Supporting Legacy Applications in Associative Overlay Networks Shelley Zhuang, Ion Stoica {shelleyz, Sahara Retreat January 16-18,

Slides:



Advertisements
Similar presentations
Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
Advertisements

IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Camarillo / Schulzrinne / Kantola November 26th, 2001 SIP over SCTP performance analysis
CCNA – Network Fundamentals
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday C. Today I³SI³HIPHI³.
Host Mobility Using an Internet Indirection Infrastructure by Shelley Zhuang, Kevin Lai, Ion Stoica, Randy Katz, Scott Shenker presented by Essi Vehmersalo.
CCNA 1 v3.1 Module 11 Review.
Internet Indirection Infrastructure Ion Stoica and many others… UC Berkeley.
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
What we will cover… Home Networking: Network Address Translation (NAT) Mobile Routing.
CS 268: Lecture 5 (Project Suggestions) Ion Stoica February 6, 2002.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Rensselaer Polytechnic Institute CSCI-4220 – Network Programming David Goldschmidt, Ph.D.
Internet Indirection Infrastructure (i3) Status – Summer ‘03 Ion Stoica UC Berkeley June 5, 2003.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 Web Proxies Dr. Rocky K. C. Chang 6 November 2005.
Internet Indirection Infrastructure Ion Stoica UC Berkeley June 10, 2002.
Circuit & Application Level Gateways CS-431 Dick Steflik.
COS 461: Computer Networks
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
Remote Networking Architectures
Lecture 8 Modeling & Simulation of Communication Networks.
ECCP A Formally-Verified Migration Protocol For Mobile, Multi-Homed Hosts Matvey Arye Joint work with: Erik Nordström, Robert Kiefer Jennifer Rexford, Michael.
Host Identity Protocol
PROS & CONS of Proxy Firewall
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Process-to-Process Delivery:
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
13/09/2015 Michael Chai; Behrouz Forouzan Staffordshire University School of Computing Transport layer and Application Layer Slide 1.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 4 Routing Fundamentals and Subnets/ TCP/IP Transport and Application Layers.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Network Layer4-1 DHCP: Dynamic Host Configuration Protocol Goal: allow host to dynamically obtain its IP address from network server when it joins network.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
A day in the life: scenario
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
11 TRANSPORT LAYER PROTOCOLS Chapter 6 TCP and UDP SPX and NCP.
Class 2 Agenda Networking Basics Networking Basics Nestle Case Nestle Case Text Chapter Review Text Chapter Review.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Interfaces and Services Each layer provides a service to the layer above it. A service is a set of primitive operations. Under UNIX, primitives are implemented.
Link Layer5-1 Synthesis: a “day” in the life of a web request  journey down protocol stack!  application, transport, network, link  putting-it-all-together:
CS 268: Project Suggestions Ion Stoica January 26, 2004.
CMSC Presentation An End-to-End Approach to Host Mobility An End-to-End Approach to Host Mobility Alex C. Snoeren and Hari Balakrishnan Alex C. Snoeren.
Information-Centric Networks Section # 7.1: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.
OCALA Overlay Convergence Architecture for supporting Legacy Applications on Overlays Dilip Antony Joseph 1, Jayanth Kannan 1, Ayumu Kubota 2, Karthik.
1 Network Address Translation. 2 Network Address Translation (NAT) Extension of original addressing scheme Motivated by exhaustion of IP address space.
UDP & TCP BS IT 4 th Semester By: Muhammad Hanif User Datagram Protocol & Transmission Control Protocol.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Internet Indirection Infrastructure (i3) Ion Stoica Daniel Adkins Shelley Zhuang Scott Sheker Sonesh Surana Presented by Kiran Komaravolu.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Internet Indirection Infrastructure (i3)
NET323 D: Network Protocols
* Essential Network Security Book Slides.
PPPoE Internet Point to Point Protocol over Ethernet
NET323 D: Network Protocols
Internet Indirection Infrastructure
Presentation transcript:

Supporting Legacy Applications in Associative Overlay Networks Shelley Zhuang, Ion Stoica {shelleyz, Sahara Retreat January 16-18,

Associative Overlay Networks Implements rendezvous-based communication abstraction Overlay network which consists of a set of servers that store triggers and forwards packets between end-points Sender Receiver (R) (ID, data) (ID, R)

AON Native Application Two types of triggers: public and private Server maintains a public trigger, ID P Client creates a private trigger identifier ID C Server creates a private trigger identifier ID S Client and server insert the private triggers (ID C, IP C ) and (ID S, IP S ) Server (S) Client (C) (ID C, C) 2 (ID P, S) (ID S, S)

Legacy Applications Design goals –User should be able to choose between an AON-aware application or regular application –Should not require changes to existing infrastructure such as IP network routers, DNS Proposed solution –Configure existing applications to connect to a local AON proxy that translates and forwards packets transparently over AON –Run an AON proxy locally

Transparent Application Support Example: telnet client-server application TCP connection established via proxies: –Client (C)  Client Proxy (CP)  AON  Server Proxy (SP)  Server (S) –Private trigger identifiers (ID C, ID S ) exchanged in 3-way handshake Packets forwarded via proxies –Proxies rewrite TCP packets

Control Path Operations Server, S, runs telnet server Server Proxy, SP –ID P = Hash1(telnet.S.aon.net) –Inserts trigger (ID P, IP SP /P SP ) into AON –Inserts trigger (ID S, IP SP /P SP ) into AON Client, C, runs wrapper script “aon_telnet S” –ID P = Hash1(telnet.S.aon.net) –Send SETUP(ID P ) to CP –CP sends back ACCEPT(P’ CP = Hash2 (telnet.S.aon.net)) –Telnet P’ CP Client Proxy, CP –Inserts trigger (ID C, IP CP /P CP ) into AON

Pros and Cons Advantages –Client can make multiple connections to the same service on S simultaneously –Client can use more than one service on S simultaneously –Client can use the same service on two different servers simultaneously –No changes to existing infrastructure Limitations –Per-application script –Not as general as solutions based on LD_PRELOAD, LD_LIBRARY, or system call trapping

Discussion End-to-end host mobility –Without changes to IP layer (Mobile IP) –Without changes to TCP protocol (MIGRATE) –Supports sender and receiver mobility Server load balancing Nearby server selection

TCP Three-Way Handshake Step[[IP HDR, TRANSPORT HDR], [AON HDR], [DATA]]Packet Type 1. C  CP [[IP C, IP CP, P’ C, P’ CP, SYN]]TCP 2. CP  AON [[x, x, x, x], [ID P ], [SYN, ID C ]]UDP 3. AON  SP [[x, x, x, x], [ID P ], [SYN, ID C ]]UDP 4. SP  S [[IP SP, IP S, P’ SP, P S, SYN]]TCP 5. S  SP [[IP S, IP SP, P S, P’ SP, SYN-ACK]]TCP 6. SP  AON [[x, x, x, x], [ID C ], [SYN-ACK, ID S ]]UDP 7. AON  CP [[x, x, x, x], [ID C ], [SYN-ACK, ID S ]]UDP 8. CP  C [[IP CP, IP C, P’ CP, P’ C, SYN-ACK]]TCP 9. C  CP [[IP C, IP CP, P’ C, P’ CP, SYN-ACK-ACK]]TCP 10. CP  AON [[x, x, x, x], [ID S ], [SYN-ACK-ACK]]UDP 11. AON  SP [[x, x, x, x], [ID S ], [SYN-ACK-ACK]]UDP 12. SP  S [[IP SP, IP S, P’ SP, P S, SYN-ACK-ACK]]TCP

Translation Table Client Proxy –IP CP /P’ CP  ID P –ID C  IP C /P’ C –ID C  IP C P /P’ CP –IP C /P’ C  ID S Server Proxy –ID P  IP S /P S –ID S  IP S /P S –ID S  IP SP /P’ SP –IP SP /P’ SP  ID C

Data Path Operations Step [[IP HDR, TRANSPORT HDR], [AON HDR], DATA]] Packet Type 1. C  CP [[IP C, IP CP, P’ C, P’ CP ], [data]]TCP 2. CP  AON [[x, x, x, x], [ID S ], [data]]UDP 3. AON  SP [[x, x, x, x], [ID S ], [data]]UDP 4. SP  S [[IP SP, IP S, P’ SP, P S ], [data]]TCP 5. S  SP [[IP S, IP SP, P S, P’ SP ], [ack]]TCP 6. SP  AON [[x, x, x, x], [ID C ], [ack]]UDP 7. AON  CP [[x, x, x, x], [ID C ], [ack]]UDP 8 CP  C [[IP CP, IP C, P’ CP, P’ C ], [ack]]TCP