• Ei tuloksia

A Layered Naming Architecture for the Internet

N/A
N/A
Info
Lataa
Protected

Academic year: 2024

Jaa "A Layered Naming Architecture for the Internet"

Copied!
11
0
0

Kokoteksti

(1)

A Layered Naming

Architecture for the Internet

Hari Balakrishnan,

Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Michael Walfish

IRIS Project

Presented by Markku Kekkonen

(2)

Introduction

„ Basically a literature survey which gathers existing research and propositions together

„ DNS suits poorly for naming data and services

„ Proposes that naming and resolution should be divided into three layers instead of one

‰ 1)services and data become first class objects

‰ 2)accommodate mobility and multihoming

‰ 3)integrate middleboxes (NATs, firewalls etc.)

(3)

Design Principles

„ Names and protocols

„ Namespace and network elements

„ Resolution and delegation

„ Sequences of destination

(4)

Names and protocols

„ Names should bind protocols only to the relevant aspects of the underlying structure

„ => Name services and hosts separately

„ Service Identifier (SID): host independent service or data name

„ End-point indentifier (EID): location independent host name

(5)

The naming layers

The Naming Layers

User-level descriptors (e.g., search)

App session

App-specific search/lookup returns SID

Transport

Resolves SID to EID Opens transport conns

IP

Resolves EID to IP

Bind to EID

Use SID as handle

IP hdr EID TCP SID …

IP Transport App session Application

(6)

Namespace and network elements

„ Names should not impose arbitrary

restrictions on the elements to which they refer

„ => Flat namespace!

„ Large flat namespace can be used to name anything

„ Flat namespaces can be scalable resolved in DHTs

„ Flat names are not user-friendly

(7)

Resolution and delegation

„ A network entity should be able to direct resolutions of its name not only to its own location, but also to chosen delegates

„ Delegation enables the use of middleboxes such as firewalls and NATs

(8)

Resolution explained

(9)

Resolution continued

„ Given an application a, host h, service or data which SID is s

„ Application gives s to the SID resolution layer

‰ Receives one or more EID triples (EID, transport, port)

„ Example: if s represents a web server, then the triple might be (EID of the web server, TCP, 80)

(10)

Sequences of destination

„ Destinations, as specified by sources and also by the resolution of SIDs and EIDs, should be generalizable to sequences of destinations

„ Loose source routing should be available also at the endpoint and service layers

„ Path could be determined by a series of EIDs

(11)

Related work

„ Most direct inspiration: HIP + i3 + SFR

‰ Prototype: Delegation-Oriented Arch. (DOA)

„ EID proposals: Nimrod, HIP, Peernet

„ Mobility/multihoming: Mobile IP, IPv6, Migrate

„ Intermediaries: IPNL, TRIAD, UIP, P6P, MIDCOM

„ SID-like proposals: URNs, Globe, ONH

„ Other architecture proposals

‰ PIP, Nimrod, IPv6, Active Networks, …

‰ FARA, Smart Packets, Network Pointers, Predicate Routing, Role-based Architecture

Viittaukset

LIITTYVÄT TIEDOSTOT

In “On the Integration of Cloud Computing and Internet of Things”, (written by Alessio Botta, Walter de Donato, Valerio Persico, Antonino Pescape) address the fact that

The steps include the mapping of existing solutions and approaches for connecting video games, understanding the requirements of players and video game developers, designing a model

The presented and tested material model could be used together with commercial finite element software with an explicit time integration scheme for estimating the failure

The  organization's  enterprise  architecture  is  a  plan  describing  how  the  organization's  business  processes  ‐  data/records  and  information  systems 

Our addon provides some extensions compared to existing software (e.g., Donès et al. 2006), namely, the option to switch between discrete and continuous position acquisition

The propositions focus on the unit of analysis ((Yin 2009), which in this case is a company. It is common in qualitative studies and an induction means that the research starts

In the case study the data was collected from in-depth interviews of the actors and it was linked to propositions by forming a design with the service blueprint that exemplifies

(Paar & Pelzl 2010, 87) Symmetric ciphers, like AES, are also widely used in data encryption and the integrity check of messages (Paar & Pelzl 2010, 3).. However,