Information-Centric Networks Section # 7.1: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.

Slides:



Advertisements
Similar presentations
Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Internetworking II: MPLS, Security, and Traffic Engineering
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Internet Indirection Infrastructure Presented in by Jayanthkumar Kannan On 09/17/03.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday C. Today I³SI³HIPHI³.
Host Mobility Using an Internet Indirection Infrastructure by Shelley Zhuang, Kevin Lai, Ion Stoica, Randy Katz, Scott Shenker presented by Essi Vehmersalo.
I3 Status Ion Stoica UC Berkeley Jan 13, The Problem Indirection: a key technique in implementing many network services,
Supporting Legacy Applications in Associative Overlay Networks Shelley Zhuang, Ion Stoica {shelleyz, Sahara Retreat January 16-18,
Internet Indirection Infrastructure Ion Stoica and many others… UC Berkeley.
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
Criticisms of I3 Zhichun Li. General Issues Functionality Security Performance Practicality If not significant better than existing schemes, why bother?
3-1 Distributed Hash Tables CS653, Fall Implementing insert/retrieve: distributed hash table (DHT) r Hash table m data structure that maps “keys”
CS 268: Lecture 5 (Project Suggestions) Ion Stoica February 6, 2002.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Internet Indirection Infrastructure (i3) Status – Summer ‘03 Ion Stoica UC Berkeley June 5, 2003.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
Internet Indirection Infrastructure Ion Stoica UC Berkeley June 10, 2002.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Internet Indirection Infrastructure Slides thanks to Ion Stoica.
1 Routing as a Service Karthik Lakshminarayanan (with Ion Stoica and Scott Shenker) Sahara/i3 retreat, January 2004.
CS 268: Overlay Networks: Distributed Hash Tables Kevin Lai May 1, 2001.
CS 268: Lecture 25 Internet Indirection Infrastructure Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Wide-area cooperative storage with CFS
Indirection Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm Slides.
Internet Indirection Infrastructure (i3) Ion Stoica Daniel Adkins Shelley Zhuang Scott Shenker Sonesh Surana (Published in SIGCOMM 2002) URL:
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
Internet Indirection Infrastructure Ion Stoica April 16, 2003.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
Internet Indirection Infrastructure Ion Stoica et. al. SIGCOMM 2002 Presented in CIS700 by Yun Mao 02/24/04.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Overlay network concept Case study: Distributed Hash table (DHT) Case study: Distributed Hash table (DHT)
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
CS 268: Project Suggestions Ion Stoica January 26, 2004.
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
Information-Centric Networks Section # 3.2: DNS Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 5.3: Content Distribution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 9.3: Clean Slate Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 7.2: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 10.2: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 3.3: DNS Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 3.1: DNS Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.2: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 2.1: Internet Evolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 1.1: Introduction Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 6.1: Evolved Naming & Resolution Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 10.3: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Information-Centric Networks Section # 4.2: Routing Issues Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics.
Information-Centric Networks Section # 2.3: Internet Evolution Instructor: George Xylomenos Department: Informatics.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Information-Centric Networks Section # 5.1: Content Distribution Instructor: George Xylomenos Department: Informatics.
Internet Indirection Infrastructure (i3) Ion Stoica Daniel Adkins Shelley Zhuang Scott Sheker Sonesh Surana Presented by Kiran Komaravolu.
Internet Indirection Infrastructure (i3)
Net 323: NETWORK Protocols
5.2 FLAT NAMING.
Internet Indirection Infrastructure
Internet Indirection Infrastructure
Presentation transcript:

Information-Centric Networks Section # 7.1: Evolved Addressing & Forwarding Instructor: George Xylomenos Department: Informatics

Funding These educational materials have been developed as part of the instructors educational tasks. The “Athens University of Economics and Business Open Courses” project only funded the reformatting of these educational materials. The project is being implemented as part of the Operational Program “Instruction and Lifelong Learning” and is co- financed by the European Union (European Social Fund) and national funds.

Licencing These educational materials are subject to a Creative Commons License.

Information-Centric Networks07a-4 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana –IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 2, APRIL 2004 Main point –Multicast, anycast and mobility are hard on the Internet –i3 is an overlay-based alternative Packets are associated with identifiers Receivers use identifiers to complete delivery Sending is decoupled from receiving

Introduction With IP the sender knows the address of the receiver –Not so with multicast, anycast and mobile hosts –A level of indirection is needed (e.g. group addresses) –Implementation faces technical and deployment issues Many overlay solutions aim to solve this problem –Each solution targets a single issue (e.g. multicast) –i3 is an attempt to provide a generic solution –Based on a general overlay service –Specific solutions are built on top of i3 Multicast, anycast mobility Information-Centric Networks07a-5

i3 overview Service model –Sources send packets to a logical identifier –Receivers express interest to that identifier Best-effort delivery (as usual on the Internet) –Slightly different than IP multicast In IP multicast the infrastructure controls the routing In i3 receivers can control packet routing Rendezvous-based communication –Packets are (id, data) pairs which can be sent –Triggers are (id, address) pairs which can be inserted/removed –Inexact matching with threshold k An id matches a trigger for at least k prefix bits There is no longer match with another trigger Information-Centric Networks07a-6

i3 overview Overview of the design –i3 uses an overlay which stores triggers and forwards packets –At any time a unique node is responsible for an identifier Triggers for this id are stored there Packets with this id are forwarded there –Inexact matching with k bits All id’s matching at k bits are handled by the same server –End-hosts need to know only a single i3 node That node forwards their requests –End-hosts periodically refresh their triggers Information-Centric Networks07a-7

i3 overview Communication primitives –Mobility: a node changes its address The node updates its triggers to point at the new address It is possible to choose triggers handled by a nearby i3 server –Multicast: many nodes receive the same packets All group members insert triggers for the same id The sender sees no difference with unicast –Anycast: one node of a group receives each packet Group members insert k-matching triggers The sender uses a k-matching identifier The member with the longest matching prefix gets the packet Information-Centric Networks07a-8

i3 overview Stack of identifiers –An identifier stack is a list of identifiers or addresses –Packets and triggers may contain stacks Packets are sent to a series of identifiers Packets are forwarded to a series of identifiers –Say that a packet contains a stack (id1, id2, id3) i3 tries to match id1, then id2, then id3 If id1 does not match any triggers, it is removed Say that id2 matches a trigger with stack (x, y) The packet is forwarded to (x, y, id3) If x is an IP address, the packet is sent there with a tag of (y, id3) The receiver at x may then send a new packet to (y, id3) If packet matches many triggers, it is duplicated for each one Information-Centric Networks07a-9

Using i3 Service composition –Example: data transformation for a mobile service –Sender stack: first id for the transformer, second for the recipient Heterogeneous multicast –Example: video to receivers with different codecs –Trigger stack: first id for the transcoder, second for the recipient Server selection –Example: load balancing between web servers –Use k-matching prefixes and random trailing bits Each server inserts one or more triggers, depending on capacity Large scale multicast –Triggers point to servers that further duplicate packets Information-Centric Networks07a-10

Design and performance issues Overlay properties –We need robustness, scalability, efficiency, stability –The prototype uses Chord –Nodes only use the first k bits for addresses All k-matching prefixes are stored in the same node Public and private triggers –Distinction made only at the application layer –Public triggers are long lived (e.g. web server addresses) Can be produced by hashing the target’s name –Private triggers are short lived (e.g. a session identifier) Example: a client chooses a private identifier The client sends the identifier to a server and inserts a trigger for it The server returns its own private identifier and also inserts a trigger A temporary channel now exists between client and server Information-Centric Networks07a-11

Design and performance issues Robustness –Only soft state is kept: triggers must be refreshed! –What can we do while a trigger is lost? –Use a backup trigger and ask senders to use an id stack If the first trigger is lost, the backup catches the packet –Use replication at the overlay level for the triggers themselves Routing efficiency –Overlay routing is less efficient than regular routing –Sender’s should cache i3 server addresses as much as possible If a packet reaches an intermediate server a flag is set The final server returns its address to the sender if the flag is set –Avoiding triangle routing by using nearby servers for triggers Receivers can sample the id space to find nearby servers Information-Centric Networks07a-12

Design and performance issues Security –Malicious triggers can wreak havoc into the system –Constrained triggers: in (x, y) x constrains y of vice-versa –Pushback: dropped packets lead to trigger removal –Challenges: trigger insertion requires responding to a challenge Other issues –Avoiding hot spots: push triggers to other servers –Self-organization: achieved by Chord –Scalability: triggers are inserted per flow, but only at one node –Deployment: Chord can start with a single node and expand –Legacy applications: a proxy can be used to insert the id’s –Anonymity: eavesdropping does not reveal both endpoints Information-Centric Networks07a-13

Simulation results Evaluation of latency stretch compared to IP –Chord simulator with 5000 node topologies –Either power-law random graph or GT-ITM topologies End-to-end latency –Assumes senders cache the node responsible for a trigger –Also assumes that triggers use sampling to select nearby servers –With samples stretch stabilizes around 1.5 Proximity routing from sender to i3 server –How much does it cost to send the first message? –Closest finger replica: maintain the successors of each finger –Closest finger set: evaluate multiple fingers and keep closest –With 10 replicas both strategies perform similarly –Stretch is 5-7 with the heuristics, without Information-Centric Networks07a-14

Simulation results Implementation and experiments –Bare-bones implementation based on Chord –256 bit identifiers with k=128 –48 byte header in all packets and triggers Packets can also carry up to 4 identifiers in a stack –Triggers updated every 30 seconds Performance –Trigger insertion: 12.5 μs (table lookup and memory allocation) –Data packet forwarding: μs, linear on packet size Lookup matching triggers and forward, only unicast –i3 routing: μs, linear on packet size Lookup finger table and forward, finger table is a list (slow!) –Throughput: Mbps, better with larger packets Information-Centric Networks07a-15

End of Section # 7.1 Course: Information-Centric Networks, Section # 7.1: Evolved Addressing & Forwarding Instructor: George Xylomenos, Department: Informatics