Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Unmanaged Internet Protocol: taming the edge network management crisis

Published: 01 January 2004 Publication History

Abstract

Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarchical, administratively assigned addresses. Existing ad-hoc routing protocols address the management problem but do not scale to Internet-wide networks. The promise of ubiquitous network computing cannot be fulfilled until we develop an Unmanaged Internet Protocol (UIP), a scalable routing protocol that manages itself automatically. UIP must route within and between constantly changing edge networks potentially containing millions or billions of nodes, and must still function within edge networks disconnected from the main Internet, all without imposing the administrative burden of hierarchical address assignment. Such a protocol appears challenging but feasible. We propose an architecture based on self-certifying, cryptographic node identifies and a routing algorithm adapted from distributed hash tables.

References

[1]
J. Abley, B. Black, and V. Gill. Goals for IPv6 site-multihoming architectures, August 2003, RFC 3582.]]
[2]
William Adjie-Winoto et al. The design and implementation of an intentional naming system. In 17th ACM Symposium on Operating System Principles, Kiawah Island, SC, December 1999.]]
[3]
David G. Andersen et al. Resilient overlay networks. In 18th ACM Symposium on Operating Systems Principles, Banff, Canada, October 2001.]]
[4]
Marta Arias et al. Compact routing with name independence. In 15th ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, CA, June 2003.]]
[5]
B. Carpenter, J. Crowcroft, and Y. Rekhter. IPv4 address behaviour today, February 1997. RFC 2101.]]
[6]
Microsoft Corporation. Plug and play networking with Microsoft automatic private IP addressing, March 1998.]]
[7]
R. Droms, Dynamic host configuration protocol, March 1997. RFC 2131.]]
[8]
Bryan Ford. Peer-to-peer (P2P) communication across middleboxes, October 2003. Internet Draft draft-ford-midcom-p2p-01.txt (Work in Progress).]]
[9]
Bryan Ford. Scalable Internet routing on topology-independent node identities. Technical Report MIT-LCS-TR-926, MIT Laboratory for Computer Science, 2003. Forthcoming.]]
[10]
M. Gritter and D. R. Cheriton. An architecture for content routing support in the Internet. In Usenix Symposium on Internet Technologies and Systems, March 2001.]]
[11]
C. Hedrick. Routing information protocol, June 1988. RFC 1058.]]
[12]
Ahmed Helmy. A multicast-based protocol for IP mobility support. In Networked Group Communication, pages 49--58, 2000.]]
[13]
M. Holdrege and P. Srisuresh. Protocol complications with the IP network address translator, January 2001. RFC 3027.]]
[14]
David B. Johnson. Routing in ad hoc networks of mobile hosts. In IEEE Workshops on Mobile Computing Systems and Applications, pages 158--163, December 1994.]]
[15]
L. R. Ford Jr. and D. R. Fulkerson. Flows in Networks. Princeton University Press, Princeton N. J., 1962.]]
[16]
S. Kent and R. Atkinson. Security architecture for the Internet Protocol, November 1998. RFC 2401.]]
[17]
M. Leech et al. SOCKS protocol version 5, March 1996. RFC 1928.]]
[18]
J. C. R. Licklider. The computer as a communication device. Science and Technology, April 1968.]]
[19]
Petar Maymounkov and David Mazières. Kademlia: A peer-to-peer information system based on the XOR metric. In Ist International Workshop on Peer-to-Peer Systems, March 2002.]]
[20]
David Mazières, Michael Kaminsky, M. Frans Kaashoek, and Emmett Witchel. Separating key management from file system security. In 17th ACM Symposium on Operating Systems Principles, Kiawah Island, South Carolina, December 1999.]]
[21]
R. Moskowitz and P. Nikander. Host identity protocol architecture, April 2003. Internet-Draft (Work in Progress).]]
[22]
J. Moy. OSPF version 2, July 1991. RFC 1247.]]
[23]
Jayanth Mysore and Vaduvur Bharghavan. A new multicasting-based architecture for Internet host mobility. In Third ACM/IEEE International Conference on Mobile Computing and Networking, pages 161--172, 1997.]]
[24]
Charles E. Perkins and Elizabeth M. Belding-Royer. Ad hoc on-demand distance vector routing. In 2nd IEEE Workshop on Mobile Computing Systems and Applications, pages 90--100, New Orleans, LA, February 1999.]]
[25]
C. Perkins. Editor. IP mobility support for IPv4, August 2002. RFC 3344.]]
[26]
Y. Rekhter and T. Li (editors). An architecture for IP address allocation with CIDR, September 1993. RFC 1518.]]
[27]
Y. Rekhter and T. Li (editors). A border gateway protocol 4 (BGP-4), March 1995. RFC 1771.]]
[28]
Lawrence G. Roberts and Barry D. Wessler. Computer network development to achieve resource sharing. In Spring Joint Computer Conference, Atlantic City, New Jersey. May 1970.]]
[29]
J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy. STUN - simple traversal of user datagram protocol (UDP) through network address translators (NATs), March 2003. RFC 3489.]]
[30]
Alex C. Snoeren and Hari Balakrishnan. An end-to-end approach to host mobility. In Sixth ACM/IEEE International Conference on Mobile Computing and Networking. August 2000.]]
[31]
Alex C. Snoeren, Hari Balakrishnan, and M. Frans Kaashoek. Reconsidering Internet mobility. In 8th Workshop on Hot Topics in Operating Systems, May 2001.]]
[32]
P. Srisuresh and K. Egevang. Traditional IP network address translator (Traditional NAT), January 2001. RFC 3022.]]
[33]
Ion Stoica et al. Internet indirection infrastructure. In ACM SIGCOMM, 2002.]]
[34]
Paul Francis Tsuchiya. The Landmark hierarchy: A new hierarchy for routing in very large networks. IN ACM SIGCOMM, pages 35--42, Stanford, CA, August 1988.]]
[35]
UPnP Forum. Internet gateway device (IGD) standardized device control protocol V 1.0, November 2001. http://www.upnp.org/.]]
[36]
P. Vixie, Editor, S. Thomson, Y. Rekhter, and J. Bound. Dynamic updates in the domain name system (DNS UPDATE), April 1997. RFC 2136.]]

Cited By

View all
  • (2023)Measuring the Edge: A Performance Evaluation of Edge Offloading2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops56833.2023.10150261(212-218)Online publication date: 13-Mar-2023
  • (2023)Low-Latency TLS 1.3-Aware Hole PunchingICC 2023 - IEEE International Conference on Communications10.1109/ICC45041.2023.10279326(1481-1486)Online publication date: 28-May-2023
  • (2022)KIRA: Distributed Scalable ID-based Routing with Fast Forwarding2022 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking55013.2022.9829816(1-9)Online publication date: 13-Jun-2022
  • Show More Cited By
  1. Unmanaged Internet Protocol: taming the edge network management crisis

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 34, Issue 1
      January 2004
      140 pages
      ISSN:0146-4833
      DOI:10.1145/972374
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 January 2004
      Published in SIGCOMM-CCR Volume 34, Issue 1

      Check for updates

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)15
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 24 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Measuring the Edge: A Performance Evaluation of Edge Offloading2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops56833.2023.10150261(212-218)Online publication date: 13-Mar-2023
      • (2023)Low-Latency TLS 1.3-Aware Hole PunchingICC 2023 - IEEE International Conference on Communications10.1109/ICC45041.2023.10279326(1481-1486)Online publication date: 28-May-2023
      • (2022)KIRA: Distributed Scalable ID-based Routing with Fast Forwarding2022 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking55013.2022.9829816(1-9)Online publication date: 13-Jun-2022
      • (2019)Elements of Application-Layer Internetworking for Adaptive Self-Organizing NetworksProceedings of the IEEE10.1109/JPROC.2019.2894291107:4(797-818)Online publication date: Apr-2019
      • (2016)ID-based service-oriented communications for unified access to IoTComputers and Electrical Engineering10.1016/j.compeleceng.2016.02.02052:C(98-113)Online publication date: 1-May-2016
      • (2016)DevComComputer Communications10.1016/j.comcom.2016.02.00185:C(14-27)Online publication date: 1-Jul-2016
      • (2016)A Virtual Id Routing Protocol for Future Dynamics Networks and Its Implementation Using the SDN ParadigmJournal of Network and Systems Management10.1007/s10922-016-9373-024:3(578-606)Online publication date: 1-Jul-2016
      • (2015)Dynamic ring for seamless mobility in identity centric networksProceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC)10.1109/ISCC.2015.7405633(930-935)Online publication date: 6-Jul-2015
      • (2015)A survey of identifier-locator split addressing architecturesComputer Science Review10.1016/j.cosrev.2015.04.00217:C(25-42)Online publication date: 1-Aug-2015
      • (2015)Implementation and Performance Testing of ID Layer Nodes for Hierarchized IoT NetworkIntelligent Information and Database Systems10.1007/978-3-319-15705-4_45(463-472)Online publication date: 17-Mar-2015
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media