Data-Oriented (and Beyond) Network Architecture Article from 2007 SIGCOMM conference Presented by Vilen Looga, M.Sc. DCS Lab Aalto University School of.

Slides:



Advertisements
Similar presentations
Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
Advertisements

Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
1 Data-Oriented Network Architecture (DONA) Scott Shenker (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, I. Stoica)
Secure Mobile IP Communication
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Internetworking II: MPLS, Security, and Traffic Engineering
Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California,
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
Lecture 5 - Routing On the Flat Labels M.Sc Ilya Nikolaevskiy Helsinki Institute for Information Technology (HIIT)
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
1 Internet Networking Spring 2006 Tutorial 7 DVMRP.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Delay Tolerant Networking Gareth Ferneyhough UNR CSE Department
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
1 A Data-Oriented Network Architecture ACM Sigcomm’07 (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, Scott Shenker, I. Stoica)
1 Routing as a Service Karthik Lakshminarayanan (with Ion Stoica and Scott Shenker) Sahara/i3 retreat, January 2004.
Wide-area cooperative storage with CFS
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Towards a New Naming Architectures
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Less Pain, Most of the Gain: Incrementally Deployable ICN 1 Seyed K. Fayazbakhsh, Yin Lin, Amin Tootoonchian, Ali Ghodsi, Teemu Koponen, Bruce Maggs, KC.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Information-Centric Networks06a-1 Week 6 / Paper 1 Untangling the Web from DNS –Michael Walfish, Hari Balakrishnan and Scott Shenker –Networked Systems.
ComNets Tutorial: Future Internet with Information Centric Networks Asanga Udugama (1), Carmelita Goerg (1) and Andreas Timm-Giel (2) (1) Communications.
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
Data Oriented Network Architecture (DONA) Andrey Ermolinskiy Mohit Chawla CS 262 A Project Poster December 14.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
The Intranet.
An analysis of Skype protocol Presented by: Abdul Haleem.
Multimedia & Mobile Communications Lab.
Presented by Rebecca Meinhold But How Does the Internet Work?
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #7 DVMRP.
HTTP evolution - TCP/IP issues Lecture 4 CM David De Roure
Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, Ion Stoica SIGCOMM 2007 Presented by Ye Tian for Course CS05112.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Information-Centric Networks Section # 6.2: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 7.1: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.
Or Sheffet Nov. 5 th, 2010 A Delay-Tolerant Network Architecture for Challenged Internets Kevin Falls A Data-Oriented (and beyond) Network Architecture.
An Introduction to Mobile IPv4
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
SHIP: Performance Reference: “SHIP mobility management hybrid SIP-HIP scheme” So, J.Y.H.; Jidong Wang; Jones, D.; Sixth International Conference on
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
The Intranet.
Internet Indirection Infrastructure (i3)
Net 323 D: Networks Protocols
Subject Name: Computer Communication Networks Subject Code: 10EC71
EE 122: Lecture 22 (Overlay Networks)
Data-Oriented Network Architecture (DONA)
Presentation transcript:

Data-Oriented (and Beyond) Network Architecture Article from 2007 SIGCOMM conference Presented by Vilen Looga, M.Sc. DCS Lab Aalto University School of Science

Reference material Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, and Ion Stoica A data-oriented (and beyond) network architecture. SIGCOMM Comput. Commun. Rev. 37, 4 (August 2007) 2/28

Outline Introduction Basic design Using DONA’s basic functionality Extending DONA Implementation Feasibility Broader Architectural Implications Discussion 3/28

Introduction Currently DNS name resolution system has limited in role over the Internet architecture, mostly for historical reasons Clean slate design for naming and name resolution, with a shift from host-centric to data centric applications in mind 4/28

Introduction Consider the following issues: Persistence – once a data or service object exists, the users require access even if the host has changed Availability – Low-latency and high availability are important requirements, but currently served by ad hoc solutions Authenticity – Explicit authentication of data vs. (typical) secure channel to the source 5/28

Introduction Proposal: Flat, self-certifying names Name-based anycast primitive above IP layer 6/28

Basic Design – Motivation Strict separation of concerns: –Names handle persistence and authenticity: data is not tied to a host; signature verifies data –Name resolution handles availability: guiding requests to the nearest copy of data; avoiding unavailable servers. Out of scope: –Trustworthiness of the source: authors chose to leave it outside of their proposed architecture and instead suggest approaches such as reputation systems and “web-of-trust” (OpenPGP) 7/28

Basic Design – Naming A Internet actor’s, principal’s, identity is tied to public-private key pair A named entity (domain, host, web page, part of web page) is tied to a principal Names in the form P:L, where: – P -> cryptogr. hash of public key –L -> label; hash, in case of immutable data (CDN) Principal authorizes hosts to serve data Each piece of information is signed by the principal (and his key authority, if necessary) Issue: how can user’s remember these flat names? –External mechanisms: Google, FB? –Private database of human readable names? –.. in any case, mapping becomes an issue of trust between a user and a principal, rather than name lookup for administrative structure 8/28

Basic Design – Name resolution Route-by-name instead of lookup-by-name, with the help of Resolution Handlers (RH) Each domain or entity X has one logical RH X, which can have many physical incarnations One RH can act as others peer/child/parent, with the corresponding reverse role of the other RH Each client connects to one logical RH using local configuration (DHCP?) Switching providers would be a simple operation of authorizing new provider 9/28

Basic Design – Name resolution FIND(P:L) – client requests for object P:L and RH requests to a nearby copy FIND(*:L) – immutable data; client is willing to accept self-certified data from any provider REGISTER(P:L) – P registers at it’s local RH REGISTER(P:*) – RH can serve all the data from P 10/28

Basic Design – Name resolution 11/28

Basic Design – Security Issues DoS attacks should be handled on IP layer Peering RHs exchange their public keys to ensure that they are receiving packets from the right source No key revocation mechanism in DONA, blacklist should be provided by third parties Principals can check if their key is already in use by issuing FIND(P:*) message 12/28

Basic Design – Internet Addressing Crisis in the Internet addressing scheme? Authors suggest using path labels: –Each host has a domain specific local address, which is meaningless outside of that domain –When client sends a FIND, each host on the route appends next-hop instructions –Server reverses path instructions to send a response –No per-flow state in the network (unlike NNC) 13/28

Functionality – Server selection A CDN would use several servers authorized to provide P:L datum: –How does the client choose one? Latency? In a P2P network data can be broken into indexed chunks which client can request with FIND(*:L) –After receiving data client can register to serve L at his RH 14/28

Functionality – Mobility and Multihoming A mobile host must unregister from one location and re- register at another Multihomed hosts can register at several local RH Multihomed domain forwards REGISTER messages to each provider 15/28

Functionality – Session Initiation Rendezvous mechanism similar to SIP –SIP INVITE = DONA FIND –SIP REGISTER = DONA REGISTER More on that later 16/28

Functionality – Multicast State Establishment DONA’s anycast primitive can be used for tree discovery A domain border router with members of multicast group P:G, where P is the group originator When a new node joins P:G, its border router R new sends FIND(P:G) to neighbor R. If R has members in P:G it adds R new to overlay topology and both update their P:G table of neighbors R new send REGISTER(P:G) and starts serving as attachment point for P:G 17/28

Extending DONA – Content Delivery Caching – RH can change the source IP address of incoming FIND packets, so that the response will traverse them and they can cache it –solved in path label IA? Subscriptions – using cached TTL’ed FIND packets, ensures that the RH will send updated content to the FIND source Problematic servers – clients can modify the FIND request to access kth server, rather than the closest one 18/28

Extending DONA – DTN Delay-Tolerant Networking works on the principle of message custody transfer: intermediate entity’s are responsible to ensure forwarding of the message RHs in DONE could act as intermediaries similarly to how RH behaves when caching responses to FIND 19/28

Extending DONA – Access rules and middleboxes There is no support for middleboxes and acces rules in the current architecture RH can have meaningful policies when receiving FIND: –Drop it like its hot –Return error code –Ask for authentication RHs can provide capabilites on per-domain basis inserted into FIND packets (path labels for a more general approach) Middlebox insertion in DONA (see next picture) 20/28

Extending DONA – Access rules and middleboxes (Example) 21/28

Implementation RH prototype as a Java deamon that sits between transport and IP layer Implemented several modules in Linux: –Router module – processes incoming REGISTER and FINDS; routes FINDS; monitors liveness of neighbors etc. –Caching module – offers application modules access to a local cache –Application modules – HTTP, SIP, P2P, RSS 22/28

Feasibility – Requirements RHs of Tier-1 providers must maintain registration items for all items in the Internet Total storage = items x 42 bytes per entry = 4 TB Assuming REGISTER messages per second per Tier-1 RH, each needing cryptogr. operations, load could be handled by 40 CPU (or less assuming trust between peering ASs) Assuming 20k FIND requests per second per RH, 500 CPUs should suffice 23/28

Feasibility – design of RH infrastructure Tier-1 AS RH infrastructure –Master RH to receive and store registrations, and disseminate to its peers –Several Cache RH (with the help of cooperative caching, to increase hit rate) to route FINDs from customers, which in case of a failure is sent up to the Master RH –In case of Cache RH failure, it boots up and start repopulating its cache as messages arrive –In case of Master RH failure, it has to re-sync with it’s neighbors 24/28

Broader Architectural Implications Data-oriented architecture allows applications protocols to be oriented around application objects, rather than bytes DONA would raise the level of abstraction on application level, shielding apps from low-level communication problems DONA message propagation mechanism could be suitable for DTNs Data-oriented application interface is similar to Pub/Sub approach, by decoupling end-points in time and space 25/28

Discussion Comparison to ROFL? –Less complex operations –No need to route traffic through neighbors (Chord) Comparison to NNC? –No built-in protection against DDoS attacks Is it viable? 26/28

References Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, and Ion Stoica A data-oriented (and beyond) network architecture. SIGCOMM Comput. Commun. Rev. 37, 4 (August 2007) Matthew Caesar, Tyson Condie, Jayanthkumar Kannan, Karthik Lakshminarayanan, and Ion Stoica ROFL: routing on flat labels. SIGCOMM Comput. Commun. Rev. 36, 4 (August 2006) OpenPGP: Mark Handley and Adam Greenhalgh Steps towards a DoS-resistant internet architecture. In Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture (FDNA '04). ACM, New York, NY, USA, SIP: Xiaowei Yang, David Wetherall, and Thomas Anderson A DoS-limiting network architecture. SIGCOMM Comput. Commun. Rev. 35, 4 (August 2005) Patrick Th. Eugster, Pascal A. Felber, Rachid Guerraoui, and Anne-Marie Kermarrec The many faces of publish/subscribe. ACM Comput. Surv. 35, 2 (June 2003), /28

Thank you!