SALMA: A Novel Middlebox Infrastructure System Based on Integrated Subnets
Author:
AlGhadhban AmerORCID, Showail AhmadORCID
Abstract
Middleboxes are critical components in today’s networks. Due to the variety of network/security policies and the limitations of routing protocols, middleboxes are installed in multiple physical locations to face high traffic with few considerations for efficiency. Reducing the number of deployed middleboxes would reduce capital and operation costs. Moreover, some flows prefer to bypass one or more in-path middlebox where they provide useless services, such as payload compression for multimedia streams. These challenges can be partially tackled by network function virtualization (NFV) schemes with the costs of performance reduction and replacement expenses. Given the rapid growth and the wide adoption of software-defined networking solutions and the recent advances in managing middleboxes’ configuration, the consolidation of middleboxes is becoming easier than before. We designed and evaluated SALMA, a new pre-NFV practical solution that systematically recreates the infrastructure of middleboxes by proposing the Integrated Middleboxes Subnets scheme. In this work, we attempted to reduce the number of installed middleboxes by implementing horizontal integration of middleboxes’ functions, such as every pair of middleboxes being integrated into a dedicated hardware box. We support the motivation for creating SALMA with a practical survey of in-production middleboxes from 30 enterprises. Our solution addresses key challenges of middleboxes, including cost, utilization, flexibility, and load balancing. SALMA’s performance has been evaluated experimentally as well.
Subject
Information Systems and Management,Computer Networks and Communications,Modeling and Simulation,Control and Systems Engineering,Software
Reference59 articles.
1. Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., and Sekar, V. (2012, January 13–17). Making Middleboxes Someone else’s Problem: Network Processing As a Cloud Service. Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2012, SIGCOMM ’12, Helsinki, Finland. 2. (2022, August 03). Cloud Security Market to Be Worth $12 Billion by 2022, Here’s Why. Available online: https://www.techrepublic.com/article/cloud-security-market-to-be-worth-12-billion-by-2022-heres-why/. 3. Zhang, Y., Beheshti, N., Beliveau, L., Lefebvre, G., Manghirmalani, R., Mishra, R., Patneyt, R., Shirazipour, M., Subrahmaniam, R., and Truchan, C. (2013, January 7–10). StEERING: A software-defined networking for inline service chaining. Proceedings of the 2013 21st IEEE International Conference on Network Protocols (ICNP), Goettingen, Germany. 4. Sekar, V., Egi, N., Ratnasamy, S., Reiter, M.K., and Shi, G. (2012, January 25–27). Design and Implementation of a Consolidated Middlebox Architecture. Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI’12, San Jose, CA, USA. 5. Fayazbakhsh, S.K., Chiang, L., Sekar, V., Yu, M., and Mogul, J.C. (2014, January 2–4). Enforcing Network-wide Policies in the Presence of Dynamic Middlebox Actions Using Flowtags. Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, NSDI’14, Seattle, WA, USA.
|
|