skip to main content
10.1145/2070562.2070583acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

The middlebox manifesto: enabling innovation in middlebox deployment

Published:14 November 2011Publication History

ABSTRACT

Most network deployments respond to changing application, workload, and policy requirements via the deployment of specialized network appliances or "middleboxes". Despite the critical role that middleboxes play in introducing new network functionality, they have been surprisingly ignored in recent efforts for designing networks that are amenable to innovation. We make the case that enabling innovation in middleboxes is at least as important, if not more important, as that for traditional switches and routers. To this end, our vision is a world with software-centric middlebox implementations running on general-purpose hardware platforms that are managed via open and extensible management APIs. While these principles have been applied in other contexts, they introduce unique opportunities and challenges in the context of middleboxes that we highlight in this paper.

References

  1. http://www.snort.org.Google ScholarGoogle Scholar
  2. Cavium networks. http://www.caviumnetworks.com/.Google ScholarGoogle Scholar
  3. Crossbeam network consolidation. http://bit.ly/qlotDK.Google ScholarGoogle Scholar
  4. Palo alto networks. http://www.paloaltonetworks.com/.Google ScholarGoogle Scholar
  5. Riverbed Networks: WAN Optimization. http://www.riverbed.com/solutions/optimize/.Google ScholarGoogle Scholar
  6. Silver Peak software WAN optimization. http://bit.ly/nCBRst.Google ScholarGoogle Scholar
  7. Untangle. www.untangle.com.Google ScholarGoogle Scholar
  8. World enterprise network security markets. http://bit.ly/gYW4Us.Google ScholarGoogle Scholar
  9. A. Greenberg et al. A Clean Slate 4D Approach to Network Control and Management. ACM SIGCOMM CCR, 35(5), Oct. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Greenlagh et al. Flow Processing and the Rise of Commodity Network Hardware. ACM CCR, Apr. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Shieh et al. SideCar: Building Programmable Datacenter Networks without Programmable Switches. In Proc. HotNets, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Anderson and A. Vahdat. xOMB: eXtensible Open MiddleBoxes. Unpublished Manuscript.Google ScholarGoogle Scholar
  13. B. Anwer et al. Switchblade: A platform for rapid deployment of network protocols on programmable hardware. In SIGCOMM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. Lu et al. ServerSwitch: A Programmable and High Performance Platform for Data Center Networks. In Proc. NSDI, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Han, K. Jang, K. Park, and S. Moon. PacketShader: a GPU-Accelerated Software Router. In Proc. SIGCOMM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Joseph and I. Stoica. Modeling middleboxes. IEEE Network, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. A. Joseph, A. Tavakoli, and I. Stoica. A Policy-aware Switching Layer for Data Centers, In Proc. SIGCOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Caesar et al. Design and implementation of a Routing Control Platform. In Proc. of NSDI, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Casado et al. SANE: A Protection Architecture for Enterprise Networks. In USENIX Security, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Dobrescu et al. RouteBricks: Exploiting Parallelism to Scale Software Routers. In Proc. SOSP, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Kounavis et al. Encrypting the Internet. In Proc. SIGCOMM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. N. Egi et al. Towards high performance virtual routers on commodity hardware. In Proc. CoNEXT, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. N. Gude et al. NOX: Towards an Operating System for Networks. ACM SIGCOMM CCR, July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. N. McKeown et al. OpenFlow: enabling innovation in campus networks. ACM SIGCOMM CCR, 38(2), Apr. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. R. Pang. V. Paxson, R. Sommer, and L. Peterson, binpac: A yacc for Writing Application Protocol Parsers. In Proc. IMC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Proc. USENIX Security Symposium, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. M. Roughan, Robust network planning, Chapter 5, Guide to Reliable Internet Services and Applications.Google ScholarGoogle Scholar
  28. T. Benson et al. Demystifying configuration challenges and trade-offs in network-based isp services. In Proc. SIGCOMM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. V. Sekar et al. cSamp: A System for Network-Wide Flow Monitoring. In Proc. of NSDI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Z. Wang, Z. Qian, Q. Xu, Z. M. Mao, and M. Zhang. An Untold Story of Middleboxes in Cellular Networks. In Proc. SIGCOMM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The middlebox manifesto: enabling innovation in middlebox deployment

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        HotNets-X: Proceedings of the 10th ACM Workshop on Hot Topics in Networks
        November 2011
        148 pages
        ISBN:9781450310598
        DOI:10.1145/2070562

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 November 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate110of460submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader