PSIRP Architectural Components Part 2 Walter Wong NomadicLab & HIIT 10.02.2010.

Slides:



Advertisements
Similar presentations
CSCI-1680 Network Layer: Intra-domain Routing Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Advertisements

IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
1 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Next Generation Network Architectures Summary John.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
IP Forwarding Relates to Lab 3.
Internetworking II: MPLS, Security, and Traffic Engineering
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
PSIRP Architectural Components Part 1 Mikko Särelä Slides by Walter Wong.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
DNA design team update Brett Pentland – Monash University.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Exterior Gateway Protocols: EGP, BGP-4, CIDR Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
A Study of MPLS Department of Computing Science & Engineering DE MONTFORT UNIVERSITY, LEICESTER, U.K. By PARMINDER SINGH KANG
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Princeton University Joint work with Jennifer.
Computer Networks Layering and Routing Dina Katabi
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Information-Centric Networks07b-1 Week 7 / Paper 2 NIRA: A New Inter-Domain Routing Architecture –Xiaowei Yang, David Clark, Arthur W. Berger –IEEE/ACM.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Dynamic Routing Protocols  Function(s) of Dynamic Routing Protocols: – Dynamically share information between routers (Discover remote networks). – Automatically.
Unicast Routing Protocols  A routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes.
Information-Centric Networks04a-1 Week 4 / Paper 1 Open issues in Interdomain Routing: a survey –Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure.
Introduction to BGP.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Introducing Reliability and Load Balancing in Home Link of Mobile IPv6 based Networks Jahanzeb Faizan, Mohamed Khalil, and Hesham El-Rewini Parallel, Distributed,
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
By Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker Presented by Fei Jia Revisiting IP Multicast.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Router and Routing Basics
2012.**.** Supporting reliability using reverse path in Publish/Subscribe Internet Takashima Daiki ParkLab, Waseda University, Japan 1/11.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
© 2002, Cisco Systems, Inc. All rights reserved. 1 Determining IP Routes.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
CS 4396 Computer Networks Lab IP Multicast - Fundamentals.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Routing and Routing Protocols
PSIRP Inter-domain Topology Formation (ITF) Prof. Sasu Tarkoma University of Helsinki Partially based on slides by Walter Wong and Kari Visala.
Dynamic Routing Protocols II OSPF
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Chapter 21 Multicast Routing
Introduction to Active Directory
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Inter-domain Routing Outline Border Gateway Protocol.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Dynamic Routing Protocols II OSPF
IP Forwarding Covers the principles of end-to-end datagram delivery in IP networks.
Virtual LANs.
Intra-Domain Routing Jacob Strauss September 14, 2006.
ECE 544 Protocol Design Project 2016
Dynamic Routing Protocols II OSPF
Dynamic Routing and OSPF
COS 561: Advanced Computer Networks
Routing With a Link-State Protocol
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Networking and Network Protocols (Part2)
IP Multicast COSC /5/2019.
IP Forwarding Relates to Lab 3.
Dynamic Routing Protocols part3 B
Computer Networks Protocols
Presentation transcript:

PSIRP Architectural Components Part 2 Walter Wong NomadicLab & HIIT

Outline Forwarding Mechanism ◦ Bloom-filters ◦ zFilters ◦ Link Identity Tables (LITs) Topology Management & Formation Network Attachment

Background – IP forwarding Default Free Zone (DFZ) Router GW GW Routing Table Src: Dst: Src: Dst: IP packet Router David Bob IP packet

IP forwarding IP address ◦ Hierarchical topologic semantic (reflects some location in the network) Forwarding ◦ Longest prefix matching ◦ Route aggregation ◦ Default route towards the Internet Core ◦ Bidirectional (reverse path is easily computed) Drawback ◦ Identification and location entangled

Forwarding in PSIRP Major challenges ◦ there is no IP end-point in PSIRP ◦ Fid has no topological information, but cryptographic semantics ◦ No default forwarding layer for packets ◦ Unidirectional ◦ No route aggregation Benefit ◦ Forwarding based on content identifiers instead of location ◦ Data is identified in the network level

Forwarding – Design Goals Efficient ◦ Low latency and high bandwidth Line speed Secure: protection against DDoS capabilities Multicast support Content-centric naming Path splitting ◦ Slow path (routing, policies, security, topology management) ◦ Fast path (forwarding path)

Intra-domain Forwarding Characteristics ◦ Links have identifiers (Link IDs) ◦ Source routing mechanism ◦ Install forwarding state on demand (traffic aggregation) Topology Manager ◦ Constructs Bloom filter-based forwarding identifiers

Bloom Filters – Theory Probabilistic data structure Aggregates a set of information Allows for membership tests ◦ Given one key, is it in the bloom filter? Drawback ◦ False positives

Bloom Filters – Construction Bloom Filter Vector Hash 1 Hash 2 Alice

Bloom Filters – Construction Bloom Filter Vector Hash 1 Hash 2 Bob

Bloom Filter – Membership Test Bloom Filter Vector Hash 1 Hash 2 Bob Bob is in the Bloom Filter!

Bloom Filter – Membership Test Bloom Filter Vector Hash 1 Hash 2 Clark Clark is not in the Bloom Filter! Check whether Clark is in the Bloom Filter

Bloom Filter – False Positives Bloom Filter Vector (contains Alice and Bob) Hash 1 Hash 2 David David is in the Bloom Filter, but he wasn’t previously added! False positive! Check whether David is in the Bloom Filter

False Positives – Math False positive rate: ◦ Fp = (0,6185)^ m/n ◦ k = (m/n)ln2  m = bits in the data structure  n = number of keys in the data structure  k = number of different hash functions

False Positive Rate False positive rate vs. # of keys

Bloom Filter – Summary Probabilistic data structure ◦ False positives ◦ Never false negatives ◦ Trade-off between storage and false positives Efficient membership queries ◦ Hash functions ◦ Line speed

Flat Identifiers Routing How to route flat identifiers in the network? ◦ Bloom filters? General idea ◦ Add the network interfaces where packets must pass through in the Bloom filter ◦ Forwarding nodes check which network interfaces are included in the Bloom filter

Forwarding Header Construction Each link in PSIRP has an identifier ◦ Link identifier (LID) ◦ Unidirectional Topology system ◦ Conceptual delivery tree ◦ Retrieve all links where the data must pass through ◦ Forwarding tree

Data Forwarding Default case ◦ Source-routing based approach ◦ Encode all link Ids into a Bloom filter in the packet header ◦ Check which output interface has LIds included in the Bloom filter zFilter ◦ In-packet Bloom-filter ◦ Used to take the forwarding decision

zFilter – Construction InterfaceLink ID Inter InterfaceLink ID Inter Inter Inter InterfaceLink ID Inter Inter InterfaceLink ID Inter Inter InterfaceLink ID Inter zFilter zFilter zFilter OR Publication 1

zFilter – Construction InterfaceLink ID Inter InterfaceLink ID Inter Inter Inter InterfaceLink ID Inter Inter InterfaceLink ID Inter Inter InterfaceLink ID Inter zFilter zFilter zFilter OR Publication 1

zFilter – Construction InterfaceLink ID Inter InterfaceLink ID Inter Inter Inter InterfaceLink ID Inter Inter InterfaceLink ID Inter Inter InterfaceLink ID Inter zFilter zFilter zFilter OR Publication 1

Data Forwarding Default case ◦ Source-routing based approach ◦ Encode all link Ids into a Bloom filter placed in the packet header ◦ Check which output interface has LIds included in the Bloom filter zFilter ◦ In-packet Bloom-filter ◦ Used to take the forwarding decision

zFilter – Forwarding InterfaceLink ID Inter InterfaceLink ID Inter Inter Inter InterfaceLink ID Inter Inter Interfac e Link ID Inter Inter InterfaceLink ID Inter zFilter zFilter zFilter & zFilter OK! 1

zFilter – Forwarding InterfaceLink ID Inter InterfaceLink ID Inter Inter Inter InterfaceLink ID Inter Inter Interfac e Link ID Inter Inter InterfaceLink ID Inter zFilter zFilter zFilter & zFilter OK! 1

zFilter – Forwarding InterfaceLink ID Inter InterfaceLink ID Inter Inter Inter InterfaceLink ID Inter Inter Interfac e Link ID Inter Inter InterfaceLink ID Inter zFilter zFilter zFilter & zFilter OK! 1

zFilter – Forwarding InterfaceLink ID Inter InterfaceLink ID Inter Inter Inter InterfaceLink ID Inter Inter Interfac e Link ID Inter Inter InterfaceLink ID Inter zFilter zFilter zFilter & zFilter NOK! 1

zFilter – Forwarding InterfaceLink ID Inter InterfaceLink ID Inter Inter Inter InterfaceLink ID Inter Inter Interfac e Link ID Inter Inter InterfaceLink ID Inter zFilter zFilter zFilter & zFilter OK! 1

zFilter – Forwarding InterfaceLink ID Inter InterfaceLink ID Inter Inter Inter InterfaceLink ID Inter Inter Interfac e Link ID Inter Inter InterfaceLink ID Inter zFilter zFilter zFilter & zFilter OK! 1

zFilter – Summary Efficient flat identifier routing ◦ Currrent zFilter = 256 bits ◦ Link IDs are added in the zFilter (OR operation) ◦ Verification requires one comparison (AND operation) Drawback ◦ Possible false positive ◦ Wrong forwarding path

Link Identity Tags (LITs) Solution to reduce false positives Each link has d distinct LITs Allows for constructing zFilters with higher number of zeros Topology Manager has more options to construct the zFilter for the same path

Link Identity Tags zFilter dLIT dLIT LIT LIT D= OR

Link Identity Tags zFilter dLIT dLIT LIT LIT D= OR D=

Link Identity Tags zFilter dLIT dLIT LIT LIT D= OR D= D=

Link Identity Tags zFilter dLIT dLIT LIT LIT D= OR D= D= D= = 3 = 6

zFilter Features Multicast ◦ Include all link Ids in the zFilter FId 21 FId 13 FId 12 FId 51 FId 32 FId 31 FId 22 FId 11 FId 41

zFilter Features Virtual Links ◦ Link aggregation, similar to tunneling model ◦ Solution to dense multicast trees ◦ Virtual links require state in the routers FId 11 FId 12 FId 21 FId 22 FId 31 FId 32 FId VL-01 FId VL-02

Fast Recovery Backup virtual link ◦ Separate virtual backup path pre-configured for each physical link ID ◦ No need to change the packets ◦ Use activation message, informing the backup route to activate the path Second approach ◦ Pre-computed zFilter, add the d value to represent the new path

Loop Prevention First approach ◦ Select BF with lowest false-positive percentage ◦ LIT approach Second approach ◦ Cache packets for small period to detect loops Third approach ◦ TTL

Topology Management/Formation Goal: path creation/computation/management between data sources and sinks Assumptions ◦ Publishers & subscribers don’t know each other’s location Topology Manager (TM) ◦ Node interested in receiving physical information about the network ◦ Creates/Manages forwarding paths ◦ Computes the path from the publishers to the subscribers ◦ Returns the zFilter

Topology Manager (TM) One or more TM per domain Work simultaneously or in anycast way Nodes ◦ Local bootstrapping with HELLO messages ◦ Collect local connectivity with link quality and forwarding capabilities ◦ Publish local connectivity information to the TM TM ◦ Reconstructs the overall forwarding level topology in the network

Topology Management Intra-domain Topology Management ◦ Local network topology generation ◦ Intra-domain forwarding structures management ◦ Computes network states ◦ Updates forwarding information Inter-domain Topology Management ◦ Topology formation in the domain level ◦ Between administrative domains ◦ Configuring and maintaining inter-domain topology based on policies

Intra-domain Forwarding & zFilters zFilter requirement ◦ Knowledge of the individual links composing the forwarding path LIDs list generated based on the Sid and Rid ◦ Domain-specific end-points for data delivery ◦ Builds a forwarding graph between end-points Intra-domain TM ◦ Identifying possible virtual trees (constantly used paths) ◦ Traffic pattern evaluation for virtual tree creation ◦ Lifetime and tree management (state in the router)

Inter-domain Topology Formation (ITF) Helps building the forwarding information ◦ Based on policies set by operators and users Manages edge routers between domains ◦ Protection against policy violations ◦ Protect domain internals

Motivation – ITF PSIRP network vision ◦ Divided in autonomous systems or domains ◦ Controlled by different and competing organizations ◦ Similar to the current Internet Domain level connectivity ◦ Defined by the relationships between organizations ◦ Customers needs ◦ Similar to BGP policies

Motivation – Inter-domain Routing Approximately ~10 tier-1 operators Relationships ◦ Customer-provider ◦ Peer-peer ◦ Sibling-sibling Tier-1operators ◦ Peer with each other and don’t buy traffic from other operators ◦ Monopoly

Inter-domain Topology Formation Goals ◦ Stores forwarding information among domains ◦ Builds forwarding paths based on operator’s policies ◦ Glue together Internet domains

Inter-domain Topology Formation Connect multiple intra-domain Topology Managers Communication between local topology formation and inter-domain topology formation Offline route computation ◦ Faster approach Path construction between publishers and subscribers through different domains

ITF – Design Requirements Flexible control of the routing policies ◦ Packets with different Rids should have different routing policies High granularity ◦ Customers should be able to define per-Rid policies Multi-homing and partial data transit support Operators are able to hide their internal topology

Inter-domain Topology Formation

ITF – Information Gathering Prior to publications ◦ RVS inform status of subscribers regarding Sid/Rids Depends on granularity of information in the RVS ◦ Forward network identifier  ITF has to know a list of network identifiers to connect publishers to subscribers ◦ Landmark identifier  Some landmark close to the subscriber knows how to deliver publications ◦ Forwarding tree identifier  Construct partial distribution trees in anticipation of publications

ITF – Pub/sub approach benefits ITF components can subscribe to route changes ◦ There is no need to sequentially notify each domain ◦ Multicast support in pub/sub  Simultaneous delivery to all ITF through common scope ◦ Avoids route flapping (convergence problem) ◦ Avoids propagation problems (when to stop)

Fault tolerance & Multipath routing Benefits ◦ Spread network load  Can switch between paths and establish new ones ◦ Fault tolerance ◦ Security against eavesdropping Some problems ◦ TCP ordering Solution ◦ Single path for delay sensitive applications No guarantee that there will be path separation if they share the same forwarding domains

Network Attachment Discovery of attachment points ◦ Information on compatibility, identity, services, policies, etc ◦ Initial attachment parameters ◦ Bootstrapping procedure Node authentication ◦ Identity verification ◦ Access rights Configuration information retrieval ◦ Setting up identifiers (Fid, Sid, Rid) for communication ◦ Security parameters negotiation

Network Attachment Communication approaches ◦ Information advertisement in the link layer ◦ Publish solicitations  Nodes can answer with parameters Requirement ◦ Default identifiers for initial communication ◦ Common scope  Scope where advertisements are published

Questions? Comments? Thanks!