Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks 2013
DOI: 10.1145/2535771.2535774
|View full text |Cite
|
Sign up to set email alerts
|

Plinko

Abstract: This paper introduces Plinko, a network architecture that uses a novel forwarding model and routing algorithm to build networks with forwarding paths that, assuming arbitrarily large forwarding tables, are provably resilient against t link failures, ∀t ∈ N. However, in practice, there are clearly limits on the size of forwarding tables. Nonetheless, when constrained to hardware comparable to modern topof-rack (TOR) switches, Plinko scales with high resilience to networks with up to ten thousand hosts. Thus, as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(2 citation statements)
references
References 17 publications
(10 reference statements)
0
2
0
Order By: Relevance
“…Detecting port failures falls beyond the scope of this paper as it depends on specific hardware support. FRR mechanisms can be generally categorized along different dimensions: e.g., whether they tolerate only a single link/node failure [65], [66], [67] or multiple ones [68], [69]; whether routing tables are static (e.g., [11], [30], [60], [70], [69]) or dynamic (e.g., [71], [62]); whether packet header rewriting (e.g., [62], [61], [72], [68]) or packet duplication (e.g., [73]) is required; whether provide low stretch [74], [30] or maintain relatively low load [75], [76], [77].…”
Section: Related Workmentioning
confidence: 99%
“…Detecting port failures falls beyond the scope of this paper as it depends on specific hardware support. FRR mechanisms can be generally categorized along different dimensions: e.g., whether they tolerate only a single link/node failure [65], [66], [67] or multiple ones [68], [69]; whether routing tables are static (e.g., [11], [30], [60], [70], [69]) or dynamic (e.g., [71], [62]); whether packet header rewriting (e.g., [62], [61], [72], [68]) or packet duplication (e.g., [73]) is required; whether provide low stretch [74], [30] or maintain relatively low load [75], [76], [77].…”
Section: Related Workmentioning
confidence: 99%
“…Nguyen et al [141] define algorithms for finding alternative paths if a link disruption occurs in the network; Stephens et al [144] present an architecture called Plinko, which is provably resilient to t link failures when the size of flow tables in the data plane is sufficiently large to accommodate backup flow rules; Borokhovich et al [147] use graph theory to model the network as a graph and run algorithms such as Depthfirst search (DFS) and Breadth-first search (BFS) to analyze the routing problem and ensure connectivity when a failure occurs.…”
Section: Disruption Tolerancementioning
confidence: 99%