Resolving the Transport “Tussle” Recursive InterNetwork Computer Science Boston U. 1.

Slides:



Advertisements
Similar presentations
© Antônio M. Alberti 2011 Host Identification and Location Decoupling: A Comparison of Approaches Bruno Magalhães Martins Antônio Marcos Alberti.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
EE 545 – BOGAZICI UNIVERSITY. Agenda Introduction to IP What happened IPv5 Disadvantages of IPv4 IPv6 Overview Benefits of IPv6 over IPv4 Questions -
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
6.033: Intro to Computer Networks Layering & Routing Dina Katabi & Sam Madden Some slides are contributed by N. McKewon, J. Rexford, I. Stoica.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
COM555: Mobile Technologies Location-Identifier Separation.
Firewalls and Intrusion Detection Systems
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
I. Matta 1 On the Cost of Supporting Multihoming and Mobility Ibrahim Matta Computer Science Boston University Joint work with Vatche Ishakian, Joseph.
Network Layer IS250 Spring 2010
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 26-Aug-15 Addressing the network using IPv4 Lecture # 2 Engr. Orland G. Basas Prepared by: Engr. Orland G. Basas IT Lecturer.
1Group 07 IPv6 2 1.ET/06/ ET/06/ ET/06/ EE/06/ EE/06/ EE/06/6473 Group 07 IPv6.
Presentation Title Subtitle Author Copyright © 2002 OPNET Technologies, Inc. TM Introduction to IP and Routing.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
I. Matta1 On the Cost of Supporting Mobility and Multihoming Vatche Ishakian, Ibrahim Matta, Joseph Akinwumi Computer Science Boston University.
Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Experimenting with Programmable Management Policies over GENI ProtoRINA over GENI Abraham Matta Yuefeng Wang Computer Science Department Boston University.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Chapter 1. Introduction. By Sanghyun Ahn, Deot. Of Computer Science and Statistics, University of Seoul A Brief Networking History §Internet – started.
CIS 3360: Internet: Network Layer Introduction Cliff Zou Spring 2012.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Unreliable inter process communication in Ethernet: Migrating to RINA with the shim DIF Sander Vrijders, Dimitri Staessens, Didier Colle, Mario Pickavet.
UNIT 5 SEMINAR Unit 5 Chapter 6, plus Lab 10 for next week Course Name – IT482 Network Design Instructor – David Roberts Contact Information:
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Addressing Issues David Conrad Internet Software Consortium.
The Network Layer Introduction  functionality and service models Theory  link state and distance vector algorithms  broadcast algorithms  hierarchical.
IPv6 Routing Milo Liu SW2 R&D ZyXEL Communications, Inc.
Multicast ad hoc networks Multicast in ad hoc nets Multicast in ad hoc nets Review of Multicasting in wired networks Review of Multicasting in wired networks.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
William Stallings Data and Computer Communications
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Networking Fundamentals Network Protocols. Protocol Rule for how networks communicate Each OSI layer handled by one or more protocols Protocol Suites.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
CSCI 465 D ata Communications and Networks Lecture 24 Martin van Bommel CSCI 465 Data Communications & Networks 1.
ProtoRINA over ProtoGENI What is RINA? [1][2] References [1] John Day. “Patterns in Network Architecture: A Return to Fundamentals”. Prentice Hall, 2008.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
CS470 Computer Networking Protocols
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
Communication Networks NETW 501 Tutorial 2
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Introduction Wireless devices offering IP connectivity
CS4470 Computer Networking Protocols
Global Locator, Local Locator, and Identifier Split (GLI-Split)
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

Resolving the Transport “Tussle” Recursive InterNetwork Computer Science Boston U. 1

2 What this talk is (NOT) about  NOT about specific protocols, algorithms, interfaces, implementation  It’s about architecture, i.e., objects and how they relate to each other  It’s based on the IPC model, not a specific implementation “Networking is inter-process communication” --Robert Metcalfe ’72

What’s wrong with today’s Internet?  The new brave world m Larger scale, more diverse technologies m New services: content-driven, context-aware, mobile, socially-driven, secure, profitable, …  Custom point-solutions: No or little “science”  Lots of problems: Denial-of-service attacks, unpredictable performance, hard to manage, … 3 Mesh router with gateway Wireless Mesh Backbone Internet Cell phone Base Station VoIP + video/TV streaming Cellular Data Network Laptop PDA Ad-Hoc Wireless Network Laptop PDA Cell phone Sink Sensor Event Wireless Sensor Network

Questions?  Is the Internet’s architecture fundamentally broken that we need to “clean slate”? m Yes  Can we find a new architecture that is complete, yet minimal? If so, what is it? m RINA?  Can we transition to it without requiring everyone to adopt it? m Yes 4

Internet’s view: one big, flat, open net Network Transport Data Link Physical Application Network Transport Data Link Physical Application Network DL PHY Web, , ftp, …  There’s no building block  The “hour-glass” model imposed a least common denominator  We named and addressed the wrong things (i.e. interfaces)  We exposed addresses to applications IP protocol TCP, UDP, … 5

6 Ex1: Bad Addressing & Routing  Naming “interfaces” – i.e., (early) binding (of) objects to their attributes (Point-of-Attachment addresses) – makes it hard to deal with multihoming and mobility m Mobility is a dynamic form of multihoming  Destination application process identified by a well- known (static) port number Bob Alice I1I1 I2I2 Want to send message to “Bob” multi-homed destination To: I 1 “Bob”  I 1

7 Ex2: Ad hoc Scalability & Security  Network Address Translator aggregates private addresses  NAT acts as firewall m preventing attacks on private addresses & ports  But, hard to coordinate communication across domains when we want to can’t initiate connection NAT, id A  B, id B B A NAT To: NAT, id A To: B, id B Mapping Table message

8 Our Solution: divide-and-conquer  Application processes communicate over (distributed) IPC facility  How IPC managed is hidden from applications  better security  IPC processes are application processes of lower IPC facilities  Recurse as needed  better management & scalability  Well-defined service interfaces  predictable service quality m Applications ask for a location-independent service m The underlying IPC layer maps it to a location-dependent node name, i.e. address

9 Recursive Architecture based on IPC Base CaseRepeat 0-DIF 1-DIF 2-DIF node 1 node 2 node 3 node 4 DIF = Distributed IPC Facility (locus of shared state=scope) Policies are tailored to scope of DIF

10 What Goes into a DIF?  All what is needed to manage a “private” (overlay) network m A DIF integrates routing, transport and management m In TCP/IP, we artificially isolated functions of same IPC / scope IPC Transfer IPC Control IPC Management Delimiting Transfer Relaying/ Muxing PDU Protection Common Application Protocol Applications, e.g., routing, resource allocation, access control, etc. DTSVRIB

11 What Goes into a DIF?  Processing at 3 timescales, decoupled by either a State Vector or a Resource Information Base m IPC Transfer actually moves the data (tightly coupled mechanisms) m IPC Control (optional) for error, flow control, etc. Good we split TCP, but we split it in the wrong direction! m IPC Management for routing, resource allocation, locating applications, access control, monitoring lower layer, etc. We need only one “stateless” Common Application Protocol to access objects: CREATE, DELETE, UPDATE, … IPC Transfer IPC Control IPC Management Delimiting Transfer Relaying/ Muxing PDU Protection Common Application Protocol Applications, e.g., routing, resource allocation, access control, etc. DTSVRIB

Only one Data Transfer Protocol  RINA decouples port allocation and access control from data transfer  Allocating conn ID (ports) is done by management, IPC Access (Flow Allocation) Protocol, in a hard-state (HS) fashion  Once allocated, Data Transfer can start, ala Delta-t [Watson’81] m Flows without data transfer control are UDP-like. Flows without reliability requirement do not ACK. Different policies support different requirements  Delta-t is a soft-state (SS) protocol  If there is a long idle period, conn state (DTSV) is discarded, but ports remain IPC Access Protocol 12

RINA allows scoping of services Network Transport Data Link Physical Application Network Transport Data Link Physical Application Network DL PHY TCP, UDP, … IP Web, , ftp, … DIF  The DIF is the building block and can be composed  Good we split TCP, but we split TCP in the wrong direction!  E2E (end-to-end principle) is not relevant m Each DIF layer provides (transport) service / QoS over its scope  IPv6 is/was a waste of time! m We can have many layers / levels and not need too many addresses within a DIF layer 13

14 RINA: Good Addressing – private mgmt  Destination application is identified by “name”  Each IPC Layer (DIF) is privately managed m It assigns private node addresses to IPC processes m It internally maps app/service name to node address m Need a global namespace, but not address space m Destination application process is assigned a port number dynamically BA I1I1 I2I2 want to send message to “Bob” DIF To: B “Bob”  B Bob DIF

15 RINA: Good Addressing - late binding  Addressing is relative: node address is name for lower IPC Layer, and point-of-attachment (PoA) for higher IPC Layer  Late binding of node name to PoA address  A machine subscribes to different DIF layers BA I1I1 I2I2 want to send message to “Bob” BI2BI2 To: B Bob DIF B,, are IPC processes on same machine I1I1 I2I2

16 RINA: Better Scalability & Security – secure containers  Nothing more than applications establishing communication m Authenticating that A is a valid member of the DIF m Initializing it with current DIF information m Assigning it an internal address for use in coordinating IPC m This is enrollment B A NAT? Not really!

17 RINA: Good Routing  Back to naming-addressing basics [Saltzer ’82] m Service name (location-independent)  node name (location-dependent)  PoA address (path-dependent)  path  We clearly distinguish the last 2 mappings  Route: sequence of node names (addresses)  Late binding of next-hop’s node name to PoA at lower DIF level source destination

18 Mobility is Inherent  Mobile joins new DIF layers and leaves old ones  Local movement results in local routing updates CHMH

19 Mobility is Inherent  Mobile joins new DIF layers and leaves old ones  Local movement results in local routing updates CH

20 Mobility is Inherent  Mobile joins new DIF layers and leaves old ones  Local movement results in local routing updates CH

Compare to loc/id split (1)  Basis of solutions to the multihoming issue  Claim: the IP address semantics are overloaded as both location and identifier  LISP (Location ID Separation Protocol) ’06 EID x  EID y RLOC 1x  RLOC 2y Mapping: EID y  RLOC 2y 21

Compare to loc/id split (2)  Ingress Border Router maps ID to loc, which is the location of destination Egress BR  Problem: loc is path-dependent, does not name the ultimate destination EID x  EID y RLOC 1x  RLOC 2y Mapping: EID y  RLOC 2y 22

LISP vs. RINA vs. …  Total Cost per loc / interface change = Cost of Loc / Routing Update +   [ P cons *DeliveryCost + (1-P cons )*InconsistencyCost ]  : expected packets per loc change P cons: probability of no loc change since last pkt delivery  RINA’s routing modeled over a binary tree of IPC Layers: update at top level involves route propagation over the whole network diameter D; update at leaf involves route propagation over D/2 h, h is tree height 23

LISP 24

LISP 25

RINA 26

RINA 27

RINA 28

MobileIP 29

LISP vs. RINA vs. … RINA 8x8 Grid Topology RINA uses 5 IPC levels; on average, 3 levels get affected per move LISP 30

Simulation: Packet Delivery Ratio  BRITE generated 2- level topology  Average path length 14 hops  Random walk mobility model  Download BRITE from 31 RINA LISP

Simulation: Packet Delay 32 LISP RINA

Bottom Line: RINA is less costly  RINA inherently limits the scope of location update & inconsistency  RINA uses “direct” routing to destination node 33

34 Adoptability  ISPs get into the IPC business and compete with host providers m Provide transport services everywhere  A user joins any IPC network she chooses  All IPC networks are private  We could still have a public network with weak security properties, i.e., the current Internet  Many IPC providers can join forces and compete with other groups

35 Related Work  Back to networking basics m Networking is IPC and only IPC [Metcalfe ’72]  Back to naming-addressing basics m Service name (location-independent)  node name (location-dependent)  PoA address (path-dependent)  path [Saltzer ’82] m We clearly distinguish the last 2 mappings m Route: sequence of node names (addresses) m Map next-hop’s node name to PoA at lower IPC level  Recursive [Touch et al. ’06] but we recurse IPC over different scopes m Beyond “middleware” and “tunneling”  Loc/id split [LISP ’06] approaches: “loc” does not name the dest!

36 Current / Future Work  Complete specification of IPC mechanism (data transfer & control) and management (routing, security, resource allocation, …)  Prototyping and evaluation m Local testbed m Wide-area testbed: PlanetLab, GENI m Support for mobility, multihoming, service composition, …  Experiment with new services m E.g., EaaS (Enclave as a Service), where a secure DIF is dynamically created

37