Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Review Article

Architecture, Ability, and Adaptability of Recursive Internetworking Architecture - A Review

Author(s): Bhushana Samyuel Neelam* and Benjamin A. Shimray

Volume 15, Issue 7, 2022

Published on: 28 June, 2021

Article ID: e190522194095 Pages: 7

DOI: 10.2174/2666255814666210615144943

Price: $65

Abstract

The ever-increasing dependency of the utilities on networking brought several cyber vulnerabilities and burdened them with dynamic networking demands like QoS, multihoming, and mobility. As the existing network was designed without security in context, it poses several limitations in mitigating the unwanted cyber threats and struggling to provide an integrated solution for the novel networking demands. These limitations resulted in the design and deployment of various add-on protocols that made the existing network architecture a patchy and complex network. The proposed work introduces one of the future internet architectures, which seem to provide abilities to mitigate the above limitations. Recursive internetworking architecture (RINA) is one of the future internets and appears to be a reliable solution with its promising design features. RINA extended inter-process communication to distributed inter-process communication and combined it with recursion. RINA offered unique inbuilt security and the ability to meet novel networking demands with its design. It has also provided integration methods to make use of the existing network infrastructure. The present work reviews the unique architecture, abilities, and adaptability of RINA based on various research works of RINA. The contribution of this article is to expose the potential of RINA in achieving efficient networking solutions among academia and industry.

Keywords: Future internets, network architecture, programmable networks, Interprocess communication, cyber resiliency, recursive internetworking architecture (RINA).

Graphical Abstract

[1]
V. Tsaoussidis, and I. Matta, "Open issues on TCP for mobile computing", Wirel. Commun. Mob. Comput., vol. 2, no. 1, pp. 3-20, 2002.
[http://dx.doi.org/10.1002/wcm.30]
[2]
H. Balakrishnan, S. Seshan, E. Amir, and R.H. Katz, "Improving TCP/IP perfromance over wireless networks", In Proceedings Of The Annual International Conference On Mobile Computing And Networking, MOBICOM, 1995, pp. 2-11
[http://dx.doi.org/10.1145/215530.215544]
[3]
R. Caceres, and L. Iftode, Effects of mobility on reliable transport protocolsProceedings - International Conference On Distributed Computing Systems, Poznan, Poland, 1994, pp. 12-20.
[http://dx.doi.org/10.1109/ICDCS.1994.302385]
[4]
P. Mateti, Security in distributed and networking systems.Secur. Distrib. Netw. Syst., vol. 1. 2010, p. 512.
[5]
S.M. Bellovin, "A look back at ‘security problems in the TCP/IP protocol suite", In 20th Annual Computer Security Applications Conference, 2004, pp. 229-249
[http://dx.doi.org/10.1109/CSAC.2004.3]
[6]
M. Al-Jarrah, and A.K.R. Tamimi, "A thin security layer protocol over IP protocol on TCP/IP suite for security enhancement”, 2006 Innov", Inf. Technol. IIT, pp. 1-5, 2006.
[7]
A. Pandey, and J.R. Saini, "Attacks & Defense Mechanisms for TCP/ IP Based Protocols", Int. J. Eng. Innov. Res., vol. 3, no. 1, pp. 17-23, 2014.
[8]
A.H. Alqahtani, and M. Iftikhar, "TCP / IP attacks, defenses and security tools", Proc. IEEE Symp. Secur. Priv., vol. 1, no. 10, pp. 42-47, 2013.
[9]
B. Harris, and R. Hunt, "TCP/IP security threats and attack methods", Comput. Commun., vol. 22, no. 10, pp. 885-897, 1999.
[http://dx.doi.org/10.1016/S0140-3664(99)00064-X]
[10]
E. Grasa, O. Rysavy, O. Lichtner, H. Asgari, J. Day, and L. Chitkushev, "From protecting protocols to layers: Designing, implementing and experimenting with security policies in RINA", In 2016 IEEE Int. Conf. Commun. ICC 2016, 2016, pp. 1-7
[http://dx.doi.org/10.1109/ICC.2016.7510780]
[11]
J. Day, "How in the Heck do you lose a layer!?", In 2011 Int. Conf. Netw. Futur. NOF 2011 - Proc, 2011, pp. 135-143
[http://dx.doi.org/10.1109/NOF.2011.6126673]
[12]
E. Trouva, Is the internet an unfinished demo? meet RINA!Teren. Netw. Conf. 2011 “Enabling Communities, TNC 2011, 2011, pp. 1-12.
[13]
H. Asgari, S. Haines, and O. Rysavy, "Identification of threats and security risk assessments for recursive internet architecture", IEEE Syst. J., vol. 12, no. 3, pp. 2437-2448, 2018.
[http://dx.doi.org/10.1109/JSYST.2017.2765178]
[14]
J. Barron, M. Crotty, E. Elahi, R. Riggio, D.R. Lopez, and M.P. De Leon, "Towards self-adaptive network management for a recursive network architecture", In Proc. NOMS 2016 - 2016 IEEE/IFIP Netw. Oper. Manag. Symp., 2016, pp. 1143-1148
[http://dx.doi.org/10.1109/NOMS.2016.7502977]
[15]
J. Day, Patterns in network architecture, 2007.
[16]
S.M. Bellovin, "Security problems in the TCP/IP protocol suite", ACM SIGCOMM Comput. Commun. Rev., vol. 19, no. 2, pp. 32-48, 1989.
[http://dx.doi.org/10.1145/378444.378449]
[17]
F. Goldstein, J. Day, and J. Nolan, "The Last Waltz and Moving Beyond TCP/IP", J. Inst. Telecommun. Prof., vol. 5, no. 3, pp. 42-50, 2011.
[18]
E. Grasa, Investigating RINA as an alternative to TCP / IP (IRATI)., Eurpeon Commision, 2014.
[19]
I. Matta, J. Day, and K. Mattar, "Networking is IPC ’: A guiding principle to a better internet", In Proceedings of the 2008 ACM CoNEXT Conference, 2008, pp. 1-6
[20]
S. Vrijders, "Prototyping the recursive internet architecture: The IRATI project approach", IEEE Netw., vol. 28, no. 2, pp. 20-25, 2014.
[http://dx.doi.org/10.1109/MNET.2014.6786609]
[21]
Y.W.F.E.I. Matta, and J. Day, "RINA: An architecture for policy-based dynamic service management", Tech. Rep. BUCS-TR-2013-014, 2015.
[22]
G. Gursun, I. Matta, and K. Mattar, "Revisiting a soft-state approach to managing reliable transport connections", Int. Work. Protoc. Futur. Large-Scale Divers. Netw. Transp., 2010.
[23]
J.G. Fletcher, and R.W. Watson, "Mechanisms for a reliable timer-based protocol", Comput. Netw., vol. 2, no. 4-5, pp. 271-290, 1978.
[http://dx.doi.org/10.1016/0376-5075(78)90006-5]
[24]
C. Science, Recursive Internetworking Architecture (Rina) Boston University Prototype Programming Manual (version 1.0)Technical Report BUCS-TR-2013-013, Computer Science Department, Boston University, November 11 2013.
[25]
M. Tarzan, L. Bergesio, and E. Grasa, "Error and flow control protocol (EFCP) design and implementation: A data transfer protocol for the recursive inter network architecture", In In 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), 2019.
[http://dx.doi.org/10.1109/ICIN.2019.8685905]
[26]
V. Maffione, F. Salvestrini, E. Grasa, L. Bergesio, and M. Tarzan, "A software development kit to exploit RINA programmability", In in 2016 IEEE International Conference on Communications (ICC), 2016.
[http://dx.doi.org/10.1109/ICC.2016.7510711]
[27]
A. T. Campbeu, H. G. De Meer, M. E. Kounavis, K. Mik, J. B. Vicente, and D. Viuela, P7-Campbell.Pdf, pp. 7-23.
[28]
A. Azzouni, N.T.M. Trang, R. Boutaba, and G. Pujolle, Limitations of openflow topology discovery protocol2017 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-HocNet), Budva, Montenegro, 2017.
[29]
B.J. van Asten, N.L.M. van Adrichem, and F.A. Kuipers, "Scalability and resilience of software-defined networking: An overview", arXiv [cs.NI], 2014.
[30]
S. Leon, J. Perello, E. Grasa, D. Careglio, and S. Spadaro, "On the Benefits of RINA over programmable optical networks for dynamic and smart resource management", In Int. Conf. Transparent Opt. Networks, 2015, pp. 2-5
[http://dx.doi.org/10.1109/ICTON.2015.7193400]
[31]
P. Teymoori, "Congestion control in the recursive InterNetworking Architecture (RINA", In 2016 IEEE International Conference on Communications (ICC), 2016.
[http://dx.doi.org/10.1109/ICC.2016.7510818]
[32]
Y. Wang, I. Matta, and N. Akhtar, "Experimenting with routing policies using ProtoRINA over GENI,” Proc. - 2014 3rd GENI Res", Educ. Exp. Work. GREE, vol. 2014, pp. 61-64, 2014.
[33]
T. Ramezanifarkhani, and P. Teymoori, Securing the internet of things with recursive internetwork architecture (RINA2018 Int. Conf. Comput. Netw. Commun. ICNC 2018, 2018, pp. 188-194.
[http://dx.doi.org/10.1109/ICCNC.2018.8390263]
[34]
G. Boddapati, J. Day, I. Matta, and L. Chitkushev, "Assessing the security of a clean-slate Internet architecture: Security as byproduct of decoupling different concerns", Proc. - Int. Conf. Netw. Protoc. ICNP, vol. 1, 2012.
[35]
N.B. Samyuel, and B.A. Shimray, Securing iot device communication against network flow attacks with recursive internetworking architecture (RINA)., ICT Express, pp. 1-5, 2020.
[36]
V. Ishakian, J. Akinwumi, F. Esposito, and I. Matta, "On supporting mobility and multihoming in recursive internet architectures", Comput. Commun., vol. 35, no. 13, pp. 1561-1573, 2012.
[http://dx.doi.org/10.1016/j.comcom.2012.04.027]
[37]
I. Action, D2.2 converged service provider network design report., ARCFIRE, 2018.
[38]
K.A. Hiorth, and M. Welzl, "Design considerations for RINA congestion control over WiFi links", In Proc. 2019 22nd Conf. Innov. Clouds, Internet Networks Work. ICIN 2019, 2019, pp. 54-59
[http://dx.doi.org/10.1109/ICIN.2019.8685874]
[39]
Neil, "Delivering predictable quality in saturated networks predictable network solutions", Predict. Netw. Sol., 2003.
[40]
J. Perello, A.L. Perellopez, and D. Careglio, "Experimenting with real application-specific qos guarantees in a large-scale rina demonstrator", In Proc. 2019 22nd Conf. Innov. Clouds, Internet Networks Work. ICIN 2019, 2019, pp. 31-36
[http://dx.doi.org/10.1109/ICIN.2019.8685896]
[41]
E. Trouva, Transport over heterogeneous networks using the RINA architecture.Lect. Notes Comput. Sci., vol. 6649. 2011, pp. 297-309.
[http://dx.doi.org/10.1007/978-3-642-21560-5_25]
[42]
D. Staessens, F. Salvestrini, L. Bergesio, G. Capità, J. Barron, and W. Campus, Investigating RINA as the next generation GÉANT and NREN network architecture Adventures outside of the TCP / IP comfort zone, Pageant Media US, 2015.
[43]
B.S. Neelam, and B.A. Shimray, "Applicability of RINA in IoT communication for acceptable latency and resiliency against device authentication attacks", In in 2021 6th International Conference for Convergence in Technology (I2CT), 2021.
[44]
K. Ciko, and M. Welzl, "First contact  Can switching to rina save the internet?", In 22nd Conf. Innov. Clouds, Internet Netwo., 2019, pp. 37-42
[45]
V. V. Francesco, V. Maffione, N. Ciulli, E. Grasa, M. Tarzan, L. Bergesio, and D. Staessens, "IRATI-D3.4: Third phase integrated RINA prototype over Ethernet for a UNIX-like OS", Investigating RINA as an Alternative to TCP/IP, 2013.
[46]
F. Llobet, and E. Grasa, IRATI: D1.5 Final project report Ares(2018)6157869 - 30/11/2018..
[47]
L.-S. Arcfire, "Experimentation on FIRE+ : D4.3 Design of experimental scenarios, selection of metrics and KPIs",
[48]
L.-S. Arcfire, "Experimentation on FIRE+: D3.2 Final integrated software: RINA stack, Management System and measurement framework",
[49]
L.-S. Arcfire, "Experimentation on FIRE+ : D3.1 Integrated software ready for experiments",
[50]
Grasa. Eduard, "Application API · IRATI/stack", Available from: https://github.com/IRATI/stack/wiki/Application-API
[51]
L. Smith, D. Cokely, H. Bell, J. Day, and L. Chitkushev, "Unifying wi-fi® and vlans with the RINA model", In Proc. 2019 22nd Conf. Innov. Clouds, Internet Networks Work. ICIN 2019,, 2019, pp. 43-48
[http://dx.doi.org/10.1109/ICIN.2019.8685885]
[52]
S. Van Der Meer, J. Keeney, L. Fallon, S. Feghhi, and A. De Buitleir, "Large-scale experimentation with network abstraction for network configuration management", In Proc. 2019 22nd Conf. Innov. Clouds, Internet Networks Work. ICIN 2019, 2019, pp. 60-65
[http://dx.doi.org/10.1109/ICIN.2019.8685922]
[53]
M.P. De Leon, R. Ranganathan, D. Bainbridge, K. Ramanarayanan, A. Corston-Petrie, and E.G. Fundacio, "Multi-operator IPC VPN slices: Applying RINA to overlay networking", In Proc. 2019 22nd Conf. Innov. Clouds, Internet Networks Work. ICIN 2019, 2019, pp. 72-75
[54]
K. Smith, "Implementing RINA in 5G networks", In 2020 23rd Conf. Innov. Clouds, Internet Networks Work. ICIN 2020, 2020, pp. 46-50
[55]
M. Rizinski, J. Day, and L. Chitkushev, "IoT architecture based on RINA", In 2020 23rd Conf. Innov. Clouds, Internet Networks Work. ICIN 2020, 2020, pp. 41-45
[56]
T. Braun, D. Careglio, and I. Matta, "Vehicular networking in the recursive inter network architecture", In IEEE Veh. Technol. Conf., 2018, pp. 1-5
[57]
N. Akhtar, I. Matta, A. Raza, and Y. Wang, Demo abstract: EL-SEC: ELastic management of security applications on virtualized infrastructureINFOCOM 2018 - IEEE Conf. Comput. Commun. Work, vol. 2. 2018, pp. 1-2.
[http://dx.doi.org/10.1109/INFCOMW.2018.8406988]
[58]
"QUANTUM-CAT - i2CAT", Available from: https://i2cat.net/projects/quantum-cat/
[59]
"A Self-Optimizing Fabric for the 5G era - Ciena", Available from: https://www.ciena.com/insights/articles/A-Self-Optimizing-Fabric-for-the-5G-era.html
[60]
"RINA ENCQOR Distributed Fabric (EDF) - i2CAT Projects - i2CAT", Available from: https://i2cat.net/projects/rina-encqor-distributed-fabric-edf/

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy