Presentation is loading. Please wait.

Presentation is loading. Please wait.

Transient Network Architecture Joud Khoury University of New Mexico, ECE department CNRI Handle System Workshop, Washington.

Similar presentations


Presentation on theme: "Transient Network Architecture Joud Khoury University of New Mexico, ECE department CNRI Handle System Workshop, Washington."— Presentation transcript:

1 Transient Network Architecture http://hdl.handle.net/2118/tna Joud Khoury University of New Mexico, ECE department CNRI Handle System Workshop, Washington DC June 21

2 Credits Funded by NSF Future Internet Design (FIND) Grant CNS-0626380 Website: http://hdl.handle.net/2118/tnahttp://hdl.handle.net/2118/tna People Henry Jerez, CNRI Joud Khoury, Chaouki Abdallah, Greg Heileman, Pramod Jamkhedar, Wennie Shu, Jorge Crichigno, Jorge Piovesan – UNM

3 Outline Overview of TNA Mobility and Persistent Identification How/where is it applied? InterMesh instantiation of TNA VoIP using handles Digital Rights Management within TNA References

4 What is TNA It is an architecture that postulates that: All networks can be reduced to a particular case of persistently identified, transient, mobile, abstract entities that group into particular association It is an abstraction based persistent communication network for transient digital entities

5 TNA Principles Mobility and Ad Hoc characteristics as basic requirements Abstraction as the basis of internetworking and functionality Persistent Identification

6 Mobility and Ad Hoc characteristics Mobility is the ability of nodes to change association without breaking referential integrity. All components of the architecture are to be considered transient and mobile The components must operate in both Connected = Full cohesive communication with the larger structure is assumed Disconnected = limited or no connectivity with other groupings is possible While consolidation is possible; all processes, services and mechanisms should assume a mobile deployment environment.

7 Persistent Identification Persistent Identifier=Handle Persistently identify: globally Digital entities: Network components Communicating entities Services Processes Identification is based on a set of unique naming spaces with a distributed resolution on a need to know basis

8 How do we use PIs We identify all network entities with persistent identifiers We use these identifiers to route all traffic in the network We identify particular network associations with persistent identifiers We provide secure distributed administration This enables seamless mobility

9 How do the pieces fit together

10 What can it do Enables new transmission paradigms It can move functionality at will Allows current and future network to coexist and seamlessly integrate

11 Current Research Tracks The MESH Network AoI Instantiation – InterMesh and voice over Intermesh Agent Coordination Basic DRM expressiveness

12 InterMesh Motivation Various types of local networks; WMNs, WSNs, PANs. WMN particularly interesting? Advantages, connectivity models, suitable for WLAN, WMAN, WVAN, include ad-hoc, … A growing need for inter-networking among heterogeneous networks IP? Some limitations: overloading the address, absence of trustworthiness Fundamental design shifts needed -> InterMesh

13 Motivation Mesh Interworking Topology learning Routing/forwarding Measurement Management QoS Medium Access Control IEEE 802.11 PHY L1 L3 A growing need for inter-networking among heterogeneous (mesh) networks L2 – 802.11s (expected) Persistent Identification (PI) Layer

14 Architecture model Core AoI-1 AoI-2 AoI: Area of Influence Node

15 Architecture Core AoI-1 AoI-2 AoI: Area of Influence Agents Nodes PI Entity Pi-3 Pi-4 PI L2 L1 Pi-1 Pi-2 Pi-1Pi-2 Ref Neutral Environment Agents

16 InterMesh prototype implementaion Entity: –Endpoint of communication and smallest indivisible element that can be mobile –Ex. process, thread, device, service –Persistently identified Neutralization Environment –GHOSTs and SHELLs –NELO Interface –Not infrastructure!!! Network Substrate

17 Core AoI-1 Agent 1 Agent 2 Agent 3 AoI-2 AoI-3 How does Pi-1 know Pi-2 location? A closer look at local delivery Address resolution – ARP Pi-1 Local A: AA Pi-2 Local A: ZZ

18 Internet AoI-1 Agent 1 Agent 2 Agent 3 AoI-2 AoI-3 Inter-network Pi-1 Local A: AA Pi-2 Local A: ZZ Pi-3 Local A: BB 1.Is Pi-3 in Ao1-1? ARP 2.Pi-3 is not in the local network -> send the data to the Agent2 3.Agent2 routes the data 4.Agent3 sends the data to BB Agent 3 Pi-3

19 Core AoI-1 Agent 1 Agent 2 Agent 3 AoI-2 AoI-3 Mobility Pi-1 Local A: AA Pi-2 Local A: ZZ Pi-3 Local A: BB A proactive discovering protocol to keep bound with the core

20 PI Packet Format Bits Dst PI Address Length Src PI Address Length Payload Length 0-78-1516-2324-31 0 32Dst PI InstanceSrc PI InstanceDst PI Address...Src PI Address Payload

21 Packet delivery

22 Previous work – VoIP Sessions and Mobility

23 Sessions and Mobility

24 H-SIP Abstraction SIP users and Proxy servers identified with handles instead of URI and Domain names eliminating any domain binding User Handle Proxy Handle

25 Registration - Measurements Average Registration times 10,000 samples dispersed over 10 days

26 Call Establishment - Measurements is the diff in cumulative RT delay Note: Presumably large geographical separation between the roaming user and his home server We outperform as long as > x

27 IDEA Indirect DRM Evaluation Architecture Rely on persistent identifiers to convey Rights information All content and Users identified with Persistent Identifiers. All licenses and rights identified with persistent identifiers Use a dynamic evaluation mechanism that relies on a layered rights expression and enforcement model

28 Layered Model Persistent identifiers allow referential integrity at every layer Layers are not only logically but physically independent

29 Dynamic evaluation In TNA where even services are mobile; DRM evaluation along with validation resources are based on persistent Identifiers Persistent Identifiers weave the different layers and services together DRM computation is therefore a heterogeneous diverse ecosystem rather than a vertically integrated solution

30 TNA principles and Rights Mobility Based on TNA principles all components of the architecture are mobile and transient ness is assumed The system can then use opportunistic connectivity and realm based interconnection to conform new enforcement areas The System provides first class presence to all members and their interests: From the owned to the final consumer and provides them with the flexibility they need to operate in a more real environment.

31 Current Application models Heterogeneous License compatibility and evaluation Intrinsic authorization and validation New features and traditional behaviors: Loans Second level market New Business models

32 References TNA H. Jerez, J. Khoury, and Chaouki Abdallah, The Transient Network Architecture, in arXiv. InterMesh instantiation of TNA J. Khoury, J. Crichigno, H. Jerez, C. Abdallah, W. Shu, and G. Heileman, The intermesh network architecture, under review IEEE Network Magazine. VoIP using handles J. Khoury, H. Jerez, C. Abdallah Efficient User Controlled Inter-Domain SIP Mobility Authentication, Registration, and Call Routing, to appear in 1 st International Workshop on Security and Privacy, SPEUCS 2007, Philadelphia, PA, August 2007. J. Khoury, H. Jerez, C. Abdallah H-SIP: Inter-domain SIP mobility: Design, in Consumer Communications and Networking Conference, CCNC 2007, Las Vegas, NV, Jan 2007. Digital Rights Management within TNA G. L. Heileman and P. A. Jamkhedkar, DRM Interoperability Analysis from the Perspective of a Layered Framework, Proceedings of the 5th ACM workshop on Digital Rights Management, Nov. 2005, Virginia, USA. P. A. Jamkhedkar, G. L. Heileman and Ivan Martinez-Ortiz, The Problem With Rights Expression Languages, Proceedings of the 6th ACM workshop on Digital Rights Management, Oct-Nov. 2006, Virginia, USA.


Download ppt "Transient Network Architecture Joud Khoury University of New Mexico, ECE department CNRI Handle System Workshop, Washington."

Similar presentations


Ads by Google