DOC PREVIEW
Princeton COS 461 - Overlay Networks

This preview shows page 1-2-17-18-19-36-37 out of 37 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Overlay Networks Reading: 9.4Goals of Today’s LectureOverlay NetworksSlide 4Slide 5IP Tunneling to Build Overlay LinksTunnels Between End HostsSlide 8Overlays for Incremental DeploymentUsing Overlays to Evolve the Internet6Bone: Deploying IPv6 over IP4Secure Communication Over Insecure LinksCommunicating With Mobile UsersIP MulticastMBone: Multicast BackboneMulticast TodayCase Study: Resilient Overlay NetworksRON: Resilient Overlay NetworksRON Circumvents Policy RestrictionsRON Adapts to Network ConditionsRON Customizes to ApplicationsHow Does RON Work?Slide 23RON Works in PracticeRON Limited to Small DeploymentsCase Study: Distributed Hash TablesHash TableDistributed Hash TableHash FunctionsConsistent HashingWhere to Store (Key, Value) Pair?Nodes Coming and GoingJoins and Leaves of NodesSlide 34How to Find the Nearest Node?Links in the Overlay TopologyConclusions1Overlay NetworksReading: 9.4COS 461: Computer NetworksSpring 2008 (MW 1:30-2:50 in COS 105)Jennifer RexfordTeaching Assistants: Sunghwan Ihm and Yaping Zhu http://www.cs.princeton.edu/courses/archive/spring08/cos461/2Goals of Today’s Lecture•Motivations for overlay networks–Incremental deployment of new protocols–Customized routing and forwarding solutions•Overlays for partial deployments–6Bone, Mbone, security, mobility, …•Resilient Overlay Network (RON)–Adaptive routing through intermediate node•Distributed Hash Table (DHT)–Overlay for look-up of <key, value> pairs3Overlay Networks4Overlay Networks5Overlay NetworksFocus at the application level6IP Tunneling to Build Overlay Links•IP tunnel is a virtual point-to-point link–Illusion of a direct link between two separated nodes•Encapsulation of the packet inside an IP datagram–Node B sends a packet to node E–… containing another packet as the payloadABEFtunnelLogical view:Physical view:ABEF7Tunnels Between End HostsACBSrc: ADest: BSrc: ADest: BSrc: ADest: CSrc: ADest: BSrc: CDest: B8Overlay Networks•A logical network built on top of a physical network–Overlay links are tunnels through the underlying network•Many logical networks may coexist at once–Over the same underlying network–And providing its own particular service•Nodes are often end hosts–Acting as intermediate nodes that forward traffic–Providing a service, such as access to files•Who controls the nodes providing service?–The party providing the service –Distributed collection of end users9Overlays for Incremental Deployment10Using Overlays to Evolve the Internet•Internet needs to evolve–IPv6–Security–Mobility–Multicast•But, global change is hard–Coordination with many ASes–“Flag day” to deploy and enable the technology•Instead, better to incrementally deploy–And find ways to bridge deployment gaps116Bone: Deploying IPv6 over IP4ABEFIPv6IPv6IPv6IPv6tunnelLogical view:Physical view:ABEFIPv6IPv6IPv6IPv6CDIPv4IPv4Flow: XSrc: ADest: FdataFlow: XSrc: ADest: FdataFlow: XSrc: ADest: FdataSrc:BDest: EFlow: XSrc: ADest: FdataSrc:BDest: EA-to-B:IPv6E-to-F:IPv6B-to-C:IPv6 insideIPv4B-to-C:IPv6 insideIPv412Secure Communication Over Insecure Links•Encrypt packets at entry and decrypt at exit•Eavesdropper cannot snoop the data•… or determine the real source and destination13Communicating With Mobile Users•A mobile user changes locations frequently–So, the IP address of the machine changes often•The user wants applications to continue running–So, the change in IP address needs to be hidden•Solution: fixed gateway forwards packets–Gateway has a fixed IP address–… and keeps track of the mobile’s address changesgatewaywww.cnn.com14IP Multicast•Multicast–Delivering the same data to many receivers–Avoiding sending the same data many times•IP multicast–Special addressing, forwarding, and routing schemes–Pretty complicated stuff (see Section 4.4)unicast multicast15MBone: Multicast Backbone•A catch-22 for deploying multicast–Router vendors wouldn’t support IP multicast–… since they weren’t sure anyone would use it–And, since it didn’t exist, nobody was using it•Idea: software implementing multicast protocols–And unicast tunnels to traverse non-participants16Multicast Today•Mbone applications starting in early 1990s–Primarily video conferencing, but no longer operational•Still many challenges to deploying IP multicast–Security vulnerabilities, business models, …•Application-layer multicast is more prevalent–Tree of servers delivering the content–Collection of end hosts cooperating to delivery video•Some multicast within individual ASes–Financial sector: stock tickers–Within campuses or broadband networks: TV shows–Backbone networks: IPTV17Case Study: Resilient Overlay Networks18RON: Resilient Overlay NetworksPremise: by building application overlay network, can increase performance and reliability of routingTwo-hop (application-level)Berkeley-to-Princeton routeapplication-layer routerPrincetonYaleBerkeleyhttp://nms.csail.mit.edu/ron/19RON Circumvents Policy Restrictions•IP routing depends on AS routing policies–But hosts may pick paths that circumvent policiesUSLECPUPatriotISPmeMy home computer20RON Adapts to Network Conditions•Start experiencing bad performance–Then, start forwarding through intermediate hostACB21RON Customizes to Applications•VoIP traffic: low-latency path•Bulk transfer: high-bandwidth pathACBvoicebulk transfer22How Does RON Work?•Keeping it small to avoid scaling problems–A few friends who want better service–Just for their communication with each other–E.g., VoIP, gaming, collaborative work, etc.•Send probes between each pair of hostsACB23How Does RON Work?•Exchange the results of the probes–Each host shares results with every other host–Essentially running a link-state protocol!–So, every host knows the performance properties•Forward through intermediate host when neededACBB24RON Works in Practice•Faster reaction to failure–RON reacts in a few seconds–BGP sometimes takes a few minutes•Single-hop indirect routing–No need to go through many intermediate hosts–One extra hop circumvents the problems•Better end-to-end paths–Circumventing routing policy restrictions–Sometimes the RON paths are actually shorter25RON Limited to Small Deployments•Extra latency through intermediate hops–Software delays for packet forwarding–Propagation delay across the access link•Overhead on the intermediate


View Full Document

Princeton COS 461 - Overlay Networks

Documents in this Course
Links

Links

39 pages

Lecture

Lecture

76 pages

Switches

Switches

35 pages

Lecture

Lecture

42 pages

Links

Links

39 pages

Lecture

Lecture

34 pages

Topology

Topology

42 pages

Lecture

Lecture

42 pages

Overview

Overview

42 pages

Sockets

Sockets

45 pages

Load more
Download Overlay Networks
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Overlay Networks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Overlay Networks 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?