Abstract
It is accepted wisdom that the current Internet architecture conflates network locations and host identities, but there is no agreement on how a future architecture should distinguish the two. One could sidestep this quandary by routing directly on host identities themselves, and eliminating the need for network-layer protocols to include any mention of network location. The key to achieving this is the ability to route on flat labels. In this paper we take an initial stab at this challenge, proposing and analyzing our ROFL routing algorithm. While its scaling and efficiency properties are far from ideal, our results suggest that the idea of routing on flat labels cannot be immediately dismissed.
- I. Abraham, A. Badola, D. Bickson, D. Malkhi, S. Maloo, S. Ron, "Practical locality-awareness for large scale information sharing," IPTPS, February 2005.]] Google ScholarDigital Library
- T. Anderson, T. Roscoe, D. Wetherall, "Preventing Internet denial-of-service with capabilities," SIGCOMM Comput.Commun. Rev., 34(1):39--44, 2004.]] Google ScholarDigital Library
- H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, M. Walfish, "A layered naming architecture for the Internet," ACM SIGCOMM, August 2004.]] Google ScholarDigital Library
- H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker, "'Off by Default!," HotNets, 2005.]]Google Scholar
- H. Ballani, P. Francis. "Towards a Global IP Anycast Service," ACM SIGCOMM, Aug 2005]] Google ScholarDigital Library
- B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422--426, July 1970.]] Google ScholarDigital Library
- M. Caesar, M. Castro, E. Nightingale, G. O'Shea, A. Rowstron, "Virtual ring routing: network routing inspired by DHTs," ACM SIGCOMM, September 2006.]] Google ScholarDigital Library
- M. Castro, P. Drushel, A. Ganesh, A. Rowstron, and D. Wallach, "Secure routing for structured peer-to-peer overlay networks" OSDI, December 2002.]] Google ScholarDigital Library
- M. Castro, P. Druschel, Y. Charlie Hu, A. Rowstron, "Exploiting network proximity in peer-to-peer overlay networks," Microsoft Research technical report MSR-TR-2002-82, 2002.]]Google Scholar
- D. Cheriton, M. Gritter, "TRIAD: a scalable deployable NAT-based Internet architecture," Technical report, January 2000.]]Google Scholar
- D. Clark, R. Braden, A. Falk, V. Pingali, "FARA: reorganizing the addressing architecture," SIGCOMM FDNA Workshop, August 2003.]] Google ScholarDigital Library
- S. Deering, D. Cheriton. "Multicast Routing in Datagram Internetworks and Extended LANs," ACM TOCS, 1990.]] Google ScholarDigital Library
- J. Douceur, "The Sybil Attack" IPTPS, March 2002.]] Google ScholarDigital Library
- A. Feldmann, O. Maennel, Z. Mao, A. Berger, B. Maggs, "Locating Internet routing instabilities," ACM SIGCOMM, August 2004.]] Google ScholarDigital Library
- B. Ford, "Unmanaged internet protocol: taming the edge network management crisis," HotNets, Cambridge, MA, Nov. 2003.]]Google Scholar
- P. Francis, R. Gummadi, "IPNL: a NAT-extended Internet architecture," ACM SIGCOMM, August 2002.]] Google ScholarDigital Library
- P. Ganesan, K. Gummadi, H. Garcia-Molina, "Canon in G major: designing DHTs with hierarchical structure," ICDCS, March 2004.]] Google ScholarDigital Library
- M. Gritter and D. Cheriton, "An Architecture for Content Routing Support in the Internet," In the USENIX Symposium on Internet Technologies and Systems, March 2001.]] Google ScholarDigital Library
- M. Handley and A. Greenhalgh, "Steps towards a DoS-resistant internet architecture," FDNA, 2004.]] Google ScholarDigital Library
- J. Jannotti, "Network layer support for overlay networks," PhD thesis, MIT, August 2002.]] Google ScholarDigital Library
- J. Jannotti, D. K. Gifford, K. L. Johnson, M. F. Kaashoek, J. W. O'Toole Jr, "Overcast: Reliable Multicasting with an Overlay Network," OSDI, October 2000.]] Google ScholarDigital Library
- P. Jokela, P. Nikander, J. Melen, J. Ylitalo, J. Wall, "Host identity protocol-extended abstract," in Wireless World Research Forum, February 2004.]]Google Scholar
- A. Jonsson, M. Folke, B. Ahlgren, "The split naming/forwarding network architecture," Proc. Swedish National Computer Networking Workshop (SNCNW), September 2003.]]Google Scholar
- D. Krioukov, kc claffy, "Toward compact interdomain routing," Unpublished draft, http://www.krioukov.net/~dima/pub/cir.pdf]]Google Scholar
- D. Krioukov, K. Fall, X. Yang, "Compact routing on Internet-like graphs," IEEE Infocom , March 2004.]]Google Scholar
- D. Mazieres, "Self-certifying file system," PhD thesis, MIT, May 2000.]] Google ScholarDigital Library
- A. Myers, E. Ng, H. Zhang, "Rethinking the service model: scaling ethernet to a million nodes," HotNets, November 2004.]]Google Scholar
- M. O'Dell, "GSE - an alternate addressing architecture for IPv6," ftp://ds.internic.net/internetdrafts/draftietfipngwg-gseaddr-00.txt, 1997.]]Google Scholar
- L. Peterson, S. Shenker, J. Turner, "Overcoming the Internet impasse through virtualization," HotNets, November 2004.]]Google Scholar
- A. Rowstron, P. Druschel, "Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems," IFIP/ACM Middleware, November 2001.]] Google ScholarDigital Library
- J. Saltzer, "On the naming and binding of network destinations," RFC 1498, August 1993.]] Google ScholarDigital Library
- N. Spring, R. Mahajan, D. Wetherall, "Measuring ISP topologies with Rocketfuel," ACM SIGCOMM, August 2002.]] Google ScholarDigital Library
- I. Stoica, D. Adkins, S. Zhuang, S. Shenker, S. Surana, "Internet indirection infrastructure," ACM SIGCOMM, August 2002.]] Google ScholarDigital Library
- I. Stoica, R. Morris, D. Lieben-Nowell, D. Karger, M. Kaashoek, F. Dabek, H. Balakrishnan, "Chord: a scalable peer-to-peer lookup protocol for Internet applications," IEEE Transactions on Networks, 11(1) 17--32, 2003.]] Google ScholarDigital Library
- L. Subramanian, S. Agarwal, J. Rexford, R. Katz,"Characterizing the Internet Hierarchy from Multiple Vantage Points," in IEEE Infocom 2002, June 2002.]]Google Scholar
- L. Subramanian, M. Caesar, C. Ee, M. Handley, M. Mao, S. Shenker, I. Stoica, "HLP: a next-generation interdomain routing protocol," ACM SIGCOMM, August 2005.]] Google ScholarDigital Library
- M. Walfish, H. Balakrishnan, S. Shenker, "Untangling the web from DNS," NSDI March 2004.]] Google ScholarDigital Library
- M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, S. Shenker, "Middleboxes no longer considered harmful," OSDI, December 2004.]] Google ScholarDigital Library
- F. Wang, L. Gao, "Inferring and characterizing Internet routing policies," Proc. Internet Measurement Conference, October 2003.]] Google ScholarDigital Library
- Abraham Yaar, Adrian Perrig, Dawn Song, "Pi: A Path Identification Mechanism to Defend against DDoS Attacks," IEEE Symposium on Security and Privacy, 2003.]] Google ScholarDigital Library
- X. Yang, "NIRA: a new Internet routing architecture," SIGCOMM Workshop on Future Directions in Network Architecture (FDNA), August 2003.]] Google ScholarDigital Library
- X. Yang, D. Wetherall, and T. Anderson, "A DoS-limiting Network Architecture," ACM SIGCOMM 2005, August 2005.]] Google ScholarDigital Library
- CAIDA, "Skitter," http://www.caida.org/tools/measurement/skitter.]]Google Scholar
- "FIND: future Internet network design," http://find.isi.edu, December 2005.]]Google Scholar
- "GENI: global environment for network innovations," http://www.geni.net]]Google Scholar
- Internet Systems Consortium, "Domain survey host count," http://www.isc.org/index.pl?/ops/ds/, July 2005.]]Google Scholar
- "NewArch project: future-generation Internet architecture," http://www.isi.edu/newarch/]]Google Scholar
- "Route Views Project," http://www.routeviews.org.]]Google Scholar
Index Terms
- ROFL: routing on flat labels
Recommendations
ROFL: routing on flat labels
SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communicationsIt is accepted wisdom that the current Internet architecture conflates network locations and host identities, but there is no agreement on how a future architecture should distinguish the two. One could sidestep this quandary by routing directly on host ...
NIRA: a new inter-domain routing architecture
In today's Internet, users can choose their local Internet service providers (ISPs), but once their packets have entered the network, they have little control over the overall routes their packets take. Giving a user the ability to choose between ...
LANES: an inter-domain data-oriented routing architecture
ReArch '09: Proceedings of the 2009 workshop on Re-architecting the internetData-oriented networking has attracted research recently, but the efficiency of the state-of-the-art solutions can still be improved. Our work towards this goal is set in a clean-slate architecture consisting of modular rendezvous, routing, and ...
Comments