skip to main content
research-article

XIA: architecting a more trustworthy and evolvable internet

Authors Info & Claims
Published:28 July 2014Publication History
Skip Abstract Section

Abstract

Motivated by limitations in today's host-centric IP network, recent studies have proposed clean-slate network architectures centered around alternate first-class principals, such as content, services, or users. However, muchlike the host-centric IP design, elevating one principal type above others hinders communication between other principals and inhibits the network's capability to evolve. This paper presents the eXpressive Internet Architecture (XIA), an architecture with native support for multiple principals and the ability to evolve its functionality to accommodate new, as yet unforeseen, principals over time. We present the results of our ongoing research motivated by and building on the XIA architecture, ranging from topics at the physical level (``how fast can XIA go'') up through to the user level.

References

  1. P. Agyapong. Economic Incentives in Content-Centric Networking: Implications for Protocol Design and Public Policy. PhD thesis, Carnegie Mellon University, Pittsburgh, Pennsylvania, May 2013.Google ScholarGoogle Scholar
  2. P. Agyapong and M. Sirbu. Economic Incentives in Content-Centric Networking: Implications for Protocol Design and Public Policy. IEEE Communications Magazine, Special Issue on CCNs, December 2012.Google ScholarGoogle Scholar
  3. A. Anand, F. Dogar, D. Han, B. Li, H. Lim, M. Machado, W. Wu, A. Akella, D. Andersen, J. Byers, S. Seshan, and P. Steenkiste. XIA: An Architecture for an Evolvable and Trustworthy Internet. In The Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MA, November 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. G. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker. Accountable Internet Protocol (AIP). In Proc. ACM SIGCOMM, Seattle, WA, Aug. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. Argyraki and D. R. Cheriton. Network capabilities: The good, the bad and the ugly. In Proceedings of ACM HotNets, 2005.Google ScholarGoogle Scholar
  6. B. Briscoe. Flow rate fairness: dismantling a religion. ACM SIGCOMM CCR, 37(2), March 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. D. Clark, J. Wroclawski, K. R. Sollins, and R. Braden. Tussle in cyberspace: defining tomorrow's internet. In Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '02, pages 347--356, New York, NY, USA, 2002. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Dingledine, N. Mathewson, and P. Syverson. Tor: the second-generation onion router. In Proceedings of conference on USENIX Security Symposium, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. F. Dogar and P. Steenkiste. Architecting for Edge Diversity: Supporting Rich Services over an Unbundled Transport. In 8th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2012). ACM, December 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. N. Dukkipati. Rate Control Protocol (RCP): Congestion control to make ows complete quickly. In Ph.D. Thesis, Department of Electrical Engineering, Stanford University, October 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Floyd, M. Handley, J. Padhye, and J. Widmer. Equation-based congestion control for unicast applications. In SIGCOMM 2000, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Gladisch, R. Daher, and D. Tavangarian. Survey on Mobility and Multihoming in the Future Internet. Wireless Personal Communication, October 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Han, A. Anand, F. Dogar, B. Li, H. Lim, M. Machado, A. Mukundan, W. Wu, A. Akella, D. G. Andersen, J. W. Byers, S. Seshan, and P. Steenkiste. XIA: Efficient Support for Evolvable Internetworking. In Proceedings of the 9th Usenix Symposium on Networked Systems Design and Implementation, NSDI 2012, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Han, R. Grandl, A. Akella, and S. Seshan. FCP: A Flexible Transport Framework for Accommodating Diversity. In Proceedings of Sigcomm 2013, New York, NY, USA, 2013. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H.-C. Hsiao, T. H.-J. Kim, A. Perrig, A. Yamada, S. C. Nelson, M. Gruteser, and W. Meng. LAP: Lightweight anonymity and privacy. In Proceedings of IEEE Symposium on Security and Privacy, May 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H.-C. Hsiao, T. H.-J. Kim, S. Yoo, X. Zhang, S. B. Lee, V. Gligor, and A. Perrig. STRIDE : Sanctuary Trail--Refuge from Internet DDoS Entrapment. In Proceedings of ACM ASIACCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C. Huitema. Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs). RFC 4380 (Proposed Standard), February 2006. Updated by RFCs 5991, 6081.Google ScholarGoogle Scholar
  18. R. Kang, S. Brown, and S. Kiesler. Users' Perception about Internet Anonymity. In ACM Conference on Human Factors in Computing Systems (CHI13), April 2013.Google ScholarGoogle Scholar
  19. D. Katabi, M. Handley, and C. Rohrs. Congestion control for high bandwidth-delay product networks. In SIGCOMM '02, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. F. Kelly and G. Raina. Explicit congestion control: charging, fairness and admission management. In B. Ramamurthy, G. N. Rouskas, and K. M. Sivalingam, editors, Next-Generation Internet Architectures and Protocols, pages 257--274. Cambridge University Press, 2010.Google ScholarGoogle Scholar
  21. E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click modular router. ACM Transactions on Computer Systems, 18(3):263--297, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Mukerjee, D. Han, S. Seshan, and P. Steenkiste. Understanding tradeoffs in incremental deployment of new network architectures. In Proceedings of the 9th international conference on Emerging networking experiments and technologies, CoNEXT '13, New York, NY, USA, December 2013. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. E. Nordmark and R. Gilligan. Basic Transition Mechanisms for IPv6 Hosts and Routers. RFC 4213 (Proposed Standard), October 2005.Google ScholarGoogle Scholar
  24. E. Nordstrom, D. Shue, P. Gopalan, R. Kiefer, M. Arye, S. Ko, J. Rexford, and M. J. Freedman. Serval: An end-host stack for service-centric networking. In Proc. 9th Symposium on Networked Systems Design and Implementation, NSDI '12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. L. Rainie, S. Kiesler, R. Kang, and M. Madden. Anonymity, Privacy, and Security Online, September 2013. Pew Research Internet Project, http://pewinternet.org/Reports/2013/Anonymity-online.aspx.Google ScholarGoogle Scholar
  26. A. Studer and A. Perrig. The Coremelt Attack. In Proceedings of ESORICS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Trossen, M. Sarela, and K. Sollins. Arguments for an information-centric internetworking architecture. ACM Computer Communication Review, 40:26--33, April 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs, and R. Braynard. Networking Named Content. In Proc. CoNEXT, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Z. Zhu and R. Wakikawa and L. Zhang. A Survey of Mobility Support in the Internet, July 2011. IETF RFC 6301.Google ScholarGoogle Scholar
  30. X. Zhang, H.-C. Hsiao, G. Hasker, H. Chan, A. Perrig, and D. G. Andersen. Scion: Scalability, control, and isolation on next-generation networks. In IEEE Symposium on Security and Privacy (Oakland), Oakland, CA, May 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. D. Zhou, B. Fan, H. Lim, M. Kaminsky, and D. G. Andersen. Scalable, High Performance Ethernet Forwarding with CuckooSwitch. In Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT '13, pages 97--108. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. XIA: architecting a more trustworthy and evolvable internet

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader