{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:42:40Z","timestamp":1750308160159,"version":"3.41.0"},"reference-count":48,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2006,10,10]],"date-time":"2006-10-10T00:00:00Z","timestamp":1160438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2006,10,10]]},"abstract":"<jats:p>The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements conducted using repeated \"traceroutes\" between 37 Internet sites. We analyze the routing behavior for pathological conditions, routing stability, and routing symmetry. For pathologies, we characterize the prevalence of routing loops, erroneous routing, infrastructure failures, and temporary outages. We find that the likelihood of encountering a major routing pathology more than doubled between the end of 1994 and the end of 1995, rising from 1.5% to 3.4%. For routing stability, we define two separate types of stability, \"prevalence,\" meaning the overall likelihood that a particular route is encountered, and \"persistence,\" the likelihood that a route remains unchanged over a long period of time. We find that Internet paths are heavily dominated by a single prevalent route, but that the time periods over which routes persist show wide variation, ranging from seconds up to days. About 2\/3's of the Internet paths had routes persisting for either days or weeks. For routing symmetry, we look at the likelihood that a path through the Internet visits at least one different city in the two directions. At the end of 1995, this was the case half the time, and at least one different autonomous system was visited 30% of the time.<\/jats:p>","DOI":"10.1145\/1163593.1163602","type":"journal-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:35:32Z","timestamp":1161210932000},"page":"41-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["End-to-end routing behavior in the internet"],"prefix":"10.1145","volume":"36","author":[{"given":"Vern","family":"Paxson","sequence":"first","affiliation":[{"name":"University of California, Berkeley and Lawrence Berkeley National Laboratory"}]}],"member":"320","published-online":{"date-parts":[[2006,10,10]]},"reference":[{"volume-title":"Requirements for IP Version 4 Routers,\" RFC","year":"1812","author":"Baker F.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.386051"},{"volume-title":"Randomized Signal Processing","year":"1992","author":"Bilinskis I.","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/166237.166265"},{"volume-title":"Integrated Services in the Internet Architecture: an Overview,\" RFC 1633","year":"1994","author":"Braden R.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/99508.99558"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/166237.166242"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.464717"},{"issue":"3","key":"e_1_2_1_9_1","first-page":"121","article-title":"Measurement Considerations for Assessing Unidirectional Latencies","volume":"4","author":"Claffy K.","year":"1993","journal-title":"Internet-working: Research and Experience"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/78952.78953"},{"volume-title":"Protocol Specification-Version ST2+,\" RFC","year":"1819","author":"Delgrossi L.","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","unstructured":"Sean Doran \"Route Flapping \" with notes by Stan Barber http:\/\/www.merit.edu\/routing.arbiter\/NANOG\/2.95.NANOG.notes\/route-flapping.html.]]  Sean Doran \"Route Flapping \" with notes by Stan Barber http:\/\/www.merit.edu\/routing.arbiter\/NANOG\/2.95.NANOG.notes\/route-flapping.html.]]"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/144179.144203"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(94)90101-5"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.298431"},{"volume-title":"Administrative Domains and Routing Domains: A Model for Routing in the Internet,\" RFC 1136","year":"1989","author":"Hares S.","key":"e_1_2_1_16_1"},{"volume-title":"Routing in the Internet","year":"1995","author":"Huitema C.","key":"e_1_2_1_17_1"},{"volume-title":"traceroute, ftp:\/\/ftp.ee.lbl.gov\/traceroute.tar.Z","year":"1989","author":"Jacobson V.","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/75246.75252"},{"key":"e_1_2_1_20_1","unstructured":"C. Labovitz private communication May 1996.]]  C. Labovitz private communication May 1996.]]"},{"volume-title":"SRI International","year":"1989","author":"Little M.","key":"e_1_2_1_21_1"},{"volume-title":"ftp:\/\/nic.merit.edu\/nsfnet\/statistics","year":"1995","author":"Lottor M.","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1978.1094040"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094721"},{"key":"e_1_2_1_25_1","unstructured":"Merit Network Inc. ftp:\/\/nic.merit.edu\/nsfnet\/statistics\/history.nets; May 1995.]]  Merit Network Inc. ftp:\/\/nic.merit.edu\/nsfnet\/statistics\/history.nets; May 1995.]]"},{"key":"e_1_2_1_26_1","unstructured":"Merit Network Inc. http:\/\/nic.merit.edu\/routing.arbiter\/RA\/statistics\/flap.html.]]  Merit Network Inc. http:\/\/nic.merit.edu\/routing.arbiter\/RA\/statistics\/flap.html.]]"},{"volume-title":"Specification, Implementation and Analysis,\" RFC 1305","year":"1992","author":"Mills D.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","first-page":"163","article-title":"On the Dynamics and Significance of Low Frequency Components of Internet Load","volume":"5","author":"Mukherjee A.","year":"1994","journal-title":"Internetworking: Research and Experience"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.330413"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52330"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.121955"},{"volume-title":"Interconnections: Bridges and Routers","year":"1992","author":"Perlman R.","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","first-page":"189","article-title":"Injecting Inter-autonomous System Routes into Intra-autonomous System Routing: a Performance Analysis","volume":"3","author":"Rekhter Y.","year":"1992","journal-title":"Internetworking: Research and Experience"},{"key":"e_1_2_1_35_1","unstructured":"Y. Rekhter \"Inter-Domain Routing: EGP BGP and IDRP \" in {St95}.]]  Y. Rekhter \"Inter-Domain Routing: EGP BGP and IDRP \" in {St95}.]]"},{"volume-title":"A Border Gateway Protocol 4 (BGP-4),\" RFC 1771","year":"1995","author":"Rekhter Y.","key":"e_1_2_1_36_1"},{"volume-title":"Application of the Border Gateway Protocol in the Internet,\" RFC 1772","year":"1995","author":"Rekhter Y.","key":"e_1_2_1_37_1"},{"volume-title":"SRI International","year":"1982","author":"Rosen E.","key":"e_1_2_1_38_1"},{"volume-title":"Stochastic Processes","year":"1983","author":"Ross S.","key":"e_1_2_1_39_1"},{"volume-title":"San Francisco","year":"1993","author":"Sanghi D.","key":"e_1_2_1_40_1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094690"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/166237.166243"},{"volume-title":"Routing in Communications Networks","year":"1995","author":"Steenstrup M.","key":"e_1_2_1_43_1"},{"volume-title":"Volume 1: The Protocols","year":"1994","author":"Stevens W.R.","key":"e_1_2_1_44_1"},{"volume-title":"March","year":"1995","author":"Traina P.","key":"e_1_2_1_45_1"},{"volume-title":"BGP-4 Protocol Analysis,\" RFC 1774","year":"1995","author":"Traina P.","key":"e_1_2_1_46_1"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.30.2.223"},{"key":"e_1_2_1_48_1","first-page":"161","article-title":"Dynamics of Link-state and Loop-free Distance-vector Routing Algorithms","volume":"3","author":"Zaumen W.","year":"1992","journal-title":"Internetworking: Research and Experience"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.238150"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1163593.1163602","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1163593.1163602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:19:02Z","timestamp":1750263542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1163593.1163602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,10]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2006,10,10]]}},"alternative-id":["10.1145\/1163593.1163602"],"URL":"https:\/\/doi.org\/10.1145\/1163593.1163602","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2006,10,10]]},"assertion":[{"value":"2006-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}