1 Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

EE384y: Packet Switch Architectures
AP STUDY SESSION 2.
1
Distributed Systems Architectures
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Processes and Operating Systems
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
1 Hyades Command Routing Message flow and data translation.
1 Introducing the Specifications of the Metro Ethernet Forum MEF 19 Abstract Test Suite for UNI Type 1 February 2008.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt BlendsDigraphsShort.
1 Chapter 12 File Management Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Multipath Routing for Video Delivery over Bandwidth-Limited Networks S.-H. Gary Chan Jiancong Chen Department of Computer Science Hong Kong University.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
Chapter 5 – Enterprise Analysis
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
Local Area Networks - Internetworking
PP Test Review Sections 6-1 to 6-6
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 31 Slide 1 Service-centric Software Engineering.
Seungmi Choi PlanetLab - Overview, History, and Future Directions - Using PlanetLab for Network Research: Myths, Realities, and Best Practices.
1 Atomic Routing Games on Maximum Congestion Costas Busch Department of Computer Science Louisiana State University Collaborators: Rajgopal Kannan, LSU.
The Weighted Proportional Resource Allocation Milan Vojnović Microsoft Research Joint work with Thành Nguyen Microsoft Research Asia, Beijing, April, 2011.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Chapter 10: Virtual Memory
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
Bellwork Do the following problem on a ½ sheet of paper and turn in.
CS 6143 COMPUTER ARCHITECTURE II SPRING 2014 ACM Principles and Practice of Parallel Programming, PPoPP, 2006 Panel Presentations Parallel Processing is.
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Chapter 20 Network Layer: Internet Protocol
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 10 Routing Fundamentals and Subnets.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Executional Architecture
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Copyright © 2008 Pearson Addison-Wesley. All rights reserved. Chapter 12 Keynesian Business Cycle Theory: Sticky Wages and Prices.
Essential Cell Biology
1 Phase III: Planning Action Developing Improvement Plans.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
PSSA Preparation.
Chapter 11 Creating Framed Layouts Principles of Web Design, 4 th Edition.
Immunobiology: The Immune System in Health & Disease Sixth Edition
Physics for Scientists & Engineers, 3rd Edition
Energy Generation in Mitochondria and Chlorplasts
© Paradigm Publishing, Inc Excel 2013 Level 2 Unit 2Managing and Integrating Data and the Excel Environment Chapter 6Protecting and Sharing Workbooks.
Implementing Strategy in Companies That Compete in a Single Industry
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Chapter 5 The Mathematics of Diversification
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Overcoming the Internet Impasse through Virtualization Presented by: Aaron Ballew Sagar Vemuri Larry Peterson, Scott Shenker, Jonathan Turner.
CS 268: Future Internet Architectures Ion Stoica May 6, 2003.
The Future of Internet Research Scott Shenker (on behalf of many networking collaborators)
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Tussel in Cyberspace Based on Slides by I. Stoica.
Overcoming the Internet Impasse through Virtualization Defense Chen, Jiazhen & Teng, Xian Yi.
Designing for the Future
Presentation transcript:

1 Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA CS 268: Lecture 24 Designing for the Future

2 Issues for the Future  Future designs (last lecture)  Evolving the Internet to incorporate these designs  Living in the brave new world

3 We Aren’t in Kansas Anymore...  Internet was designed in cohesive environment -Everyone had the same goals, worked together  The Internet is now fully commercial  There are many competing interests -Users no longer share same goals -Providers now compete with each other

4 User Cooperation?  Originally users were all part of a joint endeavor  Now, each user is engaged in their own task -Often completely unaware of other users -Care only about own performance  Why should we assume users will cooperate? -Why wouldn’t they act selfishly?

5 Congestion Control  Each user’s performance is a function of bandwidth and delay/drops  Users adjust their sending rate to maximize their performance  What is the resulting equilibrium? -FIFO routers: terrible! -FQ routers: very good! (detailed game theory analysis)

6 Example  U i = r i /d i  Poisson: d i =1/(1-r tot )  Social Optimal: r tot = 1/2, U tot = 1/4  Nash Equilibrium w/FIFO: r tot = n/(n+1), U tot = (n+1) -2  Nash Equilibrium with FQ: social optimal

7 Designing for Selfishness  Assume every user (provider) cares only about their own performance (profit)  Give each user a set of actions  Design a “mechanism” that maps action vectors into a system-wide outcome  Choose a mechanism so that user selfishness leads to socially desirable outcome -Nash equilibrium, strategy-proof, etc.

8 Interdomain Routing  Assume ISPs incur costs for carrying packets  Want to decrease total costs by carrying packets over lowest cost paths  How to get ISPs to declare costs without lying?  General approach: VCG mechanism -generalization of 2nd price auction  Only slightly more complicated than BGP

9 Incentives in Practice  See UW paper on practical uses of incentives

10 Tussle Paper  Conflicting interests are inevitable, and ever-changing  Accept the presence of tussles, and design accordingly

11 Designing for Tussle  Design for choice, not for outcome -separate mechanism from policy  Modularize design along tussle boundaries

12 Interfaces  Make value visible: allow parties with compatible interests to reach equilibrium  Make costs visible: allow parties to make informed choices  Provide tools to isolate and resolve faults/failures

13 Competition  Key to innovation is competition  Only the fear of competition will lead ISPs to adopt new designs, offer new services  Competition will only arise when users have “choice” -choice in local ISP -choice in downstream ISPs e.g., route control to guide packets to ISPs with better service  What do you think?

14 Another Viewpoint  Basic Internet service not a viable business  Competition will only lead to everyone going broke  Need to create public Internet service providers -Back to the future.....

15 Yet Another Viewpoint  New services (QoS, Multicast) weren’t adopted because inter-provider agreements are too primitive  They don’t make value visible, so that ISPs can’t charge for giving better service -they can do so for users, but not between themselves!  Can’t give users choice without passing on costs appropriately

16 Discussion

17 Still Another Viewpoint  “Overcoming the Internet Impasse through Virtualization” -hotnets this year

18 The Paper’s Fundamental Assumption  The Internet’s current evolutionary path will not adequately meet our future needs -Security -Reliability -New application and user requirements -…..  We will need a significant architectural change -Perhaps not now, but eventually

19 Our Founding (Funding) Fable  Researchers invent new architectures  Architectures are validated on a testbed  IETF, ISPs, and router vendors collaborate to deploy new design

20 Do Traditional Testbeds Really Test?  Production-oriented testbeds: -Real traffic provides good validation -But can test only very incremental changes  Research-oriented testbeds: -Can test radical architectures -Lack of real traffic results in poor validation  Both are expensive (dedicated bandwidth)

21 What about Deployment?  Architectural change requires ISP consensus -Hard to agree -No competitive advantage from architectural innovation -All have huge sunk investment in the status quo  ISPs are unlikely candidates for architectural change  Architecture isn’t just static, its decaying -Ad hoc workarounds muddy the architectural waters

22 We Are at an Impasse  We can’t test new architectures -Despite sizable investments in testbeds  We can’t deploy new architectures -And things are getting worse, not better  Yet there are pressing requirements for which the current architecture is not well suited

23 The Community’s Response  Focus on areas where we can have impact: -Empirical studies -Incremental changes (subject to current constraints)  Small stream of architectural proposals -Paper designs without hope of deployment -More science fiction than engineering  Have largely abandoned hope of effecting fundamental architectural change -Living with, rather than overcoming, the impasse

24 Overcoming the Impasse?  Must be able to test new architectures: -Wide range of architectures -Real traffic from willing individuals -Low overhead for individual researchers  Must have a plausible deployment story -Not probable, just plausible -Avoid need for ISP action or consensus

25 Testing: Virtual Testbed  Overlay testbed: (think RON, etc.) -No dedicated bandwidth -Host proxy directs packets to overlay Proxy must architecturally neutral, and flexible -Individuals (anywhere) opt-in by turning on proxy  Shared infrastructure (think Planetlab) -Not everyone is David Andersen…. -Overlay nodes shared among experiments Slicing on per-packet timescales  Forget about delivering strict QoS

26 You’ve Heard This All Before….  E. g. Xbone, Virtual Internet, etc. -But our emphasis is on generality and sharing -Implementation and philosophical issue  Has the desired properties: -Low overhead for individual researchers -Real traffic provided by “coalition of the willing”  Goal: revive “applied” architectural research -Make testing almost as commonplace as simulation

27 Deployment: Standard Overlay Story  Next Generation Service Provider (NGSP): -Deploys overlay supporting new architecture -Distributes proxy -Provides support for legacy apps (Msoft?)  Unilateral deployment, by new entrants -No consensus, no sunk investment  What’s new? Nothing but the attitude…. -Current overlays address narrowly scoped issues -We advocate using overlays for more radical changes

28 Pondering Success  The deployment story is plausible, but unlikely  What if it did succeed?  Two extreme scenarios

29 The Purist Scenario  Periods of architectural stability followed by disruptive change to new coherent architecture -In quiescence, a pure well-defined architecture  Key to evolving the architecture: -Proxy support  Virtualization is a means -For testing and deploying new architecture

30 The Pluralist Scenario  Many different architectures simultaneously available -No clear distinction between architecture and services  Key to evolving the architecture: -Virtual link establishment and virtual routers -Substrate for deploying overlays is new “waist” -Planetlab becomes model for Internet  Virtualization becomes an end in itself

31 Purists vs Pluralists  Purists: -Architecture specified by universal protocol (e.g., IP) -Goal: long-term flexibility and applicability -Challenge: foreseeing future needs  Pluralists: -IP is just one component of the Internet “system” -“Architecture” arises from union of overlays, etc. -Goal: meet short-term needs to attract users -Challenge: how can apps/users cope with diversity?

32 Three Discussion Questions  Intellectual: What architecture would we choose? -Is it sufficiently better?  Procedural: How can we achieve synergy? -Or will we continue along our disparate paths?  Philosophical: Are we purists or pluralists? -Do we have a choice?

33 The Ultimate Pluralist: Active Networking  Seminal work: D. Tannenhouse and D. Wetherall ’96 -Routers can download and execute remote code -At extreme, allow each user to control its packets User 2: Multicast User 1: RED

34 An Active Node Toolkit: ANTS  Add active nodes to infrastructure IP routersActive nodes

35 Active Nodes  Provide environment for running service code -Soft-storage, routing, packet manipulation  Ensure safety -Protect state at node; enforce packet invariants  Manage local resources -Bound code runtimes and other resource consumptions

36 Where Is the Code?  Packets carry the code -Maximum flexibility -High overhead  Packets carry reference to the code -Reference is based on the code fingerprint: MD5 (128 bits) -Advantages: Efficient: MD5 is quick to compute Prevents code spoofing: verify without trust packet code packet code reference

37 Code Distribution  End-systems pre-load code  Active nodes load code on demand and then cache it previous node loading node request time packet code responses packet

38 Applications  Protocol versions  Multicast  Mobility  Various specialty applications (packet auctions) ......

39 Practical Issues  Efficiency/Performance: largely solved problem  Node-level protection: largely solved problem  Network-level protection: unsolved -hard to prevent routing loops, too many generated messages, etc. -have to rely on “certified” programs, approved by administrative authorities

40 Philosophical Issues  E2E argument  ISP adoption  Spectrum of options 

41 Active Networking and the E2E Principle?  Is active networking in accord with the E2E principle?

42 Clark, Saltzer, and Reed End-to-end arguments address design more than implementation and implementation more than execution-- that is, they suggest who should provide the code, not which box it should run on.

end-to-end arguments have not one, but two complementary goals: Higher-level layers, more specific to an application, are free to (and thus expected to) organize lower-level network resources to achieve application-specific design goals efficiently. (application autonomy) Lower-level layers, which support many independent applications, should provide only resources of broad utility across applications, while providing to applications usable means for effective sharing of resources and resolution of resource conflicts. (network transparency)

44  While making lower layers more active or programmable is likely to enhance application autonomy, the risk is that programmable lower layers may reduce network transparency. The reason is that a key element of transparency is some ability to predict how the network will behave.

45 Will ISPs Adopt?  If ISPs aren’t willing to adopt individual services (e.g., multicast), why would they be willing to adopt Active Networking?  If ISPs aren’t willing, then deploying Active Nodes at the application level is merely another form of an overlay network  If ISPs are willing to deploy code, then why isn’t this just a case of programmable routers

46 Taxonomy User ControlAdministrative Control RoutersCanonical Active NetworkingProgrammable Routers App-level Servers(Planetlab??)Overlay Networks

47 Discussion  What is the future of Internet architecture? -294 next year on Internet architecture  Will there be significant changes in the next five years?