internet indirection infrastructure (i3) ion stoica daniel adkins shelley zhuang scott shenker...
Post on 22-Dec-2015
219 views
TRANSCRIPT
Internet Indirection Infrastructure (i3)
Ion Stoica Daniel Adkins Shelley Zhuang Scott Shenker Sonesh Surana
(Published in SIGCOMM 2002)
URL: http://i3.cs.berkeley.edu/publications/papers/i3-sigcomm.pdf
Presented By: Arati Baliga
Motivation
Internet architecture was designed for point to point communicationCommunication services like multicast, anycast , mobility faced deployment challenges.i3 provides an application level solution to this problem.Decouples act of sending from act of receiving by adding a level of indirection to this process.
i3 Overview
Packet types:<id, data><id, addr>
Communication abstractions
Stack Identifiers
An identifier stack is a list of identifiers that takes the form (id1,id2, …,idn) where idi is either an identifier or an address. Packets and triggers are
Packet P = (idstack , data)
Trigger T = (id, idstack)
Identifier stacks used in service compostion, hetrogeneous multicast and improve robustness of i3.
Service Composition
Scalable Multicast
Chord
Security
• Eavesdropping - Private triggers• Trigger Hijacking - add another level of indirection• DoS Attacks
• End-Hosts (sends a random nonce as challenge)• Trigger Loops (fair share of resources, loop
detection on trigger insert)
• Anonymity: Inherent. Eavesdropping on traffic of sender does not reveal receiver identity.
Simulations
Simulations
Performance Evaluation
Performance Evaluation
Performance Evaluation