• No results found

Unit 3 - Advanced Internet Architectures

N/A
N/A
Protected

Academic year: 2022

Share "Unit 3 - Advanced Internet Architectures"

Copied!
21
0
0

Loading.... (view fulltext now)

Full text

(1)

Unit 3 - Advanced Internet Architectures

Carlos Borrego Iglesias, Sergi Robles

Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat

Departament d’Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona

Tecnologies avançades d’Internet, curs 2014

(2)

p2p Wireless Networks Delay And Disruption Tolerant Networks Anonymous Networks

Contents

1

A peer-to-peer architecture

2

Wireless Networks

3

Delay And Disruption Tolerant Networks

4

Anonymous Networks

(3)

p2p Wireless Networks Delay And Disruption Tolerant NetworksArchitectureAnonymous NetworksApplications

Contents

1

A peer-to-peer architecture Architecture

Applications

2

Wireless Networks

3

Delay And Disruption Tolerant Networks

4

Anonymous Networks

(4)

p2p Wireless Networks Delay And Disruption Tolerant NetworksArchitectureAnonymous NetworksApplications

Peer-to-peer Architecture

Definition: A peer-to-peer (abbreviated to P2P) computer network is one in which each computer in the network can act as a client or server for the other computers in the network (peers).

Types:

Pure peer-to-peer systems: The entire network consists solely of equipotent peers.

Centralized peer-to-peer systems: A central server is used for indexing functions and to bootstrap the entire system.

Hybrid peer-to-peer systems: Allow such infrastructure nodes to exist, often called supernodes.

(5)

p2p Wireless Networks Delay And Disruption Tolerant NetworksArchitectureAnonymous NetworksApplications

Distributed hash table

Definition: decentralized distributed hash table system.

Transparency: Any participating node can efficiently retrieve the value associated with a given key.

Good scalability: A change in the set of participants

causes a minimal amount of disruption.

(6)

p2p Wireless Networks Delay And Disruption Tolerant NetworksArchitectureAnonymous NetworksApplications

Contents

1

A peer-to-peer architecture

Architecture

Applications

2

Wireless Networks

3

Delay And Disruption Tolerant Networks

4

Anonymous Networks

(7)

p2p Wireless Networks Delay And Disruption Tolerant NetworksArchitectureAnonymous NetworksApplications

File sharing networks

Definition: Allows users to download media files using a P2P software client that searches for other connected computers.

A user creates a smalltorrent descriptor. They then make the file itself available through a BitTorrent node acting as aseed.

Those with the torrent descriptor file can give it to their own BitTorrent nodes which, acting aspeers or leechers, download it by connecting to the seed and/or other peers.

The file being distributed is divided into segments calledpieces.

Examples: gnutella, bittorrent, G2 and the eDonkey

(8)

p2p Wireless Networks Delay And Disruption Tolerant NetworksArchitectureAnonymous NetworksApplications

Other Applications

Software publication and distribution: Example: Linux, several games.

Streaming media: P2PTV and PDTP. Applications include TVUPlayer, Joost, CoolStreaming, Cybersky-TV, PPLive, LiveStation, Giraffic and Didiom.

Spotify: Peer-to-peer network along with streaming servers to stream music to its desktop music player.

Bitcoin: Peer-to-peer based digital currency.

WWW Search: For example: YaCy, a free distributed search engine, built on principles of peer-to-peer networks.

Skype: one of the most widely used internet phone applications is using P2P technology.

(9)

p2p Wireless Networks Delay And Disruption Tolerant NetworksAd Hoc NetworksAnonymous NetworksMobile Ad Hoc Networks

Contents

1

A peer-to-peer architecture

2

Wireless Networks Ad Hoc Networks

Mobile Ad Hoc Networks

3

Delay And Disruption Tolerant Networks

4

Anonymous Networks

(10)

p2p Wireless Networks Delay And Disruption Tolerant NetworksAd Hoc NetworksAnonymous NetworksMobile Ad Hoc Networks

Ad Hoc Networks

Definition: A wireless ad hoc network is a decentralized type of wireless network. It does not rely on a preexisting infrastructure.

Instead, each node participates in routing by forwarding data for other nodes.

(11)

p2p Wireless Networks Delay And Disruption Tolerant NetworksAd Hoc NetworksAnonymous NetworksMobile Ad Hoc Networks

Addressing

Zero configuration networking Host/routers may automatically configure an interface with an IPv4 address within the 169.254/16 prefix that is valid for communication with other devices connected to the same physical (or logical) link.

The address selection algorithm is based on computing a hash on the interface’s MAC address. (RFC 3927).

The multicast Domain Name System When an mDNS

client needs to resolve a host name, it broadcasts a query

message that asks the host having that name to identify

itself. That target machine then multicasts a message that

includes its IP address. All machines in that subnet use

that information to update their mDNS caches. RFC 6762.

(12)

p2p Wireless Networks Delay And Disruption Tolerant NetworksAd Hoc NetworksAnonymous NetworksMobile Ad Hoc Networks

Routing

Pro-active: Maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network.

Examples: B.A.T.M.A.N., Optimized Link State Routing Protocol (RFC 3626).

Reactive: Finds a route on demand by flooding the network with Route Request packets. Examples: Ad hoc On-demand

Distance Vector(AODV) (RFC 3561), Dynamic Source Routing (RFC 4728).

Hybrid (both pro-active and reactive): Combines the advantages of proactive and of reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice for one or the other method requires predetermination for typical cases. Examples:

(13)

p2p Wireless Networks Delay And Disruption Tolerant NetworksAd Hoc NetworksAnonymous NetworksMobile Ad Hoc Networks

Contents

1

A peer-to-peer architecture

2

Wireless Networks

Ad Hoc Networks

Mobile Ad Hoc Networks

3

Delay And Disruption Tolerant Networks

4

Anonymous Networks

(14)

p2p Wireless Networks Delay And Disruption Tolerant NetworksAd Hoc NetworksAnonymous NetworksMobile Ad Hoc Networks

Mobile Ad Hoc Networks (MANETs)

Definition: A mobile ad hoc network (MANET) is a

self-configuring infrastructureless network of mobile devices connected by wireless.

Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router.

(15)

p2p Wireless Networks Delay And Disruption Tolerant NetworksAd Hoc NetworksAnonymous NetworksMobile Ad Hoc Networks

Classification

Vehicular Ad hoc Networks (VANETs): Used for

communication among vehicles and between vehicles and roadside equipment

Internet based mobile ad hoc networks (iMANET): Ad hoc networks that link mobile nodes and fixed

Internet-gateway nodes. In such type of networks normal

adhoc routing algorithms don’t apply directly.

(16)

p2p Wireless Networks Delay And Disruption Tolerant Networks Anonymous Networks

Delay And Disruption Tolerant Networks (DTNs)

Definition: Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity.

Follow the Store-carry-and-forward paradigm: Information is sent to an intermediate station where it is kept and sent at a later

(17)

p2p Wireless Networks Delay And Disruption Tolerant Networks Anonymous Networks

Delay and Disruption Tolerant Networks (DTN)

Research: DTN, opportunistic networks, challenged networks, partitioned networks...

Characteristics: Intermittent connectivity,

asymmetric bandwidths, long and variable latency, ambiguous mobility patterns...

New applications made possible

Applications: WSN, space applications, emergency scenarios, medical application in developing

countries...

(18)

p2p Wireless Networks Delay And Disruption Tolerant Networks Anonymous Networks

Delay and Disruption Tolerant Networking Architecture

RFC4838: Describes an architecture for DTN using Store-carry-and-forward.

RFC5050: Describes the end-to-end protocol, block

formats, an abstract service description for the

exchange of messages (bundles) in DTN

(19)

p2p Wireless Networks Delay And Disruption Tolerant Networks Anonymous Networks

Routing in Delay and Disruption Tolerant Networks Definition: next hop decision process

Complex decision due to DTN characteristics

Classification: based on the number of copies, geographical, probabilistic, epidemic...

Routing code is located in the intermediate nodes

Lack of proposals for scenarios with different applications with different routing needs

(20)

p2p Wireless Networks Delay And Disruption Tolerant NetworksTORAnonymous Networks

Contents

1

A peer-to-peer architecture

2

Wireless Networks

3

Delay And Disruption Tolerant Networks

4

Anonymous Networks

TOR

(21)

p2p Wireless Networks Delay And Disruption Tolerant NetworksTORAnonymous Networks

TOR, the Onion Router

Definition: System intended to enable online anonymity.

Onion Routing refers to the layered nature of the

encryption service: The original data are encrypted

and re-encrypted multiple times, then sent through

successive Tor relays, each one of which decrypts a

l.layer"of encryption before passing the data on to the

next relay and, ultimately, its destination.

References

Related documents

Based on the findings discussion above the researcher concluded that the film The Conjuring 2 Enfield Poltergeist contain introvertive mysticism as well as

Reporting. 1990 The Ecosystem Approach in Anthropology: From Concept to Practice. Ann Arbor: University of Michigan Press. 1984a The Ecosystem Concept in

We amend the real EF data by generating a certain number of papers by author X and linking each of them with 35 randomly chosen users (35 is the average paper degree in the

According to table 2, 55 % of the teachers felt that the chemistry laboratories in their schools were not adequate, particularly in terms of space, furniture, apparatus,

It focuses on research that extracts and makes use of the concepts, relations, facts and descriptions found in Wikipedia, and organizes the work into four

The Lithuanian authorities are invited to consider acceding to the Optional Protocol to the United Nations Convention against Torture (paragraph 8). XII-630 of 3

Insurance Absolute Health Europe Southern Cross and Travel Insurance • Student Essentials. • Well Being