Abstract
Today's Internet Service Providers (ISPs) serve two roles: managing their network infrastructure and providing (arguably limited) services to end users. We argue that coupling these roles impedes the deployment of new protocols and architectures, and that the future Internet should support two separate entities: infrastructure providers (who manage the physical infrastructure) and service providers (who deploy network protocols and offer end-to-end services). We present a high-level design for Cabo, an architecture that enables this separation; we also describe challenges associated with realizing this architecture.
- T. Anderson, L. Peterson, S. Shenker, and J. Turner. Overcoming the Internet impasse through virtualization. IEEE Computer, 38(4):34--41, Apr. 2005. Google ScholarDigital Library
- A. Bavier, M. Bowman, D. Culler, B. Chun, S. Karlin, S. Muir, L. Peterson, T. Roscoe, T. Spalink, and M. Wawrzoniak. Operating System Support for Planetary-Scale Network Services. In Proc. Networked Systems Design and Implementation, Mar. 2004. Google ScholarDigital Library
- A. Bavier, N. Feamster, M. Huang, L. Peterson, and J. Rexford. In VINI Veritas: Realistic and controlled network experimentation. In Proc. ACM SIGCOMM, Sept. 2006. Google ScholarDigital Library
- FON: WiFi everywhere! http://en.fon.com/, 2006.Google Scholar
- Private communication with Avi Freedman, Oct. 2006.Google Scholar
- GENI: Global Environment for Network Innovations. http://www.geni.net/.Google Scholar
- E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click modular router. ACM Transactions on Computer Systems, 18(3):263--297, Aug. 2000. Google ScholarDigital Library
- K. Lakshminarayanan, I. Stoica, and S. Shenker. Routing as a Service. Technical Report UCB-CS-04-1327, UC Berkeley, 2004.Google Scholar
- D. McPherson et al. Core Network Design and Vendor Prophecies. In NANOG 25, June 2003.Google Scholar
- E. Rosen and Y. Rekhter. BGP/MPLS VPNs. Internet Engineering Task Force, Mar. 1999. RFC 2547. Google ScholarDigital Library
- S. Staniford, V. Paxson, and N. Weaver. How to 0wn the Internet in your spare time. In Proc. 11th USENIX Security Symposium, Aug. 2002. Google ScholarDigital Library
- D. L. Tennenhouse and D. J. Wetherall. Towards an active network architecture. ACM Computer Communications Review, Apr. 1996. Google ScholarDigital Library
- J. Turner. A proposed architecture for the GENI backbone platform. In Proc. Architectures for Networking and Communications Systems, Dec. 2006. Google ScholarDigital Library
- J. van der Merwe, S. Rooney, I. Leslie, and S. Crosby. The Tempest -A Practical Framework for Network Programmability. IEEE Network, 12(3):20--28, May 1998. Google ScholarDigital Library
Index Terms
- How to lease the internet in your spare time
Recommendations
Revocation Statuses on the Internet
Passive and Active MeasurementAbstractThe modern Internet is highly dependent on the trust communicated via X.509 certificates. However, in some cases certificates become untrusted and it is necessary to revoke them. In practice, the problem of secure certificate revocation has not ...
Finding the PKI needles in the Internet haystack
The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)Public key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a Public Key Infrastructure (PKI). PKIs have become a central asset for many ...
Profiles and protocols for the Internet Public-Key Infrastructure
FTDCS '97: Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computing SystemsThe purpose of the paper is to discuss the ongoing standardization activities within the Internet community with respect to public key infrastructures based on the X.509 authentication framework. In particular, this paper describes the status of the ...
Comments