skip to main content
10.1145/1159913.1159933acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

Source selectable path diversity via routing deflections

Published:11 August 2006Publication History

ABSTRACT

We present the design of a routing system in which end-systems set tags to select non-shortest path routes as an alternative to explicit source routes. Routers collectively generate these routes by using tags as hints to independently deflect packets to neighbors that lie off the shortest-path. We show how this can be done simply, by local extensions of the shortest path machinery, and safely, so that loops are provably not formed. The result is to provide end-systems with a high-level of path diversity that allows them to bypass unde-sirable locations within the network. Unlike explicit source routing, our scheme is inherently scalable and compatible with ISP policies because it derives from the deployed Internet routing. We also sug-gest an encoding that is compatible with common IP usage, making our scheme incrementally deployable at the granularity of individual routers.

References

  1. D. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris. Resilient overlay networks. In SOSP, Oct. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Baran. On distributed communications, vol. i. RAND Technical Report RM-3420-PR, Aug. 1964.Google ScholarGoogle Scholar
  3. I. Castineyra, N. Chiappa, and M. Steenstrup. The Nimrod Routing Architecture. IETF RFC 1992, Aug. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Clark. Policy Routing in Internetworks. Internetworking: Research and Experience, 1, 1990.Google ScholarGoogle Scholar
  5. D. Clark, J. Wroclawski, K. Sollins, and R. Braden. Tussle in cyberspace: Defining tomorrow's Internet. In SIGCOMM, Aug. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Estrin, Y. Rekhter, and S. Hotz. Scalable Inter-Domain Routing Architecture. In ACM SIGCOMM, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. P. Gummadi, H. V. Madhyastha, S. D. Gribble, H. M. Levy, and D. Wetherall. Improving the reliability of internet paths with one-hop source routing. In OSDI, Dec. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Iyer, S. Bhattacharyya, N. Taft, and C. Diot. An approach to alleviate link overload as observed on an IP backbone. In INFOCOM, 2003.Google ScholarGoogle Scholar
  9. J. Jannotti. Network layer support for overlay networks. In IEEE OPENARCH, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H. T. Kaur, S. Kalyanaraman, A. Weiss, S. Kanwar, and A. Gandhi. Bananas: An evolutionary framework for explicit and multipath routing in the Internet. In ACM SIGCOMM FDNA workshop, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. N. Maxemchuk. Routing in the manhattan street network. IEEE Trans. on Communication, COM-35(5), May 1987.Google ScholarGoogle Scholar
  12. A. Medina, I. Matta, and J. Byers. BRITE: A flexible generator of Internet toplogies. Technical Report BU-CS-TR-2000-005, Boston University, 2000. Google ScholarGoogle Scholar
  13. R. Perlman. Network layer protocols with byzantine robustness. Technical report, MIT, Oct. 1988. MIT-LCS-TR-429.Google ScholarGoogle Scholar
  14. R. Perlman. Routing with byzantine robustness. Technical report, Sun Labs, Aug. 2005. TR-2005-146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. Raghavan and A. C. Snoeren. A System for Authenticated Policy-Compliant Routing. In ACM SIGCOMM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. E. C. Rosen, A. Viswanathan, and R. Callon. Multiprotocol label switching architecture. IETF RFC3031, Jan. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Savage, A. Collins, E. Hoffman, J. Snell, and T. Anderson. The end-to-end effects of Internet path selection. In SIGCOMM, Aug. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. In SIGCOMM, Aug. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Shand and S. Bryant. IP Fast Reroute Framework. IETF Routing Working Group, work in progress, Mar. 2006.Google ScholarGoogle Scholar
  20. N. Spring, R. Mahajan, and D. Wetherall. Measuring ISP topologies with Rocketfuel. In SIGCOMM, Aug. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. I. Stoica, S. Shenker, and H. Zhang. Core-stateless fair queueing: A scalable architecture to approximate fair bandwidth allocations in high speed networks. In SIGCOMM, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Thaler and C. Hopps. Multipath issues in unicast and multicast next-hop selection. IETF RFC 2991, Nov. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Vutukury and J. Garcia-Luna-Aceves. MDVA: A distance-vector multipath routing protocol. In IEEE Infocom, 2001.Google ScholarGoogle Scholar

Index Terms

  1. Source selectable path diversity via routing deflections

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
        September 2006
        458 pages
        ISBN:1595933085
        DOI:10.1145/1159913
        • cover image ACM SIGCOMM Computer Communication Review
          ACM SIGCOMM Computer Communication Review  Volume 36, Issue 4
          Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
          October 2006
          445 pages
          ISSN:0146-4833
          DOI:10.1145/1151659
          Issue’s Table of Contents

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 August 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate554of3,547submissions,16%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader