Internet Indirection Infrastructure Karthik Lakshminarayanan UC - - PowerPoint PPT Presentation

internet indirection infrastructure
SMART_READER_LITE
LIVE PREVIEW

Internet Indirection Infrastructure Karthik Lakshminarayanan UC - - PowerPoint PPT Presentation

Internet Indirection Infrastructure Karthik Lakshminarayanan UC Berkeley Contrasting LNA, HIP, and i3 LNA = Layered Naming Architecture LNA, HIP, i3: All network architecture proposals Separate location and identity


slide-1
SLIDE 1

Internet Indirection Infrastructure

Karthik Lakshminarayanan UC Berkeley

slide-2
SLIDE 2

Contrasting LNA, HIP, and i3

  • LNA = “Layered Naming Architecture”
  • LNA, HIP, i3:

– All network architecture proposals – Separate location and identity

  • What are the differences?
slide-3
SLIDE 3

i3 Overview

  • (Overlay) Forwarding Infrastructure that allows

users to control routing and naming

  • Routing:

– Senders, receivers can control routing in the network – Set up the routing entries in the infrastructure

  • Naming:

– Fixed size IDs chosen by users/applications – ID typically identifies a service; can also identify end- hosts, etc.

slide-4
SLIDE 4

i3 Overview

  • Basic primitive is indirection
  • Each packet is associated an identifier id
  • To receive a packet with identifier id, receiver R

maintains a trigger (id, R) into the overlay network

Sender id R trigger id data id data R data Receiver

slide-5
SLIDE 5

Mapping IDs

  • i3 is implemented on top of Chord

– But can easily use CAN, Pastry, Tapestry, etc

  • Each trigger t = (id, R) or (id,id’) is stored
  • n the node responsible for id
  • Use Chord recursive routing to find best

matching trigger for packet p = (id, data)

slide-6
SLIDE 6

What i3 supports

  • Communication abstractions

– Mobility, Multicast, Anycast

  • Service interposition

– Receiver-driven, Sender-driven

  • Can combine primitives powerfully

– Receiver-driven heterogenous multicast – Service composition with server selection (using anycast)

  • Enables many applications

– NAT traversal, Secure VPN access – Protection against DoS attacks – IDS: route all packets through an intrusion detection box (e.g., Bro)

slide-7
SLIDE 7

What i3 supports

  • Communication abstractions

– Mobility, Multicast, Anycast

  • Service interposition

– Receiver-driven, Sender-driven

  • Can combine primitives powerfully

– Receiver-driven heterogenous multicast – Service composition with server selection (using anycast)

  • Enables many applications

– NAT traversal, Secure VPN access – Protection against DoS attacks – IDS: route all packets through an intrusion detection box (e.g., Bro)

slide-8
SLIDE 8

Mobility

  • Host just needs to update its trigger as it

moves from one subnet to another

Sender Receiver (R, IP1) Receiver (R, IP2) id IP1 id IP2

slide-9
SLIDE 9

Sender-driven Service Composition

Use stack of identifiers in packets

Sender Receiver (R)

id R1 id1 S1 id R1 id2 S2 id3 R

([id1, id2, id3], data) (R, data) ([S1, id2,id3], data) ([id2,id3], data) (id3, data)

Service (S1) Service (S2)

([S2,id3], data)

Stack of IDs

Receiver is unaware of transformations

slide-10
SLIDE 10

Heterogeneous Receiver-driven

Use stack of identifiers in triggers

Receiver R1 (JPEG) send(id, data) S_MPEG/JPEG Sender (MPEG) send(R1, data) Receiver R2 (MPEG)

id R2

send((id_MPEG/JPEG, R1), data) send(R2, data)

(id_MPEG/JPEG, R1) id id_MPEG/JPEG S_MPEG/JPEG

Sender is unaware of transformations

slide-11
SLIDE 11

Using i3 as a Lookup Infrastructure

  • i3 employs short-cuts if both sender and

recipient allow it

  • i3 is only used as a lookup infrastructure

Sender Receiver (R)

id R1 id1 S1 id R1 id2 S2 id3 R

([id1, id2, id3], data)

Service (S1) Service (S2)

slide-12
SLIDE 12

Using i3 as a Lookup Infrastructure

  • i3 employs short-cuts if both sender and

recipient allow it

  • i3 is only used as a lookup infrastructure

Sender Receiver (R)

id R1 id1 S1 id R1 id2 S2 id3 R

([id1, id2, id3], data)

Service (S1) Service (S2)

slide-13
SLIDE 13

Protocol Stack (Native Apps)

Client app i3 layer DNS

D N S r e q u e s t D N S r e p l y = i d send(IPi3)

Client app i3 layer IP i3 daemon IP Transport id R

IPi3 Receiver R send(id)

Transport

send(id) send(id)

slide-14
SLIDE 14

Status of i3

  • Code publicly available: http://i3.cs.berkeley.edu
  • Supports Linux & Windows XP/2000 legacy

applications

  • Several groups build applications on top of i3

– U. of Waterloo: delay tolerant networks – UIUC: service composition – U. of Tübingen (Germany): mobility, security

slide-15
SLIDE 15

Contrasting HIP, i3 and LNA

  • Infrastructure:

– HIP: rendezvous server – i3: integrated forwarding infrastructure; can be used for lookup also – LNA: uses an external lookup infrastructure

  • Semantics of IDs:

– HIP: IDs identify hosts – i3: IDs identify services; could also identify hosts – LNA: EIDs identify machines and SIDs services

  • Security:

– HIP: authentication, integrity, transport anonymity/DoS resistance – i3: IP anonymity, DoS defense at IP, rest through middleboxes – LNA: everything can be done through middleboxes