Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1402958.1402973acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

Network exception handlers: host-network control in enterprise networks

Published: 17 August 2008 Publication History
  • Get Citation Alerts
  • Abstract

    Enterprise network architecture and management have followed the Internet's design principles despite different requirements and characteristics: enterprise hosts are administered by a single authority, which intrinsically assigns different values to traffic from different business applications.
    We advocate a new approach where hosts are no longer relegated to the network's periphery, but actively participate in network-related decisions. To enable host participation, network information, such as dynamic network topology and per-link characteristics and costs, is exposed to the hosts, and network administrators specify conditions on the propagated network information that trigger actions to be performed while a condition holds. The combination of a condition and its actions embodies the concept of the network exception handler, defined analogous to a program exception handler. Conceptually, network exception handlers execute on hosts with actions parameterized by network and host state.
    Network exception handlers allow hosts to participate in network management, traffic engineering and other operational decisions by explicitly controlling host traffic under predefined conditions. This flexibility improves overall performance by allowing efficient use of network resources. We outline several sample network exception handlers, present an architecture to support them, and evaluate them using data collected from our own enterprise network.

    References

    [1]
    T. Anderson, A. Collins, A. Krishnamurthy, and J. Zahorjan. PCP: Efficient Endpoint Congestion Control. In Proc. ACM/USENIX NSDI 2006, pages 197--210, San Jose, CA, May 2006.
    [2]
    H. Ballani and P. Francis. CONMan: A Step Towards Network Manageability. In Proc. ACM SIGCOMM, pages 205--216, New York, NY, 2007.
    [3]
    S. M. Bellovin. Distributed firewalls. ;login:, pages 37--39, Nov. 1999.
    [4]
    L. Breslau, E. W. Knightly, S. Shenker, I. Stoica, and H. Zhang. Endpoint Admission Control: Architectural Issues and Performance. In Proc. ACM SIGCOMM 2000, pages 57--69, New York, NY, 2000.
    [5]
    R. Callon. Use of OSI IS-IS for routing in TCP/IP and dual environments. RFC 1195, IETF, Dec. 1990.
    [6]
    M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker. Ethane: Taking Control of the Enterprise. In Proc. ACM SIGCOMM, pages 1--12, New York, NY, 2007.
    [7]
    Y. Chen, D. Bindel, H. Song, and R. H. Katz. An Algebraic Approach to Practical and Scalable Overlay Network Monitoring. In Proc. ACM SIGCOMM 2004, pages 55--66, New York, NY, 2004.
    [8]
    E. Cooke, R. Mortier, A. Donnelly, P. Barham, and R. Isaacs. Reclaiming Network-wide Visibility Using Ubiquitous End System Monitors. In Proc. USENIX 2006 Annual Technical Conference, June 2006.
    [9]
    S. Hanks, T. Li, D. Farinacci, and P. Traina. Generic Routing Encapsulation (GRE). RFC 1701, IETF, Oct. 1994.
    [10]
    L. Huang, M. Garofalakis, J. Hellerstein, A. Joseph, and N. Taft. Toward Sophisticated Detection with Distributed Triggers. In MineNet'06, pages 311--316, New York, NY, 2006.
    [11]
    A. Jain, J. M. Hellerstein, S. Ratnasamy, and D. Wetherall. A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers. In Proc. HotNets-III, San Diego, CA, November 2004.
    [12]
    A. W. Moore and K. Papagiannaki. Toward the Accurate Identification of Network Applications. In Sixth Passive and Active Measurement Workshop (PAM), Boston, MA, 2005.
    [13]
    J. Moy. OSPF Version 2. RFC 2328, IETF, Apr. 1998.
    [14]
    D. Oran. OSI IS-IS Intra-domain Routing Protocol. RFC 1142, IETF, Feb. 1990.
    [15]
    K. Ramakrishnan, S. Floyd, and D. Black. The Addition of Explicit Congestion Notification (ECN) to IP. RFC 3168, IETF, Sept. 2001.
    [16]
    J. Rexford, A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, G. Xie, J. Zhan, and H. Zhang. Network-wide Decision Making: Toward a Wafer-thin Control Plane. In Proc. HotNets-III, San Diego, CA, Nov. 2004.
    [17]
    E. Rosen and Y. Rekhter. BGP/MPLS IP Virtual Private Networks (VPNs). RFC 4364, IETF, Feb. 2006.
    [18]
    A. Shaikh and A. Greenberg. OSPF Monitoring: Architecture, Design and Deployment Experience. In Proc. ACM/USENIX NSDI 2004, pages 57--70, San Francisco, CA, Mar. 2004.
    [19]
    A. Snoeren and B. Raghavan. Decoupling Policy from Mechanism in Internet Routing. In Proc. HotNets-II, pages 81--86, Cambridge, MA, Nov. 2003.
    [20]
    H. Yan, D. A. Maltz, T. E. Ng, H. Gogineni, H. Zhang, and Z. Cai. Tesseract: A 4D Network Control Plane. In Proc. ACM/USENIX NSDI 2007, pages 369--382, Cambridge, MA, May 2007.
    [21]
    Y. Zhao, Y. Chen, and D. Bindel. Towards Unbiased End-to-End Network Diagnosis. In Proc. ACM SIGCOMM, pages 219--230, New York, NY, 2006

    Cited By

    View all
    • (2023)Extreme Bandits Using Robust StatisticsIEEE Transactions on Information Theory10.1109/TIT.2022.320993169:3(1761-1776)Online publication date: Mar-2023
    • (2019)Composing SDN Controller Enhancements with MozartProceedings of the ACM Symposium on Cloud Computing10.1145/3357223.3362712(351-363)Online publication date: 20-Nov-2019
    • (2019)Introducing SmartNICs in Server-Based Data Plane Processing: The DDoS Mitigation Use CaseIEEE Access10.1109/ACCESS.2019.29334917(107161-107170)Online publication date: 2019
    • Show More Cited By

    Index Terms

    1. Network exception handlers: host-network control in enterprise networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 conference on Data communication
      August 2008
      452 pages
      ISBN:9781605581750
      DOI:10.1145/1402958
      • cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 38, Issue 4
        October 2008
        436 pages
        ISSN:0146-4833
        DOI:10.1145/1402946
        Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 August 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. enterprise networks
      2. management
      3. network exception handlers

      Qualifiers

      • Research-article

      Conference

      SIGCOMM '08
      Sponsor:
      SIGCOMM '08: ACM SIGCOMM 2008 Conference
      August 17 - 22, 2008
      WA, Seattle, USA

      Acceptance Rates

      Overall Acceptance Rate 554 of 3,547 submissions, 16%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)30
      • Downloads (Last 6 weeks)7

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Extreme Bandits Using Robust StatisticsIEEE Transactions on Information Theory10.1109/TIT.2022.320993169:3(1761-1776)Online publication date: Mar-2023
      • (2019)Composing SDN Controller Enhancements with MozartProceedings of the ACM Symposium on Cloud Computing10.1145/3357223.3362712(351-363)Online publication date: 20-Nov-2019
      • (2019)Introducing SmartNICs in Server-Based Data Plane Processing: The DDoS Mitigation Use CaseIEEE Access10.1109/ACCESS.2019.29334917(107161-107170)Online publication date: 2019
      • (2018)Understanding PCIe performance for end host networkingProceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication10.1145/3230543.3230560(327-341)Online publication date: 7-Aug-2018
      • (2018)EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN.2018.00048(386-397)Online publication date: Jun-2018
      • (2017)A Call To Arms for Tackling the Unexpected Implications of SDN Controller EnhancementsProceedings of the First Asia-Pacific Workshop on Networking10.1145/3106989.3107006(15-21)Online publication date: 3-Aug-2017
      • (2015)Taming uncertainty in distributed systems with help from the networkProceedings of the Tenth European Conference on Computer Systems10.1145/2741948.2741976(1-16)Online publication date: 17-Apr-2015
      • (2015)HONEJournal of Network and Systems Management10.1007/s10922-014-9321-923:2(374-399)Online publication date: 1-Apr-2015
      • (2012)Control and understanding: Owning your home network2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)10.1109/COMSNETS.2012.6151322(1-10)Online publication date: Jan-2012
      • (2012)Collaborative Algorithm with a Green TouchMobile and Ubiquitous Systems: Computing, Networking, and Services10.1007/978-3-642-29154-8_5(51-62)Online publication date: 2012
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media