User-directed routing: from theory, towards practice

User-directed routing technologies - that is, systems in which users choose their own routes through a communications network - have generated considerable interest in recent years. Despite their numerous theoretical advantages, ISPs have so far resisted these technologies, even as users have learned to capture some routing power through overlay networks. This study responds to this disconnect between theory and practice by asking how user-directed routing would affect three prominent objectives of network operators: maintaining control over the network, earning profits, and keeping inner details of the network secret. Contrary to the modern theme in routing proposals, we argue that user-directed routing is not fundamentally incompatible with ISP-control, as long as a flexible pricing system is in place. Instead - and under surprisingly general assumptions - an ISP can use prices on the open market to induce any feasible traffic pattern. Moreover, we argue that the market-based approach maximizes welfare for any given traffic pattern. In general, our model does not guarantee whether an ISP will earn more money under user-directed routing. Nevertheless, we provide some intuition to suggest why a typical ISP may expect higher profits. Finally, we suggest that giving routing power to users conflicts with an ISP's desire for secrecy. At the same time, widespread adoption of user-directed routing, perhaps promoted through regulation, may facilitate a transparent and civil industry, to the benefit of many ISPs.

[1]  S. Stidham,et al.  Individual versus Social Optimization in the Allocation of Customers to Alternative Servers , 1983 .

[2]  Xiaowei Yang,et al.  NIRA: a new Internet routing architecture , 2003, FDNA '03.

[3]  S. Schoen Packet Forgery By ISPs : A Report On The Comcast Affair , 2007 .

[4]  David Wetherall,et al.  Source selectable path diversity via routing deflections , 2006, SIGCOMM 2006.

[5]  Mung Chiang,et al.  Towards Robust Multi-Layer Traffic Engineering: Optimization of Congestion Control and Routing , 2007, IEEE Journal on Selected Areas in Communications.

[6]  William B. Norton,et al.  The Art of Peering: The Peering Playbook , 2010 .

[7]  Christian Scheideler,et al.  Can ISPS and P2P users cooperate for improved performance? , 2007, CCRV.

[8]  Hui Zhang,et al.  A case for end system multicast (keynote address) , 2000, SIGMETRICS '00.

[9]  Scott Shenker,et al.  Overcoming the Internet impasse through virtualization , 2005, Computer.

[10]  Hari Balakrishnan,et al.  Resilient overlay networks , 2001, SOSP.

[11]  Aditya Akella,et al.  Achieving Good End-to-End Service Using Bill-Pay , 2006, HotNets.

[12]  Frank Kelly,et al.  Charging and rate control for elastic traffic , 1997, Eur. Trans. Telecommun..

[13]  Yasushi Masuda,et al.  Capacity Management in Decentralized Networks , 2002, Manag. Sci..

[14]  Bassam Halabi,et al.  Internet Routing Architectures , 1997 .

[15]  Yin Zhang,et al.  On selfish routing in Internet-like environments , 2003, IEEE/ACM Transactions on Networking.

[16]  Scott Shenker,et al.  Routing as a Service , 2006 .

[17]  John Wroclawski,et al.  On the benefits and feasibility of incentive based routing infrastructure , 2004, PINS '04.

[18]  Ram Keralapura,et al.  Can ISPs Take the Heat from Overlay Networks ? , 2004 .

[19]  John C.-I. Chuang,et al.  Network monitors and contracting systems: competition and innovation , 2006, SIGCOMM.

[20]  Steven McCanne,et al.  Towards an evolvable internet architecture , 2005, SIGCOMM '05.

[21]  Srinivasan Seshan,et al.  A case for end system multicast , 2002, IEEE J. Sel. Areas Commun..

[22]  Chen-Nee Chuah,et al.  Can ISPs and Overlay Networks Form a Synergistic Co-existence? , 2004, DSOM.

[23]  Jennifer Rexford,et al.  MIRO: multi-path interdomain routing , 2006, SIGCOMM 2006.

[24]  Tim Roughgarden,et al.  How bad is selfish routing? , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[25]  Don Towsley,et al.  On the Interaction Between Overlay Routing and Traffic Engineering , 2004 .

[26]  J. Peha The Benefits and Risks of Mandating Network Neutrality, and the Quest for a Balanced Policy , 2006 .

[27]  David D. Clark,et al.  Tussle in cyberspace: defining tomorrow's Internet , 2002, IEEE/ACM Transactions on Networking.

[28]  Alex C. Snoeren,et al.  Decoupling policy from mechanism in Internet routing , 2004, Comput. Commun. Rev..

[29]  Xiaowei Yang,et al.  Source selectable path diversity via routing deflections , 2006, SIGCOMM.