skip to main content
10.1145/1015467.1015472acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Routing design in operational networks: a look from the inside

Published: 30 August 2004 Publication History

Abstract

In any IP network, routing protocols provide the intelligence that takes a collection of physical links and transforms them into a network that enables packets to travel from one host to another. Though routing design is arguably the single most important design task for large IP networks, there has been very little systematic investigation into how routing protocols are actually used in production networks to implement the goals of network architects. We have developed a methodology for reverse engineering a coherent global view of a network's routing design from the static analysis of dumps of the local configuration state of each router. Starting with a set of 8,035 configuration files, we have applied this method to 31 production networks. In this paper we present a detailed examination of how routing protocols are used in operational networks. In particular, the results show the conventional model of "interior" and "exterior" gateway protocols is insufficient to describe the diverse set of mechanisms used by architects, and we provide examples of the more unusual designs and examine their trade-offs. We discuss the strengths and weaknesses of our methodology, and argue that it opens paths towards new understandings of network behavior and design.

References

[1]
D. Eastlake 3rd and P. Jones. RFC 3174 - US Secure Hash Algorithm 1 (SHA1), 2001. Available from http://www.ietf.org/rfcs/rfc3174.html.]]
[2]
CAIDA. http://www.caida.org/tools/measurement/skitter/, 2000.]]
[3]
Don Caldwell, Anna Gilbert, Joel Gottlieb, Albert Greenberg, Gisli Hjalmtysson, and Jennifer Rexford. The cutting EDGE of IP router configuration. In Second Workshop on Hot Topics in Networks (HotNets-II), November 2003.]]
[4]
R. Callon. RFC 1195 - Use of OSI IS-IS for routing in TCP/IP and dual environments, 1990.]]
[5]
Anja Feldmann, Albert Greenberg, Carsten Lund, Nick Reingold, and Jennifer Rexford. Netscope: Traffic engineering for IP networks. IEEE Network Magazine, pages 11--19, March 2000.]]
[6]
P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. Internet Engineering Task Force, January 1998. RFC 2267.]]
[7]
Lixin Gao and Feng Wang. The extent of AS path inflation by routing policies. In Proceedings of Global Internet 2002, 2002.]]
[8]
Ramesh Govindan and Hongsuda Tangmunarunkit. Heuristics for internet map discovery. In IEEE INFOCOM 2000, pages 1371--1380, Tel Aviv, Israel, March 2000. IEEE.]]
[9]
Timothy Griffin, F. Bruce Shepherd, and Gordon T. Wilfong. Policy disputes in path-vector protocols. In Proceedings of the 7th Annual International Conference on Network Protocols, pages 21--30, Toronto, Canada, November 1999.]]
[10]
Timothy G. Griffin and Gordon T. Wilfong. An analysis of BGP convergence properties. In Proceedings of SIGCOMM, pages 277--288, Cambridge, MA, August 1999.]]
[11]
DMTF Networks~Working Group. http://www.dmtf.org/standards/cim/cim_schema_v27.]]
[12]
Sam Halabi and Danny McPherson. Internet Routing Architectures. Cisco Press, 2001.]]
[13]
C. Hedrick. RFC 1058 - Routing Information Protocol, 1988.]]
[14]
OPNET~Technologies Inc. http://www.mil3.com/products/home.html.]]
[15]
Packet~Design Inc. http://www.packetdesign.com.]]
[16]
D. E. Knuth. An empirical study of FORTRAN programs. Software - Practice and Experience, 1(2):105--133, April-June 1971.]]
[17]
David A. Maltz, Jibin Zhan, Geoffrey Xie, Hui Zhang, Gisli Hjalmtysson, Albert Greenberg, and Jennifer Rexford. Structure preserving anonymization of router configuration data. Technical Report CMU-CS-04-149, Carnegie Mellon University, 2004.]]
[18]
David Meyer and University of~Oregon Route Views~Project. http://antc.uoregon.edu/route-views/.]]
[19]
Greg Minshall. tcpdpriv - remove private information from a tcpdump -w file. Software distribution available from http://ita.ee.lbl.gov/html/contrib/tcpdpriv.html, 1997.]]
[20]
J. Moy. RFC 2178 - OSPF Version 2, 1997.]]
[21]
Vern Paxson. End-to-end routing behavior in the Internet. IEEE\slash ACM Transactions on Networking, 5(5):601--615, 1997.]]
[22]
Y. Rekhter and T. Li. RFC 1771 - A Border Gateway Protocol 4 (BGP-4), 1995.]]
[23]
ITU-T M series recommendations. http://www.itu.int/rec/recommendation.asp-?type=products&lang=e&parent=T-REC-M.]]
[24]
A. Shaikh, L. Kalampoukas, R. Dube, and A. Varma. Routing stability in congested networks: Experimentation and analysis. In Proc. ACM SIGCOMM'00, pages 163--174, Stockholm, Sweden, 2000.]]
[25]
N. Spring, R. Mahajan, and D. Wetherall. Measuring ISP topologies with Rocketfuel. In Proc. ACM SIGCOMM, August 2002.]]
[26]
Cisco Systems. Enhanced IGRP. http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/en_igrp.htm.]]
[27]
Geoffrey Xie, Jibin Zhan, David~A. Maltz, Hui Zhang, Albert Greenberg, Gisli Hjalmtysson, and Jennifer Rexford. On static reachability analysis of IP networks. Technical Report CMU-CS-04-146, Carnegie Mellon University, 2004.]]
[28]
Tatu Ylonen. Thoughts on how to mount an attack on tcpdpriv's "-a50" option... Web White Paper available from http://ita.ee.lbl.gov/html/contrib/attack50/attack50.html.]]

Cited By

View all
  • (2020)TiramisuProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388257(201-220)Online publication date: 25-Feb-2020
  • (2020)Detecting network load violations for distributed control planesProceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation10.1145/3385412.3385976(974-988)Online publication date: 11-Jun-2020
  • (2019)Synthesis of Fault-Tolerant Distributed Router ConfigurationsACM SIGMETRICS Performance Evaluation Review10.1145/3308809.330885346:1(87-89)Online publication date: 17-Jan-2019
  • Show More Cited By

Index Terms

  1. Routing design in operational networks: a look from the inside

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCOMM '04: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
    August 2004
    402 pages
    ISBN:1581138628
    DOI:10.1145/1015467
    • cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 34, Issue 4
      October 2004
      385 pages
      ISSN:0146-4833
      DOI:10.1145/1030194
      Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 August 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. network modeling
    2. reverse engineering
    3. routing design
    4. static configuration analysis

    Qualifiers

    • Article

    Conference

    SIGCOMM04
    Sponsor:
    SIGCOMM04: ACM SIGCOMM 2004 Conference
    August 30 - September 3, 2004
    Oregon, Portland, USA

    Acceptance Rates

    Overall Acceptance Rate 462 of 3,389 submissions, 14%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)107
    • Downloads (Last 6 weeks)19
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)TiramisuProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388257(201-220)Online publication date: 25-Feb-2020
    • (2020)Detecting network load violations for distributed control planesProceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation10.1145/3385412.3385976(974-988)Online publication date: 11-Jun-2020
    • (2019)Synthesis of Fault-Tolerant Distributed Router ConfigurationsACM SIGMETRICS Performance Evaluation Review10.1145/3308809.330885346:1(87-89)Online publication date: 17-Jan-2019
    • (2018)Synthesis of Fault-Tolerant Distributed Router ConfigurationsACM SIGMETRICS Performance Evaluation Review10.1145/3292040.321965246:1(87-89)Online publication date: 12-Jun-2018
    • (2018)Synthesis of Fault-Tolerant Distributed Router ConfigurationsAbstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems10.1145/3219617.3219652(87-89)Online publication date: 12-Jun-2018
    • (2018)Software Resolved NetworksProceedings of the Symposium on SDN Research10.1145/3185467.3185471(1-14)Online publication date: 28-Mar-2018
    • (2018)Synthesis of Fault-Tolerant Distributed Router ConfigurationsProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/31794252:1(1-26)Online publication date: 3-Apr-2018
    • (2017)MINOSProceedings of the ACM Turing 50th Celebration Conference - China10.1145/3063955.3063996(1-10)Online publication date: 12-May-2017
    • (2016)Efficient network reachability analysis using a succinct control plane representationProceedings of the 12th USENIX conference on Operating Systems Design and Implementation10.5555/3026877.3026895(217-232)Online publication date: 2-Nov-2016
    • (2016)RobotronProceedings of the 2016 ACM SIGCOMM Conference10.1145/2934872.2934874(426-439)Online publication date: 22-Aug-2016
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media