Internet Indirection Infrastructure (i3) Ion Stoica Daniel Adkins Shelley Zhuang Scott Shenker Sonesh Surana (Published in SIGCOMM 2002) URL: Presented By: Arati Baliga
Motivation Internet architecture was designed for point to point communication Communication services like multicast, anycast, mobility faced deployment challenges. i3 provides an application level solution to this problem. Decouples act of sending from act of receiving by adding a level of indirection to this process.
i3 Overview Packet types:
Communication abstractions
Stack Identifiers An identifier stack is a list of identifiers that takes the form (id1,id2, …,idn) where idi is either an identifier or an address. Packets and triggers are Packet P = (idstack, data) Trigger T = (id, idstack) Identifier stacks used in service compostion, hetrogeneous multicast and improve robustness of i3.
Service Composition
Scalable Multicast
Chord
Security Eavesdropping - Private triggers Trigger Hijacking - add another level of indirection DoS Attacks End-Hosts (sends a random nonce as challenge) Trigger Loops (fair share of resources, loop detection on trigger insert) Anonymity: Inherent. Eavesdropping on traffic of sender does not reveal receiver identity.
Simulations
Performance Evaluation