skip to main content
article
Free access

An analysis of BGP convergence properties

Published: 30 August 1999 Publication History

Abstract

The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol used to exchange reachability information between Autonomous Systems in the global Internet. BGP is a path-vector protocol that allows each Autonomous System to override distance-based metrics with policy-based metrics when choosing best routes. Varadhan et al. [18] have shown that it is possible for a group of Autonomous Systems to independently define BGP policies that together lead to BGP protocol oscillations that never converge on a stable routing. One approach to addressing this problem is based on static analysis of routing policies to determine if they are safe. We explore the worst-case complexity for convergence-oriented static analysis of BGP routing policies. We present an abstract model of BGP and use it to define several global sanity conditions on routing policies that are related to BGP convergence/divergence. For each condition we show that the complexity of statically checking it is either NP-complete or NP-hard.

References

[1]
C. Alaettinoglu, T. Bates, E. Gerich, D. Karrenberg, D. Meyer, M. Terpstra, and C. Villamizar. Routing Policy Specification Language (RPSL). RFC 2280, 1998.]]
[2]
C. Alaettino{glu. RAToolSet - A Routing Policy Analysis Tool Set. http://www, isi. edu/ra/RAToolSet.]]
[3]
D. Bertsekas and R. Gallagher. Data Networks. Prentice Hall, 1992.]]
[4]
M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman and Co., 1979.]]
[5]
R. Govindan, C. Alaettinoglu, G. Eddy, D. Kessens, S. Kumar, and W.S. Lee. An architecture for stable, analyzable internet routing. IEEE Network, 13(1):29-35, 1999.]]
[6]
R. Govindan and A. Reddy. An analysis of inter-domain topology and route stability. In INFOCOMM'97, 1997.]]
[7]
B. Halabi. Internet Routing Architectures. Cisco Press, 1997.]]
[8]
C. Hendrick. Routing information protocol. RFC 1058, 1988.]]
[9]
C. Huitema. Routing in the Internet. Prentice Hall, 1995.]]
[10]
IRR. Internet Route Registy. Internet Route Registy Project, http://www .merit. edu/radb/docs/irr, html.]]
[11]
D. S. Johnson. The NP-completeness column: An ongoing guide. Journal of Algorithms, 6(2):291-305, 1985.]]
[12]
C. Labovitz, G. R. Malan, and F. Jahanian. Internet routing instability. In SIGCOMM'97, 1997.]]
[13]
C. Labovitz, G. R. Malan, and F. Jahanian. Origins of internet routing instability. In INFOCOM'99, 1997.]]
[14]
V. Paxson. End-to-end routing behavior in the internet. Transactions on Networking, 5(5), 1997.]]
[15]
R. Perlman. Interconnections: Bridges and Routers. Addison-Wesley, 1995.]]
[16]
Y. Rekhter and T. Li. A Border Gateway Protocol. RFC 1771 (BGP version 4), 1995.]]
[17]
J. W. Stewart. BGP~, Inter-Domain Routing in The Internet. Addison-Wesley, 1998.]]
[18]
K. Varadhan, R. Govindan, and D. Estrin. Persistent route oscillations in inter-domain routing. ISI technical report 96-631, USC/Information Sciences Institute, 1996.]]
[19]
C. Villamizar, R. Chandra, and R. Govindan. BGP route flap damping. RFC 2439, 1998.]]

Cited By

View all
  • (2024)Comprehensive Performance Evaluation of Association Rule Mining Algorithms for Border Gateway Protocol Anomaly Detection2024 4th International Conference on Emerging Smart Technologies and Applications (eSmarTA)10.1109/eSmarTA62850.2024.10638999(1-10)Online publication date: 6-Aug-2024
  • (2023)Dependent Misconfigurations in 5G/4.5G Radio Resource ControlProceedings of the ACM on Networking10.1145/35952881:CoNEXT1(1-20)Online publication date: 5-Jul-2023
  • (2022)İlişkilendirme Kuralı Madenciliği Algoritmasını Kullanarak BGP Anomali TespitiEuropean Journal of Science and Technology10.31590/ejosat.1186700Online publication date: 25-Oct-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 29, Issue 4
Oct. 1999
292 pages
ISSN:0146-4833
DOI:10.1145/316194
Issue’s Table of Contents
  • cover image ACM Conferences
    SIGCOMM '99: Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
    August 1999
    320 pages
    ISBN:1581131356
    DOI:10.1145/316188
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 August 1999
Published in SIGCOMM-CCR Volume 29, Issue 4

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)307
  • Downloads (Last 6 weeks)32
Reflects downloads up to 28 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Comprehensive Performance Evaluation of Association Rule Mining Algorithms for Border Gateway Protocol Anomaly Detection2024 4th International Conference on Emerging Smart Technologies and Applications (eSmarTA)10.1109/eSmarTA62850.2024.10638999(1-10)Online publication date: 6-Aug-2024
  • (2023)Dependent Misconfigurations in 5G/4.5G Radio Resource ControlProceedings of the ACM on Networking10.1145/35952881:CoNEXT1(1-20)Online publication date: 5-Jul-2023
  • (2022)İlişkilendirme Kuralı Madenciliği Algoritmasını Kullanarak BGP Anomali TespitiEuropean Journal of Science and Technology10.31590/ejosat.1186700Online publication date: 25-Oct-2022
  • (2022)Multidomain SDN-Based Gateways and Border Gateway ProtocolJournal of Computer Networks and Communications10.1155/2022/39558002022Online publication date: 1-Jan-2022
  • (2022)Design and Implementation of a Strong Representation System for Network Policies2022 International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN54977.2022.9868871(1-10)Online publication date: Jul-2022
  • (2022)Path stability in partially deployed secure BGP routingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2022.108762206:COnline publication date: 7-Apr-2022
  • (2021)AS-level BGP community usage classificationProceedings of the 21st ACM Internet Measurement Conference10.1145/3487552.3487865(577-592)Online publication date: 2-Nov-2021
  • (2020)Software-Defined Networking Approaches for Link Failure Recovery: A SurveySustainability10.3390/su1210425512:10(4255)Online publication date: 22-May-2020
  • (2020)Keep your communities cleanProceedings of the 16th International Conference on emerging Networking EXperiments and Technologies10.1145/3386367.3432731(443-450)Online publication date: 23-Nov-2020
  • (2020)Towards tenant demand-aware bandwidth allocation strategy in cloud datacenterFuture Generation Computer Systems10.1016/j.future.2017.06.005105:C(904-915)Online publication date: 1-Apr-2020
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media