Addressing in Future Internet: Problems, Issues, and Approaches

Similar documents
Isilon InsightIQ. Version 2.5. User Guide

Distributed Systems Security. Authentication Practice - 2. Prof. Steve Wilbur

TAKING THE PULSE OF ICT IN HEALTHCARE

Secure Biometric-Based Authentication for Cloud Computing

Lecture 11: IPv6. CSE 123: Computer Networks Alex C. Snoeren. HW 2 due FRIDAY

Lecture 13: Traffic Engineering

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Tdb: A Source-level Debugger for Dynamically Translated Programs

LDAP Configuration Guide

Networks An introduction to microcomputer networking concepts

IPv4 Exhaus,on And IPv6 Deployment. Carlos Internet Week

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Lecture 10: Addressing

VirtuOS: an operating system with kernel virtualization

Multi-lingual Multi-media Information Retrieval System

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03

5 Performance Evaluation

Master for Co-Simulation Using FMI

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution

Features. ICMS Integrated Corrosion Management System

Evaluating Influence Diagrams

ICMS3 Integrated Corrosion Management System

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Content Content Introduction

AUTOSAR System and Software Design with PREEvision

Workshop. Improving the Bus Network

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA

Lecture 7: Data Center Networks

BIS - Basic Package V4.6

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

CS 153 Design of Operating Systems Spring 18

Resolving Linkage Anomalies in Extracted Software System Models

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

dss-ip Manual digitalstrom Server-IP Operation & Settings

IoT-Cloud Service Optimization in Next Generation Smart Environments

Access Professional Edition 2.1

BIS - Basic package V4.3

BIS - Basic Package V4.4

AN A. GPON Optical Network Terminal. Product Manual. Version: A/1. FiberHome Telecommunication Technologies Co., Ltd.

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

Switched state-feedback controllers with multi-estimators for MIMO systems

CS 153 Design of Operating Systems Spring 18

CAN FD. An Introduction V

EMC AppSync. User Guide. Version REV 01

DPDK s Best Kept Secret: Micro-benchmarks. M Jay DPDK Summit - San Jose 2017

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization

rte_security: enabling IPsec hw acceleration

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks

MultiView: Improving Trust in Group Video Conferencing Through Spatial Faithfulness David T. Nguyen, John F. Canny

Nortel DECT Handset 4025 User Guide

Overview of Security Support in Vector Tools

Putting the dynamic into software security testing

BIS - Basic package V4.2

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

The single-cycle design from last time

CS 153 Design of Operating Systems Spring 18

Chapter 4: Network Layer

Naming and addressing in Future Internet

Local Run Manager. Software Reference Guide for MiSeqDx

L EGAL NOTICES. ScanSoft, Inc. 9 Centennial Drive Peabody, MA 01960, United States of America

Lecture 14: Congestion Control

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

Doctor Web. All rights reserved

On the Existence of Subliminal Channel in Instant Messaging Systems

Understanding BGP Misconfiguration

Constructing Multiple Light Multicast Trees in WDM Optical Networks

CS 4204 Computer Graphics

CS 153 Design of Operating Systems Spring 18

BIS Software Maintenance Agreements (SMA)

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems

Efficient Two-Pass Anonymous Identity Authentication Using Smart Card

Comparison of memory write policies for NoC based Multicore Cache Coherent Systems

LWIP and Wi-Fi Boost Flow Control

CS 153 Design of Operating Systems Spring 18

Curves and Surfaces. CS 537 Interactive Computer Graphics Prof. David E. Breen Department of Computer Science

LISP Locator/ID Separation Protocol

Membership Library in DPDK Sameh Gobriel & Charlie Tai - Intel DPDK US Summit - San Jose

A Recovery Algorithm for Reliable Multicasting in Reliable Networks

Computer-Aided Mechanical Design Using Configuration Spaces

Unit Testing with VectorCAST and AUTOSAR

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

Enhanced Memory Management

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks

NBE-4502-ALAR Bullet 2MP mm auto IP67 IK10

Inter-Autonomous-System Routing: Border Gateway Protocol

EMPOWERING SCIENTIFIC DISCOVERY BY DISTRIBUTED DATA MINING ON A GRID INFRASTRUCTURE

Datawell Waverider Transmission Protocol

Advances in Environmental Biology

CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu.

Compound Catadioptric Stereo Sensor for Omnidirectional Object Detection

AUTOSAR Diagnostic Extract

CAPL Scripting Quickstart

Transcription:

Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19 Jne, 2008 Jaeyong Choi (jychoi@mmlab.sn.ac.kr)

Contents Introdction Problems of crrent Internet Addressing - Semantic overloading of IP address - Roting scalability Big pictre of addressing architectre - Identifier / Locator split - Rote-by-name paradigm Research isses in addressing Conclsion 2 / 15

Introdction Challenges of crrent Internet - Name space shortage - Mobile endpoints growth - Break of End-to-End paradigm Peer-to-Peer applications NATs and ALGs - Malicios traffic -... Crrent Internet is not designed for commercial se - Hard to provide QoS - No mechanisms for acconting or athentication - Weak for network management -... Time to rethink abot the fndamental design of Internet! 3 / 15

Semantic overloading of IP address Semantic overloading of IP address - A means of niqely identifying a device interface that is attached to a network Endpoint identifier - A means of identifying where a device is located within a network Location identifier - A lookp key into a forwarding table to make local switching decisions Forwarding identifier à Case mobility, mlti-homing, and roting scalability problems 4 / 15

Roting Scalability Increasing rate of naggregatable roting entries is so fast that the development speed of high-end hardware for core roters will not meet the reqirements... - IETF IAB workshop on roting and addressing, 2007 Hierarchical aggregation is broken - Provider-Independent addressing Sites want to be able to change providers withot renmbering - Site Mlti-homing Even if PI addressing is not sed, mlti-homing injects more-specific rotes from one provider to another which the entire global roting table mst then carry - Traffic Engineering Providers inject more-specific rotes to inflence the behavior of the roting system, in order to control varios traffic patterns http://bgp.potaroo.net/ 5 / 15

Contents Introdction Problems of crrent Internet Addressing - Semantic overloading of IP address - Roting scalability - Secrity Big pictre of addressing architectre - Identifier / Locator split - Rote-by-name paradigm Research isses in addressing Conclsion 6 / 15

Identifier / Locator split [1/1] Let s decople the overloaded semantic of address - can prevent the architectral limitations abot mobility, mltihoming, roting scalability Details of id / loc split shold be investigated - Namespace of identifier and locator - Mapping fnction (Resoltion) - Incentive strctre - Fnctionalities per each layer Resoltion System ULP Transport Identity IP Connect to server.apnic.net Connect to id:3789323094 id:3789323094 ó 2001:360::1 Packet to 2001:360::1 7 / 15 ULP Transport Identity IP

Identifier / Locator split [2/2] Candidates for identifier - Coexist? Candidates for locator - Competing? Resoltion - After split, the resoltion between id and loc will be more dynamic becase of mobility - Cold the crrent DNS meet the reqirements??? 8 / 15

Rote-by-name Paradigm Resoltion between identifier and locator Resoltion Models - Lookp-by-name maintain a distribted database to response a qery to find a locator DNS - Rote-by-name find a locator with name while roting DONA (TRIAD) Resoltion based on rote-byname approach can be more appropriate for Ftre Internet Lookp-by-name Lookp-byname Rote-byname Rote-by-name Extensibility Bad Good Roting Efficiency Good Poor Robstness Poor (single POF) Good 9 / 15

Contents Introdction Problems of crrent Internet Addressing - Semantic overloading of IP address - Roting scalability - Secrity Big pictre of addressing architectre - Identifier / Locator split - Rote-by-name paradigm Research isses in addressing Conclsion 10 / 15

Content-oriented Network [1/2] Crrent addressing of Internet is Host-centric - designed to identify Hosts Crrent sage of Internet is Data-centric - Overwhelming se of today s networks is for a machine to acqire named chnks of data 2000 2004 The Internet is Flat, Don Towsley, Keynote Speech of Infocomm 2007 11 / 15

Content-oriented network [2/2] Content-oriented network - A network whose messages are driven by the content of the messages, rather than by explicit addresses assigned by senders Basic identifying elements for commnication - Crrent Internet Sender Hosts Receive Hosts - Content-based Network Content of data (Providers pblishing the content) Content-oriented Networking as a Ftre Internet Infrastrctre: Concepts, Strengths, and Application scenarios - Technical session 7: Data Oriented Architectre, 6/20 12 / 15

Location-based addressing Use Geographical information for the locator Pros Cons - Example of locator (Longitde, Latitde, Attitde from sea level) (Horizontal / Vertical distance from a reference point, Attitde) - Can resolve the roting scalability problem with greedy roting - Hard to spport policy-based roting (BGP) - Dead end problem can be severe in wired network Inter-AS roting Intra-AS roting AS nmber Geographical information Random part 13 / 15

Access network integration Emerging access network - Sensor Network, DTN, Vehiclar Network, WPAN, RFID,... How to integrate these networks into Ftre Internet? - Is global address needed for emerging network? Each network has its own reqirements - Possible scenarios Absorption into the Ftre Internet Interworking throgh the Gateways DTN EPC Network - RFID Mesh Network PSTN Ftre Internet 3G, 4G Network Celllar Network Home Network Sensor Network 14 / 15

Conclsion Addressing research for Ftre Internet are needed - Roting Scalability - Meeting the new reqirements Addressing research is not standalone! - Addressing research shold be proceeded with related researches Content-based Network (Data-oriented Network) Resoltion architectre spporting mobility (nder id/loc split) Semantic-aware service architectre Secrity mechanisms 15 / 15

Thank yo 16 / 15