Data Oriented Network Architecture (DONA) Andrey Ermolinskiy Mohit Chawla CS 262 A Project Poster December 14.

Slides:



Advertisements
Similar presentations
1 Data-Oriented Network Architecture (DONA) Scott Shenker (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, I. Stoica)
Advertisements

5/30/2012. Provides a method for finding services/data on the Exchange Network – discover data. Supports User Friendly Tools Can automatically collect.
Efficient Event-based Resource Discovery Wei Yan*, Songlin Hu*, Vinod Muthusamy +, Hans-Arno Jacobsen +, Li Zha* * Chinese Academy of Sciences, Beijing.
Neighbor Discovery for IPv6 Mangesh Kaushikkar. Overview Introduction Terminology Protocol Overview Message Formats Conceptual Model of a Host.
Auto Configuration and Mobility Options in IPv6 By: Hitu Malhotra and Sue Scheckermann.
IP Mobility Support Basic idea of IP mobility management
Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California,
IP Multicast Lecture 2: PIM-SM Carl Harris Communications Network Services Virginia Tech.
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
Multicast Fundamentals n The communication ways of the hosts n IP multicast n Application level multicast.
Introduction to push technology © 2009 Research In Motion Limited.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
Policy Based Routing using ACL & Route Map By Group 7 Nischal ( ) Pranali ( )
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
What’s a Web Cache? Why do people use them? Web cache location Web cache purpose There are two main reasons that Web cache are used:  to reduce latency.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Internet Networking Spring 2002
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
Brief Overview of.NET Remoting.NET Remoting is a Java RMI-like remote method invocation mechanism Infrastructure of.NET Remoting is highly customizable.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Introspective Replica Management Yan Chen, Hakim Weatherspoon, and Dennis Geels Our project developed and evaluated a replica management algorithm suitable.
1 Name Directory Service based on MAODV and Multicast DNS for IPv6 MANET Jaehoon Jeong, ETRI VTC 2004.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
SAINT ‘01 Proactive DNS Caching: Addressing a Performance Bottleneck Edith Cohen AT&T Labs-Research Haim Kaplan Tel-Aviv University.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
Gil EinzigerRoy Friedman Computer Science Department Technion.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
By Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker Presented by Fei Jia Revisiting IP Multicast.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Paper Group: 20 Overlay Networks 2 nd March, 2004 Above papers are original works of respective authors, referenced here for academic purposes only Chetan.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Othman Othman M.M., Koji Okamura Kyushu University 1.
1 Module 4: Implementing OSPF. 2 Lessons OSPF OSPF Areas and Hierarchical Routing OSPF Operation OSPF Routing Tables Designing an OSPF Network.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Lecture 17 November 8Intra-domain routing November 13Internet routing 1 November 15Internet routing 2 November 20End-to-end protocols 1 November 22End-to-end.
HTTP evolution - TCP/IP issues Lecture 4 CM David De Roure
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, Ion Stoica SIGCOMM 2007 Presented by Ye Tian for Course CS05112.
Information-Centric Networks Section # 7.1: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Mobile IP 순천향대학교 전산학과 문종식
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Module 5: Managing Content. Overview Publishing Content Executing Reports Creating Cached Instances Creating Snapshots and Report History Creating Subscriptions.
Communication Networks Recitation 11. Multicast & QoS Routing.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
ECE 544 Protocol Design Project 2016 Nirali Shah Thara Philipson Nithin Raju Chandy.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Delay Tolerant Network (DTN) Security Key Management Design Alternatives IETF94 DTN Working Group November 3, 2015 Fred L. Templin
Introduction Wireless devices offering IP connectivity
Auction-based in-network caching in Information-centric networks Workshop ACROSS, 16th of September 2016 | Lucia D’Acunto.
Domain Name System (DNS)
Self Healing and Dynamic Construction Framework:
Programming with ANTS ANTS facilitates protocols construction and deployment Demonstrate some examples using Mobility services Multicasting.
Wireless Sensor Network Architectures
with distributed anchor routers
Internet Networking recitation #12
ECE 544 Protocol Design Project 2016
5.2 FLAT NAMING.
ECE 544 Project3 Team member.
Advanced Computer Networks
Data-Oriented Network Architecture (DONA)
Mobile IP Neil Tang 11/12/2008 CS440 Computer Networks.
Presentation transcript:

Data Oriented Network Architecture (DONA) Andrey Ermolinskiy Mohit Chawla CS 262 A Project Poster December 14

DONA Overview Data REGsFINDs DONA explores a clean-slate approach to Internet Architecture Main idea: data-centric routing:  Client requests a piece of data by its name rather than the owner’s address  Names are flat, self- certifying Dissemination Handlers (DH) are DONA “routers”  Combine forwarding, name resolution, and data caching functions

DONA Overview (cont.) Data REGsFINDs DONA exposes three operational primitives:  FIND -- discovers an entity or a data item by its name Long-lived FINDs (ttl > 0) are subscriptions, which set up forwarding state  REGISTER -- advertises ownership of a data item  PUSH -- disseminates new content to all current subscribers DHes propagate REGISTER requests and route FINDs to nearby copies of data

Load Shedding and Congestion Control Snapshot of Routing Table at DH D Snapshot of Congestion Table at DH D

Optimality of Load Distribution OPT_LS(S k, C n ): “Given a set of clients and servers with specific query rates and capacities respectively, find an optimal mapping between clients and servers to minimize the total latency incurred by queries in the system”. We can show that OPT_LS is NP-complete (reduction from the k-partition problem) c1c1 c2c2 c 3..c n-1 S1S1 cncn S2S2 S3S3 Cap(S 1 )=Cap(S 2 )=Cap(S 3 )=D L(S1)=L(S2)=L(S3)=1 Sample construction for an instance of a 3- partition problem C={ a 1,a 2,a 3 ….a N };

Simulation Studies Event-driven simulator written in Java Observes average latency and CDFs of latency Simulation parameters:  A 10 node topology using GT-ITM and manually generated topologies  Latency between links: Pre-Assigned (GT-ITM/manual)

DONA Administrative Policies Goal: ability to selectively deny incoming FIND and REGISTER requests based on fields in request header. Example: DENY (type == REGISTER) OR (ttl != 0) OR (appHeader != HTTP) type == REGISTERttl != 0 appHeader != HTTPOR policy action Parse the expression, convert it to a tree DH sends a DENY message to inform the client of its decision

Client Access Control DONA provides a framework for implementing user access control mechanisms (authentication and authorization). AUTHENTICATE policy action instructs a DH to request and verify client’s credentials prior to granting its request. AUTHENTICATE group1 Certif (type == FIND) policy action authentication domain credentials format DONA Authentication Agent Application Client node First-hop DH data request 2 1 FIND Verifier 1 DONA Verifier 2 PasswdCertif Policy Module 3 4 AUTHENTICATE DENY AUTH 5 6 credentials request 7 FIND 8 Packet contain authToken 9 authToken ACCEPT 10

Services and Applications RSS content dissemination on top of DONA:  Server-side proxy registers with a DH on behalf of content source.  Client-side proxies convert RSS refresh requests into long-lived FINDs (subscriptions), which set up forwarding state in the topology.  PUSH operation propagates content updates through the dissemination tree PUSH FIND (ttl > 0) Reverse-path forwarding entry RSS Client 1 RSS Client 2 DH 1Client Proxy 1 DH 2 DH 3 DH 4 RSS Source Server ProxyClient Proxy 2 DONA REGISTER

Services and Applications (cont.) DONA rendezvous capabilities simplify design of Overlay Multicast:  Global multicast routing state = shared undirected tree  New group members use DONA to discover a nearby member and attach themselves to the tree  To transmit a packet to the group: Sender locates a nearby member (M), forwards the packet to M Each member forwards the packet to its neighbors on the tree DONA M1M1 M2M2 REGISTER M4M4 M5M5 M6M6 FIND S1S1 ATTACH FIND SEND sender  DONA routing ensures that resulting trees are geographically efficient