Revisiting the internet hourglass: core strength vs. middle-age spread

Bruce S. Davie
{"title":"Revisiting the internet hourglass: core strength vs. middle-age spread","authors":"Bruce S. Davie","doi":"10.1145/1882486.1882489","DOIUrl":null,"url":null,"abstract":"The threat of commoditization poses a real challenge for service providers. Offering only a \"plain vanilla\" IP packet delivery service limits the options for competitive differentiation. Conversely, embedding additional functionality in the network carries a number of risks -- decreased robustness and increased complexity, for example. The key to addressing this challenge is the careful selection of appropriate functionality to embed in the network. Functions should be added to the network only when they offer value to a wide range of applications, and they should not inhibit the correct operation of applications that do not need them. This talk addresses the question of how novel, useful functions might be embedded \"inside\" the network, and how best to evaluate candidate functions for inclusion.\n For device designers, it is important to understand not only what functions are needed in the network today, but also which ones might provide the most benefit in the future. Because of the uncertainly about exactly what future networks will be expected to do, functions that are selected for inclusion in network devices must be as general as possible, and they should not interfere with the correct operation of the network when they are not needed. Some functions are best implemented as an overlay, leaving the essential network-layer functionality unaffected, while others will need assistance from the fast-path forwarding hardware. We will consider examples of various functions that have been or could be added to \"core\" networks, aiming to understand the tradeoffs both among different functions to add and among different implementation approaches.","PeriodicalId":329300,"journal":{"name":"Symposium on Architectures for Networking and Communications Systems","volume":"190 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Symposium on Architectures for Networking and Communications Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1882486.1882489","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The threat of commoditization poses a real challenge for service providers. Offering only a "plain vanilla" IP packet delivery service limits the options for competitive differentiation. Conversely, embedding additional functionality in the network carries a number of risks -- decreased robustness and increased complexity, for example. The key to addressing this challenge is the careful selection of appropriate functionality to embed in the network. Functions should be added to the network only when they offer value to a wide range of applications, and they should not inhibit the correct operation of applications that do not need them. This talk addresses the question of how novel, useful functions might be embedded "inside" the network, and how best to evaluate candidate functions for inclusion. For device designers, it is important to understand not only what functions are needed in the network today, but also which ones might provide the most benefit in the future. Because of the uncertainly about exactly what future networks will be expected to do, functions that are selected for inclusion in network devices must be as general as possible, and they should not interfere with the correct operation of the network when they are not needed. Some functions are best implemented as an overlay, leaving the essential network-layer functionality unaffected, while others will need assistance from the fast-path forwarding hardware. We will consider examples of various functions that have been or could be added to "core" networks, aiming to understand the tradeoffs both among different functions to add and among different implementation approaches.
重新审视互联网沙漏:核心力量vs.中年扩张
商品化的威胁对服务提供商构成了真正的挑战。只提供“普通的”IP分组传送服务限制了竞争差异化的选择。相反,在网络中嵌入额外的功能会带来许多风险——例如,鲁棒性降低和复杂性增加。解决这一挑战的关键是仔细选择适当的功能嵌入到网络中。只有当功能为广泛的应用程序提供价值时,它们才应该添加到网络中,并且它们不应该妨碍不需要它们的应用程序的正确操作。本次演讲将讨论如何将新颖、有用的功能嵌入到网络中,以及如何最好地评估候选功能。对于设备设计师来说,重要的是不仅要了解当今网络需要哪些功能,还要了解哪些功能可能在未来提供最大的好处。由于不确定未来的网络将被期望做什么,因此选择包含在网络设备中的功能必须尽可能通用,并且在不需要它们时不应干扰网络的正确操作。有些功能最好作为覆盖实现,不影响基本的网络层功能,而其他功能则需要快速路径转发硬件的帮助。我们将考虑已经或可以添加到“核心”网络的各种功能的示例,旨在了解要添加的不同功能和不同实现方法之间的权衡。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信