[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3563766.3564107acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Open access

It takes two to tango: cooperative edge-to-edge routing

Published: 14 November 2022 Publication History

Abstract

In their unrelenting quest for lower latency, cloud providers are deploying servers closer to their customers and enterprises are adopting paid Network-as-a-Service (NaaS) offerings with performance guarantees. Unfortunately, these trends contribute to greater industry consolidation, benefiting larger companies and well-served regions while leaving little room for smaller cloud providers and enterprises to flourish. Instead, we argue that the public Internet could offer good enough performance, if only edge networks could work together to achieve better visibility and control over wide-area routing. We present Tango, a cooperative architecture where pairs of edge networks (e.g., access, enterprise, and data-center networks) collaborate to expose more wide-area paths, collect more accurate measurements, and split traffic more intelligently over the paths. Tango leverages programmable switches at the borders of the edge networks, coupled with techniques to coax BGP into exposing more paths, without requiring support from end hosts or intermediate ASes. Experiments with our preliminary Tango deployment (using IPv6 addresses and the Vultr cloud provider) show that Tango could offer much greater visibility and control over wide-area routing, allowing the public Internet to meet the needs of many modern networked applications.

References

[1]
2022. Announce your IP Space with BGP and Vultr - Vultr.com. https://www.vultr.com/features/bgp/. (2022).
[2]
2022. AS20473 BGP Customer Guide. https://www.vultr.com/docs/as20473-bgp-customer-guide. (2022).
[3]
2022. SSD VPS Servers, Cloud Servers and Cloud Hosting. https://www.vultr.com/. (2022).
[4]
2022. The BIRD Internet Routing Daemon Project. https://bird.network.cz/. (2022).
[5]
Akamai. 2022. SureRoute. https://developer.akamai.com/article/sureroute. (2022).
[6]
Aditya Akella, Bruce Maggs, Srinivasan Seshan, and Anees Shaikh. 2008. On the performance benefits of multihoming route control. IEEE/ACM Transactions on Networking (TON) 16, 1 (2008), 91--104.
[7]
Aditya Akella, Srinivasan Seshan, and Anees Shaikh. 2004. Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise Strategies. In USENIX Annual Technical Conference, General Track. 113--126.
[8]
David Andersen, Hari Balakrishnan, Frans Kaashoek, and Robert Morris. 2001. Resilient Overlay Networks. In ACM Symposium on Operating Systems Principles (SOSP '01). 131--145.
[9]
Maria Apostolaki, Gian Marti, Jan Müller, and Laurent Vanbever. 2019. SABRE: Protecting Bitcoin against Routing Attacks. In Network and Distributed System Security Symposium (NDSS).
[10]
Maria Apostolaki, Ankit Singla, and Laurent Vanbever. 2021. Performance-Driven Internet Path Selection. In ACM SIGCOMM Symposium on SDN Research (SOSR). 41--53.
[11]
Ioannis Avramopoulos and Jennifer Rexford. 2006. Stealth Probing: Efficient Data-Plane Security for IP Routing. In USENIX Annual Technical Conference. USENIX Association, Boston, MA. https://www.usenix.org/conference/2006-usenix-annual-technical-conference/stealth-probing-efficient-data-plane-security-ip
[12]
Henry Birge-Lee, Liang Wang, Jennifer Rexford, and Prateek Mittal. 2019. SICO: Surgical Interception Attacks by Manipulating BGP Communities. In ACM SIGSAC Conference on Computer and Communications Security (CCS). 18.
[13]
Jose M Camacho, Alberto García-Martínez, Marcelo Bagnulo, and Francisco Valera. 2013. BGP-XM: BGP Extended Multipath for Transit Autonomous Systems. Computer Networks 57, 4 (2013), 954--975.
[14]
A. Elwalid, C. Jin, S. Low, and I. Widjaja. 2001. MATE: MPLS adaptive traffic engineering. In Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213), Vol. 3. 1300--1309 vol.3.
[15]
A. Ford, C. Raiciu, M. Handley, O. Bonaventure, and C. Paasch. 2020. TCP Extensions for Multipath Operation with Multiple Addresses. RFC 8684. RFC Editor.
[16]
Sharon Goldberg and Jennifer Rexford. 2007. Security vulnerabilities and solutions for packet sampling. In IEEE Sarnoff Symposium. 1--7.
[17]
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, and Jennifer Rexford. 2008. Path-Quality Monitoring in the Presence of Adversaries. In ACM SIGMETRICS. Association for Computing Machinery, New York, NY, USA, 193--204.
[18]
David K Goldenberg, Lili Qiu, Haiyong Xie, Yang Richard Yang, and Yin Zhang. 2004. Optimizing cost and performance for multihoming. In ACM SIGCOMM, Vol. 34. ACM, 79--92.
[19]
Thomas Holterbach, Edgar Costa Molero, Maria Apostolaki, Alberto Dainotti, Stefano Vissicchio, and Laurent Vanbever. 2019. Blink: Fast connectivity recovery entirely in the data plane. In USENIX Symposium on Networked Systems Design and Implementation. 161--176.
[20]
Srikanth Kandula, Dina Katabi, Bruce Davie, and Anna Charny. 2005. Walking the tightrope: Responsive yet stable traffic engineering. In ACM SIGCOMM Computer Communication Review, Vol. 35. ACM, 253--264.
[21]
Changhoon Kim, Anirudh Sivaraman, Naga Praveen Katta, Antonin Bas, Advait Dixit, and Lawrence J Wobker. 2015. In-band Network Telemetry via Programmable Dataplanes (Industrial demo, ACM SIGCOMM '15).
[22]
Rustam Lalkaka. 2019. Argo and the Cloudflare Global Private Backbone. (Dec 2019). https://blog.cloudflare.com/argo-and-the-cloudflare-global-private-backbone/.
[23]
Myungjin Lee, Sharon Goldberg, Ramana Rao Kompella, and George Varghese. 2014. FineComb: Measuring Microscopic Latency and Loss in the Presence of Reordering. IEEE/ACM Transactions on Networking 22, 4 (2014), 1136--1149.
[24]
Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, and Laurent Chuat. 2017. SCION: A Secure Internet Architecture. Springer Verlag.
[25]
Alex Pilosov and Tony Kapela. 2008. Stealing the Internet: An Internet-scale man in the middle attack. NANOG-44, Los Angeles, October (2008), 12--15.
[26]
Stefan Savage, Thomas Anderson, Amit Aggarwal, David Becker, Neal Cardwell, Andy Collins, Eric Hoffman, John Snell, Amin Vahdat, Geoff Voelker, et al. 1999. Detour: Informed Internet routing and transport. IEEE Micro 19, 1 (1999), 50--59.
[27]
Florian Streibelt, Franziska Lichtblau, Robert Beverly, Anja Feldmann, Cristel Pelsser, Georgios Smaragdakis, and Randy Bush. 2018. BGP Communities: Even More Worms in the Routing Can. In ACM Internet Measurement Conference (IMC '18). 279--292.
[28]
Hongsuda Tangmunarunkit, Ramesh Govindan, and Scott Shenker. 2001. Internet path inflation due to policy routing. In ITCom 2001: International Symposium on the Convergence of IT and Communications. International Society for Optics and Photonics, 188--195.
[29]
Damon Wischik, Costin Raiciu, Adam Greenhalgh, and Mark Handley. 2011. Design, implementation and evaluation of congestion control for multipath TCP. In USENIX Networked Systems Design and Implementation.
[30]
Kok-Kiong Yap, Murtaza Motiwala, Jeremy Rahe, Steve Padgett, Matthew Holliman, Gary Baldus, Marcus Hines, Taeeun Kim, Ashok Narayanan, Ankur Jain, Victor Lin, Colin Rice, Brian Rogan, Arjun Singh, Bert Tanaka, Manish Verma, Puneet Sood, Mukarram Tariq, Matt Tierney, Dzevad Trumic, Vytautas Valancius, Calvin Ying, Mahesh Kallahalla, Bikash Koley, and Amin Vahdat. 2017. Taking the Edge off with Espresso: Scale, Reliability and Programmability for Global Internet Peering (SIGCOMM '17). Association for Computing Machinery, New York, NY, USA, 432--445.
[31]
Li Yuliang, Miao Rui, Kim Changhoon, and Yu Minlan. 2016. LossRadar: Fast Detection of Lost Packets in Data Center Networks. In CoNEXT. ACM, New York, NY, USA, 15.
[32]
Zheng Zhang, Ming Zhang, Albert Greenberg, Y. Charlie Hu, Ratul Mahajan, and Blaine Christian. 2010. Optimizing Cost and Performance in Online Service Provider Networks. In USENIX Networked Systems Design and Implementation.

Cited By

View all
  • (2024)Anomaly Detection in In-Network Fast ReRoute Systems2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619865(122-130)Online publication date: 3-Jun-2024
  • (2024)Enabling User Intent-based Network Path Adaptation for Live Volumetric Streaming2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619068(395-403)Online publication date: 3-Jun-2024
  • (2024)Enabling eBPF-based packet duplication for robust volumetric video streaming2024 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC61673.2024.10733617(1-7)Online publication date: 26-Jun-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
HotNets '22: Proceedings of the 21st ACM Workshop on Hot Topics in Networks
November 2022
252 pages
ISBN:9781450398992
DOI:10.1145/3563766
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 November 2022

Check for updates

Author Tags

  1. BGP
  2. SDN
  3. multipath routing
  4. network measurement

Qualifiers

  • Research-article

Funding Sources

  • DARPA

Conference

HotNets '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 110 of 460 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)224
  • Downloads (Last 6 weeks)22
Reflects downloads up to 26 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Anomaly Detection in In-Network Fast ReRoute Systems2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619865(122-130)Online publication date: 3-Jun-2024
  • (2024)Enabling User Intent-based Network Path Adaptation for Live Volumetric Streaming2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619068(395-403)Online publication date: 3-Jun-2024
  • (2024)Enabling eBPF-based packet duplication for robust volumetric video streaming2024 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC61673.2024.10733617(1-7)Online publication date: 26-Jun-2024
  • (2023)Towards Integrating Formal Methods into ML-Based Systems for NetworkingProceedings of the 22nd ACM Workshop on Hot Topics in Networks10.1145/3626111.3628188(48-55)Online publication date: 28-Nov-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media