Download Lecture 5: Slides

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Deep packet inspection wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Airborne Networking wikipedia , lookup

Transcript
1
T-110.6120 Publish/Subscribe Internetworking
Helsinki University of Technology, Spring 2010
Lecture 5: Overview of the PSIRP architecture
by Arto Karila
Slides based on the PSIRP project review slides
presented in Brussels on March 3, 2009
and deliverable D2.3:
Architecture Definition, Component Descriptions,
and Requirements
2
Introduction
• Project objectives
• Consortium
• Working method
• Development process
3
Project Objectives
The key objectives of the PSIRP project are:
1. Define and develop a new inter-networking architecture based on the
publish/subscribe (pub/sub) paradigm
2. Develop a reference implementation of the core of the new architecture
3. Analyse and measure the communications efficiency of new paradigm
by quantitative parameters
4. Evaluate qualitative parameters of the new architecture with focus on
security and business incentives and models
5. Develop migration and deployment strategies
Other aspects:
• Follow the clean-slate design approach – take nothing for granted
• Consider migration, e.g., via overlay solution
• Emphasize security and socio-economics
• Publish the results, including source code, as much and as widely as
possible
• Engage with Future Internet community, e.g., cooperate with FIRE
(Onelab2) to test on large scale
4
Consortium
• The consortium was formed by people that shared a
common vision and wanted to work together towards it
• The partners of PSIRP are:
1. Helsinki University of Technology – Helsinki Institute for
Information Technology (TKK-HIIT, FI)
2. RWTH Aachen University (RWTH Aachen, DE)
3. British Telecommunications Plc (BT, GB)
4. Oy L M Ericsson Ab (LMF, FI)
5. Nokia Siemens Networks Finland Oy (NSNF, FI)
6. Institute for Parallel Processing of the Bulgarian Academy of
Science (IPP-BAS, BG),
7. Athens University of Economics and Business (AUEB, GR),
8. Ericsson Magyarorszag Kommunikacios Rendszerek K.F.T. (HU)
5
Working Method
• Iterative working method
– Define a pub/sub-based inter-networking architecture
– Implement and validate the architecture
– Revise the architecture and its implementation
• Work packages and tasks are allocated to teams that are
formed spontaneously, across organizational boundaries
– The purpose is to release creativity in a team consisting
of people of different companies and nationalities
The approach has proven its strength and it will be
continued in the proposed Pursuit project
6
Development Process
Requirements
Initial
Planning
Analysis & Design
Planning
Implementation
Deployment
Evaluation
Testing
7
Technical Overview
• Are the fundamentals still valid?
• Observation: It’s all about information
• Hypothesis: Increased information requires
information-centric network approaches
• Approach: Clean-slate with late binding
• Design methodology
• Main design principles
• Information centrism is key
• Information concepts
• Grouping information networks
• Information structures
8
Are the Fundamentals Still Valid?
Fundamentals of the Internet
• Collaboration
– Reflected in forwarding
and routing
• Cooperation
– Reflected in trust among
participants
• Endpoint-centric services
– (mail, FTP, even web)
– Reflected in E2E principle
 IP, full end-to-end
reachability
Reality in the Internet Today
•
Phishing, spam, viruses
– There is no trust any more!
•
Current economics favor senders
– Receivers are forced to carry
the cost of unwanted traffic
vs.
•
Information-centric services
– Do endpoints really matter?
– Endpoint-centric services
move towards information
retrieval through, e.g., CDNs
 IP with middle boxes &
significant decline in trust in
the Internet
9
Observation: It's All About Information
Internet Today:
• In 2006, the amount of digital information
created was 1.288 X 10^18 bits
• 99% of Internet traffic is information
dissemination & retrieval (Van Jacobson)
• HTTP proxying, CDNs,
video streaming, …
• Akamai’s CDN accounts for 15% of
traffic
• Between 2001 and 2010, information will
increase 1million times from 1 petabyte
(10^15) to 1 zettabyte (10^21)
• Social networking is information-centric
• Most solutions exist in silos
• overlays over IP map
information networks
onto endpoint networks
Internet Tomorrow:
• Proliferation of dissemination & retrieval
services, e.g.,
• context-aware services & sensors
• aggregated news delivery
• augmented real life
• Personal information tenfold in the next
ten years
(IBM, 2008)
• Increase of personalized video services
• e.g., YouTube, BBC iPlayer
• Vision recognized by different
initiatives & individuals
• Internet of Things,
Van Jacobson, D. Reed
• Lack of interworking of silo solutions will
slow innovation and development speed
10
Hypothesis: Increased Information Requires
Information-centric Network Approaches
Application developers care about information concepts
– Creation of information topologies of various kinds
-> Endpoint-centric networking structures are inadequate
– Topological network changes too slow in timescale
– Topological network boundaries too restrictive
– Topological network boundaries often not aligned with
information topologies
– Overlaying possible but restricted in (developer)
scalability
-> If it is all about information, why not route on information?
11
Approach
Clean-slate design…
• Question ALL fundamentals
• Challenge our thinking
• Take nothing for granted, including industry structures
• Clear vision
…with late binding (to reality)
• Consider migration and evolvability in separate work items
– How to get our design into real deployments,
e.g., overlay vs. IP replacement?
• Even consider necessary evolution of industry
(& regulatory) structures
– How do industries need to evolve in certain scenarios?
12
Design Methodology
SoA
VISION
Add/Remove
Add/Remove
Goals
Constraints
Derive
Principles
Question
Observe
Design Patterns & Considerations
Map
Components
Remove
• Combine bottom-up and
top-down
– Implementation
matters but
rationalization is
necessary
• Adaptive design is crucial
– Information-centrism
is expected to help for
areas like metadata &
policy
• Aligns well with cyclebased project approach
– Creates micro-cycles
of question/remove
Specify
Choice
Choice
Choice
Implement
Instance
Deploy & evaluate
Deployment
13
Main Design Principles
• Information is multi-hierarchically organised
– Information semantics are constructed as
directed acyclic graphs (DAGs)
• Information scoping
Information
Hierarchies
Information
reachability/
scoping
– Mechanisms are provided that allow for
limiting reachability of information to parties
• Scoped information neutrality
– Within each information scope, data is only
delivered based on a given (rendezvous)
identifier.
Communication Model
• The architecture is receiver-driven
– No entity shall be delivered data unless it
has agreed to receive those beforehand.
14
Information Centrism is Key
•
Data: Mail
Data: Picture
Governance
policy
Governance
policy
Scope Company A
Scope Family
•
Scope Friends
Governance
policy
•
•
Spouse
Father
Friend
Colleague
Information is
everything and
everything is
information
– Bootstrap other
concepts, e.g.,
identity, policy, …,
Scopes build
information networks
Policy is metadata
– So is scope!
Producers and
consumers need no
internetwork-level
addressing!
15
Information Concepts
• Information
– Smallest something
• Information collections
– Sets of semantically similar information
• Information networks
– Sets of information under some common
governance
• Information producer
– Entity publishing information to a particular
network
• Information consumer
– Entity subscribing to information in a particular
network
16
Grouping Information Networks
17
Information Structures
SId22
SId
SId
2
SId1
RId1
Private Information
networks
SIdSId
alg
2
Information networks
alg RId
Information collections
RId22
RId
RId
2
Information items
18
Architecture
•
•
•
•
•
•
•
•
•
•
High-level architecture
Architecture process
Architectural entities
Identifiers
Algorithmic identifiers
Architectural processes
Architecture overview
Components
Application considerations
Conclusions
19
Node Architecture
High-Level Architecture
: Rendezvous point
: Inter-domain topology formation
: Topology management
: Forwarding node
Apps
pub
pub
pub
sub
Fragmentation
Service Model
Rendezvous
Topology
ITF
ITF
Network Architecture
RP
ITF
TM
FN
Caching
Helper
…
RP
RP
Rendezvous
Network
Error Ctrl
Forwarding
TM
TM
Forwarding
Network
TM
FN
Forwarding
Network
Forwarding
Network
TM
Forwarding
Network
20
Architecture Process
• The aim of the architecture work is to produce
coherent design for a publish/subscribe
internetwork
– Principles, framework, components, internetworking
– Networks of information
– Using pub/sub in all parts of the protocol suite
• The architecture work is iterative
– Interaction with implementation and validation
workpackages
• Encompasses both clean-slate and incremental
overlay-based solutions
• In practice work is done in a number of
architecture teams with participants from different
21
work packages
Architectural Entities
• Information items
– Any data that can be labelled with an identifier
– Items can have different identifiers depending on the level of
abstraction
• Application identifier, rendezvous identifier, forwarding
identifier
• Algorithmic identifiers
• Information networks (or scopes)
– Information items grouped into a network of information under a
scope
– Scopes can be interpreted at various levels of abstraction
• Information subscribers and publishers
• Domains
– Administrative network areas that can be connected using interdomain forwarding architecture
22
Identifiers
Publish / Subscribe
Metadata
(source is implementation-dependent)
Data
Includes...
Application Identifiers
(AId)
Includes...
Scope Identifiers
(SId)
Associated
with...
Resolved to...
Rendezvous Identifiers
(RId)
Resolved to...
Forwarding Identifiers
(FId)
Define...
Network Transit Paths
23
Architectural processes
• Rendezvous
– The process of resolving higher level identifiers to lower
level identifiers within a given scope.
– Three simple cases: link-local, intra-domain, inter-domain
• Topology management and formation
– Management of data delivery topologies and forwarding
graphs
• Forwarding
– Data delivery within a single administrative domain or
across multiple domains.
– Temporal forwarding identifiers for each publisher and
subscriber are derived via the rendezvous and topology
management processes
– Various routing and forwarding protocols can be used, for
example a new protocol replacing IP or IP-based
25
overlays
Architectural processes
• Helper functions
– Extensions to core functionality of the network
architecture, such as management and transport
• Network attachment
– Discovery of network attachment points and network
configuration
26
Architecture Overview
AS
Rendezvous
Subscribe
Forwarding
node
Subscriber
Topology
Forwarding
node
AS
Topology
Forwarding
edge nodes
Data Forwarding
AS
Rendezvous
Topology
Forwarding
node
Publish
Forwarding
node
Create
delivery
path
Configure
Forwarding
path
Publisher
27
Component Wheel
• The network architecture is based on a modular
and extensible core called the PSIRP Component
Wheel
• Components may be decoupled in space, time,
and context
– Layerless protocol suite
• Typical components include rendezvous,
forwarding, helper functions, and caching.
• Applications may insert or request new
components to the wheel at runtime.
• The components are attached to the local
blackboard
– Shared components, publications, state
– Pub/sub is used to signal changes to blackboard state
28
Component Wheel
29
Compare w/ Haggle Architecture
[Sco2006]
J. Scott, P. Hui,
J. Crowcroft,
C. Diot,
Haggle: A Networking
Architecture Designed
Around Mobile Users,
IFIP WONS 2006,
Les Menuires, France,
2006
30
Component Wheel Interactions
Subscriber
Blackboard
Caching
Routing and forwarding
Low-level Link
Register and subscribe notifications
Register and subscribe notifications
Subscribe
Notify first component in plan
Component done, no cache hit
Notify second component in plan
Access memory object
Forward subscription
Publication
Insert publication as memory object
Notify componen in plant
Notify that has been added to cache
Notify subscriber
31
Service Model and API
We have considered four different classes of network services:
1. A low-level page model that exposes network
forwarding and rendezvous/topology formation functions
• Basic building block on top of raw forwarding API
– Pages and no error or congestion control
• Listen(FiD), Forward(FiD, meta-data, data)
• Mapping of information items to FiD
• Pub/sub API towards higher levels
2. A mid-level memory object model
• Memory pages are mapped to publications
3. A mid-level channel model
4. Various high-level service models including shared
state and document models
32
APIs
Higher-level APIs
Channel API
Memory Object API
Low-level page API
33
Rendezvous
• Many faces of rendezvous
– Link-local, inter-domain, information services, communal
services, …
• The main requirements for this functionality are:
– Scalability to Internet-like networks and data space sizes
– Efficiency of operation, measured in signalling overhead
and overall latency
– Deployability
• The network is defined in terms of domains and their
interconnections
– Interconnections between domains include upstream,
transit, downstream
– Rendezvous networks are units of deployment for the
PSIRP rendezvous functionality. The rendezvous
networks are formed by rendezvous nodes (RNs),
organized as a BGP-like inter-domain hierarchy
34
Rendezvous Networks
RNA
RNC
RP
RNB
RNC10
RNB10
RNC100
RNB100
Sub
N
N
Interconnection overlay RP
RNX
NX
Pub
Rendezvous point
Rendezvous network
Sub Subscriber
Rendezvous node
Pub Publisher
Rendezvous signaling
End node
36
Intra- and Inter-Domain Operation
• Forwarding is configured by the rendezvous system with the
help of the topology management function
• Key challenge is scalability
• Intra-domain forwarding
– Initial work on Bloom-filter based forwarding mechanism
indicates that they are useful for sizes up to metropolitan
area networks
– FiDs identify partial distribution graphs
– Minimal state in the routers
• Inter-domain forwarding
– Solution must take performance and policy requirements
into account
– Initial work on DHT-based overlay and understanding
implications for inter-domain routing
37
– Inter-domain topology function
Security and Packet Level
Authentication (PLA)
• Direct and indirect cryptographic association using identifiers and
rendezvous
– Public keys and one-way hash values
– Algorithmic identifiers
• Packet Level Authentication (PLA) is one candidate protocol for
securing PSIRP network functions
– We assume that per packet public key cryptography operations are
feasible in Internet's scale because of new digital signature
algorithms and advances in semiconductor technology
– PLA is a novel solution for protecting the network infrastructure
against various attacks (e.g., DoS) by providing availability
– Each packet has a signature (ECC)
– Good analogy for PLA is a paper currency: anyone can verify the
authenticity of the bill by using built-in security measures like
watermark and hologram, there is no need to contact the bank that
has issued the bill
– The network should be able to fulfill its basic goal: to deliver valid
packets of valid users in reliable and timely manner in all situations38
Prototype Implementation
Legacy Apps
PSIRP Apps
Sockets API
Emulator
Apps
PSIRP Library API
Libraries
Upper layers
(possibly Python)
PSIRP Kernel API
Lower layers (C/C++)
Kernel
Packet Level Authentication (PLA)
Ethernet
Wi-Fi
IP
GMPLS
39
Application Considerations
• Application programming interfaces
– Inherently information centric
– 1-to-1 message stream
• Similar to TCP/IP socket API
– 1-to-N bidirectional connection
• Similar to UDP over IP multicast
– 1-to-N document distribution
• Similar to CDN and P2P protocols
• Examples
– WWW functionality
– BitTorrent-like content distribution
40
Example: Scoping in CS-comms.
Using a scope to initiate client-server-like communications
41
Example: Invitation in CS-comms.
Using an invitation to initiate client-server-like communications
42
Example: Adding a Node to Tree
Simplified signaling for adding a node to a concast-like tree
43
Example: Interactions in the
component wheel
Interactions in the component wheel
44
zFilter Forwarding Tables
45
Link ID Tag (LIT) Generation
46
LIT Router Model
47
Multicast-Assisted Mobility
48
Conclusions
We have outlined an information centric network architecture
• Publish and subscribe are the basic primitives making
multicast the norm
• Decoupling in space and time
• Receiver driven (subscriber has control)
• Rendezvous as the primitive to connect publishers and
subscribers across domains on multiple levels
– Mapping to forwarding structures
• Scoping of data into manageable sets
• Architecture work is iterative
• Implementation and evaluation are on-going activities
49