ABSTRACT
We consider the problem of service composition in a wide area network, where an end-user can send its packets through intermediate processing points (middleboxes) which can perform a variety of services. Example of such services are filtering, intrusion detection, anonymization, transcoding, and caching. In this paper, we argue that the Internet Indirection Infrastructure (i3)--an overlay network architecture that enables users to locate services and control the path followed by their packets--provides a natural platform for service composition. We discuss the challenges in implementing service compositions on top of i3, and suggest several approaches to address these challenges.
- P. Chandra, Y.-H. Chu, A. Fisher, J. Gao, C. Kosak, T. E. Ng, P. Steenkiste, E. Takahashi, and H. Zhang. Darwin: Customizable Resource Management for Value-Added Network Services. IEEE Network, 15(1), 2001. Google ScholarDigital Library
- Y. Chen, D. Bindel, H. Song, and R. H. Katz. An Algebraic Approach to Practical and Scalable Overlay Network Monitoring. In Proc. of SIGCOMM, 2004. Google ScholarDigital Library
- X. Gu, K. Nahrstedt, R. N. Chang, and C. Ward. QoS-Assured Service Composition in Managed Service Overlay Networks. In Proc. of ICDCS, May 2003. Google ScholarDigital Library
- L. Guo and I. Matta. Search Space Reduction in QoS Routing. Computer Networks: The Int. Journal of Comp. and Tel. Networking, 41(1):73--88, 2003. Google ScholarDigital Library
- B. Karp, S. Ratnasamy, S. Rhea, and S. Shenker. Spurring Adoption of DHTs with OpenHash, a Public DHT Service. In Proc. of IPTPS, 2004. Google ScholarDigital Library
- K. Lakshminarayanan, A. Rao, I. Stoica, and S. Shenker. Flexible and Robust Large Scale Multicast using i3. Technical Report CS-02-1187, UCB, 2002.Google Scholar
- A. Nandi. LALA : Location Aware Load Aware Overlay Anycast. MS Thesis, Rice University, May 2004.Google Scholar
- T. S. E. Ng and H. Zhang. Predicting Internet Network Distance with Coordinates-Based Approaches. In Proc. of INFOCOM, 2002.Google ScholarCross Ref
- V. Paxson. Bro: A System for Detecting Network Intruders in Real-time. Computer Networks, 31(2324):2435--2463, 1999. Google ScholarDigital Library
- I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet Indirection Infrastructure. In Proc. of SIGCOMM, 2002. Google ScholarDigital Library
- I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proc. of SIGCOMM, 2001. Google ScholarDigital Library
- D. Xu and K. Nahrstedt. Finding Service Paths in Multimedia Service Proxy Network. In MMCN, 2002.Google Scholar
Index Terms
- Support for service composition in i3
Recommendations
QoS-Aware Service Composition: A Survey
ECOWS '10: Proceedings of the 2010 Eighth IEEE European Conference on Web ServicesService compositions build new services by orchestrating a set of existing services. In the Internet of Services there may be many functional similar services, but with different Quality of Service (QoS). Thus a significant research problem in service ...
Dynamic Service Composition Based on Peer-to-Peer Network
SOSE '06: Proceedings of the Second IEEE International Symposium on Service-Oriented System EngineeringTo address the problem of service composition in SOA, this paper presents a novel mechanism to abstract a complex composite service as a peer-to-peer network. Thus, the problem of service composition is converted into a problem of peer-to-peer network ...
Automatic service composition with heterogeneous service-oriented architectures
ICOST'10: Proceedings of the Aging friendly technology for health and independence, and 8th international conference on Smart homes and health telematicsService-Oriented Architecture is widely used to program pervasive spaces such as Smart Homes because of its capabilities to handle dynamic and heterogeneous environments. It is often the case that the services required are designed and implemented using ...
Comments