skip to main content
10.1145/1282380.1282382acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

Ethane: taking control of the enterprise

Published:27 August 2007Publication History

ABSTRACT

This paper presents Ethane, a new network architecture for the enterprise. Ethane allows managers to define a single network-wide fine-grain policy, and then enforces it directly. Ethane couples extremely simple flow-based Ethernet switches with a centralized controller that manages the admittance and routing of flows. While radical, this design is backwards-compatible with existing hosts and switches.

We have implemented Ethane in both hardware and software, supporting both wired and wireless hosts. Our operational Ethane network has supported over 300 hosts for the past four months in a large university network, and this deployment experience has significantly affected Ethane's design.

References

  1. Alterpoint. http://www.alterpoint.com/.Google ScholarGoogle Scholar
  2. BerkeleyDB. http://www.oracle.com/database/berkeley-db.html.Google ScholarGoogle Scholar
  3. Cisco network admission control. http://www.cisco.com/.Google ScholarGoogle Scholar
  4. Consentry. http://www.consentry.com/.Google ScholarGoogle Scholar
  5. Identity engines. http://www.idengines.com/.Google ScholarGoogle Scholar
  6. Microsoft network access protection. http://www.microsoft.com/technet/network/nap/default.mspx.Google ScholarGoogle Scholar
  7. Netfpga home page. http://NetFPGA.org.Google ScholarGoogle Scholar
  8. Openwrt home page. http://openwrt.org/.Google ScholarGoogle Scholar
  9. A. Z. Broder and M. Mitzenmacher. Using multiple hash functions to improve ip lookups. In Proc. INFOCOM, Apr. 2001.Google ScholarGoogle ScholarCross RefCross Ref
  10. D. Caldwell, A. Gilbert, J. Gottlieb, A. Greenberg, G. Hjalmtysson, and J. Rexford. The cutting edge of ip router configuration. SIGCOMM Computer Comm. Rev., 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Caldwell, A. Gilbert, J. Gottlieb, A. Greenberg, G. Hjalmtysson, and J. Rexford. The cutting edge of ip router configuration. SIGCOMM Computer Comm. Rev., 34(1):21--26, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker. SANE: A protection architecture for enterprise networks. In USENIX Security Symposium, Aug. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Demetrescu and G. Italiano. A new approach to dynamic all pairs shortest paths. In Proc. STOC'03, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A clean slate 4D approach to network control and management. In SIGCOMM Computer Comm. Rev., Oct. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith. Implementing a distributed firewall. In ACM Conference on Computer and Communications Security, pages 190--199, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Z. Kerravala. Configuration management delivers business resiliency. The Yankee Group, Nov. 2002.Google ScholarGoogle Scholar
  17. A. Myers, E. Ng, and H. Zhang. Rethinking the service model: Scaling ethernet to a million nodes. In Proc. HotNets, Nov. 2004.Google ScholarGoogle Scholar
  18. P. Newman, T. L. Lyon, and G. Minshall. Flow labelled IP: A connectionless approach to ATM. In INFOCOM (3), 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney. A first look at modern enterprise traffic. In Proc. Internet Measurement Conference, Oct. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. J. Perlman. Rbridges: Transparent routing. In Proc. INFOCOM, Mar. 2004.Google ScholarGoogle Scholar
  21. J. Rexford, A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, G. Xie, J. Zhan, and H. Zhang. Network-wide decision making: Toward a wafer-thin control plane. In Proc. HotNets, Nov. 2004.Google ScholarGoogle Scholar
  22. T. Roscoe, S. Hand, R. Isaacs, R. Mortier, and P. Jardetzky. Predicate routing: Enabling controlled networking. SIGCOMM Computer Comm. Rev., 33(1), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Wool. The use and usability of direction-based filtering in firewalls. Computers & Security, 26(6):459--468, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Wool. A quantitative study of firewall configuration errors. IEEE Computer, 37(6):62--67, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg, and G. Hjalmtysson. Routing design in operational networks: A look from the inside. In Proc. SIGCOMM, Sept. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Ethane: taking control of the enterprise

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
          August 2007
          432 pages
          ISBN:9781595937131
          DOI:10.1145/1282380
          • cover image ACM SIGCOMM Computer Communication Review
            ACM SIGCOMM Computer Communication Review  Volume 37, Issue 4
            October 2007
            420 pages
            ISSN:0146-4833
            DOI:10.1145/1282427
            Issue’s Table of Contents

          Copyright © 2007 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 27 August 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate554of3,547submissions,16%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader