Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1402958.1402973acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

Network exception handlers: host-network control in enterprise networks

Published: 17 August 2008 Publication History

Abstract

Enterprise network architecture and management have followed the Internet's design principles despite different requirements and characteristics: enterprise hosts are administered by a single authority, which intrinsically assigns different values to traffic from different business applications.
We advocate a new approach where hosts are no longer relegated to the network's periphery, but actively participate in network-related decisions. To enable host participation, network information, such as dynamic network topology and per-link characteristics and costs, is exposed to the hosts, and network administrators specify conditions on the propagated network information that trigger actions to be performed while a condition holds. The combination of a condition and its actions embodies the concept of the network exception handler, defined analogous to a program exception handler. Conceptually, network exception handlers execute on hosts with actions parameterized by network and host state.
Network exception handlers allow hosts to participate in network management, traffic engineering and other operational decisions by explicitly controlling host traffic under predefined conditions. This flexibility improves overall performance by allowing efficient use of network resources. We outline several sample network exception handlers, present an architecture to support them, and evaluate them using data collected from our own enterprise network.

References

[1]
T. Anderson, A. Collins, A. Krishnamurthy, and J. Zahorjan. PCP: Efficient Endpoint Congestion Control. In Proc. ACM/USENIX NSDI 2006, pages 197--210, San Jose, CA, May 2006.
[2]
H. Ballani and P. Francis. CONMan: A Step Towards Network Manageability. In Proc. ACM SIGCOMM, pages 205--216, New York, NY, 2007.
[3]
S. M. Bellovin. Distributed firewalls. ;login:, pages 37--39, Nov. 1999.
[4]
L. Breslau, E. W. Knightly, S. Shenker, I. Stoica, and H. Zhang. Endpoint Admission Control: Architectural Issues and Performance. In Proc. ACM SIGCOMM 2000, pages 57--69, New York, NY, 2000.
[5]
R. Callon. Use of OSI IS-IS for routing in TCP/IP and dual environments. RFC 1195, IETF, Dec. 1990.
[6]
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker. Ethane: Taking Control of the Enterprise. In Proc. ACM SIGCOMM, pages 1--12, New York, NY, 2007.
[7]
Y. Chen, D. Bindel, H. Song, and R. H. Katz. An Algebraic Approach to Practical and Scalable Overlay Network Monitoring. In Proc. ACM SIGCOMM 2004, pages 55--66, New York, NY, 2004.
[8]
E. Cooke, R. Mortier, A. Donnelly, P. Barham, and R. Isaacs. Reclaiming Network-wide Visibility Using Ubiquitous End System Monitors. In Proc. USENIX 2006 Annual Technical Conference, June 2006.
[9]
S. Hanks, T. Li, D. Farinacci, and P. Traina. Generic Routing Encapsulation (GRE). RFC 1701, IETF, Oct. 1994.
[10]
L. Huang, M. Garofalakis, J. Hellerstein, A. Joseph, and N. Taft. Toward Sophisticated Detection with Distributed Triggers. In MineNet'06, pages 311--316, New York, NY, 2006.
[11]
A. Jain, J. M. Hellerstein, S. Ratnasamy, and D. Wetherall. A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers. In Proc. HotNets-III, San Diego, CA, November 2004.
[12]
A. W. Moore and K. Papagiannaki. Toward the Accurate Identification of Network Applications. In Sixth Passive and Active Measurement Workshop (PAM), Boston, MA, 2005.
[13]
J. Moy. OSPF Version 2. RFC 2328, IETF, Apr. 1998.
[14]
D. Oran. OSI IS-IS Intra-domain Routing Protocol. RFC 1142, IETF, Feb. 1990.
[15]
K. Ramakrishnan, S. Floyd, and D. Black. The Addition of Explicit Congestion Notification (ECN) to IP. RFC 3168, IETF, Sept. 2001.
[16]
J. Rexford, A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, G. Xie, J. Zhan, and H. Zhang. Network-wide Decision Making: Toward a Wafer-thin Control Plane. In Proc. HotNets-III, San Diego, CA, Nov. 2004.
[17]
E. Rosen and Y. Rekhter. BGP/MPLS IP Virtual Private Networks (VPNs). RFC 4364, IETF, Feb. 2006.
[18]
A. Shaikh and A. Greenberg. OSPF Monitoring: Architecture, Design and Deployment Experience. In Proc. ACM/USENIX NSDI 2004, pages 57--70, San Francisco, CA, Mar. 2004.
[19]
A. Snoeren and B. Raghavan. Decoupling Policy from Mechanism in Internet Routing. In Proc. HotNets-II, pages 81--86, Cambridge, MA, Nov. 2003.
[20]
H. Yan, D. A. Maltz, T. E. Ng, H. Gogineni, H. Zhang, and Z. Cai. Tesseract: A 4D Network Control Plane. In Proc. ACM/USENIX NSDI 2007, pages 369--382, Cambridge, MA, May 2007.
[21]
Y. Zhao, Y. Chen, and D. Bindel. Towards Unbiased End-to-End Network Diagnosis. In Proc. ACM SIGCOMM, pages 219--230, New York, NY, 2006

Cited By

View all
  • (2023)Extreme Bandits Using Robust StatisticsIEEE Transactions on Information Theory10.1109/TIT.2022.320993169:3(1761-1776)Online publication date: Mar-2023
  • (2019)Composing SDN Controller Enhancements with MozartProceedings of the ACM Symposium on Cloud Computing10.1145/3357223.3362712(351-363)Online publication date: 20-Nov-2019
  • (2019)Introducing SmartNICs in Server-Based Data Plane Processing: The DDoS Mitigation Use CaseIEEE Access10.1109/ACCESS.2019.29334917(107161-107170)Online publication date: 2019
  • Show More Cited By

Index Terms

  1. Network exception handlers: host-network control in enterprise networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 conference on Data communication
    August 2008
    452 pages
    ISBN:9781605581750
    DOI:10.1145/1402958
    • cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 38, Issue 4
      October 2008
      436 pages
      ISSN:0146-4833
      DOI:10.1145/1402946
      Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 August 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. enterprise networks
    2. management
    3. network exception handlers

    Qualifiers

    • Research-article

    Conference

    SIGCOMM '08
    Sponsor:
    SIGCOMM '08: ACM SIGCOMM 2008 Conference
    August 17 - 22, 2008
    WA, Seattle, USA

    Acceptance Rates

    Overall Acceptance Rate 462 of 3,389 submissions, 14%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)41
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 24 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Extreme Bandits Using Robust StatisticsIEEE Transactions on Information Theory10.1109/TIT.2022.320993169:3(1761-1776)Online publication date: Mar-2023
    • (2019)Composing SDN Controller Enhancements with MozartProceedings of the ACM Symposium on Cloud Computing10.1145/3357223.3362712(351-363)Online publication date: 20-Nov-2019
    • (2019)Introducing SmartNICs in Server-Based Data Plane Processing: The DDoS Mitigation Use CaseIEEE Access10.1109/ACCESS.2019.29334917(107161-107170)Online publication date: 2019
    • (2018)Understanding PCIe performance for end host networkingProceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication10.1145/3230543.3230560(327-341)Online publication date: 7-Aug-2018
    • (2018)EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN.2018.00048(386-397)Online publication date: Jun-2018
    • (2017)A Call To Arms for Tackling the Unexpected Implications of SDN Controller EnhancementsProceedings of the First Asia-Pacific Workshop on Networking10.1145/3106989.3107006(15-21)Online publication date: 3-Aug-2017
    • (2015)Taming uncertainty in distributed systems with help from the networkProceedings of the Tenth European Conference on Computer Systems10.1145/2741948.2741976(1-16)Online publication date: 17-Apr-2015
    • (2015)HONEJournal of Network and Systems Management10.1007/s10922-014-9321-923:2(374-399)Online publication date: 1-Apr-2015
    • (2012)Control and understanding: Owning your home network2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)10.1109/COMSNETS.2012.6151322(1-10)Online publication date: Jan-2012
    • (2012)Collaborative Algorithm with a Green TouchMobile and Ubiquitous Systems: Computing, Networking, and Services10.1007/978-3-642-29154-8_5(51-62)Online publication date: 2012
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media