Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1592681.1592698acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

Diverter: a new approach to networking within virtualized infrastructures

Published: 21 August 2009 Publication History
  • Get Citation Alerts
  • Abstract

    As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale and complexity introduce new challenges that especially affect the networking layer. Multiple customers' requirements for varying logical network topologies must be simultaneously accommodated on the shared, underlying network fabric in a secure manner.
    Diverter is a new approach to network virtualization that targets these highly flexible, large-scale, multi-tenanted environments and advances the current state-of-the-art by implementing an efficient, fully distributed virtualized routing system that allows end-to-end communication between any endpoint with just a single network "hop". We have implemented a prototype of this solution that, in certain network configurations, achieves a throughput improvement of at least 66 % compared to alternative approaches.

    References

    [1]
    Amazon.com. Amazon.com - Amazon Web Services. http://aws.amazon.com.
    [2]
    D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris. Resilient Overlay Networks. In SOSP, pages 131--145, 2001.
    [3]
    P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauery, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. SOSP 2003, November 2003.
    [4]
    A. C. Bavier, M. Bowman, B. N. Chun, D. E. Culler, S. Karlin, S. Muir, L. L. Peterson, T. Roscoe, T. Spalink, and M. Wawrzoniak. Operating Systems Support for Planetary-Scale Network Services. In NSDI, pages 253--266. USENIX, 2004.
    [5]
    S. Cabuk, C. I. Dalton, A. Edwards, and A. Fischer. A Comparative Study on Secure Network Virtualization. Technical Report HPL-2008-57, HP Labs, 2008.
    [6]
    S. Cabuk, C. I. Dalton, H. V. Ramasamy, and M. Schunter. Towards automated provisioning of secure virtualized networks. ACM CCS, 2007.
    [7]
    H. Eriksson. Mbone: The Multicast Backbone. Communications of the ACM, 37(8):54--60, 1994.
    [8]
    R. Housley and S. Hollenbeck. EtherIP: Tunneling Ethernet Frames in IP Datagrams, September 2002. RFC 3378.
    [9]
    IEEE. Virtual Bridged Local Area Networks. Technical Report ISBN 0-7381-3662-X, IEEE, 2003.
    [10]
    IEEE. Provider bridges, IEEE Standard 802.1ad. IEEE Standards, 2006. http://www.ieee802.org/1/pages/802.1ad.html.
    [11]
    X. Jiang and D. Xu. VIOLIN: Virtual Internetworking on Overlay Infrastructure. In J. Cao, L. T. Yang, M. Guo, and F. C.-M. Lau, editors, ISPA, volume 3358 of Lecture Notes in Computer Science, pages 937--946. Springer, 2004.
    [12]
    M. Kallahalla, M. Uysal, R. Swaminathan, D. E. Lowell, M. Wray, T. Christian, N. Edwards, C. I. Dalton, and F. Gittler. SoftUDC: A Software-Based Data Center for Utility Computing. Computer, 37(11):38--46, 2004.
    [13]
    C. Kim, M. Caesar, and J. Rexford. Floodless in Seattle: a scalable ethernet architecture for large enterprises. In Proceedings of the ACM SIGCOMM 2008, pages 3--14. ACM, 2008.
    [14]
    D. Kuhlmann, R. Landfermann, H. V. Ramasamy, M. Schunter, G. Ramunno, and D. Vernizzi. An Open Trusted Computing Architecture -- Secure Virtual Machines Enabling User-Defined Policy Enforcement. Technical Report RZ 3655 (#99675), IBM Research, 2006.
    [15]
    S. Miura, T. Okamoto, T. Boku, M. Sato, and D. Takahashi. Low-cost high-bandwidth tree network for PC clusters based on tagged-VLAN technology. Parallel Architectures,Algorithms and Networks, 2005. ISPAN 2005. Proceedings. 8th International Symposium on, 7-9 Dec. 2005.
    [16]
    R. Perlman, D. Eastlake 3rd, D. Dutt, S. Gai, and A. Ghanwani. Rbridges: Base Protocol Specification, July 2008. draft-ietf-trill-rbridge-protocol-08.txt.
    [17]
    VMware Inc. VMware Infrastructure 3 architecture. http://www.vmware.com/pdf/vi_architecture_wp.pdf, June 2006.
    [18]
    VMware Inc. VMware Virtual Networking Concepts. http://www.vmware.com/files/pdf/virtual_networking_concepts.pdf, July 2007.
    [19]
    H. Zimmermann. OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection. IEEE Transactions on Communication, 28:425--432, April 1980.

    Cited By

    View all
    • (2023)A Secure Cloud-Based Infrastructure for Virtual Sensors in IoT Environments2023 Sixth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU)10.1109/WiDS-PSU57071.2023.00041(156-161)Online publication date: Mar-2023
    • (2023)A novel frame switching model based on virtual MAC in SDNInternational Journal of Information Security10.1007/s10207-022-00659-722:3(723-736)Online publication date: 8-Mar-2023
    • (2020)Understanding and improving SIGCHI's volunteer experienceInteractions10.1145/341652427:5(80-80)Online publication date: 1-Sep-2020
    • Show More Cited By

    Index Terms

    1. Diverter: a new approach to networking within virtualized infrastructures

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        WREN '09: Proceedings of the 1st ACM workshop on Research on enterprise networking
        August 2009
        124 pages
        ISBN:9781605584430
        DOI:10.1145/1592681
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 21 August 2009

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. distributed overlays
        2. network virtualization
        3. packet filtering
        4. routing

        Qualifiers

        • Research-article

        Conference

        SIGCOMM '09
        Sponsor:
        SIGCOMM '09: ACM SIGCOMM 2009 Conference
        August 21, 2009
        Barcelona, Spain

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)32
        • Downloads (Last 6 weeks)9
        Reflects downloads up to 10 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)A Secure Cloud-Based Infrastructure for Virtual Sensors in IoT Environments2023 Sixth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU)10.1109/WiDS-PSU57071.2023.00041(156-161)Online publication date: Mar-2023
        • (2023)A novel frame switching model based on virtual MAC in SDNInternational Journal of Information Security10.1007/s10207-022-00659-722:3(723-736)Online publication date: 8-Mar-2023
        • (2020)Understanding and improving SIGCHI's volunteer experienceInteractions10.1145/341652427:5(80-80)Online publication date: 1-Sep-2020
        • (2020)Intersections of transformationInteractions10.1145/341446627:5(76-78)Online publication date: 1-Sep-2020
        • (2020)Interpretability as a dynamic of human-AI interactionInteractions10.1145/341128627:5(40-45)Online publication date: 1-Sep-2020
        • (2019)Energy-Aware Virtual Data Center MigrationJournal of Advanced Computational Intelligence and Intelligent Informatics10.20965/jaciii.2019.p020923:2(209-218)Online publication date: 20-Mar-2019
        • (2019)Leveraging Routine Behavior and Contextually-Filtered Features for Depression Detection among College StudentsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33512743:3(1-33)Online publication date: 9-Sep-2019
        • (2019)Mobile Gait Analysis Using Foot-Mounted UWB SensorsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33512313:3(1-22)Online publication date: 9-Sep-2019
        • (2019)To Mask or Not to Mask?Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33512303:3(1-29)Online publication date: 9-Sep-2019
        • (2017)A Load Balancing and Multi-Tenancy Oriented Data Center Virtualization FrameworkIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2017.265763328:8(2131-2144)Online publication date: 1-Aug-2017
        • Show More Cited By

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media