15-849: hot topics in networking data oriented architectures
DESCRIPTION
15-849: Hot Topics in Networking Data Oriented Architectures. Srinivasan Seshan. Historical Perspective. First introduced in sensor networks Don’t care about the nodes, only care about the data Directed diffusion TAG (tiny aggregation) - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/1.jpg)
15-849: Hot Topics in Networking
Data Oriented Architectures
Srinivasan Seshan
1
![Page 2: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/2.jpg)
Historical Perspective
• First introduced in sensor networks• Don’t care about the nodes, only care about
the data• Directed diffusion• TAG (tiny aggregation)• These approaches provided better
interface and were far more energy efficient
2
![Page 3: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/3.jpg)
Different Solutions
• Sensor networks• P2P and CDN
• Akamai• BitTorrent
• DOT• DONA• RE• CCN 3
![Page 4: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/4.jpg)
Key Questions
• Each of the papers introduce some form of optimization for content delivery - what are your thoughts on adding static content exchange optimizations to the network?
• Each of the papers solves this at a different layer of the protocol stack• can these happily coexist?• where is the right place to solve this?
• Granularity and naming - consider some of the different ways that the proposals "name" data. What are some of the tradeoffs between the different naming schemes (e.g., in the properties of the name and the granularity at which they name content) 4
![Page 5: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/5.jpg)
Do we need it?
• Integrates storage with links into abstraction
5
![Page 6: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/6.jpg)
ISP
ISP
What does the network look like…
6
![Page 7: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/7.jpg)
ISP
ISP
What should the network look like…
7
![Page 8: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/8.jpg)
Interoperability: New Tradeoffs
Data Link
Physical
Applications
The Hourglass Model
‘Thin Waist’
Limits
Application Innovation
Increases Data Delivery Flexibility
UDP TCP
Data Link
Physical
Applications
The Hourglass Model
InnovationFlexibility
Network (IP/Other)
Moving up theTransport
(TCP/Other)
8
![Page 9: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/9.jpg)
Interoperability: Datagrams vs. Data Blocks Datagrams Data Blocks
What must be standardized?
IP Addresses
NameAddress translation (DNS)
Data Labels
Name Label translation (Google?)
Application Support
Exposes much of underlying network’s capability
Practice has shown that this is what applications need
Lower Layer Support
Supports arbitrary links
Requires end-to-end connectivity
Supports arbitrary links
Supports arbitrary transport
Support storage (both in-network and for transport)
9
![Page 10: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/10.jpg)
Do we need it?
• Integrates storage with links into abstraction
• Raises new issues in resource allocation• Think… congestion control, net neutrality, QoS,
etc.• What about computation? Should the
interface incorporate that as well?
10
![Page 11: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/11.jpg)
What layer?
• Can these happily coexist?• In general, higher layer schemes reduce lower layer solution
efficiency• Some approaches have different motivations (e.g. CDN for
publisher driver approach) • Hit counting, DRM, access rights – where does all this fit in?
• Where is the right place to solve this? • Source of redundancy• What information needed to make intelligent choices
• Network topology, payment, access rights, privacy, • Where is complexity/overhead added• Ease of identifying same content• Early vs. late binding
11
![Page 12: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/12.jpg)
Granularity and Naming
• Files vs. chunks vs. packets vs. data ranges/“micro”chunks• What type of similarity to catch• Dangers of too big• Overheads of too small• Rabin vs. ALF vs. fixed size
• Naming• Content-based (i.e. MD5(data))• Pub-key based• URL• XML• Human-readable, identical content from multiple sources, links
to publisher, structure, efficient lookup 12
![Page 13: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/13.jpg)
Other Applications
• How do other usage patterns fit into this picture?
13
![Page 14: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/14.jpg)
Outline
• DOT/DONA
• CCN
• DTNs
14
![Page 15: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/15.jpg)
Data-Oriented Networking Overview• In the beginning...
– First applications strictly focused on host-to-host interprocess communication:
• Remote login, file transfer, ...– Internet was built around this host-to-host model.– Architecture is well-suited for communication between
pairs of stationary hosts.• ... while today
– Vast majority of Internet usage is data retrieval and service access.
– Users care about the content and are oblivious to location. They are often oblivious as to delivery time:
• Fetching headlines from CNN, videos from YouTube, TV from Tivo
• Accessing a bank account at “www.bank.com”. 15
![Page 16: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/16.jpg)
To the beginning...
• What if you could re-architect the way “bulk” data transfer applications worked• HTTP• FTP• Email• etc.
• ... knowing what we know now?
16
![Page 17: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/17.jpg)
Innovation in Data Transfer is Hard
• Imagine: You have a novel data transfer technique• How do you deploy?
• Update HTTP. Talk to IETF. Modify Apache, IIS, Firefox, Netscape, Opera, IE, Lynx, Wget, …
• Update SMTP. Talk to IETF. Modify Sendmail, Postfix, Outlook…• Give up in frustration
17
![Page 18: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/18.jpg)
18
Multi-path
USBUSB Xfer
Data-Oriented Network Design
NET( DSL )
XferNET
NETwireless
SENDER
RECEIVER
Internet
Store-carry-forward Multipath and Mirror supportNET
CACHE
XferFeatures
![Page 19: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/19.jpg)
New Approach: Adding to the Protocol Stack
19
Transport
Network
Data Link
Physical
Router
Bridge
Internet Protocol Layers
ALGMiddlewareApplication
Software-defined radio
Object Exchange
Data Transfer
![Page 20: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/20.jpg)
Data Transfer Service
• Transfer Service responsible for finding/transferring data• Transfer Service is shared by applications
• How are users, hosts, services, and data named?• How is data secured and delivered reliably?• How are legacy systems incorporated?
20
Application ProtocolSender Receiver
Xfer Service Xfer Service
and Data
Data
![Page 21: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/21.jpg)
Naming Data (DOT)• Application defined names are not portable• Use content-naming for globally unique names• Objects represented by an OID
• Objects are further sub-divided into “chunks”
• Secure and scalable!21
File
Desc3
Foo.txt OID
Cryptographic Hash
Desc1Desc2
![Page 22: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/22.jpg)
Similar Files: Rabin Fingerprinting
22
4 7 8 2 8
File Data
Rabin Fingerprints
Given Value - 8Natural Boundary Natural Boundary
Hash 1 Hash 2
![Page 23: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/23.jpg)
Naming Data (DOT)
• All objects are named based only on their data• Objects are divided into chunks based only on
their data
• Object “A” is named the same• Regardless of who sends it• Regardless of what application deals with it
• Similar parts of different objects likely to be named the same• e.g., PPT slides v1, PPT slides v1 + extra slides• First chunks of these objects are same 23
![Page 24: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/24.jpg)
Naming Data (DONA)
• Names organized around principals. • Names are of the form P : L.
• P is cryptographic hash of principal’s public key, and
• L is a unique label chosen by the principal. • Granularity of naming left up to
principals.• Names are “flat”.
24
![Page 25: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/25.jpg)
Self-certifying Names
• A piece of data comes with a public key and a signature.
• Client can verify the data did come from the principal by• Checking the public key hashes into P, and • Validating that the signature corresponds
to the public key.• Challenge is to resolve the flat names
into a location. 25
![Page 26: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/26.jpg)
Xfer ServiceXfer Service
Sender Receiver
Locating Data (DOT)Request File X
OID, Hints
put(X) OID, Hints get(OID, Hints) read() data
TransferPlugins
26
![Page 27: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/27.jpg)
Name Resolution (DONA)
• Resolution infrastructure consists of Resolution Handlers.• Each domain will have one logical RH.
• Two primitives FIND(P:L) and REGISTER(P:L).• FIND(P:L) locates the object named P:L.• REGISTER messages set up the state
necessary for the RHs to route FINDs effectively. 27
![Page 28: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/28.jpg)
Locating Data (DONA)
28
REGISTER stateFIND being routed
![Page 29: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/29.jpg)
Establishing REGISTER state
• Any machine authorized to serve a datum or service with name P:L sends a REGISTER(P:L) to its first-hop RH
• RHs maintain a registration table that maps a name to both next-hop RH and distance (in some metric)
• REGISTERs are forwarded according to interdomain policies.• REGISTERs from customers to both peers and
providers.• REGISTERs from peers optionally to providers/peers.
29
![Page 30: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/30.jpg)
Forwarding FIND(P:L)
• When FIND(P:L) arrives to a RH:• If there’s an entry in the registration table,
the FIND is sent to the next-hop RH.• If there’s no entry, the RH forwards the
FIND towards to its provider.• In case of multiple equal choices, the
RH uses its local policy to choose among them.
30
![Page 31: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/31.jpg)
Interoperability: New Tradeoffs
Data Link
Physical
Applications
The Hourglass Model
‘Thin Waist’
Limits
Application Innovation
Increases Data Delivery Flexibility
UDP TCP
Data Link
Physical
Applications
The Hourglass Model
InnovationFlexibility
Network (IP/Other)
Moving up theTransport
(TCP/Other)
31
![Page 32: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/32.jpg)
Interoperability: Datagrams vs. Data Blocks Datagrams Data Blocks
What must be standardized?
IP Addresses
NameAddress translation (DNS)
Data Labels
Name Label translation (Google?)
Application Support
Exposes much of underlying network’s capability
Practice has shown that this is what applications need
Lower Layer Support
Supports arbitrary links
Requires end-to-end connectivity
Supports arbitrary links
Supports arbitrary transport
Support storage (both in-network and for transport)
32
![Page 33: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/33.jpg)
Outline
• DOT/DONA
• CCN
• DTNs
33
![Page 34: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/34.jpg)
Biggest content source
Third largest ISP
source: ‘ATLAS’ Internet Observatory 2009 Annual Report’, C. Labovitz et.al.
Level(3) GoogleGlobalCrossing
Google…
34
![Page 35: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/35.jpg)
1995 - 2007:Textbook Internet
2009:Rise of theHyper Giants
source: ‘ATLAS’ Internet Observatory 2009 Annual Report’, C. Labovitz et.al.
35
![Page 36: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/36.jpg)
ISP
ISP
What does the network look like…
36
![Page 37: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/37.jpg)
ISP
ISP
What should the network look like…
37
![Page 38: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/38.jpg)
CCN Model
• Packets say ‘what’ not ‘who’ (no src or dst)• communication is to local peer(s)• upstream performance is measurable• memory makes loops impossible
Data
38
![Page 39: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/39.jpg)
Context Awareness?
• Like IP, CCN imposes no semantics on names.
• ‘Meaning’ comes from application, institution and global conventions:
/parc.com/people/van/presentations/CCN /parc.com/people/van/calendar/freeTimeForMeeting /thisRoom/projector /thisMeeting/documents /nearBy/available/parking /thisHouse/demandReduction/2KW
39
![Page 40: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/40.jpg)
Signed by nytimes.com/web/george
⎧ ⎪ ⎨ ⎪ ⎩
CCN Names/Security/nytimes.com/web/frontPage/v20100415/s0/0x3fdc96a4...
⎧ ⎪ ⎨ ⎪ ⎩Signed by nytimes.com/web
0x1b048347signature
key
nytimes.com/web/george/desktop public key
⎧ ⎪ ⎨ ⎪ ⎩Signed by nytimes.com
• Per-packet signatures using public key• Packet also contain link to public key
40
![Page 41: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/41.jpg)
Names Route Interests
• FIB lookups are longest match (like IP prefix lookups) which helps guarantee log(n) state scaling for globally accessible data.
• Although CCN names are longer than IP identifiers, their explicit structure allows lookups as efficient as IP’s.
• Since nothing can loop, state can be approximate (e.g., bloom filters). 41
![Page 42: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/42.jpg)
CCN node model
42
![Page 43: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/43.jpg)
CCN node model
get /parc.com/videos/WidgetA.mpg/v3/s2
/parc.com/videos/WidgetA.mpg/v3/s2 0P
43
![Page 44: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/44.jpg)
Flow/Congestion Control
• One Interest pkt one data packet
• All xfers are done hop-by-hop – so no need for congestion control
• Sequence numbers are part of the name space
44
![Page 45: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/45.jpg)
What about connections/VoIP?
• Key challenge - rendezvous• Need to support requesting ability to
request content that has not yet been published
• E.g., route request to potential publishers, and have them create the desired content in response
45
![Page 46: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/46.jpg)
46
![Page 47: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/47.jpg)
Outline
• DOT/DONA
• CCN
• DTNs
47
![Page 48: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/48.jpg)
Unstated Internet Assumptions
• Some path exists between endpoints• Routing finds (single) “best” existing route
• E2E RTT is not very large• Max of few seconds• Window-based flow/cong ctl. work well
• E2E reliability works well• Requires low loss rates
• Packets are the right abstraction• Routers don’t modify packets much• Basic IP processing
48
![Page 49: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/49.jpg)
New Challenges
• Very large E2E delay• Propagation delay = seconds to minutes• Disconnected situations can make delay
worse• Intermittent and scheduled links
• Disconnection may not be due to failure (e.g. LEO satellite)
• Retransmission may be expensive• Many specialized networks won’t/can’t
run IP 49
![Page 50: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/50.jpg)
50
IP Not Always a Good Fit
• Networks with very small frames, that are connection-oriented, or have very poor reliability do not match IP very well• Sensor nets, ATM, ISDN, wireless, etc
• IP Basic header – 20 bytes• Bigger with IPv6
• Fragmentation function:• Round to nearest 8 byte boundary• Whole datagram lost if any fragment lost• Fragments time-out if not delivered (sort of) quickly
![Page 51: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/51.jpg)
IP Routing May Not Work
• End-to-end path may not exist• Lack of many redundant links [there are exceptions]• Path may not be discoverable [e.g. fast oscillations]• Traditional routing assumes at least one path exists,
fails otherwise• Insufficient resources
• Routing table size in sensor networks• Topology discovery dominates capacity
• Routing algorithm solves wrong problem• Wireless broadcast media is not an edge in a graph• Objective function does not match requirements
• Different traffic types wish to optimize different criteria• Physical properties may be relevant (e.g. power)
51
![Page 52: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/52.jpg)
52
What about TCP?
• Reliable in-order delivery streams• Delay sensitive [6 timers]:
• connection establishment, retransmit, persist, delayed-ACK, FIN-WAIT, (keep-alive)
• Three control loops:• Flow and congestion control, loss recovery
• Requires duplex-capable environment• Connection establishment and tear-down
![Page 53: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/53.jpg)
53
Performance Enhancing Proxies
• Perhaps the bad links can be ‘patched up’• If so, then TCP/IP might run ok• Use a specialized middle-box (PEP)
• Types of PEPs [RFC3135]• Layers: mostly transport or application• Distribution• Symmetry• Transparency
![Page 54: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/54.jpg)
54
TCP PEPs
• Modify the ACK stream• Smooth/pace ACKS avoids TCP bursts• Drop ACKs avoids congesting return
channel• Local ACKs go faster, goodbye e2e
reliability• Local retransmission (snoop)• Fabricate zero-window during short-term
disruption• Manipulate the data stream
• Compression, tunneling, prioritization
![Page 55: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/55.jpg)
Architecture Implications of PEPs
• End-to-end “ness”• Many PEPs move the ‘final decision’ to the PEP
rather than the endpoint• May break e2e argument [may be ok]
• Security• Tunneling may render PEP useless• Can give PEP your key, but do you really want to?
• Fate Sharing• Now the PEP is a critical component
• Failure diagnostics are difficult to interpret 55
![Page 56: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/56.jpg)
Architecture Implications of PEPs [2]• Routing asymmetry
• Stateful PEPs generally require symmetry• Spacers and ACK killers don’t
• Mobility• Correctness depends on type of state• (similar to routing asymmetry issue)
56
![Page 57: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/57.jpg)
Delay-Tolerant Networking Architecture• Goals
• Support interoperability across ‘radically heterogeneous’ networks
• Tolerate delay and disruption• Acceptable performance in high
loss/delay/error/disconnected environments• Decent performance for low loss/delay/errors
• Components• Flexible naming scheme • Message abstraction and API• Extensible Store-and-Forward Overlay
Routing• Per-(overlay)-hop reliability and authentication
57
![Page 58: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/58.jpg)
Disruption Tolerant Networks
58
![Page 59: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/59.jpg)
Disruption Tolerant Networks
59
![Page 60: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/60.jpg)
Naming Data (DTN)
• Endpoint IDs are processed as names• refer to one or more DTN nodes• expressed as Internet URI, matched as strings
• URIs• Internet standard naming scheme [RFC3986]• Format: <scheme> : <SSP>
• SSP can be arbitrary, based on (various) schemes
• More flexible than DOT/DONA design but less secure/scalable 60
![Page 61: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/61.jpg)
62
Message Abstraction
• Network protocol data unit: bundles• “postal-like” message delivery• coarse-grained CoS [4 classes]• origination and useful life time [assumes sync’d clocks]• source, destination, and respond-to EIDs• Options: return receipt, “traceroute”-like function,
alternative reply-to field, custody transfer• fragmentation capability• overlay atop TCP/IP or other (link) layers [layer ‘agnostic’]
• Applications send/receive messages• “Application data units” (ADUs) of possibly-large size• Adaptation to underlying protocols via ‘convergence layer’• API includes persistent registrations
![Page 62: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/62.jpg)
DTN Routing• DTN Routers form an overlay network
• only selected/configured nodes participate• nodes have persistent storage
• DTN routing topology is a time-varying multigraph• Links come and go, sometimes predictably• Use any/all links that can possibly help (multi)• Scheduled, Predicted, or Unscheduled Links
• May be direction specific [e.g. ISP dialup]• May learn from history to predict schedule
• Messages fragmented based on dynamics• Proactive fragmentation: optimize contact volume• Reactive fragmentation: resume where you failed
63
![Page 63: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/63.jpg)
Example Routing Problem
64Village
Internet
City
bike
2
3 1
![Page 64: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/64.jpg)
Example Graph Abstraction
65
time (days)bike (data mule) intermittent high capacityGeo satellite medium/low capacitydial-up link low capacity
City
Village 1
Village 2
Connectivity: Village 1 – City
band
wid
th
bikesatellitephone
![Page 65: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/65.jpg)
The DTN Routing Problem• Inputs: topology (multi)graph, vertex buffer limits,
contact set, message demand matrix (w/priorities)
• An edge is a possible opportunity to communicate:• One-way: (S, D, c(t), d(t))• (S, D): source/destination ordered pair of contact• c(t): capacity (rate); d(t): delay• A Contact is when c(t) > 0 for some period [ik,ik+1]
• Vertices have buffer limits; edges in graph if ever in any contact, multigraph for multiple physical connections
• Problem: optimize some metric of delivery on this structure• Sub-questions: what metric to optimize?, efficiency? 66
![Page 66: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/66.jpg)
Knowledge-Performance Tradeoff
67Use of Knowledge Oracles
Perf
orm
ance
Contacts+
Queuing+
Traffic
ContactsSummary
Contacts
Contacts+
Queuing(local)
Contacts+
Queuing(global)
None
Algorithm
LP
MEDED
EDLQ
EDAQ
Higher performance, higher complexity
Oracle
FC
![Page 67: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/67.jpg)
Knowledge-Performance Tradeoff
68
![Page 68: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/68.jpg)
Routing Solutions - Replication
• “Intelligently” distribute identical data copies to contacts to increase chances of delivery• Flooding (unlimited contacts)• Heuristics: random forwarding, history-based forwarding,
predication-based forwarding, etc. (limited contacts)
• Given “replication budget”, this is difficult• Using simple replication, only finite number of copies in
the network [Juang02, Grossglauser02, Jain04, Chaintreau05]
• Routing performance (delivery rate, latency, etc.) heavily dependent on “deliverability” of these contacts (or predictability of heuristics)
• No single heuristic works for all scenarios!69
![Page 69: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/69.jpg)
Using Erasure Codes
• Rather than seeking particular “good” contacts, “split” messages and distribute to more contacts to increase chance of delivery• Same number of bytes flowing in the network, now
in the form of coded blocks• Partial data arrival can be used to reconstruct the
original message• Given a replication factor of r, (in theory) any 1/r code
blocks received can be used to reconstruct original data• Potentially leverage more contacts opportunity that
result in lowest worse-case latency• Intuition:
• Reduces “risk” due to outlier bad contacts70
![Page 70: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/70.jpg)
Erasure Codes
71
Message n blocks
Encoding
Opportunistic Forwarding
Decoding
Message n blocks
![Page 71: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/71.jpg)
DTN Security
• Payload Security Header (PSH) end-to-end security header
• Bundle Authentication Header (BAH) hop-by-hop security header 72
Bundle Agent
Bundle Application
Security Policy Router(may check PSH value)
Source
BAH
PSH
Sender Receiver/Sender
Receiver/Sender
Receiver/Sender
Destination
BAH BAH BAH
credit: MITRE
![Page 72: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/72.jpg)
So, is this just e-mail?
• Many similarities to (abstract) e-mail service• Primary difference involves routing, reliability and
security• E-mail depends on an underlying layer’s routing:
• Cannot generally move messages ‘closer’ to their destinations in a partitioned network
• In the Internet (SMTP) case, not disconnection-tolerant or efficient for long RTTs due to “chattiness”
• E-mail security authenticates only user-to-user 73
naming/ routing flow multi- security reliable prioritylate binding contrl app delivery
e-mail Y N (static) N(Y) N(Y) opt Y N(Y)DTN Y Y (exten) Y Y opt opt Y
![Page 73: 15-849: Hot Topics in Networking Data Oriented Architectures](https://reader033.vdocuments.net/reader033/viewer/2022051821/56816345550346895dd3d51a/html5/thumbnails/73.jpg)
“But ...
• “this doesn’t handle conversations or realtime.• Yes it does - see ReArch VoCCN paper.
• “this is just Google.• This is IP-for-content. We don’t search for
data, we route to it.• “this will never scale.
• Hierarchically structured names give same log(n) scaling as IP but CCN tables can be much smaller since multi-source model allows inexact state (e.g., Bloom filter).
76