skip to main content
10.1145/1544012.1544021acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Instability free routing: beyond one protocol instance

Published: 09 December 2008 Publication History

Abstract

Today, a large body of research exists regarding the correctness of routing protocols. However, many reported global disruptions of Internet connectivity, e.g., inter-AS persistent loops, cannot be explained by looking at a single routing protocol at a time. In fact, these anomalies have long been suspected in the operator community to be caused by the interactions between routing protocols. The interactions between protocol instances are governed by two procedures at the border routers: route selection (RS) ranks routes from different protocol instances; and route redistribution (RR) exchanges routes between protocol instances. Prior studies hypothesized that RR may be responsible for a portion of the observed anomalies. In this paper, we provide analytical and experimental results to link RS, RR, and their interplay to anomalies discovered in operational networks. We show that RS by itself can cause route oscillations and loops, and that in all Cisco, Quagga, and XORP implementations, non-deterministic behaviors may occur because of their incorrect modeling of the dependencies between RS and RR. We identify the root cause for each of the instabilities and derive a configuration guideline as well as a functional model to eliminate them.

References

[1]
100x100 Clean Slate Project. www.100x100network.org.
[2]
4D Project. www.cs.cmu.edu/~4D.
[3]
National Science Fundation NeTS Future Internet Design (FIND). www.nets-find.net.
[4]
Quagga Software Routing Suite. www.quagga.net.
[5]
XORP: eXtensible Open Router Platform. www.xorp.org.
[6]
A. Basu, C.-H. L. Ong, A. Rasala, B. Shepherd, and G. Wilfong. Route oscillations in I-BGP with route reflection. In Proc. ACM SIGCOMM, 2002.
[7]
E. Chen and J. Yuan. Deterministic Route Redistribution into BGP. Internet Draft, draft-chen-redist-00.txt, 2004.
[8]
Cisco. Implementing RIB on Cisco IOS XR Software.
[9]
Cisco. The "%TUN-5-RECURDOWN" Error Message and Flapping EIGRP/OSPF/BGP Neighbors Over a GRE Tunnel, 2005.
[10]
Cisco. BGP Best Path Selection Algorithm, 2006.
[11]
Cisco. OSPF Redistribution Among Different OSPF Processes, 2006.
[12]
Cisco. Redistributing Routing Protocols, 2006.
[13]
Cisco. Route Selection in Cisco Routers, 2006.
[14]
Cisco. What is Administrative Distance?, 2006.
[15]
Cisco. EIGRP Frequently Asked Questions, 2008.
[16]
N. Feamster, H. Balakrishnan, and J. Rexford. Some Foundational Problems in Interdomain Routing. In Proc. ACM SIGCOMM HotNets Workshop, 2004.
[17]
L. Gao and J. Rexford. Stable internet routing without global coordination. In Proc. ACM SIGMETRICS, 2000.
[18]
T. Griffin, F. B. Shepherd, and G. T. Wilfong. The stable paths problem and interdomain routing. IEEE/ACM Trans. Netw., 2002.
[19]
T. Griffin and G. Wilfong. Analysis of the MED Oscillation Problem in BGP. In Proc. ICNP, 2002.
[20]
T. Griffin and G. Wilfong. On the Correctness of iBGP Configuration. In Proc. ACM SIGCOMM, 2002.
[21]
T. G. Griffin and J. L. Sobrinho. Metarouting. In Proc. ACM SIGCOMM, 2005.
[22]
C. Labovitz, G. R. Malan, and F. Jahanian. Internet Routing Instability. In Proc. SIGCOMM, 1997.
[23]
T. V. Lakshman, T. Nandagopal, R. Ramjee, K. Sabnani, and T. Woo. The SoftRouter architecture. In Proc. ACM HotNets Workshop, 2004.
[24]
F. Le and G. Xie. On Guidelines for Safe Route Redistributions. In Proc. ACM SIGCOMM INM Workshop, 2007.
[25]
F. Le, G. Xie, D. Pei, J. Wang, and H. Zhang. Shedding Light on the Glue Logic of the Internet Routing Architecture. In Proc. ACM SIGCOMM, 2008.
[26]
F. Le, G. Xie, and H. Zhang. Instability Free routing: Beyond One Protocol Instance. Technical Report CMU-CS-08-123, May 2008.
[27]
F. Le, G. G. Xie, and H. Zhang. Understanding Route Redistribution. In Proc. IEEE ICNP, 2007.
[28]
D. Maltz, G. Xie, J. Zhan, H. Zhang, A. Greenberg, and G. Hjalmtysson. Routing design in operational networks: A look from the inside. In Proc. ACM SIGCOMM, 2004.
[29]
D. McPherson. Internet Routing Insecurity: Pakistan Nukes YouTube? http://asert.arbornetworks.com/2008/02/internet-routing-insecuritypakistan-nukes-youtube.
[30]
S. Misel. Wow, AS7007! www.merit.edu/mail.archives/nanog/1997-04/msg00340.html.
[31]
V. Paxson. End-to-end routing behavior in the Internet. In Proc. of ACM SIGCOMM, 1996.
[32]
R. Teixeira, A. Shaikh, T. Griffin, and J. Rexford. Dynamics of hot-potato routing in IP networks. In Proc. ACM SIGMETRICS, 2004.
[33]
Varadhan, R. Govindan, and D. Estrin. Persistent Route Oscillations in Inter-domain Routing. In Proc. Computer Networks, 2000.
[34]
J. Xia, L. Gao, and T. Fei. Flooding Attacks by Exploiting Persistent Forwarding Loops. In Proc. of USENIX IMC, 2005.

Cited By

View all
  • (2023)FuzzyCAT: A Framework for Network Configuration Verification Based on Fuzzing2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)10.1109/IPCCC59175.2023.10253841(123-131)Online publication date: 17-Nov-2023
  • (2020)Automated Performance Evaluation of Intent-based Virtual Network Systems2020 16th International Conference on Network and Service Management (CNSM)10.23919/CNSM50824.2020.9269123(1-7)Online publication date: 2-Nov-2020
  • (2020)Policy Units and Categories: Networking Models for Simplifying Security Policy Management2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)10.1109/IPCCC50635.2020.9391572(1-11)Online publication date: 6-Nov-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CoNEXT '08: Proceedings of the 2008 ACM CoNEXT Conference
December 2008
526 pages
ISBN:9781605582108
DOI:10.1145/1544012
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 December 2008

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Acceptance Rates

Overall Acceptance Rate 198 of 789 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)FuzzyCAT: A Framework for Network Configuration Verification Based on Fuzzing2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)10.1109/IPCCC59175.2023.10253841(123-131)Online publication date: 17-Nov-2023
  • (2020)Automated Performance Evaluation of Intent-based Virtual Network Systems2020 16th International Conference on Network and Service Management (CNSM)10.23919/CNSM50824.2020.9269123(1-7)Online publication date: 2-Nov-2020
  • (2020)Policy Units and Categories: Networking Models for Simplifying Security Policy Management2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)10.1109/IPCCC50635.2020.9391572(1-11)Online publication date: 6-Nov-2020
  • (2019)A Survey on Network Verification and Testing With Formal Methods: Approaches and ChallengesIEEE Communications Surveys & Tutorials10.1109/COMST.2018.286805021:1(940-969)Online publication date: Sep-2020
  • (2017)Shedding light on the complexity of enterprise routing design: A case study2017 3rd IEEE International Conference on Computer and Communications (ICCC)10.1109/CompComm.2017.8322543(214-218)Online publication date: Dec-2017
  • (2016)Efficient network reachability analysis using a succinct control plane representationProceedings of the 12th USENIX conference on Operating Systems Design and Implementation10.5555/3026877.3026895(217-232)Online publication date: 2-Nov-2016
  • (2015)A Top-Down Framework for Modeling Routing Design ComplexityHandbook of Research on Redesigning the Future of Internet Architectures10.4018/978-1-4666-8371-6.ch010(214-236)Online publication date: 2015
  • (2015)On the co-existence of distributed and centralized routing control-planes2015 IEEE Conference on Computer Communications (INFOCOM)10.1109/INFOCOM.2015.7218413(469-477)Online publication date: Apr-2015
  • (2014)Safe routing reconfigurations with route redistributionIEEE INFOCOM 2014 - IEEE Conference on Computer Communications10.1109/INFOCOM.2014.6847940(199-207)Online publication date: Apr-2014
  • (2012)Modeling complexity of enterprise routing designProceedings of the 8th international conference on Emerging networking experiments and technologies10.1145/2413176.2413187(85-96)Online publication date: 10-Dec-2012
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media