CS 268: Project Suggestions Ion Stoica January 23, 2006.

Slides:



Advertisements
Similar presentations
Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
Advertisements

Configuring and Troubleshooting Network Connections
CS 4700 / CS 5700 Network Fundamentals Lecture 15: NAT (You Better Forward Those Ports) Revised 3/9/2013.
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday C. Today I³SI³HIPHI³.
OCALA: An Architecture for Supporting Legacy Applications over Overlays Dilip Joseph 1, Jayanth Kannan 1, Ayumu Kubota 2, Karthik Lakshminarayanan 1, Ion.
Internet Indirection Infrastructure Ion Stoica and many others… UC Berkeley.
CS 268: Lecture 5 (Project Suggestions) Ion Stoica February 6, 2002.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
1 Pertemuan 7 Communication Protocols for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Chapter 8 Administering TCP/IP.
Networks: HTTP and DNS 1 The Internet and HTTP and DNS Examples.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
Networks: HTTP and DNS1 Internet, HTTP and DNS Examples.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Indirection Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm Slides.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Replay Debugging for Distributed Systems Dennis Geels, Gautam Altekar, Ion Stoica, Scott Shenker.
1 Enabling Secure Internet Access with ISA Server.
Presenter: Chi-Hung Lu 1. Problems Distributed applications are hard to validate Distribution of application state across many distinct execution environments.
Towards a New Naming Architectures
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
03/11/2015 Michael Chai; Behrouz Forouzan Staffordshire University School of Computing Streaming 1.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
CS 268: Project Suggestions Ion Stoica January 26, 2004.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Module 10: Windows Firewall and Caching Fundamentals.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
OCALA Overlay Convergence Architecture for supporting Legacy Applications on Overlays Dilip Antony Joseph 1, Jayanth Kannan 1, Ayumu Kubota 2, Karthik.
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
Network protocles (TCP), (UDP), (DHCP), (DNS) DR:abd alrauoof alshtawi
Securing Access to Data Using IPsec Josh Jones Cosc352.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
CompTIA Security+ Study Guide (SY0-401)
Module 3: Enabling Access to Internet Resources
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Internet Indirection Infrastructure (i3)
Securing the Network Perimeter with ISA 2004
CompTIA Security+ Study Guide (SY0-401)
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Managing Online Services
The Internet and HTTP and DNS Examples
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
CS 268: Lecture 25 Indirection
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Multimedia and Networks
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Lecture 2: Overview of TCP/IP protocol
EE 122: Lecture 22 (Overlay Networks)
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

CS 268: Project Suggestions Ion Stoica January 23, 2006

2 Overview  Will present >20 project suggestions  This lecture: class projects leveraging internal systems  Next lecture: other projects -Architecture -Theory -Systems

3 Background  Leverage and/or expand internal systems  Internet Indirection Infrastructure (i3)  Overlay Convergence Architecture for Legacy Applications (OCALA)  Distributed debugging (LibLog)  Next, three short presentations on each of these projects (see associated files)

4 Project 1: IP Multicast Support in OCALA  Current implementation supports only IP unicast applications  Add IP multicast support -If overlay/network architecture implements multicast, OCALA should enable IP multicast applications to use it  Implement and evaluate IP multicast support on top of i3

5 Project 2: Distributed Firewall  Today each company/user manages its/her own firewall -Hard to configure and maintain  Provide firewall functionality as a service -A user can have all her packets forwarded through the firewall irrespective of where/how is connected to the Internet -Firewall functionality distributed across a set of servers -Centrally managed  Possible implementation: -Use i3 (or DOA) for indirection, and for implementing signaling protocol between firewall servers -Use OCALA to support legacy applications

6 Project 3: Signaling Protocol for Middleboxes  Design a signaling protocol to accommodate middleboxes/services  Research issues: -Authentication of middleboxes -Transparent recovery: when one middlebox fails another equivalent middlebox can take over -Challenge: recovery transparent to end-hosts at transport layer

7 Projects 4-6: OCD Modules (Each Bullet  One Project) 1)Packet-level compression  Compress packet content / cache most common packets 2)Quality of Service  Both for outgoing and incoming (i.e., TCP) connections  Allow users allocate resources to each type of connection  Use weighted round-robin (WRR) or Hierarchical-Fair Service Curve (H-FSC) as scheduler 3)Allow a host behind a symmetric NAT or restrictive firewall behave as a host behind a cone-NAT that can be configured by the user  Application example: allow Bittorent clients behind NATs/Firewall run efficiently

8 Project 7: Composable OCD Architecture  OCD modules cannot be composed -One cannot take the input from one OCD module and feed it into another OCD module -E.g., not possible to send i3 traffic over HTTP or DNS without modifying i3!  Design an OCD Architecture in which modules can be layered on top of each other  Challenges: -Come up with OCD descriptions and rules (language?) that say which OCDs can be composed and how -Configuration, management, …

9 “ID-based” Architectures  Decouple the identity of an end-host/service from its address  At transport level, sender sends packet to an ID, not an address  Examples -Delegation Oriented Architecture (DOA) [ -Host Identity Protocol (HIP) [ -Internet Indirection Infrastructure (i3) [

10 i3 vs. DOA Internet i3 S1 S2 R ([id S1,id R ], data) id R [id S2,R] id s1 S1 id S2 S2 i3 Internet S1 R ([id S1,id S2 ], data) id S2 id R id S1 S1 id S2 S2 id S1 S1 S2 id S2 S2 id R R id R R Name resolution infrastructure (e.g., OpenDHT) DOA

11 Projects 8-9: i3 Applications (One Bullet  One Project)  File sharing application -Firewall/NAT support -Leverage anycast -Anonymity  Large scale multicast system using a centralized control plane -Multicast trees are computed at

12 Project 10: ID based Transport Protocols  Design a congestion control mechanism (e.g. TCP) such that it is possible to change the receiving machine in the middle of the transfer  Scenario: -A and B open a connection (A receiver; B source) -A changes to A’ -B continues to send data to A’ without creating a new connection  Research: refactor transport such that -Congestion control state binds to address -Data transfer state binds to ID

13 Project 11: Connection-based Middlebox-aware Architecture  Existing middlebox-aware architectures such as i3 and DOA present a network level interface -TCP/UDP connections are end-to-end  Cannot support middleboxes implementing application-level functionality: -E.g., filtering on keywords in payload, caching, compression  Design an architecture that terminates TCP connections at middleboxes -Avoid breaking TCP semantics

14 Project 12: Event Notification System  Users specify events in which they are interested as a conjunction of attributes, e.g., - (stock=“msr”) and (share_price > 60) -(source=“Berkeley”) and (destination=“North Lake Tahoe”) and (time < 3.5 hours)  Research: create an efficient delivery tree -Users with the same interest grouped under the same tree -Users in the same geographic region grouped under the same tree

15 Project 13: Light-weigh LibLog  Logging and replay is not feasible in distributed systems with limited resources (e.g., sensor nets, nanobots, etc.)  Design a light-weigh approach to logging that is both power and space efficient  Research questions: -Is it necessary to log everything? -What events can be discarded without masking the bug from the programmer?

16 Project 14: Distributed Invariants  Goal: automatically figure out relevant invariants of the application so that programmers don't have to input them manually  Possible approach: adapt Daikon to discover distributed system invariants during replay. When such invariants are violated, alert the user -Daikon: a dynamic invariant detector) to the distributed case -See:

17 Project 15: Efficient Checkpointing  Build a checkpoint writing and transmission system based on LBFS (Low-bandwidth Network File System) to reduce communication and storage overhead -  Integrate it with LibLog