Unmanaged Internet Protocol Taming the Edge Network Management - - PowerPoint PPT Presentation

unmanaged internet protocol
SMART_READER_LITE
LIVE PREVIEW

Unmanaged Internet Protocol Taming the Edge Network Management - - PowerPoint PPT Presentation

Unmanaged Internet Protocol Taming the Edge Network Management Crisis Bryan Ford Massachusetts Institute of Technology HotNets II November 21, 2003 Ubituitous Networking What is it? Why isn't it here yet? How can we


slide-1
SLIDE 1

Unmanaged Internet Protocol

Taming the Edge Network Management Crisis

Bryan Ford Massachusetts Institute of Technology HotNets II – November 21, 2003

slide-2
SLIDE 2

“Ubituitous Networking”

  • What is it?
  • Why isn't it here yet?
  • How can we make it work?
slide-3
SLIDE 3

A Ubiquitous Networking Scenario

slide-4
SLIDE 4

A Ubiquitous Networking Scenario

Joe

slide-5
SLIDE 5

A Ubiquitous Networking Scenario

slide-6
SLIDE 6

A Ubiquitous Networking Scenario

Ethernet DSL/Cable Internet

slide-7
SLIDE 7

A Ubiquitous Networking Scenario

Ethernet DSL/Cable Internet

slide-8
SLIDE 8

A Ubiquitous Networking Scenario

Ethernet DSL/Cable Internet 802.11

slide-9
SLIDE 9

A Ubiquitous Networking Scenario

Internet

slide-10
SLIDE 10

A Ubiquitous Networking Scenario

Internet

slide-11
SLIDE 11

A Ubiquitous Networking Scenario

Internet Jim Joe

slide-12
SLIDE 12

A Ubiquitous Networking Scenario

Internet Jim Joe

slide-13
SLIDE 13

A Ubiquitous Networking Scenario

Internet Jim Joe amazon.com

slide-14
SLIDE 14

A Ubiquitous Networking Scenario

Internet Jim Joe

?

slide-15
SLIDE 15

A Ubiquitous Networking Scenario

“NAT?”

slide-16
SLIDE 16

A Ubiquitous Networking Scenario

“NAT?” “Dynamic DNS?”

slide-17
SLIDE 17

A Ubiquitous Networking Scenario

“NAT?” “Dynamic DNS?” “Mobile IP?”

slide-18
SLIDE 18

A Ubiquitous Networking Scenario

Internet Jim Joe

slide-19
SLIDE 19

A Ubiquitous Networking Scenario

Joe Jim

slide-20
SLIDE 20

A Ubiquitous Networking Scenario

Joe Jim

slide-21
SLIDE 21

A Ubiquitous Networking Scenario

Joe Jim

?

slide-22
SLIDE 22

A Ubiquitous Networking Scenario

Joe Jim

“Ad-hoc mode?”

slide-23
SLIDE 23

A Ubiquitous Networking Scenario

Joe Jim

“Ad-hoc mode?” “DHCP?”

slide-24
SLIDE 24

A Ubiquitous Networking Scenario

Joe Jim

“Ad-hoc mode?” “DHCP?” “Static IP addresses?”

slide-25
SLIDE 25

A Ubiquitous Networking Scenario

Joe Jim

slide-26
SLIDE 26

The Problem

Getting “ubiquitous networking” devices to

ubiquitously network

is way too complicated, even when the technology is available.

slide-27
SLIDE 27

Outline

  • Motivation: What's wrong?

Why doesn't ubiquitous networking work?

Answer: hierarchical address-based routing (ABR).

How do we fix it?

Answer: scalable identity-based routing (IBR).

A proposed identity-based routing architecture

Conclusion

slide-28
SLIDE 28

Why IP is Wrong for Edge Networks

  • Hierarchical address architecture

Routable addresses must be allocated from central administrative authorities

Each node must be assigned an address:

Static assignment

inconvenient, requires knowledge

DHCP

nodes can't talk at all without DHCP server

Address hierarchy must reflect topology

Node mobility

address instability, broken connections

Good for scalability, bad for useability

slide-29
SLIDE 29

What about ad-hoc routing protocols?

  • Landmark, DSR, DSDV, AODV, etc.
  • A big step in the right direction, but:

Not scalable beyond local area (

hundreds of nodes)

  • Good for outdoor geek parties
  • Useless for Joe and Jim
slide-30
SLIDE 30

We need ad-hoc routing at Internet-Wide Scale

slide-31
SLIDE 31

We need ad-hoc routing at Internet-Wide Scale

Managed IPv4/IPv6 Internet

IPv6 Network

NAT

Firewall

NAT

Private IPv4 Networks

NAT

Firewall Mobile Hosts Ad Hoc Wireless LAN

(Landmark Routing)

Wireless WAN

(Geographic Forwarding) NAT

Gateway Ad Hoc Wireless LAN

(temporarily disconnected)

slide-32
SLIDE 32

A Proposed Identity-Based Routing Protocol Architecture

slide-33
SLIDE 33

UIP: “Unmanaged Internet Protocol”

Address-Based Routing: IPv4, IPv6, GRID, etc. Ethernet, 802.11, Bluetooth, PPP, etc. Identity-Based Routing: UIP TCP, UDP, SCTP Transport Layer Network Layer Link Layer

slide-34
SLIDE 34

Key Properties of UIP

  • “Unmanaged” = “Manages Itself”

No central authority required to hand out addresses

No explicit maintenance of routing and forwarding

No futzing or broken connections when nodes move

  • Operates both:

Over IPv4/IPv6 as a scalable overlay network

Directly over Ethernet and other link layers

slide-35
SLIDE 35

UIP Node Identifiers

Cryptographic hash of node's public key (ala HIP):

  • Automatically generated by node itself
  • Stable for as long as owner of node desires
  • Self-authenticating for privacy and integrity
  • Topology-independent for host mobility
  • Globally unique, cryptographically unforgeable
slide-36
SLIDE 36

Why This Is Hard

  • Must give up hierarchical address architecture,

but still get scalability to millions of nodes!

  • Can't require each node to maintain and propagate

state about every other node

  • ...But theoretically feasible:

Arias et al. “Compact Routing with Name Independence,” SPAA 2003

slide-37
SLIDE 37

Idea!

What about adapting Peer-to-Peer Distributed Hash Table (DHT) lookup algorithms?

slide-38
SLIDE 38

The Intuition

  • DHTs provide:
  • Lookup on

topology- independent keys

  • O(log n) state,
  • maint. traffic

per node

slide-39
SLIDE 39

The Intuition

  • DHTs don't:
  • Forward around

discontinuities

  • Traverse NATs

(usually)

  • Route between

Internet & Ad-hoc Networks

NAT

slide-40
SLIDE 40

A First Approximation

  • Two-level

stratification

  • “Core” nodes

maintain DHT

  • “Edge” nodes

reachable thru core nodes

  • Example: i3

NAT

slide-41
SLIDE 41

A First Approximation

  • Limitations:

Must configure whether node is “core” or “edge”

Discontinuities in “core” network

Disconnected edge nodes can't talk

NAT

slide-42
SLIDE 42

What We Want

NAT

Unstratified

slide-43
SLIDE 43

What We Want

NAT

Unstratified

Forwarding around holes (RON)

slide-44
SLIDE 44

What We Want

NAT

Unstratified

Forwarding around holes (RON)

slide-45
SLIDE 45

What We Want

NAT

Unstratified

Forwarding around holes (RON)

...thru NATs

slide-46
SLIDE 46

What We Want

NAT

Unstratified

Forwarding around holes (RON)

...thru NATs

Autonomous ad-hoc rings

slide-47
SLIDE 47

What We Want

NAT

Unstratified

Forwarding around holes (RON)

...thru NATs

Autonomous ad-hoc rings

slide-48
SLIDE 48

What We Want

NAT

Unstratified

Forwarding around holes (RON)

...thru NATs

Autonomous ad-hoc rings

Inter- domain routing

slide-49
SLIDE 49

Forwarding Mechanisms

  • Source Routing

Nodes can store source routes, not just IP addresses, in their DHT neighbor tables.

Source routes not usually very long, because UIP sees Internet as “one big link.”

  • Virtual Link Forwarding

Source routes restricted to two hops, but recursively composable

Distributes routing information throughout path

slide-50
SLIDE 50

Source Routing

B A E D C G H

slide-51
SLIDE 51

Source Routing

New node Z B A E D C G H

slide-52
SLIDE 52

Source Routing

New node Z . . . Z's Neighbor Table B A E D C G H

slide-53
SLIDE 53

Source Routing

Z A: 12.34.56.78 . . . Z's Neighbor Table B A E D C G H Initial (Direct) Neighbor

slide-54
SLIDE 54

Source Routing

Z A: 12.34.56.78 C: 23.45.67.89 E: 34.56.78.90 . . . Z's Neighbor Table B A E D C G H Direct Neighbors

slide-55
SLIDE 55

Source Routing

Z A: 12.34.56.78 C: 23.45.67.89 E: 34.56.78.90 H: [C

  • H]

. . . Z's Neighbor Table B A E D C G H Indirect Neighbors

slide-56
SLIDE 56

Source Routing

Z A: 12.34.56.78 C: 23.45.67.89 E: 34.56.78.90 H: [C

  • H]

G: [C

  • H
  • G]

. . . Z's Neighbor Table B A E D C G H Indirect Neighbors

slide-57
SLIDE 57

What We Have

NAT

slide-58
SLIDE 58

What We Have

NAT

Physical Rings Virtual Ring

slide-59
SLIDE 59

What We Have

NAT

Physical Rings Virtual Ring

slide-60
SLIDE 60

What We Have

NAT

Physical Rings Virtual Ring

slide-61
SLIDE 61

What We Have

NAT

Physical Rings Virtual Ring

slide-62
SLIDE 62

What We Have

NAT

Physical Rings Virtual Ring

slide-63
SLIDE 63
slide-64
SLIDE 64
slide-65
SLIDE 65
slide-66
SLIDE 66

Source Routing

Z A: 12.34.56.78 C: 23.45.67.89 E: 34.56.78.90 H: [C

  • H]

G: [C

  • H
  • G]

. . . Z's Neighbor Table B A E D C G H

slide-67
SLIDE 67

Source Routing

Z A: 12.34.56.78 C: 23.45.67.89 E: 34.56.78.90 H: [C

  • H]

G: [C

  • H
  • G]

. . . Z's Neighbor Table B A E D C G H

slide-68
SLIDE 68

Challenges

  • Forwarding path optimization
  • Healing efficiently after arbitrary partitions
  • Incentives for good behavior,

resistance to denial-of-service attacks

slide-69
SLIDE 69

Implementation Status

  • Algorithm works under simulation

Up to 10,000 nodes, “Internet-like” networks

✂ ✁

O(log n) state and maintenance traffic observed

Heals quickly after partitions

  • In progress:

Further algorithm refinement

Real-world prototype

slide-70
SLIDE 70

Conclusion

  • To get ubiquitous networking:

Edge nodes must be able to operate without centralized address assignment: Address-Based Routing

Identity-Based Routing

Edge routing protocols must be self-managing at global Internet-wide scales, not just locally

  • Scalable IBR is hard, but should be feasible