Transient Network Architecture (TNA)

Download Report

Transcript Transient Network Architecture (TNA)

Transient Network
Architecture
http://hdl.handle.net/2118/tna
Joud Khoury
University of New Mexico, ECE department
CNRI
Handle System Workshop, Washington DC
June 21
Credits
• Funded by NSF Future Internet Design
(FIND) Grant CNS-0626380
• Website: http://hdl.handle.net/2118/tna
• People
 Henry Jerez, CNRI
 Joud Khoury, Chaouki Abdallah, Greg
Heileman, Pramod Jamkhedar, Wennie Shu,
Jorge Crichigno, Jorge Piovesan – UNM
Outline
• Overview of TNA
• Mobility and Persistent Identification
• How/where is it applied?
 InterMesh instantiation of TNA
 VoIP using handles
 Digital Rights Management within TNA
• References
What is TNA
• It is an architecture that postulates that:
 All networks can be reduced to a particular
case of persistently identified, transient,
mobile, abstract entities that group into
particular association
• It is an abstraction based persistent
communication network for transient digital
entities
TNA Principles
• Mobility and Ad Hoc characteristics as
basic requirements
• Abstraction as the basis of internetworking
and functionality
• Persistent Identification
Mobility and Ad Hoc
characteristics
• Mobility is the ability of nodes to change
association without breaking referential integrity.
• All components of the architecture are to be
considered transient and mobile
 The components must operate in both
 Connected = Full cohesive communication with the larger
structure is assumed
 Disconnected = limited or no connectivity with other
groupings is possible
• While consolidation is possible; all processes,
services and mechanisms should assume a
mobile deployment environment.
Persistent Identification
• Persistent Identifier=Handle
• Persistently identify:
 globally Digital entities:
 Network components
 Communicating entities
 Services
 Processes
• Identification is based on a set of unique naming
spaces with a distributed resolution on a need to
know basis
How do we use PI’s
• We identify all network entities with
persistent identifiers
• We use these identifiers to route all traffic
in the network
• We identify particular network associations
with persistent identifiers
• We provide secure distributed
administration
• This enables seamless mobility
How do the pieces fit together
What can it do
• Enables new transmission paradigms
• It can move functionality at will
• Allows current and future network to
coexist and seamlessly integrate
Current Research Tracks
• The MESH Network AoI Instantiation –
InterMesh and voice over Intermesh
• Agent Coordination
• Basic DRM expressiveness
InterMesh Motivation
Various types of local networks; WMNs, WSNs,
PANs.
WMN particularly interesting? Advantages,
connectivity models, suitable for WLAN, WMAN,
WVAN, include ad-hoc, …
A growing need for inter-networking among
heterogeneous networks
IP? Some limitations: overloading the address,
absence of trustworthiness
Fundamental design shifts needed -> InterMesh
Motivation
A growing need for inter-networking among heterogeneous (mesh) networks
L3
Persistent Identification (PI) Layer
Mesh Interworking
L2 – 802.11s
(expected)
Topology learning
Routing/forwarding
Measurement
Medium Access Control
L1
IEEE 802.11 PHY
Management
QoS
Architecture model
Node
Core
AoI-1
AoI-2
AoI: Area of
Influence
Architecture
Nodes
Ref
Core
Pi-1
Pi-2
PI Entity
Neutral
Environment
PI
L2
L1
Agents
AoI-1
Agents
AoI-2
Pi-1
Pi-2
Pi-4
Pi-3
AoI: Area of
Influence
A closer look at local delivery
Pi-2
Local A: ZZ
How does Pi-1 know Pi-2 location?
Address resolution – ARP
Core
Agent 2
AoI-1
Pi-1
Local A: AA
Agent 1
AoI-2
Agent 3
AoI-3
Inter-network
1.
Pi-2
Local A: ZZ
Is Pi-3 in Ao1-1? ARP
2. Pi-3 is not in the local network -> send the data to the Agent2
3. Agent2 routes the data
4. Agent3 sends the data to BB
Internet
Agent 2
Agent 3
…
BB
Pi-1
Local A: AA
Agent 1
…
Mike
Pi-3
…
AoI-1
Local A
…
PI
Agent 3
Pi-3
Local A: BB
AoI-2
AoI-3
Mobility
Pi-2
Local A: ZZ
A proactive discovering protocol to keep bound with the core
Agent 2
Core
Agent 3
AoI-1
Agent 1
Pi-1
Local A: AA
Pi-3
Local A: BB
AoI-2
AoI-3
Previous work – VoIP Sessions and
Mobility
Home Domain: hdomain
SIP Proxy/Registrar
(2118/hproxy)
SIP Proxy/Registrar
(10.200/fproxy)
Foreign Domain: fdomain
Sessions and Mobility
Home Domain: hdomain
SIP Proxy/Registrar
(2118/hproxy)
2
3
Handle System
c
a
1
SIP Proxy/Registrar
correspondent
(c_user)
Foreign Domain: cdomain
R
TE
S
GI
RE
INTERNET
d
TER User:
3 r_user
REGIS
Handle: 2118/r_user
SIP Proxy/Registrar
(10.200/fproxy)
Foreign Domain: fdomain
Traditional traffic flow
Proposed traffic flow
H-SIP Abstraction
• SIP users and Proxy servers identified with handles
instead of URI and Domain names eliminating any
domain binding
Proxy Handle
User Handle
Registration - Measurements
• Average Registration times
10,000 samples dispersed
over 10 days
  39ms
t A  5tc
Call Establishment - Measurements
is the diff in cumulative RT delay
Note: Presumably large geographical separation
between the roaming user and his home server
We outperform as long as
>x
IDEA
Indirect DRM Evaluation Architecture
• Rely on persistent identifiers to convey
Rights information
• All content and Users identified with
Persistent Identifiers. All licenses and
rights identified with persistent identifiers
• Use a dynamic evaluation mechanism that
relies on a layered rights expression and
enforcement model
Layered Model
• Persistent identifiers
allow referential
integrity at every layer
• Layers are not only
logically but physically
independent
Dynamic evaluation
• In TNA where even services are mobile; DRM
evaluation along with validation resources are
based on persistent Identifiers
• Persistent Identifiers weave the different layers
and services together
• DRM computation is therefore a heterogeneous
diverse ecosystem rather than a vertically
integrated solution
TNA principles and Rights
Mobility
• Based on TNA principles all components of the
architecture are mobile and transient ness is
assumed
• The system can then use opportunistic
connectivity and realm based interconnection to
conform new enforcement areas
• The System provides first class presence to all
members and their interests: From the owned to
the final consumer and provides them with the
flexibility they need to operate in a more real
environment.
Current Application models
• Heterogeneous License compatibility and
evaluation
• Intrinsic authorization and validation
• New features and traditional behaviors:
 Loans
 Second level market
 New Business models
References
•
TNA
 H. Jerez, J. Khoury, and Chaouki Abdallah, “The Transient Network Architecture”, in
arXiv.
•
InterMesh instantiation of TNA
 J. Khoury, J. Crichigno, H. Jerez, C. Abdallah, W. Shu, and G. Heileman, “The intermesh
network architecture,” under review IEEE Network Magazine.
•
VoIP using handles
 J. Khoury, H. Jerez, C. Abdallah “Efficient User Controlled Inter-Domain SIP Mobility
Authentication, Registration, and Call Routing”, to appear in 1st International Workshop
on Security and Privacy, SPEUCS 2007, Philadelphia, PA, August 2007.
 J. Khoury, H. Jerez, C. Abdallah “H-SIP: Inter-domain SIP mobility: Design”, in
Consumer Communications and Networking Conference, CCNC 2007, Las Vegas, NV,
Jan 2007.
•
Digital Rights Management within TNA
 G. L. Heileman and P. A. Jamkhedkar, DRM Interoperability Analysis from the
Perspective of a Layered Framework, Proceedings of the 5th ACM workshop on Digital
Rights Management, Nov. 2005, Virginia, USA.
 P. A. Jamkhedkar, G. L. Heileman and Ivan Martinez-Ortiz, The Problem With Rights
Expression Languages, Proceedings of the 6th ACM workshop on Digital Rights
Management, Oct-Nov. 2006, Virginia, USA.