skip to main content
10.1145/2834050.2834109acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Leveraging the Power of Cloud for Reliable Wide Area Communication

Published:16 November 2015Publication History

ABSTRACT

We make a case for judicious use of cloud infrastructure -- as an overlay to aid IP's best effort service. As an example, we propose ReWAN, a packet recovery service for real time, wide area communication. ReWAN uses cloud-based edge proxies that exchange "recovery" packets, which are used only in case of packet loss. ReWAN leverages the cloud provider's well-connected, global data center network, and its ability to handle many concurrent users. To minimize bandwidth cost, it uses coding to generate a small number of recovery packets that are sent across the inter data center network. The recovery packets use both FEC, which is applied within a user stream, and network coding, which is applied across user streams. If a small fraction of packets within the user stream are lost, ReWAN uses the FEC packets for recovery; for other losses, ReWAN recovers them with the help of other receivers and the network coded packets. Preliminary measurements show the promise of ReWAN in providing a fast and cost effective packet recovery service.

Skip Supplemental Material Section

Supplemental Material

a19.mp4

mp4

833 MB

References

  1. Amazon AWS. http://aws.amazon.com.Google ScholarGoogle Scholar
  2. Microsoft Azure. http://azure.microsoft.com/.Google ScholarGoogle Scholar
  3. Google Cloud. https://cloud.google.com/.Google ScholarGoogle Scholar
  4. Y. Amir and C. Danilov. Reliable communication in overlay networks. In Proc. IEEE DSN, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  5. Y. Amir, C. Danilov, S. Goose, D. Hedqvist, and A. Terzis. 1-800-overlays: using overlay networks to improve voip quality. In Proc. ACM NOSSDAV, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris. Resilient Overlay Networks. In Proc. SOSP, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. N. Rao. Improving web availability for clients with MONET. In Proc. Usenix NSDI, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. V. Bakre and B. Badrinath. Implementation and Performance Evaluation of Indirect TCP. IEEE Transactions on Computers, 46(3):260--278, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Balakrishnan, T. Marian, K. Birman, H. Weatherspoon, and E. Vollset. Maelstrom: Transparent Error Correction for Lambda Networks. In Proc. Usenix NSDI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Castro, P. Druschel, A.-M. Kermarrec, A. Nandi, A. Rowstron, and A. Singh. SplitStream: High-bandwidth Multicast in Cooperative Environments. In Proc. ACM SOSP, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. R. Dogar and P. Steenkiste. Architecting for Edge Diversity: Supporting Rich Services Over an Unbundled Transport. In Proc. ACM CoNext, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. F. R. Dogar, P. Steenkiste, and K. Papagiannaki. Catnap: Exploiting high bandwidth wireless interfaces to save energy for mobile devices. In Proc. ACM MobiSys, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer. In Proc. ACM CCS, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Gritter and D. R. Cheriton. An Architecture for Content Routing Support in the Internet. In Proc. USITS, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. K. Gummadi, H. V. Madhyastha, S. D. Gribble, H. M. Levy, D. Wetherall, et al. Improving the Reliability of Internet Paths with One-hop Source Routing. In Proc. Usenix OSDI, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Han, A. Anand, F. Dogar, B. Li, H. Lim, M. Machado, A. Mukundan, W. Wu, A. Akella, D. G. Andersen, J. W. Byers, S. Seshan, and P. Steenkiste. XIA: Efficient support for evolvable internetworking. In Proc. 9th USENIX NSDI, San Jose, CA, Apr. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. O. Haq and F. Dogar. A Measurement Study of Inter Data Center Paths. Technical Report, 2015. https://goo.gl/453MfE.Google ScholarGoogle Scholar
  18. C.-Y. Hong, S. Kandula, R. Mahajan, M. Zhang, V. Gill, M. Nanduri, and R. Wattenhofer. Achieving high utilization with software-driven WAN. In Proc. SIGCOMM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh, S. Venkata, J.Wanderer, J. Zhou, M. Zhu, et al. B4: Experience with a globally-deployed software defined WAN. In Proc. SIGCOMM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Kandula, I. Menache, R. Schwartz, and S. R. Babbula. Calendaring for wide area networks. 2014.Google ScholarGoogle Scholar
  21. S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft. XORs in the Air: Practical Wireless Network Coding. In Proc. SIGCOMM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Li, X. Yang, S. Kandula, and M. Zhang. Cloudcmp: comparing public cloud providers. In Proc. ACM IMC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Pathak, Y. A. Wang, C. Huang, A. Greenberg, Y. C. Hu, R. Kern, J. Li, and K. W. Ross. Measuring and evaluating TCP splitting for cloud services. In Proc. of PAM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. S. Peter, U. Javed, Q. Zhang, D. Woos, T. Anderson, and A. Krishnamurthy. One tunnel is (often) enough. In Proc. ACM SIGCOMM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Trans. Comput. Syst., 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Y.-H. C. Sanjay, S. G. Rao, S. Seshan, and H. Zhang. A case for end system multicast. In Proc. ACM Sigmetrics, 2002.Google ScholarGoogle Scholar
  27. J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, and V. Sekar. Making middleboxes someone else's problem: network processing as a cloud service. In Proc. SIGCOMM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. A. Singla, B. Chandrasekaran, P. Godfrey, and B. Maggs. The Internet at the Speed of Light. In Proc. ACM HotNets, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet indirection infrastructure. In Proc. SIGCOMM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. L. Subramanian, I. Stoica, H. Balakrishnan, and R. H. Katz. OverQoS: An Overlay Based Architecture for Enhancing Internet QoS. In Proc. Usenix NSDI, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. B. Wicker and V. K. Bhargava. Reed-Solomon codes and their applications. John Wiley & Sons, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Y. Xu, C. Yu, J. Li, and Y. Liu. Video telephony for end-consumers: measurement study of Google+, iChat, and Skype. In Proc. ACM IMC, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. H. Zhang, K. Chen, W. Bai, D. Han, C. Tian, H. Wang, H. Guan, and M. Zhang. Guaranteeing deadlines for inter-datacenter transfers. In Proc. EuroSys, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. B. Y. Zhao, Y. Duan, L. Huang, A. D. Joseph, and J. D. Kubiatowicz. Brocade: Landmark routing on overlay networks. In Peer-to-Peer Systems, pages 34--44. Springer, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Leveraging the Power of Cloud for Reliable Wide Area Communication

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        HotNets-XIV: Proceedings of the 14th ACM Workshop on Hot Topics in Networks
        November 2015
        189 pages
        ISBN:9781450340472
        DOI:10.1145/2834050

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 November 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate110of460submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader