1 Data-Oriented Network Architecture (DONA) Scott Shenker (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, I. Stoica)

Slides:



Advertisements
Similar presentations
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Advertisements

1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
1 Metro Ethernet Forum OAM An Update Matt Squire Hatteras Networks.
M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
M2M middleware service Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
0 - 0.
XIA: Efficient Support for Evolvable Internetworking Dongsu HanAshok AnandFahad Dogar Boyan LiHyeontaek LimMichel Machado Arvind MukundanWenfei Wu Aditya.
Chapter 1: Introduction to Scaling Networks
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
Executional Architecture
Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan, Robert Morris, and Scott Shenker * 7 December 2004 MIT Computer Science and AI Lab.
Omniran TG 1 Cooperation for OmniRAN P802.1CF Max Riegel, NSN (Chair OmniRAN TG)
IPv6 at NCAR 8/28/2002. Overview What is IPv6? What’s wrong with IPv4? Features of IPv6 IPv6 will soon be available at NCAR How to use IPv6.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Guide to Network Defense and Countermeasures Second Edition
Incrementally Deployable Information Centric Networking 1 Seyed K. Fayazbakhsh, Yin Lin, Amin Tootoonchian, Ali Ghodsi, Teemu Koponen, Bruce Maggs, KC.
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
Lecture 5 - Routing On the Flat Labels M.Sc Ilya Nikolaevskiy Helsinki Institute for Information Technology (HIIT)
June 2007APTLD Meeting/Dubai ANYCAST Alireza Saleh.ir ccTLD
An Engineering Approach to Computer Networking
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
CDNs & Replication Prof. Vern Paxson EE122 Fall 2007 TAs: Lisa Fowler, Daniel Killebrew, Jorge Ortiz.
TCP Splicing for URL-aware Redirection
1 Web Proxies Dr. Rocky K. C. Chang 6 November 2005.
Anycast Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
1 A Data-Oriented Network Architecture ACM Sigcomm’07 (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, Scott Shenker, I. Stoica)
1 Routing as a Service Karthik Lakshminarayanan (with Ion Stoica and Scott Shenker) Sahara/i3 retreat, January 2004.
Wide-area cooperative storage with CFS
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
1 DNS,NFS & RPC Rizwan Rehman, CCS, DU. Netprog: DNS and name lookups 2 Hostnames IP Addresses are great for computers –IP address includes information.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
DNS. Outline r Domain Name System r DNS Hierarchy r Resolution.
Best Practices in IPv4 Anycast Routing Version 0.9 August, 2002 Bill Woodcock Packet Clearing House.
Host Identity Protocol
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
{ Content Distribution Networks ECE544 Dhananjay Makwana Principal Software Engineer, Semandex Networks 5/2/14ECE544.
Oasis: Anycast for Any Service Michael J. Freedman Karthik Lakshminarayanan David Mazières in NSDI 2006 Presented by: Sailesh Kumar.
DNS: Domain Name System
1 DNS: Domain Name System People: many identifiers: m SSN, name, Passport # Internet hosts, routers: m IP address (32 bit) - used for addressing datagrams.
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Less Pain, Most of the Gain: Incrementally Deployable ICN 1 Seyed K. Fayazbakhsh, Yin Lin, Amin Tootoonchian, Ali Ghodsi, Teemu Koponen, Bruce Maggs, KC.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
SANE: A Protection Architecture for Enterprise Networks
Information-Centric Networks06a-1 Week 6 / Paper 1 Untangling the Web from DNS –Michael Walfish, Hari Balakrishnan and Scott Shenker –Networked Systems.
Data Oriented Network Architecture (DONA) Andrey Ermolinskiy Mohit Chawla CS 262 A Project Poster December 14.
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Information-Centric Networks06c-1 Week 6 / Paper 3 Middleboxes No Longer Considered Harmful –Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan,
HTTP evolution - TCP/IP issues Lecture 4 CM David De Roure
Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, Ion Stoica SIGCOMM 2007 Presented by Ye Tian for Course CS05112.
1. Internet hosts:  IP address (32 bit) - used for addressing datagrams  “name”, e.g., ww.yahoo.com - used by humans DNS: provides translation between.
A Layered Naming Architecture for the Internet Authors: Balakrishnan et al. Presentation: Vinay Goel 01/14/2005 Authors: Balakrishnan et al. Presentation:
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Multicast in Information-Centric Networking March 2012.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Part I. Overview of Data Communications and Networking
Internet Networking recitation #12
An Engineering Approach to Computer Networking
Data-Oriented Network Architecture (DONA)
Presentation transcript:

1 Data-Oriented Network Architecture (DONA) Scott Shenker (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, I. Stoica)

2 Problem Internet was designed for host-to-host communication -contact this host... Internet is mainly used for data access -get me this data..... Mismatch between usage and design: -data migration and replication unnecessarily hard -requires Akamai- and BitTorrent-like designs to scale Question: what would the Internet look like if we designed it around data access?

3 Parents of this Work Our Failure: ROFL Mechanisms: HTTP, anycast, pub/sub, SFS, HIP,... Architecture: -content routing:TRIAD -naming: LFN/DOA no new ideas!

4 What Do Users Care About? Persistence of names: -Follow data migration -Today: HTTP redirects, forwarding Availability of data: (both latency and reliability) -Take advantage of replicated data -Today: Akamai/BitTorrent Authenticity of data: -Know that data came from intended source -Today: securing the channel (IPsec, TLS), or PKI

5 Current Barriers Rigid and Weak Naming: hostname/path -Ties data to host, making migration/replication hard -Doesnt help much with authentication Protocol Mess: e.g., DNS, TCP, HTTP -Data isnt named until the application is invoked -Caching (and other data handling) is application-specific -No low-level support for anycast-like service discovery

6 Fix #1: Flat, Self-certifying Names Self-certifying (SFS, HIP) -Data associated with principal P with public key Kp -Names are of the form: Hash(Kp): label -Data requests return: -Can verify name related to Kp, and Kp signed data Name not tied to location, so naming isnt rigid -resolution mechanism described later

7 Gives Better Separation of Concerns Names take care of persistence, authenticity Protocols can then focus on availability -latency -reliability

8 Fix #2: Better Protocol Structure Implement replication and caching at lower level: -find closest replica without application-level tricks -caching infrastructure not application-specific DONA does this through two major changes: -insert data-handling shim layer right above IP -resolve name by routing to data (TRIAD) better fate sharing less complicated management No DNS, no lookup, just routing on names

9 New Network Entities Data Handlers (DHs): operate at data-handling layer -DHs do name-based routing and caching -a logical DH per administrative unit think of AS hierarchy (and finer grain below) Authoritative Resolvers (ARs): -AR(P) can point to authoritative copy of Ps data -think of as Ps DNS resolver

10 New Network Primitives Fetch(name): data request -data name -transport header -application header Register(name): offer to serve data (authenticated) -Register individual data items: Hash(Kp):label -Register authoritative resolver: Hash(Kp):*

11 Overview Clients configured with local DH (replaces DNS) to which they send their fetch requests DHs respond to fetch if data is in cache Otherwise, DH routes fetch towards nearest copy of data by sending to a next-hop DH -can insert own address in fetch packet so that it receives data on way back If name isnt in routing table, fetch routed towards AR

12 Routing Fetches Need to implement anycast routing at DONA-layer Use DH hierarchy to guide routing DH

13 Register Commands... DHs forward register commands to parents and peers DH AR Copy 1 Copy 2

14...Establish Routing State Arrows represent next-hop entries for registered data Scaling: DHs only hold state for items below -core: few TBs -edge: typically far less than a GB DH AR Copy 1 Copy 2

15 Anycast Routing of Fetches If theres an entry for a data item, follow next-hop Otherwise, send to parent Standard routing behavior, but at DONA-layer DH AR Copy 1 Copy 2Client

16 DONA Naming makes it easy to authenticate data DONA-layer provides easy access to data: -name-based resolution through routing -caching and replication infrastructure DONA makes it easier to build transport, applications

17 Extensions Cache both data and fetches: -RSS-like behavior, cache invalidation Policy (tbd): -based on first packet, domains can decide to deny route through proxies ask for more authentication hand back capabilities set up state -think of this as off path signaling (PF)

18 Open Questions Does this scale? -Boils down to money: edges cheap, core not-so-cheap -Big unknown: (compounded) cache hit rates Is caching and replica-selection too app-specific? -Our guess is no, but the burden of proof is on us Is there an incrementally deployable version of DONA? -Suggestions welcome!