Naming 15-744 Dave Andersen. Lecture warning ● Think “lots of in-class paper discussion” today.

Slides:



Advertisements
Similar presentations
Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
Advertisements

Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
Internet Area IPv6 Multi-Addressing, Locators and Paths.
Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan, Robert Morris, and Scott Shenker * 7 December 2004 MIT Computer Science and AI Lab.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
IPv6 at NCAR 8/28/2002. Overview What is IPv6? What’s wrong with IPv4? Features of IPv6 IPv6 will soon be available at NCAR How to use IPv6.
Lecture 5 - Routing On the Flat Labels M.Sc Ilya Nikolaevskiy Helsinki Institute for Information Technology (HIIT)
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday C. Today I³SI³HIPHI³.
An Engineering Approach to Computer Networking
Internet Indirection Infrastructure Ion Stoica and many others… UC Berkeley.
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Rethink the design of the Internet CSCI 780, Fall 2005.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
Indirection Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm Slides.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
Towards a New Naming Architectures
A Layered Naming Architecture for the Internet Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Michael Walfish.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
10/8/2015CST Computer Networks1 IP Routing CST 415.
Information-Centric Networks06a-1 Week 6 / Paper 1 Untangling the Web from DNS –Michael Walfish, Hari Balakrishnan and Scott Shenker –Networked Systems.
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
DNS and Naming Aditya Akella 03/16/2007 Supplemental slides.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Universal, Ubiquitous, Unfettered Internet © ui.com Pte Ltd Mobile Internet Protocol under IPv6 Amlan Saha 3UI.COM Global IPv6 Summit,
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
LNA and DOA Aditya Akella 3/11/2010. A Layered Naming Architecture for the Internet Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Multimedia & Mobile Communications Lab.
Information-Centric Networks06c-1 Week 6 / Paper 3 Middleboxes No Longer Considered Harmful –Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan,
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
CS 268: Project Suggestions Ion Stoica January 26, 2004.
Information-Centric Networks Section # 6.3: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.2: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
A Layered Naming Architecture for the Internet Authors: Balakrishnan et al. Presentation: Vinay Goel 01/14/2005 Authors: Balakrishnan et al. Presentation:
Mobility With IP, implicit assumption that there is no mobility. Addresses -- network part, host part -- so routers determine how to get to correct network.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
ONE LAPTOP PER CHILD TALK TITLE. C. Scott Ananian, TALK DATE. 1 Principles; Caching Dr. C. Scott Ananian One Laptop per Child Networking.
Security fundamentals
Advanced Computer Networks
Internet and IP infrastructure
Naming for Mobile Systems
Networking Applications
Internet Indirection Infrastructure (i3)
Mobile IP.
Review session For DS final exam.
Encryption and Network Security
Mobile IP and Upper Layer Interaction
Domain Name System (DNS)
Scaling the Network: The Internet Protocol
Kris, Karthik, Ansley, Sean, Jeremy Dick, David K, Frans, Hari
A Layered Naming Architecture
Global Locator, Local Locator, and Identifier Split (GLI-Split)
Net 323: NETWORK Protocols
Chapter 9 Objectives Understand TCP/IP Protocol.
CS 457 – Lecture 10 Internetworking and IP
Overlay Networking Overview.
Software Defined Networking (SDN)
Distributed Peer-to-peer Name Resolution
5.2 FLAT NAMING.
Internet Indirection Infrastructure
Overview i3 Layered naming DOA SFR.
An Update on Multihoming in IPv6 Report on IETF Activity
Scaling the Network: The Internet Protocol
An Engineering Approach to Computer Networking
Computer Networks Protocols
Presentation transcript:

Naming Dave Andersen

Lecture warning ● Think “lots of in-class paper discussion” today

Re-thinking Naming and Binding ● One of the fundamental aspects of network architecture: How do you name services and endpoints? ● Today: IP addresses (hierarchical topological identifiers) and DNS names (hierarchical human-readable names). – Loose binding between the two ● What properties might we want in names?

Scope ● Global scope / validity / reachability – Why? Transitive use. A says to B “for a good time, call C”. Only works if A and B see the same name for C. ● Real world example: p2p routing and searching ● contacting hosts behind NATs ● Note distinction between a NAT and a firewall, though they actually couple the two

Coupling ● Is the “name” involved in every packet, or is it resolved once into an IP address? – DNS -> IP once – Consequences: ● Efficient! Naming gets out of the way ● Loses control after connection establishment – Can't do Mobile IP by just changing DNS names

Control, Timescales, Granularity ● Who can update a name binding? ● What's the timescale of updates? ● What's the granularity of naming? ● Old DNS: – DNS admin; human; one or a few machines ● Dynamic DNS – Owner of machine; seconds?; one or a few machines

Context ● “Middleboxes” -- NATs, firewalls, etc. – Fragmented address space (lots of hosts in private space) – No inbound connections – May interpose on actual communication (and restrict or break it accidentally) ● Tough evolution – IP is popular: blessing and curse! – One change to make future change easier?

DHT reminder ● i3 and DOA both suppose the existence of a flat name resolution architecture – Massive scale (billions of entries) – Fast, Scalable, secure, cost effective... ● DHTs suggest that we can build such an infrastructure (networking sci-fi...), but – Serious security challenges ● Malicious participants, secure node ID assignment, dropping messages... – Let's forget about them for today!

Flat names? – No semantic meaning: 160 bit numbers – No hierarchy ● Nice: Doesn't restrict things it names ● Doesn't have DNS-like politics – Assumption: The infrastructure exists ● And is funded, etc., etc. – But: ● Not very user-friendly (probably still want DNS... or Google) ● Sacrifice locality

Self-Certifying Names ● Common combination: – Flat naming – Self-certifying naming ● Self-foo? – ID = Hash(Public Key) – Can verify ● Ownership, uniqueness, etc. ● With no external infrastructure binding ID->Key ● DOA uses, i3 doesn't (no apparent reason)

i3: Rendezvous-based ● Tightly coupled: resolve “name” on every packet. – Think back to Mobile IP discussion ● Some extra tricks that we'll talk about in a second

DOA: Delegation ● Two parts, really: – A HIP-like (host identity protocol) Endpoint ID (EID) mechanism ● Globally unique ● Resolution infrastructure resolves EID -> IP – Other cool stuff for delegating ● Major difference: i3 sits on every packet – Fundamental? trade: Can do more to ongoing connections, increases stretch

Delegation & Stacks ● Fundamentally different thing: – Stacks of addresses ● Resolve nameA -> nameB -> nameC -> EID ● i3 throws in a twist: – NameA -> {B, C}... ● (Note that these are used in other contexts and previous systems, but these systems integrate them nicely with Internet. MPLS at below-IP layer.)

Off-Path Firewalls

Globally Unique Identifiers for Hosts Location-independent, flat, big namespace Hash of a public key These are called EIDs (e.g., 0xf12abc…) Carried in packets DOA hdr IP hdr transport hdr body source EID destination EID Slide Credit: Michael Walfish

Off-path Firewall: Benefits Simplification for end-users who want it  Instead of a set of rules, one rule:  “Was this packet vetted by my FW provider?” Firewall can be anywhere, leading to:  Third-party service providers  Possible market for such services  Providers keeping abreast of new applications Note: Many things that DOA enables can be done in other ways. Goal is a unified mechanism. (slide: mostly walfish)

DOA and i3 can... ● Service composition – Dave -> { transcoding proxy, Dave's EID } – Transcoding: Transformation and encoding changes, e.g., downsample images for handheld

i3: Dealing with Interposition ● Aggressive caching of DHT nodes – Only do log(N) hops on first lookup; 1-indirect after ● An i3 node must be on path to have all of the i3 benefits – Private triggers – Like picking an EID for a connection – Goal: Reduced stretch (could even do RON-like tricks)

Mobility via Interposition ● Mobility – Easy! Update trigger ● Like mobile IP, really, but with ability to negotiate an intermediary near the path\

i3 multicast ● All members register trigger with same id – (security?) ● For scale, must use a hierarchy of triggers – (a -> {b,m} b->{c,z}... ) – Getting it right is pretty complicated – But it's a cool primitive to think about ● Anycast

So? ● Flat naming is an interesting hammer – Very worthwhile exercise to consider, even if not adopted ● Many serious challenges were one to really use i3: security, real usability, the real costs of all that indirection... ● Fewer with DOA, but many of the same security issues ● Worth it?