DHT-Oriented Architecture: A Prototype Maxwell Krohn, Jeremy Stribling, Michael Walfish MIT 6.824 Project Demonstration 29 April 2004.

Slides:



Advertisements
Similar presentations
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Advertisements

Using HIP to solve MULTI-HOMING IN IPv6 networks YUAN Zhangyi Beijing University of Posts and Telecommunications.
© Antônio M. Alberti 2011 Host Identification and Location Decoupling: A Comparison of Approaches Bruno Magalhães Martins Antônio Marcos Alberti.
TCP/IP Transmission Control Protocol / Internet Protocol.
Ch. 2 Protocol Architecture. 2.1 The Need for a Protocol Architecture Same set of layered functions need to exist in the two communicating systems. Key.
Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan, Robert Morris, and Scott Shenker * 7 December 2004 MIT Computer Science and AI Lab.
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
Serval: An End-Host Stack for Service-Centric Networking
Introduction 1-1 Chapter 3 Transport Layer Intro and Multiplexing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
1 Teredo - Tunneling IPv6 through NATs Date: Speaker: Quincy Wu National Chiao Tung University.
STUN Date: Speaker: Hui-Hsiung Chung 1.
IPNL: A NAT-Extended Internet Architecture Francis & Gummadi Riku Honkanen.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
COM555: Mobile Technologies Location-Identifier Separation.
Introduction to Transport Layer. Transport Layer: Motivation A B R1 R2 r Recall that NL is responsible for forwarding a packet from one HOST to another.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
I. Matta 1 On the Cost of Supporting Multihoming and Mobility Ibrahim Matta Computer Science Boston University Joint work with Vatche Ishakian, Joseph.
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
Lecture 8 Modeling & Simulation of Communication Networks.
Petteri Sirén. Content Preface Locator/ID Separation Protocol (LISP) How LISP works Methods how LISP was studied Test cases Result Summary.
Towards a New Naming Architectures
1 Introduction on the Architecture of End to End Multihoming Masataka Ohta Tokyo Institute of Technology
Host Identity Protocol
A Layered Naming Architecture for the Internet Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Michael Walfish.
RSIP Address Sharing with End-to-End Security Mike Borella, 3Com Corp. Gabriel Montenegro, Sun Microsystems March 2000.
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Approximate Load Balance Based on ID/Locator Split Routing Architecture 1 Sanqi Zhou, Jia Chen, Hongbin Luo, Hongke Zhang Beijing JiaoTong University
CS 540 Computer Networks II Sandy Wang
Naming Examples UUID (universal unique ID) – 128 bit numbers, locally generated, guaranteed globally unique Uniform Resource Identifier (URI) URL (uniform.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
A Layered Naming Architecture for the Internet by Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Michael Walfish.
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
Private Network Addresses IP addresses in a private network can be assigned arbitrarily. – Not registered and not guaranteed to be globally unique Generally,
LNA and DOA Aditya Akella 3/11/2010. A Layered Naming Architecture for the Internet Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
Lesson 2 Introduction to IPv6.
CS492b Project #3-2 KIP router KAIST Dept. of CS NC Lab.
Information-Centric Networks06c-1 Week 6 / Paper 3 Middleboxes No Longer Considered Harmful –Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan,
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Information-Centric Networks Section # 6.3: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.2: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
OCALA Overlay Convergence Architecture for supporting Legacy Applications on Overlays Dilip Antony Joseph 1, Jayanth Kannan 1, Ayumu Kubota 2, Karthik.
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
© 2006 Intertex Data AB 1 Connect your LAN to the SIP world, while keeping your existing firewall*! The IX67 LAN SIParator (Part of the SIP Switch option.
Some pictures for class 1Some pictures for class 1 cs480 spring 2016, NYU CS, Michael Walfish.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Kittiphan Techakittiroj (25/06/59 19:10 น. 25/06/59 19:10 น. 25/06/59 19:10 น.) Network Address Translation Kittiphan Techakittiroj
Skype.
Network Address Translation Sandip Chakraborty. NAT PRIVATE NETWORK PUBLIC NETWORK IP: Port: 8123 IP: Port: 9678 IP:
COM594: Mobile Technologies Location-Identifier Separation.
HIP-Based NAT Traversal in P2P-Environments
An Analysis on NAT Security
NAT : Network Address Translation
Network Programming in Java CS 1111 Ryan Layer May 3, 2010
A quick intro to networking
Chris Meullion Preston Burden Dwight Philpotts John C. Jones-Walker
A Layered Naming Architecture
Review of Important Networking Concepts
Review of TCP/IP Internetworking
Design of a Diversified Router: November 2006 Demonstration Plans
Unit – 2 TCP.
Networking Essentials For Firewall-1 Administrators
Advanced Computer Networks
Request for Comments(RFC) 3489
INFORMATION FLOW ACROSS THE INTERNET
Presentation transcript:

DHT-Oriented Architecture: A Prototype Maxwell Krohn, Jeremy Stribling, Michael Walfish MIT Project Demonstration 29 April 2004

Old Goal: Separate Location and Identity  An IP address conflates: –Network location –Identity, sort of  So?  Well, that means: 1)Mobility, multihoming, renumbering awkward 2)Tough to reach hosts behind NATs Subject of Demo

Recent Proposal: DOA  Hosts get flat identifiers (EIDs) Packet Format  Transport connection bound to EID pair  IP addr gives only routing information IP Header SRC EID DST EID Transport Header (TCP or UDP) Body EID: iuv8h… IP: EID: gbyjgx… IP: TCP Host 1 Host 2

Recent Proposal: DOA, cont’d  EIDs passed out of band; map to an IP addr  Assume a mapping service in the sky: IP Header SRC EID DST EID Transport Header (TCP or UDP) Body EIDIP Address 8iabv2hmbsipse49qertgb5muury79tk gbyjgxf6pkninur7jirpzjc3ftwpvfpd iuv8h9r7qxycwkfh4whcsd3ufw4acp6i

DH T LOOKUP DOA in a Nutshell Problem: identifiers are flat! How to map them to actual IP addresses? User App EID-to-IP Mapping IPEIDTCP Internet Network Stack sendto(EID) Claim: DOA addresses NAT difficulties Host Pkt

Reaching NATed Hosts in DOA  EIDs of NATed hosts map to NAT’s IP  NATs use the host identifier, EID, to demux  Many servers behind NAT on same TCP port EID  local IP iuv8h9r7qxyc iabv2hmbsip NAT ( ) IP: EID: iuv8h PRT: 22 Host 1 Host 2 Packet

Our High-Speed, State-of-the-Art Cluster

DH T Demo of DOA Prototype Client NAT 1NAT 2 Host 1 Host 2 ( ) iuv8h … 8iabv… > ssh iuv8h9r7q.DOA

Conclusion DOA: 1)permits the location/identity split, which: –supports multi-homed hosts (not discussed) –accommodates hosts behind NATs 2)uses a DHT to map flat EIDs  IP addrs 3)has no chance of ever being deployed