Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Internet indirection infrastructure
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Search space reduction in QoS routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
QoS-Assured Service Composition in Managed Service Overlay Networks
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
An algebraic approach to practical and scalable overlay network monitoring
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Spurring adoption of DHTs with openhash, a public DHT service
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Darwin: customizable resource management for value-added network services
IEEE Network: The Magazine of Global Internetworking
Towards building large scale multimedia systems and applications: challenges and status
Proceedings of the first ACM international workshop on Multimedia service composition
Transparent end-host-based service composition through network virtualization
Proceedings of the first ACM international workshop on Multimedia service composition
Towards a framework for network control composition
Proceedings of the 2006 SIGCOMM workshop on Internet network management
Implementation of end-to-end abstractions in a network service architecture
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Design of a network service processing platform for data path customization
Proceedings of the 2nd ACM SIGCOMM workshop on Programmable routers for extensible services of tomorrow
CrossTalk: scalably interconnecting instant messaging networks
Proceedings of the 2nd ACM workshop on Online social networks
Hi-index | 0.00 |
We consider the problem of service composition in a wide area network, where an end-user can send its packets through intermediate processing points (middleboxes) which can perform a variety of services. Example of such services are filtering, intrusion detection, anonymization, transcoding, and caching. In this paper, we argue that the Internet Indirection Infrastructure (i3)--an overlay network architecture that enables users to locate services and control the path followed by their packets--provides a natural platform for service composition. We discuss the challenges in implementing service compositions on top of i3, and suggest several approaches to address these challenges.