skip to main content
10.1145/1027527.1027547acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
Article

Support for service composition in i3

Published:10 October 2004Publication History

ABSTRACT

We consider the problem of service composition in a wide area network, where an end-user can send its packets through intermediate processing points (middleboxes) which can perform a variety of services. Example of such services are filtering, intrusion detection, anonymization, transcoding, and caching. In this paper, we argue that the Internet Indirection Infrastructure (i3)--an overlay network architecture that enables users to locate services and control the path followed by their packets--provides a natural platform for service composition. We discuss the challenges in implementing service compositions on top of i3, and suggest several approaches to address these challenges.

References

  1. P. Chandra, Y.-H. Chu, A. Fisher, J. Gao, C. Kosak, T. E. Ng, P. Steenkiste, E. Takahashi, and H. Zhang. Darwin: Customizable Resource Management for Value-Added Network Services. IEEE Network, 15(1), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Y. Chen, D. Bindel, H. Song, and R. H. Katz. An Algebraic Approach to Practical and Scalable Overlay Network Monitoring. In Proc. of SIGCOMM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. X. Gu, K. Nahrstedt, R. N. Chang, and C. Ward. QoS-Assured Service Composition in Managed Service Overlay Networks. In Proc. of ICDCS, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Guo and I. Matta. Search Space Reduction in QoS Routing. Computer Networks: The Int. Journal of Comp. and Tel. Networking, 41(1):73--88, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Karp, S. Ratnasamy, S. Rhea, and S. Shenker. Spurring Adoption of DHTs with OpenHash, a Public DHT Service. In Proc. of IPTPS, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Lakshminarayanan, A. Rao, I. Stoica, and S. Shenker. Flexible and Robust Large Scale Multicast using i3. Technical Report CS-02-1187, UCB, 2002.Google ScholarGoogle Scholar
  7. A. Nandi. LALA : Location Aware Load Aware Overlay Anycast. MS Thesis, Rice University, May 2004.Google ScholarGoogle Scholar
  8. T. S. E. Ng and H. Zhang. Predicting Internet Network Distance with Coordinates-Based Approaches. In Proc. of INFOCOM, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  9. V. Paxson. Bro: A System for Detecting Network Intruders in Real-time. Computer Networks, 31(2324):2435--2463, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet Indirection Infrastructure. In Proc. of SIGCOMM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proc. of SIGCOMM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Xu and K. Nahrstedt. Finding Service Paths in Multimedia Service Proxy Network. In MMCN, 2002.Google ScholarGoogle Scholar

Index Terms

  1. Support for service composition in i3

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MULTIMEDIA '04: Proceedings of the 12th annual ACM international conference on Multimedia
      October 2004
      1028 pages
      ISBN:1581138938
      DOI:10.1145/1027527

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 October 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate995of4,171submissions,24%

      Upcoming Conference

      MM '24
      MM '24: The 32nd ACM International Conference on Multimedia
      October 28 - November 1, 2024
      Melbourne , VIC , Australia

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader