Intradomain Anycast for Content Centric Networks.

Slides:



Advertisements
Similar presentations
Interconnection: Switching and Bridging CS 4251: Computer Networking II Nick Feamster Fall 2008.
Advertisements

Courtesy: Nick McKeown, Stanford
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small-world Overlay P2P Network
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
1 Internet Networking Spring 2004 Tutorial 7 Multicast Routing Protocols.
1 Internet Networking Spring 2006 Tutorial 7 DVMRP.
Routing So how does the network layer do its business?
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Internet Networking Spring 2002
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Pastry And Squirrel Presented by Eirik T. Laberg Håvard Semundseth Orri G. Pálsson.
Searching in Unstructured Networks Joining Theory with P-P2P.
CSE 461: Distance Vector Routing. Next Topic  Focus  How do we calculate routes for packets?  Routing is a network layer function  Routing Algorithms.
Delivery, Forwarding, and Routing
MULTICASTING Network Security.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 21 Introduction to Computer Networks.
1 Freenet  Addition goals to file location: -Provide publisher anonymity, security -Resistant to attacks – a third party shouldn’t be able to deny the.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Exploring the Functions of Routing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
INTRA- AND INTERDOMAIN ROUTING Routing inside an autonomous system is referred to as intradomain routing. Routing between autonomous systems is.
Delivery, Forwarding and
CECS 474 Computer Network Interoperability WAN Technologies & Routing
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
WAN technologies and routing Packet switches and store and forward Hierarchical addresses, routing and routing tables Routing table computation Example.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
《 Hierarchical Caching Management for Software Defined Content Network based on Node Value 》 Reporter : Jing Liu , China Affiliation : University of Science.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Routing and Routing Protocols
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #7 DVMRP.
Networking and internetworking devices. Repeater.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 21: Multicast Routing Slides used with.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Peter R Pietzuch and Jean Bacon Peer-to-Peer Overlay Networks in an Event-Based Middleware DEBS’03, San Diego, CA, USA,
Computer Networks22-1 Network Layer Delivery, Forwarding, and Routing.
Ch 22. Routing Direct and Indirect Delivery.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
CS440 Computer Networks 1 Link State Routing and OSPF Neil Tang 10/31/2008.
15-829A/18-849B/95-811A/19-729A Internet-Scale Sensor Systems: Design and Policy Review.
ECE 544 Protocol Design Project 2016 Chengyao Wen Hua Deng Xiaoyu Duan.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
22.1 Network Layer Delivery, Forwarding, and Routing.
Routing algorithms. D(v): the cost from the source node to destination that has currently the least cost. p(v): previous node along current least.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Zone Routing Protocol (ZRP)
(How the routers’ tables are filled in)
COMP 3270 Computer Networks
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Lecture 13 review Explain how distance vector algorithm works.
ECE 544 Protocol Design Project 2016
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Chapter 22. Network Layer: Routing
Advanced Computer Networks
Routing.
COMPUTER NETWORKS CS610 Lecture-16 Hammad Khalid Khan.
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Presentation transcript:

Intradomain Anycast for Content Centric Networks

Network Model Each node in the network has a unique NodeId A D C B E F G H

Network graph Nodes obtain a complete network graph – link state routing algorithm Nodes know the shortest path for every destination node A D C B E F G H B’s routing table* DestNext Hop AC DC EFF GFF *Metric is hop count

Routing Information objects have a unique ObjectId ObjectIds and NodeIds share the same id space NodeIs partition the ID space (DHT like) Network routes messages for ObjectIds to correspodent Nodes via the shortest path A D C B E F G H A requests H1 D requests H1

Duplicate Objects A copy of an object is located at a different node – E.g. Caching Requests should be routed to nearest location Cached object is announced to neighborhood A D C B E F G H CACHE H1

Shortcuts Upon receiving a CACHE ANNOUNCEMENT, a node compares if it’s worth creating a shortcut entry Compares distance between caching node and correspondent node Distance is subject to link state metric A D C B E F G H CACHE H1 If (distance(C) < distance(H) create shortcut entry for H1 If (distance(C) < distance(H) create shortcut entry for H1 ObjectNextHop H1C B’s shortcut table

Limiting the flood Nodes relay cache announcements if it’s really worth it Otherwise flooding is stopped A D C B E F G H CACHE H1 d(c) == d(h) Not worth it. Drop it A already forwards H1 to B. Not worth creating a shortcut entry. Relay cache announcement d(c) > d(h) Not worth it. Drop it

Anycast Upon receiving a message – Inspect shortcut table – If shortcut for this object is found, forward message to shortcut.nextHop – Else forward message to shortest path A D C B E F G H Request H1 ObjectNextHop H1C B’s shortcut table CACHE H1

Advantages Messages are routed through the shortest path, unless a detour is found along the way Link state routing ensures topological shortest paths – Not key based routing. – Logical distance d(ObjectId, NodeId) is not decreased on every hop. Cache announcements are flooded in a limited way – Nodes relay cache announcements as long as it’s worth willing

Disadvantages Link state does not scale to large topologies Suitable for intradomain routing

Can also be seen as Combination of structured and unstructured p2p systems DHT like key partitioning creates deterministic paths – If an object is not found at its correspondent node, then it’s not there at all Gossip style flooding is good for popular objects – In network caches

Can also be seen as (2) Link state routing for Node Ids Distance vector routing for Object Ids

Relation to Architectures Suitable for PSIRP – Rendezvous Network : publications and subscriptions are routed to correspondent node, unless a cache if found near by – Topology function in intradomain level – Nobody has actually presented a solution for intradomain yet Argument against CCN – CCN floods requests to network, we flood only caches (and that’s limited)

Usage Example: Probabilistic caching Assuming that object items can be distinguished based on popularity – Follow a Zipf distribution – Follow the rule A relatively small portion of the objects are responsible for the majority of traffic Let every node in the network cache an object with a probability p (e.g. 0.01%) Then, with high probability, popular items are cached in near by nodes Anycast scheme provides fast access to these objects