Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

XIA: architecting a more trustworthy and evolvable internet

Published: 28 July 2014 Publication History

Abstract

Motivated by limitations in today's host-centric IP network, recent studies have proposed clean-slate network architectures centered around alternate first-class principals, such as content, services, or users. However, muchlike the host-centric IP design, elevating one principal type above others hinders communication between other principals and inhibits the network's capability to evolve. This paper presents the eXpressive Internet Architecture (XIA), an architecture with native support for multiple principals and the ability to evolve its functionality to accommodate new, as yet unforeseen, principals over time. We present the results of our ongoing research motivated by and building on the XIA architecture, ranging from topics at the physical level (``how fast can XIA go'') up through to the user level.

References

[1]
P. Agyapong. Economic Incentives in Content-Centric Networking: Implications for Protocol Design and Public Policy. PhD thesis, Carnegie Mellon University, Pittsburgh, Pennsylvania, May 2013.
[2]
P. Agyapong and M. Sirbu. Economic Incentives in Content-Centric Networking: Implications for Protocol Design and Public Policy. IEEE Communications Magazine, Special Issue on CCNs, December 2012.
[3]
A. Anand, F. Dogar, D. Han, B. Li, H. Lim, M. Machado, W. Wu, A. Akella, D. Andersen, J. Byers, S. Seshan, and P. Steenkiste. XIA: An Architecture for an Evolvable and Trustworthy Internet. In The Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MA, November 2011. ACM.
[4]
D. G. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker. Accountable Internet Protocol (AIP). In Proc. ACM SIGCOMM, Seattle, WA, Aug. 2008.
[5]
K. Argyraki and D. R. Cheriton. Network capabilities: The good, the bad and the ugly. In Proceedings of ACM HotNets, 2005.
[6]
B. Briscoe. Flow rate fairness: dismantling a religion. ACM SIGCOMM CCR, 37(2), March 2007.
[7]
D. D. Clark, J. Wroclawski, K. R. Sollins, and R. Braden. Tussle in cyberspace: defining tomorrow's internet. In Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '02, pages 347--356, New York, NY, USA, 2002. ACM.
[8]
R. Dingledine, N. Mathewson, and P. Syverson. Tor: the second-generation onion router. In Proceedings of conference on USENIX Security Symposium, 2004.
[9]
F. Dogar and P. Steenkiste. Architecting for Edge Diversity: Supporting Rich Services over an Unbundled Transport. In 8th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2012). ACM, December 2012.
[10]
N. Dukkipati. Rate Control Protocol (RCP): Congestion control to make ows complete quickly. In Ph.D. Thesis, Department of Electrical Engineering, Stanford University, October 2007.
[11]
S. Floyd, M. Handley, J. Padhye, and J. Widmer. Equation-based congestion control for unicast applications. In SIGCOMM 2000, August 2000.
[12]
A. Gladisch, R. Daher, and D. Tavangarian. Survey on Mobility and Multihoming in the Future Internet. Wireless Personal Communication, October 2012.
[13]
D. Han, A. Anand, F. Dogar, B. Li, H. Lim, M. Machado, A. Mukundan, W. Wu, A. Akella, D. G. Andersen, J. W. Byers, S. Seshan, and P. Steenkiste. XIA: Efficient Support for Evolvable Internetworking. In Proceedings of the 9th Usenix Symposium on Networked Systems Design and Implementation, NSDI 2012, 2012.
[14]
D. Han, R. Grandl, A. Akella, and S. Seshan. FCP: A Flexible Transport Framework for Accommodating Diversity. In Proceedings of Sigcomm 2013, New York, NY, USA, 2013. ACM.
[15]
H.-C. Hsiao, T. H.-J. Kim, A. Perrig, A. Yamada, S. C. Nelson, M. Gruteser, and W. Meng. LAP: Lightweight anonymity and privacy. In Proceedings of IEEE Symposium on Security and Privacy, May 2012.
[16]
H.-C. Hsiao, T. H.-J. Kim, S. Yoo, X. Zhang, S. B. Lee, V. Gligor, and A. Perrig. STRIDE : Sanctuary Trail--Refuge from Internet DDoS Entrapment. In Proceedings of ACM ASIACCS, 2013.
[17]
C. Huitema. Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs). RFC 4380 (Proposed Standard), February 2006. Updated by RFCs 5991, 6081.
[18]
R. Kang, S. Brown, and S. Kiesler. Users' Perception about Internet Anonymity. In ACM Conference on Human Factors in Computing Systems (CHI13), April 2013.
[19]
D. Katabi, M. Handley, and C. Rohrs. Congestion control for high bandwidth-delay product networks. In SIGCOMM '02, August 2002.
[20]
F. Kelly and G. Raina. Explicit congestion control: charging, fairness and admission management. In B. Ramamurthy, G. N. Rouskas, and K. M. Sivalingam, editors, Next-Generation Internet Architectures and Protocols, pages 257--274. Cambridge University Press, 2010.
[21]
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click modular router. ACM Transactions on Computer Systems, 18(3):263--297, August 2000.
[22]
M. Mukerjee, D. Han, S. Seshan, and P. Steenkiste. Understanding tradeoffs in incremental deployment of new network architectures. In Proceedings of the 9th international conference on Emerging networking experiments and technologies, CoNEXT '13, New York, NY, USA, December 2013. ACM.
[23]
E. Nordmark and R. Gilligan. Basic Transition Mechanisms for IPv6 Hosts and Routers. RFC 4213 (Proposed Standard), October 2005.
[24]
E. Nordstrom, D. Shue, P. Gopalan, R. Kiefer, M. Arye, S. Ko, J. Rexford, and M. J. Freedman. Serval: An end-host stack for service-centric networking. In Proc. 9th Symposium on Networked Systems Design and Implementation, NSDI '12, 2012.
[25]
L. Rainie, S. Kiesler, R. Kang, and M. Madden. Anonymity, Privacy, and Security Online, September 2013. Pew Research Internet Project, http://pewinternet.org/Reports/2013/Anonymity-online.aspx.
[26]
A. Studer and A. Perrig. The Coremelt Attack. In Proceedings of ESORICS, 2009.
[27]
D. Trossen, M. Sarela, and K. Sollins. Arguments for an information-centric internetworking architecture. ACM Computer Communication Review, 40:26--33, April 2010.
[28]
V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs, and R. Braynard. Networking Named Content. In Proc. CoNEXT, 2009.
[29]
Z. Zhu and R. Wakikawa and L. Zhang. A Survey of Mobility Support in the Internet, July 2011. IETF RFC 6301.
[30]
X. Zhang, H.-C. Hsiao, G. Hasker, H. Chan, A. Perrig, and D. G. Andersen. Scion: Scalability, control, and isolation on next-generation networks. In IEEE Symposium on Security and Privacy (Oakland), Oakland, CA, May 2011.
[31]
D. Zhou, B. Fan, H. Lim, M. Kaminsky, and D. G. Andersen. Scalable, High Performance Ethernet Forwarding with CuckooSwitch. In Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT '13, pages 97--108. ACM, 2013.

Cited By

View all
  • (2024)Effective DDoS Mitigation via ML-Driven In-Network Traffic ShapingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.334918021:4(4271-4289)Online publication date: 1-Jul-2024
  • (2024)DDoS family: A novel perspective for massive types of DDoS attacksComputers & Security10.1016/j.cose.2023.103663138(103663)Online publication date: Mar-2024
  • (2024)Multi-modal Enabled 5G Special Scenario CoverageSignal and Information Processing, Networking and Computers10.1007/978-981-97-2124-5_55(457-464)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. XIA: architecting a more trustworthy and evolvable internet

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 44, Issue 3
    July 2014
    127 pages
    ISSN:0146-4833
    DOI:10.1145/2656877
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 July 2014
    Published in SIGCOMM-CCR Volume 44, Issue 3

    Check for updates

    Author Tags

    1. internet architecture
    2. network addressing

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)19
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 21 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Effective DDoS Mitigation via ML-Driven In-Network Traffic ShapingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.334918021:4(4271-4289)Online publication date: 1-Jul-2024
    • (2024)DDoS family: A novel perspective for massive types of DDoS attacksComputers & Security10.1016/j.cose.2023.103663138(103663)Online publication date: Mar-2024
    • (2024)Multi-modal Enabled 5G Special Scenario CoverageSignal and Information Processing, Networking and Computers10.1007/978-981-97-2124-5_55(457-464)Online publication date: 11-May-2024
    • (2023)A novel smart multilevel security approach for secure data outsourcing in crisisPeerJ Computer Science10.7717/peerj-cs.13679(e1367)Online publication date: 12-May-2023
    • (2023)Method and system for general packet network addressing routing and identifier evolutionSCIENTIA SINICA Informationis10.1360/SSI-2022-026153:8(1629)Online publication date: 14-Aug-2023
    • (2022)DIPProceedings of the 21st ACM Workshop on Hot Topics in Networks10.1145/3563766.3564092(60-67)Online publication date: 14-Nov-2022
    • (2021)Adapting Named Data Networking (NDN) for Better Consumer Mobility Support in LEO Satellite NetworksProceedings of the 24th International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems10.1145/3479239.3485699(207-216)Online publication date: 22-Nov-2021
    • (2021)The Preliminary Conception of Access Protection for Distributed Generation Based on the Internet Communication Technology2021 International Conference on Power System Technology (POWERCON)10.1109/POWERCON53785.2021.9697887(1853-1858)Online publication date: 8-Dec-2021
    • (2020)Managing the Evolution to Future Internet Architectures and Seamless Interoperation2020 29th International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN49398.2020.9209599(1-11)Online publication date: Aug-2020
    • (2019)Enabling a permanent revolution in internet architectureProceedings of the ACM Special Interest Group on Data Communication10.1145/3341302.3342075(1-14)Online publication date: 19-Aug-2019
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media