summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc3221.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc3221.txt')
-rw-r--r--doc/rfc/rfc3221.txt1403
1 files changed, 1403 insertions, 0 deletions
diff --git a/doc/rfc/rfc3221.txt b/doc/rfc/rfc3221.txt
new file mode 100644
index 0000000..05edbf8
--- /dev/null
+++ b/doc/rfc/rfc3221.txt
@@ -0,0 +1,1403 @@
+
+
+
+
+
+
+Network Working Group G. Huston
+Request for Comments: 3221 Internet Architecture Board
+Category: Informational December 2001
+
+
+ Commentary on
+ Inter-Domain Routing in the Internet
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2001). All Rights Reserved.
+
+Abstract
+
+ This document examines the various longer term trends visible within
+ the characteristics of the Internet's BGP table and identifies a
+ number of operational practices and protocol factors that contribute
+ to these trends. The potential impacts of these practices and
+ protocol properties on the scaling properties of the inter-domain
+ routing space are examined.
+
+ This document is the outcome of a collaborative exercise on the part
+ of the Internet Architecture Board.
+
+Table of Contents
+
+ 1. Introduction................................................. 2
+ 2. Network Scaling and Inter-Domain Routing ................... 2
+ 3. Measurements of the total size of the BGP Table ............ 4
+ 4. Related Measurements derived from BGP Table ................ 7
+ 5. Current State of inter-AS routing in the Internet .......... 11
+ 6. Future Requirements for the Exterior Routing System ........ 14
+ 7. Architectural Approaches to a scalable Exterior
+ Routing Protocol........................................... 15
+ 8. Directions for Further Activity ............................ 21
+ 9. Security Considerations .................................... 22
+ 10. References ................................................. 23
+ 11. Acknowledgements ........................................... 24
+ 12. Author's Address ........................................... 24
+ 13. Full Copyright Statement ................................... 25
+
+
+
+
+
+Huston Informational [Page 1]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+1. Introduction
+
+ This document examines the various longer term trends visible within
+ the characteristics of the Internet's BGP table and identifies a
+ number of operational practices and protocol factors that contribute
+ to these trends. The potential impacts of these practices and
+ protocol properties on the scaling properties of the inter-domain
+ routing space are examined.
+
+ These impacts include the potential for exhaustion of the existing
+ Autonomous System number space, increasing convergence times for
+ selection of stable alternate paths following withdrawal of route
+ announcements, the stability of table entries, and the average prefix
+ length of entries in the BGP table. The larger long term issue is
+ that of an increasingly denser inter-connectivity mesh between ASes,
+ causing a finer degree of granularity of inter-domain policy and
+ finer levels of control to undertake inter-domain traffic
+ engineering.
+
+ Various approaches to a refinement of the inter-domain routing
+ protocol and associated operating practices that may provide superior
+ scaling properties are identified as an area for further
+ investigation.
+
+ This document is the outcome of a collaborative exercise on the part
+ of the Internet Architecture Board.
+
+2. Network Scaling and Inter-Domain Routing
+
+ Are there inherent scaling limitations in the technology of the
+ Internet or its architecture of deployment that may impact on the
+ ability of the Internet to meet escalating levels of demand? There
+ are a number of potential areas to search for such limitations.
+ These include the capacity of transmission systems, packet switching
+ capacity, the continued availability of protocol addresses, and the
+ capability of the routing system to produce a stable view of the
+ overall topology of the network. In this study we will look at this
+ latter capability with the objective of identifying some aspects of
+ the scaling properties of the Internet's routing system.
+
+ The basic structure of the Internet is a collection of networks, or
+ Autonomous Systems (ASes) that are interconnected to form a connected
+ domain. Each AS uses an interior routing system to maintain a
+ coherent view of the topology within the AS, and uses an exterior
+ routing system to maintain adjacency information with neighboring
+ ASes to create a view of the connectivity of the entire system.
+
+
+
+
+
+Huston Informational [Page 2]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ This network-wide connectivity is described in the routing table used
+ by the BGP4 protocol (referred to as the Routing Information Base, or
+ RIB). Each entry in the table refers to a distinct route. The
+ attributes of the route, together with local policy constraints, are
+ used to determine the best path from the local AS to the AS that is
+ originating the route. Determining the 'best path' in this case is
+ determining which routing advertisement and associated next hop
+ address is the most preferred by the local AS. Within each local
+ BGP-speaking router this preferred route is then loaded into the
+ local RIB (Loc-RIB). This information is coupled with information
+ obtained from the local instance of the interior routing protocol to
+ form a Forwarding Information Base (or FIB), for use by the local
+ router's forwarding engine.
+
+ The BGP routing system is not aware of finer level of topology of the
+ network on a link-by-link basis within the local AS or within any
+ remote AS. From this perspective BGP can be seen as an inter-AS
+ connectivity maintenance protocol, as distinct from a link-level
+ topology management protocol, and the BGP routing table can be viewed
+ as a description of the current connectivity of the Internet using an
+ AS as the basic element of connectivity computation.
+
+ There is an associated dimension of policy determination within the
+ routing table. If an AS advertises a route to a neighboring AS, the
+ local AS is offering to accept traffic from the neighboring AS which
+ is ultimately destined to addresses described by the advertised
+ routing entry. If the local AS does not originate the route, then
+ the inference is that the local AS is willing to undertake the role
+ of transit provider for this traffic on behalf of some third party.
+ Similarly, an AS may or may not choose to accept a route from a
+ neighbor. Accepting a route implies that under some circumstances,
+ as determined by the local route selection parameters, the local AS
+ will use the neighboring AS to reach addresses spanned by the route.
+ The BGP routing domain is intended to maintain a coherent view of the
+ connectivity of the inter-AS domain, where connectivity is expressed
+ as a preference for 'shortest paths' to reach any destination address
+ as modulated by the connectivity policies expressed by each AS, and
+ coherence is expressed as a global constraint that none of the paths
+ contains loops or dead ends. The elements of the BGP routing domain
+ are routing entries, expressed as a span of addresses. All addresses
+ advertised within each routing entry share a common origin AS and a
+ common connectivity policy. The total size of the BGP table is
+ therefore a metric of the number of distinct routes within the
+ Internet, where each route describes a contiguous set of addresses
+ that share a common origin AS and a common reachability policy.
+
+
+
+
+
+
+Huston Informational [Page 3]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ When the scaling properties of the Internet were studied in the early
+ 1990s two critical factors identified in the study were, not
+ surprisingly, routing and addressing [2]. As more devices connect to
+ the Internet they consume addresses, and the associated function of
+ maintaining reachability information for these addresses, with an
+ assumption of an associated growth in the number of distinct provider
+ networks and the number of distinct connectivity policies, implies
+ ever larger routing tables. The work in studying the limitations of
+ the 32 bit IPv4 address space produced a number of outcomes,
+ including the specification of IPv6 [3], as well as the refinement of
+ techniques of network address translation [4] intended to allow some
+ degree of transparent interaction between two networks using
+ different address realms. Growth in the routing system is not
+ directly addressed by these approaches, as the routing space is the
+ cross product of the complexity of the inter-AS topology of the
+ network, multiplied by the number of distinct connectivity policies
+ multiplied by the degree of fragmentation of the address space. For
+ example, use of NAT may reduce the pressure on the number of public
+ addresses required by a single connected network, but it does not
+ necessarily imply that the network's connectivity policies can be
+ subsumed within the aggregated policy of a single upstream provider.
+
+ When an AS advertises a block of addresses into the exterior routing
+ space this entry is generally carried across the entire exterior
+ routing domain of the Internet. To measure the common
+ characteristics of the global routing table, it is necessary to
+ establish a point in the default-free part of the exterior routing
+ domain and examine the BGP routing table that is visible at that
+ point.
+
+3. Measurements of the total size of the BGP Table
+
+ Measurements of the size of the routing table were somewhat sporadic
+ to start, and a number of measurements were taken at approximate
+ monthly intervals from 1988 until 1992 by Merit [5]. This effort was
+ resumed in 1994 by Erik-Jan Bos at Surfnet in the Netherlands, who
+ commenced measuring the size of the BGP table at hourly intervals in
+ 1994. This measurement technique was adopted by the author in 1997,
+ using a measurement point located at the edge of AS 1221 at Telstra
+ in Australia, again using an hourly interval for the measurement.
+ The initial measurements were of the number of routing entries
+ contained within the set of selected best paths. These measurements
+ were expanded to include the number of AS numbers, number of AS
+ paths, and a set of measurements relating to the prefix size of
+ routing table entries.
+
+
+
+
+
+
+Huston Informational [Page 4]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ This data contains a view of the dynamics of the Internet's routing
+ table growth that spans some 13 years in total and includes a very
+ detailed view spanning the most recent seven years [6]. Looking at
+ just the total size of the BGP routing table over this period, it is
+ possible to identify four distinct phases of inter-AS routing
+ practice in the Internet.
+
+3.1 Pre-CIDR Growth
+
+ The initial characteristics of the routing table size from 1988 until
+ April 1994 show definite characteristics of exponential growth. If
+ continued unchecked, this growth would have lead to saturation of the
+ available BGP routing table space in the non-default routers of the
+ time within a small number of years.
+
+ Estimates of the time at which this would've happened varied somewhat
+ from study to study, but the overall general theme of these
+ observations was that the growth rates of the BGP routing table were
+ exceeding the growth in hardware and software capability of the
+ deployed network, and that at some point in the mid-1990's, the BGP
+ table size would have grown to the point where it was larger than the
+ capabilities of available equipment to support.
+
+3.2 CIDR Deployment
+
+ The response from the engineering community was the introduction of a
+ hierarchy into the inter-domain routing system. The intent of the
+ hierarchical routing structure was to allow a provider to merge the
+ routing entries for its customers into a single routing entry that
+ spanned its entire customer base. The practical aspects of this
+ change was the introduction of routing protocols that dispensed with
+ the requirement for the Class A, B and C address delineation,
+ replacing this scheme with a routing system that carried an address
+ prefix and an associated prefix length. This approached was termed
+ Classless Inter-Domain Routing (CIDR) [5].
+
+ A concerted effort was undertaken in 1994 and 1995 to deploy CIDR
+ routing in the Internet, based on encouraging deployment of the
+ CIDR-capable version of the BGP protocol, BGP4 [7].
+
+ The intention of CIDR was one of hierarchical provider address
+ aggregation, where a network provider was allocated an address block
+ from an address registry, and the provider announced this entire
+ block into the exterior routing domain as a single entry with a
+ single routing policy. Customers of the provider were encouraged to
+ use a sub-allocation from the provider's address block, and these
+ smaller routing elements were aggregated by the provider and not
+ directly passed into the exterior routing domain. During 1994 the
+
+
+
+Huston Informational [Page 5]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ size of the routing table remained relatively constant at some 20,000
+ entries as the growth in the number of providers announcing address
+ blocks was matched by a corresponding reduction in the number of
+ address announcements as a result of CIDR aggregation.
+
+3.3 CIDR Growth
+
+ For the next four years until the start of 1998, CIDR proved
+ effective in damping unconstrained growth in the BGP routing table.
+ During this period, the BGP table grew at an approximate linear rate,
+ adding some 10,000 entries per year.
+
+ A close examination of the table reveals a greater level of stability
+ in the routing system at this time. The short term (hourly)
+ variation in the number of announced routes reduced, both as a
+ percentage of the number of announced routes, and also in absolute
+ terms. One of the other benefits of using large aggregate address
+ blocks is that instability at the edge of the network is not
+ immediately propagated into the routing core. The instability at the
+ last hop is absorbed at the point where an aggregate route is used in
+ place of a collection of more specific routes. This, coupled with
+ widespread adoption of BGP route flap damping, was very effective in
+ reducing the short term instability in the routing space during this
+ period.
+
+3.4 Current Growth
+
+ In late 1998 the trend of growth in the BGP table size changed
+ radically, and the growth for the period 1998 - 2000 is again showing
+ all the signs of a re-establishment of a growth trend with strong
+ correlation to an exponential growth model. This change in the
+ growth trend appears to indicate that pressure to use hierarchical
+ address allocations and CIDR has been unable to keep pace with the
+ levels of growth of the Internet, and some additional factors that
+ impact the growth in the BGP table size have become more prominent in
+ the Internet. This has lead to a growth pattern in the total size of
+ the BGP table that has more in common with a compound growth model
+ than a linear model. A good fit of the data for the period from
+ January 1999 until December 2000 is a compound growth model of 42%
+ growth per year.
+
+ An initial observation is that this growth pattern points to some
+ weakening of the hierarchical model of connectivity and routing
+ within the Internet. To identify the characteristics of this recent
+ trend it is necessary to look at a number of related characteristics
+ of the routing table.
+
+
+
+
+
+Huston Informational [Page 6]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ BGP table size data for the first half of 2001 shows different trends
+ at various measurement points in the Internet. Some measurement
+ points where the local AS has a relative larger number of more
+ specific routes show a steady state for the first half of 2001 with
+ no appreciable growth, while other measurement points where the local
+ AS has had a lower number of more specific routes initially show a
+ continuation of table size growth. There are a number of commonly
+ observed discontinuities in the data for 2001, corresponding to
+ events where a significant number of more specific entries have been
+ replaced by an encompassing aggregate prefix.
+
+4. Related Measurements derived from BGP Table
+
+ The level of analysis of the BGP routing table has been extended in
+ an effort to identify the factors contributing to this growth, and to
+ determine whether this leads to some limiting factors in the
+ potential size of the routing space. Analysis includes measuring the
+ number of ASes in the routing system, and the number of distinct AS
+ paths, the range of addresses spanned by the table and average span
+ of each routing entry.
+
+4.1 AS Number Consumption
+
+ Each network that is multi-homed within the topology of the Internet
+ and wishes to express a distinct external routing policy must use a
+ unique AS number to associate its advertised addresses with such a
+ policy. In general, each network is associated with a single AS, and
+ the number of ASes in the default-free routing table tracks the
+ number of entities that have unique routing policies. There are some
+ exceptions to this, including large global transit providers with
+ varying regional policies, where multiple ASes are associated with a
+ single network, but such exceptions are relatively uncommon.
+
+ The number of unique ASes present in the BGP table has been tracked
+ since late 1996, and the trend of AS number deployment over the past
+ four years is also one that matches a compound growth model with a
+ growth rate of 51% per year. As of the start of May 2001 there were
+ some 10,700 ASes visible in the BGP table. At a continued rate of
+ growth of 51% p.a., the 16 bit AS number space will be fully deployed
+ by August 2005. Work is underway within the IETF to modify the BGP
+ protocol to carry AS numbers in a 32-bit field. [8] While the
+ protocol modifications are relatively straightforward, the major
+ responsibility rests with the operations community to devise a
+ transition plan that will allow gradual transition into this larger
+ AS number space.
+
+
+
+
+
+
+Huston Informational [Page 7]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+4.2 Address Consumption
+
+ It is also possible to track the total amount of address space
+ advertised within the BGP routing table. At the start of 2001 the
+ routing table encompassed 1,081,131,733 addresses, or some 25.17% of
+ the total IPv4 address space, or 25.4% of the usable unicast public
+ address space. By September 2001 this has growth to 1,123,124,472
+ addresses, or some 26% of the IPv4 address space. This has grown
+ from 1,019,484,655 addresses in November 1999. However, there are a
+ number of /8 prefixes that are periodically announced and withdrawn
+ from the BGP table, and if the effects of these prefixes is removed,
+ a compound growth model against the previous 12 months of data of
+ this metric yields a best fit model of growth of 7% per year in the
+ total number of addresses spanned by the routing table.
+
+ Compared to the 42% growth in the number of routing advertisements,
+ the growth in the amount of address space advertised is far lower.
+ One possible explanation is that much of the growth of the Internet
+ in terms of growth in the number of connected devices is occurring
+ behind various forms of NAT gateways. In terms of solving the
+ perceived finite nature of the address space identified just under a
+ decade ago, this explanation would tend to indicate that the Internet
+ appears so far to have embraced the approach of using NATs,
+ irrespective of their various perceived functional shortcomings. [9]
+ This explanation also supports the observation of smaller address
+ fragments supporting distinct policies in the BGP table, as such
+ small address blocks may encompass arbitrarily large networks located
+ behind one or more NAT gateways. There are alternative explanations
+ of this difference between the growth of the table and the growth of
+ address space, including a trend towards discrete exterior routing
+ policies being applied to finer address blocks.
+
+4.3 Granularity of Table Entries
+
+ The intent of CIDR aggregation was to support the use of large
+ aggregate address announcements in the BGP routing table. To confirm
+ whether this is still the case the average span of each BGP
+ announcement has been tracked for the past 12 months. The data
+ indicates a decline in the average span of a BGP advertisement from
+ 16,000 individual addresses in November 1999 to 12,100 in December
+ 2000. As of September 2001 this span has been further reduced to an
+ average 10,700 individual addresses per routing entry. This
+ corresponds to an increase in the average prefix length from /18.03
+ to /18.44 by December 2000 and a /18.6 by September 2001. Separate
+ observations of the average prefix length used to route traffic in
+ operation networks in late 2000 indicate an average length of 18.1
+ [11]. This trend towards finer-grained entries in the routing table
+ is potentially cause for concern, as it implies the increasing spread
+
+
+
+Huston Informational [Page 8]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ of traffic over greater numbers of increasingly smaller forwarding
+ table entries. This, in turn, has implications for the design of
+ high speed core routers, particularly when extensive use is made of a
+ small number of very high speed cached forwarding entries within the
+ switching subsystem of a router's design.
+
+ A similar observation can be made regarding the number of addresses
+ advertised per AS. In December 1999 each AS advertised an average of
+ 161,900 addresses (equivalent to a prefix length /14.69, and in
+ January 2001 this average has fallen to 115,800 addresses, an
+ equivalent prefix length of /15.18.
+
+ This points to increasingly finer levels of routing detail being
+ announced into the global routing domain. This, in turn, supports
+ the observation that the efficiencies of hierarchical routing
+ structures are no longer being fully realized within the deployed
+ Internet. Instead, increasingly finer levels of routing detail are
+ being announced globally in the BGP tables. The most likely cause of
+ this trend of finer levels of routing granularity is an increasingly
+ dense interconnection mesh, where more networks are moving from a
+ single-homed connection with hierarchical addressing and routing into
+ multi-homed connections without any hierarchical structure. The spur
+ for this increasingly dense connectivity mesh in the Internet may
+ well be the declining unit costs of communications bearer services
+ coupled with a common perception that richer sets of adjacencies
+ yields greater levels of service resilience.
+
+4.4 Prefix Length Distribution
+
+ In addition to looking at the average prefix length, the analysis of
+ the BGP table also includes an examination of the number of
+ advertisements of each prefix length.
+
+ An extensive program commenced in the mid-nineties to move away from
+ intense use of the Class C space and to encourage providers to
+ advertise larger address blocks, as part of the CIDR effort. This
+ has been reinforced by the address registries who have used provider
+ allocation blocks that correspond to a prefix length of /19 and, more
+ recently, /20.
+
+ These measures were introduced in the mid-90's when there were some
+ 20,000 - 30,000 entries in the BGP table. Some six years later in
+ April 2001 it is interesting to note that of the 108,000 entries in
+ the routing table, some 59,000 entries have a /24 prefix. In
+ absolute terms the /24 prefix set is the fastest growing set in the
+ BGP routing table. The routing entries of these smaller address
+ blocks also show a much higher level of change on an hourly basis.
+ While a large number of BGP routing points perform route flap
+
+
+
+Huston Informational [Page 9]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ damping, nevertheless there is still a very high level of
+ announcements and withdrawals of these entries in this particular
+ area of the routing table when viewed using a perspective of route
+ updates per prefix length. Given that the numbers of these small
+ prefixes are growing rapidly, there is cause for some concern that
+ the total level of BGP flux, in terms of the number of announcements
+ and withdrawals per second may be increasing, despite the pressures
+ from flap damping. This concern is coupled with the observation
+ that, in terms of BGP stability under scaling pressure, it is not the
+ absolute size of the BGP table that is of prime importance, but the
+ rate of dynamic path re-computations that occur in the wake of
+ announcements and withdrawals. Withdrawals are of particular concern
+ due to the number of transient intermediate states that the BGP
+ distance vector algorithm explores in processing a withdrawal.
+ Current experimental observations indicate a typical convergence time
+ of some 2 minutes to propagate a route withdrawal across the BGP
+ domain. [10]
+
+ An increase in the density of the BGP mesh, coupled with an increase
+ in the rate of such dynamic changes, does have serious implications
+ in maintaining the overall stability of the BGP system as it
+ continues to grow. The registry allocation policies also have had
+ some impact on the routing table prefix distribution. The original
+ registry practice was to use a minimum allocation unit of a /19, and
+ the 10,000 prefix entries in the /17 to /19 range are a consequence
+ of this policy decision. More recently, the allocation policy now
+ allows for a minimum allocation unit of a /20 prefix, and the /20
+ prefix is used by some 4,300 entries as of January 2001, and in
+ relative terms is one of the fastest growing prefix sets. The number
+ of entries corresponding to very small address blocks (smaller than a
+ /24), while small in number as a proportion of the total BGP routing
+ table, is the fastest growing in relative terms. The number of /25
+ through /32 prefixes in the routing table is growing faster, in terms
+ of percentage change, than any other area of the routing table. If
+ prefix length filtering were in widespread use, the practice of
+ announcing a very small address block with a distinct routing policy
+ would have no particular beneficial outcome, as the address block
+ would not be passed throughout the global BGP routing domain and the
+ propagation of the associated policy would be limited in scope. The
+ growth of the number of these small address blocks, and the diversity
+ of AS paths associated with these routing entries, points to a
+ relatively limited use of prefix length filtering in today's
+ Internet. In the absence of any corrective pressure in the form of
+ widespread adoption of prefix length filtering, the very rapid growth
+ of global announcements of very small address blocks is likely to
+ continue. In percentage terms, the set of prefixes spanning /25 to
+ /32 show the largest growth rates.
+
+
+
+
+Huston Informational [Page 10]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+4.5 Aggregation and Holes
+
+ With the CIDR routing structure it is possible to advertise a more
+ specific prefix of an existing aggregate. The purpose of this more
+ specific announcement is to punch a 'hole' in the policy of the
+ larger aggregate announcement, creating a different policy for the
+ specifically referenced address prefix.
+
+ Another use of this mechanism is to perform a rudimentary form of
+ load balancing and mutual backup for multi-homed networks. In this
+ model a network may advertise the same aggregate advertisement along
+ each connection, but then advertise a set of specific advertisements
+ for each connection, altering the specific advertisements such that
+ the load on each connection is approximately balanced. The two forms
+ of holes can be readily discerned in the routing table - while the
+ approach of policy differentiation uses an AS path that is different
+ from the aggregate advertisement, the load balancing and mutual
+ backup configuration uses the same As path for both the aggregate and
+ the specific advertisements. While it is difficult to understand
+ whether the use of such more specific advertisements was intended to
+ be an exception to a more general rule or not within the original
+ intent of CIDR deployment, there appears to be very widespread use of
+ this mechanism within the routing table. Some 59,000 advertisements,
+ or 55% of the total number of routing table entries, are being used
+ to punch policy holes in existing aggregate announcements. Of these
+ the overall majority of some 42,000 routes use distinct AS paths, so
+ that it does appear that this is evidence of finer levels of
+ granularity of connection policy in a densely interconnected space.
+ While long term data is not available for the relative level of such
+ advertisements as a proportion of the full routing table, the growth
+ level does strongly indicate that policy differentiation at a fine
+ level within existing provider aggregates is a significant driver of
+ overall table growth.
+
+5. Current State of inter-AS routing in the Internet
+
+ The resumption of compound growth trends within the BGP table, and
+ the associated aspects of finer granularity of routing entries within
+ the table form adequate grounds for consideration of potential
+ refinements to the Internet's exterior routing protocols and
+ potential refinements to current operating practices of inter-AS
+ connectivity. With the exception of the 16 bit AS number space,
+ there is no particular finite limit to any aspect of the BGP table.
+ The motivation for such activity is that a long term pattern of
+ continued growth at current rates may once again pose a potential
+ condition where the capacity of the available processors may be
+ exceeded by some aspect of the Internet routing table.
+
+
+
+
+Huston Informational [Page 11]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+5.1 A denser interconnectivity mesh
+
+ The decreasing unit cost of communications bearers in many part of
+ the Internet is creating a rapidly expanding market in exchange
+ points and other forms of inter-provider peering. A model of
+ extensive interconnection at the edges of the Internet is rapidly
+ supplanting the deployment model of a single-homed network with a
+ single upstream provider. The underlying deployment model of CIDR
+ was that of a single-homed network, allowing for a strict hierarchy
+ of supply providers. The business imperatives driving this denser
+ mesh of interconnection in the Internet are substantial, and the
+ casualty in this case is the CIDR-induced dampened growth of the BGP
+ routing table.
+
+5.2 Multi-Homed small networks and service resiliency
+
+ It would appear that one of the major drivers of the recent growth of
+ the BGP table is that of small networks, advertised as a /24 prefix
+ entry in the routing table, multi-homing with a number of peers and
+ upstream providers. In the appropriate environment where there are a
+ number of networks in relatively close proximity, using peer
+ relationships can reduce total connectivity costs, as compared to
+ using a single upstream service provider. Equally significantly,
+ multi-homing with a number of upstream providers is seen as a means
+ of improving the overall availability of the service. In essence,
+ multi-homing is seen as an acceptable substitute for upstream service
+ resiliency. This has a potential side effect that when multi-homing
+ is seen as a preferable substitute for upstream provider resiliency,
+ the upstream provider cannot command a price premium for proving
+ resiliency as an attribute of the provided service, and therefore has
+ little economic incentive to spend the additional money required to
+ engineer resiliency into the network. The actions of the network's
+ multi-homed clients then become self-fulfilling. One way to
+ characterize this behavior is that service resiliency in the Internet
+ is becoming the responsibility of the customer, not the service
+ provider.
+
+ In such an environment resiliency still exists, but rather than being
+ a function of the bearer or switching subsystem, resiliency is
+ provided through the function of the BGP routing system. The
+ question is not whether this is feasible or desirable in the
+ individual case, but whether the BGP routing system can scale
+ adequately to continue to undertake this role.
+
+
+
+
+
+
+
+
+Huston Informational [Page 12]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+5.3 Traffic Engineering via Routing
+
+ Further driving this growth in the routing table is the use of
+ selective advertisement of smaller prefixes along different paths in
+ an effort to undertake traffic engineering within a multi-homed
+ environment. While there is considerable effort being undertaken to
+ develop traffic engineering tools within a single network using MPLS
+ as the base flow management tool, inter-provider tools to achieve
+ similar outcomes are considerably more complex when using such
+ switching techniques.
+
+ At this stage the only tool being used for inter-provider traffic
+ engineering is that of the BGP routing table. Such use of BGP
+ appears to place additional fine-grained prefixes into the routing
+ table. This action further exacerbates the growth and stability
+ pressures being placed on the BGP routing domain.
+
+5.4 Lack of Common Operational Practices
+
+ There is considerable evidence of a lack of uniformity of operational
+ practices within the inter-domain routing space. This includes the
+ use and setting of prefix filters, the use and setting of route
+ damping parameters and level of verification undertaken on BGP
+ advertisements by both the advertiser and the recipient. There is
+ some extent of 'noise' in the routing table where advertisements
+ appear to be propagated well beyond their intended domain of
+ applicability, and also where withdrawals and advertisements are not
+ being adequately damped close to the origin of the route flap. This
+ diversity of operating practices also extends to policies of
+ accepting advertisements that are more specific advertisements of
+ existing provider blocks.
+
+5.5 CIDR and Hierarchical Routing
+
+ The current growth factors at play in the BGP table are not easily
+ susceptible to another round of CIDR deployment pressure within the
+ operator community. The denser interconnectivity mesh, the
+ increasing use of multi-homing with smaller address prefixes, the
+ extension of the use of BGP to perform roles related to inter-domain
+ traffic engineering and the lack of common operating practices all
+ point to a continuation of the trend of growth in the total size of
+ the BGP routing table, with this growth most apparent with
+ advertisements of smaller address blocks, and an increasing trend for
+ these small advertisements to be punching a connectivity policy
+ 'hole' in an existing provider aggregate advertisement.
+
+
+
+
+
+
+Huston Informational [Page 13]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ It may be appropriate to consider how to operate an Internet with a
+ BGP routing table that has millions of small entries, rather than the
+ expectation of a hierarchical routing space with at most tens of
+ thousands of larger entries in the global routing table.
+
+6. Future Requirements for the Exterior Routing System
+
+ It is beyond the scope of this document to define a scalable inter-
+ domain routing environment and associated routing protocols and
+ operating practices. A more modest goal is to look at the attributes
+ of routing systems as understood and identify those aspects of such
+ systems that may be applicable to the inter-domain environment as a
+ potential set of requirements for inter-domain routing tools.
+
+6.1 Scalability
+
+ The overall intent is scalability of the routing environment.
+ Scalability can be expressed in many dimensions, including number of
+ discrete network layer reachability entries, number of discrete route
+ policy entries, level of dynamic change over a unit of time of these
+ entries, time to converge to a coherent view of the connectivity of
+ the network following changes, and so on.
+
+ The basic objective behind this expressed requirement for scalability
+ is that the most likely near to medium trend in the structure of the
+ Internet is a continuation in the pattern of dense interconnectivity
+ between a large number of discrete network entities, and little
+ impetus behind hierarchical aggregating structures. It is not an
+ objective to place any particular metrics on scalability within this
+ examination of requirements, aside from indicating that a prudent
+ view would encompass a scale of connectivity in the inter-domain
+ space that is at least two orders of magnitude larger than comparable
+ metrics of the current environment.
+
+6.2 Stability and Predictability
+
+ Any routing system should behave in a stable and predictable fashion.
+ What is inferred from the predictability requirement is the behavior
+ that under identical environmental conditions the routing system
+ should converge to the same state. Stability implies that the
+ routing state should be maintained for as long as the environmental
+ conditions remain constant. Stability also implies a qualitative
+ property that minor variations in the network's state should not
+ cause large scale instability across the entire network while a new
+ stable routing state is reached. Instead, routing changes should be
+ propagated only as far as necessary to reach a new stable state, so
+ that the global requirement for stability implies some degree of
+ locality in the behavior of the system.
+
+
+
+Huston Informational [Page 14]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+6.3 Convergence
+
+ Any routing system should have adequate convergence properties. By
+ adequate it is implied that within a finite time following a change
+ in the external environment, the routing system will have reached a
+ shared common description of the network's topology that accurately
+ describes the current state of the network and is stable. In this
+ case finite time implies a time limit that is bounded by some upper
+ limit, and this upper limit reflects the requirements of the routing
+ system. In the case of the Internet this convergence time is
+ currently of the order of hundreds of seconds as an upper bound on
+ convergence. This long convergence time is perceived as having a
+ negative impact on various applications, particularly those that are
+ time critical. A more useful upper bound for convergence is of the
+ order of seconds or lower if it is desired to support a broad range
+ of application classes.
+
+ It is not a requirement to be able to undertake full convergence of
+ the inter-domain routing system in the sub-second timescale.
+
+6.4 Routing Overhead
+
+ The greater the amount of information passed within the routing
+ system, and the greater the frequency of such information exchanges,
+ the greater the level of expectation that the routing system can
+ maintain an accurate view of the connectivity of the network.
+ Equally, the greater the amount of information passed within the
+ routing system, and the higher the frequency of information exchange,
+ the higher the level of overhead consumed by operation of the routing
+ system. There is an element of design compromise in a routing system
+ to pass enough information across the system to allow each routing
+ element to have adequate local information to reach a coherent local
+ view of the network, yet ensure that the total routing overhead is
+ low.
+
+7. Architectural approaches to a scalable Exterior Routing Protocol
+
+ This document does not attempt to define an inter-domain routing
+ protocol that possess all the attributes as listed above, but a
+ number of architectural considerations can be identified that would
+ form an integral part of the protocol design process.
+
+7.1 Policy opaqueness vs. policy transparency
+
+ The two major approaches to routing protocols are distance vector and
+ link state.
+
+
+
+
+
+Huston Informational [Page 15]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ In the distance vector protocol a routing node gathers information
+ from its neighbors, applies local policy to this information and then
+ distributes this updated information to its neighbors. In this model
+ the nature of the local policy applied to the routing information is
+ not necessarily visible to the node's neighbors, and the process of
+ converting received route advertisements into advertised route
+ advertisements uses a local policy process whose policy rules are not
+ visible externally. This scenario can be described as 'policy
+ opaque'. The side effect of such an environment is that a third
+ party cannot remotely compute which routes a network may accept and
+ which may be re-advertised to each neighbor.
+
+ In link state protocols a routing node effectively broadcasts its
+ local adjacencies, and the policies it has with respect to these
+ adjacencies, to all nodes within the link state domain. Every node
+ can perform an identical computation upon this set of adjacencies and
+ associated policies in order to compute the local forwarding table.
+ The essential attribute of this environment is that the routing node
+ has to announce its routing policies, in order to allow a remote node
+ to compute which routes will be accepted from which neighbor, and
+ which routes will be advertised to each neighbor and what, if any,
+ attributes are placed on the advertisement. Within an interior
+ routing domain the local policies are in effect metrics of each link
+ and these polices can be announced within the routing domain without
+ any consequent impact.
+
+ In the exterior routing domain it is not the case that
+ interconnection policies between networks are always fully
+ transparent. Various permutations of supplier / customer
+ relationships and peering relationships have associated policy
+ qualifications that are not publicly announced for business
+ competitive reasons. The current diversity of interconnection
+ arrangements appears to be predicated on policy opaqueness, and to
+ mandate a change to a model of open interconnection policies may be
+ contrary to operational business imperatives.
+
+ An inter-domain routing tool should be able to support models of
+ interconnection where the policy associated with the interconnection
+ is not visible to any third party. If the architectural choice is a
+ constrained one between distance vector and link state, then this
+ consideration would appear to favor the continued use of a distance
+ vector approach to inter-domain routing. This choice, in turn, has
+ implications on the convergence properties and stability of the
+ inter-domain routing environment. If there is a broader spectrum of
+ choice, the considerations of policy-opaqueness would still apply.
+
+
+
+
+
+
+Huston Informational [Page 16]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+7.2 The number of routing objects
+
+ The current issues with the trend behaviors of the BGP space can be
+ coarsely summarized as the growth in the number of distinct routing
+ objects, the increased level of dynamic behaviors of these objects
+ (in the form of announcements and withdrawals).
+
+ This entails evaluating possible measures that can address the growth
+ rate in the number of objects in the inter-domain routing table, and
+ separately examining measures that can reduce the level of dynamic
+ change in the routing table. The current routing architecture
+ defines a basic unit of a route object as an originating AS number
+ and an address prefix.
+
+ In looking at the growth rate in the number of route objects, the
+ salient observation is that the number of route objects is the
+ byproduct of the density of the interconnection mesh and the number
+ of discrete points where policy is imposed of route objects. One
+ approach to reduce the growth in the number of objects is to allow
+ each object to describe larger segments of infrastructure. Such an
+ approach could use a single route object to describe a set of address
+ prefixes, or a collection of ASs, or a combination of the two. The
+ most direct form of extension would be to preserve the assumption
+ that each routing object represents an indivisible policy entity.
+ However, given that one of the drivers of the increasing number of
+ route objects is a proliferation of discrete route objects, it is not
+ immediately apparent that this form of aggregation will prove capable
+ in addressing the growth in the number of route objects.
+
+ If single route objects are to be used that encompass a set of
+ address prefixes and a collection of ASs, then it appears necessary
+ to define additional attributes within the route object to further
+ qualify the policies associated with the object in terms of specific
+ prefixes, specific ASs and specific policy semantics that may be
+ considered as policy exceptions to the overall aggregate
+
+ Another approach to reduce the number of route objects is to reduce
+ the scope of advertisement of each routing object, allowing the
+ object to be removed and proxy aggregated into some larger object
+ once the logical scope of the object has been reached. This approach
+ would entail the addition of route attributes that could be used to
+ define the circumstances where a specific route object would be
+ subsumed by an aggregate route object without impacting the policy
+ objectives associated with the original set of advertisements.
+
+
+
+
+
+
+
+Huston Informational [Page 17]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+7.3 Inter-domain Traffic Engineering
+
+ Attempting to place greater levels of detail into route objects is
+ intended to address the dual role of the current BGP system as both
+ an inter-domain connectivity maintenance protocol and as an implicit
+ traffic engineering tool.
+
+ In the current environment, advertisement of more specific prefixes
+ with unique policy but with the same origin AS is often intended to
+ create a traffic engineering response, where incoming traffic to an
+ AS may be balanced across multiple paths. The outcome is that the
+ control of the relative profile of load is placed with the
+ originating AS. The way this is achieved is by using limited
+ knowledge of the remote AS's route selection policy to explicitly
+ limit the number of egress choices available to a remote AS. The
+ most common route selection policy is the preference for more
+ specific prefixes over larger address blocks. By advertising
+ specific prefixes along specific neighbor AS connections with
+ specific route attributes, traffic destined to these addresses is
+ passed through the selected transit paths. This limitation of choice
+ allows the originating AS to override the potential policy choices of
+ all other ASs, imposing its traffic import policies at a higher level
+ than the remote AS's egress policies.
+
+ An alternative approach is the use of a class of traffic engineering
+ attributes that are attached to an aggregate route object. The
+ intent of such attributes is to direct each remote AS to respond to
+ the route object in a manner that equates to the current response to
+ more specific advertisements, but without the need to advertise
+ specific prefix route objects. However, even this approach uses
+ route objects to communicate traffic engineering policy, and the same
+ risk remains that the route table is used to carry fine-detailed
+ traffic path policies.
+
+ An alternative direction is to separate the functions of connectivity
+ maintenance and traffic engineering, using the routing protocol to
+ identify a number of viable paths from a source AS to a destination
+ AS, and use a distinct collection of traffic engineering tools to
+ allow a traffic source AS to make egress path selections that match
+ the desired traffic service profile for the traffic.
+
+ There is one critical difference between traffic engineering
+ approaches as used in intra-domain environments and the current
+ inter-domain operating practices. Whereas the intra-domain
+ environment uses the ingress network element to make the appropriate
+ path choice to the egress point, the inter domain traffic engineering
+ has the opposite intent, where a downstream AS (or egress point) is
+ attempting to influence the path choice of an upstream AS (or ingress
+
+
+
+Huston Informational [Page 18]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ point). If explicit traffic engineering were undertaken within the
+ inter-domain space, it is highly likely that the current structure
+ would be altered. Instead of the downstream element attempting to
+ constrain the path choices of an upstream element, a probable
+ approach is the downstream element placing a number of advisory
+ constraints on the upstream elements, and the upstream elements using
+ a combination of these advisory constraints, dynamic information
+ relating to path service characteristics and local policies to make
+ an egress choice.
+
+ From the perspective of the inter-domain routing environment, such
+ measures offer the potential to remove the advertisement of specific
+ routes for traffic engineering purposes. However, there is a need to
+ adding traffic engineering information into advertised route blocks,
+ requiring the definition of the syntax and semantics of traffic
+ engineering attributes that can be attached to route objects.
+
+7.4 Hierarchical Routing Models
+
+ The CIDR routing model assumed a hierarchy of providers, where at
+ each level in the hierarchy the routing policies and address space of
+ networks at the lower level of hierarchy were subsumed by the next
+ level up (or 'upstream') provider. The connectivity policy assumed
+ by this model is also a hierarchical model, where horizontal
+ connections within a single level of the hierarchy are not visible
+ beyond the networks of the two parties.
+
+ A number of external factors are increasing the density of
+ interconnection including decreasing unit costs of communications
+ services and the increasing use of exchange points to augment point-
+ to-point connectivity models with point-to-multi-point facilities.
+
+ The outcome of these external factors is a significant reduction in
+ the hierarchical nature of the inter-domain space. Such a trend can
+ be viewed with concern given the common approach of using hierarchies
+ as a tool for scaling routing systems. BGP falls within this
+ approach, and relies on hierarchies in the address space to contain
+ the number of independently routing objects. The outcomes of this
+ characteristic of the Internet in terms of the routing space is the
+ increasing number of distinct route policies that are associated with
+ each multi-homed network within the Internet.
+
+ One way to limit the proliferation of such policies across the entire
+ inter-domain space is to associate attributes to such advertisements
+ that specify the conditions whereby a remote transit AS may proxy-
+ aggregate this route object with other route objects.
+
+
+
+
+
+Huston Informational [Page 19]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+7.5 Extend or Replace BGP
+
+ A final consideration is to consider whether these requirements can
+ best be met by an approach of a set of upward-compatible extensions
+ to BGP, or by a replacement to BGP. No recommendation is made here,
+ and this is a topic requiring further investigation.
+
+ The general approach in extending BGP appears to lie in increasing
+ the number of supported transitive route attributes, allowing the
+ route originator greater control in specifying the scope of
+ propagation of the route and the intended outcome in terms of policy
+ and traffic engineering. It may also be necessary to allow BGP
+ sessions to negotiate additional functionality intended to improve
+ the convergence behavior of the protocol. Whether such changes can
+ produce a scalable and useful outcome in terms of inter-domain
+ routing remains, at this stage, an open question.
+
+ An alternative approach is that of a replacement protocol, and such
+ an approach may well be based on the adoption of a link-state
+ behavior. The issues of policy opaqueness and link-state protocols
+ have been described above. The other major issue with such an
+ approach is the need to limit the extent of link state flooding,
+ where the inter-domain space would need some further levels of
+ imposed structure similar to intra-domain areas. Such structure may
+ well imply the need for an additional set of operator inter-
+ relationships such as mutual transit, and this may prove challenging
+ to adapt to existing practices.
+
+ The potential sets of actions include more than extend or replace the
+ BGP protocol. A third approach is to continue to use BGP as the
+ basic means of propagating route objects and their associated AS
+ paths and other attributes, and use one or more overlay protocols to
+ support inter-domain traffic engineering and other forms of inter-
+ domain policy negotiation. This approach would appear to offer a
+ means of transition for the large installed base currently using BGP4
+ as their inter-domain routing protocol, placing additional
+ functionality in the overlay protocols while leaving the basic
+ functionality of BGP4 intact. The resultant inter-dependencies
+ between BGP and the overlay protocols would require very careful
+ attention, as this would be the most critical aspect of such an
+ approach.
+
+
+
+
+
+
+
+
+
+
+Huston Informational [Page 20]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+8. Directions for Further Activity
+
+ While there may exist short term actions based on providing various
+ incentives for network operators to remove redundant or inefficiently
+ grouped entries from the BGP routing table, such actions are short
+ term palliative measures, and will not provide long term answers to
+ the need to a scalable inter-domain routing protocol.
+
+ One potential short term protocol refinement is to allow a set of
+ grouped advertisements to be aggregated into a single route
+ advertisement. This form of proxy aggregation would take a set of
+ bit-wise aligned routing entries with matching route attributes, and
+ under certain well identified circumstances, aggregate these routing
+ entries into a single re-advertised aggregate routing entry. This
+ technique removes information from the routing system, and some care
+ must be taken to define a set of proxy aggregation conditions that do
+ not materially alter the flow of traffic, or the ability of
+ originating ASes to announce routing policy.
+
+ A further refinement to this approach is to consider the definition
+ of the syntax and semantics of a number of additional route
+ attributes. Such attributes could define the extent to which
+ specific route advertisements should be propagated in the inter-
+ domain space, allowing the advertisement to be subsumed by a larger
+ aggregate advertisement at the boundary of this domain. This could
+ be used to form part of the preconditions of automated proxy
+ aggregation of specific routes, and also limit the extent to which
+ announcement and withdrawals are propagated across the routing
+ domain.
+
+ It is unclear that such measures would result in substantial longer
+ term changes to the scaling and convergence properties of BGP4.
+ Taking the requirement set enumerated in section 6 of this document,
+ one approach to the longer term requirements may be to preserve a
+ number of attributes of the current BGP protocol, while refine other
+ aspects of the protocol to improve its scaling and convergence
+ properties. A minimal set of alterations could retain the Autonomous
+ System concept to allow for boundaries of information summarization,
+ as well as retaining the approach of associating each prefix
+ advertisement with an originating AS. The concept of policy
+ opaqueness would also be retained in such an approach, implying that
+ each AS accepts a set of route advertisements, applies local policy
+ constraints, and re-advertises those advertisements permitted by the
+ local policy constraints. It could be feasible to consider
+ alterations to the distance vector path selection algorithm,
+ particularly as it relates to intermediate states during processing
+ of a route withdrawal. It is also feasible to consider the use of
+ compound route attributes, allowing a route object to include an
+
+
+
+Huston Informational [Page 21]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ aggregate route, and a number of specifics of the aggregate route,
+ and attach attributes that may apply to the aggregate or a specific
+ address prefix. Such route attributes could be used to support
+ multi-homing and inter-domain traffic engineering mechanisms. The
+ overall intent of this approach is to address the major requirements
+ in the inter-domain routing space without using an increasing set of
+ globally propagated specific route objects.
+
+ A potential applied research topic is to consider the feasibility of
+ de-coupling the requirements of inter-domain connectivity management
+ with the applications of policy constraints and the issues of sender-
+ and/or receiver-managed traffic engineering requirements. Such an
+ approach may use a link-state protocol as a means of maintaining a
+ consistent view of the topology of inter-domain network, and then use
+ some form of overlay protocol to negotiate policy requirements of
+ each AS, and use a further overlay to support inter-domain traffic
+ engineering requirements. The underlying assumption of such an
+ approach is that by dividing up the functional role of inter-domain
+ routing into distinct components each component will have superior
+ scaling and convergence properties which in turn to result in
+ superior properties for the entire routing system. Obviously, this
+ assumption requires some testing.
+
+ Research topics with potential longer term application include the
+ approach of drawing a distinction between a network's identity, a
+ network's location relative to other networks, and a feasible path
+ between a source and destination network that satisfies various
+ policy and traffic engineering constraints. Again the intent of such
+ an approach would be to divide the current routing function into a
+ number of distinct scalable components.
+
+9. Security Considerations
+
+ Any adopted inter-domain routing protocol needs to be secure against
+ disruption. Disruption comes from two primary sources:
+
+ - Accidental misconfiguration
+ - Malicious attacks
+
+ Given past experience with routing protocols, both can be significant
+ sources of harm.
+
+ Given that it is not reasonable to guarantee the security of all the
+ routers involved in the global Internet inter-domain routing system,
+ there is also every reason to believe that malicious attacks may come
+ from peer routers, in addition to coming from external sources.
+
+
+
+
+
+Huston Informational [Page 22]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ A protocol design should therefore consider how to minimize the
+ damage to the overall routing computation that can be caused by a
+ single or small set of misbehaving routers.
+
+ The routing system itself needs to be resilient against accidental or
+ malicious advertisements of a route object by a route server not
+ entitled to generate such an advertisement. This implies several
+ things, including the need for cryptographic validation of
+ announcements, cryptographic protection of various critical routing
+ messages and an accurate and trusted database of routing assignments
+ via which authorization can be checked.
+
+10. References
+
+ [1] Bradner, S., "The Internet Standards Process -- Revision 3",
+ BCP 9, RFC 2026, October 1996.
+
+ [2] Clark, D., Chapin, L., Cerf, V., Braden, R. and R. Hobby,
+ "Towards the Future Internet Architecture", RFC 1287, December
+ 1991.
+
+ [3] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6)
+ Specification, RFC 2460, December 1998.
+
+ [4] Srisuresh, P. and K. Egevang, "Traditional IP Network Address
+ Translator (Traditional NAT)", RFC 3022, January 2001.
+
+ [5] Fuller, V., Li, T., Yu, J. and K. Varadhan, "Classless Inter-
+ Domain Routing (CIDR): an Address Assignment and Aggregation
+ Strategy", RFC 1519, September 1993.
+
+ [6] Huston, G., "The BGP Routing Table", The Internet Protocol
+ Journal, vol. 4, No. 1, March 2001.
+
+ [7] Rekhter, Y. and T. Li, "A Border Gateway Protocol 4 (BGP-4)",
+ RFC 1771, March 1995.
+
+ [8] Vohara, Q. and E. Chen, "BGP support for four-octet AS number
+ space", Work in Progress.
+
+ [9] Hain, T., "Architectural Implications of NAT", RFC 2993,
+ November 2000.
+
+ [10] Labovitz, C., Ahuja, A., Bose, A. and J. Jahanian, "Delayed
+ Internet Routing Convergence", Proceedings ACM SIGCOMM 2000,
+ August 2000.
+
+
+
+
+
+Huston Informational [Page 23]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+ [11] Lothberg, P., personal communication, December 2000.
+
+11. Acknowledgements
+
+ This document is the outcome of a collaborative effort of the IAB,
+ and the editor acknowledges the contributions of the members of the
+ IAB in the preparation of the document. The contributions of John
+ Leslie, Thomas Narten and Abha Ahuja in reviewing this document are
+ also acknowledged.
+
+12. Author
+
+ Internet Architecture Board
+ Email: iab@ietf.org
+
+
+ Geoff Huston
+ Telstra
+ 5/490 Northbourne Ave
+ Dickson ACT 2602
+ Australia
+
+ EMail: gih@telstra.net
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Huston Informational [Page 24]
+
+RFC 3221 Commentary on Inter-Domain Routing December 2001
+
+
+13. Full Copyright Statement
+
+ Copyright (C) The Internet Society (2001). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Huston Informational [Page 25]
+