Towards Wireless Overlay Network Architectures
Download
Report
Transcript Towards Wireless Overlay Network Architectures
SAHARA Third Winter Retreat
12-14 January 2004
Randy H. Katz, Anthony Joseph, Ion Stoica
Computer Science Division
Electrical Engineering and Computer Science Department
University of California, Berkeley
Berkeley, CA 94720-1776
1
Retreat Goals &
Technology Transfer
People
Project Status
Work in Progress
Prototype Technology
Early Access to Technology
Promising Directions
Industrial Collaborators
UC Berkeley Project Team
Reality Check
Friends
Feedback
2
Who is Here (Industry)
• Cisco
– Petre Dini
• Crazy Tulip Systems
– Chris Overton
• Hewlett-Packard Labs
– Wai-Tian Dan Tan
• KDD Japan
– Ayuymu Kubota (VIF)
• Lucent Bell Labs
– T. V. Lakshman
• Microsoft Research
– Helen Wang
• NTTDoCoMo
• NTT MCL
–
–
–
–
Anand Desai
Tetsuya Nakamura
Haruhiko Nishida
Satomi Okazaki
• Sun Microsystems
– Erik Nordmark
• Univ. Helsinki/Nokia
– Kimmo Raatikainen
• Special Friends
– John Chuang
– Bryan Lyles
– Doug Tygar
– Daichi Funato
Italics indicates Ph.D. from Berkeley
VIF=Visiting Industrial Fellow
3
Green = First Retreat!
Who is Here (Berkeley)
• Professors
– Anthony Joseph
– Randy Katz
– Ion Stoica
• Technical & Admin Staff
– Bob Miller
– Glenda Smith
– Keith Sklower
• Grad Students
–
–
–
–
–
–
–
Sharad Agarwal
Marco Barreno
Weidong Cui
Steve Czerwinski
Ling Huang
Chris Karlof
Karthik Lakshminarayanan
• Grad Students
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
Yin Li
Sridhar Machiraju
Ana Sanz Merino
Xuanlong Nguyen
George Porter
Anantha Rajagoplala-Rao
Sean Rhea
Mukund Seshadri
Kevin Simler
Lakshmi Subramanian
Mel Tsai
Fang Yu
Ben Zhao
Alice Zheng
Shelley Zhuang
4
Retreat Purpose
• Fifth SAHARA Retreat
– Project launched 1 July 2001
– Last year: shift to new projects
• Common thread: architectural
elements for future networks
– “Services” inside the network: code vs.
protocols, location/topology-aware
– Spanning:
» Independent service providers
» Converged data + telecomm nets
» Hetero access + core nets
• Co-lo w/ROC, New Project Start
– NSF Cybertrust Center Proposal:
Center for Adaptive Trustworthy
Systems (CATS)
• Industrial feedback & directions
– Plans for the new center
– Industrial endorsement for the proposal
5
Project Relationships
New Net Services
and Applications
Adaptive,
Network-Aware
Applications
Griffin
Adaptive APIs
High Level APIs
Tapestry
Local-aware
DOLR
Net
Storage
Apps
P2P
Search
Mobility
Overlays
OASIS
Exposed APIs
Programmable
Network
Elements
SAHARA Composed
Reachability
BGP, Overlay Support
Internet
Indirection
Infrastructure
Enhanced
Routing
IP Layer
6
SAHARA “Elevator” Statement
• New mechanisms, techniques for end-to-end
services w/ desirable, predictable,
enforceable properties spanning potentially
distrusting service providers
• Architecture for service composition and
inter-operation across separate administrative
domains, supporting peering and brokering, and
diverse business, value-exchange, accesscontrol models
7
Routing as a Composed Service
• Routing as a Reachability “Service”
– Implementing paths between composed service instances,
e.g., “links” within an overlay network
– Multi-provider environment, no centralized control
• Desirable Properties
– Trust: verify believability of routing advertisements
– Agility: converge quickly in response to global routing changes
to retain good reachability “performance” (e.g., latency)?
– Reliability: detect service composition path failures quickly
to enable fast recomposition to maintain reachability
– Scalability and Interoperability: Adapt protocols via processing at
“impedance” matching points between administrative domains
• Results are architectural elements rather than a
comprehensive architecture
8
SAHARA Recent Progress
• “Reachability” as a Composed Network Service
– Strong focus on BGP
» Internet’s primary means for managing peering and achieving
end-to-end reachability
» Limited visibility into AS policies makes it difficult to achieve
good global behaviors from locally good specifications
» Many well-known security vulnerabilities
» Motivation for overlays to achieve application-specific
reachability properties
– Presentations during the Retreat
» Sharad’s highlight on interactions between global and local
routing
» Matt’s talk on “Root Cause Analysis of BGP Dynamics”
» Lakshmi’s talk on “Listen and Whisper: Security Mechanisms
for BGP”
» Lakshmi’s poster on “OverQOS: Loss-rate vs. bandwidth
quality of service”
9
Other SAHARA Progress
• Access Network Services
– Cross-service provider authenticated roaming in WLANs
(Merino, Suzuki, Matsunaga)
– Cross-service provider radio resource allocation
(Matsunaga)
• Overlay Network Services
– Tapestry (Anthony Joseph) and I3 (Ion Stoica)
– Exploration of support for mobility, reliability, P2P
networking
10
SAHARA Research Transitions
• Other network services, migrating towards
reliability and trustability
–
–
–
–
Weidong: network monitoring infrastructure
Fang: router level intrusion detection
Mukund: end-host controlled routing
Machi: confidentiality in interdomain routing
• Overlays and Services for Internetworked
Storage (OASIS)
– Mel: Programmable Router Model and Environment
– George: Streaming Packet Processing
– Li: Storage Networking as an “applications” domain
11
Recent Sahara Theses
• Ph.D.
– Bhaskar Raman, “An Architecture for Availability and Performance in Wide-Area Service
Composition,” (Ph.D., December 2002)
– Yan Chen, “Scalable Efficient Network-Aware Content Distribution Networks,” (Ph.D., Dec
2003)
– Morley Mao, “Solving the Interdomain Routing Puzzle—Understanding Interdomain Routing
Dynamics,” (Ph.D., December 2003)
– Sharad Agarwal, “Influence of Interdomain Routing on Intradomain Traffic Engineering,”
(Ph.D., May 2004?)
• M.S.
– Lakshminarayanan Subramanian, “On Inferring the Geographic Properties of the Internet,”
(M.S., May 2002).
– Fang Yu, “Study of the Restoration Path Block Problem in Optical Networks,” (M.S.,
December 2002).
– Mukund Seshadri, “A Scalable Architecture for Broadcast Federation,” (M.S., December
2002).
– Weidong Cui, “Backup Path Allocation Based on a Correlated Link Failure Probability Model
in Overlay Networks,” (M.S., May 2003).
– George Porter, “Traffic Matrix Estimation for Low-loss Routing in Hybrid Networks,” (M.S.,
May 2003).
– Sridhar Machiraju, “A Scalable and Robust Solution for Bandwidth Allocations,” (M.S., May
2003).
12
Center for Adaptive Trustworthy Systems
Conceptual Architecture
Programming
Abstractions
For Roll-back
(Necula
Crash-Only
Middleware &
Servers,
System O&C
Infrastructur
e (Fox)
Protocols Enabling
Fast Detection &
Route Recovery,
Network O&C
Infrastructure
(Katz, Stoica)
User
Operator
Prototype Applications:
E-voting, Messaging,
E-Mail, etc.
Client
Server
Distributed
Middleware
SLT Services
Distributed
Middleware
PNE Edge
Network
ApplicationSpecific
Overlay Network
EdgePNE
Network
Router
Router
Commodity
Internet & IP networks
Benchmarks,
Tools for
Human
Operators
(Patterson)
Online
Statistical
Learning
Algorithms
(Jordan)
• Security and privacy consideration embedded throughout (Tygar)
• Reduction to practice of online SLT and observe/analyze/act infrastructure
• Reusable embeddable components
13
Vulnerable Messaging Application
that Requires Trustworthiness
Net Failure
DHS/Federal
Network
Active Adversary
Service Attacks
Coalition
Internet
Trust
Relations
Allies Networks
Adversary Allies NetworksNet Failure
Allies Networks
Allies
Networks
Local Police,
Fire,
Adversary
State Police
Compromised Network
With Embedded Adversaries
Incident Reports
Responder Locations
GIS Data
Etc.
14
Summer03 Retreat Feedback
• Retreat Organization:
– Better interactive session mix, poster session very productive
– Keep talks SHORT and allow time for discussion following talks
– Follow-up in 1-2 months, keep industrial participants involved
• Technical Comments:
– Problem focus: intended application and its requirements for technology
being developed remains unclear
» Clearly defining the need for overlays and P2P systems—what is the
problem they solve and the critical application they enable?
» Clearly defining the PNE model—who programs them (system
programmers? end users?) and what kind of functionality run on
them (network services? arbitrary applications?)
– Migration from performance focus to reliability/trustability focus in
collaboration with ROC project is good
– Research methodology (measure, model, simulate, deploy) needs to be
clearly specified
15
Plan for the Retreat
• Monday, 12 January 2004
–
–
–
–
–
–
–
–
–
–
0745 Depart Berkeley
1200 Arrive Granlabbaken
1200-1300 Lunch
1300-1500 Session I: Overview and Status Introductions and Retreat
» Overview, Randy Katz
» Randy Katz/Anthony Joseph/Ion Stoica Status Presentations
» Sharad Agarwal, “Interaction of BGP and Interdomain Traffic”
1500-1530 Break
1530-1700 Session II: Dependability and Trustworthiness
» Matt Caesar: "Root Cause Analysis of BGP Route Failure"
» Lakshmi Subramanian: "Verifiable Protocols with Listen and Whisper"
» Sridhar Machiraju: "Reconciling Confidentiality with Cooperation in Interdomain
Routing"
1700-1800 Break
1800-1930 Dinner
» Dinner Speaker, Chris Overton, Crazy Tulip Systems, “Strategies for Modeling
Large-scale IT Systems”
1930-2100 Panel Session: Reliable Adaptive Distributed Systems (RADS) Proposal
(David Patterson, Armando Fox, Ion Stoica, Michael Jordan, Doug Tygar)
2100- Social Hour
16
Plan for the Retreat
• Tuesday, 13 January 2004
– 0730-0830 Breakfast
– 0830-1000 OASIS Edge Services
» Mel Tsai: "RouterVM Programmable Network Element Specification“
» George Porter: "Streaming Protocol Processing in PNEs“
» Weidong Cui: "Network Monitoring Infrastructure"
» Fang Yu: "Router Level Support for Intrusion Detection"
– 1000-1030 Break
– 1030-1200 Overlay Networks I
» Mukund Seshadri: "Dynamics of End Host-Controlled Routing"
» Ananth Rao: "Scheduling transmissions in multihop 802.11 networks"
» Steve Czerwinski: “Using Overlay Networks for Proximity-based Discovery”
– 1200-1700 Bag Lunch and Afternoon Snow Sports (or work, lounge, talk, relax, etc.)
– 1700-1830 Overlay Networks II
» Panel Session of Short Student Talks and Following Discussion
» Karthik Lakshminarayanan: "Loose virtual path abstraction"
» Ben Zhao: “Infrastructure-based Resilient Routing”
» Sean Rhea: Bamboo
– 1830-2000 Dinner
» Dinner Speaker, Paul Brett, HP, “Real-World Systems Failures, A Systemic View”
– 2000-2130 Student Poster Session
– 2130 Evening Socializing
17
Plan for the Retreat
• Wednesday, 14 January 2004
–
–
–
–
–
–
–
0730-0830 Breakfast
0830-0930 RADS Feedback from Industry
0930-1000 Break and Room Checkout
1000-1200 Individual Project Feedback
1200-1300 Lunch
1300 Depart Granlibakkan
1700 Arrive Berkeley
18
Recent SAHARA-Related
Publications
•
•
•
•
•
•
•
Z. Mao, J. Rexford, J. Wang, R. H. Katz, “Towards an Accurate AS-Level Traceroute Tool ,”
Proceedings ACM SIGCOMM Conference, Karlsruhe, Germany, (August 2003).
Y. Matsunaga, A. Merino, T. Suzuki, R. H. Katz, “Secure Authentication System for Public
WLAN,” Proceedings First ACM International Workshop on Wireless Mobile Applications and
Services on WLAN Hotspots (ACM WMASH 2003), San Diego, CA, (September 2003).
Y. Chen, D. Bindel, R. H. Katz, “Tomography-based Overlay Network Monitoring,” Extended
Abstract, Proceedings Internet Measurement Conference (ICM-03), Miami, FL, (October
2003).
L. Subramanian, I. Stoica, R. H. Katz, S. Shenker, “Listen and Whisper: Security Mechanisms
for BGP,” USENIX/ACM Symposium on Networked System Design and Implementation
(NSDI’04), San Francisco, CA, (March 2004).
L. Subramanian, I. Stoica, R. H. Katz, H. Balakrishnan, “OverQoS: An Overlay Based
Architecture for Enhancing Internet QoS,” USENIX/ACM Symposium on Networked System
Design and Implementation (NSDI’04), San Francisco, CA, (March 2004).
Y. Matsunaga, R. H. Katz, “Inter-Domain Radio Resource Management for Wireless LANs,”
Wireless Communications and Networking Conference (WCNC’2004), Atlanta, GA, (March
2004).
S. Zhuang, K. Lai, I. Stoica, R. Katz, S. Shenker, “Host Mobility Using an Internet
Indirection Infrastructure,” ACM/Balzer Wireless Networking (WINET) Journal, to appear.
19
Sahara
Overview
Randy H. Katz
Univ. of California
Berkeley, CA
94720-1776
20