NEIGHBORHOOD WATCH PROTOCOL An Address Resolution Protocol for the HID Principal in XIA Cody Doucette Michel Machado John W. Byers.

Slides:



Advertisements
Similar presentations
Network Layer Delivery Forwarding and Routing
Advertisements

Computer Networks TCP/IP Protocol Suite.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Virtual Trunk Protocol
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
OSPF 1.
Interconnection: Switching and Bridging
Multihoming and Multi-path Routing
Interconnection: Switching and Bridging CS 4251: Computer Networking II Nick Feamster Fall 2008.
Scalable Routing In Delay Tolerant Networks
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Communicating over the Network
Communicating over the Network
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
IP-Internet Protocol Addresses. Computer Engineering Department 2 Addresses for the Virtual Internet The goal of internetworking is to provide a seamless.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
INTERNET PROTOCOLS Class 9 CSCI 6433 David C. Roberts Entire contents copyright 2011, David C. Roberts, all rights reserved.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Logically-Centralized Control COS 597E: Software Defined Networking.
XIA: Efficient Support for Evolvable Internetworking Dongsu HanAshok AnandFahad Dogar Boyan LiHyeontaek LimMichel Machado Arvind MukundanWenfei Wu Aditya.
Chapter 1: Introduction to Scaling Networks
Local Area Networks - Internetworking
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
CS 241 Spring 2007 System Programming 1 Memory Replacement Policies Lecture 32 Klara Nahrstedt.
Christophe Jelger – CS221 Network and Security - Universität Basel Christophe Jelger Post-doctoral researcher IP Multicasting.
VOORBLAD.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I IP ADDRESSING AND SUBNETS Derived From CCNA Network Fundamentals.
IPv6 Routing.
© 2012 National Heart Foundation of Australia. Slide 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 ETHERNET Derived From CCNA Network Fundamentals – Chapter 9 EN0129 PC AND NETWORK TECHNOLOGY.
Chapter 9 ARP CIS 82 Routing Protocols and Concepts Rick Graziani Cabrillo College Last Updated: 5/13/2008.
25 seconds left…...
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Connecting LANs, Backbone Networks, and Virtual LANs
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 16 Integrated Services Digital Network (ISDN)
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Exploring the Packet Delivery Process Chapter
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
© 2002, Cisco Systems, Inc. All rights reserved..
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Lecture 4: Sun: 23/4/1435 Distributed Operating Systems Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
Routing and Routing Protocols
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
By: Muhammad Hanif.  Have a heart that never harden, and a temper that never tire, and a touch that never hurt.  The True happiness is to give love.
Routing Algorithms and IP Addressing Routing Algorithms must be ▪ Correctness ▪ Simplicity ▪ Robustness ▪ Stability ▪ Fairness ▪ Optimality.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
Address Resolution Protocol (ARP). Internet and Data Link Layer Addresses Each host and router on a subnet needs a data link layer address to specify.
Network Layer 3 Application Presentation Session Transport Network Data Link Physical OSI Model.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
WAN Technologies. 2 Large Spans and Wide Area Networks MAN networks: Have not been commercially successful.
Scaling the Network: The Internet Protocol
CS4470 Computer Networking Protocols
Chapter 2: Static Routing
Scaling the Network: The Internet Protocol
Ch 17 - Binding Protocol Addresses
Chapter 1 Introduction Networking Architecture Overview.
Presentation transcript:

NEIGHBORHOOD WATCH PROTOCOL An Address Resolution Protocol for the HID Principal in XIA Cody Doucette Michel Machado John W. Byers

eXpressive Internet Architecture (XIA) Joint venture between BU, CMU, UW-Madison; part of Future Internet Architectures initiative (FIA) Broad goal is to reform the network stack at narrow waist– IP The Internet needs trustworthiness and evolvability! BU Network Reading Group, September 17,

eXpressive Internet Architecture (XIA) IP problem: Focusing on one communication type hinders others XIA approach: Modularize communication types so that one architecture can support many (future) paradigms IP problem: Using new communication types may require all legacy routers to be updated XIA approach: Require backwards-compatibility using widely-accepted types IP problem: Numerous security issues: IP address spoofing, IP fragment attacks, … XIA approach: Introduce intrinsic security individually for each communication type BU Network Reading Group, September 17,

Three Pillars of XIA BU Network Reading Group, September 17, 2012 Principal types: autonomous domains, hosts, services, content, and future types Fallbacks: new types that may not be globally known must include backwards-compatible address 4

New network layer protocol; uses a DAG with principal types to specify multiple paths to destination eXpressive Internet Protocol (XIP) BU Network Reading Group, September 17,

Express intent when using principal types; this provides for heterogeneity and intrinsic security: eXpressive Internet Protocol (XIP) BU Network Reading Group, September 17,

Host-to-Host Communication in XIA Host-to-host communication especially important– required as a fallback edge Hosts need a way of: Discovering other hosts in the LAN Mapping network layer addresses (HIDs) into link layer addresses How can hosts in XIA accomplish this? BU Network Reading Group, September 17,

Motivation Why not extend ARP? Four edges at every hop in XIP Using ARP to lookup each edge would slow routing HIDs do not support network masks ARP responses would flood all interfaces XIP values secure link layer addressing ARP does not guarantee security; ARP spoofing BU Network Reading Group, September 17,

Enter: Neighborhood Watch Protocol Defining Characteristics: Neighborhood assumption: operates under assumption that all hosts that support HIDs in a LAN know of each other Routing never stops: utilizes RCU for interruption-free lookups Supports evolution: works in conjunction with HID principal only, not a companion to XIP BU Network Reading Group, September 17,

Enter: Neighborhood Watch Protocol Defining Characteristics: Efficiency: begets low network overhead compared to using ARP Robustness: prevents data inconsistencies due to node failure and network partitioning Scalability: constructs an eventually consistent LAN of arbitrary size BU Network Reading Group, September 17,

Functionality What can NWP do? Address resolution Failure detection Efficient table synchronization (WIP) Link-layer addressing security (WIP) BU Network Reading Group, September 17,

Functionality What can NWP do? Address resolution Failure detection Efficient table synchronization (WIP) Link-layer addressing security (WIP) BU Network Reading Group, September 17,

Address Resolution: Neighborhood View Neighbor list contains hosts connected via a common LAN interface Neighbors here: A E, B E, C E A W, C W BU Network Reading Group, September 17,

Address Resolution: Announcing Hosts can broadcast announcements to learn about neighbors Bit Offset 0 – 78 – 15 0VersionType 16 Number of HIDsHardware Addr. Len. 32 Hardware Address of Announcing Host** HID 1 …… …HID N Announcement contains all HIDs that correspond to a single hardware address NWP Announcement Packet Header ** Assuming a 48-bit MAC address. BU Network Reading Group, September 17,

Address Resolution: Responding Neighbor lists are sent in response to an announcement Bit Offset 0 – 78 – 15 0VersionType 16 Number of HIDsHardware Addr. Len. 32 HID 1 Num 1 HA 11 … HA 1Num 1 … … … HID N Num N HA N1 … HA NNum N List tells receiver about neighbors and associated hardware addresses NWP Neighbor List Packet Header BU Network Reading Group, September 17,

Functionality What can NWP do? Address resolution Failure detection Efficient table synchronization (WIP) Link-layer addressing security (WIP) BU Network Reading Group, September 17,

Failure Detection Neighbors should be monitored to observe failure or disconnection Goals of the NWP failure detector: Completeness Accuracy Speed Scalability Distribution BU Network Reading Group, September 17,

Failure Detection: Distribution Consider: Two nodes cannot communicate due to temporary packet loss. These nodes should retain neighbor status. If two neighbors cannot connect, the source uses a set K of other neighbors to investigate This distributes the decision of failure across |K|+1 nodes Distributed failure detector based on previous work by Gupta et al., PODC 01 BU Network Reading Group, September 17,

Failure Detection: Two Nodes Source pings random neighbors at set intervals; destination sends an ack upon receipt Senders include lower 32 bits of their clock to synchronize Bit Offset 0 – 78 – 15 0VersionType 16 Hardware Addr. Len.Reserved 32 Senders Clock (lower 32 bits) 48 64Source Host Hardware Address …Destination Host Hardware Address NWP Ping/Ack Packet Header BU Network Reading Group, September 17,

Failure Detection: Three Nodes Bit Offset 0 – 78 – 15 0VersionType 16 Hardware Addr. Len.Reserved 32 Senders Clock (lower 32 bits) 48 64Source Host Hardware Address …Destination Host Hardware Address …Investigative Host Hardware Address NWP Request/Investigative Ping Packet Header If no ack is received, source uses other neighbors to investigate potentially failed destination If no response is heard after a set time, destination is marked as inactive BU Network Reading Group, September 17,

Failure Detection: Packet Types BU Network Reading Group, September 17, 2012 NiNi NjNj NxNx NWP Ping Request NWP Request Ack NiNi NjNj NxNx NWP Investigative Ping NiNi NjNj NxNx NiNi NjNj NWP Ping NiNi NjNj NWP Ack 21

Failure Detection: Algorithm BU Network Reading Group, September 17, 2012 Similar diagram found in Gupta et al.,

Failure Detection: Conflict Resolution Question: How does the NWP failure detector reconcile conflicting reports about the status of a neighbor? Answer: Neighbor tables hold local/remote times at which neighbors status was recorded If a neighbor fails, we make an inference about what time it failed We resolve conflicts by taking most up-to-date information Node A Neighbor TableNode C Neighbor Table StatusNodeMy ClockRemote Clock UpB DownB StatusNodeMy ClockRemote Clock UpB BU Network Reading Group, September 17,

Failure Detection: Mass Failure Question: All neighborhood tables are equal before a network partition takes place. How will a node remove all entries from its table that are no longer accessible? Answer: In most cases, a mass disconnection is handled in the same way that an individual disconnection is handled: gradually The detection scheme promises only eventual consistency BU Network Reading Group, September 17,

However, there is a mechanism for detecting when a mass failure might have occurred. Consider the case where D tries to monitor E: If DE communication fails, A, B, and C are of no help here since they are in a separate partition However, D should recognize that it received no response from A, B, and C Failure Detection: Mass Failure, Continued BU Network Reading Group, September 17,

Failure Detection Neighbors should be monitored to observe failure or disconnection Goals of the NWP failure detector: Completeness: Accuracy: Speed: Distribution: Scalability: BU Network Reading Group, September 17,

Failure Detection BU Network Reading Group, September 17,

Functionality What can NWP do? Address resolution Failure detection Efficient table synchronization (WIP) Link-layer addressing security (WIP) More to come! BU Network Reading Group, September 17,

References XIA: An Architecture for an Evolvable and Trustworthy Internet by Hyeontaek Lim. In The 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI12) (San Jose, CA), April 25-27, 2012 On Scalable and Efficient Distributed Failure Detectors by Indranil Gupta, Tushar D. Chandra, and Germán S. Goldszmidt. In Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, XIA: Efficient Support for Evolvable Internetworking by Dongsu Han, Ashok Anand, Fahad Dogar, Boyan Li, Hyeontaek Lim, Michel Machado, Arvind Mukundan, Wenfei Wu, Aditya Akella, David G. Andersen, John W. Byers, Srinivasan Seshan, and Peter Steenkiste. In Proc. 9th USENIX NSDI, (San Jose, CA), Apr BU Network Reading Group, September 17,