Skip to main content

Indirection Infrastructures

  • Chapter
  • First Online:
  • 1372 Accesses

Abstract

The Host Identity Indirection Infrastructure (Hi3) is a general-purpose networking architecture, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Protocol (HIP). Hi3 combines efficient and secure end-to-end data plane transmission of HIP with robustness and resilience of i3. The architecture is well-suited for mobile hosts given the support for simultaneous host mobility, rendezvous and multi-homing. Although an Hi3 prototype is implemented and tested on PlanetLab, scalability properties of Hi3 for a large number of hosts are unknown. In this chapter, we propose a simple model for bounds of size and latency of the Hi3 control plane for a large number of clients and in the presence of DoS attacks. The model can be used for a first approximation study of a large-scale Internet control plane before its deployment. We apply the model to quantify the performance of the Hi3 control plane. Our results show that the Hi3 control plane can support a large number of mobile hosts with acceptable latency.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    This section includes text and figures from an article published in Computer Communications 29(17):3591–3601 by D. Korzun and A. Gurtov, On Scalability Properties of the Hi3 Control Plane, © Elsevier 2006.

  2. 2.

    Available at http://i3.cs.berkeley.edu.

  3. 3.

    Throughout this chapter we use the term w.h.p. to mean with probability at least \(1 - c/N\) for some constant \(0 < c \ll N\), where N is the size of network.

  4. 4.

    In this case, a pure association setup and a double-jump would take 3 and 0.5 s, respectively.

References

  1. Adkins, D., Lakshminarayanan, K., Perrig, A., Stoica, I.: Towards a more functional and secure network infrastructure. Tech. Rep. UCB/CSD-03-1242, University of California, Berkeley (2003)

    Google Scholar 

  2. Balakrishnan, H., Lakshminarayanan, K., Ratnasamy, S., Shenker, S., Stoica, I., Walfish, M.: A layered naming architecture for the internet. In: Proceedings of ACM SIGCOMM’04, pp. 343–352. ACM, New York (2004)

    Google Scholar 

  3. Clark, D., Braden, R., Falk, A., Pingali, V.: FARA: Reorganizing the addressing architecture. ACM SIGCOMM Comput. Commun. Rev. 33(4), 313–321 (2003)

    Google Scholar 

  4. Ford, B.: Unmanaged Internet Protocol: taming the edge network management crisis. ACM SIGCOMM Comput. Commun. Rev. 34(1), 93–98 (2004)

    Google Scholar 

  5. Francis, P.: IPNL: A NAT-extended internet architecture. In: Proceedings of ACM SIGCOMM’01. ACM, New York (2001)

    Google Scholar 

  6. Gurtov, A., Koponen, T.: Hi3 implementation for Linux (2005). Available at http://infrahip.hiit.fi and http://www.openhip.org Available at http://infrahip.hiit.fi/ and http://www.openhip.org/. Accessed Oct. 2012

  7. Gurtov, A., Korzun, D., Nikander, P.: Hi3: An efficient and secure networking architecture for mobile hosts. Tech. Rep. TR-2005-2, HIIT (2005)

    Google Scholar 

  8. Henderson, T.R., Ahrenholz, J.M., Kim, J.H.: Experience with the Host Identity Protocol for secure host mobility and multihoming. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’03), 3, pp. 2120–2125, IEEE (2003)

    Google Scholar 

  9. Johnson, D.B., Perkins, C., Arkko, J.: Mobility support in IPv6. RFC 3775, IETF (2004) http://tools.ietf.org/html/rfc3775

  10. Jokela, P., Nikander, P., Melen, J., Ylitalo, J., Wall, J. Host Identity Protocol: Achieving IPv4 – IPv6 handovers without tunneling. Evolute workshop 2003, University of Surrey, Guildford, UK (2003)

    Google Scholar 

  11. Joseph, D., Kannan, J., Kubota, A., Lakshminarayanan, K., Stoica, I., Wehrle, K.: OCALA: an architecture for supporting legacy applications over overlays. In: NSDI’06: Proceedings of the 3rd Conference on 3rd Symposium on Networked Systems Design & Implementation (2006) USENIXAssociation,USA. http://usenix.org/events/nsdi06/tech/full_papers/joseph/joseph.pdf

  12. Malkhi, D., Naor, M., Ratajczak, D.: Viceroy: a scalable and dynamic emulation of the butterfly. In: PODC ’02: Proceedings of 21st Annual Symposium on Principles of Distributed Computing, pp. 183–192. ACM, New York (2002). doi: http://doi.acm.org/10.1145/571825.571857

  13. Moskowitz, R., Nikander, P.: Host identity protocol architecture: draft-ietf-hip-arch-02.txt (2005, work in progress, expired in August) http://www.ietf.org/rfc/rfc4423.txt

  14. Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.R.: Host Identity Protocol: draft-ietf-hip-base-10 (2007, work in progress, expired in May 2008) http://tools.ietf.org/html/rfc5201

  15. Nikander, P., Ylitalo, J., Wall, J.: Integrating security, mobility, and multi-homing in a HIP way. In: Proceedings of Network and Distributed Systems Security Symposium (NDSS’03). Internet Society, San Diego (2003)

    Google Scholar 

  16. Nikander, P., Arkko, J., Ohlman, B.: Host identity indirection infrastructure (hi3). In: The Second Swedish National Computer Networking Workshop (2004)

    Google Scholar 

  17. Nikander, P., Arkko, J., Henderson, T.: End-host mobility and multi-homing with host identity protocol: draft-ietf-hip-mm-05 (2007, work in progress, expired in September 2007) http://tools.ietf.org/html/rfc5206

  18. Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of ACM SIGCOMM’01, pp. 149–160. ACM, New York (2001)

    Google Scholar 

  19. Stoica, I., Adkins, D., Zhuang, S., Shenker, S., Surana, S.: Internet indirection infrastructure. In: Proceedings of ACM nSIGCOMM’02, pp. 73–88. ACM, New York (2002)

    Google Scholar 

  20. Tschofenig, H., Shanmugam, M.: Traversing HIP-aware NATs and Firewalls: problem Statement and Requirements: draft-tschofenig-hiprg-hip-natfw-traversal-04 (2006) http://tools.ietf.org/html/draft-tschofenig-hiprg-hip-natfw-traversal-06

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Korzun, D., Gurtov, A. (2013). Indirection Infrastructures. In: Structured Peer-to-Peer Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5483-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5483-0_12

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5482-3

  • Online ISBN: 978-1-4614-5483-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics