[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Open access

Lack of Priority Queuing Considered Harmful: We’re in sore need of critical Internet infrastructure protection.

Published: 01 November 2004 Publication History

Abstract

Most modern routers consist of several line cards that perform packet lookup and forwarding, all controlled by a control plane that acts as the brain of the router, performing essential tasks such as management functions, error reporting, control functions including route calculations, and adjacency maintenance. This control plane has many names; in this article it is the route processor, or RP. The route processor calculates the forwarding table and downloads it to the line cards using a control-plane bus. The line cards perform the actual packet lookup and forwarding. Although individual vendors or models may differ slightly in implementation, the salient points remain the same.

Cited By

View all
  • (2010)A Survey of BGP Security Issues and SolutionsProceedings of the IEEE10.1109/JPROC.2009.203403198:1(100-122)Online publication date: Jan-2010
  • (2009)DoS Attacks on Real-Time Media through Indirect Contention-in-HostsIEEE Internet Computing10.1109/MIC.2009.9913:6(22-30)Online publication date: 1-Nov-2009

Index Terms

  1. Lack of Priority Queuing Considered Harmful: We’re in sore need of critical Internet infrastructure protection.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Queue
        Queue  Volume 2, Issue 8
        System Failures
        November 2004
        57 pages
        ISSN:1542-7730
        EISSN:1542-7749
        DOI:10.1145/1036474
        Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 November 2004
        Published in QUEUE Volume 2, Issue 8

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article
        • Popular
        • Editor picked

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)2,000
        • Downloads (Last 6 weeks)217
        Reflects downloads up to 21 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2010)A Survey of BGP Security Issues and SolutionsProceedings of the IEEE10.1109/JPROC.2009.203403198:1(100-122)Online publication date: Jan-2010
        • (2009)DoS Attacks on Real-Time Media through Indirect Contention-in-HostsIEEE Internet Computing10.1109/MIC.2009.9913:6(22-30)Online publication date: 1-Nov-2009

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Magazine Site

        View this article on the magazine site (external)

        Magazine Site

        Login options

        Full Access

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media