Postmodern Internet Architecture Defense Zhaosheng Zhu Kevin Tan.

Slides:



Advertisements
Similar presentations
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
Advertisements

Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv4 - The Internet Protocol Version 4
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
OSI Model OSI MODEL.
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
Chapter 5: TCP/IP and OSI Business Data Communications, 5e.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Internetworking.
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
Chapter 25 Internet Routing Internetworking Technology How routing tables are built initially How routing software updates the tables as needed. Propagation.
Protocols and the TCP/IP Suite
July 27, 2007IRTF RRG Meeting1 Separating Forwarding and Routing (Postmodern Internet Architecture Project) K.Calvert, J. Griffioen — U. Kentucky B. Bhattacharjee,
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
Chapter 2 Network Models.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Gursharan Singh Tatla Transport Layer 16-May
Chapter 5: TCP/IP and OSI Business Data Communications, 6e.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Intranet, Extranet, Firewall. Intranet and Extranet.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Introduction to Network Layer. Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using bridges? –No!
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Protocols and the TCP/IP Suite
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
The Internet Protocol Dr. Adil Yousif. 2  IP (Internet Protocol) is a Network Layer Protocol. Orientation.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
CS 4396 Computer Networks Lab
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Introduction to Active Directory
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
NETWORK DEVICES Department of CE/IT.
CSE5803 Advanced Internet Protocols and Applications (13) Introduction Existing IP (v4) was developed in late 1970’s, when computer memory was about.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
IP - The Internet Protocol
Zueyong Zhu† and J. William Atwood‡
Multicast Outline Multicast Introduction and Motivation DVRMP.
Networking Devices.
Scaling the Network: The Internet Protocol
Lecturer, Department of Computer Application
DEPARTMENT OF COMPUTER SCIENCE
IP - The Internet Protocol
ECE 544 Protocol Design Project 2016
IP - The Internet Protocol
An Update on Multihoming in IPv6 Report on IETF Activity
IP - The Internet Protocol
OSI Model OSI MODEL.
IP - The Internet Protocol
Scaling the Network: The Internet Protocol
IP - The Internet Protocol
Presentation transcript:

Postmodern Internet Architecture Defense Zhaosheng Zhu Kevin Tan

2 Shortcomings of current network layer r Protocols ignore competing economic interests r A few protocols dominate, enabling layer violations that entrench technologies. These layer violations support the policies that were not explicitly designed for within the existing architecture. r The consequences of these shortcomings are well-known: various hacks, layering violations, etc.

3 What we want to do r Design, implement, and evaluate through daily use a minimalist internetwork layer and auxiliary functionality that anticipates tussles and allows them to be played out in policy space.

4 Some novel characteristics: r We separate path determination from forwarding to allow users greater control over the paths followed by packets through the network.. r We capture an unforgeable record of the path traversed by each packet to provide the accountability that would reduce denial of service, spam, and other forms of abuse. r We separate the customer-provider relationship from topology by providing an explicit mechanism for expressing why each router should forward a packet. r We support information flow from the network to the user (for example, about traffic conditions or path availability), and policy flow from the user to the network

5 What must a network layer support? r A diversity of mechanisms to achieve a diversity of policies. For example, Accountability, authentication, authorization, censorship, confidentiality, spam filtering, none of which is well- supported by the Internet.

6 How to reach? r Remove addressing, and routing and at least some aspects of forwarding. r By decoupling these functions from the base network layer, we may construct policy-compliant source routes to deliver end-to-end performance guarantees, and provide accountability where needed.

7 Routing and policy r In BGP, Users have no corresponding method of expressing routing policy. r In conventional source routing, no explicit policy language expresses the means for routing through the network. r Supporting such greater routing flexibility need not rely on complex policy expressions, but rather on designed protocols that explicitly consider business rules

8 Application and policy r A common goal of network policy is to enable, prohibit, or charge for certain applications. r Unfortunately, the middle of today’s network is a poor environment for understanding applications. r As a result, filtering on transport-layer ports and payload inspection is increasingly difficult, especially for encrypted traffic.

9 Postmodern Networks layer design r At least six functional blocks should be considered m A forwarding directive (“where”) that instructs intermediate nodes how to direct or duplicate the packet. m Motivation (“why”) that compels intermediate nodes to forward packets m Accountability tokens (“who”) that allow each conversation to be audited m Knobs (“how”) that express cross-layer hints to lower layers about forwarding intentions m Dials (“what”) that recover information from lower layers, collecting, for example, the maximum observed loss rate along a path, etc., that is needed to make informed decisions about congestion control m Payload

10 Hardware support r Packet header bits are not and should not be precious. Bandwidth is sufficiently cheap that the network should favor carrying more information in the header rather than sacrifice functionality. r Network hardware is powerful enough to provide the flexibility needed to achieve the performance goals

11 Main design goal for layer design and mechanisms design r Complete isolation of routing and forwarding. r User control over inter-realm paths, within the constraints imposed by provider- specified policies. r Isolation of the basic forwarding mechanism from any kind of endpoint identifier r Support late binding of provider policies to define which packets are forwardable, and how they are forwarded.

12 Three major project thrusts r A forwarding mechanism that is independent of routing and does not require hierarchical addresses. r The mechanisms to support policies governing accountability and forwarding motivation. r Cross-layer mechanisms for performance and manageability.

13 Internetwork forwarding service r We propose a mechanism based on loose source routing r Maximizing the separation between forwarding and routing so that optimizations in each dimension can be exploited. r Forwarding does not require hierarchical identifiers linked to topology.

14 Forwarding mechanism r Every link (channel between forwarding elements) has a globally unique linkID that need not be tied to topology. r Each forwarding element knows the linkIDs of directly attached links. r The forwarding directive in each packet specifies the links the packet should traverse.

15 Communication model

16 Forwarding Faults Processing r Forwarding faults occur for one of two reasons: m path resolution and refinement is (implicitly) requested by the source m the specified path contains an error. r One response to a path error is to return an error message to the sender so that it can select a new path and update its routing state.

17 Routing protocols r We implement routing as an independent service. r Because the network is organized into hierarchical realms, conventional hierarchical routing approaches similar to those found in the Internet can be applied.

18 Motivation and Accountability r Packets contain explicit motivation and accountability headers that describe why the packet should be forwarded and who is responsible for that packet. r Identity makes it possible for senders and networks to populate the motivation fields and the accountability fields with unforgeable tokens.

19 Motivation and Accountability r Research who should be visible at the network layer r Reject Global Identity Authorities r Using Decentralized Authorities (use of clique members that certify realm identities with threshold signatures) ‏ r Research how to handle the extra overhead that would result from placing signatures in single packets, over multiple packets, etc.

20 Motivation and Accountability r Identity and Anonymity m Sender and Recipient are kept secret from each other m But the set of hosts participating in the protocol are always known, so issues can be resolved. r Accountability m Two-part signature: first part is realm, second part is host/router within realm. m ISPs control how topology is divulged still, but it unambiguously identifies realm packet came from

21 Knobs and Dials r Essentially Dials are used by lower layers to inform upper layers to make optimizations r Knobs are used by higher layers to implement such optimizations