Deriving traffic demands for operational IP networks: methodology and experience
IEEE/ACM Transactions on Networking (TON)
Understanding BGP misconfiguration
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Internet indirection infrastructure
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Route flap damping exacerbates internet routing convergence
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
BGP routing stability of popular destinations
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Fast accurate computation of large-scale IP traffic matrices from link loads
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
An Experimental Analysis of BGP Convergence Time
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Guidelines for interdomain traffic engineering
ACM SIGCOMM Computer Communication Review
A model of BGP routing for network engineering
Proceedings of the joint international conference on Measurement and modeling of computer systems
Network sensitivity to hot-potato disruptions
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Achieving sub-50 milliseconds recovery upon BGP peering link failures
CoNEXT '05 Proceedings of the 2005 ACM conference on Emerging network experiment and technology
Why do internet services fail, and what can be done about it?
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
Differentiated BGP Update Processing for Improved Routing Convergence
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
NetPiler: detection of ineffective router configurations
IEEE Journal on Selected Areas in Communications - Special issue on network infrastructure configuration
Predicting and tracking internet path changes
Proceedings of the ACM SIGCOMM 2011 conference
Avoiding Disruptions During Maintenance Operations on BGP Sessions
IEEE Transactions on Network and Service Management
Balancing performance, robustness and flexibility in routing systems
IEEE Transactions on Network and Service Management
Managing routing disruptions in Internet service provider networks
IEEE Communications Magazine
Improved BGP convergence via ghost flushing
IEEE Journal on Selected Areas in Communications
NetScope: traffic engineering for IP networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
When a limited number of network operators have to manage a large number of maintenance tasks, they often lose the sense of what is more important and end up focusing their time on lower-priority issues. As a result, operators may react slowly to critical tasks, increasing network downtime and maintenance costs. We propose a system that estimates the relative importance of different maintenance tasks. According to this estimation, network operators can prioritize their reaction, for example, by spending more time on avoiding disruption caused by high-impact tasks. In particular, we focus on configuration tasks related to BGP sessions. BGP sessions are frequently modified for maintenance operations, such as policy changes, router upgrades, and the addition of peers. These maintenance operations cause route changes, often leading to a huge amount of data loss. The proposed system estimates this amount of data loss by simulating the behavior of BGP. We implement the proposed system and estimate the impact of 372 sessions in a nationwide ISP network. We observe sessions with a wide range of impact, from those with nearly zero impact, to those that can result in 1000GB of data loss if not properly protected. We also observe that these measures change over time, often in unpredictable ways (e.g., from 50GB to 0 over a month period). According to this observation, we suggest that network operators perform periodic audits with the proposed system and classify sessions by highlighting those with a large impact. Operators can then prioritize the level of responses to the classified sessions accordingly and significantly reduce maintenance costs (i.e., by giving priority to the advanced protection of sessions with a large impact).