Loading...
Please wait, while we are loading the content...
Similar Documents
HotBots ’ 07 : FirstWorkshop on Hot Topics in Understanding Botnets
| Content Provider | Semantic Scholar |
|---|---|
| Author | Mahajan, Ratul Wetherall, David Mellon, Carnegie Maltz, David A. Grizzard, Julian B. Sharma, Vikram Nunnery, Chris Kang, Brent Byunghoon Univer |
| Abstract | The Internet is made of ISPs that cooperate among themselves to carry traffic as well as compete with each other as business entities. No individual ISP can tune the traffic to flow through a particular route based on its self-interest; all must agree while each keeps its self-interests in mind. BGP, the most used routing protocol, provides some control , allowing ISPs to configure their outgoing traffic but giving no control over incoming traffic. This presents another problem. Suppose the incoming route fails; then the ISP cannot shift the traffic to another route as it is beyond its control. This problem is not new but can be mitigated through network engineering or by using newer routing protocols such as RCP. The solution suggested by Ratul is the development of an interdomain routing protocol called Wiser. Wiser has the same overhead as BGP and it is complete and practical in all senses to run across multiple ISPs. There is no need for the ISPs to disclose any kind of sensitive information. Also, it allows ISPs to exert full control over the paths and make decisions based on their own interests and optimization criteria. He explained how Wiser builds the coordination mechanism on existent bilateral contracts that are already in place and is incrementally deployable across pairs of ISPs. Each of the downstream tags advertises routing with costs that are similar to BGP Multi-exit Discrimina-tors (MEDs). Each of the upstream ISPs then selects the path with an amended process. This process considers the sum of its own costs and those reported by the downstream ISPs. Hence both the upstream and the downstream ISPs exert control on their route choices. This protocol has in-built mechanisms to discourage potential abuse. Hong presented an experimental network, Tesseract, that provides direct control of a computer network. This computer network can be under a single administrative domain. In a typical IP network today, the desired control policy of an administrative domain is implemented via the synthesis of several indirect control mechanisms. The design that evolved from 4D architecture tries to overcome the problem. It promotes the idea of decomposing the network control plane in four different planes: decision, decomposition , discovery, and data. The network consists of something known as network decision elements. There are two abstract services to enable direct control: the dissemination service, which carries opaque control information from the network decision elements to the … |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | https://www.usenix.org/system/files/login/articles/578-hotbots07sums.pdf |
| Alternate Webpage(s) | http://usenix.org/system/files/login/articles/578-hotbots07sums.pdf |
| Alternate Webpage(s) | http://www.cse.usf.edu/~anda/cop6611/reading/hotbots07sums.pdf |
| Alternate Webpage(s) | http://static.usenix.org/publications/login/2007-08/openpdfs/hotbots07sums.pdf |
| Alternate Webpage(s) | http://static.usenix.org/legacy/publications/login/2007-08/openpdfs/hotbots07sums.pdf |
| Alternate Webpage(s) | http://usenix.org/legacy/publications/login/2007-08/openpdfs/hotbots07sums.pdf |
| Alternate Webpage(s) | http://www.csee.usf.edu/~anda/cop6611/reading/hotbots07sums.pdf |
| Alternate Webpage(s) | http://www.usenix.org./system/files/login/articles/578-hotbots07sums.pdf |
| Alternate Webpage(s) | https://www.usenix.org/legacy/publications/login/2007-08/openpdfs/hotbots07sums.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |