54 research outputs found
Intra-Domain Pathlet Routing
Internal routing inside an ISP network is the foundation for lots of services
that generate revenue from the ISP's customers. A fine-grained control of paths
taken by network traffic once it enters the ISP's network is therefore a
crucial means to achieve a top-quality offer and, equally important, to enforce
SLAs. Many widespread network technologies and approaches (most notably, MPLS)
offer limited (e.g., with RSVP-TE), tricky (e.g., with OSPF metrics), or no
control on internal routing paths. On the other hand, recent advances in the
research community are a good starting point to address this shortcoming, but
miss elements that would enable their applicability in an ISP's network.
We extend pathlet routing by introducing a new control plane for internal
routing that has the following qualities: it is designed to operate in the
internal network of an ISP; it enables fine-grained management of network paths
with suitable configuration primitives; it is scalable because routing changes
are only propagated to the network portion that is affected by the changes; it
supports independent configuration of specific network portions without the
need to know the configuration of the whole network; it is robust thanks to the
adoption of multipath routing; it supports the enforcement of QoS levels; it is
independent of the specific data plane used in the ISP's network; it can be
incrementally deployed and it can nicely coexist with other control planes.
Besides formally introducing the algorithms and messages of our control plane,
we propose an experimental validation in the simulation framework OMNeT++ that
we use to assess the effectiveness and scalability of our approach.Comment: 13 figures, 1 tabl
Investigating the Potential of the Inter-IXP Multigraph for the Provisioning of Guaranteed End-to-End Services
In this work, we propose utilizing the rich connectivity between IXPs and
ISPs for inter-domain path stitching, supervised by centralized QoS brokers. In
this context, we highlight a novel abstraction of the Internet topology, i.e.,
the inter-IXP multigraph composed of IXPs and paths crossing the domains of
their shared member ISPs. This can potentially serve as a dense Internet-wide
substrate for provisioning guaranteed end-to-end (e2e) services with high path
diversity and global IPv4 address space reach. We thus map the IXP multigraph,
evaluate its potential, and introduce a rich algorithmic framework for path
stitching on such graph structures.Comment: Proceedings of ACM SIGMETRICS '15, pages 429-430, 1/1/2015. arXiv
admin note: text overlap with arXiv:1611.0264
Exploiting the power of multiplicity: a holistic survey of network-layer multipath
The Internet is inherently a multipath network: For an underlying network with only a single path, connecting various nodes would have been debilitatingly fragile. Unfortunately, traditional Internet technologies have been designed around the restrictive assumption of a single working path between a source and a destination. The lack of native multipath support constrains network performance even as the underlying network is richly connected and has redundant multiple paths. Computer networks can exploit the power of multiplicity, through which a diverse collection of paths is resource pooled as a single resource, to unlock the inherent redundancy of the Internet. This opens up a new vista of opportunities, promising increased throughput (through concurrent usage of multiple paths) and increased reliability and fault tolerance (through the use of multiple paths in backup/redundant arrangements). There are many emerging trends in networking that signify that the Internet's future will be multipath, including the use of multipath technology in data center computing; the ready availability of multiple heterogeneous radio interfaces in wireless (such as Wi-Fi and cellular) in wireless devices; ubiquity of mobile devices that are multihomed with heterogeneous access networks; and the development and standardization of multipath transport protocols such as multipath TCP. The aim of this paper is to provide a comprehensive survey of the literature on network-layer multipath solutions. We will present a detailed investigation of two important design issues, namely, the control plane problem of how to compute and select the routes and the data plane problem of how to split the flow on the computed paths. The main contribution of this paper is a systematic articulation of the main design issues in network-layer multipath routing along with a broad-ranging survey of the vast literature on network-layer multipathing. We also highlight open issues and identify directions for future work
Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments
The Internet inter-domain routing system is vulnerable. On the control plane,
the de facto Border Gateway Protocol (BGP) does not have built-in mechanisms to
authenticate routing announcements, so an adversary can announce virtually
arbitrary paths to hijack network traffic; on the data plane, it is difficult
to ensure that actual forwarding path complies with the control plane
decisions. The community has proposed significant research to secure the
routing system. Yet, existing secure BGP protocols (e.g., BGPsec) are not
incrementally deployable, and existing path authorization protocols are not
compatible with the current Internet routing infrastructure. In this paper, we
propose FC-BGP, the first secure Internet inter-domain routing system that can
simultaneously authenticate BGP announcements and validate data plane
forwarding in an efficient and incrementally-deployable manner. FC-BGP is built
upon a novel primitive, name Forwarding Commitment, to certify an AS's routing
intent on its directly connected hops. We analyze the security benefits of
FC-BGP in the Internet at different deployment rates. Further, we implement a
prototype of FC-BGP and extensively evaluate it over a large-scale overlay
network with 100 virtual machines deployed globally. The results demonstrate
that FC-BGP saves roughly 55% of the overhead required to validate BGP
announcements compared with BGPsec, and meanwhile FC-BGP introduces a small
overhead for building a globally-consistent view on the desirable forwarding
paths.Comment: 16 pages, 17 figure
- …
