Architecting for innovation

We argue that the biggest problem with the current Internet architecture is not a particular functional deficiency, but its inability to accommodate innovation. To address this problem we propose a minimal architectural "framework" in which comprehensive architectures can reside. The proposed Framework for Internet Innovation (FII) --- which is derived from the simple observation that network interfaces should be extensible and abstract --- allows for a diversity of architectures to coexist, communicate, and evolve. We demonstrate FII's ability to accommodate diversity and evolution with a detailed examination of how information flows through the architecture and with a skeleton implementation of the relevant interfaces.

[1]  Mischa Schwartz,et al.  ACM SIGCOMM computer communication review , 2001, CCRV.

[2]  Ion Stoica,et al.  Rule-based Forwarding (RBF): Improving Internet's flexibility and security , 2009, HotNets.

[3]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[4]  David D. Clark,et al.  Tussle in cyberspace: defining tomorrow's Internet , 2002, IEEE/ACM Transactions on Networking.

[5]  Randy H. Katz,et al.  OverQoS: An Overlay Based Architecture for Enhancing Internet QoS , 2004, NSDI.

[6]  Dawn Xiaodong Song,et al.  SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[7]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[8]  Xin Liu,et al.  To filter or to authorize: network-layer DoS defense against multimillion-node botnets , 2008, SIGCOMM '08.

[9]  Michael J. Freedman,et al.  Service-Centric Networking with SCAFFOLD , 2010 .

[10]  Michael Walfish,et al.  A layered naming architecture for the internet , 2004, SIGCOMM '04.

[11]  Steven McCanne,et al.  Towards an evolvable internet architecture , 2005, SIGCOMM '05.

[12]  Eyal de Lara,et al.  Haggle: Clean-slate networking for mobile devices , 2007 .

[13]  Nick Feamster,et al.  MINT: a Market for INternet Transit , 2008, CoNEXT '08.

[14]  Xiaowei Yang,et al.  A DoS-limiting network architecture , 2005, SIGCOMM '05.

[15]  Jennifer Rexford,et al.  Future Internet architecture , 2010, Commun. ACM.

[16]  Scott Shenker,et al.  A data-oriented (and beyond) network architecture , 2007, SIGCOMM '07.

[17]  Janardhan R. Iyengar,et al.  Efficient Cross-Layer Negotiation , 2009, HotNets.

[18]  Ken Thompson,et al.  Plan 9 from Bell Labs , 1995 .

[19]  Stefan Savage,et al.  Privacy-preserving network forensics , 2011, Commun. ACM.

[20]  Marianne Shaw,et al.  Leveraging good intentions to reduce unwanted network traffic , 2006 .

[21]  Hari Balakrishnan,et al.  Resilient overlay networks , 2001, SOSP.

[22]  David D. Clark,et al.  The design philosophy of the DARPA internet protocols , 1988, SIGCOMM '88.

[23]  David R. Karger,et al.  INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.

[24]  Michael Walfish,et al.  A Policy Framework for the Future Internet , 2009, HotNets.

[25]  Brighten Godfrey,et al.  Pathlet routing , 2009, SIGCOMM '09.

[26]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[27]  Michael Walfish,et al.  Semantic-Free Referencing in Linked Distributed Systems , 2003, IPTPS.

[28]  Jon Crowcroft,et al.  Plutarch: an argument for network pluralism , 2003, FDNA '03.

[29]  David D. Clark,et al.  Rethinking the design of the Internet , 2001, ACM Trans. Internet Techn..

[30]  Dawn Song,et al.  A Clean-Slate Design for the Next-Generation Secure Internet , 2006 .

[31]  Scott Shenker,et al.  Revisiting IP multicast , 2006, SIGCOMM '06.

[32]  David A. Wagner,et al.  Tweakable Block Ciphers , 2002, Journal of Cryptology.

[33]  Nick Feamster,et al.  Accountable internet protocol (aip) , 2008, SIGCOMM '08.

[34]  John Black,et al.  A Block-Cipher Mode of Operation for Parallelizable Message Authentication , 2002, EUROCRYPT.

[35]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[36]  D. Saunders The brave new world , 1999 .

[37]  Elaine Shi,et al.  Portcullis: protecting connection setup from denial-of-capability attacks , 2007, SIGCOMM '07.

[38]  Bobby Bhattacharjee,et al.  Accountability as a Service , 2007, SRUTI.

[39]  Jennifer Rexford,et al.  Don't Secure Routing Protocols, Secure Data Delivery , 2006, HotNets.

[40]  Hari Balakrishnan,et al.  Improving web availability for clients with MONET , 2005, NSDI.

[41]  Michael Walfish,et al.  Untangling the Web from DNS , 2004, NSDI.

[42]  Katerina J. Argyraki,et al.  RouteBricks: exploiting parallelism to scale software routers , 2009, SOSP '09.