skip to main content
10.1145/1544012.1544027acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

DaVinci: dynamically adaptive virtual networks for a customized internet

Published:09 December 2008Publication History

ABSTRACT

Running multiple virtual networks, customized for different performance objectives, is a promising way to support diverse applications over a shared substrate. Despite being simple, a static division of resources between virtual networks can be highly inefficient, while dynamic resource allocation runs the risk of instability. This paper uses optimization theory to show that adaptive resource allocation can be stable and can maximize the aggregate performance across the virtual networks. In the DaVinci architecture, each substrate link periodically reassigns bandwidth shares between its virtual links; while at a smaller timescale, each virtual network runs a distributed protocol that maximizes its own performance objective independently. Numerical experiments with a mix of delay-sensitive and throughput-sensitive traffic show that the bandwidth shares converge quickly to the optimal values. We demonstrate that running several custom protocols in parallel and allocating resource adaptively can be more efficient, more flexible, and easier to manage than a compromise "one-size-fits-all" design.

References

  1. T. Anderson, L. Peterson, S. Shenker, and J. Turner, "Overcoming the Internet impasse through virtualization," Computer, vol. 38, pp. 34--41, April 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. S. Turner and D. E. Taylor, "Diversifying the Internet," in Proc. IEEE GLOBECOM, November 2005.Google ScholarGoogle Scholar
  3. N. Feamster, L. Gao, and J. Rexford, "How to lease the Internet in your spare time," ACM SIGCOMM Computer Communication Review, pp. 61--64, January 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. McPherson, D. O'Leary, D. Ward, E. Brendel, O. Aruj, P. Agarwal, R. Hartani, and S. Poretsky, "Core Network Design and Vendor Prophecies," in Proc. NANOG, June 2003.Google ScholarGoogle Scholar
  5. "Juniper Networks: Intelligent Logical Router Service." http://www.juniper.net/solutions/literature/white_papers/200097.pdf.Google ScholarGoogle Scholar
  6. "Cisco opening up IOS," December 2007. http://www.networkworld.com/news/2007/121207-cisco-ios.html.Google ScholarGoogle Scholar
  7. "Partner Solution Development Platform Opens Opportunity to Accelerate the Pace of Network Innovation with JUNOS Software," December 2007. http://www.juniper.net/company/presscenter/pr/2007/pr-071210.html.Google ScholarGoogle Scholar
  8. R. Braden, D. Clark, and S. Shenker, "Integrated Services in the Internet Architecture: An Overview." RFC 1633, June 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Chen and K. Nahrstedt, "An overview of quality-of-service routing for the next generation high-speed networks: Problems and solutions," IEEE Network Magazine, November/December 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. F. Kuipers, T. Korkmaz, M. Krunz, and P. V. Mieghem, "Overview of constraint-based path selection algorithms for QoS routing," IEEE Communication Magazine, pp. 50--55, December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, "An Architecture for Differentiated Services." RFC 2475, October 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. I. Matta and A. U. Shankar, "Type-of-service routing in datagram delivery systems," IEEE J. on Selected Areas in Communications, vol. 13, pp. 1411--1425, October 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Psenak, S. Mirtorabi, A. Roy, L. Nguyen, and P. Pillay-Esnault, "Multi-Topology (MT) Routing in OSPF." RFC 4915, June 2007.Google ScholarGoogle Scholar
  14. K.-W. Kwong, R. Guerin, A. Shaikh, and S. Tao, "Improving service differentiation in IP networks through dual topology routing," in Proc. CoNEXT, December 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris, "Resilient Overlay Networks," in Proc. Symposium on Operating Systems Principles, October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. X. Wei, C. Jin, S. H. Low, and S. Hegde, "FAST TCP: Motivation, architecture, algorithms, performance," IEEE/ACM Trans. Networking, December 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Jannotti, D. K. Gifford, K. L. Johnson, M. F. Kaashock, and J. O'Toole, "Overcast: Reliable multicasting with an overlay network," in Proc. Operating Systems Design and Implementation, October 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Y. Chu, S. G. Rao, S. Seshan, and H. Zhang, "Enabling conferencing applications on the Internet using an overlay multicast architecture," in Proc. ACM SIGCOMM, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. L. Subramanian, I. Stoica, H. Balakrishnan, and R. Katz, "OverQoS: An overlay based architecture for enhancing Internet QoS," in Proc. Networked Systems Design and Implementation, September 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Keralapura, C.-N. Chuah, N. Taft, and G. Iannaccone, "Race conditions in coexisting overlay networks," IEEE/ACM Trans. Networking, vol. 16, no. 1, pp. 1--14, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. E. Rosen and Y. Rekher, "BGP/MPLS VPNs." RFC 2547, March 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Bavier, N. Feamster, M. Huang, L. Peterson, and J. Rexford, "In VINI Veritas: Realistic and controlled network experimentation," in Proc. ACM SIGCOMM, August 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. S. Turner, "A proposed architecture for the GENI backbone platform," in Proc. Architecture for Networking and Communications Systems, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Chiang, S. H. Low, R. A. Calderbank, and J. C. Doyle, "Layering as optimization decomposition," Proceedings of the IEEE, January 2007.Google ScholarGoogle Scholar
  25. J. He, M. Suchara, M. Bresler, M. Chiang, and J. Rexford, "Rethinking Internet Traffic Management: From Multiple Decompositions to A Practical Protocol," in Proc. CoNEXT, December 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. U. Javed, M. Suchara, J. He, and J. Rexford, "Multipath protocol for delay-sensitive traffic," in Proc. the First International Conference on COMmunication Systems and NETworkS (COMSNETS), January 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. He and J. Rexford, "Towards Internet-wide Multipath Routing," IEEE Network Magazine, March 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. He, M. Suchara, M. Bresler, J. Rexford, and M. Chiang, "From Multiple Decompositions to TRUMP: Traffic Management Using Multipath Protocol," March 2008. in submission to IEEE/ACM Transactions on Networking, www.cs.princeton.edu/~jrex/papers/conext07-long.pdf.Google ScholarGoogle Scholar
  29. D. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. Wehrle, "OCALA: An architecture for supporting legacy applications over overlays," in Proc. Networked Systems Design and Implementation, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. H. V. Madhyatha, A. Venkataramani, A. Krishnamurthy, and T. Anderson, "Oasis: An overlay-aware network stack," in Proc. ACM SIGOPS, January 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. "GENI opt-in working group." http://geni.net/wg/opt-in-wg.html.Google ScholarGoogle Scholar
  32. E. Rosen, A. Viswanathan, and R. Callon, "Multiprotocol Label Switching Architecture." RFC 3031, January 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, and D. Lewin, "Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web," in Proc. ACM STOC, June 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. I. Avramopoulos, J. Rexford, D. Syrivelis, and S. Lalis, "Counteracting discrimination against network traffic." Princeton University Computer Science Technical Report TR-794-07, August 2007.Google ScholarGoogle Scholar
  35. J. Mo and J. C. Walrand, "Fair End-to-end Window-based Congestion Control," IEEE/ACM Trans. Networking, vol. 8, pp. 556--567, October 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. H. Low, "A duality model of TCP and queue management algorithms," IEEE/ACM Trans. Networking, vol. 11, pp. 525--536, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. J. Pongsajapan and S. Low, "Reverse engineering TCP/IP-like networks using delay-sensitive utility functions," in Proc. IEEE INFOCOM, May 2007.Google ScholarGoogle Scholar
  38. Y. Li, M. Chiang, A. R. Calderbank, and S. Diggavi, "Optimal delay-rate-reliability tradeoff in networks with composite links," in Proc. IEEE INFOCOM, May 2007.Google ScholarGoogle Scholar
  39. X. Lin and N. B. Shroff, "Utility Maximization for Communication Networks with Multi-path Routing," IEEE Trans. Automatic Control, vol. 51, May 2006.Google ScholarGoogle ScholarCross RefCross Ref
  40. L. S. Lasdon, Optimization Theory for Large Systems. Macmillian, 1970.Google ScholarGoogle Scholar
  41. D. P. Bersekas, Nonlinear Programming. Athena Scientific, second ed., 1999.Google ScholarGoogle Scholar
  42. Abilene Backbone. http://abilene.internet2.edu/.Google ScholarGoogle Scholar

Index Terms

  1. DaVinci: dynamically adaptive virtual networks for a customized internet

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CoNEXT '08: Proceedings of the 2008 ACM CoNEXT Conference
            December 2008
            526 pages
            ISBN:9781605582108
            DOI:10.1145/1544012

            Copyright © 2008 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 9 December 2008

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate198of789submissions,25%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader