A Layered Naming Architecture

Slides:



Advertisements
Similar presentations
© Antônio M. Alberti 2011 Host Identification and Location Decoupling: A Comparison of Approaches Bruno Magalhães Martins Antônio Marcos Alberti.
Advertisements

Accountable Internet Protocol David Andersen (CMU) Hari Balakrishnan (MIT) Nick Feamster (Georgia Tech) Scott Shenker (Berkeley)
Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
1 Data-Oriented Network Architecture (DONA) Scott Shenker (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, I. Stoica)
Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan, Robert Morris, and Scott Shenker * 7 December 2004 MIT Computer Science and AI Lab.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Mobile IP: enable mobility for IP-based networks CS457 presentation Xiangchuan Chen Nov 6, 2001.
DHT-Oriented Architecture: A Prototype Maxwell Krohn, Jeremy Stribling, Michael Walfish MIT Project Demonstration 29 April 2004.
COM555: Mobile Technologies Location-Identifier Separation.
Policy Based Routing using ACL & Route Map By Group 7 Nischal ( ) Pranali ( )
Internet Indirection Infrastructure Ion Stoica and many others… UC Berkeley.
NAT: Network Address Translation local network (e.g., home network) /24 rest of Internet Datagrams.
Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
Part I: Core networking concepts Naming & Addressing.
CS 268: Project Suggestions Ion Stoica January 23, 2006.
I. Matta 1 On the Cost of Supporting Multihoming and Mobility Ibrahim Matta Computer Science Boston University Joint work with Vatche Ishakian, Joseph.
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
Unicenter Desktop & Server Management Network Challenges -Latest Revision 11/28/2005.
Towards a New Naming Architectures
Host Identity Protocol
A Layered Naming Architecture for the Internet Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Michael Walfish.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Network Layer4-1 DHCP: Dynamic Host Configuration Protocol Goal: allow host to dynamically obtain its IP address from network server when it joins network.
Naming Examples UUID (universal unique ID) – 128 bit numbers, locally generated, guaranteed globally unique Uniform Resource Identifier (URI) URL (uniform.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
CIS 3360: Internet: Network Layer Introduction Cliff Zou Spring 2012.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
CSNB534 Networked Computing Course Outline. Some Details.. Lecturer:Asma Shakil Room:BW-3-C48 Phone:2387 Web:
DNS and Naming Aditya Akella 03/16/2007 Supplemental slides.
A Layered Naming Architecture for the Internet by Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Michael Walfish.
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
LNA and DOA Aditya Akella 3/11/2010. A Layered Naming Architecture for the Internet Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
Presented by Rebecca Meinhold But How Does the Internet Work?
1 Naming for Internet MMLAB, Seongil Han
Information-Centric Networks06c-1 Week 6 / Paper 3 Middleboxes No Longer Considered Harmful –Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan,
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
HIP research group 1 HIP-RG meeting, IETF 61 November 12, 2004 Tom Henderson Pekka Nikander
Network Layer4-1 Today Collect homework New homework: Ch4 #16,19,21-24,26,27,29,31 (half graded, as usual) Due Wednesday Oct 15 in class Final programming.
Information-Centric Networks Section # 6.3: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.2: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Computer Communication: An example What happens when I click on
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
A Layered Naming Architecture for the Internet Authors: Balakrishnan et al. Presentation: Vinay Goel 01/14/2005 Authors: Balakrishnan et al. Presentation:
Some pictures for class 1Some pictures for class 1 cs480 spring 2016, NYU CS, Michael Walfish.
Lecture 4 : Network Architectures (cont..) 1. 2 Summary of OSI Layers.
COM594: Mobile Technologies Location-Identifier Separation.
Naming Dave Andersen. Lecture warning ● Think “lots of in-class paper discussion” today.
Advanced Network Labs & Remote Network Agent
Chapter 2 Network Models
Network Address Translation
COMPUTER NETWORKS CS610 Lecture-27 Hammad Khalid Khan.
Naming for Mobile Systems
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Part I. Overview of Data Communications and Networking
IT443 – Network Security Administration Instructor: Bo Sheng
Layered Architectures
Net 431: ADVANCED COMPUTER NETWORKS
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
CS 268: Lecture 25 Indirection
Overview i3 Layered naming DOA SFR.
An Update on Multihoming in IPv6 Report on IETF Activity
Internet Indirection Infrastructure
Wireshark(Ethereal).
INFORMATION FLOW ACROSS THE INTERNET
Data-Oriented Network Architecture (DONA)
DHCP: Dynamic Host Configuration Protocol
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

A Layered Naming Architecture Michael Walfish MIT Computer Science and Artificial Intelligence Lab Joint work with: H. Balakrishnan, M. Krohn, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, J. Stribling IRTF HIP RG 6 August 2004

Outline Overview of “Layered Naming Architecture” Application-level example Network-level examples

“A Layered Naming Architecture” View: naming could solve some arch. probs. Principle 1: “don’t bind names too early” Need two new types of names SIDs (Service IDs) EIDs (End-point IDs) Principle 2: “names should be flat”

“A Layered Naming Architecture”, Cont. Principle 3: “let names resolve to delegates” EID Resolution Service EID e, IP = ? IP: y EID e, IP = y Delegate Intent: “send to EID e’’ EID: e IP: x Source (Querier) Dest (Target)

IP address “resolution” (routing) The Layers user-level descriptor (ULD) lookup (e.g., e-mail address, search string, etc.) App gets SIDs corresponding to ULD via lookup or search service SID resolution App’s session protocol (e.g., HTTP) resolves SID to EIDs using SID resolution service EID resolution Transport protocol resolves EID to IP addresses using EID resolution service IP address “resolution” (routing)

Benefits Mobility and multi-homing (from HIP) Data and services become first-class Because they can be persistently named Architectural coherence for middleboxes

SIDs in Action One example: HTTP GET: /spot.gif 10.1.2.3 <A HREF= http://f012012 >here is a dog</A> /spot.gif HTTP GET: /abc/dog.gif 20.2.4.6 (10.1.2.3,80, /spot.gif) (20.2.4.6,80, /abc/dog.gif) /abc/dog.gif SFR (Could use EIDs instead of 10.1.2.3, 20.2.4.6)

EIDs in Action (1): Remote Packet Filter Imagine third-party firewall services Need robust notion of host identity Need ability to delegate EID: 0x8a.. IP: 65.43.2.1

EIDs in Action (2): Cascaded NATs EIDs (not overloaded ports!) help demux

High-level Points Not focusing on specifics of implementation for now . . . Insights about network-level IDs apply to application-level IDs (and vice-versa!) Flat names, delegation powerful primitives These primitives have several benefits mobility / multi-homing services and data get first-class names coherent story for middleboxes