1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
2188
2189
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
2218
2219
2220
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
2236
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
2341
2342
2343
2344
2345
2346
2347
2348
2349
2350
2351
2352
2353
2354
2355
2356
2357
2358
2359
2360
2361
2362
2363
2364
2365
2366
2367
2368
2369
2370
2371
2372
2373
2374
2375
2376
2377
2378
2379
2380
2381
2382
2383
2384
2385
2386
2387
2388
2389
2390
2391
2392
2393
2394
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
2406
2407
2408
2409
2410
2411
2412
2413
2414
2415
2416
2417
2418
2419
2420
2421
2422
2423
2424
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
2436
2437
2438
2439
2440
2441
2442
2443
2444
2445
2446
2447
2448
2449
2450
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
2475
2476
2477
2478
2479
2480
2481
2482
2483
2484
2485
2486
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509
2510
2511
2512
2513
2514
2515
2516
2517
2518
2519
2520
2521
2522
2523
2524
2525
2526
2527
2528
2529
2530
2531
2532
2533
2534
2535
2536
2537
2538
2539
2540
2541
2542
2543
2544
2545
2546
2547
2548
2549
2550
2551
2552
2553
2554
2555
2556
2557
2558
2559
2560
2561
2562
2563
2564
2565
2566
2567
2568
2569
2570
2571
2572
2573
2574
2575
2576
2577
2578
2579
2580
2581
2582
2583
2584
2585
2586
2587
2588
2589
2590
2591
2592
2593
2594
2595
2596
2597
2598
2599
2600
2601
2602
2603
2604
2605
2606
2607
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623
2624
2625
2626
2627
2628
2629
2630
2631
2632
2633
2634
2635
2636
2637
2638
2639
2640
2641
2642
2643
2644
2645
2646
2647
2648
2649
2650
2651
2652
2653
2654
2655
2656
2657
2658
2659
2660
2661
2662
2663
2664
2665
2666
2667
2668
2669
2670
2671
2672
2673
2674
2675
2676
2677
2678
2679
2680
2681
2682
2683
2684
2685
2686
2687
2688
2689
2690
2691
2692
2693
2694
2695
2696
2697
2698
2699
2700
2701
2702
2703
2704
2705
2706
2707
2708
2709
2710
2711
2712
2713
2714
2715
2716
2717
2718
2719
2720
2721
2722
2723
2724
2725
2726
2727
2728
2729
2730
2731
2732
2733
2734
2735
2736
2737
2738
2739
2740
2741
2742
2743
2744
2745
2746
2747
2748
2749
2750
2751
2752
2753
2754
2755
2756
2757
2758
2759
2760
2761
2762
2763
2764
2765
2766
2767
2768
2769
2770
2771
2772
2773
2774
2775
2776
2777
2778
2779
2780
2781
2782
2783
2784
2785
2786
2787
2788
2789
2790
2791
2792
2793
2794
2795
2796
2797
2798
2799
2800
2801
2802
2803
2804
2805
2806
2807
2808
2809
2810
2811
2812
2813
2814
2815
2816
2817
2818
2819
2820
2821
2822
2823
2824
2825
2826
2827
2828
2829
2830
2831
2832
2833
2834
2835
2836
2837
2838
2839
2840
2841
2842
2843
2844
2845
2846
2847
2848
2849
2850
2851
2852
2853
2854
2855
2856
2857
2858
2859
|
Internet Research Task Force (IRTF) E. Davies
Request for Comments: 5773 Folly Consulting
Category: Historic A. Doria
ISSN: 2070-1721 LTU
February 2010
Analysis of Inter-Domain Routing Requirements and History
Abstract
This document analyzes the state of the Internet domain-based routing
system, concentrating on Inter-Domain Routing (IDR) and also
considering the relationship between inter-domain and intra-domain
routing. The analysis is carried out with respect to RFC 1126 and
other IDR requirements and design efforts looking at the routing
system as it appeared to be in 2001 with editorial additions
reflecting developments up to 2006. It is the companion document to
"A Set of Possible Requirements for a Future Routing Architecture"
(RFC 5772), which is a discussion of requirements for the future
routing architecture, addressing systems developments and future
routing protocols. This document summarizes discussions held several
years ago by members of the IRTF Routing Research Group (IRTF RRG)
and other interested parties. The document is published with the
support of the IRTF RRG as a record of the work completed at that
time, but with the understanding that it does not necessarily
represent either the latest technical understanding or the technical
consensus of the research group at the date of publication.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for the historical record.
This document defines a Historic Document for the Internet community.
This document is a product of the Internet Research Task Force
(IRTF). The IRTF publishes the results of Internet-related research
and development activities. These results might not be suitable for
deployment. This RFC represents the individual opinion(s) of one or
more members of the Routing Research Group of the Internet Research
Task Force (IRTF). Documents approved for publication by the IRSG
are not a candidate for any level of Internet Standard; see Section 2
of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc5773.
Davies & Doria Historic [Page 1]
^L
RFC 5773 IDR History February 2010
Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
Davies & Doria Historic [Page 2]
^L
RFC 5773 IDR History February 2010
Table of Contents
1. Provenance of This Document .....................................4
2. Introduction ....................................................5
2.1. Background .................................................7
3. Historical Perspective ..........................................7
3.1. The Legacy of RFC 1126 .....................................7
3.1.1. General Requirements ................................8
3.1.2. "Functional Requirements" ..........................13
3.1.3. "Non-Goals" ........................................21
3.2. ISO OSI IDRP, BGP, and the Development of Policy Routing ..25
3.3. Nimrod Requirements .......................................30
3.4. PNNI ......................................................32
4. Recent Research Work ...........................................33
4.1. Developments in Internet Connectivity .....................33
4.2. DARPA NewArch Project .....................................34
4.2.1. Defending the End-to-End Principle .................35
5. Existing Problems of BGP and the Current Inter-/Intra-Domain
Architecture ...................................................35
5.1. BGP and Auto-Aggregation ..................................36
5.2. Convergence and Recovery Issues ...........................36
5.3. Non-Locality of Effects of Instability and
Misconfiguration ..........................................37
5.4. Multi-Homing Issues .......................................37
5.5. AS Number Exhaustion ......................................38
5.6. Partitioned ASs ...........................................39
5.7. Load Sharing ..............................................40
5.8. Hold-Down Issues ..........................................40
5.9. Interaction between Inter-Domain Routing and
Intra-Domain Routing ......................................40
5.10. Policy Issues ............................................42
5.11. Security Issues ..........................................42
5.12. Support of MPLS and VPNS .................................43
5.13. IPv4/IPv6 Ships in the Night .............................43
5.14. Existing Tools to Support Effective Deployment of
Inter-Domain Routing .....................................44
5.14.1. Routing Policy Specification Language RPSL
(RFC 2622 and RFC 2650) and RIPE NCC Database
(RIPE 157) ........................................44
6. Security Considerations ........................................45
7. Acknowledgments ................................................45
8. Informative References .........................................46
Davies & Doria Historic [Page 3]
^L
RFC 5773 IDR History February 2010
1. Provenance of This Document
In 2001, the IRTF Routing Research Group (IRTF RRG) chairs, Abha
Ahuja and Sean Doran, decided to establish a sub-group to look at
requirements for inter-domain routing (IDR). A group of well-known
routing experts was assembled to develop requirements for a new
routing architecture. Their mandate was to approach the problem
starting from a blank slate. This group was free to take any
approach, including a revolutionary approach, in developing
requirements for solving the problems they saw in inter-domain
routing. Their eventual approach documented requirements for a
complete future routing and addressing architecture rather than just
the requirements for IDR.
Simultaneously, an independent effort was started in Sweden with a
similar goal. A team, calling itself Babylon, with participation
from vendors, service providers, and academia, assembled to
understand the history of inter-domain routing, to research the
problems seen by the service providers, and to develop a proposal of
requirements for a follow-on to the current routing architecture.
This group's approach required an evolutionary approach starting from
current routing architecture and practice. In other words, the group
limited itself to developing an evolutionary strategy and
consequently assumed that the architecture would probably remain
domain-based. The Babylon group was later folded into the IRTF RRG
as Sub-Group B to distinguish it from the original RRG Sub-Group A.
This document, which was a part of Sub-Group B's output, provides a
snapshot of the state of Inter-Domain Routing (IDR) at the time of
original writing (2001) with some minor updates to take into account
developments since that date, bringing it up to date in 2006. The
development of the new requirements set was then motivated by an
analysis of the problems that IDR has been encountering in the recent
past. This document is intended as a counterpart to the Routing
Requirements document ("A Set of Possible Requirements for a Future
Routing Architecture"), which documents the requirements for future
routing systems as captured separately by the IRTF RRG Sub-Groups A
and B [RFC5772].
The IRTF RRG supported publication of this document as a historical
record of the work completed on the understanding that it does not
necessarily represent either the latest technical understanding or
the technical consensus of the research group at the time of
publication. The document has had substantial review by members of
the Babylon team, members of the IRTF RRG, and others over the years.
Davies & Doria Historic [Page 4]
^L
RFC 5773 IDR History February 2010
2. Introduction
For the greater part of its existence, the Internet has used a
domain-oriented routing system whereby the routers and other nodes
making up the infrastructure are partitioned into a set of
administrative domains, primarily along ownership lines. Individual
routing domains (also known as Autonomous Systems (ASs)), which maybe
a subset of an administrative domain, are made up of a finite,
connected set of nodes (at least in normal operation). Each routing
domain is subject to a coherent set of routing and other policies
managed by a single administrative authority. The domains are
interlinked to form the greater Internet, producing a very large
network: in practice, we have to treat this network as if it were
infinite in extent as there is no central knowledge about the whole
network of domains. An early presentation of the concept of routing
domains can be found in Paul Francis' OSI routing architecture paper
from 1987 [Tsuchiya87] (Paul Francis was formerly known as Paul
Tsuchiya).
The domain concept and domain-oriented routing has become so
fundamental to Internet-routing thinking that it is generally taken
as an axiom these days and not even defined again (cf., [NewArch03]).
The issues discussed in the present document notwithstanding, it has
proved to be a robust and successful architectural concept that
brings with it the possibility of using different routing mechanisms
and protocols within the domains (intra-domain) and between the
domains (inter-domain). This is an attractive division, because
intra-domain protocols can exploit the well-known finite scope of the
domain and the mutual trust engendered by shared ownership to give a
high degree of control to the domain administrators, whereas inter-
domain routing lives in an essentially infinite region featuring a
climate of distrust built on a multitude of competitive commercial
agreements and driven by less-than-fully-public policies from each
component domain. Of course, like any other assumption that has been
around for a very long time, the domain concept should be reevaluated
to make sure that it is still helping!
It is generally accepted that there are major shortcomings in the
inter-domain routing of the Internet today and that these may result
in severe routing problems within an unspecified period of time.
Remedying these shortcomings will require extensive research to tie
down the exact failure modes that lead to these shortcomings and
identify the best techniques to remedy the situation. Comparatively,
intra-domain routing works satisfactorily, and issues with intra-
domain routing are mainly associated with the interface between
intra- and inter-domain routing.
Davies & Doria Historic [Page 5]
^L
RFC 5773 IDR History February 2010
Reviewer's Note: Even in 2001, there was a wide difference of
opinion across the community regarding the shortcomings of inter-
domain routing. In the years between writing and publication,
further analysis, changes in operational practice, alterations to
the demands made on inter-domain routing, modifications made to
BGP and a recognition of the difficulty of finding a replacement
may have altered the views of some members of the community.
Changes in the nature and quality of the services that users want
from the Internet are difficult to provide within the current
framework, as they impose requirements never foreseen by the original
architects of the Internet routing system.
The kind of radical changes that have to be accommodated are
epitomized by the advent of IPv6 and the application of IP mechanisms
to private commercial networks that offer specific service guarantees
beyond the best-effort services of the public Internet. Major
changes to the inter-domain routing system are inevitable to provide
an efficient underpinning for the radically changed and increasingly
commercially-based networks that rely on the IP protocol suite.
Current practice stresses the need to separate the concerns of the
control plane and the forwarding plane in a router: this document
will follow this practice, but we still use the term "routing" as a
global portmanteau to cover all aspects of the system.
This document provides a historical perspective on the current state
of inter-domain routing and its relationship to intra-domain routing
in Section 3 by revisiting the previous IETF requirements document
intended to steer the development of a future routing system. These
requirements, which informed the design of the Border Gateway
Protocol (BGP) in 1989, are contained in RFC 1126 -- "Goals and
Functional Requirements for Inter-Autonomous System Routing"
[RFC1126].
Section 3 also looks at some other work on requirements for domain-
based routing that was carried out before and after RFC 1126 was
published. This work fleshes out the historical perspective and
provides some additional insights into alternative approaches that
may be instructive when building a new set of requirements.
The motivation for change and the inspiration for some of the
requirements for new routing architectures derive from the problems
attributable to the current domain-based routing system that are
being experienced in the Internet today. These will be discussed in
Section 5.
Davies & Doria Historic [Page 6]
^L
RFC 5773 IDR History February 2010
2.1. Background
Today's Internet uses an addressing and routing structure that has
developed in an ad hoc, more or less upwards-compatible fashion. The
structure has progressed from supporting a non-commercial Internet
with a single administrative domain to a solution that is able to
control today's multi-domain, federated Internet, carrying traffic
between the networks of commercial, governmental, and not-for-profit
participants. This is not achieved without a great deal of 24/7
vigilance and operational activity by network operators: Internet
routing often appears to be running close to the limits of stability.
As well as directing traffic to its intended endpoint, inter-domain
routing mechanisms are expected to implement a host of domain-
specific routing policies for competing, communicating domains. The
result is not ideal, particularly as regards inter-domain routing
mechanisms, but it does a pretty fair job at its primary goal of
providing any-to-any connectivity to many millions of computers.
Based on a large body of anecdotal evidence, but also on a growing
body of experimental evidence [Labovitz02] and analytic work on the
stability of BGP under certain policy specifications [Griffin99], the
main Internet inter-domain routing protocol, BGP version 4 (BGP-4),
appears to have a number of problems. These problems are discussed
in more detail in Section 5. Additionally, the hierarchical nature
of the inter-domain routing problem appears to be changing as the
connectivity between domains becomes increasingly meshed [RFC3221],
which alters some of the scaling and structuring assumptions on which
BGP-4 is built. Patches and fix-ups may relieve some of these
problems, but others may require a new architecture and new
protocols.
3. Historical Perspective
3.1. The Legacy of RFC 1126
RFC 1126 [RFC1126] outlined a set of requirements that were intended
to guide the development of BGP.
Editors' Note: When this document was reviewed by Yakov Rekhter,
one of the designers of BGP, his view was that "While some people
expected a set of requirements outlined in RFC 1126 to guide the
development of BGP, in reality the development of BGP happened
completely independently of RFC 1126. In other words, from the
point of view of the development of BGP, RFC 1126 turned out to be
totally irrelevant". On the other hand, it appears that BGP, as
currently implemented, has met a large proportion of these
requirements, especially for unicast traffic.
Davies & Doria Historic [Page 7]
^L
RFC 5773 IDR History February 2010
While the network is demonstrably different from what it was in 1989,
having:
o moved from single to multiple administrative control,
o increased in size by several orders of magnitude, and
o migrated from a fairly tree-like connectivity graph to a meshier
style
many of the same requirements remain. As a first step in setting
requirements for the future, we need to understand the requirements
that were originally set for the current protocols. In charting a
future architecture, we must first be sure to do no harm. This means
a future domain-based routing system has to support, as its base
requirement, the level of function that is available today.
The following sections each relate to a requirement, or non-
requirement listed in RFC 1126. In fact, the section names are
direct quotes from the document. The discussion of these
requirements covers the following areas:
Explanation: Optional interpretation for today's audience of
the original intent of the requirement.
Relevance: Is the requirement of RFC 1126 still relevant, and
to what degree? Should it be understood
differently in today's environment?
Current practice: How well is the requirement met by current
protocols and practice?
3.1.1. General Requirements
3.1.1.1. "Route to Destination"
Timely routing to all reachable destinations, including multi-homing
and multicast.
Relevance: Valid, but requirements for multi-homing need
further discussion and elucidation. The
requirement should include multiple-source
multicast routing.
Davies & Doria Historic [Page 8]
^L
RFC 5773 IDR History February 2010
Current practice: Multi-homing is not efficient, and the proposed
inter-domain multicast protocol Border Gateway
Multicast Protocol (BGMP) [RFC3913] is an add-on
to BGP following many of the same strategies but
not integrated into the BGP framework.
Editors' Note: Multicast routing has moved on
again since this was originally written. By
2006, BGMP had been effectively superseded.
Multicast routing now uses Multi-protocol BGP
[RFC4760], the Multicast Source Discovery
Protocol (MSDP) [RFC3618], and Protocol
Independent Multicast - Sparse Mode (PIM-SM)
[RFC2362], [RFC4601], especially the Source
Specific Multicast (SSM) subset.
3.1.1.2. "Routing is Assured"
This requires that a user be notified within a reasonable time period
after persistent attempts, about inability to provide a service.
Relevance: Valid.
Current practice: There are ICMP messages for this; but, in many
cases, they are not used, either because of fears
about creating message storms or uncertainty about
whether the end system can do anything useful with
the resulting information. IPv6 implementations
may be able to make better use of the information
as they may have alternative addresses that could
be used to exploit an alternative routing.
3.1.1.3. "Large System"
The architecture was designed to accommodate the growth of the
Internet.
Relevance: Valid. Properties of Internet topology might be
an issue for future scalability (topology varies
from very sparse to quite dense at present).
Instead of setting out to accommodate growth in a
specific time period, indefinite growth should be
accommodated. On the other hand, such growth has
to be accommodated without making the protocols
too expensive -- trade-offs may be necessary.
Davies & Doria Historic [Page 9]
^L
RFC 5773 IDR History February 2010
Current practice: Scalability of the current protocols will not be
sufficient under the current rate of growth.
There are problems with BGP convergence for large
dense topologies, problems with the slow speed of
routing information propagation between routers in
transit domains through the intra-domain protocol,
for example, when a failure requires traffic to be
redirected to an alternative exit point from the
domain (see Section 5.9), limited support for
hierarchy, etc.
3.1.1.4. "Autonomous Operation"
This requirement encapsulates the need for administrative domains
("Autonomous Systems" - AS) to be able to operate autonomously as
regards setting routing policy:
Relevance: Valid. There may need to be additional
requirements for adjusting policy decisions to the
global functionality and for avoiding
contradictory policies. This would decrease the
possibility of unstable routing behavior.
There is a need for handling various degrees of
trust in autonomous operations, ranging from no
trust (e.g., between separate ISPs) to very high
trust where the domains have a common goal of
optimizing their mutual policies.
Policies for intra-domain operations should, in
some cases, be revealed, using suitable
abstractions.
Current practice: Policy management is in the control of network
managers, as required, but there is little support
for handling policies at an abstract level for a
domain.
Cooperating administrative entities decide about
the extent of cooperation independently. This can
lead to inconsistent, and potentially incompatible
routing policies being applied in notionally
cooperating domains. As discussed in Sections
5.2, 5.3, and 5.10, lack of coordination combined
with global range of effects of BGP policies
results in occasional disruption of Internet
routing over an area far wider than the domains
that are not cooperating effectively.
Davies & Doria Historic [Page 10]
^L
RFC 5773 IDR History February 2010
3.1.1.5. "Distributed System"
The routing environment is a distributed system. The distributed
routing environment supports redundancy and diversity of nodes and
links. Both the controlling rule sets, which implement the routing
policies, and the places where operational control is applied,
through decisions on path selection, are distributed (primarily in
the routers).
Relevance: Valid. RFC 1126 is very clear that we should not
be using centralized solutions, but maybe we need
a discussion on trade-offs between common
knowledge and distribution (i.e., to allow for
uniform policy routing, e.g., Global System for
Mobile Communications (GSM) systems are in a sense
centralized, but with hierarchies).
Current practice: Routing is very distributed, but lacking the
ability to consider optimization over several hops
or domains.
Editors' Note: Also, coordinating the
implementation of a set of routing policies
across a large domain with many routers running
BGP is difficult. The policies have to be
turned into BGP rules and applied individually
to each router, giving opportunities for
mismatch and error.
3.1.1.6. "Provide A Credible Environment"
The routing environment and services should be based upon mechanisms
and information that exhibit both integrity and security. That is,
the routers should always be working with credible data derived
through the reliable operation of protocols. Security from unwanted
modification and influence is required.
Relevance: Valid.
Current practice: BGP provides a limited mechanism for
authentication and security of peering sessions,
but this does not guarantee the authenticity or
validity of the routing information that is
exchanged.
Davies & Doria Historic [Page 11]
^L
RFC 5773 IDR History February 2010
There are certainly security problems with the
current practice. The Routing Protocol Security
Requirements (rpsec) working group has been
struggling to agree on a set of requirements for
BGP security since early 2002.
Editors' Note: Proposals for authenticating BGP
routing information using certificates were
under development by the Secure Inter-Domain
Routing (sidr) working group from 2006 through
2008.
3.1.1.7. "Be A Managed Entity"
This requires that the routing system provides adequate information
on the state of the network to allow resource, problem, and fault
management to be carried out effectively and expeditiously. The
system must also provide controls that allow managers to use this
information to make informed decisions and use it to control the
operation of the routing system.
Relevance: The requirement is reasonable, but we might need
to be more specific on what information should be
available, e.g., to prevent routing oscillations.
Current practice: All policies are determined locally, where they
may appear reasonable but there is limited global
coordination through the routing policy databases
operated by the Internet registries (AfriNIC,
APNIC, ARIN, LACNIC, RIPE, etc.).
Operators are not required to register their
policies; even when policies are registered, it is
difficult to check that the actual policies in use
in other domains match the declared policies.
Therefore, a manager cannot guarantee to design
and implement policies that will interoperate with
those of other domains to provide stable routing.
Editors' Note: Operators report that management
of BGP-based routing remains a function that
needs highly-skilled operators and continual
attention.
Davies & Doria Historic [Page 12]
^L
RFC 5773 IDR History February 2010
3.1.1.8. "Minimize Required Resources"
Relevance: Valid. However, the paragraph states that
assumptions on significant upgrades shouldn't be
made. Although this is reasonable, a new
architecture should perhaps be prepared to use
upgrades when they occur.
Current practice: Most bandwidth is consumed by the exchange of the
Network Layer Reachability Information (NLRI).
Usage of processing cycles ("Central Processor
Usage" - CPU) depends on the stability of the
Internet. Both phenomena have a local nature, so
there are not scaling problems with bandwidth and
CPU usage. Instability of routing increases the
consumption of resources in any case. The number
of networks in the Internet dominates memory
requirements -- this is a scaling problem.
3.1.2. "Functional Requirements"
3.1.2.1. "Route Synthesis Requirements"
3.1.2.1.1. "Route around failures dynamically"
Relevance: Valid. Should perhaps be stronger. Only
providing a best-effort attempt may not be enough
if real-time services are to be provided for.
Detection of failures may need to be faster than
100 ms to avoid being noticed by end-users.
Current practice: Latency of fail-over is too high; sometimes
minutes or longer.
3.1.2.1.2. "Provide loop free paths"
Relevance: Valid. Loops should occur only with negligible
probability and duration.
Current practice: Both link-state intra-domain routing and BGP
inter-domain routing (if correctly configured) are
forwarding-loop-free after having converged.
However, convergence time for BGP can be very
long, and poorly designed routing policies may
result in a number of BGP speakers engaging in a
cyclic pattern of advertisements and withdrawals
that never converges to a stable result [RFC3345].
Part of the reason for long convergence times is
Davies & Doria Historic [Page 13]
^L
RFC 5773 IDR History February 2010
the non-locality of the effects of changes in BGP
advertisements (see Section 5.3). Modifying the
inter-domain routing protocol to make the effects
of changes less global, and convergence a more
local condition, might improve performance,
assuming a suitable modification could be
developed.
3.1.2.1.3. "Know when a path or destination is unavailable"
Relevance: Valid to some extent, but there is a trade-off
between aggregation and immediate knowledge of
reachability. It requires that routing tables
contain enough information to determine that the
destination is unknown or a path cannot be
constructed to reach it.
Current practice: Knowledge about lost reachability propagates
slowly through the networks due to slow
convergence for route withdrawals.
3.1.2.1.4. "Provide paths sensitive to administrative policies"
Relevance: Valid. Policy control of routing has become
increasingly important as the Internet has turned
into a business.
Current practice: Supported to some extent. Policies can only be
applied locally in an AS and not globally. Policy
information supplied has a very small probability
of affecting policies in other ASs. Furthermore,
only static policies are supported; between static
policies and policies dependent upon volatile
events of great celerity, there should exist
events of which routing should be aware. Lastly,
there is no support for policies other than route-
properties (such as AS-origin, AS-path,
destination prefix, Multi-Exit Discriminator-
values (MED-values), etc).
Editors' Note: Subsequent to the original issue
of this document, mechanisms that acknowledge
the business relationships of operators have
been developed such as the NOPEER community
attribute [RFC3765]. However, the level of
usage of this attribute is apparently not very
great.
Davies & Doria Historic [Page 14]
^L
RFC 5773 IDR History February 2010
3.1.2.1.5. "Provide paths sensitive to user policies"
Relevance: Valid to some extent, as they may conflict with
the policies of the network administrator. It is
likely that this requirement will be met by means
of different bit-transport services offered by an
operator, but at the cost of adequate
provisioning, authentication, and policing when
utilizing the service.
Current practice: Not supported in normal routing. Can be
accomplished to some extent with loose source
routing, resulting in inefficient forwarding in
the routers. The various attempts to introduce
Quality of Service (QoS -- e.g., Integrated
Services and Differentiated Services (Diffserv))
can also be seen as means to support this
requirement, but they have met with limited
success in terms of providing alternate routes as
opposed to providing improved service on the
standard route.
Editors' Note: From the standpoint of a later
time, it would probably be more appropriate to
say "total failure" rather than "limited
success".
3.1.2.1.6. "Provide paths which characterize user quality-of-service
requirements"
Relevance: Valid to some extent, as they may conflict with
the policies of the operator. It is likely that
this requirement will be met by means of different
bit-transport services offered by an operator, but
at the cost of adequate provisioning,
authentication, and policing when utilizing the
service. It has become clear that offering to
provide a particular QoS to any arbitrary
destination from a particular source is generally
impossible: QoS, except in very "soft" forms such
as overall long-term average packet delay, is
generally associated with connection-oriented
routing.
Current practice: Creating routes with specified QoS is not
generally possible at present.
Davies & Doria Historic [Page 15]
^L
RFC 5773 IDR History February 2010
3.1.2.1.7. "Provide autonomy between inter- and intra-autonomous system
route synthesis"
Relevance: Inter- and intra-domain routing should stay
independent, but one should notice that this, to
some extent, contradicts the previous three
requirements. There is a trade-off between
abstraction and optimality.
Current practice: Inter-domain routing is performed independently of
intra-domain routing. Intra-domain routing is
however, especially in transit domains, very
interrelated with inter-domain routing.
3.1.2.2. "Forwarding Requirements"
3.1.2.2.1. "Decouple inter- and intra-autonomous system forwarding
decisions"
Relevance: Valid.
Current practice: As explained in Section 3.1.2.1.7, intra-domain
forwarding in transit domains is dependent on
inter-domain forwarding decisions.
3.1.2.2.2. "Do not forward datagrams deemed administratively
inappropriate"
Relevance: Valid, and increasingly important in the context
of enforcing policies correctly expressed through
routing advertisements but flouted by rogue peers
that send traffic for which a route has not been
advertised. On the other hand, packets that have
been misrouted due to transient routing problems
perhaps should be forwarded to reach the
destination, although along an unexpected path.
Current practice: At stub domains (i.e., domains that do not provide
any transit service for any other domains but that
connect directly to one or more transit domains),
there is packet filtering, e.g., to catch source
address spoofing on outgoing traffic or to filter
out unwanted incoming traffic. Filtering can in
particular reject traffic (such as unauthorized
transit traffic) that has been sent to a domain
even when it has not advertised a route for such
traffic on a given interface. The growing class
of "middleboxes" (midboxes, e.g., Network Address
Davies & Doria Historic [Page 16]
^L
RFC 5773 IDR History February 2010
Translators -- NATs) is quite likely to apply
administrative rules that will prevent the
forwarding of packets. Note that security
policies may deliberately hide administrative
denials. In the backbone, intentional packet
dropping based on policies is not common.
3.1.2.2.3. "Do not forward datagrams to failed resources"
Relevance: Unclear, although it is clearly desirable to
minimize the waste of forwarding resources by
discarding datagrams that cannot be delivered at
the earliest opportunity. There is a trade-off
between scalability and keeping track of
unreachable resources. The requirement
effectively imposes a requirement on adjacent
nodes to monitor for failures and take steps to
cause rerouting at the earliest opportunity, if a
failure is detected. However, packets that are
already in-flight or queued on a failed link
cannot generally be rescued.
Current practice: Routing protocols use both internal adjacency
management sub-protocols (e.g., "hello" protocols)
and information from equipment and lower-layer
link watchdogs to keep track of failures in
routers and connecting links. Failures will
eventually result in the routing protocol
reconfiguring the routing to avoid (if possible) a
failed resource, but this is generally very slow
(30s or more). In the meantime, datagrams may
well be forwarded to failed resources. In general
terms, end hosts and some non-router middleboxes
do not participate in these notifications, and
failures of such boxes will not affect the routing
system.
3.1.2.2.4. "Forward datagram according to its characteristics"
Relevance: Valid. This is necessary in enabling
differentiation in the network, based on QoS,
precedence, policy or security.
Current practice: Ingress and egress filtering can be done based on
policy. Some networks discriminate on the basis
of requested QoS.
Davies & Doria Historic [Page 17]
^L
RFC 5773 IDR History February 2010
3.1.2.3. "Information Requirements"
3.1.2.3.1. "Provide a distributed and descriptive information base"
Relevance: Valid. However, an alternative arrangement of
information bases, possibly with an element of
centralization for the domain (as mentioned in
Section 3.1.1.5) might offer some advantages
through the ability to optimize across the domain
and respond more quickly to changes and failures.
Current practice: The information base is distributed, but it is
unclear whether it supports all necessary routing
functionality.
3.1.2.3.2. "Determine resource availability"
Relevance: Valid. It should be possible to determine the
availability and levels of availability of any
resource (such as bandwidth) needed to carry out
routing. This prevents needing to discover
unavailability through failure. Resource location
and discovery is arguably a separate concern that
could be addressed outside the core routing
requirements.
Current practice: Resource availability is predominantly handled
outside of the routing system.
3.1.2.3.3. "Restrain transmission utilization"
Relevance: Valid. However, certain requirements in the
control plane, such as fast detection of faults
may be worth consumption of more resources.
Similarly, simplicity of implementation may make
it cheaper to "back haul" traffic to central
locations to minimize the cost of routing if
bandwidth is cheaper than processing.
Current practice: BGP messages probably do not ordinarily consume
excessive resources, but might during erroneous
conditions. In the data plane, the nearly
universal adoption of shortest-path protocols
could be considered to result in minimization of
transmission utilization.
Davies & Doria Historic [Page 18]
^L
RFC 5773 IDR History February 2010
3.1.2.3.4. "Allow limited information exchange"
Relevance: Valid. But perhaps routing could be improved if
certain information (especially policies) could be
available either globally or at least for a wider-
defined locality.
Editors' Note: Limited information exchange
would be potentially compatible with a more
local form of convergence than BGP tries to
achieve today. Limited information exchange is
potentially incompatible with global
convergence.
Current practice: Policies are used to determine which reachability
information is exported, but neighbors receiving
the information are not generally aware of the
policies that resulted in this export.
3.1.2.4. "Environmental Requirements"
3.1.2.4.1. "Support a packet-switching environment"
Relevance: Valid, but routing system should, perhaps, not be
limited to this exclusively.
Current practice: Supported.
3.1.2.4.2. "Accommodate a connection-less oriented user transport
service"
Relevance: Valid, but routing system should, perhaps, not be
limited to this exclusively.
Current practice: Accommodated.
3.1.2.4.3. "Accommodate 10K autonomous systems and 100K networks"
Relevance: No longer valid. Needs to be increased --
potentially indefinitely. It is extremely
difficult to foresee the future size expansion of
the Internet, so the Utopian solution would be to
achieve an Internet whose architecture is scale
invariant. Regrettably, this may not be
achievable without introducing undesirable
complexity and a suitable trade-off between
complexity and scalability is likely to be
necessary.
Davies & Doria Historic [Page 19]
^L
RFC 5773 IDR History February 2010
Current Practice: Supported, but perhaps reaching its limit. Since
the original version of this document was written
in 2001, the number of ASs advertised has grown
from around 8000 to 20000, and almost 35000 AS
numbers have been allocated by the regional
registries [Huston05]. If this growth continues,
the original 16-bit AS space in BGP-4 will be
exhausted in less than 5 years. Planning for an
extended AS space is now an urgent requirement.
Editors' Note: At the time of publication, 32-
bit AS numbers have been introduced and are
being deployed.
3.1.2.4.4. "Allow for arbitrary interconnection of autonomous systems"
Relevance: Valid. However, perhaps not all interconnections
should be accessible globally.
Current practice: BGP-4 allows for arbitrary interconnections.
3.1.2.5. "General Objectives"
3.1.2.5.1. "Provide routing services in a timely manner"
Relevance: Valid, as stated before. It might be acceptable
for a more complex service to take longer to
deliver, but it still has to meet the
application's requirements -- routing has to be at
the service of the end-to-end principle.
Editors' Note: Delays in setting up connections
due to network functions such as NAT boxes are
becoming increasingly problematic. The routing
system should try to keep any routing delay to
a minimum.
Current practice: More or less, with the exception of convergence
and fault robustness.
3.1.2.5.2. "Minimize constraints on systems with limited resources"
Relevance: Valid.
Current practice: Systems with limited resources are typically stub
domains that advertise very little information.
Davies & Doria Historic [Page 20]
^L
RFC 5773 IDR History February 2010
3.1.2.5.3. "Minimize impact of dissimilarities between autonomous
systems"
Relevance: Important. This requirement is critical to a
future architecture. In a domain-based routing
environment where the internal properties of
domains may differ radically, it will be important
to be sure that these dissimilarities are
minimized at the borders.
Current: practice: For the most part, this capability is not really
required in today's networks since the intra-
domain attributes are broadly similar across
domains.
3.1.2.5.4. "Accommodate the addressing schemes and protocol mechanisms
of the autonomous systems"
Relevance: Important, probably more so than when RFC 1126 was
originally developed because of the potential
deployment of IPv6, wider usage of MPLS, and the
increasing usage of VPNs.
Current practice: Only one global addressing scheme is supported in
most autonomous systems, but the availability of
IPv6 services is steadily increasing. Some global
backbones support IPv6 routing and forwarding.
3.1.2.5.5. "Must be implementable by network vendors"
Relevance: Valid, but note that what can be implemented today
is different from what was possible when RFC 1126
was written: a future domain-based routing
architecture should not be unreasonably
constrained by past limitations.
Current practice: BGP was implemented and meets a large proportion
of the original requirements.
3.1.3. "Non-Goals"
RFC 1126 also included a section discussing non-goals. This section
discusses the extent to which these are still non-goals. It also
considers whether the fact that they were non-goals adversely affects
today's IDR system.
Davies & Doria Historic [Page 21]
^L
RFC 5773 IDR History February 2010
3.1.3.1. "Ubiquity"
The authors of RFC 1126 were explicitly saying that IP and its inter-
domain routing system need not be deployed in every AS, and a
participant should not necessarily expect to be able to reach a given
AS, possibly because of routing policies. In a sense, this "non-
goal" has effectively been achieved by the Internet and IP protocols.
This requirement reflects a different worldview where there was
serious competition for network protocols, which is really no longer
the case. Ubiquitous deployment of inter-domain routing in
particular has been achieved and must not be undone by any proposed
future domain-based routing architecture. On the other hand:
o ubiquitous connectivity cannot be reached in a policy-sensitive
environment and should not be an aim.
Editors' Note: It has been pointed out that this statement
could be interpreted as being contrary to the Internet mission
of providing universal connectivity. The fact that limits to
connectivity will be added as operational requirements in a
policy-sensitive environment should not imply that a future
domain-based routing architecture contains intrinsic limits on
connectivity.
o it must not be required that the same routing mechanisms are used
throughout, provided that they can interoperate appropriately.
o the information needed to control routing in a part of the network
should not necessarily be ubiquitously available, and it must be
possible for an operator to hide commercially sensitive
information that is not needed outside a domain.
o the introduction of IPv6 reintroduces an element of diversity into
the world of network protocols, but the similarities of IPv4 and
IPv6 as regards routing and forwarding make this event less likely
to drive an immediate diversification in routing systems. The
potential for further growth in the size of the network enabled by
IPv6 is very likely to require changes in the future: whether this
results in the replacement of one de facto ubiquitous system with
another remains to be seen but cannot be a requirement -- it will
have to interoperate with BGP during the transition.
Relevance: De facto essential for a future domain-based
routing architecture, but what is required is
ubiquity of the routing system rather than
ubiquity of connectivity and it must be capable of
a gradual takeover through interoperation with the
existing system.
Davies & Doria Historic [Page 22]
^L
RFC 5773 IDR History February 2010
Current practice: De facto ubiquity achieved.
3.1.3.2. "Congestion control"
Relevance: It is not clear if this non-goal was to be applied
to routing or forwarding. It is definitely a non-
goal to adapt the choice of route when there is
transient congestion. However, to add support for
congestion avoidance (e.g., Explicit Congestion
Notification (ECN) and ICMP messages) in the
forwarding process would be a useful addition.
There is also extensive work going on in traffic
engineering that should result in congestion
avoidance through routing as well as in
forwarding.
Current practice: Some ICMP messages (e.g., source quench) exist to
deal with congestion control, but these are not
generally used as they either make the problem
worse or there is no mechanism to reflect the
message into the application that is providing the
source.
3.1.3.3. "Load splitting"
Relevance: This should neither be a non-goal nor an explicit
goal. It might be desirable in some cases and
should be considered as an optional architectural
feature.
Current practice: Can be implemented by exporting different prefixes
on different links, but this requires manual
configuration and does not consider actual load.
Editors' Note: This configuration is carried
out extensively as of 2006 and has been a
significant factor in routing table bloat. If
this need is a real operational requirement, as
it seems to be for multi-homed or otherwise
richly connected sites, it will be necessary to
reclassify this as a real and important goal.
Davies & Doria Historic [Page 23]
^L
RFC 5773 IDR History February 2010
3.1.3.4. "Maximizing the utilization of resources"
Relevance: Valid. Cost-efficiency should be striven for; we
note that maximizing resource utilization does not
always lead to the greatest cost-efficiency.
Current practice: Not currently part of the system, though often a
"hacked in" feature done with manual
configuration.
3.1.3.5. "Schedule to deadline service"
This non-goal was put in place to ensure that the IDR did not have to
meet real-time deadline goals such as might apply to Constant Bit
Rate (CBR) real-time services in ATM.
Relevance: The hard form of deadline services is still a non-
goal for the future domain-based routing
architecture, but overall delay bounds are much
more of the essence than was the case when RFC
1126 was written.
Current practice: Service providers are now offering overall
probabilistic delay bounds on traffic contracts.
To implement these contracts, there is a
requirement for a rather looser form of delay
sensitive routing.
3.1.3.6. "Non-interference policies of resource utilization"
The requirement in RFC 1126 is somewhat opaque, but appears to imply
that what we would today call QoS routing is a non-goal and that
routing would not seek to control the elastic characteristics of
Internet traffic whereby a TCP connection can seek to utilize all the
spare bandwidth on a route, possibly to the detriment of other
connections sharing the route or crossing it.
Relevance: Open Issue. It is not clear whether dynamic QoS
routing can or should be implemented. Such a
system would seek to control the admission and
routing of traffic depending on current or recent
resource utilization. This would be particularly
problematic where traffic crosses an ownership
boundary because of the need for potentially
commercially sensitive information to be made
available outside the ownership boundary.
Davies & Doria Historic [Page 24]
^L
RFC 5773 IDR History February 2010
Current practice: Routing does not consider dynamic resource
availability. Forwarding can support service
differentiation.
3.2. ISO OSI IDRP, BGP, and the Development of Policy Routing
During the decade before the widespread success of the World Wide
Web, ISO was developing the communications architecture and protocol
suite Open Systems Interconnection (OSI). For a considerable part of
this time, OSI was seen as a possible competitor for and even a
replacement for the IP suite as this basis for the Internet. The
technical developments of the two protocols were quite heavily
interrelated with each providing ideas and even components that were
adapted into the other suite.
During the early stages of the development of OSI, the IP suite was
still mainly in use on the ARPANET and the relatively small scale
first phase NSFNET. This was effectively a single administrative
domain with a simple tree-structured network in a three-level
hierarchy connected to a single logical exchange point (the NSFNET
backbone). In the second half of the 1980s, the NSFNET was starting
on the growth and transformation that would lead to today's Internet.
It was becoming clear that the backbone routing protocol, the
Exterior Gateway Protocol (EGP) [RFC0904], was not going to cope even
with the limited expansion being planned. EGP is an "all informed"
protocol that needed to know the identities of all gateways, and this
was no longer reasonable. With the increasing complexity of the
NSFNET and the linkage of the NSFNET network to other networks, there
was a desire for policy-based routing that would allow administrators
to manage the flow of packets between networks. The first version of
the Border Gateway Protocol (BGP-1) [RFC1105] was developed as a
replacement for EGP with policy capabilities -- a stopgap EGP version
3 had been created as an interim measure while BGP was developed.
BGP was designed to work on a hierarchically structured network, such
as the original NSFNET, but could also work on networks that were at
least partially non-hierarchical where there were links between ASs
at the same level in the hierarchy (we would now call these "peering
arrangements") although the protocol made a distinction between
different kinds of links (links are classified as upwards, downwards,
or sideways). ASs themselves were a "fix" for the complexity that
developed in the three-tier structure of the NSFNET.
Meanwhile, the OSI architects, led by Lyman Chapin, were developing a
much more general architecture for large-scale networks. They had
recognized that no one node, especially an end-system (host), could
or should attempt to remember routes from "here" to "anywhere" --
this sounds obvious today, but was not so obvious 20 years ago. They
were also considering hierarchical networks with independently
Davies & Doria Historic [Page 25]
^L
RFC 5773 IDR History February 2010
administered domains -- a model already well entrenched in the
public-switched telephone network. This led to a vision of a network
with multiple independent administrative domains with an arbitrary
interconnection graph and a hierarchy of routing functionality. This
architecture was fairly well established by 1987 [Tsuchiya87]. The
architecture initially envisaged a three-level routing functionality
hierarchy in which each layer had significantly different
characteristics:
1. *End-system to intermediate system (IS) routing (host to
router)*, in which the principal functions are discovery and
redirection.
2. *Intra-domain IS-IS routing (router to router)*, in which "best"
routes between end-systems in a single administrative domain are
computed and used. A single algorithm and routing protocol would
be used throughout any one domain.
3. *Inter-domain IS-IS routing (router to router)*, in which routes
between routing domains within administrative domains are
computed (routing is considered separately between administrative
domains and routing domains).
Level 3 of this hierarchy was still somewhat fuzzy. Tsuchiya says:
The last two components, Inter-Domain and Inter-Administration
routing, are less clear-cut. It is not obvious what should be
standardized with respect to these two components of routing. For
example, for Inter-Domain routing, what can be expected from the
Domains? By asking Domains to provide some kind of external
behavior, we limit their autonomy. If we expect nothing of their
external behavior, then routing functionality will be minimal.
Across administrations, it is not known how much trust there will
be. In fact, the definition of trust itself can only be
determined by the two or more administrations involved.
Fundamentally, the problem with Inter-Domain and Inter-
Administration routing is that autonomy and mistrust are both
antithetical to routing. Accomplishing either will involve a
number of tradeoffs which will require more knowledge about the
environments within which they will operate.
Further refinement of the model occurred over the next couple of
years and a more fully formed view is given by Huitema and Dabbous in
1989 [Huitema90]. By this stage, work on the original IS-IS link-
state protocol, originated by the Digital Equipment Corporation
(DEC), was fairly advanced and was close to becoming a Draft
Davies & Doria Historic [Page 26]
^L
RFC 5773 IDR History February 2010
International Standard. IS-IS is of course a major component of
intra-domain routing today and inspired the development of the Open
Shortest Path First (OSPF) family. However, Huitema and Dabbous were
not able to give any indication of protocol work for Level 3. There
are hints of possible use of centralized route servers.
In the meantime, the NSFNET consortium and the IETF had been
struggling with the rapid growth of the NSFNET. It had been clear
since fairly early on that EGP was not suitable for handling the
expanding network and the race was on to find a replacement. There
had been some intent to include a metric in EGP to facilitate routing
decisions, but no agreement could be reached on how to define the
metric. The lack of trust was seen as one of the main reasons that
EGP could not establish a globally acceptable routing metric: again
this seems to be a clearly futile aim from this distance in time!
Consequently, EGP became effectively a rudimentary path-vector
protocol that linked gateways with Autonomous Systems. It was
totally reliant on the tree-structured network to avoid routing
loops, and the all-informed nature of EGP meant that update packets
became very large. BGP version 1 [RFC1105] was standardized in 1989,
but it had been in development for some time before this and had
already seen action in production networks prior to standardization.
BGP was the first real path-vector routing protocol and was intended
to relieve some of the scaling problems as well as providing policy-
based routing. Routes were described as paths along a "vector" of
ASs without any associated cost metric. This way of describing
routes was explicitly intended to allow detection of routing loops.
It was assumed that the intra-domain routing system was loop-free
with the implication that the total routing system would be loop-free
if there were no loops in the AS path. Note that there were no
theoretical underpinnings for this work, and it traded freedom from
routing loops for guaranteed convergence.
Also, the NSFNET was a government-funded research and education
network. Commercial companies that were partners in some of the
projects were using the NSFNET for their research activities, but it
was becoming clear that these companies also needed networks for
commercial traffic. NSFNET had put in place "acceptable use"
policies that were intended to limit the use of the network.
However, there was little or no technology to support the legal
framework.
Practical experience, IETF IAB discussion (centered in the Internet
Architecture Task Force) and the OSI theoretical work were by now
coming to the same conclusions:
o Networks were going to be composed out of multiple administrative
domains (the federated network),
Davies & Doria Historic [Page 27]
^L
RFC 5773 IDR History February 2010
o The connections between these domains would be an arbitrary graph
and certainly not a tree,
o The administrative domains would wish to establish distinctive,
independent routing policies through the graph of Autonomous
Systems, and
o Administrative domains would have a degree of distrust of each
other that would mean that policies would remain opaque.
These views were reflected by Susan Hares' (working for Merit
Networks at that time) contribution to the Internet Architecture
(INARC) workshop in 1989, summarized in the report of the workshop
[INARC89]:
The rich interconnectivity within the Internet causes routing
problems today. However, the presenter believes the problem is
not the high degree of interconnection, but the routing protocols
and models upon which these protocols are based. Rich
interconnectivity can provide redundancy which can help packets
moving even through periods of outages. Our model of interdomain
routing needs to change. The model of autonomous confederations
and autonomous systems [RFC0975] no longer fits the reality of
many regional networks. The ISO models of administrative domain
and routing domains better fit the current Internet's routing
structure.
With the first NSFNET backbone, NSF assumed that the Internet
would be used as a production network for research traffic. We
cannot stop these networks for a month and install all new routing
protocols. The Internet will need to evolve its changes to
networking protocols while still continuing to serve its users.
This reality colors how plans are made to change routing
protocols.
It is also interesting to note that the difficulties of organizing a
transition were recognized at this stage and have not been seriously
explored or resolved since.
Policies would primarily be interested in controlling which traffic
should be allowed to transit a domain (to satisfy commercial
constraints or acceptable use policies), thereby controlling which
traffic uses the resources of the domain. The solution adopted by
both the IETF and OSI was a form of distance vector hop-by-hop
routing with explicit policy terms. The reasoning for this choice
can be found in Breslau and Estrin's 1990 paper [Breslau90]
(implicitly -- because some other alternatives are given such as a
link state with policy suggestion, which, with hindsight, would have
Davies & Doria Historic [Page 28]
^L
RFC 5773 IDR History February 2010
even greater problems than BGP on a global scale network).
Traditional distance-vector protocols exchanged routing information
in the form of a destination and a metric. The new protocols
explicitly associated policy expressions with the route by including
either a list of the source ASs that are permitted to use the route
described in the routing update, and/or a list of all ASs traversed
along the advertised route.
Parallel protocol developments were already in progress by the time
this paper was published: BGP version 2 [RFC1163] in the IETF and the
Inter-Domain Routing Protocol (IDRP) [ISO10747], which would be the
Level 3 routing protocol for the OSI architecture. IDRP was
developed under the aegis of the ANSI XS3.3 working group led by
Lyman Chapin and Charles Kunzinger. The two protocols were very
similar in basic design, but IDRP has some extra features, some of
which have been incorporated into later versions of BGP; others may
yet be so, and still others may be seen to be inappropriate. Breslau
and Estrin summarize the design of IDRP as follows:
IDRP attempts to solve the looping and convergence problems
inherent in distance vector routing by including full AD
(Administrative Domain -- essentially the equivalent of what are
now called ASs) path information in routing updates. Each routing
update includes the set of ADs that must be traversed in order to
reach the specified destination. In this way, routes that contain
AD loops can be avoided.
IDRP updates also contain additional information relevant to
policy constraints. For instance, these updates can specify what
other ADs are allowed to receive the information described in the
update. In this way, IDRP is able to express source specific
policies. The IDRP protocol also provides the structure for the
addition of other types of policy related information in routing
updates. For example, User Class Identifiers (UCI) could also be
included as policy attributes in routing updates.
Using the policy route attributes IDRP provides the framework for
expressing more fine grained policy in routing decisions.
However, because it uses hop-by-hop distance vector routing, it
only allows a single route to each destination per-QOS to be
advertised. As the policy attributes associated with routes
become more fine grained, advertised routes will be applicable to
fewer sources. This implies a need for multiple routes to be
advertised for each destination in order to increase the
probability that sources have acceptable routes available to them.
This effectively replicates the routing table per forwarding
entity for each QoS, UCI, source combination that might appear in
Davies & Doria Historic [Page 29]
^L
RFC 5773 IDR History February 2010
a packet. Consequently, we claim that this approach does not
scale well as policies become more fine grained, i.e., source or
UCI specific policies.
Over the next three or four years, successive versions of BGP (BGP-2
[RFC1163], BGP-3 [RFC1267], and BGP-4 [RFC1771]) were deployed to
cope with the growing and by now commercialized Internet. From BGP-2
onwards, BGP made no assumptions about an overall structure of
interconnections allowing it to cope with today's dense web of
interconnections between ASs. BGP version 4 was developed to handle
the change from classful to classless addressing. For most of this
time, IDRP was being developed in parallel, and both protocols were
implemented in the Merit gatedaemon routing protocol suite. During
this time, there was a movement within the IETF that saw BGP as a
stopgap measure to be used until the more sophisticated IDRP could be
adapted to run over IP instead of the OSI connectionless protocol
Connectionless Network Protocol (CLNP). However, unlike its intra-
domain counterpart IS-IS, which has stood the test of time, and
indeed proved to be more flexible than OSPF, IDRP was ultimately not
adopted by the market. By the time the NSFNET backbone was
decommissioned in 1995, BGP-4 was the inter-domain routing protocol
of choice and OSI's star was already beginning to wane. IDRP is now
little remembered.
A more complete account of the capabilities of IDRP can be found in
Chapter 14 of David Piscitello and Lyman Chapin's book "Open Systems
Networking: TCP/IP and OSI", which is now readable on the Internet
[Chapin94].
IDRP also contained quite extensive means for securing routing
exchanges, much of it based on X.509 certificates for each router and
public-/private-key encryption of routing updates.
Some of the capabilities of IDRP that might yet appear in a future
version of BGP include the ability to manage routes with explicit QoS
classes and the concept of domain confederations (somewhat different
from the confederation mechanism in today's BGP) as an extra level in
the hierarchy of routing.
3.3. Nimrod Requirements
Nimrod as expressed by Noel Chiappa in his early document, "A New IP
Routing and Addressing Architecture" [Chiappa91] and later in the
NIMROD working group documents [RFC1753] and [RFC1992] established a
number of requirements that need to be considered by any new routing
architecture. The Nimrod requirements took RFC 1126 as a starting
point and went further.
Davies & Doria Historic [Page 30]
^L
RFC 5773 IDR History February 2010
The three goals of Nimrod, quoted from [RFC1992], were as follows:
1. To support a dynamic internetwork of _arbitrary size_ (our
emphasis) by providing mechanisms to control the amount of
routing information that must be known throughout an
internetwork.
2. To provide service-specific routing in the presence of multiple
constraints imposed by service providers and users.
3. To admit incremental deployment throughout an internetwork.
It is certain that these goals should be considered requirements for
any new domain-based routing architecture.
o As discussed in other sections of this document, the rate of
growth of the amount of information needed to maintain the routing
system is such that the system may not be able to scale up as the
Internet expands as foreseen. And yet, as the services and
constraints upon those services grow, there is a need for more
information to be maintained by the routing system. One of the
key terms in the first requirements is "control". While
increasing amounts of information need to be known and maintained
in the Internet, the amounts and kinds of information that are
distributed can be controlled. This goal should be reflected in
the requirements for the future domain-based architecture.
o If anything, the demand for specific services in the Internet has
grown since 1996 when the Nimrod architecture was published.
Additionally, the kinds of constraints that service providers need
to impose upon their networks and that services need to impose
upon the routing have also increased. Any changes made to the
network in the last half-decade have not significantly improved
this situation.
o The ability to incrementally deploy any new routing architecture
within the Internet is still an absolute necessity. It is
impossible to imagine that a new routing architecture could
supplant the current architecture on a flag day.
At one point in time, Nimrod, with its addressing and routing
architectures, was seen as a candidate for IPng. History shows that
it was not accepted as the IPng, having been ruled out of the
selection process by the IESG in 1994 on the grounds that it was "too
much of a research effort" [RFC1752], although input for the
requirements of IPng was explicitly solicited from Chiappa [RFC1753].
Instead, IPv6 has been put forth as the IPng. Without entering a
discussion of the relative merits of IPv6 versus Nimrod, it is
Davies & Doria Historic [Page 31]
^L
RFC 5773 IDR History February 2010
apparent that IPv6, while it may solve many problems, does not solve
the critical routing problems in the Internet today. In fact, in
some sense, it exacerbates them by adding a requirement for support
of two Internet protocols and their respective addressing methods.
In many ways, the addition of IPv6 to the mix of methods in today's
Internet only points to the fact that the goals, as set forth by the
Nimrod team, remain as necessary goals.
There is another sense in which the study of Nimrod and its
architecture may be important to deriving a future domain-based
routing architecture. Nimrod can be said to have two derivatives:
o Multi-Protocol Label Switching (MPLS), in that it took the notion
of forwarding along well-known paths.
o Private Network-Node Interface (PNNI), in that it took the notion
of abstracting topological information and using that information
to create connections for traffic.
It is important to note, that whilst MPLS and PNNI borrowed ideas
from Nimrod, neither of them can be said to be an implementation of
this architecture.
3.4. PNNI
The Private Network-Node Interface (PNNI) routing protocol was
developed under the ATM Forum's auspices as a hierarchical route
determination protocol for ATM, a connection-oriented architecture.
It is reputed to have developed several of its methods from a study
of the Nimrod architecture. What can be gained from an analysis of
what did and did not succeed in PNNI?
The PNNI protocol includes the assumption that all peer groups are
willing to cooperate, and that the entire network is under the same
top administration. Are there limitations that stem from this "world
node" presupposition? As discussed in [RFC3221], the Internet is no
longer a clean hierarchy, and there is a lot of resistance to having
any sort of "ultimate authority" controlling or even brokering
communication.
PNNI is the first deployed example of a routing protocol that uses
abstract map exchange (as opposed to distance-vector or link-state
mechanisms) for inter-domain routing information exchange. One
consequence of this is that domains need not all use the same
mechanism for map creation. What were the results of this
abstraction and source-based route calculation mechanism?
Davies & Doria Historic [Page 32]
^L
RFC 5773 IDR History February 2010
Since the authors of this document do not have experience running a
PNNI network, the comments above are from a theoretical perspective.
Further research on these issues based on operational experience is
required.
4. Recent Research Work
4.1. Developments in Internet Connectivity
The work commissioned from Geoff Huston by the Internet Architecture
Board [RFC3221] draws a number of conclusions from the analysis of
BGP routing tables and routing registry databases:
o The connectivity between provider ASs is becoming more like a
dense mesh than the tree structure that was commonly assumed to be
commonplace a couple of years ago. This has been driven by the
increasing amounts charged for peering and transit traffic by
global service providers. Local direct peering and Internet
exchanges are becoming steadily more common as the cost of local
fibre connections drops.
o End-user sites are increasingly resorting to multi-homing onto two
or more service providers as a way of improving resiliency. This
has a knock-on effect of spectacularly fast depletion of the
available pool of AS numbers as end-user sites require public AS
numbers to become multi-homed and corresponding increase in the
number of prefixes advertised in BGP.
o Multi-homed sites are using advertisement of longer prefixes in
BGP as a means of traffic engineering to load spread across their
multiple external connections with further impact on the size of
the BGP tables.
o Operational practices are not uniform, and in some cases lack of
knowledge or training is leading to instability and/or excessive
advertisement of routes by incorrectly configured BGP speakers.
o All these factors are quickly negating the advantages in limiting
the expansion of BGP routing tables that were gained by the
introduction of Classless Inter-Domain Routing (CIDR) and
consequent prefix aggregation in BGP. It is also now impossible
for IPv6 to realize the worldview in which the default-free zone
would be limited to perhaps 10,000 prefixes.
o The typical "width" of the Internet in AS hops is now around five,
and much less in many cases.
Davies & Doria Historic [Page 33]
^L
RFC 5773 IDR History February 2010
These conclusions have a considerable impact on the requirements for
the future domain-based routing architecture:
o Topological hierarchy (e.g., mandating a tree-structured
connectivity) cannot be relied upon to deliver scalability of a
large Internet routing system.
o Aggregation cannot be relied upon to constrain the size of routing
tables for an all-informed routing system.
4.2. DARPA NewArch Project
DARPA funded a project to think about a new architecture for future
generation Internet, called NewArch (see
http://www.isi.edu/newarch/). Work started in the first half of 2000
and the main project finished in 2003 [NewArch03].
The main development is to conclude that as the Internet becomes
mainstream infrastructure, fewer and fewer of the requirements are
truly global but may apply with different force or not at all in
certain parts of the network. This (it is claimed) makes the
compilation of a single, ordered list of requirements deeply
problematic. Instead, we may have to produce multiple requirement
sets with support for differing requirement importance at different
times and in different places. This "meta-requirement" significantly
impacts architectural design.
Potential new technical requirements identified so far include:
o Commercial environment concerns such as richer inter-provider
policy controls and support for a variety of payment models
o Trustworthiness
o Ubiquitous mobility
o Policy driven self-organization ("deep auto-configuration")
o Extreme short-timescale resource variability
o Capacity allocation mechanisms
o Speed, propagation delay, and delay/bandwidth product issues
Non-technical or political "requirements" include:
o Legal and Policy drivers such as
Davies & Doria Historic [Page 34]
^L
RFC 5773 IDR History February 2010
* Privacy and free/anonymous speech
* Intellectual property concerns
* Encryption export controls
* Law enforcement surveillance regulations
* Charging and taxation issues
o Reconciling national variations and consistent operation in a
worldwide infrastructure
The conclusions of the work are now summarized in the final report
[NewArch03].
4.2.1. Defending the End-to-End Principle
One of the participants in DARPA NewArch work (Dave Clark) with one
of his associates has also published a very interesting paper
analyzing the impact of some of the new requirements identified in
NewArch (see Section 4.2) on the end-to-end principle that has guided
the development of the Internet to date [Clark00]. Their primary
conclusion is that the loss of trust between the users at the ends of
end-to-end has the most fundamental effect on the Internet. This is
clear in the context of the routing system, where operators are
unwilling to reveal the inner workings of their networks for
commercial reasons. Similarly, trusted third parties and their
avatars (mainly midboxes of one sort or another) have a major impact
on the end-to-end principles and the routing mechanisms that went
with them. Overall, the end-to-end principles should be defended so
far as is possible -- some changes are already too deeply embedded to
make it possible to go back to full trust and openness -- at least
partly as a means of staving off the day when the network will ossify
into an unchangeable form and function (much as the telephone network
has done). The hope is that by that time, a new Internet will appear
to offer a context for unfettered innovation.
5. Existing Problems of BGP and the Current Inter-/Intra-Domain
Architecture
Although most of the people who have to work with BGP today believe
it to be a useful, working protocol, discussions have brought to
light a number of areas where BGP or the relationship between BGP and
the intra-domain routing protocols in use today could be improved.
BGP-4 has been and continues to be extended since it was originally
introduced in [RFC1771] and the protocol as deployed has been
documented in [RFC4271]. This section is, to a large extent, a wish
Davies & Doria Historic [Page 35]
^L
RFC 5773 IDR History February 2010
list for the future domain-based routing architecture based on those
areas where BGP is seen to be lacking, rather than simply a list of
problems with BGP. The shortcomings of today's inter-domain routing
system have also been extensively surveyed in "Architectural
Requirements for Inter-Domain Routing in the Internet" [RFC3221],
particularly with respect to its stability and the problems produced
by explosions in the size of the Internet.
5.1. BGP and Auto-Aggregation
The initial stability followed by linear growth rates of the number
of routing objects (prefixes) that was achieved by the introduction
of CIDR around 1994, has now been once again been replaced by near-
exponential growth of number of routing objects. The granularity of
many of the objects advertised in the default-free zone is very small
(prefix length of 22 or longer): this granularity appears to be a by-
product of attempts to perform precision traffic engineering related
to increasing levels of multi-homing. At present, there is no
mechanism in BGP that would allow an AS to aggregate such prefixes
without advance knowledge of their existence, even if it was possible
to deduce automatically that they could be aggregated. Achieving
satisfactory auto-aggregation would also significantly reduce the
non-locality problems associated with instability in peripheral ASs.
On the other hand, it may be that alterations to the connectivity of
the net as described in [RFC3221] and Section 2.5.1 may limit the
usefulness of auto-aggregation.
5.2. Convergence and Recovery Issues
BGP today is a stable protocol under most circumstances, but this has
been achieved at the expense of making the convergence time of the
inter-domain routing system very slow under some conditions. This
has a detrimental effect on the recovery of the network from
failures.
The timers that control the behavior of BGP are typically set to
values in the region of several tens of seconds to a few minutes,
which constrains the responsiveness of BGP to failure conditions.
In the early days of deployment of BGP, poor network stability and
router software problems lead to storms of withdrawals closely
followed by re-advertisements of many prefixes. To control the load
on routing software imposed by these "route flaps", route-flap
damping was introduced into BGP. Most operators have now implemented
a degree of route-flap damping in their deployments of BGP. This
restricts the number of times that the routing tables will be
rebuilt, even if a route is going up and down very frequently.
Davies & Doria Historic [Page 36]
^L
RFC 5773 IDR History February 2010
Unfortunately, route-flap damping responds to multiple flaps by
increasing the route suppression time exponentially, which can result
in some parts of the Internet being unreachable for hours at a time.
There is evidence ([RFC3221] and measurements by some of the Sub-
Group B members [Jiang02]) that in today's network, route flap is
disproportionately associated with the fine-grained prefixes (length
22 or longer) associated with traffic engineering at the periphery of
the network. Auto-aggregation, as previously discussed, would tend
to mask such instability and prevent it being propagated across the
whole network. Another question that needs to be studied is the
continuing need for an architecture that requires global convergence.
Some of our studies (unpublished) show that, in some localities at
least, the network never actually reaches stability; i.e., it never
really globally converges. Can a global, and beyond, network be
designed with the requirement of global convergence?
5.3. Non-Locality of Effects of Instability and Misconfiguration
There have been a number of instances, some of which are well
documented, of a mistake in BGP configuration in a single peripheral
AS propagating across the whole Internet and resulting in misrouting
of most of the traffic in the Internet.
Similarly, a single route flap in a single peripheral AS can require
route table recalculation across the entire Internet.
This non-locality of effects is highly undesirable, and it would be a
considerable improvement if such effects were naturally limited to a
small area of the network around the problem. This is another
argument for an architecture that does not require global
convergence.
5.4. Multi-Homing Issues
As discussed previously, the increasing use of multi-homing as a
robustness technique by peripheral networks requires that multiple
routes have to be advertised for such domains. These routes must not
be aggregated close in to the multi-homed domain as this would defeat
the traffic engineering implied by multi-homing and currently cannot
be aggregated further away from the multi-homed domain due to the
lack of auto-aggregation capabilities. Consequentially, the default-
free zone routing table is growing exponentially, as it was before
CIDR.
The longest prefix match routing technique introduced by CIDR, and
implemented in BGP-4, when combined with provider address allocation
is an obstacle to effective multi-homing if load sharing across the
Davies & Doria Historic [Page 37]
^L
RFC 5773 IDR History February 2010
multiple links is required. If an AS has been allocated, its
addresses from an upstream provider, the upstream provider can
aggregate those addresses with those of other customers and need only
advertise a single prefix for a range of customers. But, if the
customer AS is also connected to another provider, the second
provider is not able to aggregate the customer addresses because they
are not taken from his allocation, and will therefore have to
announce a more specific route to the customer AS. The longest match
rule will then direct all traffic through the second provider, which
is not as required.
Example:
\ /
AS1 AS2
\ /
AS3
Figure 1: Address Aggregation
In Figure 1, AS3 has received its addresses from AS1, which means AS1
can aggregate. But if AS3 wants its traffic to be seen equally both
ways, AS3 is forced to announce both the aggregate and the more
specific route to AS2.
This problem has induced many ASs to apply for their own address
allocation even though they could have been allocated from an
upstream provider further exacerbating the default-free zone route
table size explosion. This problem also interferes with the desire
of many providers in the default-free zone to route only prefixes
that are equal to or shorter than 20 or 19 bits.
Note that some problems that are referred to as multi-homing issues
are not, and should not be, solvable through the routing system
(e.g., where a TCP load distributor is needed), and multi-homing is
not a panacea for the general problem of robustness in a routing
system [Berkowitz01].
Editors' Note: A more recent analysis of multi-homing can be found
in [RFC4116].
5.5. AS Number Exhaustion
The domain identifier or AS number is a 16-bit number. When this
paper was originally written in 2001, allocation of AS numbers was
increasing 51% a year [RFC3221] and exhaustion by 2005 was predicted.
Davies & Doria Historic [Page 38]
^L
RFC 5773 IDR History February 2010
According to some recent work again by Huston [Huston05], the rate of
increase dropped off after the business downturn, but as of July
2005, well over half the available AS numbers (39000 out of 64510)
had been allocated by IANA and around 20000 were visible in the
global BGP routing tables. A year later, these figures had grown to
42000 (April 2006) and 23000 (August 2006), respectively, and the
rate of allocation is currently about 3500 per year. Depending on
the curve-fitting model used to predict when exhaustion will occur,
the pool will run out somewhere between 2010 and 2013. There appear
to be other factors at work in this rate of increase beyond an
increase in the number of ISPs in business, although there is a fair
degree of correlation between these numbers. AS numbers are now used
for a number of purposes beyond that of identifying large routing
domains: multi-homed sites acquire an AS number in order to express
routing preferences to their various providers and AS numbers are
used part of the addressing mechanism for MPLS/BGP-based virtual
private networks (VPNs) [RFC4364]. The IETF has had a proposal under
development for over four years to increase the available range of AS
numbers to 32 bits [RFC4893]. Much of the slowness in development is
due to the deployment challenge during transition. Because of the
difficulties of transition, deployment needs to start well in advance
of actual exhaustion so that the network as a whole is ready for the
new capability when it is needed. This implies that standardization
needs to be complete and implementations available at least well in
advance of expected exhaustion so that deployment of upgrades that
can handle the longer AS numbers, should be starting around 2008, to
give a reasonable expectation that the change has been rolled out
across a large fraction of the Internet by the time exhaustion
occurs.
Editors' Note: The Regional Internet Registries (RIRs) are
planning to move to assignment of the longer AS numbers by default
on 1 January 2009, but there are concerns that significant numbers
of routers will not have been upgraded by then.
5.6. Partitioned ASs
Tricks with discontinuous ASs are used by operators, for example, to
implement anycast. Discontinuous ASs may also come into being by
chance if a multi-homed domain becomes partitioned as a result of a
fault and part of the domain can access the Internet through each
connection. It may be desirable to make support for this kind of
situation more transparent than it is at present.
Davies & Doria Historic [Page 39]
^L
RFC 5773 IDR History February 2010
5.7. Load Sharing
Load splitting or sharing was not a goal of the original designers of
BGP and it is now a problem for today's network designers and
managers. Trying to fool BGP into load sharing between several links
is a constantly recurring exercise for most operators today.
5.8. Hold-Down Issues
As with the interval between "hello" messages in OSPF, the typical
size and defined granularity (seconds to tens of seconds) of the
"keepalive" time negotiated at start-up for each BGP connection
constrains the responsiveness of BGP to link failures.
The recommended values and the available lower limit for this timer
were set to limit the overhead caused by keepalive messages when link
bandwidths were typically much lower than today. Analysis and
experiment ([Alaettinoglu00], [Sandiick00] and [RFC4204]) indicate
that faster links could sustain a much higher rate of keepalive
messages without significantly impacting normal data traffic. This
would improve responsiveness to link and node failures but with a
corresponding increase in the risk of instability, if the error
characteristics of the link are not taken properly into account when
setting the keepalive interval.
Editors' Note: A "fast" liveness protocol has been specified in
[Katz10].
An additional problem with the hold-down mechanism in BGP is the
amount of information that has to be exchanged to re-establish the
database of route advertisements on each side of the link when it is
re-established after a failure. Currently any failure, however brief
forces a full exchange that could perhaps be constrained by retaining
some state across limited time failures and using revision control,
transaction and replication techniques to resynchronize the
databases. Various techniques have been implemented to try to reduce
this problem, but they have not yet been standardized.
5.9. Interaction between Inter-Domain Routing and Intra-Domain Routing
Today, many operators' backbone routers run both I-BGP and an intra-
domain protocol to maintain the routes that reach between the borders
of the domain. Exporting routes from BGP into the intra-domain
protocol in use and bringing them back up to BGP is not recommended
[RFC2791], but it is still necessary for all backbone routers to run
both protocols. BGP is used to find the egress point and intra-
Davies & Doria Historic [Page 40]
^L
RFC 5773 IDR History February 2010
domain protocol to find the path (next-hop router) to the egress
point across the domain. This is not only a management problem but
may also create other problems:
o BGP is a path-vector protocol (i.e., a protocol that uses distance
metrics possibly overridden by policy metrics), whereas most
intra-domain protocols are link-state protocols. As such, BGP is
not optimized for convergence speed although distance-vector
algorithms generally require less processing power. Incidentally,
more efficient distance-vector algorithms are available such as
[Xu97].
o The metrics used in BGP and the intra-domain protocol are rarely
comparable or combinable. Whilst there are arguments that the
optimizations inside a domain may be different from those for end-
to-end paths, there are occasions, such as calculating the
"topologically nearest" server when computable or combinable
metrics would be of assistance.
o The policies that can be implemented using BGP are designed for
control of traffic exchange between operators, not for controlling
paths within a domain. Policies for BGP are most conveniently
expressed in Routing Policy Support Language (RPSL) [RFC2622] and
this could be extended if thought desirable to include additional
policy information.
o If the NEXT HOP destination for a set of BGP routes becomes
inaccessible because of intra-domain protocol problems, the routes
using the vanished next hop have to be invalidated at the next
available UPDATE. Subsequently, if the next-hop route reappears,
this would normally lead to the BGP speaker requesting a full
table from its neighbor(s). Current implementations may attempt
to circumvent the effects of intra-domain protocol route flap by
caching the invalid routes for a period in case the next hop is
restored through the "graceful restart" mechanism.
Editors' Note: This was standardized as [RFC4724].
o Synchronization between intra-domain and inter-domain routing
information is a problem as long as we use different protocols for
intra-domain and inter-domain routing, which will most probably be
the case even in the future because of the differing requirements
in the two situations. Some sort of synchronization between those
two protocols would be useful. In the RFC "IS-IS Transient
Blackhole Avoidance" [RFC3277], the intra-domain protocol side of
the story is covered (there is an equivalent discussion for OSPF).
Davies & Doria Historic [Page 41]
^L
RFC 5773 IDR History February 2010
o Synchronizing in BGP means waiting for the intra-domain protocol
to know about the same networks as the inter-domain protocol,
which can take a significant period of time and slows down the
convergence of BGP by adding the intra-domain protocol convergence
time into each cycle. In general, operators no longer attempt
full synchronization in order to avoid this problem (in general,
redistributing the entire BGP routing feed into the local intra-
domain protocol is unnecessary and undesirable but where a domain
has multiple exits to peers and other non-customer networks,
changes in BGP routing that affect the exit taken by traffic
require corresponding re-routing in the intra-domain routing).
5.10. Policy Issues
There are several classes of issues with current BGP policy:
o Policy is installed in an ad hoc manner in each autonomous system.
There isn't a method for ensuring that the policy installed in one
router is coherent with policies installed in other routers.
o As described in Griffin [Griffin99] and in McPherson [RFC3345], it
is possible to create policies for ASs, and instantiate them in
routers, that will cause BGP to fail to converge in certain types
of topology
o There is no available network model for describing policy in a
coherent manner.
Policy management is extremely complex and mostly done without the
aid of any automated procedures. The extreme complexity means that a
highly-qualified specialist is required for policy management of
border routers. The training of these specialists is quite lengthy
and needs to involve long periods of hands-on experience. There is,
therefore, a shortage of qualified staff for installing and
maintaining the routing policies. Because of the overall complexity
of BGP, policy management tends to be only a relatively small topic
within a complete BGP training course and specialized policy
management training courses are not generally available.
5.11. Security Issues
While many of the issues with BGP security have been traced either to
implementation issues or to operational issues, BGP is vulnerable to
Distributed Denial of Service (DDoS) attacks. Additionally, routers
can be used as unwitting forwarders in DDoS attacks on other systems.
Davies & Doria Historic [Page 42]
^L
RFC 5773 IDR History February 2010
Though DDoS attacks can be fought in a variety of ways, mostly using
filtering methods, it takes constant vigilance. There is nothing in
the current architecture or in the protocols that serves to protect
the forwarders from these attacks.
Editors' Note: Since the original document was written, the issue
of inter-domain routing security has been studied in much greater
depth. The rpsec working group has gone into the security issues
in great detail [RFC4593] and readers should refer to that work to
understand the security issues.
5.12. Support of MPLS and VPNS
Recently, BGP has been modified to function as a signaling protocol
for MPLS and for VPNs [RFC4364]. Some people see this overloading of
the BGP protocol as a boon whilst others see it as a problem. While
it was certainly convenient as a vehicle for vendors to deliver extra
functionality to their products, it has exacerbated some of the
performance and complexity issues of BGP. Two important problems are
that, the additional state that must be retained and refreshed to
support VPN (Virtual Private Network) tunnels and that BGP does not
provide end-to-end notification making it difficult to confirm that
all necessary state has been installed or updated.
It is an open question whether VPN signaling protocols should remain
separate from the route determination protocols.
5.13. IPv4/IPv6 Ships in the Night
The fact that service providers need to maintain two completely
separate networks, one for IPv4 and one for IPv6, has been a real
hindrance to the introduction of IPv6. When IPv6 does get widely
deployed, it will do so without causing the disappearance of IPv4.
This means that unless something is done, service providers would
need to maintain the two networks in perpetuity (at least on the
foreshortened timescale which the Internet world uses).
It is possible to use a single set of BGP speakers with multi-
protocol extensions [RFC4760] to exchange information about both IPv4
and IPv6 routes between domains, but the use of TCP as the transport
protocol for the information exchange results in an asymmetry when
choosing to use one of TCP over IPv4 or TCP over IPv6. Successful
information exchange confirms one of IPv4 or IPv6 reachability
between the speakers but not the other, making it possible that
reachability is being advertised for a protocol for which it is not
present.
Davies & Doria Historic [Page 43]
^L
RFC 5773 IDR History February 2010
Also, current implementations do not allow a route to be advertised
for both IPv4 and IPv6 in the same UPDATE message, because it is not
possible to explicitly link the reachability information for an
address family to the corresponding next-hop information. This could
be improved, but currently results in independent UPDATEs being
exchanged for each address family.
5.14. Existing Tools to Support Effective Deployment of Inter-Domain
Routing
The tools available to network operators to assist in configuring and
maintaining effective inter-domain routing in line with their defined
policies are limited, and almost entirely passive.
o There are no tools to facilitate the planning of the routing of a
domain (either intra- or inter-domain); there are a limited number
of display tools that will visualize the routing once it has been
configured.
o There are no tools to assist in converting business policy
specifications into the Routing Policy Specification Language
(RPSL) language (see Section 5.14.1); there are limited tools to
convert the RPSL into BGP commands and to check, post-facto, that
the proposed policies are consistent with the policies in adjacent
domains (always provided that these have been revealed and
accurately documented).
o There are no tools to monitor BGP route changes in real-time and
warn the operator about policy inconsistencies and/or
instabilities.
The following section summarizes the tools that are available to
assist with the use of RPSL. Note they are all batch mode tools used
off-line from a real network. These tools will provide checks for
skilled inter-domain routing configurers but limited assistance for
the novice.
5.14.1. Routing Policy Specification Language RPSL (RFC 2622 and RFC
2650) and RIPE NCC Database (RIPE 157)
Routing Policy Specification Language (RPSL) [RFC2622] enables a
network operator to describe routes, routers, and Autonomous Systems
(ASs) that are connected to the local AS.
Using the RPSL language (see [RFC2650]) a distributed database is
created to describe routing policies in the Internet as described by
each AS independently. The database can be used to check the
consistency of routing policies stored in the database.
Davies & Doria Historic [Page 44]
^L
RFC 5773 IDR History February 2010
Tools exist [IRRToolSet] that can use the database to (among other
things):
o Flag when two neighboring network operators specify conflicting or
inconsistent routing information exchanges with each other and
also detect global inconsistencies where possible;
o Extract all AS-paths between two networks that are allowed by
routing policy from the routing policy database; display the
connectivity a given network has according to current policies.
The database queries enable a partial-static solution to the
convergence problem. They analyze routing policies of a very limited
part of Internet and verify that they do not contain conflicts that
could lead to protocol divergence. The static analysis of
convergence of the entire system has exponential time complexity, so
approximation algorithms would have to be used.
The toolset also allows router configurations to be generated from
RPSL specifications.
Editors' Note: The "Internet Routing Registry Toolset" was
originally developed by the University of Southern California's
Information Sciences Institute (ISI) between 1997 and 2001 as the
"Routing Arbiter ToolSet" (RAToolSet) project. The toolset is no
longer developed by ISI but is used worldwide, so after a period
of improvement by RIPE NCC, it has now been transferred to the
Internet Systems Consortium (ISC) for ongoing maintenance as a
public resource.
6. Security Considerations
As this is an informational document on the history of requirements
in IDR and on the problems facing the current Internet IDR
architecture, it does not as such create any security problems. On
the other hand, some of the problems with today's Internet routing
architecture do create security problems, and these have been
discussed in the text above.
7. Acknowledgments
The document is derived from work originally produced by Babylon.
Babylon was a loose association of individuals from academia, service
providers, and vendors whose goal was to discuss issues in Internet
routing with the intention of finding solutions for those problems.
Davies & Doria Historic [Page 45]
^L
RFC 5773 IDR History February 2010
The individual members who contributed materially to this document
are: Anders Bergsten, Howard Berkowitz, Malin Carlzon, Lenka Carr
Motyckova, Elwyn Davies, Avri Doria, Pierre Fransson, Yong Jiang,
Dmitri Krioukov, Tove Madsen, Olle Pers, and Olov Schelen.
Thanks also go to the members of Babylon and others who did
substantial reviews of this material. Specifically, we would like to
acknowledge the helpful comments and suggestions of the following
individuals: Loa Andersson, Tomas Ahlstrom, Erik Aman, Thomas
Eriksson, Niklas Borg, Nigel Bragg, Thomas Chmara, Krister Edlund,
Owe Grafford, Susan Hares, Torbjorn Lundberg, David McGrew, Jasminko
Mulahusic, Florian-Daniel Otel, Bernhard Stockman, Tom Worster, and
Roberto Zamparo.
In addition, the authors are indebted to the folks who wrote all the
references we have consulted in putting this paper together. This
includes not only the references explicitly listed below, but also
those who contributed to the mailing lists we have been participating
in for years.
The editors thank Lixia Zhang, as IRSG document shepherd, for her
help and her perseverance, without which this document would never
have been published.
Finally, it is the editors who are responsible for any lack of
clarity, any errors, glaring omissions or misunderstandings.
8. Informative References
[Alaettinoglu00]
Alaettinoglu, C., Jacobson, V., and H. Yu, "Towards Milli-
Second IGP Convergence", Work in Progress, November 2000.
[Berkowitz01]
Berkowitz, H. and D. Krioukov, "To Be Multihomed:
Requirements and Definitions", Work in Progress,
July 2001.
[Breslau90]
Breslau, L. and D. Estrin, "An Architecture for Network-
Layer Routing in OSI", Proceedings of the ACM symposium on
Communications architectures & protocols , 1990.
[Chapin94]
Piscitello, D. and A. Chapin, "Open Systems Networking:
TCP/IP & OSI", Addison-Wesley Copyright assigned to
authors, 1994, <http://www.interisle.net/OSN/OSN.html>.
Davies & Doria Historic [Page 46]
^L
RFC 5773 IDR History February 2010
[Chiappa91]
Chiappa, J., "A New IP Routing and Addressing
Architecture", Work in Progress, 1991.
[Clark00] Clark, D. and M. Blumenthal, "Rethinking the design of the
Internet: The end to end arguments vs. the brave new
world", August 2000,
<http://dspace.mit.edu/handle/1721.1/1519>.
[Griffin99]
Griffin, T. and G. Wilfong, "An Analysis of BGP
Convergence Properties", Association for Computing
Machinery Proceedings of SIGCOMM '99, 1999.
[Huitema90]
Huitema, C. and W. Dabbous, "Routeing protocols
development in the OSI architecture", Proceedings of
ISCIS V Turkey, 1990.
[Huston05]
Huston, G., "Exploring Autonomous System Numbers", The ISP
Column , August 2005,
<http://www.potaroo.net/ispcol/2005-08/as.html>.
[INARC89] Mills, D., Ed. and M. Davis, Ed., "Internet Architecture
Workshop: Future of the Internet System Architecture and
TCP/IP Protocols - Report", Internet Architecture Task
Force INARC, 1990, <http://www.eecis.udel.edu/~mills/
database/papers/inarc.pdf>.
[IRRToolSet]
Internet Systems Consortium, "Internet Routing Registry
Toolset Project", IRR Tool Set Website, 2006,
<http://www.isc.org/index.pl?/sw/IRRToolSet/>.
[ISO10747]
ISO/IEC, "Protocol for Exchange of Inter-Domain Routeing
Information among Intermediate Systems to support
Forwarding of ISO 8473 PDUs", International Standard
10747 , 1993.
[Jiang02] Jiang, Y., Doria, A., Olsson, D., and F. Pettersson,
"Inter-domain Routing Stability Measurement", 2002,
<http://psg.com/~avri/papers/paper-yong-
hpsr2002-final.pdf>.
[Katz10] Katz, D. and D. Ward, "Bidirectional Forwarding
Detection", Work in Progress, January 2010.
Davies & Doria Historic [Page 47]
^L
RFC 5773 IDR History February 2010
[Labovitz02]
Labovitz, C., Ahuja, A., Farnam, J., and A. Bose,
"Experimental Measurement of Delayed Convergence", NANOG ,
2002.
[NewArch03]
Clark, D., Sollins, K., Wroclawski, J., Katabi, D., Kulik,
J., Yang, X., Braden, R., Faber, T., Falk, A., Pingali,
V., Handley, M., and N. Chiappa, "New Arch: Future
Generation Internet Architecture", December 2003,
<http://www.isi.edu/newarch/iDOCS/final.finalreport.pdf>.
[RFC0904] Mills, D., "Exterior Gateway Protocol formal
specification", RFC 904, April 1984.
[RFC0975] Mills, D., "Autonomous confederations", RFC 975,
February 1986.
[RFC1105] Lougheed, K. and J. Rekhter, "Border Gateway Protocol
(BGP)", RFC 1105, June 1989.
[RFC1126] Little, M., "Goals and functional requirements for inter-
autonomous system routing", RFC 1126, October 1989.
[RFC1163] Lougheed, K. and Y. Rekhter, "Border Gateway Protocol
(BGP)", RFC 1163, June 1990.
[RFC1267] Lougheed, K. and Y. Rekhter, "Border Gateway Protocol 3
(BGP-3)", RFC 1267, October 1991.
[RFC1752] Bradner, S. and A. Mankin, "The Recommendation for the IP
Next Generation Protocol", RFC 1752, January 1995.
[RFC1753] Chiappa, J., "IPng Technical Requirements Of the Nimrod
Routing and Addressing Architecture", RFC 1753,
December 1994.
[RFC1771] Rekhter, Y. and T. Li, "A Border Gateway Protocol 4
(BGP-4)", RFC 1771, March 1995.
[RFC1992] Castineyra, I., Chiappa, N., and M. Steenstrup, "The
Nimrod Routing Architecture", RFC 1992, August 1996.
[RFC2362] Estrin, D., Farinacci, D., Helmy, A., Thaler, D., Deering,
S., Handley, M., and V. Jacobson, "Protocol Independent
Multicast-Sparse Mode (PIM-SM): Protocol Specification",
RFC 2362, June 1998.
Davies & Doria Historic [Page 48]
^L
RFC 5773 IDR History February 2010
[RFC2622] Alaettinoglu, C., Villamizar, C., Gerich, E., Kessens, D.,
Meyer, D., Bates, T., Karrenberg, D., and M. Terpstra,
"Routing Policy Specification Language (RPSL)", RFC 2622,
June 1999.
[RFC2650] Meyer, D., Schmitz, J., Orange, C., Prior, M., and C.
Alaettinoglu, "Using RPSL in Practice", RFC 2650,
August 1999.
[RFC2791] Yu, J., "Scalable Routing Design Principles", RFC 2791,
July 2000.
[RFC3221] Huston, G., "Commentary on Inter-Domain Routing in the
Internet", RFC 3221, December 2001.
[RFC3277] McPherson, D., "Intermediate System to Intermediate System
(IS-IS) Transient Blackhole Avoidance", RFC 3277,
April 2002.
[RFC3345] McPherson, D., Gill, V., Walton, D., and A. Retana,
"Border Gateway Protocol (BGP) Persistent Route
Oscillation Condition", RFC 3345, August 2002.
[RFC3618] Fenner, B. and D. Meyer, "Multicast Source Discovery
Protocol (MSDP)", RFC 3618, October 2003.
[RFC3765] Huston, G., "NOPEER Community for Border Gateway Protocol
(BGP) Route Scope Control", RFC 3765, April 2004.
[RFC3913] Thaler, D., "Border Gateway Multicast Protocol (BGMP):
Protocol Specification", RFC 3913, September 2004.
[RFC4116] Abley, J., Lindqvist, K., Davies, E., Black, B., and V.
Gill, "IPv4 Multihoming Practices and Limitations",
RFC 4116, July 2005.
[RFC4204] Lang, J., "Link Management Protocol (LMP)", RFC 4204,
October 2005.
[RFC4271] Rekhter, Y., Li, T., and S. Hares, "A Border Gateway
Protocol 4 (BGP-4)", RFC 4271, January 2006.
[RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
Networks (VPNs)", RFC 4364, February 2006.
[RFC4593] Barbir, A., Murphy, S., and Y. Yang, "Generic Threats to
Routing Protocols", RFC 4593, October 2006.
Davies & Doria Historic [Page 49]
^L
RFC 5773 IDR History February 2010
[RFC4601] Fenner, B., Handley, M., Holbrook, H., and I. Kouvelas,
"Protocol Independent Multicast - Sparse Mode (PIM-SM):
Protocol Specification (Revised)", RFC 4601, August 2006.
[RFC4724] Sangli, S., Chen, E., Fernando, R., Scudder, J., and Y.
Rekhter, "Graceful Restart Mechanism for BGP", RFC 4724,
January 2007.
[RFC4760] Bates, T., Chandra, R., Katz, D., and Y. Rekhter,
"Multiprotocol Extensions for BGP-4", RFC 4760,
January 2007.
[RFC4893] Vohra, Q. and E. Chen, "BGP Support for Four-octet AS
Number Space", RFC 4893, May 2007.
[RFC5772] Doria, A., Davies, E., and F. Kastenholz, "A Set of
Possible Requirements for a Future Routing Architecture",
RFC 5772, February 2010.
[Sandiick00]
Sandick, H., Squire, M., Cain, B., Duncan, I., and B.
Haberman, "Fast LIveness Protocol (FLIP)", Work
in Progress, February 2000.
[Tsuchiya87]
Tsuchiya, P., "An Architecture for Network-Layer Routing
in OSI", Proceedings of the ACM workshop on Frontiers in
computer communications technology , 1987.
[Xu97] Xu, Z., Dai, S., and J. Garcia-Luna-Aceves, "A More
Efficient Distance Vector Routing Algorithm", Proc IEEE
MILCOM 97, Monterey, California, Nov 1997, <http://
www.cse.ucsc.edu/research/ccrg/publications/
zhengyu.milcom97.pdf>.
Davies & Doria Historic [Page 50]
^L
RFC 5773 IDR History February 2010
Authors' Addresses
Elwyn B. Davies
Folly Consulting
Soham, Cambs
UK
Phone: +44 7889 488 335
EMail: elwynd@dial.pipex.com
Avri Doria
LTU
Lulea, 971 87
Sweden
Phone: +1 401 663 5024
EMail: avri@acm.org
Davies & Doria Historic [Page 51]
^L
|