Sciweavers

HOTOS
2009
IEEE

An End to the Middle

14 years 3 months ago
An End to the Middle
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs, load balancers, traffic shapers, deep packet intrusion detection, virtual private networks, network monitors, transparent web caches, content delivery networks, and the list goes on and on. However, most smaller networks in homes, small businesses and the developing world are left without this level of support. Further, the management burden and limitations of middleboxes are apparent even in enterprise networks. We argue for a shift from using proprietary middlebox harware as the dominant tool for managing networks toward using open software running on end hosts. We show that functionality that seemingly must be in the network, such as NATs and traffic prioritization, can be more cheaply, flexibly, and securely provided by distributed software running on end hosts, working in concert with vastly simplified ...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander
Added 16 Aug 2010
Updated 16 Aug 2010
Type Conference
Year 2009
Where HOTOS
Authors Colin Dixon, Arvind Krishnamurthy, Thomas E. Anderson
Comments (0)