Taking an AXE to L2 Spanning Trees
Title | Taking an AXE to L2 Spanning Trees |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | McCauley, M., Sheng A., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. J. |
Other Numbers | 3824 |
Abstract | I think that I shall never see a structure more wasteful than a tree. Most links remain idle and unused while others are overloaded and abused. And with each failure comes disruption caused by the ensuing tree construction. Thus, L2 must discard its spanner, requiring flooding in a different manner. For the tree's fragile waste to be abated, trim no branches and detect packets duplicated. (With apologies to Radia Perlman and Joyce Kilmer.) |
Acknowledgment | This work was partially supported by funding provided to ICSI through National Science Foundation grants CNS : 1117161 (New Directions in Routing and Traffic Engineering) and CNS : 1343947 ("Network Virtualization for OpenCloud"). Additional funding was provided by work supported by sponsors including Intel and AT&T. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation, Intel or AT&T. |
Bibliographic Notes | Proceedings of the Fourteenth ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets-XIV), Philadelphia, Pennsylvania |
Abbreviated Authors | M. McCauley, A. Sheng, E. Jackson, B. Raghavan, S. Ratnasamy, and S. Shenker |
ICSI Research Group | Networking and Security |
ICSI Publication Type | Article in conference proceedings |