2004-10-121 InfraHIP HIIT ARU Portfolio Seminar Andrei Gurtov.

Slides:



Advertisements
Similar presentations
© Antônio M. Alberti 2011 Host Identification and Location Decoupling: A Comparison of Approaches Bruno Magalhães Martins Antônio Marcos Alberti.
Advertisements

Network Support for Accountability Nick Feamster Georgia Tech Collaborative Response with David Andersen (CMU), Hari Balakrishnan (MIT), Scott Shenker.
Accountable Internet Protocol David Andersen (CMU) Hari Balakrishnan (MIT) Nick Feamster (Georgia Tech) Scott Shenker (Berkeley)
Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
Overview of NordicHIP project The 24th NORDUnet Conference Andrei Gurtov HIIT
HIP research group 1 HIP-RG meeting IETF 80 March 29, 2011 Andrei Gurtov and Tom Henderson
Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
HIP Resolution & Rendezvous Problem Description HIP Resolution & Rendezvous Problem Description draft-eggert-hiprg-rr-prob-desc-00 IETF-61, Washington,
HIP working group 1 HIP-WG meeting, IETF61 HIP-mm update November 8, 2004 Tom Henderson.
Why do current IP semantics cause scaling issues? −Today, “addressing follows topology,” which limits route aggregation compactness −Overloaded IP address.
Prof. Ing. Karel, CSc., Univerzita Pardubice, FEI, KST doc. Ing. Emil Kršák, PhD., Žilinská univerzita, FRI RNDr. Hynek Bachratý, PhD.,Žilinská univerzita,
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday C. Today I³SI³HIPHI³.
OCALA: An Architecture for Supporting Legacy Applications over Overlays Dilip Joseph 1, Jayanth Kannan 1, Ayumu Kubota 2, Karthik Lakshminarayanan 1, Ion.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
Supporting Legacy Applications in Associative Overlay Networks Shelley Zhuang, Ion Stoica {shelleyz, Sahara Retreat January 16-18,
Internet Indirection Infrastructure Ion Stoica and many others… UC Berkeley.
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
T Computer Networks II Introduction Adj. Prof. Sasu Tarkoma.
ChowSCOLD1 Secure Collective Defense Network (SCOLD) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
Structure Overlay Networks and Chord Presentation by Todd Gardner Figures from: Ion Stoica, Robert Morris, David Liben- Nowell, David R. Karger, M. Frans.
Enhanced Secure Dynamic DNS Update with Indirect Route David Wilkinson, C. Edward Chow, Yu Cai 06/11/2004 University of Colorado at Colorado Springs IEEE.
ChowSCOLD1 Secure Collective Internet Defense (SCOLD) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
Towards a New Naming Architectures
Host Identity Protocol
A Layered Naming Architecture for the Internet Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Michael Walfish.
HIIT’s Future Internet Research Programme Kimmo Raatikainen Programme Director: Future Internet
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Computation for Physics 計算物理概論 Introduction to Linux.
Host Identity Protocol Pekka Nikander Ericsson Research Nomadiclab and Helsinki Institute for Information Technology
Tiziana Ferrari Overview of INFN-GRID WP5: Network 1
Home Lab: Shared Infrastructure for Home Technology Field Studies A.J. BrushJaeyeon JungRatul MahajanJames Scott.
Update on the Internet Research Task Force Aaron Falk IRTF Chair IETF-72 – Dublin.
Re-thinking Security in Network Mobility Jukka Ylitalo Ericsson Research NomadicLab NDSS '05 Workshop - February 2.
End-to-end Quality of Service over heterogeneous networks José Enríquez Gabeiras Telefónica I+D.
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
1 Mobility Support by the Common API for Transparent Hybrid Multicast draft-irtf-samrg-common-api-03 Project Matthias Wählisch,
HIP research group 1 HIP-RG meeting IETF 79 November 9, 2010 Andrei Gurtov and Tom Henderson
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
Review of HIPRG status at IAB breakfast Andrei Gurtov Tom Henderson
HIP proxy Patrik Salmela Contents Background: ID-locator split HIP Why a HIP proxy Functionality of a HIP proxy The prototype.
Doc.: IEEE Submission November 2009 Robert Moskowitz (ICSAlabs/VzB)Slide 1 Project: IEEE P Working Group for Wireless Personal.
HIP research group 1 HIP-RG meeting, IETF 65 March 24, 2006 Andrei Gurtov and Tom Henderson
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
HIP research group 1 HIP-RG meeting, IETF 61 November 12, 2004 Tom Henderson Pekka Nikander
1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
Information-Centric Networks Section # 6.2: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
HIP research group 1 HIP-RG meeting IETF 77 March 22, 2010 Andrei Gurtov and Tom Henderson
OCALA Overlay Convergence Architecture for supporting Legacy Applications on Overlays Dilip Antony Joseph 1, Jayanth Kannan 1, Ayumu Kubota 2, Karthik.
HIP & MIP V 6 SECURITY Research: Security Architecture IRT Lab, Columbia University.
Michael G. Williams, Jeremey Barrett 1 Intro to Mobi-D Host based mobility.
HIP research group 1 HIP-RG meeting IETF 78 July 27, 2010 Andrei Gurtov and Tom Henderson
HIP research group 1 HIP-RG meeting, IETF 64 November 11, 2005 Tom Henderson
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Host Identifier Revocation in HIP draft-irtf-hiprg-revocation-01 Dacheng Zhang IETF 79.
HIP-Based NAT Traversal in P2P-Environments
Update on the Internet Research Task Force
Internet Indirection Infrastructure (i3)
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
A Layered Naming Architecture
TRUST:Team for Research in Ubiquitous Secure Technologies
Ambient Networks Phase 2 Concept, goals, and status
Internet-based monitoring and control of embedded systems
Presentation transcript:

InfraHIP HIIT ARU Portfolio Seminar Andrei Gurtov

Host Identity Protocol  Idea: transport protocols bind to a hash of the host identity key, instead of IP address Secure mobility without a need for a centralized public key infrastructure  Provides support for mobility, multi-homing HIIT active with HIP since 2001, co-author of IETF specs, the Linux implementation IETF working group, IRTF research group HIP considered as an architectural piece for Ambient Networks and Daidalos EU projects, Internet control plane (Boeing/UCB)

Tekes Infrastructure for HIP Project  Partners: HIIT, TKK, Nokia, Ericsson, Operator x, Finnish Defence Forces 2,5 years, late  Project Goals Study the use of Distributed Hash Tables and overlay networks for HIP Finalize HIP Linux, release as open source IETF work on rendezvous, DNS Develop native HIP API Multiple ids on a single host Prototype HIP process migration HIP in corporate sector

Current Progress  Prototype of Host Identity Indirection Infrastructure (Hi3) Use of the Internet Indirection Infrastructure as a control plane for HIP Hiding IP addresses for DoS protection until the handshake is completed Solves the initial rendezvous and double-jump problems  Setup of PlanetLab testbed in HIIT 450 servers worldwide for testing of distributed applications

International Connections  ICSI, Berkeley Scott Shenker  UC Berkeley Ion Stoica, Anthony Joseph  M.I.T Hari Balakrishnan  Next meeting in Berkeley in November 3-5

People Involved  Doc. Pekka Nikander, prof. Martti Mäntylä (HIIT)  prof. Antti Ylä-Jäaski (TKK)  Andrei Gurtov, PhD  Teemu Koponen, MSc  Miika Komu, ~MSc  Mika Kousa, ~MSc  Dmitry Korzun, PhD  WenPeng, MSc  Janne Lindqvist, MSc

InfraHIP Work Packages 1.Architectural 2.HIP Linux 3.Rendezvous 4.Multiple HIP identities 5.Process migration 6.New applications 7.Corporate HIP

WP1. Architectural  Explore the general effect of identifier/separator split on Internet  Study alternative solutions to HIP Internet Indirection Infrastructure Distributed Hash Tables  Produce report on findings

WP2. HIP on Linux  Finalize HIIT’s HIP implementation in Linux kernel  Release as open source, maintained, and easily usable software  Integrate into standard Linux kernel  Finalize native HIP API

WP3. Rendezvous  Infrastructure support for resolving Host Identities for HIP  DNS Extensions  Use of Distributed Hash Tables or i3 servers  Contribute to IETF standards  Deploy an experimental infrastructure on a wide-scale testbed PlanetLab

WP4. Multiple Identities  How to manage and store multiple host identifiers on a single operating system  Needed e.g. for privacy protection  Contribute to IETF standards

WP5. Process Migration  Study migration of a running HIP application between hosts  Transfer of keys over network  Implement a prototype

WP6. Applications  Evaluate new possible applications enables by HIP  E.g. distributed file system with back- up  Peer-to-peer systems  Implement prototypes

WP7. Corporate  Study use of HIP in the corporate sector  VPN solutions  Management of HIP hosts  NAT/Firewall traversal  Prototype of the management tool