Or Sheffet Nov. 5 th, 2010 A Delay-Tolerant Network Architecture for Challenged Internets Kevin Falls A Data-Oriented (and beyond) Network Architecture.

Slides:



Advertisements
Similar presentations
Presenter: Anika Aziz National Institute of Informatics (NII), The Graduate University for Advanced Studies, Tokyo, Japan.
Advertisements

1 Data-Oriented Network Architecture (DONA) Scott Shenker (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, I. Stoica)
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Distributed System Architectures.
CCNA – Network Fundamentals
Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California,
Group #1: Protocols for Wireless Mobile Environments.
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
© 2004 The MITRE Corporation. All rights reserved DTN Security Susan Symington March 2005 IETF DTN meeting.
S. Burleigh, A. Hoke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, H. Weiss An approach to Interplanetary Internet Presented by Fabián E. Bustamante.
DTNs Delay Tolerant Networks. Fall, Kevin. Intel Research, Berkeley. SIGCOMM 2003 Aug25, A Delay- Tolerant Network Architecture for Challenged Internets.
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
Rethink the design of the Internet CSCI 780, Fall 2005.
Delay Tolerant Networking Gareth Ferneyhough UNR CSE Department
CS 268: Project Suggestions Ion Stoica January 23, 2006.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
1 A Data-Oriented Network Architecture ACM Sigcomm’07 (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, Scott Shenker, I. Stoica)
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Gursharan Singh Tatla Transport Layer 16-May
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
DELAY-TOLERANT NETWORKS Volodymyr Goncharov Freiburg Uni, WS 2009, Seminar Ad Hoc Netzwerke.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
“Data over Time” Delay Tolerant Networks Joy Ghosh
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
CH2 System models.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
1 Version 3.0 Module 11 TCP Application and Transport.
Paper Group: 12 Data Transport in Challenged Networks Above papers are original works of respective authors, referenced here for academic purposes only.
A Delay-Tolerant Network Architecture for Challenged Internets Author: Kevin Fall Paper Presentation: Vinay Goel.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Goals and Objectives Understand state-of-the-art in network protocols, architectures, and applications Process of networking research Constraints and.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
A Delay-Tolerant Network Architecture for Challenged Internets
Data Oriented Network Architecture (DONA) Andrey Ermolinskiy Mohit Chawla CS 262 A Project Poster December 14.
Computer Networks with Internet Technology William Stallings
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
DTN Research Challenges Vint Cerf MCI March 1, 2005.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
William Stallings Data and Computer Communications
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
TCP/IP Protocol Architecture CSE 3213 – Fall
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
Network and the internet Part eight Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, Ion Stoica SIGCOMM 2007 Presented by Ye Tian for Course CS05112.
Web Services. 2 Internet Collection of physically interconnected computers. Messages decomposed into packets. Packets transmitted from source to destination.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Networking (Cont’d). Congestion Control l Is achieved by informing nodes along a route that congestion has occurred and asking them to reduce their packet.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Lecture (2).
Delay-Tolerant Networks (DTNs)
DELAY TOLERANT NETWORK
ETHANE: TAKING CONTROL OF THE ENTERPRISE
CS 268: Computer Networking
IOS Network Model 2nd semester
A Delay-Tolerant Network Architecture for Challenged Internets
Sarah Diesburg Operating Systems COP 4610
A Delay-Tolerant Network Architecture for Challenged Internets
Andy Wang Operating Systems COP 4610 / CGS 5765
Data-Oriented Network Architecture (DONA)
Transport Layer 9/22/2019.
Presentation transcript:

Or Sheffet Nov. 5 th, 2010 A Delay-Tolerant Network Architecture for Challenged Internets Kevin Falls A Data-Oriented (and beyond) Network Architecture T. Koponen, M. Chawla, B.G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, I. Stoica

Appreciate Your Mailman!

Challenged Internets Mobile Exotic Media Military Sensor … Approach 1: “Fool internet protocols into believing they are operating on a well- performing physical infrastructure”. Approach 2: Attach Challenged internets “at the edge of the internet”.

Challenging Internets High latency – Transmission rates are small. Disconnection – No end-to-end connection necessarily Substantial queuing times – Storing a message for a long time. Interoperability – Local scope, simple design Security – Authentication / access control on limited sources, particularly when we have multiple CoS Limited Longevity – End nodes may be damaged – Life cycle < one-way delivery time! Low Duty Cycle Operation – A-priori scheduling communication patterns Low performance – Limited memory / processors TCP/IP cannot work! Best-effort routing isn’t suitable for these scenarios

Approach 1: Fooling IP “Middle boxes” Performance Enhancing Proxies – Fragile – Violate fate-sharing – Confound end-to-end diagnostics Protocol-boosters – Specialized “internet to challenged-network” protocol translation. Too specific: – Can’t reuse for several applications – Doesn’t use the “special resources the proxy node may have to offer”.

Delay Tolerant Networking 1.Gateways. – Translation from one net to another. – “A point to enforce policy and control”. – Name mapping. – Custody transfer. – Store messages.

Delay Tolerant Networking 2.Name Mapping – Name:={Region, Entity} – Region: Global. Connecting one DTN gateway to another. – Entity: Local, hierarchical. – Late binding for name resolution. (NOT prior to destiny resolution!) 3.Custody Transfer – Persistent / Non-Persistent nodes. – Persistent nodes store messages, participate in custody transfer: Deliver responsibility for message arriving to destination! Hop-by-hop reliability (NOT end-2-end!) Violates fate-sharing! – Might send “acknowledgements” to confirm delivery.

Delay Tolerant Networking 4.Path Selection – Cascading time-dependant ad-hoc contacts. 5.Convergence Layers and Retransmission – Forwards bundles, using convergence layer (augmenting different transport-protocols if needed, to get “underlying reliable delivery capability”+message boundaries). 6.Time Synchronization – Requires synchronization, on a coarse level granularity – May help congestion control 7.Security – Verifiable access to the challenged net. (Routers check credentials.) – Sender -> DTN -> DTN -> … -> DTN -> destination. – Discard traffic a.s.a.p – Cache keys for local senders + DTNs only. 8.Congestion/Flow Control – Flow: To next hop. Congestion: Message storage in a node. – Flow: Proactive (admission control) vs. reactive (direct flow control). – Control: Rejecting message upon full buffer; custody transfers; discarding non-custody – Approach: priority queue for custody storage. Priority inversion Head of line blocking

Discussion Agreement as to the general approach. – Even if it does violate fate sharing. Implementation? – Is it applicable? Architecture? – What’s the underlying mechanism? Evaluation? Overhead issues. – What are the good evaluations? Need we talk to all these networks? – Most communication is internal… Analogy to mail incomplete: No supervising authority! Objections to the other approach: – Does he push the specification “under the rug”? – Does DTN uses the specialized resources?

A Delay-Tolerant Network Architecture for Challenged Internets Kevin Falls A Data-Oriented (and beyond) Network Architecture T. Koponen, M. Chawla, B.G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, I. Stoica

DONA “We take a clean-slate look at naming”. “The user cares about content and is oblivious to location”. Goal – same issues as in CCN: – Persistence: Name should remain valid as long as data is available. – Availability: Seek (and get) nearby copies of data. – Authenticity (NOT trust-worthiness): No spoofing! Major redesign of internet naming. – Naming for Persistence and Authenticity, – Name resolution for availability

DONA’s Basic Functionality 1.Naming – Flat – Organized by principals. Each principal in charge of its own data naming. – Composed of “P:L” P: hash of principal; L: label chosen by principal – Convert human-readable names to DONA names. 2.Name Resolution – FIND(P:L) – Locate the data by name. Using a tree hierarchy of RHs. – REGISTER(P:L) – Add a name to RHs w.r.t proximity to data. “On top of Basic” / Extensions: – Improved content delivery: via caching, adding TTLs to FIND, avoiding overloaded servers. – DTNs: RH can be custody agents. – Access rules + middleboxes: append FIND with authentication, imposing firewall’s required authentication.

Discussion Preceding the CCN paper. Do discuss implementation, feasibility and experimental results. – HTTP – Session Initiation Protocol – Large-files (P2P) – RSS “Every aspect of the design is (proudly) stolen from elsewhere”. Is the “naming revolution” feasible?