Feedback Based Routing - Distributed Systems Group - Stanford ...

28 downloads 0 Views 103KB Size Report
Transit routers do not compute routing tables. ... contains the list of autonomous systems a packet is going to travel. .... Figure 2 : Р ri m ar y and В ac k u p Routes.
Feedback Based Routing Dapeng Zhu Mark Gritter David R. Cheriton [email protected] [email protected] [email protected] Department of Computer Science Stanford University Stanford, CA 94305

ABSTRACT  

  !"# $%!& '()*,+-#).!%0/

? ,% %01~m0nŠ,pqG3‹:!%!%01Hc S ! X!; 3(,;*$FZS47698 %!E$0&Œ&*AR L09V{& %01"!';%0Z$S  !u0 _.?/

,!%!0213!547698:: ;.?; %  547698: O$D;7!.R 7 X;;U& $? %a$,F7' 2J$A FM$D&k ! '! F[$,&*,!$D]J l !.R P! \$D; ! E@() ,#.? ! % #!s U4698W$; !E)FY_\$D;!E'F,!% ;*m!nŠ,pqG7›x$).?0f>V_,%G,% $

;EED XS()7u$D?.REu!& uL!%!%x!  9 7u2 /  KE$L

m0nŠ)pqG'|Z 9& $>& !   $@V!!,%$D& &P; !) $

X1 X& ] ; $U $>)1@FY()>$'21  L$,F!H/ $&*!U$;  Q ) $OV{ %! !%015D.R! ]G I; K ,K $'%!!A L0(du%M1S,(*|_   !E\8B$$H$%€[T~du|_8‚c  0z/

$,$H$D%G

,!$D]G b9!ED0J; K$u!V  J!';%021O$,F)/ "   D$; Z$D;  E*%!ED$,0&

 Z$& $D U$,Fc X;;  _$D;

%!!AGaI! & $? 0z(P; %!Z  % ,Z L.D,%   %!!A' .RV V/

& $0$ B 7˜H;(%!021\$F $_$;  ?,(>;  aV

& H:; ! E@"%!$  P$FZ$ !.?!1@$

$9$',1#! 7$Fu=ED*(.R $ !EDl,= EDc ;L!%!%Z $\; #sEDS =0 P$; 

! ED%!*$Ai%!!Ai$>&*,?1"  ().R!

$F 7 !&*,1O$; D?,(\ 7 E c$F7 \ & GB|u  $  ,%0() .DDa'$D;\=1`$;  *(,VA?; 5$D;*$ FY$, ,;(,%J% 1`!i' ,&  1", LFY$Z9 !&*,1*$D;DG

$'E$P $;ED#9EDD?; 7,!E*P %  .RVGa|u%!%H; V 9I7I78"˜H; X g$

\(,

ED$Z $;EDO! g$; gL %!%?J!H >\, XVOL0 $DE; u (E - ; > $ _LH1$; K X1 X&Œ %! KV_

L "$& ;  E> _2J$P y$D;  >€V{   9ED 7()

47698:G)dZ$D; a$& ;2H G_T5P0/

J0 % (,]GaI).!%  !% 01P$,F(c$D; ! E9 X1 X&W $H

 OA?$W$,\.R\$U  ;& >()K1`)P$,A! E G ‚I 

$,  (=$l!/t!& S$D& ; # ; %!>$,F'  (, %!!A`2J

; "?1# X;V; !( (HO$F7  ; &PO$,FZ ! X/ ! SD  

z{

,(; $$& $D; P X1 X& G47698: .R1$D;K _$S F[$,&š$D;P$& ; $).?   09L!% %B%!$  $!.01L0y%!%9$,# 0 ULŽ(,S $,.?  VUE$H

I J$D;!E_!F[$&*)!$DPJ ;B!?$u,  ;&  () $

.

\0

(

,"&\;%00/ $D& -Gl^_; P , ! [}X$ HB$;  B\&"E!.RO;HB2H/

4. APPLICATIONS 4.1 Defend Against Denial of Service Attacks b_ %H$,F( .?!J,; /

$D& ;_$.R-,; O1,> E/t$D%01 $,/ P% ,EDO ,%!

() OS ((SKV2$,A#  $D; %M#>ED! U ; V ,Z0FB$D K%!  A#E$H u $Lx9 ;.? .?!EP$D_" X!%!%xFY;%0z(%!%  K$D& &\;  ,!$DS L2JU|

"4uG

I   ; & !$Dl$FuF, %!;"!(  (#$F_.R{s! [}X$D!H $;  *,"!?.%! l !""& !E?'"   /   K& $ES;$D$& $D; u X1 X& G_‹$9{ & %!D2$S,; / $$& $D; c X1 X& a& !EDHcZ$ 2H G>w$D]

IU2HV (,

VE`%!$*FY$&–!

,%011 G~I

J\&* _ O$D V.D) $"()u& $ X_ 2J$A*&*,H1K $D %!(.R

$ *?1P8:%!&*]HZ; *IL‡8lw

,% !f547698y! K0VK !_$.R-47698

%!$)  $D 7$K$A\V ED Ga4; /

! E50 L0F[;'.D,%   ,!$D$FK V/ $). 3$D; ! E !F[$&*)!$D* ) a$O % $~0 $L F[;  H0Fx&    EFY;% .%! )!$D'! B!\F[a $   %!DGcrc.D\0F!aP $D J!'Z %0/ ,%!*&* x {! X $FZ3;  H!,`$D; *$H

 $a ; J,B J$D;! ,;(,%!%!1>$ G ( ,6\G $H%!ARV(,(

, OFY$Z! FY$& U!H 7$D;  E S