skip to main content
research-article

Architecting for innovation

Published: 05 July 2011 Publication History

Abstract

We argue that the biggest problem with the current Internet architecture is not a particular functional deficiency, but its inability to accommodate innovation. To address this problem we propose a minimal architectural "framework" in which comprehensive architectures can reside. The proposed Framework for Internet Innovation (FII) --- which is derived from the simple observation that network interfaces should be extensible and abstract --- allows for a diversity of architectures to coexist, communicate, and evolve. We demonstrate FII's ability to accommodate diversity and evolution with a detailed examination of how information flows through the architecture and with a skeleton implementation of the relevant interfaces.

References

[1]
Google protocol buffers. http://code.google.com/p/protobuf/.
[2]
W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley. The design and implementation of an intentional naming system. In Proc. SOSP, 1999.
[3]
M. Afanasyev, T. Kohno, J. Ma, N. Murphy, S. Savage, A. C. Snoeren, and G. M. Voelker. Privacy-preserving network forensics. Communications of the ACM, June 2011.
[4]
D. G. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker. Accountable Internet Protocol (AIP). In Proc. SIGCOMM, 2008.
[5]
D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris. Resilient overlay networks. In Proc. SOSP, 2001.
[6]
D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. N. Rao. Improving web availability for clients with MONET. In Proc. NSDI, 2005.
[7]
H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. Walfish. A layered naming architecture for the Internet. In Proc. SIGCOMM, 2004.
[8]
H. Balakrishnan, S. Shenker, and M. Walfish. Semantic-free referencing in linked distributed systems. In Proc. IPTPS, 2003.
[9]
M. Balazinska, H. Balakrishnan, and D. R. Karger. INS/Twine: A scalable peer-to-peer architecture for intentional resource discovery. In Proc. Pervasive, 2002.
[10]
S. M. Bellovin, D. D. Clark, A. Perrig, and D. Song (Eds). Report of NSF workshop on a clean-slate design for the next-generation secure internet. GENI Design Document 05-05, 2005.
[11]
A. Bender, N. Spring, D. Levin, and B. Bhattacharjee. Accountability as a service. In Proc. SRUTI, 2007.
[12]
J. Black and P. Rogaway. A block-cipher mode of operation for parallelizable message authentication. In Proc. EUROCRYPT, 2002.
[13]
M. S. Blumenthal and D. D. Clark. Rethinking the Design of the Internet: The End-to-End Arguments vs. the Brave New World. Transactions on Internet Technology, 2001.
[14]
D. Clark. The Design Philosophy of the DARPA Internet Protocols. In Proc. SIGCOMM, 1998.
[15]
D. Clark. Toward the design of a Future Internet. Manuscript, October 2009.
[16]
D. D. Clark, J. Wroclawski, K. R. Sollins, and R. Braden. Tussle in cyberspace: Defining tomorrow's Internet. IEEE/ACM Transactions on Networking, June 2005.
[17]
J. Crowcroft, S. Hand, R. Mortier, T. Roscoe, and A. Warfield. Plutarch: An Argument for Network Pluralism. In Proc. SIGCOMM FDNA, 2003.
[18]
M. Dobrescu, N. Egi, K. Argyraki, B.-G. Chun, K. Fall, G. Iannaccone, A. Knies, M. Manesh, and S. Ratnasamy. RouteBricks: Exploiting Parallelism to Scale Software Routers. In Proc. SOSP, 2009.
[19]
B. Ford and J. Iyengar. Efficient Cross-Layer Negotiation. In Proc. HotNets, 2009.
[20]
M. J. Freedman, M. Arye, P. Gopalan, S. Y. Ko, E. Nordstrom, J. Rexford, and D. Shue. Service-centric networking with SCAFFOLD. Technical Report TR-885--10, Princeton Computer Science Department, September 2010.
[21]
P. B. Godfrey, I. Ganichev, S. Shenker, and I. Stoica. Pathlet Routing. In Proc. SIGCOMM, 2009.
[22]
P. B. Godfrey, S. Shenker, and I. Stoica. Pathlet Routing. In Proc. HotNets, 2008.
[23]
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard. Networking Named Content. In Proc. CoNEXT, 2009.
[24]
T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica. A Data-Oriented (and Beyond) Network Architecture. In Proc. SIGCOMM, 2007.
[25]
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication. RFC 2104, IETF, February 1997.
[26]
M. Liskov, R. L. Rivest, and D. Wagner. Tweakable block ciphers. In Proc. CRYPTO, 2002.
[27]
X. Liu, X. Yang, and Y. Lu. To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets. In Proc. SIGCOMM, 2008.
[28]
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y. Hu. Portcullis: Protecting connection setup from denial-of-capability attacks. In Proc. SIGCOMM, 2007.
[29]
R. Pike, D. Presotto, S. Dorward, B. Flandrena, K. Thompson, H. Trickey, and P. Winterbottom. Plan 9 from bell labs. Computing systems, 8(3):221--254, 1995.
[30]
L. Popa, I. Stoica, and S. Ratnasamy. Rule-based forwarding (RBF): Improving the
[31]
S. Ratnasamy, A. Ermolinskiy, and S. Shenker. Revisiting IP multicast. In Proc. SIGCOMM, 2006.
[32]
S. Ratnasamy, S. Shenker, and S. McCanne. Towards an evolvable internet architecture. In Proc. SIGCOMM, 2005.
[33]
J. Rexford and C. Dovrolis. Future internet architecture: clean-slate versus evolutionary research. Communications of the ACM, September 2010.
[34]
J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end Arguments in System Design. ACM Transactions on Computer Systems, 2(4):277--288, 1984.
[35]
A. Seehra, J. Naous, M. Walfish, D. Mazieres, A. Nicolosi, and S. Shenker. A Policy Framework for the Future Internet. In Proc. HotNets, 2009.
[36]
M. Shaw. Leveraging Good Intentions to Reduce Unwanted Network Traffic. In Proc. SRUTI, 2006.
[37]
J. Su, J. Scott, P. Hui, E. Upton, M. H. Lim, C. Diot, J. Crowcroft, A. Goel, and E. de Lara. Haggle: Clean-slate Networking for Mobile Devices. Technical Report UCAM-CL-TR-680, University of Cambridge, Computer Laboratory, January 2007.
[38]
L. Subramanian, I. Stoica, H. Balakrishnan, and R. H. Katz. OverQoS: An overlay based architecture for enhancing Internet QoS. In Proc. NSDI, 2004.
[39]
V. Valancius, N. Feamster, R. Johari, and V. V. Vazirani. MINT: A Market for INternet Transit. In Proc. CoNEXT, 2008.
[40]
M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. In Proc. NSDI, 2004.
[41]
D. Wendlandt, I. Avramopoulos, D. Andersen, and J. Rexford. Don't Secure Routing Protocols, Secure Data Delivery. In Proc. HotNets, 2006.
[42]
J. Wroclawski. The metanet: White paper. In Workshop on Research Directions for the Next Generation Internet, May 1997.
[43]
A. Yaar, A. Perrig, and D. Song. SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks. In Proc. of IEEE Symposium on Security and Privacy, 2004.
[44]
X. Yang, D. Wetherall, and T. Anderson. A DoS-Limiting Network Architecture. In Proc. SIGCOMM, 2005.

Cited By

View all

Index Terms

  1. Architecting for innovation

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 41, Issue 3
    July 2011
    44 pages
    ISSN:0146-4833
    DOI:10.1145/2002250
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 July 2011
    Published in SIGCOMM-CCR Volume 41, Issue 3

    Check for updates

    Author Tags

    1. diversity
    2. evolution
    3. innovation
    4. internet architecture

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)28
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 13 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media