Information-Centric Networks06a-1 Week 6 / Paper 1 Untangling the Web from DNS –Michael Walfish, Hari Balakrishnan and Scott Shenker –Networked Systems.

Slides:



Advertisements
Similar presentations
Untangling the Web from DNS Michael Walfish Hari Balakrishnan Massachusetts Institute of Technology Scott Shenker UC Berkeley/ICSI IRIS Project 30 March.
Advertisements

1 Data-Oriented Network Architecture (DONA) Scott Shenker (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, I. Stoica)
Information-Centric Networks05c-1 Week 5 / Paper 3 Democratizing content publication with Coral –Michael J. Freedman, Eric Freudenthal, David Mazières.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer-to-Peer (P2P) Distributed Storage 1Dennis Kafura – CS5204 – Operating Systems.
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
Serverless Network File Systems. Network File Systems Allow sharing among independent file systems in a transparent manner Mounting a remote directory.
Information-Centric Networks03c-1 Week 3 / Paper 3 The design and implementation of a next generation name service for the Internet –Venugopalan Ramasubramanian.
Naming Computer Engineering Department Distributed Systems Course Asst. Prof. Dr. Ahmet Sayar Kocaeli University - Fall 2014.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
NFS. The Sun Network File System (NFS) An implementation and a specification of a software system for accessing remote files across LANs. The implementation.
Information-Centric Networks05a-1 Week 5 / Paper 1 On the use and performance of content distribution networks –Balachander Krishnamurthy, Craig Wills,
1 Chapter Overview Understanding Windows Name Resolution Using WINS.
Windows Server 2008 Chapter 8 Last Update
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Towards a New Naming Architectures
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
ICS362 Distributed Systems Dr Ken Cosh Week 5. Review Communication – Fundamentals – Remote Procedure Calls (RPC) – Message Oriented Communication – Stream.
Information-Centric Networks03a-1 Week 3 / Paper 1 What DNS is not –Paul Vixie –CACM, December 2009, vol. 52, no. 12 Main point –“DNS is many things to.
DNS and HTTP. Finally, the application layer! We have learned about: – Signals being sent on wires – Frames carried over dumb local networks – Packets.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
DNS: Domain Name System
SAINT ‘01 Proactive DNS Caching: Addressing a Performance Bottleneck Edith Cohen AT&T Labs-Research Haim Kaplan Tel-Aviv University.
Module 2: Implementing DNS to Support Active Directory
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Paper Presentation – CAP Page 2 Outline Review - DNS Proposed Solution Simulation Results / Evaluation Discussion.
5.1 Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Ivy: A Read/Write Peer-to-Peer File System A. Muthitacharoen, R. Morris, T. M. Gil, and B. Chen In Proceedings of OSDI ‘ Presenter : Chul Lee.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
DNS and Naming Aditya Akella 03/16/2007 Supplemental slides.
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
CPSC 441: DNS 1. DNS: Domain Name System Internet hosts: m IP address (32 bit) - used for addressing datagrams m “name”, e.g., - used by.
Configuring Name Resolution and Additional Services Lesson 12.
The Case for Semantic-Free Referencing Hari BalakrishnanScott Shenker Michael Walfish MIT & ICSI/UCB IRIS Project.
Information-Centric Networks06c-1 Week 6 / Paper 3 Middleboxes No Longer Considered Harmful –Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan,
Net 221D:Computer Networks Fundamentals
Information-Centric Networks Section # 3.2: DNS Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 5.3: Content Distribution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 3.3: DNS Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 3.1: DNS Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.2: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.1: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 5.1: Content Distribution Instructor: George Xylomenos Department: Informatics.
1. Internet hosts:  IP address (32 bit) - used for addressing datagrams  “name”, e.g., ww.yahoo.com - used by humans DNS: provides translation between.
The Design and Implementation of a Next Generation Name Service for the Internet V. Ramasubramanian, E. Gun Sirer Cornell Univ. SIGCOMM 2004 Ciprian Tutu.
Naming CSCI 6900/4900. Mounting Mounting – Merging different namespaces transparently File system example –Directory node of one namespace stores identifier.
Basics of the Domain Name System (DNS) By : AMMY- DRISS Mohamed Amine KADDARI Zakaria MAHMOUDI Soufiane Oujda Med I University National College of Applied.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chapter Overview Understanding Windows Name Resolution Using WINS.
Naming for Mobile Systems
CHAPTER 3 Architectures for Distributed Systems
Internet Networking recitation #12
Bina Ramamurthy Chapter 9
Bina Ramamurthy Chapter 9
Bina Ramamurthy Chapter 9
Presentation transcript:

Information-Centric Networks06a-1 Week 6 / Paper 1 Untangling the Web from DNS –Michael Walfish, Hari Balakrishnan and Scott Shenker –Networked Systems Design and Implementation (NSDI) 2004 Main point –The Web uses DNS to resolve hostnames to IP addresses –DNS limitations influence the Web –Web load hurts DS performance –Proposal to use semantic free references on the Web –Resolution infrastructure based on DHTs

Introduction DNS translates machine names to addresses –The commercialization of the Internet makes this complex DNS has become a branding mechanism! –The Web simply requires a Reference Resolution Service (RRS) Map references (links) to actual locations –DNS is not a very good RRS References are tied to hosts, that is, specific machines Makes replication and migration hard What should a good RRS offer? –Persistent object references: not tied to administrative domains –Contention-free references: no legal disputes on ownership Leave the human name to reference translation to others –General-purpose infrastructure: not only for the web Information-Centric Networks06a-2

Semantic free referencing Two key design principles –Semantic-free namespace: no explicit semantics No administrative domain or other ties –Minimal RRS interface and factored functionality Nothing else beyond reference resolution Human friendly names are dealt with by someone else Semantic-free references (SFRs) –Today the web is based on human readable URLs –With SFR we have a two step process –Translate human readable names to SFRs –Resolve SFRs to IP addresses or other information –Allows migration without changing links –Simplifies object replication Information-Centric Networks06a-3

SFR challenges Scalable resolution –Can be based on DHTs, modified to be faster than O(logn) Security and integrity –Need to avoid collisions in a distributed manner Fate sharing –Disconnected domains should still function Trust and financing –Incentives for external nodes to serve my SFRs Canonical names (left to higher layers) –Need names that users can remember Confidence (left to higher layers) –Users expect to understand the URLs they use Information-Centric Networks06a-4

SFR design SFR essentials –Uses a DHT to map SFRtags to o-records –SFRtags: 160 bit strings identifying objects –O-records: metadata associated to SFRtags Location: (ip,port), (DNS,port), SFRtag Oinfo: application specific metadata TTL: time to live, a caching hint –Location can contain multiple fields Either IP addresses, DNS names or other SFRtags Allows multiple degrees of indirection –Oinfo: transparent to the SFR, only for applications For the web could be protocol (HTTP/HTTPS) or a pathname Information-Centric Networks06a-5

SFR model and components DNS relies on local servers for local names –Not possible to do with SFRs SFR requires a common trusted infrastructure –Could be provided by NSF, EU –Eventually could become commercial and competitive The infrastructure is critical –Should be well managed and well connected –It is not a simple P2P system! SFR components –A collection of managed nodes, the SFR servers (DHT) –SFR relays connect to SFR servers similarly to resolvers –SFR client software uses SFR relays to resolve SFRs Information-Centric Networks06a-6

Security and integrity Creation of SFRs in a distributed manner –SFRtag = hash (public key, salt) –Send to SFR infrastructure the SFRtag with additional info The o-record with the metadata Public key, salt and version Signature(o-record, salt, version) –SFR infrastructure verifies hash and signature Lookup of SFRtags –Returns all the above information –Client can verify that the o-record is valid –Does not need a PKI: the public key is tied to the tag and record Modifications to keys or o-records –Next version number, SFR keeps all previous versions Information-Centric Networks06a-7

Latency, fate sharing, scoping Three levels of TTL-based caching –Clients cache entire o-records –SFR servers cache IP addresses of other SFR servers –SFR servers cache o-records for load balancing Fate sharing and scoping –A domain’s SFRtags can be stored anywhere –A local org-store is used to additionally store local SFRtags –All modifications first go to the org-store and then to the DHT If the DHT does not reply, then the change will be sent later –Lookups ask the org-store and the DHT in parallel If the DHT does not reply, rely on the org-store If the DHT replies, update the org-store if needed –Scoping requires SFRtags to be stored only in the org-store Information-Centric Networks06a-8

Web over SFR Links have the form sfr://f012120…/optional_path –The bit string resolves to an o-record –The o-record includes location (IP or DNS) and oinfo –Oinfo includes the protocol and (maybe) an additional path –The optional-path is added at the end of the o-record path The web SFRtag can work in different ways –The oinfo path may be a full path: entire link in the SFR –The oinfo path may be a directory: a set of pages in the SFR –The oinfo path may be empty: only the server in the SFR –The remaining path is the optional_path in the link Replication: simply return many location tuples –Can work at any level (page, directory, host), unlike DNS Information-Centric Networks06a-9

Human usability challenges Canonical names & user confidence –Humans are used to human friendly URLs –But increasingly we do not type the URLs They come from web pages, s or search engines –SFR requires canonicalization services Translation of human friendly names to SFRtags –SFR can support different granularities though Host, page, directory –Bootstrap by embedding SFRtags to search engines in browsers –Confidence can be enhanced by third parties signing SFRtags Pragmatics –Relative references: include hints for local SFRtags Avoid going through the SFR infrastructure for relative references Information-Centric Networks06a-10

Implementation SFR servers use DHash over Chord –Applications use an SFR client to get and put o-records Web proxy to translate URLs to SFRtags –The web client asks the proxy for a URL –The proxy translates it to an SFRtag The salt is a hash of the URL –The proxy uses the SFR client to ask for the o-record If the o-record does not exist, it is created and entered to the SFR This requires a DNS lookup to discover the information Essentially parts of the DNS are entered into SFR Information-Centric Networks06a-11

Evaluation Experiments on PlanetLab –SFR consists of 130 physical nodes, 390 virtual nodes –Web proxies at 3 nodes –Aggressive caching makes the DHT very fast (2-3 hops) –Latency similar to DNS Simulations based on NLANR traces –Simulated a 1000 node SFR –2-3 hops per request (similar to DNS) –Small changes with a reasonable churn rate The SFR is a managed infrastructure, not a P2P application Churn is expected to be low Information-Centric Networks06a-12