DNS based IP NetLocation Service China Telecom Guangzhou Institute

Slides:



Advertisements
Similar presentations
IPv6 Victor T. Norman.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Introduction to IPv4 Introduction to Networks.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Location Based MBS Service for IEEE IP Push Service - Jongtaek Oh
1 The 7 layer OSI model Sending an . 2 The seven layers.
1 Improved DNS Server Selection for Multi-Homed Nodes draft-savolainen-mif-dns-server-selection-04 Teemu Savolainen (Nokia) Jun-ya Kato (NTT) MIF WG meeting.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
7DS Seven Degrees of Separation Suman Srinivasan IRT Lab Columbia University.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Chapter 15 Networks.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
Chapter Overview TCP/IP Protocols IP Addressing.
1 Enabling Secure Internet Access with ISA Server.
Evolved from ARPANET (Advanced Research Projects Agency of the U.S. Department of Defense) Was the first operational packet-switching network Began.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
1 26-Aug-15 Addressing the network using IPv4 Lecture # 2 Engr. Orland G. Basas Prepared by: Engr. Orland G. Basas IT Lecturer.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Beyond DHTML So far we have seen and used: CGI programs (using Perl ) and SSI on server side Java Script, VB Script, CSS and DOM on client side. For some.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 Tracker Protocol Proposal.
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
Chapter 6: Packet Filtering
Chapter 4 Networking and the Internet Introduction to CS 1 st Semester, 2015 Sanghyun Park.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
Internet Concept and Terminology. The Internet The Internet is the largest computer system in the world. The Internet is often called the Net, the Information.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5 Darren Shaver – Modified Fall.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
SYSTEM ADMINISTRATION Chapter 8 Internet Protocol (IP) Addressing.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
The Internet School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 15, Monday 12/02/2002 and Wednesday 12/04/2002)
HUAWEI TECHNOLOGIES CO., LTD. Page 1 Survey of P2P Streaming HUAWEI TECHNOLOGIES CO., LTD. Ning Zong, Johnson Jiang.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Othman Othman M.M., Koji Okamura Kyushu University 1.
1 Kyung Hee University Chapter 18 Domain Name System.
1 CS 502: Computing Methods for Digital Libraries Lecture 19 Interoperability Z39.50.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
TCP/IP (Transmission Control Protocol / Internet Protocol)
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
The Client-Server Model And the Socket API. Client-Server (1) The datagram service does not require cooperation between the peer applications but such.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Planning, Configuring, And Troubleshooting WINS.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Domain Name System INTRODUCTION to Eng. Yasser Al-eimad
6to4
GEONET Brainstorming Document. Content Purpose of the document Brainstorming process / plan Proposed charter Assumptions Use cases Problem description.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Multicast in Information-Centric Networking March 2012.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Internet Protocol Version4 (IPv4)
Zueyong Zhu† and J. William Atwood‡
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
I. Basic Network Concepts
Working at a Small-to-Medium Business or ISP – Chapter 7
ARCH-1: Application Architecture made Simple
Computer Networks Protocols
Presentation transcript:

DNS based IP NetLocation Service China Telecom Guangzhou Institute

What is network location service  To provide the target’s position in the network given its IP address  It focuses on network location instead of geographic location application Location Server DNS based Request Respond with its location network target

What is network location  The target’s location in the network, it provides information like: Which ISP the target belongs to Which AS it belongs to Which layer it lies at Which regional network it is in  Not like Geographic location information which contains: City, Street, Building…

Why we need network location information  Content Distribution Network optimization When a user want to get a service, CDN has to decide which server is nearest to the user The wider CDN covers, the more important location service is  Peer to peer application optimization When a new peer joins the overlay network and launches a service, tracker has to determine which nodes are better to be used as its peers The most important information needed by tracker is about how peers are distributed in the whole network

Characteristics of NetLocation Information  Facilitate proximity evaluation  It does not need to be very precise. But still be quite useful given the rough information  Location Information maintained by ISPs is precise enough for traffic optimization

Relevant work in IETF  GeoPriv work group Defined a framework for geographic location service Try to provide a universal and comprehensive solution, thus a little bit complicated The request key is more than just IP address Has proposed to use HTTP and DHCP as transport protocols

Difference with GeoPriv  Scope to serve GeoPriv tries to cover all possible applications NetLocation just provides IP based query  Participants GeoPriv involves several participants such as targets(devices), LIS, rule makers and etc. NetLocation service emphasizes the simplicity , the main players are ISPs and Internet Registry  Implementation difficulty Just for NetLocation service, GeoPriv seems too complicated

A concrete example in P2P downloading  Some facts: P2P overlay network has millions of nodes distributed world-widely Tracker needs to get peer’s location information from different ISPs Tracker wants to use the same interface to communicate with different ISPs Tracker does not want complicated configurations for location service Tracker needs well-formed results to facilitate processing

With GeoPriv solution  Issues How many LISs tracker needs to communicate How many interfaces tracker needs to implement for different ISPs Tracker needs to evaluate peers’ location very quickly. HTTP seems too heavy for this purpose. XML based processing is not light enough

With DNS based solution  Almost zero configuration for tracker  No particular protocol needed  Fast proximity estimation using fixed and formatted location code instead of textual description  DNS protocol is very light and easy to process

Solution of DNS based location service  Use.nl.arpa for netlocation service Service Provision Side. Application Resolver API Service Recipient Side.arpa.com DNS request.nl.arpa.ip-addr.arpa 202.nl.arpa nl.arpa Location Service Zone 101.nl.arpa ISP

Solution of DNS based location service  Create a new domain under.arpa, say it nl.arpa  The whole location records are organized into different zones in reverse DNS style For instance: location record for address is written as ‘ nl.arpa A location_info’ in database  Clients which need location service will send a query with domain name as ‘ nl.arpa.’ using resource type PTR

How should location information be presented  Textual description Use plain text to describe the location like ‘China, Guangdong, Guangzhou, BAS1’ Easy to read for human but hard to handle for computer  Numbered coding Use number to accurately define the location like ‘country_code.ISP_code.prov_code.city_code.di strict_code.BAS_code’ Hard to read but easy to process for computer

Binary presentation for location information 16bit MMMMMOOOOO CountryISPProv/StateCityDistrictASAgg_routerAcc_routerReserved1Reserved2  Give a number to each field instead of textual description  Notation M: Mandatory O: Optional AS: Autonomous System Agg_router: Aggregator router Acc_router: Access router

Ascii Presentation in DNS response  Hexadecimal digits for each field, separated by ‘.’  Example: 1A.2B.3C.4D.5E will be the location information to appear in DNS response with Country code = 1A ISP code = 2B Province/State code = 3C City code = 4D District code = 5E Other codes = 0

Location Code format considerations  A natural way to represent the target’s location in network  The field can be empty if it can not be determined  It is quite easy to evaluate the proximity given a collection of targets  Current P2P systems are using such format for traffic optimization

Security and privacy consideration  Access to NetLocaction service can be controlled by ipaddress-based filter on DNS  Precision can be controlled by ISPs  Location information just represents the position in the network, not necessarily geographic place  Location information does not carry any identity of end user

Summary  NetLocation service uses DNS as transport protocol  NetLocation service uses a new domain called nl.appa  The records are organized and processed like reverse DNS protocol  NetLocation service uses fixed code format to represent the location  NetLocation service implements access control by deploying IP filter on DNS servers  NetLocation service is different from GeoPriv in terms of scope and implementation