how do you improve on the internet
play

How do you Improve on the Internet? The eXpressive Internet - PowerPoint PPT Presentation

5/15/2012 How do you Improve on the Internet? The eXpressive Internet Architecture: The Internet has been tremendously successful From Architecture to Network Has sustained tremendous growth g Supports very diverse set of applications


  1. 5/15/2012 How do you Improve on the Internet? The eXpressive Internet Architecture: • The Internet has been tremendously successful From Architecture to Network – Has sustained tremendous growth g – Supports very diverse set of applications and services Peter Steenkiste Dave Andersen, David Eckhardt, Sara Kiesler, Jon Peha, – Integral part of our society and economy Adrian Perrig, Srini Seshan, Marvin Sirbu, Hui Zhang • Lots of exciting research on how to improve Internet Carnegie Mellon University – Security, routing, wireless/mobile, management, … Aditya Akella, University of Wisconsin – But Internet architecture constrains what can be modified John Byers Boston University John Byers, Boston University • Future Internet Architecture frees researchers to go Winlab FIA, May 14, 2012 beyond today’s IP architecture and infrastructure – Multi ‐ phase, NSF ‐ funded research program – Five teams building full scale networks 1 2 Predicting the Future is Hard! Outline – A lot of really smart people don’t agree: • Background – Named Data Networking: content centric networking Named Data Networking: content centric networking • XIA principles XIA i i l ‐ data is a first class entity • XIA architecture – Mobility First: mobility as the norm rather than the • Building XIA exception – generalizes delay tolerant networking • Conclusion – Nebula: Internet centered around cloud computing data centers that are well connected data centers that are well connected We love all of them! 3 4 1

  2. 5/15/2012 XIA Vision Today’s Internet We envision a future Internet that: Src: Client IP • Is trustworthy Dest: Server IP – Security broadly defined is the biggest challenge • Supports long ‐ term evolution of usage models TCP – Including host ‐ host, content retrieval, services, … Client IP Server IP • Supports long term technology evolution • Client retrieves document from a specific web server – Not just for link technologies, but also for storage and – But client mostly cares about correctness of content timeliness But client mostly cares about correctness of content, timeliness computing capabilities in the network and end ‐ points computing capabilities in the network and end points – Specific server, file name, etc. are not of interest • Allows all actors to operate effectively • Transfer is between wrong principals – Despite differences in roles, goals and incentives – What if the server fails? – Optimizing transfer using local caches is hard • Need to use application ‐ specific overlay or transparent proxy – bad! 5 6 eXpressive Internet Architecture A Bit More Detail … Flexible Trust Dest: Service ID Src: Client ID Management Content Name? Dest: Content ID Dest: Content ID Dest: Client ID Diverse PDA Content ID Communicating Content Entities Dest: Content ID • Client expresses communication intent for content explicitly – Network uses content identifier to retrieve content from appropriate Network uses content identifier to retrieve content from appropriate location Anywhere • How does client know the content is correct? Intrinsic – Intrinsic security! Verify content using self ‐ certifying id: Security hash(content) = content id • How does source know it is talking to the right client? Hash( ) = CID? – Intrinsic security! Self ‐ certifying host identifiers 7 8 2

  3. 5/15/2012 Evolvable Set of Principals Security as Intrinsic as Possible • Identifying the intended communicating • Security properties are a direct result of the design of the system g y entities reduces complexity and overhead entities reduces complexity and overhead – Do not rely on correctness of external – No need to force all communication at a lower configurations, actions, data bases level (hosts), as in today’s Internet – Malicious actions can be easily identified • Allows the network to evolve Content Content a581fe9 ... a581fe9 ... Services Services d9389fa … d9389fa … Future Host Future Host 024e881 … 024e881 … Entities Entities 39c0348 … 39c0348 … 9 10 Other XIA Principles XIA: eXpressive Internet Architecture • Narrow waist for all principals • Each communication operation expresses the – Defines the API between the principals and the network intent of the operation intent of the operation protocol mechanisms t l h i – Also: explicit trust management, APIs among • Narrow waist for trust management actors – Ensure that the inputs to the intrinsically secure system • XIA is a single inter ‐ network in which all match the trust assumptions and intensions of the user principals are connected – Narrow waist allows leveraging diverse mechanisms for trust management: CAs, reputation, personal, … g , p , p , – Not a collection of architectures implemented Not a collection of architectures implemented • All other network functions are explicit services through, e.g., virtualization or overlays – Keeps the architecture simple and easy to reason about – Not based on a “preferred” principal (host or content), that has to support all communication – XIA provides a principal type for services (visible) Look familiar? 11 12 3

  4. 5/15/2012 What Applications Outline Does XIA Support? • Since XIA supports host ‐ based communication, • Background today’s applications continue to work today s applications continue to work • XIA principles XIA i i l – Will benefit from the intrinsic security properties • XIA architecture • New applications can express the right principal – Multiple principals – Can also specify other principals (host based) as fallbacks – DAG ‐ based addressing – Content ‐ centric applications – Intrinsic security – Explicit reliance on network services Explicit reliance on network services • Building XIA – Mobile users • Conclusion – As yet unknown usage models 13 14 Multiple Principal Types What Do We Mean by Evolvability? • Hosts XIDs support host ‐ based communication • Narrow waist of the Internet has allowed the similar to IP – who? network to evolve significantly network to evolve significantly • Service XIDs allow the network to route to • But need to evolve the waist as well! possibly replicated services – what does it do? – Can make the waist smarter – LAN services access, WAN replication, … XIA adds evolvability • Content XIDs allow network to retrieve content at the waist: from “anywhere” – what is it? IP: Evolvability of: Applications Applications – Opportunistic caches, CDNs, … Applications Evolving • Autonomous domains allow scoping, hierarchy set of principals Link technologies • What are conditions for adding principal types? Link technologies 15 15 16 4

  5. 5/15/2012 Multiple Principal Types Supporting Evolvability Choice involves tradeoffs: • Introduction of a new principal type will be Host Host Host • Control • Trust HID HID HID incremental – no “flag day”! SID SID • Efficiency y • Privacy y Service Content Content CID CID SID – Not all routers and ISPs will provide support from day one CID • Creates chicken and egg problem ‐ what comes first: Content network support or use in applications CID • Solution is to provide an …. intent and fallback address CID Content Content Dest CID CID CID CID – Intent address allows in ‐ dd ll AD:HID network optimizations based AD:HID Src on user intent …. Service Service – Fallback address is guaranteed SID SID Content Payload CID CID to be reachable Content Content 17 18 CID CID Addressing Requirements Our Solution: DAG ‐ Based Addressing • Uses direct acyclic graph (DAG) • Fallback: intent that may not be globally understood must include a backwards compatible address must include a backwards compatible address – Nodes: typed IDs (XID; expressive identifier) N d t d ID (XID i id tifi ) – Incremental introduction of new XID types – Outgoing edges: possible routing choices • Scoping: support reachability for non ‐ globally routable XID types or XIDs • Simple example: Sending a packet to HID S – Needed for scalability – Generalize scoping based on network identifiers Generalize scoping based on network identifiers HID S – But we do not want to give up leveraging intent • Iterative refinement: give each XID in the hierarchy Dummy source: Intent: special node indicating option of using intent final destination of packet packet sender with no outgoing edges 19 20 5

  6. 5/15/2012 Support for Scoping with DAG Support for Fallbacks with DAG Server ‐ side domain Client side hierarchy • A node can have multiple outgoing edges CID A Primary edges AD 0 HID S Fallback edge (low priority edge) HID S Intermediate node AD 1 1 • Outgoing edges have priority among them – Forwarding to HID S is attempted if forwarding to CID A is not possible – Realization of fallbacks Support scalable routing, binding, migration, mobility, … 21 22 DAG Addressing Iterative Refinement: Scoping Research Questions while Maintaining Intent • DAG addressing supports is flexible … Server ‐ side domain Client side hierarchy hierarchy – Fallback, binding, source routing, mobility, .. llb k b d b l • … but many questions remain: CID S – Is it expensive to process? – How big will the addresses be? AD 0 HID S S – How do ISPs verify policy compliance? How do ISPs verify policy compliance? – Can they be used to attack network? AD 1 – Can it be deployed incrementally? 23 24 6

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend