The NEBULA Future Internet Architecture

  • Tom Anderson
  • Ken Birman
  • Robert Broberg
  • Matthew Caesar
  • Douglas Comer
  • Chase Cotton
  • Michael J. Freedman
  • Andreas Haeberlen
  • Zachary G. Ives
  • Arvind Krishnamurthy
  • William Lehr
  • Boon Thau Loo
  • David Mazières
  • Antonio Nicolosi
  • Jonathan M. Smith
  • Ion Stoica
  • Robbert van Renesse
  • Michael Walfish
  • Hakim Weatherspoon
  • Christopher S. Yoo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7858)

Introduction

The NEBULA Future Internet Architecture (FIA) project is focused on a future network that enables the vision of cloud computing [8,12] to be realized. With computation and storage moving to data centers, networking to these data centers must be several orders of magnitude more resilient for some applications to trust cloud computing and enable their move to the cloud.

References

  1. 1.
    Aditya, P., Zhao, M., Lin, Y., Haeberlen, A., Druschel, P., Maggs, B., Wishon, B.: Reliable client accounting for hybrid content-distribution networks. In: Proc. NSDI (April 2012)Google Scholar
  2. 2.
    Agapi, A., Birman, K., Broberg, R., Cotton, C., Kielmann, T., Millnert, M., Payne, R., Surton, R., van Renesse, R.: Routers for the Cloud: Can the Internet achieve 5-nines availability? IEEE Internet Computing 15(5), 72–77 (2011)CrossRefGoogle Scholar
  3. 3.
    Arye, M., Nordström, E., Kiefer, R., Rexford, J., Freedman, M.J.: A provably-correct protocol for seamless communication with mobile, multi-homed hosts. Technical Report 1203.4042v1, arXiv (March 2012)Google Scholar
  4. 4.
    Birman, K.P., Huang, Q., Freedman, D.: Overcoming the “D” in CAP: Using Isis2 to build locally responsive cloud services. IEEE Internet Computing 12, 50–58 (2012)Google Scholar
  5. 5.
    Birman, K.P.: Guide to Reliable Distributed Systems: Building High-Assurance Applications and Cloud-Hosted Services. Springer (2012)Google Scholar
  6. 6.
    Birman, K.P., Ganesh, L., van Renesse, R.: Running smart grid control software on cloud computing architectures. In: Proc. Workshop on Computational Needs for the Next Generation Electric Grid (April 2011)Google Scholar
  7. 7.
    Bodík, P., Menache, I., Chowdhury, M., Mani, P., Maltz, D.A., Stoica, I.: Surviving failures in bandwidth-constrained datacenters. In: Proc. SIGCOMM (2012)Google Scholar
  8. 8.
    Broberg, R., Agapi, A., Birman, K., Comer, D., Cotton, C., Kielmann, T., Lehr, W., van Renesse, R., Surton, R., Smith, J.M.: Clouds, cable and connectivity: Future Internets and router requirements. In: Proc. Cable Connection Spring Technical Conference (June 2011)Google Scholar
  9. 9.
    Clark, D., Lehr, W., Bauer, S.: Interconnection in the internet: the policy challenge. In: Proc. 39th Research Conference on Communication, Information and Internet Policy (September 2013)Google Scholar
  10. 10.
    Comer, D., Javed, S.: Applying open resilient cluster management (orcm) to a multi-chassis core router. In: Proc. ISCA International Conference on Computers and Their Applications (March 2012)Google Scholar
  11. 11.
    Comer, D., Suingh, P., Vasudevan, S.: Towards a practical and effective BGP defense system. In: Proc. ICICS (January 2012)Google Scholar
  12. 12.
    Comer, D.: A future Internet architecture that supports Cloud Computing. In: Proc. 6th International Conference on Future Internet Technologies (June 2011)Google Scholar
  13. 13.
    Dobrescu, M., Egi, N., Argyraki, K., Chun, B.G., Fall, K., Iannaccone, G., Knies, A., Manesh, M., Ratnasamy, S.: RouteBricks: exploiting parallelism to scale software routers. In: Proc. SOSP (2009)Google Scholar
  14. 14.
    Foster, N., Freedman, M.J., Harrison, R., Monsanto, C., Reitblatt, M., Rexford, J., Story, A., Walker, D.: Language abstractions for software-defined networks. In: Proc. Workshop on Lang. for Distrib. Algorithms (2012)Google Scholar
  15. 15.
    Foster, N., Harrison, R., Freedman, M.J., Monsanto, C., Rexford, J., Story, A., Walker, D.: Frenetic: A network programming language. In: Proc. ICFP (2011)Google Scholar
  16. 16.
    Freedman, D., Marian, T., Lee, J., Birman, K., Weatherspoon, H., Xu, C.: Instrumentation for exact packet timings in networks. In: Proc. Instrumentation and Measurement Technology Conference (May 2011)Google Scholar
  17. 17.
    Ghodsi, A., Sekar, V., Zaharia, M., Stoica, I.: Multi-resource fair queueing for packet processing. In: Proc. SIGCOMM (2012)Google Scholar
  18. 18.
    Gupta, T., Leners, J.B., Aguilera, M.K., Walfish, M.: Exposing network failures to end-host applications for improved availability. In: Proc. NSDI (April 2013)Google Scholar
  19. 19.
    Gurney, A.J.T., Haeberlen, A., Zhou, W., Sherr, M., Loo, B.T.: Having your cake and eating it too: Routing security with privacy protections. In: Proc. HotNets (November 2011)Google Scholar
  20. 20.
    Handigol, N., Heller, B., Jeyakumar, V., Maziéres, D., McKeown, N.: Where is the debugger for my Software-Defined Network? In: Proc. HotSDN (2012)Google Scholar
  21. 21.
    Hong, C.Y., Caesar, M., Duffield, N., Wang, J.: Tiresias: Online anomaly detection for hierarchical operational network data. In: Proc. ICDCS (2012)Google Scholar
  22. 22.
    Hong, C.Y., Caesar, M., Godfrey, P.B.: Finishing flows quickly with preemptive scheduling. In: Proc. SIGCOMM (2012)Google Scholar
  23. 23.
    Jeyakumar, V., Alizadeh, M., Mazières, D., Prabhakar, B., Kim, C.: EyeQ: Practical network performance isolation for the multi-tenant Cloud. In: Proc. HotCloud (2012)Google Scholar
  24. 24.
    Khurshid, A., Kiyak, F., Caesar, M.: Improving robustness of DNS to software vulnerabilities. In: Proc. ACSAC (2011)Google Scholar
  25. 25.
    Khurshid, A., Zhou, W., Caesar, M., Godfrey, P.B.: VeriFlow: Verifying network-wide invariants in real time. In: Proc. HotSDN (2012)Google Scholar
  26. 26.
    Lehr, W.: Measuring the Internet: The data challenge. OECD Digital Economy Papers, No. 194. OECD Publishing (2012)Google Scholar
  27. 27.
    Lehr, W., Clark, D., Bauer, S.: Measuring Internet performance when broadband is the new PSTN. Paper prepared for the “End of PSTN” Workshop at the University of Pennsylvania (May 2012)Google Scholar
  28. 28.
    Liu, C., Ren, L., Loo, B.T., Mao, Y., Basu, P.: Cologne: A declarative distributed constraint optimization platform. Proc. VLDB Endowm. 5(8), 752–763 (2012)Google Scholar
  29. 29.
    Liu, V., Han, S., Krishnamurthy, A., Anderson, T.: Tor instead of IP. In: Proc. HotNets (2011)Google Scholar
  30. 30.
    Liu, V., Halperin, D., Krishnamurthy, A., Anderson, T.: F10: A fault-tolerant engineered network. In: Proc. NSDI (April 2013)Google Scholar
  31. 31.
    Naous, J., Walfish, M., Nicolosi, A., Mazières, D., Miller, M., Seehra, A.: Verifying and enforcing network paths with ICING. In: Proc. CoNEXT (2011)Google Scholar
  32. 32.
    Nordström, E., Shue, D., Gopalan, P., Kiefer, R., Arye, M., Ko, S.Y., Rexford, J., Freedman, M.J.: Serval: An end-host stack for service-centric networking. In: Proc. NSDI (2012)Google Scholar
  33. 33.
    Popa, L., Krishnamurthy, A., Ratnasamy, S., Stoica, I.: FairCloud: Sharing the network in cloud computing. In: Proc. HotNets (2011)Google Scholar
  34. 34.
    Popa, L., Kumar, G., Chowdhury, M., Krishnamurthy, A., Ratnasamy, S., Stoica, I.: FairCloud: sharing the network in cloud computing. In: Proc. SIGCOMM (2012)Google Scholar
  35. 35.
    Setty, S., McPherson, R., Blumberg, A.J., Walfish, M.: Making argument systems for outsourced computation practical (sometimes). In: Proc. NDSS (February 2012)Google Scholar
  36. 36.
    Setty, S., Vu, V., Panpalia, N., Braun, B., Blumberg, A.J., Walfish, M.: Taking proof-based verified computation a few steps closer to practicality. In: Proc. USENIX Security (2012)Google Scholar
  37. 37.
    Wang, A., Jia, L., Zhou, W., Ren, Y., Loo, B.T., Rexford, J., Nigam, V., Scedrov, A., Talcott, C.: FSR: Formal analysis and implementation toolkit for safe interdomain routing. IEEE/ACM Transactions on Networking (ToN) 20(6), 1814–1827 (2012)CrossRefGoogle Scholar
  38. 38.
    Wang, A., Talcott, C., Gurney, A.J., Loo, B.T., Scedrov, A.: Brief announcement: A calculus of policy-based routing systems. In: Proc. PODC (July 2012)Google Scholar
  39. 39.
    Williams, D., Jamjoom, H., Weatherspoon, H.: The Xen-Blanket: Virtualize once, run everywhere. In: Proc. EuroSys (2012)Google Scholar
  40. 40.
    Yoo, C.S.: Cloud computing: Architecturand and policy implications. Review of Industrial Economics 38(4), 405–421 (2011)Google Scholar
  41. 41.
    Zhao, M., Zhou, W., Gurney, A.J.T., Haeberlen, A., Sherr, M., Loo, B.T.: Private and verifiable interdomain routing decisions. In: Proc. SIGCOMM (August 2012)Google Scholar
  42. 42.
    Zhou, W., Fei, Q., Narayan, A., Haeberlen, A., Loo, B.T., Sherr, M.: Secure network provenance. In: Proc. SOSP (October 2011)Google Scholar

Copyright information

© Authors 2013

Authors and Affiliations

  • Tom Anderson
    • 1
  • Ken Birman
    • 2
  • Robert Broberg
    • 3
  • Matthew Caesar
    • 4
  • Douglas Comer
    • 5
  • Chase Cotton
    • 6
  • Michael J. Freedman
    • 7
  • Andreas Haeberlen
    • 8
  • Zachary G. Ives
    • 8
  • Arvind Krishnamurthy
    • 1
  • William Lehr
    • 9
  • Boon Thau Loo
    • 8
  • David Mazières
    • 10
  • Antonio Nicolosi
    • 11
  • Jonathan M. Smith
    • 8
  • Ion Stoica
    • 12
  • Robbert van Renesse
    • 2
  • Michael Walfish
    • 13
  • Hakim Weatherspoon
    • 2
  • Christopher S. Yoo
    • 8
  1. 1.University of WashingtonUSA
  2. 2.Cornell UniversityUSA
  3. 3.Cisco SystemsUSA
  4. 4.University of IllinoisUSA
  5. 5.Purdue UniversityUSA
  6. 6.University of DelawareUSA
  7. 7.Princeton UniversityUSA
  8. 8.University of PennsylvaniaUSA
  9. 9.Massachusetts Institute of TechnologyUSA
  10. 10.Stanford UniversityUSA
  11. 11.Stevens Institute of TechnologyUSA
  12. 12.University of CaliforniaBerkeleyUSA
  13. 13.University of TexasAustinUSA

Personalised recommendations