Unit 3 - Advanced Internet Architectures



Similar documents
A Catechistic Method for Traffic Pattern Discovery in MANET

Multicast vs. P2P for content distribution

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

LIST OF FIGURES. Figure No. Caption Page No.

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

P2P: centralized directory (Napster s Approach)

Security Design.

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

PEER TO PEER FILE SHARING USING NETWORK CODING

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Multicast Routing Protocol for Vehicular Delay-Tolerant Networks

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks

Security for Ad Hoc Networks. Hang Zhao

VXLAN: Scaling Data Center Capacity. White Paper

Three short case studies

Introduction to IP v6

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Routing in Mobile Ad Hoc and Peer-to-Peer Networks. A Comparison

2015 Internet Traffic Analysis

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst

Vehicular Cloud. Fan Zhang

How To Provide Qos Based Routing In The Internet

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

RVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN)

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

What is VLAN Routing?

Tomás P. de Miguel DIT-UPM. dit UPM

Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks

How To Make A Delay Tolerant Network (Dtn) Work When You Can'T Get A Signal From A Long Delay (Tcp/Ip) To A Long Time (Tokus) Or From A Short Delay (Ip) (Tko

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

Client/server and peer-to-peer models: basic concepts

Security Threats in Mobile Ad Hoc Networks

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

SUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER

An Introduction to Peer-to-Peer Networks

The IP Transmission Process. V1.4: Geoff Bennett

Professor Yashar Ganjali Department of Computer Science University of Toronto.

Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks

Transport and Network Layer

TOPOLOGIES NETWORK SECURITY SERVICES

PEER-TO-PEER NETWORK

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

Wireless Multi-hop Ad-hoc Networks: A Review

Lecture 02b Cloud Computing II

Best Practices for Controlling Skype within the Enterprise. Whitepaper

An Extended AODV Protocol to Support Mobility in Hybrid Networks

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

SBSCET, Firozpur (Punjab), India

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

Ethernet. Ethernet. Network Devices

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Guidance Regarding Skype and Other P2P VoIP Solutions

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Introduction to IPv6 and Benefits of IPv6

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Study of Network Characteristics Incorporating Different Routing Protocols

About the Authors Preface Acknowledgements List of Acronyms

Application Delivery Networking

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

How To Create A P2P Network

Three Key Design Considerations of IP Video Surveillance Systems

Information Searching Methods In P2P file-sharing systems

Customer Specific Wireless Network Solutions Based on Standard IEEE

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Peer-to-Peer Networks Organization and Introduction 1st Week

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Interoperability of Peer-To-Peer File Sharing Protocols


IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Peer-to-Peer Systems: "A Shared Social Network"

Transcription:

Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Tecnologies avançades d Internet, curs 2014

p2p Wireless Networks Delay And Disruption Tolerant Networks Anonymous Networks Contents 1 A peer-to-peer architecture 2 Wireless Networks 3 Delay And Disruption Tolerant Networks 4 Anonymous Networks Carlos Borrego Iglesias, Sergi Robles Unit 3 2 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Architecture Anonymous Applications Networks Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks 3 Delay And Disruption Tolerant Networks 4 Anonymous Networks Carlos Borrego Iglesias, Sergi Robles Unit 3 3 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Architecture Anonymous Applications Networks Peer-to-peer Architecture Definition: A peer-to-peer (abbreviated to P2P) computer network is one in which each computer in the network can act as a client or server for the other computers in the network (peers). Types: Pure peer-to-peer systems: The entire network consists solely of equipotent peers. Centralized peer-to-peer systems: A central server is used for indexing functions and to bootstrap the entire system. Hybrid peer-to-peer systems: Allow such infrastructure nodes to exist, often called supernodes. Carlos Borrego Iglesias, Sergi Robles Unit 3 4 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Architecture Anonymous Applications Networks Distributed hash table Definition: decentralized distributed hash table system. Transparency: Any participating node can efficiently retrieve the value associated with a given key. Good scalability: A change in the set of participants causes a minimal amount of disruption. Carlos Borrego Iglesias, Sergi Robles Unit 3 5 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Architecture Anonymous Applications Networks Contents 1 A peer-to-peer architecture Architecture Applications 2 Wireless Networks 3 Delay And Disruption Tolerant Networks 4 Anonymous Networks Carlos Borrego Iglesias, Sergi Robles Unit 3 6 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Architecture Anonymous Applications Networks File sharing networks Definition: Allows users to download media files using a P2P software client that searches for other connected computers. A user creates a small torrent descriptor. They then make the file itself available through a BitTorrent node acting as a seed. Those with the torrent descriptor file can give it to their own BitTorrent nodes which, acting as peers or leechers, download it by connecting to the seed and/or other peers. The file being distributed is divided into segments called pieces. Examples: gnutella, bittorrent, G2 and the edonkey Carlos Borrego Iglesias, Sergi Robles Unit 3 7 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Architecture Anonymous Applications Networks Other Applications Software publication and distribution: Example: Linux, several games. Streaming media: P2PTV and PDTP. Applications include TVUPlayer, Joost, CoolStreaming, Cybersky-TV, PPLive, LiveStation, Giraffic and Didiom. Spotify: Peer-to-peer network along with streaming servers to stream music to its desktop music player. Bitcoin: Peer-to-peer based digital currency. WWW Search: For example: YaCy, a free distributed search engine, built on principles of peer-to-peer networks. Skype: one of the most widely used internet phone applications is using P2P technology. Carlos Borrego Iglesias, Sergi Robles Unit 3 8 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Ad Hoc Anonymous Networks Networks Mobile Ad Hoc Networks Contents 1 A peer-to-peer architecture 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks 3 Delay And Disruption Tolerant Networks 4 Anonymous Networks Carlos Borrego Iglesias, Sergi Robles Unit 3 9 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Ad Hoc Anonymous Networks Networks Mobile Ad Hoc Networks Ad Hoc Networks Definition: A wireless ad hoc network is a decentralized type of wireless network. It does not rely on a preexisting infrastructure. Instead, each node participates in routing by forwarding data for other nodes. Carlos Borrego Iglesias, Sergi Robles Unit 3 10 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Ad Hoc Anonymous Networks Networks Mobile Ad Hoc Networks Addressing Zero configuration networking Host/routers may automatically configure an interface with an IPv4 address within the 169.254/16 prefix that is valid for communication with other devices connected to the same physical (or logical) link. The address selection algorithm is based on computing a hash on the interface s MAC address. (RFC 3927). The multicast Domain Name System When an mdns client needs to resolve a host name, it broadcasts a query message that asks the host having that name to identify itself. That target machine then multicasts a message that includes its IP address. All machines in that subnet use that information to update their mdns caches. RFC 6762. Carlos Borrego Iglesias, Sergi Robles Unit 3 11 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Ad Hoc Anonymous Networks Networks Mobile Ad Hoc Networks Routing Pro-active: Maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. Examples: B.A.T.M.A.N., Optimized Link State Routing Protocol (RFC 3626). Reactive: Finds a route on demand by flooding the network with Route Request packets. Examples: Ad hoc On-demand Distance Vector(AODV) (RFC 3561), Dynamic Source Routing (RFC 4728). Hybrid (both pro-active and reactive): Combines the advantages of proactive and of reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice for one or the other method requires predetermination for typical cases. Examples: ZRP (Zone Routing Protocol). Carlos Borrego Iglesias, Sergi Robles Unit 3 12 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Ad Hoc Anonymous Networks Networks Mobile Ad Hoc Networks Contents 1 A peer-to-peer architecture 2 Wireless Networks Ad Hoc Networks Mobile Ad Hoc Networks 3 Delay And Disruption Tolerant Networks 4 Anonymous Networks Carlos Borrego Iglesias, Sergi Robles Unit 3 13 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Ad Hoc Anonymous Networks Networks Mobile Ad Hoc Networks Mobile Ad Hoc Networks (MANETs) Definition: A mobile ad hoc network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. Carlos Borrego Iglesias, Sergi Robles Unit 3 14 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Ad Hoc Anonymous Networks Networks Mobile Ad Hoc Networks Classification Vehicular Ad hoc Networks (VANETs): Used for communication among vehicles and between vehicles and roadside equipment Internet based mobile ad hoc networks (imanet): Ad hoc networks that link mobile nodes and fixed Internet-gateway nodes. In such type of networks normal adhoc routing algorithms don t apply directly. Carlos Borrego Iglesias, Sergi Robles Unit 3 15 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Anonymous Networks Delay And Disruption Tolerant Networks (DTNs) Definition: Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Follow the Store-carry-and-forward paradigm: Information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station. Carlos Borrego Iglesias, Sergi Robles Unit 3 16 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Anonymous Networks Delay and Disruption Tolerant Networks (DTN) Research: DTN, opportunistic networks, challenged networks, partitioned networks... Characteristics: Intermittent connectivity, asymmetric bandwidths, long and variable latency, ambiguous mobility patterns... New applications made possible Applications: WSN, space applications, emergency scenarios, medical application in developing countries... Carlos Borrego Iglesias, Sergi Robles Unit 3 17 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Anonymous Networks Delay and Disruption Tolerant Networking Architecture RFC4838: Describes an architecture for DTN using Store-carry-and-forward. RFC5050: Describes the end-to-end protocol, block formats, an abstract service description for the exchange of messages (bundles) in DTN Carlos Borrego Iglesias, Sergi Robles Unit 3 18 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks Anonymous Networks Routing in Delay and Disruption Tolerant Networks Definition: next hop decision process Complex decision due to DTN characteristics Classification: based on the number of copies, geographical, probabilistic, epidemic... Routing code is located in the intermediate nodes Lack of proposals for scenarios with different applications with different routing needs Carlos Borrego Iglesias, Sergi Robles Unit 3 19 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks TOR Anonymous Networks Contents 1 A peer-to-peer architecture 2 Wireless Networks 3 Delay And Disruption Tolerant Networks 4 Anonymous Networks TOR Carlos Borrego Iglesias, Sergi Robles Unit 3 20 / 21

p2p Wireless Networks Delay And Disruption Tolerant Networks TOR Anonymous Networks TOR, the Onion Router Definition: System intended to enable online anonymity. Onion Routing refers to the layered nature of the encryption service: The original data are encrypted and re-encrypted multiple times, then sent through successive Tor relays, each one of which decrypts a l. layer"of encryption before passing the data on to the next relay and, ultimately, its destination. Carlos Borrego Iglesias, Sergi Robles Unit 3 21 / 21