unmanaged internet protocol
play

Unmanaged Internet Protocol Taming the Edge Network Management - PowerPoint PPT Presentation

Unmanaged Internet Protocol Taming the Edge Network Management Crisis Bryan Ford Massachusetts Institute of Technology HotNets II November 21, 2003 Ubituitous Networking What is it? Why isn't it here yet? How can we


  1. Unmanaged Internet Protocol Taming the Edge Network Management Crisis Bryan Ford Massachusetts Institute of Technology HotNets II – November 21, 2003

  2. � � � “Ubituitous Networking” What is it? Why isn't it here yet? How can we make it work?

  3. A Ubiquitous Networking Scenario

  4. A Ubiquitous Networking Scenario Joe

  5. A Ubiquitous Networking Scenario

  6. A Ubiquitous Networking Scenario DSL/Cable Internet Ethernet

  7. A Ubiquitous Networking Scenario DSL/Cable Internet Ethernet

  8. A Ubiquitous Networking Scenario DSL/Cable Internet 802.11 Ethernet

  9. A Ubiquitous Networking Scenario Internet

  10. A Ubiquitous Networking Scenario Internet

  11. A Ubiquitous Networking Scenario Internet Joe Jim

  12. A Ubiquitous Networking Scenario Internet Joe Jim

  13. A Ubiquitous Networking Scenario amazon.com Internet Joe Jim

  14. A Ubiquitous Networking Scenario Internet ? Joe Jim

  15. A Ubiquitous Networking Scenario “NAT?”

  16. A Ubiquitous Networking Scenario “NAT?” “Dynamic DNS?”

  17. A Ubiquitous Networking Scenario “NAT?” “Dynamic DNS?” “Mobile IP?”

  18. A Ubiquitous Networking Scenario Internet Joe Jim

  19. A Ubiquitous Networking Scenario Joe Jim

  20. A Ubiquitous Networking Scenario Joe Jim

  21. A Ubiquitous Networking Scenario ? Joe Jim

  22. A Ubiquitous Networking Scenario “Ad-hoc mode?” Joe Jim

  23. A Ubiquitous Networking Scenario “Ad-hoc mode?” “DHCP?” Joe Jim

  24. A Ubiquitous Networking Scenario “Ad-hoc mode?” “DHCP?” “Static IP addresses?” Joe Jim

  25. A Ubiquitous Networking Scenario Joe Jim

  26. The Problem Getting “ubiquitous networking” devices to ubiquitously network is way too complicated, even when the technology is available.

  27. � ✁ ✂ ✁ ✂ ✁ ✁ Outline Motivation: What's wrong? Why doesn't ubiquitous networking work? Answer: hierarchical address-based routing (ABR). How do we fix it? Answer: scalable identity-based routing (IBR). A proposed identity-based routing architecture Conclusion

  28. ✁ � ✂ ✂ ✂ ✁ ✂ ✂ ✁ ✂ ✂ Why IP is Wrong for Edge Networks Hierarchical address architecture Routable addresses must be allocated from central administrative authorities Each node must be assigned an address: Static assignment inconvenient, requires knowledge DHCP nodes can't talk at all without DHCP server Address hierarchy must reflect topology Node mobility address instability, broken connections Good for scalability, bad for useability

  29. � � ✂ ✁ � � What about ad-hoc routing protocols? Landmark, DSR, DSDV, AODV, etc. A big step in the right direction, but: Not scalable beyond local area ( hundreds of nodes) Good for outdoor geek parties Useless for Joe and Jim

  30. We need ad-hoc routing at Internet-Wide Scale

  31. We need ad-hoc routing at Internet-Wide Scale Mobile Hosts IPv6 Network Wireless WAN (Geographic Forwarding) Firewall NAT Gateway Ad Hoc Managed NAT Wireless LAN NAT IPv4/IPv6 (Landmark Routing) Internet Firewall Ad Hoc Wireless LAN NAT (temporarily disconnected) Private IPv4 Networks

  32. A Proposed Identity-Based Routing Protocol Architecture

  33. UIP: “Unmanaged Internet Protocol” Transport TCP, UDP, SCTP Layer Identity-Based Routing: UIP Network Layer Address-Based Routing: IPv4, IPv6, GRID, etc. Link Ethernet, 802.11, Bluetooth, PPP, etc. Layer

  34. � ✂ ✂ ✂ � ✂ ✂ Key Properties of UIP “Unmanaged” = “Manages Itself” No central authority required to hand out addresses No explicit maintenance of routing and forwarding No futzing or broken connections when nodes move Operates both: Over IPv4/IPv6 as a scalable overlay network Directly over Ethernet and other link layers

  35. � � � � � UIP Node Identifiers Cryptographic hash of node's public key (ala HIP): Automatically generated by node itself Stable for as long as owner of node desires Self-authenticating for privacy and integrity Topology-independent for host mobility Globally unique, cryptographically unforgeable

  36. � � � Why This Is Hard Must give up hierarchical address architecture, but still get scalability to millions of nodes! Can't require each node to maintain and propagate state about every other node . ..But theoretically feasible: Arias et al. “Compact Routing with Name Independence,” SPAA 2003

  37. Idea! What about adapting Peer-to-Peer Distributed Hash Table (DHT) lookup algorithms?

  38. � � � The Intuition DHTs provide: Lookup on topology- independent keys O(log n) state, maint. traffic per node

  39. � � � � The Intuition DHTs don't : Forward around discontinuities Traverse NATs (usually) Route between Internet & NAT Ad-hoc Networks

  40. � � � � A First Approximation Two-level stratification “Core” nodes maintain DHT “Edge” nodes reachable thru core nodes NAT Example: i3

  41. � ✂ ✂ ✂ A First Approximation Limitations: Must configure whether node is “core” or “edge” Discontinuities in “core” network Disconnected edge nodes can't talk NAT

  42. ✂ What We Want Unstratified NAT

  43. ✂ ✂ What We Want Unstratified Forwarding around holes (RON) NAT

  44. ✂ ✂ What We Want Unstratified Forwarding around holes (RON) NAT

  45. ✂ ✂ ✂ What We Want Unstratified Forwarding around holes (RON) ...thru NATs NAT

  46. ✂ ✂ ✂ ✂ What We Want Unstratified Forwarding around holes (RON) ...thru NATs Autonomous ad-hoc rings NAT

  47. ✂ ✂ ✂ ✂ What We Want Unstratified Forwarding around holes (RON) ...thru NATs Autonomous ad-hoc rings NAT

  48. ✂ ✂ ✂ ✂ ✂ What We Want Unstratified Forwarding around holes (RON) ...thru NATs Autonomous ad-hoc rings NAT Inter- domain routing

  49. � ✂ ✂ � ✂ ✂ Forwarding Mechanisms Source Routing Nodes can store source routes, not just IP addresses, in their DHT neighbor tables. Source routes not usually very long, because UIP sees Internet as “one big link.” Virtual Link Forwarding Source routes restricted to two hops, but recursively composable Distributes routing information throughout path

  50. Source Routing A B D C E H G

  51. Source Routing A B D C E Z H G New node

  52. Source Routing Z's Neighbor Table A B D C E Z . H . . G New node

  53. Source Routing Z's Neighbor Table Initial (Direct) A Neighbor A: 12.34.56.78 B D C E Z . H . . G

  54. Source Routing Z's Neighbor Table A Direct A: 12.34.56.78 Neighbors C: 23.45.67.89 B E: 34.56.78.90 D C E Z . H . . G

  55. � Source Routing Z's Neighbor Table A Indirect A: 12.34.56.78 Neighbors C: 23.45.67.89 B E: 34.56.78.90 D H: [C H] C E Z . . H . G

  56. � � � Source Routing Z's Neighbor Table A Indirect A: 12.34.56.78 Neighbors C: 23.45.67.89 B E: 34.56.78.90 D H: [C H] C E G: [C H G] Z . . H . G

  57. What We Have NAT

  58. Virtual What We Have Ring NAT Physical Rings

  59. Virtual What We Have Ring NAT Physical Rings

  60. Virtual What We Have Ring NAT Physical Rings

  61. Virtual What We Have Ring NAT Physical Rings

  62. Virtual What We Have Ring NAT Physical Rings

  63. � � � Source Routing Z's Neighbor Table A A: 12.34.56.78 C: 23.45.67.89 B E: 34.56.78.90 D H: [C H] C E G: [C H G] Z . . H . G

  64. � � � Source Routing Z's Neighbor Table A A: 12.34.56.78 C: 23.45.67.89 B E: 34.56.78.90 D H: [C H] C E G: [C H G] Z . . H . G

  65. � � � Challenges Forwarding path optimization Healing efficiently after arbitrary partitions Incentives for good behavior, resistance to denial-of-service attacks

  66. � ✂ ✂ ✁ ✂ � ✂ ✂ Implementation Status Algorithm works under simulation Up to 10,000 nodes, “Internet-like” networks O(log n) state and maintenance traffic observed Heals quickly after partitions In progress: Further algorithm refinement Real-world prototype

  67. � ✁ ✂ ✁ � Conclusion To get ubiquitous networking: Edge nodes must be able to operate without centralized address assignment: Address-Based Routing Identity-Based Routing Edge routing protocols must be self-managing at global Internet-wide scales, not just locally Scalable IBR is hard, but should be feasible

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend