Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Routing stability in congested networks: experimentation and analysis

Published: 28 August 2000 Publication History

Abstract

Loss of the routing protocol messages due to network congestion can cause peering session failures in routers, leading to route flaps and routing instabilities. We study the effects of traffic overload on routing protocols by quantifying the stability and robustness properties of two common Internet routing protocols, OSPF and BGP, when the routing control traffic is not isolated from data traffic. We develop analytical models to quantify the effect of congestion on the robustness of OSPF and BGP as a function of the traffic overload factor, queueing delays, and packet sizes. We perform extensive measurements in an experimental network of routers to validate the analytical results. Subsequently we use the analytical framework to investigate the effect of factors that are difficult to incorporate into an experimental setup, such as a wide range of link propagation delays and packet dropping policies. Our results show that increased queueing and propagation delays adversely affect BGP's resilience to congestion, in spite of its use of a reliable transport protocol. Our findings demonstrate the importance of selective treatment of routing protocol messages from other traffic, by using scheduling and utilizing buffer management policies in the routers, to achieve stable and robust network operation.

Cited By

View all
  • (2019)Detecting and Mitigating Target Link-Flooding Attacks Using SDNIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.282227516:6(944-956)Online publication date: 1-Nov-2019
  • (2018)A Novel and Robust Authentication Factor Based on Network Communications LatencyIEEE Systems Journal10.1109/JSYST.2017.269155012:4(3279-3290)Online publication date: Dec-2018
  • (2017)Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing DetectionIEEE Communications Surveys & Tutorials10.1109/COMST.2017.275208719:4(2797-2819)Online publication date: Dec-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 30, Issue 4
October 2000
319 pages
ISSN:0146-4833
DOI:10.1145/347057
Issue’s Table of Contents
  • cover image ACM Conferences
    SIGCOMM '00: Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
    August 2000
    348 pages
    ISBN:1581132239
    DOI:10.1145/347059
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 August 2000
Published in SIGCOMM-CCR Volume 30, Issue 4

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)65
  • Downloads (Last 6 weeks)11
Reflects downloads up to 18 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Detecting and Mitigating Target Link-Flooding Attacks Using SDNIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.282227516:6(944-956)Online publication date: 1-Nov-2019
  • (2018)A Novel and Robust Authentication Factor Based on Network Communications LatencyIEEE Systems Journal10.1109/JSYST.2017.269155012:4(3279-3290)Online publication date: Dec-2018
  • (2017)Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing DetectionIEEE Communications Surveys & Tutorials10.1109/COMST.2017.275208719:4(2797-2819)Online publication date: Dec-2018
  • (2016)Opportunistic Routing in Wireless NetworksFoundations and Trends® in Networking10.1561/130000002111:1-2(1-137)Online publication date: 23-Nov-2016
  • (2013)The Crossfire AttackProceedings of the 2013 IEEE Symposium on Security and Privacy10.1109/SP.2013.19(127-141)Online publication date: 19-May-2013
  • (2012)Faultless Protection Methods in Self-Healing Ethernet Ring NetworksETRI Journal10.4218/etrij.12.1812.010234:6(816-826)Online publication date: 1-Dec-2012
  • (2010)XenTune: Detecting Xen Scheduling Bottlenecks for Media Applications2010 IEEE Global Telecommunications Conference GLOBECOM 201010.1109/GLOCOM.2010.5683968(1-6)Online publication date: Dec-2010
  • (2010)Enhanced Protection Schemes to Guarantee Consistent Filtering Database in Ethernet Rings2010 IEEE Global Telecommunications Conference GLOBECOM 201010.1109/GLOCOM.2010.5683945(1-6)Online publication date: Dec-2010
  • (2010)A Distributed Wake-Up Scheduling for Opportunistic Forwarding in Wireless Sensor Networks2010 IEEE Global Telecommunications Conference GLOBECOM 201010.1109/GLOCOM.2010.5683254(1-5)Online publication date: Dec-2010
  • (2009)On parameter settings of network keep-alive protocol for failure detection2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology10.1109/ICBNMT.2009.5347792(19-23)Online publication date: Oct-2009
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media