RESEARCH ARTICLE

On the complexity and manageability of Internet infrastructure

  • Ruixi YUAN , 1 ,
  • Weibo GONG 2
Expand
  • 1. Center for Intelligent and Networked Systems, Department of Automation, Tsinghua University, Beijing 100084, China
  • 2. Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA 01003, USA

Received date: 19 Mar 2011

Accepted date: 10 May 2011

Published date: 05 Sep 2011

Copyright

2014 Higher Education Press and Springer-Verlag Berlin Heidelberg

Abstract

The ever increasing complexity of the Internet has made it impossible to effectively manage the Internet infrastructure. In this paper, we argue that the increased complexity was due to the “random accidents” introduced throughout the evolution of the Internet, such as ad-hoc based routing, cross-layer optimizations. These ad-hoc events increased the vulnerability and degraded the manageability of Internet. We also propose a new framework for network design and deployment, termed “assurable communication networks (ACNs)” that places the manageability in the center in network architecture. We suggest that rigorous mathematical model be developed for the measurement on the impact of manageability and accountability.

Cite this article

Ruixi YUAN , Weibo GONG . On the complexity and manageability of Internet infrastructure[J]. Frontiers of Electrical and Electronic Engineering, 0 , 6(3) : 424 -428 . DOI: 10.1007/s11460-011-0165-8

1
Postel J. Internet Protocol. RFC791, 1981

2
Postel J. Transmission Control Protocol. RFC793, 1981

3
Postel J. User Datagram Protocol. RFC768, 1980

4
Deering S, Hinton R. Internet Protocol Version 6 Specifications. RFC1883, 1995

5
Albert R, Jeong H, Barabási A L. Diameter of the world wide web. Nature, 1999, 401(6749): 130-131

DOI

6
Leland W E, Taqqu M S, Willinger W, Wilson D V. On the self-similar nature of Ethernet traffic (extended version). IEEE/ACM Transactions on Networking, 1994, 2(1): 1-15

DOI

7
Gell-Mann M, Lloyd S. Effective Complexity. Working Paper. Santa Fe Institute, 2003. http://www.santafe.edu/research/publications/workingpapers/03-12-068.pdf

8
Choffnes D, Bustamante F. Taming the torrent: A practical approach to reducing cross-ISP traffic in P2P systems. In: Proceedings of ACM SIGCOMM 2008 Conference on Data Communication. 2008, 363-374

9
Oliveira R, Pei D, Willinger W, Zhang B, Zhang L. In search of the elusive ground truth: The Internet’s AS-level connectivity structure. In: Proceedings of ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 2008, 217-228

10
Wei D X, Jin C, Low S H, Hegde S. FAST TCP: Motivation, architecture, algorithms, performance. IEEE/ACM Transactions on Networking, 2006, 14(6): 1246-1259

DOI

11
Tian Y, Xu K, Ansari N. TCP in wireless environments: Problems and solutions. IEEE Communications Magazine, 2005, 43(3): S27-S32

DOI

12
Veres A, Boda M. The chaotic nature of TCP congestion control. In: Proceedings of the Nineteenth Annual joint Conference of the IEEE Computer and Communications Societies. 2000, 3: 1715-1723

13
Floyd S, Jacobson V. Random early detection gateways for congestion avoidance. IEEE/ACM Transactions on Networking, 1993, 1(4): 397-413

DOI

14
Misra V, Gong W B, Towsley D. Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. 2000, 151-160

DOI

15
China Computer Network Emergency Response Center (CERT/CC). 2010 Internet Security Trend Report. 2011

16
U.S. Government Accountability Office. Cybersecurity, Key Challenges Need to be Addressed to Improve Research and Development. GAO-10-466, 2010

17
Isenberg D. The rise of the stupid network. Computer Telephony, 1997, 16-26

Outlines

/