Advanced Internet Architectures

Similar documents
Routing Protocols in MANET: Comparative Study

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

DTN Interworking for Future Internet Presented by Chang, Dukhyun

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Introduction to Mobile Ad hoc Networks (MANETs)

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

Introduction. Computer Networks Term B10

Part I. Wireless Communication

Wireless Ad-Hoc Networks

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Routing protocols in WSN

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

A Survey of Vehicular Ad hoc Networks Routing Protocols

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs

Opportunistic Routing Algorithms in Delay Tolerant Networks

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

An Integrated Framework for Fog Communications and Computing in Internet of Vehicles

Performance Evaluation of MANET through NS2 Simulation

Wireless Networking & Mobile Computing

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

Figure 1: Ad-Hoc routing protocols.

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

Mobile Communications. Ad-hoc and Mesh Networks

Using Low-Speed Links for High-Speed Wireless Data Delivery

Routing Protocol Approaches in Delay Tolerant Networks

WSN Routing Protocols

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

UNIVERSITY OF OSLO Department of Informatics. Dynamic Selection of Message Carriers in a Sparse and Disruptive MANET.

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza

2013, IJARCSSE All Rights Reserved Page 85

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.

A Survey of Peer-to-Peer Content Distribution Technologies

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

internet technologies and standards

Location Awareness in Ad Hoc Wireless Mobile Neworks

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September ISSN

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

MobilityFirst GSTAR: Generalized Storage Aware Routing

Location-aware In-Network Monitoring in Wireless Sensor Networks

Ad Hoc Networks: Introduction

Social-Aware Routing in Delay Tolerant Networks

T Computer Networks II Delay Tolerant Networking (DTN)

CS5984 Mobile Computing

Delay Tolerant Networks

Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Store-and-Forward Performance in a DTN

LOCATION-AIDED ROUTING PROTOCOL IN HYBRID WIRED-WIRELESS NETWORKS. WU MINTAO (B.Eng.(Hons.), NTU)

Application of Graph Theory in DTN Routing

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

Active source routing for ad-hoc network: seamless integration of wireless environment

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

Octoshape. Commercial hosting not cable to home, founded 2003

BitTorrent and CoolStreaming

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

Routing Protocols in Mobile Ad-Hoc Network

Assignment 5. Georgia Koloniari

Ad Hoc Networks: Issues and Routing

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Chapter 16. Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols. Wireless Network Models. Illustration of an ad hoc network

Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols

Peer-to-Peer Internet Applications: A Review

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

LECTURE 9. Ad hoc Networks and Routing

IEEE s ESS Mesh Networking

Protocol for Tetherless Computing

Introduction to Peer-to-Peer Networks

Performance Evaluation of Various Routing Protocols in MANET

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

Spotify Behind the Scenes

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

IJMIE Volume 2, Issue 6 ISSN:

Telematics Chapter 9: Peer-to-Peer Networks

Routing Protocols in MANETs

P2P content distribution

Cisco Group Encrypted Transport VPN

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS

Networking interview questions

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

Transcription:

Advanced Internet Architectures Carlos Borrego Iglesias Carlos.Borrego@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Tecnologies avançades d Internet. Teaching material.

p2p Wireless Networks Anonymous Networks Contents 1 A peer-to-peer architecture 2 Wireless Networks 3 Anonymous Networks Carlos Borrego Iglesias Unit 3 2 / 39

p2p Wireless Networks Anonymous Networks Architecture Applications Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks Delay And Disruption Tolerant Networks 3 Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 3 / 39

p2p Wireless Networks Anonymous Networks Architecture Applications Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks Delay And Disruption Tolerant Networks 3 Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 4 / 39

p2p Wireless Networks Anonymous Networks Architecture Applications Peer-to-peer Architecture Definition: A peer-to-peer (abbreviated to P2P) computer network is one in which each computer in the network can act as a client or server for the other computers in the network (peers). Types: Pure peer-to-peer systems: The entire network consists solely of equipotent peers. Centralized peer-to-peer systems: A central server is used for indexing functions and to bootstrap the entire system. Hybrid peer-to-peer systems: Allow such infrastructure nodes to exist, often called supernodes. Carlos Borrego Iglesias Unit 3 5 / 39

p2p Wireless Networks Anonymous Networks Architecture Applications Distributed hash table Definition: decentralized distributed hash table system. Transparency: Any participating node can efficiently retrieve the value associated with a given key. Good scalability: A change in the set of participants causes a minimal amount of disruption. Carlos Borrego Iglesias Unit 3 6 / 39

p2p Wireless Networks Anonymous Networks Architecture Applications Distributed hash table Peers form a logical ring of 2 n potential peers. Peer location in the ring is calculated using a hash function of size n (f (peer) = x/x [0 : 2 n 1]) Items (files for example), use the same hash function to be located in the ring. Peers take responsibility for 1/n of the keyspace (items located between the peer position and the position position of its next peer). Carlos Borrego Iglesias Unit 3 7 / 39

p2p Wireless Networks Anonymous Networks Architecture Applications Distributed hash table Once you add a peer to the network, it finds a place on the ring to sit between two other peers, and takes responsibility for some of the keys in its sibling peers. When uploading an item to a network, the custodian of the item informs the item responsible. Peers interested in this item will contact the item responsible to retrieve the list of peers that custody the item. Peers that retrieve bits of an item inform the item responsible. Carlos Borrego Iglesias Unit 3 8 / 39

p2p Wireless Networks Anonymous Networks Architecture Applications Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks Delay And Disruption Tolerant Networks 3 Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 9 / 39

p2p Wireless Networks Anonymous Networks Architecture Applications File sharing networks Definition: Allows users to download media files using a P2P software client that searches for other connected computers. A user creates a small torrent descriptor. They then make the file itself available through a BitTorrent node acting as a seed. Those with the torrent descriptor file can give it to their own BitTorrent nodes which, acting as peers or leechers, download it by connecting to the seed and/or other peers. The file being distributed is divided into segments called pieces. Examples: gnutella, bittorrent, G2 and the edonkey Carlos Borrego Iglesias Unit 3 10 / 39

p2p Wireless Networks Anonymous Networks Architecture Applications Other Applications Software publication and distribution: Example: Linux, several games. Streaming media: P2PTV and PDTP. Applications include TVUPlayer, Joost, CoolStreaming, Cybersky-TV, PPLive, LiveStation, Giraffic and Didiom. Spotify: Peer-to-peer network along with streaming servers to stream music to its desktop music player. Bitcoin: Peer-to-peer based digital currency. WWW Search: For example: YaCy, a free distributed search engine, built on principles of peer-to-peer networks. Skype: one of the most widely used internet phone applications is using P2P technology. Carlos Borrego Iglesias Unit 3 11 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks Delay And Disruption Tolerant Networks 3 Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 12 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks Delay And Disruption Tolerant Networks 3 Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 13 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Ad Hoc Networks Definition: A wireless ad hoc network is a decentralized type of wireless network. It does not rely on a preexisting infrastructure. Instead, each node participates in routing by forwarding data for other nodes. Carlos Borrego Iglesias Unit 3 14 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Addressing in AdHoc networks Options: Zero configuration networking Host/routers may automatically configure an interface with an IPv4 address within the 169.254/16 prefix that is valid for communication with other devices connected to the same physical (or logical) link. The address selection algorithm is based on computing a hash on the interface s MAC address. (RFC 3927). The multicast Domain Name System When an mdns client needs to resolve a host name, it broadcasts a query message that asks the host having that name to identify itself. That target machine then multicasts a message that includes its IP address. All machines in that subnet use that information to update their mdns caches. RFC 6762. Carlos Borrego Iglesias Unit 3 15 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Routing in AdHoc networks Pro-active: Maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. Examples: B.A.T.M.A.N., Optimized Link State Routing Protocol (RFC 3626). Reactive: Finds a route on demand by flooding the network with Route Request packets. Examples: Ad hoc On-demand Distance Vector(AODV) (RFC 3561), Dynamic Source Routing (RFC 4728). Hybrid (both pro-active and reactive): Combines the advantages of proactive and of reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice for one or the other method requires predetermination for typical cases. Examples: ZRP (Zone Routing Protocol). Carlos Borrego Iglesias Unit 3 16 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks Delay And Disruption Tolerant Networks 3 Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 17 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Mobile Ad Hoc Networks (MANETs) Definition: A mobile ad hoc network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. Carlos Borrego Iglesias Unit 3 18 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Types Vehicular Ad hoc Networks (VANETs): Used for communication among vehicles and between vehicles and roadside equipment Smart phone ad hoc networks (SPANs): leverage the existing hardware (primarily Bluetooth and Wi-Fi) in smart phones to create peer-to-peer networks without relying on traditional network infrastructure. SPANs differ from traditional hub and spoke networks, such as Wi-Fi Direct, in that they support multi-hop relays. Internet based mobile ad hoc networks (imanet): Ad hoc networks that link mobile nodes and fixed Internet-gateway nodes. For example, multiple sub-manets may be connected in a classic Hub-Spoke VPN to create a geographically distributed MANET. Carlos Borrego Iglesias Unit 3 19 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks Delay And Disruption Tolerant Networks 3 Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 20 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Delay-tolerant networking (DTN) Definition: Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Follow the Store-carry-and-forward paradigm: Information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station. Carlos Borrego Iglesias Unit 3 21 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Delay and Disruption Tolerant Networks (DTN) Research: DTN, opportunistic networks, challenged networks, partitioned networks... Characteristics: Intermittent connectivity, asymmetric bandwidths, long and variable latency, ambiguous mobility patterns... New applications made possible Applications: WSN, space applications, emergency scenarios, medical application in developing countries... Carlos Borrego Iglesias Unit 3 22 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Delay and Disruption Tolerant Networking Architecture RFC4838: Describes an architecture for DTN using Store-carry-and-forward. RFC5050: Describes the end-to-end protocol, block formats, an abstract service description for the exchange of messages (bundles) in DTN Carlos Borrego Iglesias Unit 3 23 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Routing in Delay and Disruption Tolerant Networks Definition: next hop decision process Complex decision due to DTN characteristics Classification: based on the number of copies, geographical, probabilistic, epidemic... Routing code is located in the intermediate nodes Lack of proposals for scenarios with different applications with different routing needs Carlos Borrego Iglesias Unit 3 24 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Epidemic Routing Epidemic routing is flooding-based in nature, as nodes continuously replicate and transmit messages to newly discovered contacts that do not already possess a copy of the message. Carlos Borrego Iglesias Unit 3 25 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Spray And Wait Routing When a new message is created in the system, a number L is attached to that message indicating the maximum allowable copies of the message in the network. During the spray phase, the source of the message is responsible for "spraying", or delivery, one copy to L distinct "relays". When a relay receives the copy it simply holds the message until the destination is encountered directly (wait phase). Carlos Borrego Iglesias Unit 3 26 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Probabilistic Routing Protocol (Prophet Routing) The Probabilistic Routing Protocol maintains a set of probabilities for successful delivery to known destinations in the DTN. It replicates messages during opportunistic encounters only if the Mule that does not have the message appears to have a better chance of delivering it. Carlos Borrego Iglesias Unit 3 27 / 39

p2p Wireless Networks Anonymous Networks Ad Hoc Networks Mobile Ad Hoc Networks DTN Probabilistic Routing Protocol (Prophet Routing) When M encounters E, the predictability for E is increased: P(M, E)new = P(M, E)old + (1 P(M, E)old) L encounter L encounter is an initialisation constant. The predictabilities for all destinations D other than E are aged : P(M, D)new = P(M, D)old γ K γ is the aging constant and K is the number of time units that has elapsed since the last aging. Predictabilities are exchanged between M and E and the transitive property of predictability is used to update the predictability of destinations D for which E has a P(E,D) value on the assumption that M is likely to meet E again: P(M, D)new = P(M, D)old + (1 P(M, D)old) P(M, E) P(E, D) β β is a scaling constant. Carlos Borrego Iglesias Unit 3 28 / 39

p2p Wireless Networks Anonymous Networks TOR protocol TOR Hidden Services Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks Delay And Disruption Tolerant Networks 3 Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 29 / 39

p2p Wireless Networks Anonymous Networks TOR protocol TOR Hidden Services Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks Delay And Disruption Tolerant Networks 3 Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 30 / 39

p2p Wireless Networks Anonymous Networks TOR protocol TOR Hidden Services TOR, the Onion Router Definition: System intended to enable online anonymity. Onion Routing refers to the layered nature of the encryption service: The original data are encrypted and re-encrypted multiple times, then sent through successive Tor relays, each one of which decrypts a l. layer"of encryption before passing the data on to the next relay and, ultimately, its destination. Carlos Borrego Iglesias Unit 3 31 / 39

p2p Wireless Networks Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 32 / 39

p2p Wireless Networks Anonymous Networks TOR protocol TOR Hidden Services Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks Delay And Disruption Tolerant Networks 3 Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 33 / 39

p2p Wireless Networks Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 34 / 39

p2p Wireless Networks Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 35 / 39

p2p Wireless Networks Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 36 / 39

p2p Wireless Networks Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 37 / 39

p2p Wireless Networks Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 38 / 39

p2p Wireless Networks Anonymous Networks TOR protocol TOR Hidden Services Carlos Borrego Iglesias Unit 3 39 / 39