XIA: Efficient Support for Evolvable Internetworking

XIA: Efficient Support for Evolvable Internetworking

XIA: Efficient Support for Evolvable Internetworking Dongsu Han Ashok Anand† Fahad Dogar Boyan Li Hyeontaek Lim Michel Machado∗ Arvind Mukundan Wenfei Wu† Aditya Akella† David G. Andersen John W. Byers∗ Srinivasan Seshan Peter Steenkiste† Abstract dressing and still remain reachable by unmodified senders Motivated by limitations in today’s host-centric IP net- who use IPv4. Second, today’s paths to incremental de- work, recent studies have proposed clean-slate network ployment typically involve tunnels or overlays, which hide architectures centered around alternate first-class princi- have the drawback that they the new functionality pals, such as content, services, or users. However, much from the existing network. For example, enabling a sin- like the host-centric IP design, elevating one principal gle router in a legacy network to support some form of content-centric networking is fruitless if that traffic ends type above others hinders communication between other 1 principals and inhibits the network’s capability to evolve. up being tunneled through the network using IPv4 . This paper presents the eXpressive Internet Architecture This paper presents a new Internet architecture, called (XIA), an architecture with native support for multiple the eXpressive Internet Architecture or XIA, that ad- principals and the ability to evolve its functionality to ac- dresses these problems from the ground up. XIA main- commodate new, as yet unforeseen, principals over time. tains some features of the current Internet, such as a nar- We describe key design requirements, and demonstrate row waist that networks must support, and packet switch- how XIA’s rich addressing and forwarding semantics fa- ing, but it differs from today’s Internet in several areas. cilitate flexibility and evolvability, while keeping core The philosophy underlying the design of XIA is, sim- network functions simple and efficient. We describe case ply, that we do not believe we can predict the usage mod- studies that demonstrate key functionality XIA enables. els for the Internet of 50 years hence. The research com- munity has presented compelling arguments for support- 1 Introduction ing many types of communication—content-centric net- The “narrow waist” design of the Internet has been tremen- working [26, 44], service-based communication [20, 38], dously successful, helping to create a flourishing ecosys- multicast [19], enhanced support for mobility [4, 40, 48], tem of applications and protocols above the waist, and and so on. We believe that a new network architecture diverse media, physical layers, and access technologies should facilitate any or all of these capabilities, and it below. However, the Internet, almost by design, does not must be possible to enable or disable “native” support for facilitate a clean, incremental path for the adoption of them as makes sense in that time and place. new capabilities at the waist. This shortcoming is clearly The key architectural element that XIA adds to improve illustrated by the 15+ year deployment history of IPv6 evolvability is one we call expressing intent. XIA’s ad- and the difficulty of deploying primitives needed to secure dresses can simultaneously express both a “new” type of the Internet. Serious barriers to evolvability arise when: address (or addresses), and one or more backwards com- • Protocols, formats, and information must be agreed patible pathways to reach that address. This notion is best upon by a large number of independent actors in the explained by example: Consider the process of retrieving architecture; and a particular piece of content (CID) using a network that • There is no built-in mechanism that supports (and provides only host-to-host communication, much like to- embraces) incremental deployment of new function- day’s Internet. The source would send a packet destined ality with minimal friction. to a destination network (Dom); the destination network IP today faces both of these barriers. First, senders, would deliver it to a host; the host would deliver it to a receivers, and every router in between must agree on the process providing a service (Srv) such as HTTP; and the format and meaning of the IP header. It is not possible, process would reply with the desired content, as such: therefore, for a destination to switch to IPv6-based ad- Dom Hst Srv CID Carnegie Mellon University ∗Department of Computer Science, Boston University 1Without resorting to deep packet inspection of various sorts, which †University of Wisconsin-Madison itself is typically fragile. XIA makes this path explicit in addressing, and allows tematically incorporate them into the eXpressive Inter- flexibility in expressing it, e.g., “The source really just net Protocol (XIP) (x3). We describe optimizations for wants to retrieve this content, and it does not care whether high-speed per-hop packet processing, which can achieve it goes through Dom to get it.” As a result, this process of multi-10Gbps forwarding speed. Then, through concrete content retrieval might be expressed in XIA by specifying examples, we show how networks, hosts, and applications the destination address as a directed acyclic graph, not a interact with each other and benefit from XIA’s flexibility single address, like this: and evolvability (x4). Through prototype implementation and deployment, we show how applications can benefit, and demonstrate the practicality of XIP and the architec- Dom Hst Srv CID ture under current and (expected) future Internet scales and technology (x5). We discuss related work (x6) and close with a conclusion and a list of new research question By expressing the destination in this way, senders give that XIA raises (x7). flexibility to the network to satisfy their intent. Imagine a future network in which the destination domain supported 2 Foundational Ideas of XIA routing directly to services [20] (instead of needing to XIA is based upon three core ideas for designing an evolv- route to a particular host). Using the address as expressed able and secure Internet architecture: above, this hypothetical network would already have both 1. Principal types. Applications can use one or more the information it needs (the service ID) and permission to principal types to directly express their intent to access do so (the link from the source directly to the service ID). specific functionality. Each principal type defines its own A router or other network element that does not know how “narrow waist”, with an interface for applications and to operate on, e.g., the service ID, would simply route ways in which routers should process packets destined to the packet to the furthest-along node that it does know a particular type of principal. (the domain or the host in this example). Note that the XIA supports an open-ended set of principal types, sender can use the same address before and after support from the familiar (hosts), to those popular in current re- for service routing is introduced. search (content, or services), to those that we have yet to XIA terms the types of nodes in the address princi- formalize. As new principal types are introduced, appli- pals; examples of principals include hosts, autonomous cations or protocols may start to use these new principal domains (analogous to today’s autonomous systems), ser- types at any time, even before the network has been mod- vices, content IDs, and so on. The set of principals in XIA ified to natively support the new function. This allows is not fixed: hosts or applications can define new types incremental deployment of native network support with- of principals and begin using them at any time, without out further change to the network endpoints, as we will waiting for support from the network. Of course, if they explore through examples in x4.2 and x4.3. want to get anything done, they must also express a way 2. Flexible addressing. XIA aims to avoid the “boot- to get their work done in the current network. We believe strapping problem”: why develop applications or proto- that the ability to express not just “how to do it today”, cols that depend on network functionality that does not but also your underlying intent, is key to enabling future yet exist, and why develop network functionality when no evolvability. applications can use it? XIA provides a built-in mecha- The second difference between XIA and today’s In- nism for enabling new functions to be deployed piecewise, ternet comes from a design philosophy that encourages e.g., starting from the applications and hosts, then, if pop- creating principals that have intrinsic security: the ability ular enough, providing gradual network support. The key for an entity to validate that it is communicating with the challenge is: how should a legacy router in the middle correct counterpart without needing access to external of the network handle a new principal type that it does databases, information, or configuration. An example of not recognize? To address this, we introduce the notion an intrinsically secure address is using the hash of a public of a fallback. Fallbacks allow communicating parties to key for a host address [10]. With this mechanism, the host specify alternative action(s) if routers cannot operate upon can prove that it sent a particular packet to any receiver the primary intent. We provide details in x3.2. who knows its host address. Intrinsic security is central to 3. Intrinsically secure identifiers. IP is notoriously reliable sharing of information between principals and the hard to secure, as network security was not a first-order network and to ensuring correct fulfillment of the contract consideration in its design. XIA aims to build security between them. It can furthermore be used to bootstrap into the core architecture as much as possible, without higher level security mechanisms. impairing expressiveness. In particular, principals used We make the following contributions in this paper: We in XIA source and destination addresses must be intrin- outline novel design ideas for evolution (x2), and sys- sically secure, i.e., cryptographically derived from the 2 associated communicating entities in a principal type- means, and they should be generated in a distributed specific fashion.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us