CSE logo University of Washington Computer Science & Engineering
 NEBULA: Future Internet Architecture
  CSE Home   About Us    Search    Contact Info 

Personnel
 Vincent Liu
 Adam Lerner
 Thomas Anderson
 Arvind Krishnamurthy
    The next decade will continue to be characterized by the tussle between the increasing reliance on networked systems and the various factors that undermine their reliability. Networked computing will be increasingly integral to all aspects of society, including entertainment, business operations, government services, energy grid control, medical care, and so on. Countering this trend, networked systems will face challenges at every level of the protocol stack. The frequent ``brownouts'' observed in the Internet suggest that the state of the art in providing even basic, uninterrupted, network communication is weak. Even if network communication is possible, service could be disrupted by both overt state actors (e.g., censorship) and non-state actors (e.g., DDoS attacks by botnets and traffic filtering by ISPs). Even without malicious attempts to disrupt the infrastructure, distributed services face challenges in providing consistent and cost-effective service at scale to a geographically diverse client base. To bridge this gap, we are pursuing the following projects that seek to increase the network's resiliency and enable more robust and trustworthy networked services.

Privacy-preserving and Censorship-resistant Internet

Over the years, many attempts have been made to define a security architecture for the Internet. Most have focused on authentication in order to prevent faking of IPs and routes. In this project, we ask a different question: what if privacy, not authentication, was our overriding goal? We argue that privacy should be a first principle in the design of a universal data network. Privacy is something that we cannot easily add on top of the Internet. Encrypting traffic can protect the contents, but this would still disclose with whom we are communicating to every ISP along the path. Laundering packets through an anonymizing overlay, such as Tor, can conceal the source and the destination, but governments can blacklist Tor nodes or monitor Tor exit traffic so that traffic analysis can reveal the source. After all, traffic to or from Tor essentially advertises itself as probably worth tracking. Instead, we take an explicitly clean slate approach. It is not our intent to describe a plausible story for how we might fix the existing Internet to improve privacy---there are immense government and corporate interests that would place barriers to any such fix. Rather, we ask the much simpler question: Is a censorship-resistant network layer even possible? Can we build a network that is neutral by construction?

Fault-tolerant Datacenter Networks

The data center network is increasingly a cost, reliability and performance bottleneck for cloud computing. Although multi-tree topologies can provide scalable bandwidth and traditional routing algorithms can provide eventual fault tolerance, we argue that recovery speed can be dramatically improved through the co-design of the network topology, routing algorithm and failure detector. We create an engineered network and routing protocol that directly addresses the failure characteristics observed in data centers. At the core of our proposal is a novel network topology that is essentially a reworked fat-tree with better fault tolerance properties. We then create a series of failover protocols that benefit from this topology and are designed to cascade and complement each other. The resulting system, called F10, is able to quickly reestablish connectivity, restore direct routes and perform global load balancing, even in the presence of multiple failures. Our results show that F10 has much lower packet loss rates than prior proposals following network link and switch failures. In fact, our experiments show that PortLand has 7.6x as many losses as F10 under realistic failure and traffic loads.

Prior work

Consensus routing: the Internet as a distributed system
J. John, E. Katz-Bassett, A. Krishnamurthy, T. Anderson, A. Venkataramani
Phalanx: Withstanding multimillion-node botnets
C. Dixon, T. Anderson, A. Krishnamurthy


CSE logo Computer Science & Engineering
Box 352350, University of Washington
Seattle, WA  98195-2350
(206) 543-1695
[comments to arvind]
Privacy policy and terms of use