ken birman i
play

Ken Birman i Cornell University. CS5410 Fall 2008. Network Overlays - PowerPoint PPT Presentation

Ken Birman i Cornell University. CS5410 Fall 2008. Network Overlays Consider the Internet It creates the illusion of a fully connected n x n world of addressable endpoints dd bl d i t In reality, packets must route through a complex


  1. Ken Birman i Cornell University. CS5410 Fall 2008.

  2. Network Overlays � Consider the Internet � It creates the illusion of a fully connected n x n world of addressable endpoints dd bl d i t � In reality, packets must route through a complex infrastructure, but the end user doesn’t see that , infrastructure � Overlay concept takes this one step further � We focus on some application… and create a dedicated personal internet just for it � The dedicated network might have special properties � The dedicated network might have special properties

  3. Uses of overlays � Load balancing, other forms of quality of service � Distributing files or data down some form of tree structure (allows massive fanouts without forcing any ( ll i f i h f i single node to send huge numbers of copies) � Route around congestion � Route around congestion � Content routing: packets routed on the basis of the data inside them (could look at fields, or might do a data inside them (could look at fields, or might do a whole xquery) � Publish subscribe: packets route on the basis of topic � DHT: In fact, even a DHT is an overlay!

  4. Early Overlays � The first overlays were really Internet “tunnels” � Idea was to encapsulate IP packets in some other network standard t k t d d � … then route them over a link that used non ‐ IP technology gy � … then unpack them and drop them back into IP ‐ land � Then we started to see fancier tunnels � IP multicast over TCP � IPv6 over IPv4

  5. Tunneling Illustrated Step 2 p Original IP packet encapsulated in another IP packet packet Original IP New IP packet Packet Workstation Tunnel Tunnel Router A Router B Original IP Y packet dest Y Workstation Workstation Step 1. Step 3 X Original IP Original, unroutable Original packet packet dest Y extracted, sent IP Packet sent to router to destination

  6. Widely known overlays � Virtual private networks � End point computers need to have some form of certificate that they use to identify themselves tifi t th t th t id tif th l � Typically: each machine has a private key and a public key � With this can send “unforgeable” encrypted data g yp � So: edge machine authenticates itself to the VPN server, which sends back the current secret key of the VPN (a symmetric key) � The edge machine tunnels traffic encrypted with the VPN key � The edge machine tunnels traffic encrypted with the VPN key via the VPN server, which acts as a router

  7. Virtual Dial ‐ up Example (1) Virtual Dial ‐ up Example (1) Public Switched Internet Service Provider Internet Service Provider T l Telephone h Network Gate Gateway (PSTN) way Tunnel (NAS) (NAS) Internet Home Network Worker Machine � Worker dials ISP to get basic IP service � Worker creates his own tunnel to Home Network

  8. Virtual Dial ‐ up Example (2) Virtual Dial ‐ up Example (2) Public Switched Internet Service Provider Internet Service Provider T l Telephone h Network Gateway Gateway (PSTN) Tunnel (NAS) (NAS) (NAC) (NAC) Internet Home Network � Remote worker connects to Home Network through ISP created tunnel through ISP created tunnel � Allows wholesale dial ‐ up

  9. Logical Network Creation Logical Network Creation Network 1 G t Gateway G t Gateway Tunnel (NAS) (NAC) Internet Network 2 � Remote networks 1 and 2 create a logical network g � Secure communication at lowest level

  10. Other uses for overlays � New York Stock Exchange Quote Distribution System � Built around 1995 � Issue: needed a customizable way to route quotes to overhead displays over internal network � Required fault ‐ tolerance � Required fault tolerance � Content sources ran at higher speeds than most display end systems could sustain

  11. Basic idea… � Build a routing tree for quotes χ χ source χ � Then replicate it for fault ‐ tolerance χ χ χ χ χ χ source χ

  12. Components � The source systems were the five or six “clearing” machines used by the NYSE to capture trades, bids, offered prices offered prices � The routers were inexpensive dedicated computers with dual ethernet cards one for each network with dual ethernet cards, one for each network � Each network was a separate ethernet with distinct IP addresses and no automated routing � The overhead displays were basically workstations

  13. Fault ‐ tolerance � They used a virtual synchrony package (Isis) to replicate state within router pairs, and to track subscription patterns subscription patterns Replicate Replicate router state subscription patterns patterns χ χ χ χ χ χ χ source χ � … lots of groups

  14. Why an overlay? � Isis wasn’t capable of supporting very large groups with very high data rates � So sending the actual trades/quotes wasn’t feasible S di h l d / ’ f ibl � Total number of routers was about 75… serving 1000 or more display systems more display systems � By building a TCP ‐ based overlay and using the Isis By building a TCP based overlay and using the Isis groups “out of band”, Isis wasn’t on the critical path � Isis knew about the dual IP network… TCP didn’t.

  15. Outcome? � The solution was completely robust and was used from 1995 until mid 2006 � During that decade there were many failures and even D i h d d h f il d entire network outages � But the NYSE “rode them all out” absolutely But the NYSE rode them all out absolutely unperturbed: traders saw no glitches at all � So here the overlay plays two roles � Overlay carries the heavy communication burden � One overlay for each IP network l f h k

  16. Resilient Overlay Networks Ron Slides http://nms.lcs.mit.edu/ron/

  17. Final example for today: P6P � Research by Li Dong Zhou and Van Renesse � Issue addressed by this work � People want to use IPv6 � But the Internet itself is locked into IPv4 � So idea is to support IPv6 as an overlay S id i IP 6 l � Features of IPv6? F t f IP 6? � Very long addresses (64 bits) � Address doesn’t reveal location (unlike IPv4) � Address doesnt reveal location (unlike IPv4)

  18. How P6P works � Assumes two worlds � An IPv6 world, invisible to them � An IPv4 world, where P6P lives � Some IPv6 nodes live in both, call them “internal gateway nodes” gateway nodes � These have both an IPv6 and an IPv4 address � P6P itself implemented by what they call “external P6P itself implemented by what they call external gateway” nodes that run in the IPv4 network

  19. How P6P works � They designed a DHT based on Chord � Each IPv6 node must have an associated IG � So treat the (IPv6,IPv4) tuple as a (key,value) pair! � IPv6 address is an index into Chord � New IPv6 node would create a new (key,value) pair P d ld (k l ) i � To send an IPv6 packet, look up the IPv4 helper node, then forward the IPv6 packet to the helper then forward the IPv6 packet to the helper � Cache information for reuse � Plus many optimizations, and a security architecture… y p y

  20. How well does it work? � They designed a detailed simulation and looked at random traffic (perhaps unrealistic…) d ffi ( h li i ) � In this model, P6P performed extremely well I hi d l P6P f d l ll � Rapid routing � Fairly quick response when mobile nodes changed their � Fairly quick response when mobile nodes changed their associated IG node � Some false routing, but then automatically recovers � Seems to be a very practical way to roll IPv6 out…

  21. Summary: Overlays � We’ve seen a few examples � VPNs very widely used, origin of the whole idea � RON is perhaps the most debated � Is RON “contrary to the end ‐ to ‐ end spirit of Internet”? � If RON becomes popular, will it break down? � P6P illustrates how overlays can work ‐ around a huge political question (“should we move to IPv6”?) political question ( should we move to IPv6 ?)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend