On Proxy Server based Multipath Connections (PSMC) PhD Proposal Yu Cai 12/2003 University of Colorado at Colorado Springs.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Cross-layer Design in Wireless Mesh Networks Hu Wenjie Computer Network and Protocol Testing Laboratory, Dept. of Computer Science & Technology, Tsinghua.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Copyright © 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 09 Network Protocols.
Cisco S3 C5 Routing Protocols. Network Design Characteristics Reliable – provides mechanisms for error detection and correction Connectivity – incorporate.
Jaringan Komputer Lanjut Packet Switching Network.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Multicasting in Mobile Ad-Hoc Networks (MANET)
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
On Proxy Server based Multipath Connections (PSMC) PhD Proposal Yu Cai 10/2003 University of Colorado at Colorado Springs.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
PSMC Proxy Server-based Multipath Connection CS 526 Advanced Networking - Richard White.
ChowSCID1 Secure Collective Internet Defense (SCID) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
ChowSCOLD1 Secure Collective Defense Network (SCOLD) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
Enhanced Secure Dynamic DNS Update with Indirect Route David Wilkinson, C. Edward Chow, Yu Cai 06/11/2004 University of Colorado at Colorado Springs IEEE.
ChowSCOLD1 Secure Collective Internet Defense (SCOLD) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
Algorithms for Selecting Multiple Mirror Sites for Parallel Download Yu Cai 12 / 2003 UCCS.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Presentation Title Subtitle Author Copyright © 2002 OPNET Technologies, Inc. TM Introduction to IP and Routing.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Common Devices Used In Computer Networks
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
AD HOC WIRELESS MUTICAST ROUTING. Multicasting in wired networks In wired networks changes in network topology is rare In wired networks changes in network.
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 3.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
1 Route Optimization for Large Scale Network Mobility Assisted by BGP Feriel Mimoune, Farid Nait-Abdesselam, Tarik Taleb and Kazuo Hashimoto GLOBECOM 2007.
Multicast ad hoc networks Multicast in ad hoc nets Multicast in ad hoc nets Review of Multicasting in wired networks Review of Multicasting in wired networks.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Network Layer (OSI and TCP/IP) Lecture 9, May 2, 2003 Data Communications and Networks Mr. Greg Vogl Uganda Martyrs University.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Network Processing Systems Design
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Architecture and Algorithms for an IEEE 802
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
VIRTUAL SERVERS Presented By: Ravi Joshi IV Year (IT)
13-May-2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Some MAC Requirements for Neighborhood Area.
Ad-hoc Transport Layer Protocol (ATCP)
NET323 D: Network Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
NET323 D: Network Protocols
TCP in Mobile Ad-hoc Networks
On Proxy Server based Multipath Connections (PSMC)
TCP in Wireless Ad-hoc Networks
Network Architecture for Cyberspace
Distributed Systems CS
EE 122: Lecture 22 (Overlay Networks)
Distributed Systems CS
Presentation transcript:

On Proxy Server based Multipath Connections (PSMC) PhD Proposal Yu Cai 12/2003 University of Colorado at Colorado Springs

Outline 1. Introduction 1. Introduction 2. Related work 2. Related work 3. PSMC algorithms 3. PSMC algorithms 4. PSMC protocols 4. PSMC protocols 5. PSMC applications 5. PSMC applications 6. PSMC security 6. PSMC security 7. Conclusion 7. Conclusion

Introduction Single path connection vs. multipath connections Single path connection: most commonly-used network connection model in today’s network environment. Single path connection: most commonly-used network connection model in today’s network environment. Multipath connections: provide potentially multiple paths between network nodes. The traffic from a source can be spread over multiple paths and transmitted in parallel through the network. Multipath connections: provide potentially multiple paths between network nodes. The traffic from a source can be spread over multiple paths and transmitted in parallel through the network.

Why Multipath Connections Improve the network security by providing alternate paths Improve the network security by providing alternate paths Improve the network reliability, stability and availability Improve the network reliability, stability and availability Improve the network performance by increasing the aggregate bandwidth between network nodes Improve the network performance by increasing the aggregate bandwidth between network nodes Utilize the network resources more efficiently Utilize the network resources more efficiently Cope well with network congestion, link breakage, burst traffic and potential attacks Cope well with network congestion, link breakage, burst traffic and potential attacks Provide better quality-of-service Provide better quality-of-service

Related Works on Multipath Connections Multipath connections have been studied since 70s. Multipath connections have been studied since 70s. The IBM Systems Network Architecture (SNA) in 1974 The IBM Systems Network Architecture (SNA) in 1974 Nicholas F. Maxemchuk in 1975, the dispersity routing Nicholas F. Maxemchuk in 1975, the dispersity routing Classification of multipath connections based on OSI 7-layer model. Classification of multipath connections based on OSI 7-layer model. Physical layer: Multipath Interference; Antenna Array. Physical layer: Multipath Interference; Antenna Array. Data link layer: Link Aggregation, defined in IEEE 802.3ad. (requires additional hardware support) Data link layer: Link Aggregation, defined in IEEE 802.3ad. (requires additional hardware support)

Related Works on Multipath Connections Network layer: studied extensively as multipath routing. Network layer: studied extensively as multipath routing. Wired network. (requires changes on routers) Wired network. (requires changes on routers) Table-driven routing (link state or distance vector). MDVA(Multipath distance vector algorithm ) [VG01]; [Chen98] Table-driven routing (link state or distance vector). MDVA(Multipath distance vector algorithm ) [VG01]; [Chen98] Wireless ad hoc network. (only for ad hoc network) Wireless ad hoc network. (only for ad hoc network) On-demand routing. On-demand routing. SMR(Split Multipath Routing ) [LG00], Source Routing. Source Routing. MSR(Multipath Source Routing ) [ZZS+02] Transport layer: Linux multipath connections for multiple ISP connections. (no fail-over mechanism). Transport layer: Linux multipath connections for multiple ISP connections. (no fail-over mechanism).

Proxy Server based Multipath Connections (PSMC) Existing multipath connection approaches have various limitations and drawbacks. Existing multipath connection approaches have various limitations and drawbacks. We want new solution: We want new solution: Must be compatible with current network and don’t require changes on network infrastructure; Must be compatible with current network and don’t require changes on network infrastructure; Must be robust and reliable with high performance; Must be robust and reliable with high performance; Must be flexible when deployed so more applications can benefit from it. Must be flexible when deployed so more applications can benefit from it. We propose to study a new multipath connection approach: proxy servers based multipath connections (PSMC). We propose to study a new multipath connection approach: proxy servers based multipath connections (PSMC).

The Key Idea of PSMC The key ideas of PSMC is as followings. The key ideas of PSMC is as followings. By using a set of connection relay proxy servers, we could set up indirect routes via the proxy servers, and transport packets over the network through the indirect routes. By using a set of connection relay proxy servers, we could set up indirect routes via the proxy servers, and transport packets over the network through the indirect routes. By enhancing existing TCP/IP protocols, we could efficiently distribute and reassemble packets among multiple paths at two end nodes, and increase end-to-end TCP throughput. By enhancing existing TCP/IP protocols, we could efficiently distribute and reassemble packets among multiple paths at two end nodes, and increase end-to-end TCP throughput. The approach offers applications the ability to improve network security, reliability, performance, stability, availability and efficiency. The approach offers applications the ability to improve network security, reliability, performance, stability, availability and efficiency.

PSMC Diagram

Three Key Parts in PSMC The multipath sender: distributes packets over the selected multiple paths efficiently and adaptively. The multipath sender: distributes packets over the selected multiple paths efficiently and adaptively. The intermediate connection relay proxy servers: examine the incoming packets and forward them to the end server. The intermediate connection relay proxy servers: examine the incoming packets and forward them to the end server. The multipath receiver: collects the packets from multiple paths, reassembles them in order and delivers them to the user. The multipath receiver: collects the packets from multiple paths, reassembles them in order and delivers them to the user.

Why PSMC Compatibility: Utilizes existing TCP/IP protocols and network infrastructure. Don’t require changes on physical network infrastructure. Compatibility: Utilizes existing TCP/IP protocols and network infrastructure. Don’t require changes on physical network infrastructure. Flexibility: Can be more conveniently and adaptively deployed in various network environments. Flexibility: Can be more conveniently and adaptively deployed in various network environments. Usability: A large number of applications in various categories could benefit from utilizing PSMC. Usability: A large number of applications in various categories could benefit from utilizing PSMC. Reliability: Reliable and robust protocol with high end- to-end performance. Reliability: Reliable and robust protocol with high end- to-end performance.

Algorithms for PSMC Proxy server selection is a critical decision in PSMC. Different server selections result in different performance. Proxy server selection is a critical decision in PSMC. Different server selections result in different performance. Needs to solve the following two proxy server selection problems. Needs to solve the following two proxy server selection problems. 1) Server Selection Problem. Given the target server and a set of proxy servers, choose the best proxy server or servers for a client or for a group of clients, to achieve the maximum aggregate bandwidth. 2) Server Placement Problem. Given the target server and a set of network nodes, choose the best node(s) to place the proxy servers, to maximize the aggregate bandwidth.

Diagram of Sever Selection / Placement Problem How to avoid joint paths when selecting proxy servers? (joint path might become potential bottleneck) How to select geographically diverse proxy servers? Server selection problem Server placement problem

Related Work on Algorithms Mirror server and cache server selection problem has been studied recent years. Mirror server and cache server selection problem has been studied recent years. Formal approach: abstract network model; use graph theory. Formal approach: abstract network model; use graph theory. Common assumptions when getting network model: Common assumptions when getting network model: a) network topology is known, b) the cost associated with each path is known, c) single and static network connections. Algorithms include [QPV01]: Algorithms include [QPV01]: (selecting M replicas among N potential sites) tree-basedgreedyrandom hot spot O(N 3 M 2 )O(N 2 M)O(NM)N 2 + min (NlogN, NM)

Algorithms for Parallel Download Problem NP-hard problem. We plan to develop heuristic algorithms, or by loosing the optimal constrains to simplify the problem to make it solvable in P-time. NP-hard problem. We plan to develop heuristic algorithms, or by loosing the optimal constrains to simplify the problem to make it solvable in P-time. We have developed genetic algorithms to choose best mirror sites for parallel download from multiple mirror sites. The problem can be viewed as a sub problem of PSMC. We have developed genetic algorithms to choose best mirror sites for parallel download from multiple mirror sites. The problem can be viewed as a sub problem of PSMC.

Parallel Download Algorithm Performance Performance result of the parallel download algorithms tested on the simulated network and real-world network looks promising.

PSMC Protocols: Packets Handling Protocols need to be designed for packets handling: Protocols need to be designed for packets handling: Distribute / reassemble packets: add a thin layer between TCP and IP. Modify the Linux kernel. Distribute / reassemble packets: add a thin layer between TCP and IP. Modify the Linux kernel. Transmit packets: use IP Tunnel or IPSec to enable indirect routes. Transmit packets: use IP Tunnel or IPSec to enable indirect routes. Why adding a thin layer for packets distribution and reassembling? Why adding a thin layer for packets distribution and reassembling? Utilize existing TCP protocols, particularly the packets re- sequencing and re-sending mechanism. Utilize existing TCP protocols, particularly the packets re- sequencing and re-sending mechanism. Hide the complexity of multipath connections from end user. Hide the complexity of multipath connections from end user. Maintain the high end-to-end TCP throughput. Maintain the high end-to-end TCP throughput.

PSMC Protocols: IP Tunnel IP tunnel is a technique to encapsulate IP datagram within IP datagram. This allows datagram destined for one IP address to be wrapped and redirected to another IP address. IP tunnel is a technique to encapsulate IP datagram within IP datagram. This allows datagram destined for one IP address to be wrapped and redirected to another IP address. IPSec is an extension to the IP protocol which provides security to the IP and the upper-layer protocols. The IPSec architecture is described in the RFC2401. IPSec is an extension to the IP protocol which provides security to the IP and the upper-layer protocols. The IPSec architecture is described in the RFC2401. Why IP Tunnel: Why IP Tunnel: IP Tunneling is well developed and widely available. IP Tunneling is well developed and widely available. It is a layer 2 protocol, transparent to higher layer. It is a layer 2 protocol, transparent to higher layer. IP Tunneling performance is acceptable. IP Tunneling performance is acceptable. We have investigated other approaches including SOCKS proxy server and Zebedee, which don’t fit our needs. We have investigated other approaches including SOCKS proxy server and Zebedee, which don’t fit our needs.

Special Issues for PSMC Protocols Several special issues for PSMC protocols: Several special issues for PSMC protocols: Based on the feedback from end server, dynamically adjust packets distribution. Based on the feedback from end server, dynamically adjust packets distribution. Outgoing packets might contain redundant information and/or probing message. Outgoing packets might contain redundant information and/or probing message. Fail-over mechanism, packets resend and re-sequencing mechanism, when packets are lost or connections are broken. Fail-over mechanism, packets resend and re-sequencing mechanism, when packets are lost or connections are broken. Sticky-connection mechanism: when some packets need to be sent through a particular path. Sticky-connection mechanism: when some packets need to be sent through a particular path. Related work: Related work: ATCP (ad hoc TCP) [LS01]. ATCP (ad hoc TCP) [LS01]. Linux Virtual Server (LVS). Linux Virtual Server (LVS). Virtual Private Network (VPN) Virtual Private Network (VPN)

IP Tunnel and IPSec

PSMC Diagram

PSMC Applications Secure Collective Defense (SCOLD) network Secure Collective Defense (SCOLD) network PSMC in wireless ad hoc network. PSMC in wireless ad hoc network. Indirect route / additional bandwidth upon operational requests. Indirect route / additional bandwidth upon operational requests. QoS for video streaming. QoS for video streaming. Parallel download from multiple mirror sites. Parallel download from multiple mirror sites.

Secure Collective Defense (SCOLD) network SCOLD tolerates the DDoS attacks through indirect routes via proxy servers, and improves network performance by spreading packets through multiple indirect routes. SCOLD tolerates the DDoS attacks through indirect routes via proxy servers, and improves network performance by spreading packets through multiple indirect routes. SCOLD will incorporate various cyber security techniques, like secure DNS update, Autonomous Anti-DDoS network, IDIP(Intrusion Detection and Isolation Protocol) protocols. SCOLD will incorporate various cyber security techniques, like secure DNS update, Autonomous Anti-DDoS network, IDIP(Intrusion Detection and Isolation Protocol) protocols. The prototype of SCOLD system version 1.0 is finished with secure DNS update and indirect route. The prototype of SCOLD system version 1.0 is finished with secure DNS update and indirect route. We plan to enhance SCOLD for better scalability, reliability, performance and security. We plan to enhance SCOLD for better scalability, reliability, performance and security.

SCOLD: victim under DDoS attacks Victim aaaabbbbcccc A.comB.comC.com... A B C R R2 R1R3 Back door: Alternate Gateways DNS DDoS Attack Traffic Client Traffic Main gateway R under attacks, we want to inform Clients to go through the “back door” - alternate gateways R1- R3. We needs to hide IPs of R1-R3, otherwise they are subject to potential attacks too. how to inform Clients? how to hide IPs of R1-R3? target.com DNS1 DNS2DNS3

SCOLD: raise alarm (1) and inform clients (2) 1. IDS on gateway R detects intrusion, raise alarm to Reroute Coordinator. 2. Coordinator informs clients for new route: a) inform clients’ DNS; b) inform clients’ network proxy server; c) inform clients directly; d) inform the proxy servers and ask the proxy server do (a – c). Victim aaaabbbbcccc A.comB.comC.com... A B C R R2 R1 R3 DNS target.com DNS1 DNS2DNS3 Reroute Coordinator 1: raise alarm 2: inform clients Proxy1

SCOLD: set up new indirect route (3) Victim aaaabbbbcccc A.comB.comC.com... A B C R R2 R1R3 DNS target.com DNS1 DNS2DNS3 Reroute Coordinator 3: new route Proxy1Proxy2 3. Clients set up new indirect route to target via proxy servers. Proxy servers: equipped with IDS to defend attacks; hide alternate gateway and reroute coordinator; provide potential multiple paths. Proxy3

SCOLD Testbed

No DDoS attack direct route DDoS attack direct route No DDoS attack indirect route DDoS attack indirect route 0.49 ms225 ms0.65 ms Preliminary result of SCOLD Table 1: Ping Response Time (on 3 hop route) Table 2: SCOLD FTP/HTTP download Test (from client to target) Table 2: SCOLD FTP/HTTP download Test (from client to target) Table 3: Time to Set up Indirect Route in SCOLD Table 3: Time to Set up Indirect Route in SCOLD PingLess than 1 s HTTPLess than 1 s FTPLess than 1 s

PSMC Applications Evaluation The performance and overhead of multipath connections will be evaluated. The performance and overhead of multipath connections will be evaluated. PSMC will be compared with other multipath connection approaches, like source routing, and Linux multipath connections. PSMC will be compared with other multipath connection approaches, like source routing, and Linux multipath connections. Extensive simulation study on PSMC applications in virtual network, real network, small scale network and large scale network will be conducted. Extensive simulation study on PSMC applications in virtual network, real network, small scale network and large scale network will be conducted.

Security Issues Related to PSMC Potential security issues raised by misusing of PSMC: how to control aggressive clients? Potential security issues raised by misusing of PSMC: how to control aggressive clients? Potential attacks against PSMC: Tunneling to death? (similar to ping to death). Potential attacks against PSMC: Tunneling to death? (similar to ping to death). How to detect and deal with comprised nodes in PSMC network? How to detect and deal with comprised nodes in PSMC network? Study the collective defend mechanism to tie different organizations with better cooperation and collaboration. Study the collective defend mechanism to tie different organizations with better cooperation and collaboration.

Research Plan Will systematically study PSMC in the following areas: Will systematically study PSMC in the following areas: Algorithms for server selections Algorithms for server selections Protocols for packet handling Protocols for packet handling Applications Applications Security issues Security issues

Thank you!