Presentation on theme: "Transient Network Architecture Joud Khoury University of New Mexico, ECE department CNRI Handle System Workshop, Washington."— Presentation transcript:
Transient Network Architecture http://hdl.handle.net/2118/tna Joud Khoury University of New Mexico, ECE department CNRI Handle System Workshop, Washington DC June 21
Credits Funded by NSF Future Internet Design (FIND) Grant CNS-0626380 Website: http://hdl.handle.net/2118/tnahttp://hdl.handle.net/2118/tna People Henry Jerez, CNRI Joud Khoury, Chaouki Abdallah, Greg Heileman, Pramod Jamkhedar, Wennie Shu, Jorge Crichigno, Jorge Piovesan – UNM
Outline Overview of TNA Mobility and Persistent Identification How/where is it applied? InterMesh instantiation of TNA VoIP using handles Digital Rights Management within TNA References
What is TNA It is an architecture that postulates that: All networks can be reduced to a particular case of persistently identified, transient, mobile, abstract entities that group into particular association It is an abstraction based persistent communication network for transient digital entities
TNA Principles Mobility and Ad Hoc characteristics as basic requirements Abstraction as the basis of internetworking and functionality Persistent Identification
Mobility and Ad Hoc characteristics Mobility is the ability of nodes to change association without breaking referential integrity. All components of the architecture are to be considered transient and mobile The components must operate in both Connected = Full cohesive communication with the larger structure is assumed Disconnected = limited or no connectivity with other groupings is possible While consolidation is possible; all processes, services and mechanisms should assume a mobile deployment environment.
Persistent Identification Persistent Identifier=Handle Persistently identify: globally Digital entities: Network components Communicating entities Services Processes Identification is based on a set of unique naming spaces with a distributed resolution on a need to know basis
How do we use PIs We identify all network entities with persistent identifiers We use these identifiers to route all traffic in the network We identify particular network associations with persistent identifiers We provide secure distributed administration This enables seamless mobility
What can it do Enables new transmission paradigms It can move functionality at will Allows current and future network to coexist and seamlessly integrate
Current Research Tracks The MESH Network AoI Instantiation – InterMesh and voice over Intermesh Agent Coordination Basic DRM expressiveness
InterMesh Motivation Various types of local networks; WMNs, WSNs, PANs. WMN particularly interesting? Advantages, connectivity models, suitable for WLAN, WMAN, WVAN, include ad-hoc, … A growing need for inter-networking among heterogeneous networks IP? Some limitations: overloading the address, absence of trustworthiness Fundamental design shifts needed -> InterMesh
Motivation Mesh Interworking Topology learning Routing/forwarding Measurement Management QoS Medium Access Control IEEE 802.11 PHY L1 L3 A growing need for inter-networking among heterogeneous (mesh) networks L2 – 802.11s (expected) Persistent Identification (PI) Layer
Architecture model Core AoI-1 AoI-2 AoI: Area of Influence Node
Architecture Core AoI-1 AoI-2 AoI: Area of Influence Agents Nodes PI Entity Pi-3 Pi-4 PI L2 L1 Pi-1 Pi-2 Pi-1Pi-2 Ref Neutral Environment Agents
InterMesh prototype implementaion Entity: –Endpoint of communication and smallest indivisible element that can be mobile –Ex. process, thread, device, service –Persistently identified Neutralization Environment –GHOSTs and SHELLs –NELO Interface –Not infrastructure!!! Network Substrate
Core AoI-1 Agent 1 Agent 2 Agent 3 AoI-2 AoI-3 How does Pi-1 know Pi-2 location? A closer look at local delivery Address resolution – ARP Pi-1 Local A: AA Pi-2 Local A: ZZ
Internet AoI-1 Agent 1 Agent 2 Agent 3 AoI-2 AoI-3 Inter-network Pi-1 Local A: AA Pi-2 Local A: ZZ Pi-3 Local A: BB 1.Is Pi-3 in Ao1-1? ARP 2.Pi-3 is not in the local network -> send the data to the Agent2 3.Agent2 routes the data 4.Agent3 sends the data to BB Agent 3 Pi-3
Core AoI-1 Agent 1 Agent 2 Agent 3 AoI-2 AoI-3 Mobility Pi-1 Local A: AA Pi-2 Local A: ZZ Pi-3 Local A: BB A proactive discovering protocol to keep bound with the core
PI Packet Format Bits Dst PI Address Length Src PI Address Length Payload Length 0-78-1516-2324-31 0 32Dst PI InstanceSrc PI InstanceDst PI Address...Src PI Address Payload
H-SIP Abstraction SIP users and Proxy servers identified with handles instead of URI and Domain names eliminating any domain binding User Handle Proxy Handle
Registration - Measurements Average Registration times 10,000 samples dispersed over 10 days
Call Establishment - Measurements is the diff in cumulative RT delay Note: Presumably large geographical separation between the roaming user and his home server We outperform as long as > x
IDEA Indirect DRM Evaluation Architecture Rely on persistent identifiers to convey Rights information All content and Users identified with Persistent Identifiers. All licenses and rights identified with persistent identifiers Use a dynamic evaluation mechanism that relies on a layered rights expression and enforcement model
Layered Model Persistent identifiers allow referential integrity at every layer Layers are not only logically but physically independent
Dynamic evaluation In TNA where even services are mobile; DRM evaluation along with validation resources are based on persistent Identifiers Persistent Identifiers weave the different layers and services together DRM computation is therefore a heterogeneous diverse ecosystem rather than a vertically integrated solution
TNA principles and Rights Mobility Based on TNA principles all components of the architecture are mobile and transient ness is assumed The system can then use opportunistic connectivity and realm based interconnection to conform new enforcement areas The System provides first class presence to all members and their interests: From the owned to the final consumer and provides them with the flexibility they need to operate in a more real environment.
Current Application models Heterogeneous License compatibility and evaluation Intrinsic authorization and validation New features and traditional behaviors: Loans Second level market New Business models
References TNA H. Jerez, J. Khoury, and Chaouki Abdallah, The Transient Network Architecture, in arXiv. InterMesh instantiation of TNA J. Khoury, J. Crichigno, H. Jerez, C. Abdallah, W. Shu, and G. Heileman, The intermesh network architecture, under review IEEE Network Magazine. VoIP using handles J. Khoury, H. Jerez, C. Abdallah Efficient User Controlled Inter-Domain SIP Mobility Authentication, Registration, and Call Routing, to appear in 1 st International Workshop on Security and Privacy, SPEUCS 2007, Philadelphia, PA, August 2007. J. Khoury, H. Jerez, C. Abdallah H-SIP: Inter-domain SIP mobility: Design, in Consumer Communications and Networking Conference, CCNC 2007, Las Vegas, NV, Jan 2007. Digital Rights Management within TNA G. L. Heileman and P. A. Jamkhedkar, DRM Interoperability Analysis from the Perspective of a Layered Framework, Proceedings of the 5th ACM workshop on Digital Rights Management, Nov. 2005, Virginia, USA. P. A. Jamkhedkar, G. L. Heileman and Ivan Martinez-Ortiz, The Problem With Rights Expression Languages, Proceedings of the 6th ACM workshop on Digital Rights Management, Oct-Nov. 2006, Virginia, USA.
Your consent to our cookies if you continue to use this website.