Internet Indirection Infrastructure

Size: px
Start display at page:

Download "Internet Indirection Infrastructure"

Transcription

1 Ke Observation Internet Indirection Infrastructure Virtuall all previous proposals use indirection, e.g., Phsical indirection point mobile IP Logical indirection point IP multicast Ion Stoica UC Berkele An problem in computer science can be solved b adding a laer of indirection 4 Motivations Toda s Internet is built around a unicast point-to-point communication abstraction: Send packet p from host A to host B This abstraction allows Internet to be highl scalable and efficient, but not appropriate for applications that require other communications primitives: Multicast Ancast Mobilit Our Solution Build an efficient indirection laer on top of IP Use an overla network to implement this laer Incrementall deploable; don t need to change IP Application Indir. laer TCP/UDP IP 2 5 Wh? Point-to-point communication implicitl assumes there is one sender and one receiver, and that the are placed at fied and well-known locations E.g., a host entified b the IP address is located in Berkele Internet Indirection Infrastructure (i3) Each packet is associated an entifier To receive a packet with entifier, receiver R maintains a trigger (, R) into the overla network R trigger 3 6 1

2 Service Model API sendpacket(p); inserttrigger(t); removetrigger(t) // optional Best-effort service model (like IP) Triggers periodicall refreshed b end-hosts ID length: 256 bits Ancast Use longest prefi matching instead of eact matching Prefi p: ancast group entifier Suffi s i : encode application semantics, e.g., location p a R1 p s 1 R1 p s 2 R2 p s 3 R3 Receiver (R1) Receiver (R2) 7 Receiver (R3) 10 Mobilit Host just needs to update its trigger as it moves from one subnet to another Service Composition: Initiated Use a stack of IDs to encode sequence of operations to be performed on path Advantages Don t need to configure path Load balancing and robustness eas to achieve 2 R1 Receiver (R1) T, Transcoder (T) T, T T R Receiver (R2) 8 11 Multicast Receivers insert triggers with same entifier Can dnamicall switch between multicast and unicast Service Composition: Receiver Initiated Receiver can also specif the operations to be performed on R1 1 2 R2 Receiver (R1) Receiver (R2) Firewall (F) R F,R F F F,R F,R

3 Quick Implementation Overview ID space is partitioned across infrastructure nodes Each node responsible for a region of ID space Each trigger (, R) is stored at the node responsible for Use Chord to route triggers and packets to nodes responsible for their IDs O(log N) hops Optimization: Triangular Routing Use well-known trigger for initial rendezvous Echange a pair of (private) triggers well-located Use private triggers to send traffic [2] S (S) S [30] 37 [2] R R R 2 [30] 30 R Eample Outline ID space [0..63] partitioned across five i3 nodes Each host knows one i3 node R inserts trigger (37, R); S sends packet (37, ) Overview Securit Discussion 37 (S) R 37 R (S) Optimization: Path Length /receiver caches i3 node mapping a specific ID Subsequent packets are sent via one i3 node 37 cache node R 37 R S Eavesdropping A Confluence 2 3 Attacker V 2 3 Some Attacks R Attacker (A) Victim (V) Attacker Loop Dead-End Attacker

4 Constrained Triggers h l (), h r (): well-known one-wa hash functions Use h l (), h r () to constrain trigger (, ) ID: prefi must match ke suffi Left constrained.ke = h l () Right constrained.ke = h r ().ke = h l (.ke) end-host address 19 Design Principles 1) Give hosts control on routing A trigger is like an entr in a routing table! Fleibilit, customization End-hosts can Source route Set-up acclic communication graphs Route packets through desired service points Stop flows in infrastructure 2) Implement forwarding in infrastructure Efficienc, scalabilit 22 Attacks & Defenses Design Principles (cont d) Defense Eavesdropping& Impersonation Loops & Confluences Dead-ends Attack Reflection & Malicious triggerremoval Confluences on i3 public nodes Trigger constraints Pushback Trigger challenges Public i3 node constraints Internet & Infrastructure overlas p2p & End-host overlas i3 Host Infrastructure Data plane Control plane Data plane Control plane Control plane Data plane Outline Eample: Application Specific Routing Overview Securit Discussion Network measurements Quer/repl routing info. Setup routes A Route Service (ROSE-1) ROSE-2 21 D C B 24 4

5 Conclusions Indirection ke technique to implement basic communication abstractions Multicast, Ancast, Mobilit, This research Advocates for building an efficient Indirection Laer on top of IP Eplore the implications of changing the communication abstraction; alread done in other fields Direct addressable vs. associative memories Point-to-point communication vs. Tuple space (in Distributed sstems) 25 5

Internet Indirection Infrastructure

Internet Indirection Infrastructure Motivations Internet Indirection Infrastructure Modified version of Ion Stoica s talk at ODU Nov 14, 05 Today s Internet is built around a unicast point-to-point communication abstraction: Send packet

More information

Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002

Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002 Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Motivations Today s Internet is built around a unicast pointto-point

More information

Internet Indirection Infrastructure (i3)

Internet Indirection Infrastructure (i3) Internet Indirection Infrastructure (i3) Ion Stoica UC Berkeley March 20, 2003 The Problem Indirection: a key technique in implementing many network services, e.g., Mobility Multicast, anycast Web caching,

More information

Topics in P2P Networked Systems

Topics in P2P Networked Systems 600.413 Topics in P2P Networked Systems Week 3 Applications Andreas Terzis Slides from Ion Stoica, Robert Morris 600.413 Spring 2003 1 Outline What we have covered so far First generation file-sharing

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 1 Two notes on routing algorithm Do not believe ou can understand an routing protocol, e.g.,

More information

THE original Internet architecture was designed to provide

THE original Internet architecture was designed to provide IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 2, APRIL 2004 205 Internet Indirection Infrastructure Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Fellow, IEEE, and Sonesh Surana Abstract

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks Network Architectures Jianping Pan Summer 2007 5/16/07 csc485b/586b/seng480b 1 Internet architectures Design principles store-and-forward packet switching end-to-end arguments

More information

Internet Indirection Infrastructure. Karthik Lakshminarayanan UC Berkeley

Internet Indirection Infrastructure. Karthik Lakshminarayanan UC Berkeley Internet Indirection Infrastructure Karthik Lakshminarayanan UC Berkeley Contrasting LNA, HIP, and i3 LNA = Layered Naming Architecture LNA, HIP, i3: All network architecture proposals Separate location

More information

Host Identity Indirection Infrastructure Hi 3. Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research

Host Identity Indirection Infrastructure Hi 3. Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research Host Identity Indirection Infrastructure Hi 3 Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research Presentation outline Motivation Background Secure i 3 Hi 3 Summary 2 Hi 3 motivation Question:

More information

11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions:

11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions: Chapter 5: outline 5. introduction 5.2 routing protocols link state distance vector 5.3 intra-as routing in the Internet 5.4 inter-as routing: BGP 5.5 The SDN control 5.6 ICMP: The Internet Control Message

More information

Network Layer: Control Plane 5-2

Network Layer: Control Plane 5-2 Network Laer: Control Plane EECS34 8-03-05 4- Chapter 5: network laer control plane chapter goals: understand principles behind network control plane traditional routing algorithms SDN controlllers Internet

More information

SEVERAL recent proposals have argued for giving thirdparties

SEVERAL recent proposals have argued for giving thirdparties 1 Securing User-controlled Routing Infrastructures Karthik Lakshminarayanan Daniel Adkins Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMU UC Berkeley Abstract Designing infrastructures that give untrusted

More information

Internet Indirection Infrastructure

Internet Indirection Infrastructure Internet Indirection Infrastructure Ion Stoica Daniel Adkins Shelley Zhuang Scott Shenker University of California, Berkeley istoica, dadkins, shelleyz, sonesh @cs.berkeley.edu Sonesh Surana ABSTRACT Attempts

More information

Rule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs

Rule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Rule based Forwarding (RBF): improving the Internet s flexibility and security Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Motivation Improve network s flexibility Middlebox support,

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

Rule-Based Forwarding

Rule-Based Forwarding Building Extensible Networks with Rule-Based Forwarding Lucian Popa Norbert Egi Sylvia Ratnasamy Ion Stoica UC Berkeley/ICSI Lancaster Univ. Intel Labs Berkeley UC Berkeley Making Internet forwarding flexible

More information

Chapter 4: Network Layer: Part II

Chapter 4: Network Layer: Part II 4: Network Laer Chapter 4: Network Laer: Part II (last revision 9/04/05. v3) 4. Introduction 4. Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol Datagram format

More information

Interdomain Routing Design for MobilityFirst

Interdomain Routing Design for MobilityFirst Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network

More information

IPv6 and Multicast. Outline. IPv6 Multicast. S Computer Networks - Spring 2005

IPv6 and Multicast. Outline. IPv6 Multicast. S Computer Networks - Spring 2005 IPv6 and Multicast 188lecture5.ppt Pasi Lassila 1 Outline IPv6 Multicast 2 IPv6 overview Motivation Internet growth (address space depletion and routing information eplosion) CIDR has helped but eventually

More information

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features

More information

CS 268: Computer Networking

CS 268: Computer Networking CS 268: Computer Networking L-18 Naming Overview i3 Layered naming DOA SFR 2 Multicast S 1 S 2 R RP R R R R RP: Rendezvous Point C 1 C 2 3 Mobility Sender HA FA Home Network Network 5 5.0.0.1 12.0.0.4

More information

Network Layer: Routing

Network Layer: Routing Network Laer: Routing Instructor: Anirban Mahanti Office: ICT 74 Email: mahanti@cpsc.ucalgar.ca Class Location: ICT Lectures: MWF :00 :0 hours Notes derived Computer Networking: A Top Down Approach Featuring

More information

Improved Security in IEEE Wireless LANs

Improved Security in IEEE Wireless LANs Improved Securit in IEEE 802.11 Wireless LANs FAHAD SAMAD, WAQAR MAHMOOD, ARSHAD ALI, UMAR KALIM Department of Information Technolog (NIIT) National Universit of Science & Technolog (NUST) H. # 166-A,

More information

Intra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

Intra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. Intra-AS Routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesle http://xkcd.com/85/ Some materials copright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved

More information

Computer Networks. Instructor: Niklas Carlsson

Computer Networks. Instructor: Niklas Carlsson Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived Computer Networking: A Top Down Approach, b Jim Kurose and Keith Ross, Addison-Wesle. The slides are adapted and

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure COURSE OVERVIEW This five-day instructor-led course introduces students to network and applications infrastructure concepts and configurations provided by Window Server 2008. Students will be able to acquire

More information

Mobile ad hoc networks. Sources and sinks revisited. Singleg versus multiple-hops. apps) & multimedia (voice, video); i.e., humans in the loop

Mobile ad hoc networks. Sources and sinks revisited. Singleg versus multiple-hops. apps) & multimedia (voice, video); i.e., humans in the loop Mobile ad hoc networks 2 Wireless Sensor Architecture Nodes N d ttalking lki tto each h other th Nodes talking to some node in another network (Web server on the, ee.g.) g) GENERAL PRINCIPLES AND ARCHITECTURES

More information

Opportunistic Application Flows in Sensor-based Pervasive Environments

Opportunistic Application Flows in Sensor-based Pervasive Environments Opportunistic Application Flows in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian, and Manish Parashar ICPS 2004 1 Outline Introduction to pervasive sensor-based

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Laer A note on the use of these ppt slides: The notes used in this course are substantiall based on powerpoint slides developed and coprighted b J.F. Kurose and K.W. Ross, 1996-2007 Computer

More information

Announcements. CS 5565 Network Architecture and Protocols. Count-To-Infinity. Poisoned Reverse. Distance Vector: Link Cost Changes.

Announcements. CS 5565 Network Architecture and Protocols. Count-To-Infinity. Poisoned Reverse. Distance Vector: Link Cost Changes. Announcements CS 6 Network Architecture and Protocols Lecture 20 Project 2B Part/ due Wed Apr 27 :9pm Part/2 due Wed Ma :9pm Current reading assignment: Chapter.6.7, Chapter Final Ma 0, 3:2pm, MCB 26 Godmar

More information

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

CS November 2018

CS November 2018 Distributed Systems 21. Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

Chord: A Scalable Peer-to-peer Lookup Service For Internet Applications

Chord: A Scalable Peer-to-peer Lookup Service For Internet Applications Chord: A Scalable Peer-to-peer Lookup Service For Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented by Jibin Yuan ION STOICA Professor of CS

More information

Lecture 3: Packet Forwarding

Lecture 3: Packet Forwarding Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 3 Overview Paper reviews Packet Forwarding IP Addressing Subnetting/CIDR

More information

QoS Services with Dynamic Packet State

QoS Services with Dynamic Packet State QoS Services with Dynamic Packet State Ion Stoica Carnegie Mellon University (joint work with Hui Zhang and Scott Shenker) Today s Internet Service: best-effort datagram delivery Architecture: stateless

More information

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs. T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?

More information

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network Layer. Chapter goals:

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network Layer. Chapter goals: Chapter 4 Network Laer A note on the use of these ppt slides: The notes used in this course are substantiall based on powerpoint slides developed and coprighted b J.F. Kurose and K.W. Ross, 996-7 Computer

More information

Interplay between routing, forwarding

Interplay between routing, forwarding Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Rendezvous Point Engineering

Rendezvous Point Engineering Rendezvous Point Engineering Last updated: November 2008 Introduction A Rendezvous Point (RP) is a router in a multicast network domain that acts as a shared root for a multicast shared tree. Any number

More information

Basics of communication. Grundlagen der Rechnernetze Introduction 31

Basics of communication. Grundlagen der Rechnernetze Introduction 31 Basics of communication Grundlagen der Rechnernetze Introduction 31 Types of communication H9 H8 H1 H7 R1 N3 H2 N1 R3 H3 R2 N2 H6 H5 H4 Unicast communication where a piece of information is sent from one

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-17 Naming Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained from other

More information

Protocoles et Interconnexions

Protocoles et Interconnexions Protocoles et Interconneions Course Overview and Introduction Dario Vieira Department of Computer Science EFREI Routing Protocol BGP TCP Computer Networking Preliminaries Transport Laer Network Laer Introduction

More information

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations. Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley

More information

CS November 2017

CS November 2017 Distributed Systems 21. Delivery Networks () Paul Krzyzanowski Rutgers University Fall 2017 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message

More information

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: IPv6 Initial motivation: 3-bit address space soon to be completel allocated. Additional motivation: Header format helps speed processing/forwarding Header changes to facilitate QoS (service classes) Reduction

More information

Host Identity Protocol (HIP):

Host Identity Protocol (HIP): Host Identity Protocol (HIP): Towards the Secure Mobile Internet Andrei Gurtov Helsinki Institute for Information Technology (HUT), Finland A John Wiley & Sons, Ltd, Publication Contents About the Author

More information

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination By Shelley Zhuang,Ben Zhao,Anthony Joseph, Randy Katz,John Kubiatowicz Introduction Multimedia Streaming typically involves

More information

ICS 351: Today's plan. routing protocol comparison encapsulation network dynamics multicasting in general IP multicasting IGMP PIM

ICS 351: Today's plan. routing protocol comparison encapsulation network dynamics multicasting in general IP multicasting IGMP PIM ICS 351: Today's plan routing protocol comparison encapsulation network dynamics multicasting in general IP multicasting IGMP PIM what routing is not: Ethernet switching does not use IP addresses in any

More information

End-to-end path: route

End-to-end path: route Multi-hop Wireless Netorks CMU CS 15-829: Internet-Scale Sensor Sstems Overvie: Large-Scale Wireless Sstems Small-Scale: Ho to build single-hop ireless LAN; ho to make TCP perform ell over it Large-Scale:

More information

Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises

Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises Full paper available at http://www.cs.princeton.edu/~chkim Changhoon Kim, Matthew Caesar, and Jennifer Rexford Outline of Today

More information

Naming in Distributed Systems

Naming in Distributed Systems Naming in Distributed Systems Dr. Yong Guan Department of Electrical and Computer Engineering & Information Assurance Center Iowa State University Outline for Today s Talk Overview: Names, Identifiers,

More information

Many-to-Many Communications in HyperCast

Many-to-Many Communications in HyperCast Many-to-Many Communications in HyperCast Jorg Liebeherr University of Virginia Jörg Liebeherr, 2001 HyperCast Project HyperCast is a set of protocols for large-scale overlay multicasting and peer-to-peer

More information

Fragmentation. Agenda for Today. IP Addressing and Forwarding (with some review of IP) Why do I care about fragmentation?

Fragmentation. Agenda for Today. IP Addressing and Forwarding (with some review of IP) Why do I care about fragmentation? Agenda for Today IP Addressing and Forwarding (with some review of IP) EE122 Fall 2012 Scott Shenker http//inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson

More information

IP Addressing and Forwarding (with some review of IP)

IP Addressing and Forwarding (with some review of IP) IP Addressing and Forwarding (with some review of IP) EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues

More information

On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density

On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density Presented by Wei-Cheng Xiao Advisor: David B. Johnson 2015/03/30 Wireless Network Infrastructure Mode Internet access point

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Efficient and Secure Source Authentication for Multicast

Efficient and Secure Source Authentication for Multicast Efficient and Secure Source Authentication for Multicast Authors: Adrian Perrig, Ran Canetti Dawn Song J. D. Tygar Presenter: Nikhil Negandhi CSC774 Network Security Outline: Background Problem Related

More information

Programmable Software Switches. Lecture 11, Computer Networks (198:552)

Programmable Software Switches. Lecture 11, Computer Networks (198:552) Programmable Software Switches Lecture 11, Computer Networks (198:552) Software-Defined Network (SDN) Centralized control plane Data plane Data plane Data plane Data plane Why software switching? Early

More information

Chapter IV: Network Layer

Chapter IV: Network Layer Chapter IV: Network Laer UG3 Computer Communications & Networks (COMN) Mungjin Lee mungjin.lee@ed.ac.uk Slides copright of Kurose and Ross IP addresses: how to get one? Q: How does a host get IP address?

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Peer-to-peer systems and overlay networks

Peer-to-peer systems and overlay networks Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 20: Intrusion Prevention Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Firewalls purpose types locations Network perimeter

More information

A Decentralized Content-based Aggregation Service for Pervasive Environments

A Decentralized Content-based Aggregation Service for Pervasive Environments A Decentralized Content-based Aggregation Service for Pervasive Environments Nanyan Jiang, Cristina Schmidt, Manish Parashar The Applied Software Systems Laboratory Rutgers, The State University of New

More information

9. Security. Safeguard Engine. Safeguard Engine Settings

9. Security. Safeguard Engine. Safeguard Engine Settings 9. Security Safeguard Engine Traffic Segmentation Settings Storm Control DoS Attack Prevention Settings Zone Defense Settings SSL Safeguard Engine D-Link s Safeguard Engine is a robust and innovative technology

More information

NETLMM Security Threats on the MN-AR Interface draft-kempf-netlmm-threats-00.txt

NETLMM Security Threats on the MN-AR Interface draft-kempf-netlmm-threats-00.txt Draft summary Reviewers' comments Mailing-list discussion NETLMM Security Threats on the MN-AR Interface draft-kempf-netlmm-threats-00.txt New Terminology 1 MN authentication: Initial authentication of

More information

Connecting to the Network

Connecting to the Network Connecting to the Network Networking for Home and Small Businesses Chapter 3 1 Objectives Explain the concept of networking and the benefits of networks. Explain the concept of communication protocols.

More information

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals. CS 268: Internet Architecture & E2E Arguments Scott Shenker and Ion Stoica (Fall, 2010) 1 Today s Agenda Design goals Layering (review) End-to-end arguments (review) 2 1 Internet Design Goals Goals 0 Connect

More information

Support for Notifications in CCN ( draft-ravi-ccn-notification-00.txt ) IETF/ICN-RG -93, Prague

Support for Notifications in CCN ( draft-ravi-ccn-notification-00.txt ) IETF/ICN-RG -93, Prague Support for Notifications in CCN ( draft-ravi-ccn-notification-00.txt ) IETF/ICN-RG -93, Prague Ravi Ravindran (ravi.ravindran@huawei.com) Asit Chakraborti(asit.chakraborti@huawei.com) Marc Mosko(marc.mosko@parc.com)

More information

A Technique for Improving Security in Mobile Ad-hoc Networks

A Technique for Improving Security in Mobile Ad-hoc Networks A Technique for Improving Security in Mobile Ad-hoc Networks By Ahmed Mahmoud Abdel Mo men A Master Thesis Submitted to the Faculty of Computers and Information Cairo University Information Technology

More information

Distributed Systems Multicast & Group Communication Services

Distributed Systems Multicast & Group Communication Services Distributed Systems 600.437 Multicast & Group Communication Services Department of Computer Science The Johns Hopkins University 1 Multicast & Group Communication Services Lecture 3 Guide to Reliable Distributed

More information

Systems Analysis and Design II

Systems Analysis and Design II Systems Analysis and Design II Chapter 8. Architecture Design. Dr. Tinabo Chapter 8: Outline Elements of an architecture design. Creating an architecture design. Hardware and software specification. INTRODUCTION,

More information

Listen and Whisper: Security Mechanisms for BGP

Listen and Whisper: Security Mechanisms for BGP Listen and Whisper: Security Mechanisms for BGP Lakshminarayanan Subramanian UC Berkeley Joint work with: Volker Roth, Ion Stoica, Scott Shenker, Randy Katz BGP Route Verification BGP speakers blindly

More information

CSE 461 Midterm Winter 2018

CSE 461 Midterm Winter 2018 CSE 461 Midterm Winter 2018 Your Name: UW Net ID: General Information This is a closed book/laptop examination. You have 50 minutes to answer as many questions as possible. The number in parentheses at

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Protocol Independent Multicast Join Load Balancing Release NCE0054 Modified: 2017-01-20 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089

More information

Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2017)

Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2017) Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2017) Week 10: Mutable State (1/2) March 14, 2017 Jimmy Lin David R. Cheriton School of Computer Science University of Waterloo These

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

ARP Inspection and the MAC Address Table

ARP Inspection and the MAC Address Table This chapter describes how to customize the MAC address table and configure ARP Inspection for bridge groups. About, page 1 Default Settings, page 2 Guidelines for, page 2 Configure ARP Inspection and

More information

Routing as a Service

Routing as a Service Routing as a Service Karthik Lakshminarayanan Ion Stoica Scott Shenker UC Berkeley UC Berkeley UC Berkeley and ICSI Report No. UCB/CSD-04-1327 Computer Science Division (EECS) University of California

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals. Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University

More information

Distributed Hash Tables (DHTs) OpenDHT: A Shared, Public DHT Service

Distributed Hash Tables (DHTs) OpenDHT: A Shared, Public DHT Service Distributed Hash Tables (DHTs) OpenDHT: A Shared, Public DHT Service Sean C. Rhea OASIS Retreat January 10, 2005 Joint work with Brighten Godfrey, Brad Karp, Sylvia Ratnasamy, Scott Shenker, Ion Stoica

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

Host Identity Protocol

Host Identity Protocol Presentation outline Host Identity Protocol Slides by: Pekka Nikander Ericsson Research Nomadiclab and Helsinki Institute for Information Technology http://www.hip4inter.net 2 What is HIP? Motivation HIP

More information

Request for Comments: Category: Standards Track Arastra S. Venaas UNINETT January 2008

Request for Comments: Category: Standards Track Arastra S. Venaas UNINETT January 2008 Network Working Group Request for Comments: 5059 Obsoletes: 2362 Updates: 4601 Category: Standards Track N. Bhaskar Arastra A. Gall SWITCH J. Lingard Arastra S. Venaas UNINETT January 2008 Bootstrap Router

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER Network Layer Network layer manages options pertaining to host and network addressing, managing subnetworks, and internetworking.

More information

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer Chapter 4 Network Laer A note on the use of these ppt slides: We re making these slides freel available to all (facult, students, readers). The re in PowerPoint form so ou can add, modif, and delete slides

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

Indirection. science can be solved by adding another level of indirection" -- Butler Lampson. "Every problem in computer

Indirection. science can be solved by adding another level of indirection -- Butler Lampson. Every problem in computer Indirection Indirection: rather than reference an entity directly, reference it ( indirectly ) via another entity, which in turn can or will access the original entity A x B "Every problem in computer

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

T Network Application Frameworks and XML Routing and mobility Tancred Lindholm. Based on slides by Sasu Tarkoma and Pekka Nikander

T Network Application Frameworks and XML Routing and mobility Tancred Lindholm. Based on slides by Sasu Tarkoma and Pekka Nikander T-110.5140 Network Application Frameworks and XML Routing and mobility 10.2.2009 Tancred Lindholm Based on slides by Sasu Tarkoma and Pekka Nikander Contents Background IP routing and scalability Mobility

More information

Flexible and Robust Large Scale Multicast using

Flexible and Robust Large Scale Multicast using Flexible and Robust Large Scale Multicast using Karthik Lakshminarayanan Ananth Rao Ion Stoica Scott Shenker UC Berkeley ICSI Report No. UCB/CSD087 June 00 Computer Science Division (EECS) University of

More information

Last Lecture. Network Architecture: Layers. This Lecture. In the sending host (2) In the sending host

Last Lecture. Network Architecture: Layers. This Lecture. In the sending host (2) In the sending host Chapter 7.B and 7.C Architecture: Layers Prof. Dina Katabi Last Lecture We learned how to share the network infrastructure between many connections/flows We also learned about the implications of the sharing

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link

More information