Abstract
This paper studies the effect of simple Traffic Engineering techniques on the size of the Internet’s default free routing table. Current best practises for traffic balancing in the Internet are based in disaggregating prefixes that cause an increase in size of the Internet’s core routing table. An algorithm to show the impact of these techniques on the growth of the routing table is proposed. This algorithm is applied on routing tables between January 2001 and December 2009 and the results are discussed. Finally an alternative architecture is proposed, which allows Traffic Engineering while keeping the Internet routing table size optimised.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
YouTube Hijacking: A RIPE NCC RIS case study, http://www.ripe.net/news/study-youtube-hijacking.html
INTERSECTION (INfrastructure for heTErogeneous, Resilient, SEcure, Complex, Tightly Inter-Operating Networks) (January 2008), http://www.intersection-project.eu/ (last visit June 25, 2010)
Ballani, H., Francis, P., Cao, T., Wang, J.: Making routers last longer with ViAggre. In: NSDI 2009: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 453–466. USENIX Association, Berkeley (2009)
Green, B.R., Smith, P.: CISCO - ISP Essentials. Cisco Press (September 2002)
Cisco Systems Inc. Interworking technology handbook
Draves, R., King, C., Venkatachary, S., Zill, B.D.: Constructing optimal ip routing tables. In: Proc. IEEE INFOCOM, pp. 88–97 (1999)
Fall, K., Iannaccone, G., Ratnasamy, S., Godfrey, P.B.: Routing Tables: Is Smaller Really Much Better? In: Proceedings of Hotnets 2009. ACM, New York (2009)
Freedman, M.J., Vutukuru, M., Feamster, N., Balakrishnan, H.: Geographic locality of ip prefixes. In: IMC (2005)
Gredler, H., Goralski, W.: The Complete IS-IS Routing Protocol. In: Computer Science. Springer, London (2005)
Griffin, T.G., Wilfong, G.: An analysis of BGP convergence properties. In: Proc. of SIGCOMM 1999, pp. 277–288. ACM Press, New York (1999)
Halabi, S.: Internet Routing Architectures, 2nd edn. Cisco Press (2000)
Hawkinson, J., Bates, T.: Guidelines for creation, selection, and registration of an Autonomous System (AS). RFC 1930 (Best Current Practice) (March 1996)
Huston, G.: Analysing the Internet BGP Routing Table. The Internet Protocol Journal 4(1) (2001)
van Beijnum, I.: BGP - Building Reliable Networks with the Border Gateway Protocol. O’Reilly, Sebastopol (2002)
Kapela, A., Pilisov, A.: Stealing the Internet. DefCon August 16 (2008) (last visit, July 17, 2009)
Lad, M., Massey, D., Pei, D., Wu, Y., Zhang, B., Zhang, L.: Phas: A prefix hijack alert system (2006)
Li, T., Fernando, R., Abley, J.: The AS_PATHLIMIT Path Attribute (2001), http://tools.ietf.org/html/draft-ietf-idr-as-pathlimit-03 (last visit: January 17, 2010)
Marques, P., Dupont, F.: Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing. RFC 2545 (Proposed Standard) (March 1999)
Muthukrishnan, K., Malis, A.: A Core MPLS IP VPN Architecture. RFC 2917 (Informational) (September 2000)
Networks, J.: Examine BGP Routes and Route Selection in Juniper routers (last visit December 12, 2009)
Rekhter, Y., Li, T., Hares, S.: A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard) (January 2006)
Suri, S., Sandholm, T., Warkhede, P.: Compressing two-dimensional routing tables. Algorithmica 25, 287–300 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Gutiérrez, P.A.A. (2011). Revisiting the Impact of Traffic Engineering Techniques on the Internet’s Routing Table. In: Pentikousis, K., Agüero, R., García-Arranz, M., Papavassiliou, S. (eds) Mobile Networks and Management. MONAMI 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 68. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21444-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-21444-8_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21443-1
Online ISBN: 978-3-642-21444-8
eBook Packages: Computer ScienceComputer Science (R0)