15-744: Computer Networking L-20 Data-Oriented Networking.

Slides:



Advertisements
Similar presentations
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Advertisements

CCNA – Network Fundamentals
1 Observations regarding a new architecture Kevin Fall Intel Research, Berkeley 18-Sep-2006, Cambridge, UK.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
15-849: Hot Topics in Networking Data Oriented Architectures Srinivasan Seshan 1.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Internetworking.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
An Architecture for Internet Data Transfer Niraj Tolia Michael Kaminsky*, David G. Andersen, and Swapnil Patil Carnegie Mellon University and *Intel Research.
Delay Tolerant Networking Gareth Ferneyhough UNR CSE Department
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Gursharan Singh Tatla Transport Layer 16-May
15-744: Computer Networking L-20 Data-Oriented Networking.
OIS Model TCP/IP Model.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
DELAY-TOLERANT NETWORKS Volodymyr Goncharov Freiburg Uni, WS 2009, Seminar Ad Hoc Netzwerke.
1 Internet Protocol: Forwarding IP Datagrams Chapter 7.
CIS 725 Wireless networks. Low bandwidth High error rates.
15-441: Computer Networking Lecture 26: Where do we go from here?
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
A Delay-Tolerant Network Architecture for Challenged Internets Author: Kevin Fall Paper Presentation: Vinay Goel.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Network Layer introduction.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Computer Networking. 2 Outline 3 Objectives Understand the state-of-the-art in network protocols, architectures and applications Understand how networking.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
Reconsidering Internet Mobility Alex C. Snoeren, Hari Balakrishnan, M. Frans Kaashoek MIT Laboratory for Computer Science.
Björn Landfeldt School of Information Technologies NETS 3303 Networked Systems Multicast.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Multimedia & Mobile Communications Lab.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Or Sheffet Nov. 5 th, 2010 A Delay-Tolerant Network Architecture for Challenged Internets Kevin Falls A Data-Oriented (and beyond) Network Architecture.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
An Architecture for Internet Data Transfer Niraj Tolia, Michael Kaminsky, David G. Andersen, and Swapnil Patil NSDI ’ Eunsang Cho.
Communication Networks NETW 501 Tutorial 2
15-744: Computer Networking L-17 Data-Oriented Networking.
Multicast in Information-Centric Networking March 2012.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
BASICS Gabriella Paolini (GARR) 27/05/11 - ICCU Roma 1 How INTERNET works !
Scaling the Network: The Internet Protocol
OSI Protocol Stack Given the post man exemple.
Transport Layer Unit 5.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Multimedia and Networks
Scaling the Network: The Internet Protocol
Presentation transcript:

15-744: Computer Networking L-20 Data-Oriented Networking

Outline Data-oriented Networking DTNs 2

Data-Oriented Networking Overview In the beginning... –First applications strictly focused on host-to-host interprocess communication: Remote login, file transfer,... –Internet was built around this host-to-host model. –Architecture is well-suited for communication between pairs of stationary hosts.... while today –Vast majority of Internet usage is data retrieval and service access. –Users care about the content and are oblivious to location. They are often oblivious as to delivery time: Fetching headlines from CNN, videos from YouTube, TV from Tivo Accessing a bank account at “ 3

To the beginning... What if you could re-architect the way “bulk” data transfer applications worked HTTP FTP etc.... knowing what we know now? 4

Innovation in Data Transfer is Hard Imagine: You have a novel data transfer technique How do you deploy? Update HTTP. Talk to IETF. Modify Apache, IIS, Firefox, Netscape, Opera, IE, Lynx, Wget, … Update SMTP. Talk to IETF. Modify Sendmail, Postfix, Outlook… Give up in frustration 5

6 Multi- path USB Xfer Data-Oriented Network Design NET ( DSL ) Xfer NET wireles s SENDER RECEIVER Internet Store-carry-forward Multipath and Mirror support NET CACHE Xfer Features

New Approach: Adding to the Protocol Stack 7 Transport Network Data Link Physical Router Bridge Internet Protocol Layers ALG Middleware Application Software- defined radio Object Exchange Data Transfer

Data Transfer Service Transfer Service responsible for finding/transferring data Transfer Service is shared by applications How are users, hosts, services, and data named? How is data secured and delivered reliably? How are legacy systems incorporated? 8 Application Protocol SenderReceiver Xfer Service and Data Data

Naming Data (DOT) Application defined names are not portable Use content-naming for globally unique names Objects represented by an OID Objects are further sub-divided into “chunks” Secure and scalable! 9 File Desc3 Foo.tx t OID Cryptographic Hash Desc1 Desc2

Similar Files: Rabin Fingerprinting File Data Rabin Fingerprints Given Value - 8 Natural Boundary Hash 1 Hash 2

Naming Data (DOT) All objects are named based only on their data Objects are divided into chunks based only on their data Object “A” is named the same Regardless of who sends it Regardless of what application deals with it Similar parts of different objects likely to be named the same e.g., PPT slides v1, PPT slides v1 + extra slides First chunks of these objects are same 11

Naming Data (DONA) Names organized around principals. Names are of the form P : L. P is cryptographic hash of principal’s public key, and L is a unique label chosen by the principal. Granularity of naming left up to principals. Names are “flat”. 12

Self-certifying Names A piece of data comes with a public key and a signature. Client can verify the data did come from the principal by Checking the public key hashes into P, and Validating that the signature corresponds to the public key. Challenge is to resolve the flat names into a location. 13

Xfer Service SenderReceiver Locating Data (DOT) Request File X OID, Hints put(X) OID, Hints get(OID, Hints) read() data Transfer Plugins 14

Name Resolution (DONA) Resolution infrastructure consists of Resolution Handlers. Each domain will have one logical RH. Two primitives FIND(P:L) and REGISTER(P:L). FIND(P:L) locates the object named P:L. REGISTER messages set up the state necessary for the RHs to route FINDs effectively. 15

Locating Data (DONA) 16 REGISTER state FIND being routed

Establishing REGISTER state Any machine authorized to serve a datum or service with name P:L sends a REGISTER(P:L) to its first- hop RH RHs maintain a registration table that maps a name to both next-hop RH and distance (in some metric) REGISTERs are forwarded according to interdomain policies. REGISTERs from customers to both peers and providers. REGISTERs from peers optionally to providers/peers. 17

Forwarding FIND(P:L) When FIND(P:L) arrives to a RH: If there’s an entry in the registration table, the FIND is sent to the next-hop RH. If there’s no entry, the RH forwards the FIND towards to its provider. In case of multiple equal choices, the RH uses its local policy to choose among them. 18

Interoperability: New Tradeoffs 19 Data Link Physical Applications The Hourglass Model ‘Thin Waist’ Limits Application Innovation Increases Data Delivery Flexibility UDPTCP Data Link Physical Applications The Hourglass Model Innovation Flexibility Network (IP/Other) Moving up the Transport (TCP/Other)

Interoperability: Datagrams vs. Data Blocks DatagramsData Blocks What must be standardized ? IP Addresses Name  Address translation (DNS) Data Labels Name  Label translation (Google?) Application Support Exposes much of underlying network’s capability Practice has shown that this is what applications need Lower Layer Support Supports arbitrary links Requires end-to-end connectivity Supports arbitrary links Supports arbitrary transport Support storage (both in- network and for transport) 20

Outline Data-oriented Networking DTNs 21

Unstated Internet Assumptions Some path exists between endpoints Routing finds (single) “best” existing route E2E RTT is not very large Max of few seconds Window-based flow/cong ctl. work well E2E reliability works well Requires low loss rates Packets are the right abstraction Routers don’t modify packets much Basic IP processing 22

New Challenges Very large E2E delay Propagation delay = seconds to minutes Disconnected situations can make delay worse Intermittent and scheduled links Disconnection may not be due to failure (e.g. LEO satellite) Retransmission may be expensive Many specialized networks won’t/can’t run IP 23

24 IP Not Always a Good Fit Networks with very small frames, that are connection- oriented, or have very poor reliability do not match IP very well Sensor nets, ATM, ISDN, wireless, etc IP Basic header – 20 bytes Bigger with IPv6 Fragmentation function: Round to nearest 8 byte boundary Whole datagram lost if any fragment lost Fragments time-out if not delivered (sort of) quickly

IP Routing May Not Work End-to-end path may not exist Lack of many redundant links [there are exceptions] Path may not be discoverable [e.g. fast oscillations] Traditional routing assumes at least one path exists, fails otherwise Insufficient resources Routing table size in sensor networks Topology discovery dominates capacity Routing algorithm solves wrong problem Wireless broadcast media is not an edge in a graph Objective function does not match requirements Different traffic types wish to optimize different criteria Physical properties may be relevant (e.g. power) 25

26 What about TCP? Reliable in-order delivery streams Delay sensitive [6 timers]: connection establishment, retransmit, persist, delayed-ACK, FIN-WAIT, (keep-alive) Three control loops: Flow and congestion control, loss recovery Requires duplex-capable environment Connection establishment and tear-down

27 Performance Enhancing Proxies Perhaps the bad links can be ‘patched up’ If so, then TCP/IP might run ok Use a specialized middle-box (PEP) Types of PEPs [RFC3135] Layers: mostly transport or application Distribution Symmetry Transparency

28 TCP PEPs Modify the ACK stream Smooth/pace ACKS  avoids TCP bursts Drop ACKs  avoids congesting return channel Local ACKs  go faster, goodbye e2e reliability Local retransmission (snoop) Fabricate zero-window during short-term disruption Manipulate the data stream Compression, tunneling, prioritization

Architecture Implications of PEPs End-to-end “ness” Many PEPs move the ‘final decision’ to the PEP rather than the endpoint May break e2e argument [may be ok] Security Tunneling may render PEP useless Can give PEP your key, but do you really want to? Fate Sharing Now the PEP is a critical component Failure diagnostics are difficult to interpret 29

Architecture Implications of PEPs [2] Routing asymmetry Stateful PEPs generally require symmetry Spacers and ACK killers don’t Mobility Correctness depends on type of state (similar to routing asymmetry issue) 30

Delay-Tolerant Networking Architecture Goals Support interoperability across ‘radically heterogeneous’ networks Tolerate delay and disruption Acceptable performance in high loss/delay/error/disconnected environments Decent performance for low loss/delay/errors Components Flexible naming scheme Message abstraction and API Extensible Store-and-Forward Overlay Routing Per-(overlay)-hop reliability and authentication 31

Disruption Tolerant Networks 32

Disruption Tolerant Networks 33

Naming Data (DTN) Endpoint IDs are processed as names refer to one or more DTN nodes expressed as Internet URI, matched as strings URIs Internet standard naming scheme [RFC3986] Format: : SSP can be arbitrary, based on (various) schemes More flexible than DOT/DONA design but less secure/scalable 34

Naming Support ‘radical heterogeneity’ using URI’s: {scheme ID (allocated), scheme-specific-part} associative or location-based names/addresses optional Variable-length, can accommodate “any” net’s names/addresses Endpoint IDs: multicast, anycast, unicast Late binding of EID permits naming flexibility: EID “looked up” only when necessary during delivery contrast with Internet lookup-before-use DNS/IP 35

36 Message Abstraction Network protocol data unit: bundles “postal-like” message delivery coarse-grained CoS [4 classes] origination and useful life time [assumes sync’d clocks] source, destination, and respond-to EIDs Options: return receipt, “traceroute”-like function, alternative reply-to field, custody transfer fragmentation capability overlay atop TCP/IP or other (link) layers [layer ‘agnostic’] Applications send/receive messages “Application data units” (ADUs) of possibly-large size Adaptation to underlying protocols via ‘convergence layer’ API includes persistent registrations

DTN Routing DTN Routers form an overlay network only selected/configured nodes participate nodes have persistent storage DTN routing topology is a time-varying multigraph Links come and go, sometimes predictably Use any/all links that can possibly help (multi) Scheduled, Predicted, or Unscheduled Links May be direction specific [e.g. ISP dialup] May learn from history to predict schedule Messages fragmented based on dynamics Proactive fragmentation: optimize contact volume Reactive fragmentation: resume where you failed 37

Example Routing Problem 38 Village Internet City bike 2 31

Example Graph Abstraction 39 time (days) bike (data mule) intermittent high capacity Geo satellite medium/low capacity dial-up link low capacity City Village 1 Village 2 Connectivity: Village 1 – City bandwidth bike satellite phone

The DTN Routing Problem Inputs: topology (multi)graph, vertex buffer limits, contact set, message demand matrix (w/priorities) An edge is a possible opportunity to communicate: One-way: (S, D, c(t), d(t)) (S, D): source/destination ordered pair of contact c(t): capacity (rate); d(t): delay A Contact is when c(t) > 0 for some period [i k,i k+1 ] Vertices have buffer limits; edges in graph if ever in any contact, multigraph for multiple physical connections Problem: optimize some metric of delivery on this structure Sub-questions: what metric to optimize?, efficiency? 40

Knowledge-Performance Tradeoff 41 Use of Knowledge Oracles Performance Contacts + Queuing + Traffic Contacts Summary Contacts + Queuing (local) Contacts + Queuing (global) None Algorithm LP MED ED EDLQ EDAQ Higher performance, higher complexity Oracle FC

Knowledge-Performance Tradeoff 42

Routing Solutions - Replication “Intelligently” distribute identical data copies to contacts to increase chances of delivery Flooding (unlimited contacts) Heuristics: random forwarding, history-based forwarding, predication-based forwarding, etc. (limited contacts) Given “replication budget”, this is difficult Using simple replication, only finite number of copies in the network [Juang02, Grossglauser02, Jain04, Chaintreau05] Routing performance (delivery rate, latency, etc.) heavily dependent on “deliverability” of these contacts (or predictability of heuristics) No single heuristic works for all scenarios! 43

Using Erasure Codes Rather than seeking particular “good” contacts, “split” messages and distribute to more contacts to increase chance of delivery Same number of bytes flowing in the network, now in the form of coded blocks Partial data arrival can be used to reconstruct the original message Given a replication factor of r, (in theory) any 1/r code blocks received can be used to reconstruct original data Potentially leverage more contacts opportunity that result in lowest worse-case latency Intuition: Reduces “risk” due to outlier bad contacts 44

Erasure Codes 45 Message n blocks Encoding Opportunistic Forwarding Decoding Message n blocks

DTN Security Payload Security Header (PSH) end-to-end security header Bundle Authentication Header (BAH) hop-by-hop security header 46 Bundle Agent    Bundle Application  Security Policy Router (may check PSH value)  Source BAH PSH Sender Receiver/ Sender Receiver/ Sender Receiver/ Sender Destination BAH credit: MITRE

So, is this just ? Many similarities to (abstract) service Primary difference involves routing, reliability and security depends on an underlying layer’s routing: Cannot generally move messages ‘closer’ to their destinations in a partitioned network In the Internet (SMTP) case, not disconnection-tolerant or efficient for long RTTs due to “chattiness” security authenticates only user-to-user 47

48

Performance: Opportunistically Aggregate Upstream Bandwidth Challenges: Multi-hop: decide whether to send upstream or forward one extra hop Requires both data-oriented design and opportunistic forwarding 49 Sender broadcasts to available neighbors Neighbors decide whether to ship the pieces upstream