CS 268: Project Suggestions Ion Stoica January 26, 2004.

Slides:



Advertisements
Similar presentations
Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
Advertisements

1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Internet Indirection Infrastructure Presented in by Jayanthkumar Kannan On 09/17/03.
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday C. Today I³SI³HIPHI³.
Host Mobility Using an Internet Indirection Infrastructure by Shelley Zhuang, Kevin Lai, Ion Stoica, Randy Katz, Scott Shenker presented by Essi Vehmersalo.
I3 Status Ion Stoica UC Berkeley Jan 13, The Problem Indirection: a key technique in implementing many network services,
Supporting Legacy Applications in Associative Overlay Networks Shelley Zhuang, Ion Stoica {shelleyz, Sahara Retreat January 16-18,
Internet Indirection Infrastructure Ion Stoica and many others… UC Berkeley.
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
CS 582 / CMPE 481 Distributed Systems Communications.
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
CS 268: Lecture 5 (Project Suggestions) Ion Stoica February 6, 2002.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
Internet Indirection Infrastructure (i3) Status – Summer ‘03 Ion Stoica UC Berkeley June 5, 2003.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
CSCI 4550/8556 Computer Networks Comer, Chapter 20: IP Datagrams and Datagram Forwarding.
Internet Indirection Infrastructure Ion Stoica UC Berkeley June 10, 2002.
CS 268: Project Suggestions Ion Stoica January 23, 2006.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Internet Indirection Infrastructure Slides thanks to Ion Stoica.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
CS 268: Overlay Networks: Distributed Hash Tables Kevin Lai May 1, 2001.
CS 268: Lecture 25 Internet Indirection Infrastructure Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Indirection Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm Slides.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Towards a New Naming Architectures
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CS 268: End-Host Mobility and Ad-Hoc Routing Ion Stoica Feb 11, 2003 (*based on Kevin Lai’s slides)
1 Internet Protocol: Forwarding IP Datagrams Chapter 7.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Internet Indirection Infrastructure Ion Stoica April 16, 2003.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
CS 268: Lecture 3 (Layering & End-to-End Arguments)
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Internet Indirection Infrastructure Ion Stoica et. al. SIGCOMM 2002 Presented in CIS700 by Yun Mao 02/24/04.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 7 Internet Protocol (IP) Routing.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Information-Centric Networks Section # 7.1: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.
Internet Indirection Infrastructure Ion Stoica UC Berkeley Nov 14, 2005.
PeerNet: Pushing Peer-to-Peer Down the Stack Jakob Eriksson, Michalis Faloutsos, Srikanth Krishnamurthy University of California, Riverside.
Internet Indirection Infrastructure (i3) Ion Stoica Daniel Adkins Shelley Zhuang Scott Sheker Sonesh Surana Presented by Kiran Komaravolu.
I3 and Active Networks Supplemental slides Aditya Akella 03/23/2007.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Internet Indirection Infrastructure (i3)
Scaling the Network: The Internet Protocol
CS 457 – Lecture 10 Internetworking and IP
Internet Indirection Infrastructure
EE 122: Lecture 7 Ion Stoica September 18, 2001.
Scaling the Network: The Internet Protocol
EE 122: Lecture 22 (Overlay Networks)
COMPUTER NETWORKS CS610 Lecture-29 Hammad Khalid Khan.
EE 122: Lecture 13 (IP Multicast Routing)
Impact of transmission errors on TCP performance
Presentation transcript:

CS 268: Project Suggestions Ion Stoica January 26, 2004

Overview  Discuss 10 project suggestions -5 related to i3 -5 other projects  Legend: based on how well-defined projects are not necessary how difficult they are - Well-defined projects (5) - Less-defined project (3) - You need to define project’s goals (2)  Need to send me a one page proposal by Feb 8

Project Related with Internet Indirection Infrastructure ( i3 )  Overview of i3  Suggestion 1: Transcoding Application  Suggestion 2: Service Differentiation  Suggestion 3: Migrate-able End-to-End Protocols  Suggestion 4: Anonymous File Transfer  Suggestion 5: Event Notification System

Goal  Provide seamless support for basic communication abstractions -Multicast -Anycast -End-host mobility -Service composition

Key Observation  Many of current proposals use indirection, e.g., -Physical indirection point  mobile IP -Logical indirection point  IP multicast “Any problem in computer science can be solved by adding a layer of indirection”

Internet Indirection Infrastructure (i3)  Each packet is associated an identifier id  To receive a packet with identifier id, receiver R maintains a trigger ( id, R) into the overlay network Sender idR trigger iddata Receiver (R) iddata R

Service Model  API -sendPacket( p ); -insertTrigger( t ); -removeTrigger( t ) // optional  Best-effort service model (like IP)  Triggers periodically refreshed by end-hosts  ID length: 256 bits

Mobility  Host just needs to update its trigger as it moves from one subnet to another Sender Receiver (R1) Receiver (R2) idR1 idR2

iddata Multicast  Receivers insert triggers with same identifier  Can dynamically switch between multicast and unicast Receiver (R1) idR1 Receiver (R2) idR2 Sender R1data R2data iddata

Anycast  Use longest prefix matching instead of exact matching -Prefix p: anycast group identifier -Suffix s i : encode application semantics, e.g., location Sender Receiver (R1) p|s 1 R1 Receiver (R2) p|s 2 R2 p|s 3 R3 Receiver (R3) R1 data p|a data p|a data

Service Composition: Sender Initiated  Use a stack of IDs to encode sequence of operations to be performed on data path  Advantages -Don’t need to configure path -Load balancing and robustness easy to achieve Sender Receiver (R) id T T id R Transcoder (T) T,id data iddata R id T,id data id T,id data

Service Composition: Receiver Initiated  Receiver can also specify the operations to be performed on data Receiver (R) id id F,R Firewall (F) Sender id F F id F,R data R F,R data id data id data

Suggestion 1: Transcoding Application  Design a transcoding application -From one video format to another (e.g., MPEG  H.263) -From one data format to another (e.g., HTML  WML)  Transparent recovery -When one transcoder fails, another one takes over without end-hosts being involved

Suggestion 2: Service Differentiation  Problem: flow isolation (UDP can kill TCP)  Solution outline: TCP UDP TCP UDP Run RR Application level congestion control

Suggestion 3: Migrate-able End-to- End Protocols  Design a congestion control mechanism (e.g. TCP) such that it is possible to change the receiving machine in the middle of the transfer!  A and B open a connection (A receiver; B source)  A changes to A’  B continues to send data to A’ without creating a new connection  Challenge: transparently transfer the receiver state from A to A’

Suggestion 4: Anonymous File Sharing  IDs may be chosen such that not to reveal end- host identity -E.g., pick random IDs  Sender doesn’t know the IP address of receiver  You can simply use web to share files!  Questions: -Anonymous search engine -Anonymity vs. performance

Suggestion 5: Event Notification System  Users specify events in which they are interested as a conjunction of attributes, e.g., - (stock=“msr”) and (share_price > 60) -(source=“Berkeley”) and (destination=“North Lake Tahoe”) and (time < 3.5 hours)  Create an efficient delivery tree -Users with the same interest grouped under the same tree -Users in the same geographic region grouped under the same tree  Note: i3 not general enough to address this problem

DHTs Overview  Each data item and machine (node) in the system has associated a unique ID in a large ID space  Hash table like interface -put(id, data) -data = get(id)  ID space is partitioned among nodes  Data items are stored at the node responsible for its ID

Example: Chord  Circular ID space [0..2 m -1]  Consider two consecutive nodes on the ID circle with IDs N1 and N2, where N2 follows N1 -Then node N2 is responsible for interval (N1, N2]  Node 35 inserts (37, data)  Node 3 query data with ID data Chord circle 0 2 m -1

Suggestion 6: Location Control in DHTs  Users do not have control over where data items are located  Advantages: -Users don’t need to know about individual nodes -System can recover in case of failure without user involvement  Disadvantages: -Not efficient -Enforces uniform trust model  Challenge: design a system in which users have “some” degree of control on where data items are located -E.g., “I want my items to be located only on nodes in US”

Suggestion 7: Reduce (eliminate) Multicast State  In IP Multicast each router maintains state for each multicast group that has traffic traversing it  Problem: state hard to maintain and manage  Extreme solution: maintain all receiver addresses in each packet -Routers don’t need to maintain any state, but -Packet headers can become very large  huge overhead  Solution: design an algorithm in between -Maintain some state in routers and some in packets  Note: you can think either at the IP or application layer

Suggestion 8: Multipath Transport Protocols (due to Kevin Lai)  Motivation -Many paths between host A and B in current Internet (multiple base stations, multihoming) -Don’t know characteristics of paths  Which one to use? -Use all of them -Must do so with congestion control -For n independent paths, get n  speedup ?

Suggestions 9: Overlay Routing  Assume -A network topology T -A routing algorithm running on top of T -You control a fraction f of nodes in T  Question: -How well can you approximate an “arbitrary” routing metric as a function of f and topology T ?  Example: -T uses # of hops to implement shortest path -You know delay distributions along links in T -How well can you approximate lowest latency routing metric assuming a power-law topology and f = 10%?

Suggestion 10: Forwarding in Low Energy Wireless Networks  Assumptions -Each node is independently switching between ON and OFF states -Two nodes can communicate only when both of them are simultaneously ON -A node stores a packet in transit until it finds the next hop ON -Routing tables are known  Question: -What is the relationship between the fraction of time a node is ON and the time to deliver a message and the amount of storage required by a node?

Next Step  You can either choose one of the projects we discussed during this lecture, or come up with your own  Pick your partner, and submit a one page proposal by February 8. The proposal needs to contain: -The problem you are solving -Your plan of attack with milestones and dates -Any special resources you may need