Upload
seth-hoover
View
218
Download
0
Embed Size (px)
Citation preview
Transient Network Architecture
http://hdl.handle.net/2118/tna
Joud KhouryUniversity of New Mexico, ECE department
CNRIHandle System Workshop, Washington DC
June 21
Credits
• Funded by NSF Future Internet Design (FIND) Grant CNS-0626380
• Website: http://hdl.handle.net/2118/tna• People
Henry Jerez, CNRI Joud Khoury, Chaouki Abdallah, Greg
Heileman, Pramod Jamkhedar, Wennie Shu, Jorge Crichigno, Jorge Piovesan – UNM
Outline
• Overview of TNA• Mobility and Persistent Identification• How/where is it applied?
InterMesh instantiation of TNA VoIP using handles Digital Rights Management within TNA
• References
What is TNA
• It is an architecture that postulates that: All networks can be reduced to a
particular case of persistently identified, transient, mobile, abstract entities that group into particular association
• It is an abstraction based persistent communication network for transient digital entities
TNA Principles
• Mobility and Ad Hoc characteristics as basic requirements
• Abstraction as the basis of internetworking and functionality
• Persistent Identification
Mobility and Ad Hoc characteristics
• Mobility is the ability of nodes to change association without breaking referential integrity.
• All components of the architecture are to be considered transient and mobile The components must operate in both
Connected = Full cohesive communication with the larger structure is assumed
Disconnected = limited or no connectivity with other groupings is possible
• While consolidation is possible; all processes, services and mechanisms should assume a mobile deployment environment.
Persistent Identification
• Persistent Identifier=Handle• Persistently identify:
globally Digital entities: Network components Communicating entities
Services Processes
• Identification is based on a set of unique naming spaces with a distributed resolution on a need to know basis
How do we use PI’s
• We identify all network entities with persistent identifiers
• We use these identifiers to route all traffic in the network
• We identify particular network associations with persistent identifiers
• We provide secure distributed administration
• This enables seamless mobility
How do the pieces fit together
What can it do
• Enables new transmission paradigms• It can move functionality at will • Allows current and future network to
coexist and seamlessly integrate
Current Research Tracks
• The MESH Network AoI Instantiation – InterMesh and voice over Intermesh
• Agent Coordination• Basic DRM expressiveness
InterMesh MotivationVarious types of local networks; WMNs, WSNs, PANs.WMN particularly interesting? Advantages, connectivity models, suitable for WLAN, WMAN, WVAN, include ad-hoc, …
A growing need for inter-networking among heterogeneous networks
IP? Some limitations: overloading the address, absence of trustworthiness
Fundamental design shifts needed -> InterMesh
Motivation
Mesh Interworking
Topology learningRouting/forwarding
MeasurementManagement
QoS
Medium Access Control
IEEE 802.11 PHYL1
L3
A growing need for inter-networking among heterogeneous (mesh) networks
L2 – 802.11s(expected)
Persistent Identification (PI) Layer
Architecture model
Core
AoI-1
AoI-2
AoI: Area of Influence
Node
Architecture
Core
AoI-1
AoI-2
AoI: Area of Influence
Agents
Nodes
PI Entity
Pi-3
Pi-4
PI
L2
L1
Pi-1
Pi-2
Pi-1 Pi-2
Ref
NeutralEnvironment
Agents
Core
AoI-1
Agent 1
Agent 2
Agent 3
AoI-2 AoI-3
How does Pi-1 know Pi-2 location?
A closer look at local delivery
Address resolution – ARP
Pi-1Local A: AA
Pi-2Local A: ZZ
Internet
AoI-1
Agent 1
Agent 2
Agent 3
AoI-2 AoI-3
Inter-network
Pi-1Local A: AA
Pi-2Local A: ZZ
Pi-3Local A: BB
1. Is Pi-3 in Ao1-1? ARP
2. Pi-3 is not in the local network -> send the data to the Agent2
3. Agent2 routes the data
4. Agent3 sends the data to BB
Agent 3PI Local A
… …
Mike BB
… …
Pi-3
Core
AoI-1 Agent 1
Agent 2
Agent 3
AoI-2 AoI-3
Mobility
Pi-1Local A: AA
Pi-2Local A: ZZ
Pi-3Local A: BB
A proactive discovering protocol to keep bound with the core
SIP Proxy/Registrar(10.200/fproxy)
Foreign Domain: fdomain
Previous work – VoIP Sessions and Mobility
SIP Proxy/Registrar(2118/hproxy)
Home Domain: hdomain
Sessions and Mobility
3User: r_userHandle: 2118/r_user
SIP Proxy/Registrar(2118/hproxy)
SIP Proxy/Registrar(10.200/fproxy)
Home Domain: hdomain
Foreign Domain: fdomain
Traditional traffic flowProposed traffic flow
c
INTERNET
Handle System
REGISTER
correspondent(c_user)
Foreign Domain: cdomain
SIP Proxy/Registrar
1
3
2
a d
H-SIP Abstraction
• SIP users and Proxy servers identified with handles instead of URI and Domain names eliminating any domain binding
User Handle
Proxy Handle
Registration - Measurements
• Average Registration times 10,000 samples dispersed over 10 days cA tt
ms
5
39
Call Establishment - Measurements
is the diff in cumulative RT delay
Note: Presumably large geographical separation between the roaming user and his home server
We outperform as long as > x
IDEAIndirect DRM Evaluation
Architecture
• Rely on persistent identifiers to convey Rights information
• All content and Users identified with Persistent Identifiers. All licenses and rights identified with persistent identifiers
• Use a dynamic evaluation mechanism that relies on a layered rights expression and enforcement model
Layered Model
• Persistent identifiers allow referential integrity at every layer
• Layers are not only logically but physically independent
Dynamic evaluation
• In TNA where even services are mobile; DRM evaluation along with validation resources are based on persistent Identifiers
• Persistent Identifiers weave the different layers and services together
• DRM computation is therefore a heterogeneous diverse ecosystem rather than a vertically integrated solution
TNA principles and Rights Mobility
• Based on TNA principles all components of the architecture are mobile and transient ness is assumed
• The system can then use opportunistic connectivity and realm based interconnection to conform new enforcement areas
• The System provides first class presence to all members and their interests: From the owned to the final consumer and provides them with the flexibility they need to operate in a more real environment.
Current Application models
• Heterogeneous License compatibility and evaluation
• Intrinsic authorization and validation• New features and traditional
behaviors: Loans Second level market New Business models
References
• TNA H. Jerez, J. Khoury, and Chaouki Abdallah, “The Transient Network
Architecture”, in arXiv.• InterMesh instantiation of TNA
J. Khoury, J. Crichigno, H. Jerez, C. Abdallah, W. Shu, and G. Heileman, “The intermesh network architecture,” under review IEEE Network Magazine.
• VoIP using handles J. Khoury, H. Jerez, C. Abdallah “Efficient User Controlled Inter-Domain SIP
Mobility Authentication, Registration, and Call Routing”, to appear in 1st International Workshop on Security and Privacy, SPEUCS 2007, Philadelphia, PA, August 2007.
J. Khoury, H. Jerez, C. Abdallah “H-SIP: Inter-domain SIP mobility: Design”, in Consumer Communications and Networking Conference, CCNC 2007, Las Vegas, NV, Jan 2007.
• Digital Rights Management within TNA G. L. Heileman and P. A. Jamkhedkar, DRM Interoperability Analysis from the
Perspective of a Layered Framework, Proceedings of the 5th ACM workshop on Digital Rights Management, Nov. 2005, Virginia, USA.
P. A. Jamkhedkar, G. L. Heileman and Ivan Martinez-Ortiz, The Problem With Rights Expression Languages, Proceedings of the 6th ACM workshop on Digital Rights Management, Oct-Nov. 2006, Virginia, USA.