Internet Indirection Infrastructure (i3) Ion Stoica Daniel Adkins Shelley Zhuang Scott Shenker...

Preview:

Citation preview

Internet Indirection Infrastructure (i3)

Ion Stoica Daniel Adkins Shelley Zhuang Scott Shenker Sonesh Surana

(Published in SIGCOMM 2002)

URL: http://i3.cs.berkeley.edu/publications/papers/i3-sigcomm.pdf

Presented By: Arati Baliga

Motivation

Internet architecture was designed for point to point communicationCommunication services like multicast, anycast , mobility faced deployment challenges.i3 provides an application level solution to this problem.Decouples act of sending from act of receiving by adding a level of indirection to this process.

i3 Overview

Packet types:<id, data><id, addr>

Communication abstractions

Stack Identifiers

An identifier stack is a list of identifiers that takes the form (id1,id2, …,idn) where idi is either an identifier or an address. Packets and triggers are

Packet P = (idstack , data)

Trigger T = (id, idstack)

Identifier stacks used in service compostion, hetrogeneous multicast and improve robustness of i3.

Service Composition

Scalable Multicast

Chord

Security

• Eavesdropping - Private triggers• Trigger Hijacking - add another level of indirection• DoS Attacks

• End-Hosts (sends a random nonce as challenge)• Trigger Loops (fair share of resources, loop

detection on trigger insert)

• Anonymity: Inherent. Eavesdropping on traffic of sender does not reveal receiver identity.

Simulations

Simulations

Performance Evaluation

Performance Evaluation

Performance Evaluation

Recommended