Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Safe compositional specification of networking systems

Published: 01 July 2004 Publication History

Abstract

The <i>science</i> of network service composition has emerged as one of the grand themes of networking research [17] as a direct result of the complexity and sophistication of emerging networked systems and applications. By "service composition" we mean that the performance and correctness properties local to the various constituent components of a service can be readily composed into global (end-to-end) properties without re-analyzing any of the constituent components in isolation, or as part of the whole composite service. The set of laws that govern such composition is what will constitute that new science of composition.
The heterogeneity and open nature of network systems make composition quite challenging, and thus programming network services has been largely inaccessible to the average user. We identify (and outline) a research agenda in which we aim to develop a <i>specification language</i> that is expressive enough to describe different components of a network service, and that will include <i>type hierarchies</i> inspired by type systems in general programming languages that enable the safe composition of software components. We envision this new science of composition to be built upon several theories, possibly including control theory, network calculus, scheduling theory, and game theory. In essence, different theories may provide different <i>languages</i> by which certain properties of system components can be expressed and composed into larger systems. We then seek to lift these lower-level specifications to a higher level by abstracting away details that are irrelevant for safe composition at the higher level, thus making theories scalable and useful to the average user. In this paper we focus on services built upon an overlay traffic management architecture, and we use control theory and QoS theory as example theories from which we lift up compositional specifications.

References

[1]
CS Department Boston University. The Internet Traffic Managers Project. http://www.cs.bu.edu/groups/itm/.]]
[2]
Jean-Yves Le Boudec and Patrick Thiran. Network Calculus: A Theory of Deterministic Queuing Systems for the Internet. Springer-Verlag Lecture Notes on Computer Science 2050.]]
[3]
Adam Bradley, Azer Bestavros, and Assaf Kfoury. Safe Composition of Web Communication Protocols for Extensible Edge Services. In Proceedings of the 7th International Web Caching and Content Delivery Workshop, Boulder, CO, August 2002.]]
[4]
Adam D. Bradley, Azer Bestavros, and Assaf J. Kfoury. Systematic Verification of Safety Properties of Arbitrary Network Protocol Compositions Using CHAIN. In IEEE Conference on Network Protocols (ICNP), Atlanta, GA, November 2003.]]
[5]
Gali Diamant, Leonid Veytser, Ibrahim Matta, Azer Bestavros, Mina Guirguis, Liang Guo, Yuting Zhang, and Sean Chen. itmBench: Generalized API for Internet Traffic Managers. Technical Report BU-CS-2003-032, Boston University, Computer Science Department, Boston, MA 02215, December 2003.]]
[6]
Timothy G. Griffin, F. Bruce Shepherd, and Gordon Wilfong. he Stable Paths Problem and Interdomain Routing. In IEEE/ACM Transactions on Networking, volume 10, April 2002.]]
[7]
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Niky Riga, Gali Diamant, and Yuting Zhang. Providing Soft Bandwidth Guarantees Using Elastic TCP-based Tunnels. In Proceedings of ISCC '2004: The Ninth IEEE Symposium on Computers and Communications, Alexandria, Egypt, June 2004. (Extended version available as Boston University, CS Dept Technical Report BUCS-TR-2003-028).]]
[8]
Liang Guo and Ibrahim Matta. Scheduling Flows with Unknown Sizes: An Approximate Analysis. In Proceedings of ACM SIGMETRICS '2002, Marina Del Rey, CA, June 2002. Poster.]]
[9]
Shudong Jin, Liang Guo, Ibrahim Matta, and Azer Bestavros. A Spectrum of TCP-friendly Window-based Congestion Control Algorithms. IEEE/ACM Transactions on Networking, 11(3), 2003.]]
[10]
Jim Kurose. Open Issues and Challenges in Providing Quality of Service Guarantees in High-Speed Networks. Computer Communication Review, 23(1):6--15, January 1993.]]
[11]
Jorg Liebeherr, Stephen Patek, and Almut Burchard. A Calculus for End-to-end Statistical Service Guarantees. Technical report, University of Virginia, 2001.]]
[12]
Nancy Lynch and Frits Vaandrager. Forward and backward simulations -- part II: Untimed systems. Information and Computation, 121(2):214--233, September 1995.]]
[13]
Nancy Lynch and Frits Vaandrager. Forward and backward simulations - part II: Timing-based systems. Information and Computation, 128(1):1--25, July 1996.]]
[14]
Ibrahim Matta and Azer Bestavros. A Load Profiling Approach to Routing Guaranteed Bandwidth Flows. In Proceedings of Infocom '98: The IEEE International Conference on Computer Communication, San Fransisco, CA, April 1998.]]
[15]
K. Ogata. Modern Control Engineering, 4th Ed. Prentice Hall, 2002.]]
[16]
Insik Shin and Insup Lee. Periodic Resource Model for Compositional Real-Time Guarantees. In 24th IEEE International Real-Time Systems Symposium (RTSS'03), 2003.]]
[17]
Ioannis Stavrakakis, Ibrahim Matta, and Michael Smirnov (organizers). COST-IST (EU)---NSF-ANIR (USA) NeXtworking workshop 2003. Crete, Greece, June 23--25, 2003.]]
[18]
Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, and Sonesh Surana. Internet Indirection Infrastructure. In Proceedings of ACM SIGCOMM, Pittsburgh, PA, August 2002. ACM.]]
[19]
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proceedings of ACM SIGCOMM 2001, San Diego, CA, 2001. ACM.]]

Cited By

View all
  • (2011)A Dynamic Recursive Unified Internet Design (DRUID)Computer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2010.12.01655:4(919-935)Online publication date: 1-Mar-2011
  • (2010)Dynamic cross domain information sharingProceedings of the 3rd ACM workshop on Assurable and usable security configuration10.1145/1866898.1866913(83-88)Online publication date: 4-Oct-2010
  • (2007)CyNCProceedings of the 2nd international conference on Performance evaluation methodologies and tools10.5555/1345263.1345340(1-10)Online publication date: 22-Oct-2007
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 34, Issue 3
July 2004
98 pages
ISSN:0146-4833
DOI:10.1145/1031134
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2004
Published in SIGCOMM-CCR Volume 34, Issue 3

Check for updates

Author Tags

  1. QoS theory
  2. control theory
  3. service composition
  4. type systems

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2011)A Dynamic Recursive Unified Internet Design (DRUID)Computer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2010.12.01655:4(919-935)Online publication date: 1-Mar-2011
  • (2010)Dynamic cross domain information sharingProceedings of the 3rd ACM workshop on Assurable and usable security configuration10.1145/1866898.1866913(83-88)Online publication date: 4-Oct-2010
  • (2007)CyNCProceedings of the 2nd international conference on Performance evaluation methodologies and tools10.5555/1345263.1345340(1-10)Online publication date: 22-Oct-2007
  • (2005)Typed Abstraction of Complex Network CompositionsProceedings of the 13TH IEEE International Conference on Network Protocols10.1109/ICNP.2005.44(289-300)Online publication date: 6-Nov-2005

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media