Abstract
The Host Identity Indirection Infrastructure (Hi3) is a general-purpose networking architecture, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Protocol (HIP). Hi3 combines efficient and secure end-to-end data plane transmission of HIP with robustness and resilience of i3. The architecture is well-suited for mobile hosts given the support for simultaneous host mobility, rendezvous and multi-homing. Although an Hi3 prototype is implemented and tested on PlanetLab, scalability properties of Hi3 for a large number of hosts are unknown. In this chapter, we propose a simple model for bounds of size and latency of the Hi3 control plane for a large number of clients and in the presence of DoS attacks. The model can be used for a first approximation study of a large-scale Internet control plane before its deployment. We apply the model to quantify the performance of the Hi3 control plane. Our results show that the Hi3 control plane can support a large number of mobile hosts with acceptable latency.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
This section includes text and figures from an article published in Computer Communications 29(17):3591–3601 by D. Korzun and A. Gurtov, On Scalability Properties of the Hi3 Control Plane, © Elsevier 2006.
- 2.
Available at http://i3.cs.berkeley.edu.
- 3.
Throughout this chapter we use the term w.h.p. to mean with probability at least \(1 - c/N\) for some constant \(0 < c \ll N\), where N is the size of network.
- 4.
In this case, a pure association setup and a double-jump would take 3 and 0.5 s, respectively.
References
Adkins, D., Lakshminarayanan, K., Perrig, A., Stoica, I.: Towards a more functional and secure network infrastructure. Tech. Rep. UCB/CSD-03-1242, University of California, Berkeley (2003)
Balakrishnan, H., Lakshminarayanan, K., Ratnasamy, S., Shenker, S., Stoica, I., Walfish, M.: A layered naming architecture for the internet. In: Proceedings of ACM SIGCOMM’04, pp. 343–352. ACM, New York (2004)
Clark, D., Braden, R., Falk, A., Pingali, V.: FARA: Reorganizing the addressing architecture. ACM SIGCOMM Comput. Commun. Rev. 33(4), 313–321 (2003)
Ford, B.: Unmanaged Internet Protocol: taming the edge network management crisis. ACM SIGCOMM Comput. Commun. Rev. 34(1), 93–98 (2004)
Francis, P.: IPNL: A NAT-extended internet architecture. In: Proceedings of ACM SIGCOMM’01. ACM, New York (2001)
Gurtov, A., Koponen, T.: Hi3 implementation for Linux (2005). Available at http://infrahip.hiit.fi and http://www.openhip.org Available at http://infrahip.hiit.fi/ and http://www.openhip.org/. Accessed Oct. 2012
Gurtov, A., Korzun, D., Nikander, P.: Hi3: An efficient and secure networking architecture for mobile hosts. Tech. Rep. TR-2005-2, HIIT (2005)
Henderson, T.R., Ahrenholz, J.M., Kim, J.H.: Experience with the Host Identity Protocol for secure host mobility and multihoming. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’03), 3, pp. 2120–2125, IEEE (2003)
Johnson, D.B., Perkins, C., Arkko, J.: Mobility support in IPv6. RFC 3775, IETF (2004) http://tools.ietf.org/html/rfc3775
Jokela, P., Nikander, P., Melen, J., Ylitalo, J., Wall, J. Host Identity Protocol: Achieving IPv4 – IPv6 handovers without tunneling. Evolute workshop 2003, University of Surrey, Guildford, UK (2003)
Joseph, D., Kannan, J., Kubota, A., Lakshminarayanan, K., Stoica, I., Wehrle, K.: OCALA: an architecture for supporting legacy applications over overlays. In: NSDI’06: Proceedings of the 3rd Conference on 3rd Symposium on Networked Systems Design & Implementation (2006) USENIXAssociation,USA. http://usenix.org/events/nsdi06/tech/full_papers/joseph/joseph.pdf
Malkhi, D., Naor, M., Ratajczak, D.: Viceroy: a scalable and dynamic emulation of the butterfly. In: PODC ’02: Proceedings of 21st Annual Symposium on Principles of Distributed Computing, pp. 183–192. ACM, New York (2002). doi: http://doi.acm.org/10.1145/571825.571857
Moskowitz, R., Nikander, P.: Host identity protocol architecture: draft-ietf-hip-arch-02.txt (2005, work in progress, expired in August) http://www.ietf.org/rfc/rfc4423.txt
Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.R.: Host Identity Protocol: draft-ietf-hip-base-10 (2007, work in progress, expired in May 2008) http://tools.ietf.org/html/rfc5201
Nikander, P., Ylitalo, J., Wall, J.: Integrating security, mobility, and multi-homing in a HIP way. In: Proceedings of Network and Distributed Systems Security Symposium (NDSS’03). Internet Society, San Diego (2003)
Nikander, P., Arkko, J., Ohlman, B.: Host identity indirection infrastructure (hi3). In: The Second Swedish National Computer Networking Workshop (2004)
Nikander, P., Arkko, J., Henderson, T.: End-host mobility and multi-homing with host identity protocol: draft-ietf-hip-mm-05 (2007, work in progress, expired in September 2007) http://tools.ietf.org/html/rfc5206
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of ACM SIGCOMM’01, pp. 149–160. ACM, New York (2001)
Stoica, I., Adkins, D., Zhuang, S., Shenker, S., Surana, S.: Internet indirection infrastructure. In: Proceedings of ACM nSIGCOMM’02, pp. 73–88. ACM, New York (2002)
Tschofenig, H., Shanmugam, M.: Traversing HIP-aware NATs and Firewalls: problem Statement and Requirements: draft-tschofenig-hiprg-hip-natfw-traversal-04 (2006) http://tools.ietf.org/html/draft-tschofenig-hiprg-hip-natfw-traversal-06
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Korzun, D., Gurtov, A. (2013). Indirection Infrastructures. In: Structured Peer-to-Peer Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5483-0_12
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5483-0_12
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5482-3
Online ISBN: 978-1-4614-5483-0
eBook Packages: Computer ScienceComputer Science (R0)