Taking an AXE to L2 Spanning Trees

TitleTaking an AXE to L2 Spanning Trees
Publication TypeConference Paper
Year of Publication2015
AuthorsMcCauley, M., Sheng A., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S.
Other Numbers3824
Abstract

I think that I shall never see

a structure more wasteful than a tree.

Most links remain idle and unused

while others are overloaded and abused.

And with each failure comes disruption

caused by the ensuing tree construction.

Thus, L2 must discard its spanner,

requiring flooding in a different manner.

For the tree's fragile waste to be abated,

trim no branches and detect packets duplicated.

(With apologies to Radia Perlman and Joyce Kilmer.)

Acknowledgment

This work was partially supported by funding provided to ICSI through National Science Foundation grants CNS : 1117161 (“New Directions in Routing and Traffic Engineering”) and CNS : 1343947 ("Network Virtualization for OpenCloud"). Additional funding was provided by work supported by sponsors including Intel and AT&T. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation, Intel or AT&T.

Bibliographic Notes

Proceedings of the Fourteenth ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets-XIV), Philadelphia, Pennsylvania

Abbreviated Authors

M. McCauley, A. Sheng, E. Jackson, B. Raghavan, S. Ratnasamy, and S. Shenker

ICSI Research Group

Networking and Security

ICSI Publication Type

Article in conference proceedings