End-to-end routing behavior in the Internet
IEEE/ACM Transactions on Networking (TON)
An analysis of BGP convergence properties
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Routing stability in congested networks: experimentation and analysis
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Internet Routing Architectures, Second Edition
Internet Routing Architectures, Second Edition
Measuring ISP topologies with rocketfuel
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Policy Disputes in Path-Vector Protocols
ICNP '99 Proceedings of the Seventh Annual International Conference on Network Protocols
NetScope: traffic engineering for IP networks
IEEE Network: The Magazine of Global Internetworking
Structure preserving anonymization of router configuration data
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
A clean slate 4D approach to network control and management
ACM SIGCOMM Computer Communication Review
CONMan: taking the complexity out of network management
Proceedings of the 2006 SIGCOMM workshop on Internet network management
Minerals: using data mining to detect router misconfigurations
Proceedings of the 2006 SIGCOMM workshop on Mining network data
Ethane: taking control of the enterprise
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
CONMan: a step towards network manageability
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Intent-based analysis of network-wide routing policy configuration
Proceedings of the 2007 SIGCOMM workshop on Internet network management
On guidelines for safe route redistributions
Proceedings of the 2007 SIGCOMM workshop on Internet network management
Shedding light on the glue logic of the internet routing architecture
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Shadow configuration as a network management primitive
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Detecting network-wide and router-specific misconfigurations through data mining
IEEE/ACM Transactions on Networking (TON)
Instability free routing: beyond one protocol instance
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Towards systematic design of enterprise networks
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Unraveling the complexity of network management
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Modeling and understanding end-to-end class of service policies in operational networks
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Practical declarative network management
Proceedings of the 1st ACM workshop on Research on enterprise networking
Rethinking enterprise network control
IEEE/ACM Transactions on Networking (TON)
Mining policies from enterprise network configuration
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
NetPiler: detection of ineffective router configurations
IEEE Journal on Selected Areas in Communications - Special issue on network infrastructure configuration
Structure preserving anonymization of router configuration data
IEEE Journal on Selected Areas in Communications - Special issue on network infrastructure configuration
A toolkit for automating and visualizing VLAN configuration
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
MMS: an autonomic network-layer foundation for network management
IEEE Journal on Selected Areas in Communications
Overcoming failures: fault-tolerance and logical centralization in clean-slate network management
INFOCOM'10 Proceedings of the 29th conference on Information communications
A systematic approach for evolving VLAN designs
INFOCOM'10 Proceedings of the 29th conference on Information communications
Theory and new primitives for safely connecting routing protocol instances
Proceedings of the ACM SIGCOMM 2010 conference
Detecting the performance impact of upgrades in large operational networks
Proceedings of the ACM SIGCOMM 2010 conference
Tesseract: a 4D network control plane
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
On the design of network control and management plane
Computer Networks: The International Journal of Computer and Telecommunications Networking
Demystifying configuration challenges and trade-offs in network-based ISP services
Proceedings of the ACM SIGCOMM 2011 conference
Towards systematic design of enterprise networks
IEEE/ACM Transactions on Networking (TON)
The evolution of network configuration: a tale of two campuses
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
A case for design methodology research in self-* distributed systems
Self-star Properties in Complex Information Systems
ACM SIGCOMM Computer Communication Review
Modeling complexity of enterprise routing design
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Path inference in data center networks
Proceedings of the 8th International Conference on Network and Service Management
Hi-index | 0.01 |
In any IP network, routing protocols provide the intelligence that takes a collection of physical links and transforms them into a network that enables packets to travel from one host to another. Though routing design is arguably the single most important design task for large IP networks, there has been very little systematic investigation into how routing protocols are actually used in production networks to implement the goals of network architects. We have developed a methodology for reverse engineering a coherent global view of a network's routing design from the static analysis of dumps of the local configuration state of each router. Starting with a set of 8,035 configuration files, we have applied this method to 31 production networks. In this paper we present a detailed examination of how routing protocols are used in operational networks. In particular, the results show the conventional model of "interior" and "exterior" gateway protocols is insufficient to describe the diverse set of mechanisms used by architects, and we provide examples of the more unusual designs and examine their trade-offs. We discuss the strengths and weaknesses of our methodology, and argue that it opens paths towards new understandings of network behavior and design.