Naming. Brighten Godfrey cs598pbg Sept slides 2010 by Brighten Godfrey unless otherwise noted

Similar documents
User-Relative Names for Globally Connected Personal Devices

CS 268: Computer Networking

CE693: Adv. Computer Networking

CSE 5306 Distributed Systems

CSE 5306 Distributed Systems. Naming

Security & Privacy. Larry Rudolph. Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph

Hello everyone. My name is Kundan Singh and today I will describe a project we did at Avaya Labs.

Public-Key Infrastructure NETS E2008

Architectural Principles

Routing Architecture for the Next Generation Internet (RANGI)

ESP Egocentric Social Platform

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

Qualifying exam: operating systems, 1/6/2014

Lecture Notes 14 : Public-Key Infrastructure

ICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016)

Outline Key Management CS 239 Computer Security February 9, 2004

TWO-STEP VERIFICATION USER GUIDE

CS4450. Computer Networks: Architecture and Protocols. Lecture 13 THE Internet Protocol. Spring 2018 Rachit Agarwal

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet

Cryptography and Network Security

Interdomain Routing Design for MobilityFirst

Architectural Approaches to Multi-Homing for IPv6

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

CS 268: Computer Networking

Last Class: RPCs and RMI. Today: Communication Issues

Naming in Content-Oriented Architectures

Transport and TCP. EE122 Fall 2011 Scott Shenker

The Design Space of Network Mobility

Protection. CSE473 - Spring Professor Jaeger. CSE473 Operating Systems - Spring Professor Jaeger

CS 43: Computer Networks. 14: DHTs and CDNs October 3, 2018

CPSC 467b: Cryptography and Computer Security

IHE NA Connectathon 2018: Network

Network games. Brighten Godfrey CS 538 September slides by Brighten Godfrey unless otherwise noted

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Authenticating People and Machines over Insecure Networks

On the Internet, nobody knows you re a dog.

Unit 8 Peer-to-Peer Networking

Dissemination of Paths in Path-Aware Networks

CS November 2018

Designing for the Cloud

Internet Technology 3/2/2016

How Bad is Selfish Routing?

VXLAN Overview: Cisco Nexus 9000 Series Switches

CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1

Crypto meets Web Security: Certificates and SSL/TLS

DHT Optimizations for mobile devices. Seminar Mobile Systems Supervisor: Thomas Bocek Student: Dario Nakic

Operating Systems Design Exam 3 Review: Spring 2011

Expires: February 21, Huawei & USTC G. Wang. Huawei Technologies. August 20, 2013

Configuring your VLAN. Presented by Gregory Laffoon

Securing BGP. Geoff Huston November 2007

Routing. Architecture for the Next. Generation. Internet (RANGI) Xiaohu Xu, Dayong Guo, Raj Jain, Jianli Pan, Subharthi Paul

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

Spring 2010: CS419 Computer Security

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT

Help Me! A Consumer Product Assistance Application

Public Key Establishment

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

CSE 333 Lecture server sockets

Host Identity Indirection Infrastructure Hi 3. Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research

EE 122: IP Forwarding and Transport Protocols

Cryptography (Overview)

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Naming. To do. q What s in a name q Flat naming q Structured naming q Attribute-based naming q Next: Content distribution networks

A TLV-Structured Data Naming Scheme for Content- Oriented Networking

Lecture 7.1: Private-key Encryption. Lecture 7.1: Private-key Encryption

WAVE: A decentralised authorization system for IoT via blockchain smart contracts

A SIMPLE INTRODUCTION TO TOR

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal

殷亚凤. Naming. Distributed Systems [5]

EECS 122: Introduction to Computer Networks DNS and WWW. Internet Names & Addresses

Authentication and Key Distribution

CS 598: Advanced Internet

An Overview of the User Services Platform (USP) (Broadband Forum TR-369)

Scalable overlay Networks

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels

Authentication CHAPTER 17

Location Services. Otmar Caduff

Lecture 15 Networking Fundamentals. Today s Plan

Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

CS November 2018

Last Time. CSE 486/586 Distributed Systems Distributed Hash Tables. What We Want. Today s Question. What We Want. What We Don t Want C 1

Multi-factor Authentication Instructions

Peer-to-peer systems and overlay networks

CMSC 332 Computer Networks P2P and Sockets

Evolving Enterprise Networks with SPB-M

Internet Indirection Infrastructure

Modernizing Meetings: Delivering Intel Unite App Authentication with RFID

22 nd Century Cell Phone: The Cellular Computer. Kevin Koga, CS 465, , University of Illinois

P2PSIP, ICE, and RTCWeb

BUFFERZONE Advanced Endpoint Security

SaaS Providers. ThousandEyes for. Summary

One-Time-Password-Authenticated Key Exchange

Transcription:

Naming Brighten Godfrey cs598pbg Sept 23 2010 slides 2010 by Brighten Godfrey unless otherwise noted

Announcements Presentations are not on the assigned reading We all read it; no need to see a detailed talk on it Pick from the optional reading, or email me to suggest another paper Paper reviews are not paper summaries Keep your review to two short criticisms / comments which demonstrate that you read the paper

Layered Naming Arch. All problems in computer science can be solved by another level of indirection. Butler Lampson so... What two problems is this paper solving?

One: Services tied to hosts Today: application trying to access a service binds to an IP address Ties service to particular end-host When is this inconvenient? This coupling is unnecessary: application cares only about identifying the service it wants Solution: Name maps to service identifier (SID), independent of machine hosting service

Two: Hosts tied to location Today: transport layer trying to reach a host binds to an IP address Ties connection to physical location of end-host, and even to one interface to access that host When is this inconvenient This coupling is unnecessary: transport layer cares only about identifying the host to send to Solution: SID maps to endpoint identifier (EID), independent of host s location in network

Architecture picture user-level descriptor (ULD) lookup (e.g., e-mail address, search string, etc.) App obtains SIDs corresponding to ULD using a lookup or search service SID resolution App s session protocol (e.g., HTTP) resolves SID to EIDs using SID resolution service EID resolution Transport protocol resolves EID to IP addresses using EID resolution service IP address resolution (routing)

What s in a name? Goal: persistence So, name shouldn t encode unnecessary information e.g., organizational affiliation might change ~ Shakespeare Approves ~ What's in a name? That which we call a rose By any other name would smell as sweet. Juliet Solution: flat names: just a string of bits

Self-certifiable flat names If name is a public key or secure hash of a public key, source can verify identity of remote party Alice gives Bob a link to SID x Bob contacts x, begins conversing with party P Bob challenges P: prove you have private key associated with public key x If successful, Bob knows P is party Alice meant to contact (assuming private key not compromised) DNS solution: P sends public key x; trusted 3rd party certifies binding between x and high-level name

Resolving flat names Challenge: scalability flat means not hierarchical hierarchy is what helps DNS scale One solution: distributed hash tables Distributes hash table functionality (e.g., SID to EID mapping) across arbitrarily large We ll see how DHTs work on Nov 2

Implications of decoupling Human-readable user-level descriptor (ULD) decoupled from service ID (SID) One implication: can accommodate many ULD resolution services A possible extreme case: everyone is their own ULD resolution service i.e., ULDs have local meaning only

Personal names [Ford 06] Each person uses names that have meaning to them One name may map to different objects depending on who is resolving the name One object may have many personal names Figure 3: Groups and Ownership associated with it themselves and other friends sharing this interest.

Creating personal names Personal group: consistent names across devices Challenge: must keep view of group consistent across sporadically-connected devices Challenge: what happens if you lose your phone?

Connecting personal devices Want to refer to and connect to my phone, laptop, camera, from anywhere Why is this not possible today? Solution: Name bound to persistent self-certifying flat EID Overlay network connects devices, preferring social links as neighbors in overlay Challenge: Overlay network has no regular structure How do we locate EIDs in the overlay?

Routing in the overlay One solution: token-based flooding Fraction of Connections Successful 1 0.8 0.6 0.4 0.2 0 256 Tokens 64 Tokens 32 Tokens 16 Tokens 0 Tokens 0 20 40 60 80 100 Percent Stable Nodes Basic problem: routing on flat names. See October 5 discussion!

Take-away: 2 primitives Separation of identity and location Conflated in current Internet e.g., apps need itentity but must bind to location Self-certifying names One use of flat names that is enabled by locator/ identifier separation