Naming for Mobile Systems

Slides:



Advertisements
Similar presentations
Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
Advertisements

P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Why do current IP semantics cause scaling issues? −Today, “addressing follows topology,” which limits route aggregation compactness −Overloaded IP address.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
Small-world Overlay P2P Network
Multicasting in Mobile Ad-Hoc Networks (MANET)
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Name Services Jessie Crane CPSC 550. History ARPAnet – experimental computer network (late 1960s) hosts.txt – a file that contained all the information.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Overlay Networks EECS 122: Lecture 18 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
COS 461: Computer Networks
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
1 Attribute Based Communications University of California, Irvine Presented By : Ala Khalifeh (Note: Presented)
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
Naming Examples UUID (universal unique ID) – 128 bit numbers, locally generated, guaranteed globally unique Uniform Resource Identifier (URI) URL (uniform.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Information-Centric Networks06a-1 Week 6 / Paper 1 Untangling the Web from DNS –Michael Walfish, Hari Balakrishnan and Scott Shenker –Networked Systems.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
INAT Hari BalakrishnanFrans Kaashoek John Guttag Robert Morris MIT Laboratory for Computer Science NGI PI Meeting October 2, 2000.
Network Layer4-1 Intra-AS Routing r Also known as Interior Gateway Protocols (IGP) r Most common Intra-AS routing protocols: m RIP: Routing Information.
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
MobiQuitous 2007 Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering Wei Gao.
1 Naming for Internet MMLAB, Seongil Han
Wireless Networks of Devices Resource Discovery William Adjie-Winoto,Elliot Schwartz Anit Chakraborty,Jeremy Lilley Hari Balakrishnan,John Guttag MIT Lab.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
Scalable Routing Protocols for
Network Layer4-1 Today Collect homework New homework: Ch4 #16,19,21-24,26,27,29,31 (half graded, as usual) Due Wednesday Oct 15 in class Final programming.
CS 268: Project Suggestions Ion Stoica January 26, 2004.
An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Design and implementation of an intentional naming system William Adjie-WinotoElliot Schwartz Hari BalakrishnanJeremy Lilley MIT Laboratory for Computer.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
PeerNet: Pushing Peer-to-Peer Down the Stack Jakob Eriksson, Michalis Faloutsos, Srikanth Krishnamurthy University of California, Riverside.
1 Chapter 14-16a Internet Routing Review. Chapter 14-16: Internet Routing Review 2 Introduction Motivation: Router performance is critical to overall.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Internet Multicasting Routing: DVMRP r DVMRP: distance vector multicast routing protocol, RFC1075 r flood and prune: reverse path forwarding, source-based.
Basics of the Domain Name System (DNS) By : AMMY- DRISS Mohamed Amine KADDARI Zakaria MAHMOUDI Soufiane Oujda Med I University National College of Applied.
Chapter 6 Delivery & Forwarding of IP Packets
Internet Indirection Infrastructure (i3)
Domain Name System (DNS)
Wireless Sensor Network Architectures
SRIRAM Peer-to-Peer Infrastructure
Plethora: Infrastructure and System Design
Chapter 6 Delivery & Forwarding of IP Packets
Managing Online Services
5.2 FLAT NAMING.
Bina Ramamurthy Chapter 9
Persistent Personal Names for Globally Connected Mobile Devices
Bina Ramamurthy Chapter 9
Bina Ramamurthy Chapter 9
Computer Networks Primary, Secondary and Root Servers
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Naming for Mobile Systems Karthik Dantu and Steve Ko

Administrivia “Embedded Android”, now available via library.buffalo.edu Friday project meetings Record/Replay Latency Measurement End-End Connectivity

Naming Systems What is Naming? Examples DNS/IP Address/MAC Address CDNs e.g., Akamai Filesystem Phone Book Features Map known information to required information Ease of registration/use

Intentional Naming System Naming System for Wireless/Mobile World Challenges Resource/Service Mobility Client Mobility Essential Features Expressiveness Responsiveness Robustness Easy Configuration

INS: Features Naming based on Intent as opposed to location Architecture uses what service as opposed to where to find it Clients request a service without listing end nodes – level of indirection Integrates name resolution and message routing Binding at message delivery time Binding/message routing is best effort Message routing Intentional anycast Intentional multicast Runs on top of IP on an overlay network

INS Architecture Overlay of Intent Name Resolvers (INRs) Clients can use network or intent naming Name-specifiers: Hierarchical attribute-value pairs

Name Discovery INRs form overlay network Replicate information via periodic and triggered updates Services disseminate information via soft state Clients request service via name discovery msg Updates Network address Application adv metric Next Hop INR Unique AnnouncerID

Name Lookup Name Record: List of IP addresses of the destinations with next hop info Name Tree: Super-position of all name specifiers with app-specific metrics

Name Lookup LOOKUP_NAME Algorithm: Search for sub-tree that corresponds to the requested name-specifier Returns name-record with all such sub-trees Domain Space Resolver to track all active INRs

Unmanaged Internet Architecture (UIA) Motivation Provide secure peer-peer access for personal/social groups independent of different forms of network connectivity Simplify naming in such personal groups Provide robust connectivity independent of infrastructure Challenges Mobility Scalability Dynamics

UIA: Device Introduction Simple multiple choice device introduction Handshake puts devices in same personal group Devices gossip amongst each other to discover other devices

Group Management Owned by one or more members, or by another group Ownership is transitive Ownership disputes resolved by putting disputing parties in two separate (new) groups, and revoking access to previously accessible groups EID: Endpoint Identifiers are cryptographically unique IDs for devices Name resolution resolves to EIDs Separate EIDs for every user on every device

Naming Principles Resolved right to left Phone.Alice New additions appear as sub-groups E.g., If Alice added Bob, Bob’s root group appears as a sub-group, and vice-versa Can be circular e.g., Phone.Bob.Alice Label conflicts: Resolution does not work until conflict is fixed

Naming Management UIA uses log records Four types of records Create: Initiate a new series Link: Attach a human-readable label to EID/Series ID Merge: Join two series to form a single group. Requires ownership or permission from both owners Cancel: Nullifies a record Example Phone: Create Laptop: Create Phone: Merge Alice: Merge

Overlay Network UIA builds an overlay network for connectivity To reach an EID, it floods the network Each device maintains up to a set number of connections with its peers Peer connections picked according to stability and friendship distance Maintains list of potential peers – initialized by gossiping Token-limited flooding (instead of hop count) Overlay has highly non-uniform degree Not much point searching all devices in given network Location request = (EID, IP,port list of devices traversed)