Abstract
A new model for describing the Internet reflects today's reality and the future's needs.
- Andersen, D.G. Mayday: Distributed filtering for Internet services. In Proceedings of the 4<sup>th</sup> USENIX Symposium on Internet Technologies and Systems, 2013. Google ScholarDigital Library
- Andersen, D.G. Balakrishnan, H., Feamster, N., Koponen, T., Moon, D. and Shenker, S. Accountable Internet Protocol (AIP). In Proceedings of ACM SIGCOMM, 2008. Google ScholarDigital Library
- Benson, T., Akella, A., Shaikh, A. and Sahu, S. Clous-NaaS: A cloud networking platform for enterprise applications. In Proceedings of the 2<sup>nd</sup> ACM Symposium on Cloud Computing, 2011. Google ScholarDigital Library
- Blumenthal, M.S. and Clark, D.G. Rethinking the design of the Internet: The end-to-end arguments vs. the brave new world. ACM Trans. Internet Technology 1, 1 (Aug. 2001), 70--109. Google ScholarDigital Library
- Clark, D.D. The design philosophy of the DARPA Internet protocols. In Proceedings of ACM SIGCOMM, 1988. ACM. Google ScholarDigital Library
- Clark, D.D., Wroclawski, J., Sollins, K.R. and Braden, R. Tussle in cyberspace: Defining tomorrow's Internet. IEEE/ACM Trans. Networking 13, 3 (June 2005), 462--475. Google ScholarDigital Library
- Day, J. Patterns in Network Architecture: A Return to Fundamentals. Prentice Hall, 2008. Google ScholarDigital Library
- Farinacci, D., Fuller, V., Meyer, D. and Lewis, D. The Locator/ID Separation Protocol (LISP). IETF Request for Comments 6830. (Jan. 2013).Google Scholar
- Farinacci, D., Lewis, D., Meyer, D., and White, C. 2017. LISP Mobile Node. IETF Network Working Group Internet Draft draft-ietf-lisp-mn-04. (Oct. 2017).Google Scholar
- Feamster, N., Rexford, J. and Zegura, E. The road to SDN: An intellectual history of programmable networks. ACM Queue; https://queue.acm.org/detail.cfm?id=2560327. Google ScholarDigital Library
- Fuller, V., Li, T., Yu, J. and Varadhan, K. Classless interdomain routing (CIDR): An address assignment and aggregation strategy. IETF Network Working Group Request for Comments 1519. (1993). Google ScholarDigital Library
- Handley, M. Why the Internet only just works. BT Technology Journal 24, 3 (July 2006), 119--129. Google ScholarDigital Library
- ITU. Information Technology---Open Systems Interconnection---Basic Reference Model: The basic model. ITU-T Recommendation X.200. (1994).Google Scholar
- Karsten, M., Keshav, S. and Prasad, S. An axiomatic basis for communication. In Proceedings of HotNets-V, 2006. ACM.Google Scholar
- Kim, C., Caesar, M. and Rexford, J. SEATTLE: A scalable Ethernet architecture for large enterprises. ACM Trans. Computer Systems 29, 1 (2011). Google ScholarDigital Library
- Qazi, Z.A., Tu, C.C., Chiang, L., Miao, R., Sekar, V. and Yu, M. SIMPLE-fying middlebox policy enforcement using SDN. In Proceedings of ACM SIGCOMM. 2013. Google ScholarDigital Library
- Roscoe, T. The end of Internet architecture. In Proceedings of the 5<sup>th</sup> Workshop on Hot Topics in Networks, 2006.Google Scholar
- Saltzer, J., Reed, D. and Clark, D.D. End-to-end arguments in system design. ACM Trans. Computer Systems 2, 4 (Nov. 1984), 277--288. Google ScholarDigital Library
- Spatscheck, O. Layers of success. IEEE Internet Computing 17, 1 (2013), 3--6. Google ScholarDigital Library
- Venkataramani, A., Kurose, J.F., Raychaudhuri, D., Nagaraja, K., Banerjee, S. and Mao, Z.M. MobilityFirst: A mobility-centric and trustworthy Internet architecture. ACM SIGCOMM Computer Communication Review 44, 3 (July 2014), 74--80. Google ScholarDigital Library
- Wang, Y., Matta, I., Esposito, F. and Day, J. Introducing ProtoRINA: A prototype for programming recursive-networking policies. ACM SIGCOMM Computer Communications Review 44, 3 (July 2014). Google ScholarDigital Library
- Yu, M., Rexford, J., Sun, X., Rao, S. and Feamster, N. A survey of virtual LAN usage in campus networks. IEEE Communications 49, 7 (July 2011), 98--103.Google Scholar
- Zave, P. and Rexford, J. The design space of network mobility. In Recent Advances in Networking, Olivier Bonaventure and Hamed Haddadi (Eds). ACM SIGCOMM, 2013.Google Scholar
- Zave, P. and Rexford, J. Network Security; https://www.cs.princeton.edu/courses/archive/fall18/cos561/papers/Security18.pdf.Google Scholar
- Zhang, L., Afanasyev, A., Burke, J. and Jacobson, V. Named Data Networking. ACM SIGCOMM Computer Communication Review 44, 3 (July 2014), 66--73. Google ScholarDigital Library
Index Terms
- The compositional architecture of the internet
Recommendations
Assuring architectural properties during compositional architecture design
SC'11: Proceedings of the 10th international conference on Software compositionNowadays, software architectures are built by reusing proven architectural building blocks. The several building blocks are composed together to form the desired software architecture. Each block has its specific architectural properties which were ...
A constructive approach to compositional architecture design
ECSA'11: Proceedings of the 5th European conference on Software architectureMost of today's software systems are large-scaled and have to manage manifold demands. To ease their development, reusable and proven architectural building blocks, for example architectural patterns, are often composed to the desired architecture. ...
High quality VoD service architecture on broadband internet
ICCSA'03: Proceedings of the 2003 international conference on Computational science and its applications: PartIIIn this paper, for broadband Internet users, high quality VOD (Video on Demand) service architecture including network and platform is presented. As the existing IP-network cannot provide a guaranteed bandwidth, a local server based network architecture ...
Comments