Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1544012.1544076acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Cabernet: connectivity architecture for better network services

Published: 09 December 2008 Publication History

Abstract

Deploying and managing wide-area network services is exceptionally challenging. Despite having servers at many locations, a service provider must rely on an underlying best-effort network; a network provider can offer services over its own customized network, but only within limited footprint. In this paper, we propose Cabernet (Connectivity Architecture for Better Network Services), a three-layer network architecture that lowers the barrier for deploying wide-area services. We introduce the connectivity layer, which uses virtual links purchased from infrastructure providers to run virtual networks with the necessary geographic footprint, reliability, and performance for the service providers. As an example, we present a cost-effective way to support IPTV delivery through wide-area IP multicast that runs on top of a reliable virtual network.

References

[1]
R. Doverspike, G. Li, K. Oikonomou, K. K. Ramakrishnan, and D. Wang, "IP backbone design for multimedia distribution: Architecture and performance," in Proc. IEEE INFOCOM, 2007.
[2]
D. Wang, G. Li, and R. Doverspike, "IGP weight setting in multimedia IP networks," in Proc. IEEE INFOCOM, 2007.
[3]
J.-P Vasseur, M. Pickavet, and P. Demeester, Network Recovery: Protection and Restoration of Optical, SONET-SDH, and MPLS. Morgan Kaufmann, 2004.
[4]
R. Braden, L. Zhang, S. Berson, S. Herzog, and S. Jamin, "Resource ReSerVation Protocol (RSVP)." RFC 2205, September 1997.
[5]
W. Liu, H. Karaoglu, A. Gupta, M. Yuksel, and K. Kar, "Edge-to-edge bailout forward contracts for single-domain internet services," in Proc. International Workshop on Quality of Service, 2008.
[6]
A. Farrel, J.-P Vasseur, and J. Ash, "A Path Computation Element (PCE)-Based Architecture." RFC 4655, August 2006.
[7]
R. Mahajan, D. Wetherall, and T. Anderson "Negotiation-based routing between neighboring ISPs," in Proc. Networked Systems Design and Implementation, 2005.
[8]
S. Goldberg, D Xiao, E. Tromer, B. Barak, and J. Rexford, "Path-quality monitoring in the presence of adversaries," in Proc. ACM SIGMETRICS, 2008.
[9]
I. Avramopoulos and J. Rexford, "Stealth Probing: Efficient Data-Plane Security for IP Routing," in Proc. USENIX Annual Technical Conference, 2006.
[10]
Y. Zhu, J. Rexford, A. Bavier, and N. Feamster, "UFO: A resilient layered routing architecture," CCR Editorial, Oct 2008.
[11]
D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris, "Resilient overlay networks," in Proc. Symposium on Operating System Principles, 2001.
[12]
"Sureroute." http://www.akamai.com/dl/feature.sheets/fs.edgesuite.sureroute.pdf.
[13]
A. Bavier, N. Feamster, M. Huang, L. Peterson, and J. Rexford, "In VINI veritas: Realistic and controlled network experimentation," in Proc. ACM SIGCOMM, September 2006.
[14]
J. S. Turner, "A proposed architecture for the GENI backbone platform," in Proc. Architectures for Networking and Communications Systems, 2006.
[15]
"Juniper Networks: Intelligent Logical Router Service." http://www.juniper.net/solutions/literature/white_papers/200097.pdf.
[16]
L. Kontothanassis., R. Sitaraman, J. Wein, D. Hong, R. Kleinberg., B. Mancuso, D. Shaw, and D. Stodolsky, "A transport layer for live streaming in a content delivery network," Proceedings of the IEEE, vol. 92, no. 9, pp. 1408--1419, 2004.
[17]
PPLive. http://www.pplive.com.
[18]
PPStream. http://wwwppstream.com.
[19]
W.-P Yiu., X. Jin, and S -H. Chan, "Challenges and approaches in large-scale P2P media streaming," IEEE Multimedia, vol. 14, no. 2, pp. 50--59, 2007.
[20]
L. Peterson, T. Anderson, D. Culler, and T. Roscoe, "A blueprint for introducing disruptive technology into the Internet," in Proc HotNets, 2002.
[21]
T. Anderson, L. Peterson, S. Shenker, and J. Turner, "Overcoming the Internet impasse through virtualization," IEEE Computer Magazine, vol. 38, pp. 34--41, April 2005.
[22]
J. Turner and D. Taylor, "Diversifying the Internet," in Proc. IEEE GLOBECOM, 2005.
[23]
N. Feamster, L. Gao, and J. Rexford, "How to lease the Internet in your spare time," ACM Computer Communication Review, January 2006.
[24]
J. Touch, Y. Wang, and V. Pingali, "A recursive network architecture," Tech. Rep. ISI-TR-2006-626, USC/ISI, 2006.
[25]
L. Peterson, A. Bavier, M. E. Fiuczynski, and S. Muir, "Experiences building PlanetLab," in Proc. Operating System Design and Implementation, 2006.
[26]
K. Lakshminarayanan, I. Stoica, and S. Shenker, "Routing as a service," Tech. Rep. CSD-04-1327, University of California, Berkeley, January 2004.
[27]
J. Turner and et al, "Supercharging PlanetLab: High performance, multi-application, overlay network platform," in Proc. ACM SIGCOMM, 2007.

Cited By

View all
  • (2023)Machine Learning for Security of Cyber-Physical Systems and Security of Machine Learning: Attacks, Defences, and Current ApproachesProceedings of International Conference on Recent Innovations in Computing10.1007/978-981-99-0601-7_62(813-841)Online publication date: 17-May-2023
  • (2023)Intelligent Communication for Internet of Things (IoRT)Proceedings of International Conference on Recent Innovations in Computing10.1007/978-981-99-0601-7_24(313-328)Online publication date: 17-May-2023
  • (2022)Approaches and Challenges in Internet of Robotic ThingsFuture Internet10.3390/fi1409026514:9(265)Online publication date: 14-Sep-2022
  • Show More Cited By

Index Terms

  1. Cabernet: connectivity architecture for better network services

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CoNEXT '08: Proceedings of the 2008 ACM CoNEXT Conference
        December 2008
        526 pages
        ISBN:9781605582108
        DOI:10.1145/1544012
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 09 December 2008

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article

        Acceptance Rates

        Overall Acceptance Rate 198 of 789 submissions, 25%

        Upcoming Conference

        CoNEXT '24

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 18 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Machine Learning for Security of Cyber-Physical Systems and Security of Machine Learning: Attacks, Defences, and Current ApproachesProceedings of International Conference on Recent Innovations in Computing10.1007/978-981-99-0601-7_62(813-841)Online publication date: 17-May-2023
        • (2023)Intelligent Communication for Internet of Things (IoRT)Proceedings of International Conference on Recent Innovations in Computing10.1007/978-981-99-0601-7_24(313-328)Online publication date: 17-May-2023
        • (2022)Approaches and Challenges in Internet of Robotic ThingsFuture Internet10.3390/fi1409026514:9(265)Online publication date: 14-Sep-2022
        • (2017)2016 Reviewers for IEEE Transactions on Network and Service ManagementIEEE Transactions on Network and Service Management10.1109/TNSM.2017.267343914:1(2-7)Online publication date: 1-Mar-2017
        • (2017)Multi-Provider Service Chain Embedding With NestorIEEE Transactions on Network and Service Management10.1109/TNSM.2017.265468114:1(91-105)Online publication date: 1-Mar-2017
        • (2017)Fault Tolerant Algorithms for Multiple Infrastructure Provider Cooperation in Network Virtualization Environment Based on AuctioningWireless Personal Communications: An International Journal10.1007/s11277-017-4585-597:1(1537-1561)Online publication date: 1-Nov-2017
        • (2016)Elastic and Adaptive Resource Orchestration Architecture on 3-Tier Network Virtualization ModelIEICE Transactions on Information and Systems10.1587/transinf.2014EDP7321E99.D:4(1127-1138)Online publication date: 2016
        • (2016)VINEAIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2016.252699927:11(3381-3396)Online publication date: 1-Nov-2016
        • (2016)On distributed virtual network embedding with guaranteesIEEE/ACM Transactions on Networking10.1109/TNET.2014.237582624:1(569-582)Online publication date: 1-Feb-2016
        • (2015)Decomposition approaches for virtual network embedding with one-shot node and link mappingIEEE/ACM Transactions on Networking10.1109/TNET.2014.231292823:3(1012-1025)Online publication date: 1-Jun-2015
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media