On the Suitability of Composable Services for the Assurable Future Internet

Our SILO architecture for the future Internet consists of composable fine-grain protocol elements called "services", and explicitly enables cross-layer interaction and optimization. While information assurance was not the only goal of SILO, we recognize that a critical need for the global network is a degree of assurability. In this paper, we present our view of the consequences of the SILO architecture with respect to information assurance services that could be easier enabled by SILO than the current architecture.

[1]  Gordon V. Cormack,et al.  Spam and the ongoing battle for the inbox , 2007, CACM.

[2]  David S Alberts,et al.  Network Centric Warfare: Developing and Leveraging Information Superiority , 1999 .

[3]  Petri Mähönen,et al.  TCP performance issues over wireless links , 2001, IEEE Commun. Mag..

[4]  Injong Rhee,et al.  Binary increase congestion control (BIC) for fast long-distance networks , 2004, IEEE INFOCOM 2004.

[5]  Yunnan Wu,et al.  Network planning in wireless ad hoc networks: a cross-Layer approach , 2005, IEEE Journal on Selected Areas in Communications.

[6]  Lun Li,et al.  Cross-layer optimization in TCP/IP networks , 2005, IEEE/ACM Transactions on Networking.

[7]  Shyhtsun Felix Wu,et al.  An experimental study of insider attacks for OSPF routing protocol , 1997, Proceedings 1997 International Conference on Network Protocols.

[8]  William E. Riddle,et al.  Software technology maturation , 1985, ICSE '85.

[9]  Shyhtsun Felix Wu,et al.  Intrusion Detection for Link-State Routing Protocols , 1997 .

[10]  Sally Floyd,et al.  HighSpeed TCP for Large Congestion Windows , 2003, RFC.

[11]  Suresh Singh,et al.  M-TCP: TCP for mobile cellular networks , 1997, CCRV.

[12]  George N. Rouskas,et al.  A Unified Software Architecture to Enable Cross-Layer Design in the Future Internet , 2007, 2007 16th International Conference on Computer Communications and Networks.

[13]  Sridhar Iyer,et al.  Cross-layer feedback architecture for mobile device protocol stacks , 2006, IEEE Communications Magazine.

[14]  Clive Davidson,et al.  Cyberpunk: Outlaws and hackers on the computer frontier , 1992 .

[15]  M. Motani,et al.  Cross-layer design: a survey and the road ahead , 2005, IEEE Communications Magazine.

[16]  Andrea J. Goldsmith,et al.  Cross-Layer Design for Lifetime Maximization in Interference-Limited Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.

[17]  David D. Clark,et al.  Tussle in cyberspace: defining tomorrow's Internet , 2002, IEEE/ACM Transactions on Networking.

[18]  Shyhtsun Felix Wu,et al.  JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Proto , 1999 .

[19]  Liviu Iftode,et al.  Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments , 1994, IEEE J. Sel. Areas Commun..

[20]  David D. Clark,et al.  Tussle in cyberspace: defining tomorrow's internet , 2005, TNET.

[21]  Cheng Jin,et al.  FAST TCP: Motivation, Architecture, Algorithms, Performance , 2006, IEEE/ACM Transactions on Networking.

[22]  Christian Bonnet,et al.  CrossTalk: cross-layer decision support based on global knowledge , 2006, IEEE Communications Magazine.

[23]  George N. Rouskas,et al.  The SILO Architecture for Services Integration, controL, and Optimization for the Future Internet , 2007, 2007 IEEE International Conference on Communications.

[24]  David D. Clark,et al.  The design philosophy of the DARPA internet protocols , 1988, SIGCOMM '88.

[25]  Byron Anderson Net Neutrality , 2007 .

[26]  Mark Handley,et al.  Congestion control for high bandwidth-delay product networks , 2002, SIGCOMM.

[27]  Darren Reed,et al.  Security Considerations for IP Fragment Filtering , 1995, RFC.