Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2342441.2342457acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

Outsourcing network functionality

Published: 13 August 2012 Publication History

Abstract

This paper presents an architecture for adding functionality to networks via outsourcing. In this model, the enterprise network only forwards data; any additional processing is performed by external Feature Providers (FPs). FPs provide and manage features, scaling and moving them in response to customer demand, and providing automated recovery in case of failure. Benefits to the enterprise include reduced cost and management complexity, improved features through FP specialization, and increased choice in services.
Central to the model are a policy component and a Feature API (FAPI). Policy is specified with features not locations, enabling features to be located anywhere. FAPI enables communication between enterprise and FP control planes to share policy and configure features.
We have built a prototype implementation of this architecture called Jingling. Our prototype system incorporates a nation-wide backbone network and FPs located in six sites around the United States.

Supplementary Material

JPG File (hotsdn-iii-01-outsourcingnetworkfunctionality.jpg)
MP4 File (hotsdn-iii-01-outsourcingnetworkfunctionality.mp4)

References

[1]
Amazon EC2. https://aws.amazon.com/ec2/.
[2]
Beacon. http://www.beaconcontroller.net/.
[3]
Broadcom BCM88600-Series. http://www.broadcom. com/products/Switching/Carrier-and-Service-Provider/BCM88600-Series.
[4]
Caesar, M., Caldwell, D., Feamster, N., Rexford, J., Shaikh, A., and van der Merwe, J. Design and implementation of a routing control platform. In Proc. of USENIX NSDI'05 (Berkeley, CA, USA, 2005), NSDI'05, USENIX Association, pp. 15--28.
[5]
Casado, M., Freedman, M. J., Pettit, J., Luo, J., McKeown, N., and Shenker, S. Ethane: taking control of the enterprise. SIGCOMM Comput. Commun. Rev. 37 (August 2007), 1--12.
[6]
Cisco: Manipulating Routing Updates. http:// ptgmedia.pearsoncmg.com/imprint_downloads/cisco/bookreg/2237xxd.pdf.
[7]
Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments. http://www.cisco. com/en/US/solutions/collateral/ns340/ns517/ ns224/ns836/ns976/white_paper_C11-64521.html.
[8]
Greenberg, A., Hjalmtysson, G., Maltz, D. A., Myers, A., Rexford, J., Xie, G., Yan, H., Zhan, J., and Zhang, H. A clean slate 4D approach to network control and management. SIGCOMM Comput. Commun. Rev. 35 (October 2005), 41--54.
[9]
Greenhalgh, A., Huici, F., Hoerdt, M., Papadimitriou, P., Handley, M., and Mathy, L. Flow processing and the rise of commodity network hardware. SIGCOMM Comput. Commun. Rev. 39 (March 2009), 20--26.
[10]
Joseph, D. A., Tavakoli, A., and Stoica, I. A policy-aware switching layer for data centers. SIGCOMM Comput. Commun. Rev. 38, 4 (Aug. 2008), 51--62.
[11]
Lee, J., Tourrilhes, J., Sharma, P., and Banerjee, S. No more middlebox: integrate processing into network. SIGCOMM Comput. Commun. Rev. 40 (August 2010), 459--460.
[12]
Lumezanu, C., Baden, R., Spring, N., and Bhattacharjee, B. Triangle inequality variations in the internet. In Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference (New York, NY, USA, 2009), IMC '09, ACM, pp. 177--183.
[13]
Marvell Prestera CX8297. http://investor.marvell. com/phoenix.zhtml?c=120802&p=irol-newsArticle& ID=1561826.
[14]
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., and Turner, J. OpenFlow: enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev. 38 (March 2008), 69--74.
[15]
Ng, T. S. E., Stoica, I., and Zhang, H. A waypoint service approach to connect heterogeneous internet address spaces. In Proc. USENIX Technical Conference (Berkeley, CA, USA, 2001), USENIX Association, pp. 319--332.
[16]
Quinn, P., Durazoo, K., Harvey, A. G., Gannu, S., Cheng, D., Baker, F., Pruss, R. M., Greene, B. R., Rajendran, S., and Gleichauf, R. Service insertion architecture. Patent Application, 07 2008. US 2008/0177896 A1.
[17]
Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., and Sekar, V. Making middleboxes someone else's problem: Network processing as a cloud service. In Proc. of SIGCOMM (2012).
[18]
Stoica, I., Adkins, D., Zhuang, S., Shenker, S., and Surana, S. Internet Indirection Infrastructure. SIGCOMM Comput. Comm. Rev. 32, 4 (Aug. 2002), 73--86.
[19]
2011 Open Networking Summit Demonstrations. http://opennetsummit.org/demonstrations.html.
[20]
Walfish, M., Stribling, J., Krohn, M., Balakrishnan, H., Morris, R., and Shenker, S. Middleboxes no longer considered harmful. In Proc. of OSDI '04 (Berkeley, CA, USA, 2004), USENIX Association, pp. 215--230.

Cited By

View all
  • (2023)Data Provenance in Healthcare: Approaches, Challenges, and Future DirectionsSensors10.3390/s2314649523:14(6495)Online publication date: 18-Jul-2023
  • (2023)D3T: Double Deep Q-Network Decision Transformer for Service Function Chain Placement2023 IEEE 24th International Conference on High Performance Switching and Routing (HPSR)10.1109/HPSR57248.2023.10147969(167-172)Online publication date: 5-Jun-2023
  • (2022)Network Services Anomalies in NFV: Survey, Taxonomy, and Verification MethodsIEEE Transactions on Network and Service Management10.1109/TNSM.2022.314458219:2(1567-1584)Online publication date: Jun-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
HotSDN '12: Proceedings of the first workshop on Hot topics in software defined networks
August 2012
142 pages
ISBN:9781450314770
DOI:10.1145/2342441
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 August 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. jingling
  2. middleboxes
  3. network services
  4. outsourcing
  5. sdn

Qualifiers

  • Research-article

Conference

SIGCOMM '12
Sponsor:
SIGCOMM '12: ACM SIGCOMM 2012 Conference
August 13, 2012
Helsinki, Finland

Acceptance Rates

Overall Acceptance Rate 88 of 198 submissions, 44%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)74
  • Downloads (Last 6 weeks)19
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Data Provenance in Healthcare: Approaches, Challenges, and Future DirectionsSensors10.3390/s2314649523:14(6495)Online publication date: 18-Jul-2023
  • (2023)D3T: Double Deep Q-Network Decision Transformer for Service Function Chain Placement2023 IEEE 24th International Conference on High Performance Switching and Routing (HPSR)10.1109/HPSR57248.2023.10147969(167-172)Online publication date: 5-Jun-2023
  • (2022)Network Services Anomalies in NFV: Survey, Taxonomy, and Verification MethodsIEEE Transactions on Network and Service Management10.1109/TNSM.2022.314458219:2(1567-1584)Online publication date: Jun-2022
  • (2021)Throughput Optimization and Delay Guarantee VNF Placement for Mapping SFC Requests in NFV-Enabled NetworksIEEE Transactions on Network and Service Management10.1109/TNSM.2021.308783818:4(4247-4262)Online publication date: Dec-2021
  • (2021)Resource Optimization and Delay Guarantee Virtual Network Function Placement for Mapping SFC Requests in Cloud NetworksIEEE Transactions on Network and Service Management10.1109/TNSM.2021.305865618:2(1508-1523)Online publication date: Jun-2021
  • (2020)SICS: Secure and Dynamic Middlebox OutsourcingIEEE/ACM Transactions on Networking10.1109/TNET.2020.302338628:6(2713-2726)Online publication date: Dec-2020
  • (2019)LightBoxProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security10.1145/3319535.3339814(2351-2367)Online publication date: 6-Nov-2019
  • (2019)Availability Aware VNF Deployment in Datacenter Through Shared Redundancy and Multi-TenancyIEEE Transactions on Network and Service Management10.1109/TNSM.2019.293650516:4(1651-1664)Online publication date: Dec-2019
  • (2019)A survey on data provenance in IoTWorld Wide Web10.1007/s11280-019-00746-123:2(1441-1463)Online publication date: 27-Nov-2019
  • (2018)Moving Bits with a Fleet of Shared Virtual Routers2018 IFIP Networking Conference (IFIP Networking) and Workshops10.23919/IFIPNetworking.2018.8697019(1-9)Online publication date: May-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media