of IP networks. Technical Report CMU-CS-04-146, Carnegie Mellon University, 2004.]]Google ScholarGoogle Scholar
  28. Tatu Ylonen. Thoughts on how to mount an attack on tcpdpriv's "-a50" option... Web White Paper available from http://ita.ee.lbl.gov/html/contrib/attack50/attack50.html.]]Google ScholarGoogle Scholar

Index Terms

  1. Routing design in operational networks: a look from the inside

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCOMM '04: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
      August 2004
      402 pages
      ISBN:1581138628
      DOI:10.1145/1015467
      • cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 34, Issue 4
        October 2004
        385 pages
        ISSN:0146-4833
        DOI:10.1145/1030194
        Issue’s Table of Contents

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 August 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate554of3,547submissions,16%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader