skip to main content
article

Towards an evolvable internet architecture

Published:22 August 2005Publication History
Skip Abstract Section

Abstract

There is widespread agreement on the need for architectural change in the Internet, but very few believe that current ISPs will ever effect such changes. In this paper we ask what makes an architecture evolvable, by which we mean capable of gradual change led by the incumbent providers. This involves both technical and economic issues, since ISPs have to be able, and incented, to offer new architectures. Our study suggests that, with very minor modifications, the current Internet architecture could be evolvable.

References

  1. Larry Peterson, Scott Shenker, and Jonathan Turner. Overcoming the Internet Impasse through Virtualization. In Third Workshop on Hot Topics in Networks (HotNets-III), November 2004.]]Google ScholarGoogle Scholar
  2. T. Anderson, T. Roscoe, and D. Wetherall. Preventing Internet Denial-of-Service with Capabilities. In 2nd ACM Workshop on Hot Topics in Networks, Cambridge, MA, November 2003.]]Google ScholarGoogle Scholar
  3. Adrian Perrig, Avi Yaar and Dawn Song. SIFF: A Stateless Internet Flow Filter to mitigate DDoS Flooding Attacks. In Proceedings of the 2004 IEEE Symposium on Security and Privacy. IEEE, 2004.]]Google ScholarGoogle Scholar
  4. Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical network support for ip traceback. In Proceedings of SIGCOMM, August 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Alex Snoeren et al. Hash-based IP Traceback. In Proceedings of SIGCOMM, August 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ion Stoica, Scott Shenker, and Hui Zhang. Core-stateless fair queueing: Achieving approximately fair allocations in high speed networks. In Proceedings of SIGCOMM, September 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Alex Snoeren, Hari Balakrishnan, and Frans Kaashoek. Reconsidering internet mobility. In Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), Elmau/Oberbayern, Germany, May 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dina Katabi, Mark Handley, and Charles Rohrs. Internet Congestion Control for High Bandwidth-Delay Product Networks. In ACM SIGCOMM, Pittsburgh, PA, August 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ion Stoica, Dan Adkins, Shelley Zhuang, Scott Shenker, and Sonesh Surana. Internet indirection infrastructure. In Proceedings of SIGCOMM, August 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan, Robert Morris, and Scott Shenker. Middleboxes no longer considered harmful. In Proceedings of the USENIX Symposium on Operating System Design and Implementation, December 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. David Clark, Robert Braden, Aaron Falk, and Venkata Pingali. FARA: Reorganizing the addressing architecture. In ACM SIGCOMM Workshop on Future Directions in Network Architecture, Karlsruhe, Germany, August 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Mark Gritter and David R. Cheriton. TRIAD: A new next-generation Internet architecture. http://www-dsg.stanford.edu/triad/, July 2000.]]Google ScholarGoogle Scholar
  13. Paul Francis and Ramakrishna Gummadi. IPNL: A NAT-extended Internet architecture. In ACM SIGCOMM, San Diego, CA, August 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Tschudin and R. Gold. Network Pointers. In 1st ACM Workshop on Hot Topics in Networks, Princeton, NJ, October 2002.]]Google ScholarGoogle Scholar
  15. David L. Tennenhouse and David J. Wetherall. Towards an active network architecture. Computer Communication Review, 26(2):5--18, April 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kevin Fall. A delay tolerant networking architecture for challenged internets. In Proceedings of SIGCOMM, August 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mark Handley and Adam Greenhalgh. Steps towards a DoS-Resistant Internet Architecture. In ACM SIGCOMM Workshop on Future Directions in Network Architecture, August 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Yang hua Chu, Sanjay Rao, and Hui Zhang. A case for end system multicast. In Proceedings of SIGMETRICS, CA, June 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. L. Subramanian, Ion Stoica, Hari Balakrishnan, and Randy Katz. OverQoS: An Overlay Based Architecture for Enhancing Internet QoS. In 1st USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, CA, March 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. David Andersen, Hari Balakrishnan, Frans Kaashoek, and Robert Morris. Resilient overlay networks. In Proceedings of the Symposium on Operating Systems Principles, New York, NY, 2001. ACM.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. John Jannotti, David Gifford, Kirk Johnson, Frans Kaashoek, and James O'Toole. Overcast: Reliable multicasting with an overlay network. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation, San Diego, CA, October 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Limin Wang, Vivek Pai, and Larry Peterson. The effect of request redirection on cdn robustness. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation, December 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Larry Peterson, Tom Anderson, David Culler, and Timothy Roscoe. A blueprint for introducing disruptive technology into the internet. In First Workshop on Hot Topics in Networks, October 2002.]]Google ScholarGoogle Scholar
  24. Akamai. http://www.akamai.com.]]Google ScholarGoogle Scholar
  25. H. Eriksson. Mbone: The multicast backbone. Communications of the ACM, 37(8):54--60, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Joe Touch and Steve Hotz. The X-Bone.]]Google ScholarGoogle Scholar
  27. D. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I.Stoica, and K. Wehrle. OCALA: An Architecture for Supporting Legacy Applications over Overlays. Technical Report UCB/CSD-05-1397, 2005.]]Google ScholarGoogle Scholar
  28. C. Partridge, T. Mendez, and W. Milliken. Host Anycasting Service. Requests for Comment, November 1993. RFC-1546.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Bill Fenner, Mark Handley, Hugh Holbrook, and Isidor Kouvelas. Protocol internet multicast -- sparse mode (pim-sm): Protocol specification, October 2003. Internet Draft (work in progress).]]Google ScholarGoogle Scholar
  30. T. Hardie. Distributing Authoritative Name Servers via Shared Unicast Addresses. Requests for Comment, April 2002. RFC-3258.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Dina Katabi and John Wroclawski. A framework for scalable global IP Anycast. In Proceedings of SIGCOMM, Sweden, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. G. Malkin. Routing Information Protocol RIP version 2. Internet Engineering Task Force, November 1998. RFC-2453]]Google ScholarGoogle Scholar
  33. Steven McCanne and William Destein. Proximity-based redirection system for robust and scalable service-node location in an internetwork, December 1999. United States Patent.]]Google ScholarGoogle Scholar
  34. B. Carpenter and K. Moore. Connection of IPv6 Domains via IPv4 Clouds. Requests for Comment, February 2001. RFC-3056.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Hari Balakrishnan, Srinivasan Seshan, Elan Amir, and Randy H. Katz. Improving TCP/IP performance over wireless networks. In Proceedings of ACM MOBICOM, Berkeley, CA, Nov 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Deering and R. Hinden. Internet Protocol, Version 6 (IPv6), December 1998. RFC 2460.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. R. Moskowitz and P. Nikander. Host identity protocol architecture, Sep 2003. IETF draft (work in progress).]]Google ScholarGoogle Scholar
  38. Stephen E. Deering. Multicast Routing in a Datagram Internetwork. PhD thesis, Stanford University, December 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Hugh Holbrook and David Cheriton. Ip multicast channels: Express support for single-source multicast applications. In Proceedings of SIGCOMM '99, Cambridge, MA, September 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. S. Bhattacharyya. An Overview of Source-Specific Mulitcast (SSM). Requests for Comment, July 2003. RFC-3569.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. H. Holbrook and B. Cain. Source specific multicast for ip. Internet Draft. (work in progress).]]Google ScholarGoogle Scholar
  42. W. Fenner. Internet Group Management Protocol, Version 2. Internet Engineering Task Force, Inter-Domain Multicast Routing Working Group, February 1996. Internet Draft (work in progress).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Xiaowei Yang. NIRA: A new Internet routing architecture. In ACM SIGCOMM Workshop on Future Directions in Network Architecture, Germany, August 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Amit Jain and Sally Floyd. Quick-Start for tcp and ip, September 2004. Internet Draft, (work in progress).]]Google ScholarGoogle Scholar
  45. Sally Floyd and Van Jacobson. Random early detection gateways for congestion avoidance. IEEE/ACM Transactions on Networking, 1(4):397--413, August 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. G. Ballintijn, M. van Steen, and A. S. Tanenbaum. Scalable user-friendly resource names. IEEE Internet Computing, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, and Michael Walfish. A Layered Naming Architecture for the Internet. In Proceedings of SIGCOMM, Portland, OR, September 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. David G. Andersen. Mayday: Distributed filtering for Internet Services. In 4rd USENIX Symposium on Internet Technologies and Systems (USITS '03), Seattle, WA, March 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. A. D. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure overlay services. In ACM SIGCOMM, Pittsburgh, PA, August 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. In 1st USENIX/ACM Symposium on Networked Systems Design and Implementation, San Francisco, CA, March 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Daniel Adkins, Karthik Lakshminarayanan, Adrian Perrig, and Ion Stoica. Taming IP packet flooding attacks. In 2nd ACM Workshop on Hot Topics in Networks, Cambridge, MA, November 2003.]]Google ScholarGoogle Scholar
  52. David D. Clark, John Wroclawski, Karen R. Sollins, and Robert Braden. Tussle in cyberspace: defining tomorrow's Internet. In ACM SIGCOMM, Pittsburgh, PA, August 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. David Clark, Karen Sollins, John Wroclawski, and Ted Faber. Addressing reality: An architectural response to demands on the evolving Internet. In ACM SIGCOMM Workshop on Future Directions in Network Architecture, Germany, August 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Hitesh Ballani and Paul Francis. Towards a deployable ip anycast service. In First Workshop on Real Large Distributed Systems (WORLDS), December 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Joe Touch, Y. Wang, L. Eggert, and G. Finn. Virtual Internet Architecture. In ACM SIGCOMM Workshop on Future Directions in Network Architecture, Karlsruhe, Germany, August 2003.]]Google ScholarGoogle Scholar
  56. Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker. A Scalable Content-Addressable Network. In Proceedings of SIGCOMM, August 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of SIGCOMM, August 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. A. Durand, P. Fasano, I. Guardini, and D. Lento. IPv6 Tunnel Broker. Requests for Comment, January 2001. RFC-3053.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. C. Huitema. An Anycast Prefix for 6to4 Relay Routers. Requests for Comment, June 2001. RFC-3068.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. R. Gilligan and E. Nordmark. Transition Mechanisms for IPv6 Hosts and Routers. Requests for Comment, April 1996. RFC-1933.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards an evolvable internet architecture

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 35, Issue 4
      Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
      October 2005
      324 pages
      ISSN:0146-4833
      DOI:10.1145/1090191
      Issue’s Table of Contents
      • cover image ACM Conferences
        SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
        August 2005
        350 pages
        ISBN:1595930094
        DOI:10.1145/1080091

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 August 2005

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader