1.End to end arguments in system design (1981) 2.Tussles in cyberspace: Defining Tomorrow’s Internet (2005) Nick McKeown CS244 Lecture 3 Architecture and.

Slides:



Advertisements
Similar presentations
End-to-End Arguments in System Design
Advertisements

Layering and the network layer CS168, Fall 2014 Sylvia Ratnasamy
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Information-Centric Networks02b-1 Week 2 / Paper 2 Tussle in Cyberspace: Defining Tommorow’s Internet –David D. Clark, John Wroclawski, Karen R. Sollins.
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
Copyright 2008 Kenneth M. Chipps Ph.D. Cisco CCNA Exploration CCNA 2 Routing Protocols and Concepts Chapter 4 Distance Vector Routing Protocols.
Shortest Paths and Dijkstra's Algorithm CS 110: Data Structures and Algorithms First Semester,
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
End-to-End Arguments in System Design J.H. Saltzer, D.P. Reed and D.D Clark M.I.T. Laboratory for Computer Science Presented by Jimmy Pierce.
SDN and Openflow.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
ISOC-Chicago 2001John Kristoff - DePaul University1 Journey to the Center of the Internet John Kristoff DePaul University.
End-To-End Arguments in System Design J.H. Saltzer, D.P. Reed, and D. Clark Presented by: Ryan Huebsch CS294-4 P2P Systems – 9/29/03.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Networks 1 CS502 Spring 2006 Network Input & Output CS-502 Operating Systems Spring 2006.
Transmission Control Protocol (TCP) and Packet-Switching Hardware Devang Parekh EE290F 4/15/04.
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
CS-3013 & CS-502, Summer 2006 Network Input & Output1 CS-3013 & CS-502, Summer 2006.
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
1 CS 4396 Computer Networks Lab Dynamic Routing Protocols - II OSPF.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
Common Devices Used In Computer Networks
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 18 Omar Meqdadi Department of Computer Science and Software Engineering University.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
Distributed Location-aware Transmission for Ad-Hoc Networks Bey-Ling Su 1/29/2004.
Network Architecture: Design Philosophies IS250 Spring 2010 John Chuang
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
End-To-End Arguments in System Design J.H. Saltzer, D.P. Reed, and D. Clark Presented by: Amit Mondal.
Preserve and Enhance: Balancing Goals for the Internet APRICOT Kuala Lumpur – 2004 Dave Crocker Brandenburg InternetWorking APRICOT Kuala Lumpur – 2004.
Tussle in Cyberspace: Defining Tomorrow’s Internet Presented by: Khoa To.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
Slide 1, hlu & faynberg Trends in Network Evolution Igor Faynberg, Ph.D. Hui-Lan Lu, Ph.D. Bell Labs, Lucent Technologies Multimedia Convergence Workshop.
Copyright 2002 Stephen F. Bush1 Three Points to Remember Active Networks Are Cool Active Networks Are Cool Active Networks Can Be At Least As Secure As.
Tunneling Continued/ End-to-End Principle CS 4251: Computer Networking II Nick Feamster Spring 2008.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
On Firewalls Fred Baker and Paul Hoffman draft-ietf-opsawg-firewalls-01.txt.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
An Engineering Perspective on the Layered and End-to-End Approaches Christopher S. Yoo University of Pennsylvania Law School May 6, 2010.
SDN challenges Deployment challenges
Presented by Muhammad Abu Saqer
Software Defined Networking (SDN)
Network Routing.
ECE453 – Introduction to Computer Networks
Shortest Path Algorithm for Weighted Non-negative Undirected Graphs
CE 221 Data Structures and Algorithms
Dijkstra's Shortest Path Algorithm
CSE 542: Operating Systems
CS 381: Introduction to Computer Networks
CSE 542: Operating Systems
Graphs: Shortest path and mst
Announcements You need to register separately for the class mailing list and online paper review system. Do it now so that we can work out any “bugs”.
Architecture and Principles
Control-Data Plane Separation
Presentation transcript:

1.End to end arguments in system design (1981) 2.Tussles in cyberspace: Defining Tomorrow’s Internet (2005) Nick McKeown CS244 Lecture 3 Architecture and Principles

2 End-to-End Arguments in System Design [Saltzer, Reed, Clark 1981] End-to-end in a nutshell “The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible. (Sometimes an incomplete version of the function provided by the communication system may be useful as a performance enhancement.)”

3 Commonly used examples 1.Error handling in file transfer 2.End-to-end, versus in-network encryption 3.The partition between TCP and IP of error handling, flow control and congestion control.

What you said “For some applications, such as banking, application specific acknowledgements or transactions may be necessary to ensure consistency. In this respect, I think the question of what we define as an acceptable end-point is crucial in terms of what services we can expect the communication system to provide.” 4

What you said “I feel like this [paper] leads people to say, ‘This is bad because it violates the End to End Principle’, rather than, for example, ‘This is bad because it makes assumptions about what future applications might want.’ ” -- Jason Clavelli 5

6 Some consequences In layered design, the E2E principle provides guidance on where functions belong. “Dumb, minimal” network and “intelligent” end- points. Many argue that: E2E principle allowed the Internet to grow rapidly because innovation took place at the edge, in applications and services.

7 On the other hand… E2E principle appears to have become diluted: NATs, firewalls, VPN tunnel endpoints, … –Perhaps not surprising: E2E principle grew in an era of trust among users. Now network must protect itself. The network is no longer “dumb, minimal” –Now over 7,000 RFCs. –Router OS’s based on 100M lines of source code. Q: Is this a problem?

8 What belongs in, what out? Questions: Does routing belong in the “dumb, minimal” network? How about multicast, mobility, QoS…? Are NATs necessary, good, or evil? Is the E2E principle constraining innovation of the infrastructure?

9 Additional references [rfc3724] “The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture” - Kempf et al. [Blumenthal] “Rethinking the design of the Internet: The end-to-end arguments vs. the brave new world”, ACM Transactions on Internet Technology, Vol. 1, No. 1, August 2001, pp

Tussle in Cyberspace: Defining Tomorrow’s Internet 10 Actor-Network Theory (ANT) Assumes equal treatment of humans and non-humans in an interacting network. Distinction between ‘mediators’ and ‘intermediaries’: “silk and nylon”.

Context Why did the authors write the paper? What had changed since the Internet was invented? 11

Problem Statement “The Internet was created in simpler times. Its creators and early users shared a common goal —they wanted to build a network infrastructure to hook all the computers in the world together so that as yet unknown applications could be invented to run there. All the players, whether designers, users or operators, shared a consistent vision and a common sense of purpose.” “Perhaps the most important consequence of the Internet’s success is that the common purpose that launched and nurtured it no longer prevails.” 12

Types of Tussle 1.Economics 2.Trust 1.Openness 13

Trust “One of the most profound and irreversible changes in the Internet is that by and large, many of the users do not trust each other. The users of the Internet no longer represent a single community with common motivation and shared trust.” “[There] is a profound tussle, between people who want to be left alone, and people who want to bother them.” Q: How are we encouraged to think about this? 14

What you said “The design of interfaces is the common theme linking the Tussle paper and the end-to-end argument paper we are discussing…I agree the end-to-end argument is still valid today, but the transparency it encourages needs more careful considerations in a playing field where trust cannot be taken for granted.” -- Ana Klimovic 15

What you said “I'm pessimistic that there is much that system designers can do to bias the tussle in favor of the user at this point. Consider the recent net neutrality debate…” --Wen-Chen Chen 16

Questioning sacred cows 1.End to end argument Q: How is it affected by “tussles”? 1.Separate policy from mechanism Q: What does it mean? If the goal is to hook computers together and let users run any application they want, then a simple transparent network enables “user empowerment”, choice and innovation. 17

A lesson Hypothesis about QoS: Internet providers had no incentive to deploy. 1.There is a real cost to deploy 2.Users had no way to choose providers (local or remote). Q: How is this related to tussles? 18

Consequences What do the authors recommend we do? What are the concrete steps? 19

Context for Next Class 20

Software Defined Network (SDN) Packet Forwarding Packet Forwarding Packet Forwarding Packet Forwarding Packet Forwarding Packet Forwarding Packet Forwarding Packet Forwarding Packet Forwarding Packet Forwarding Control Global Network Map Control Plane Control Program Control Program Control Program

Software Defined Network A network in which the control plane is physically separate from the forwarding plane. and A single control plane controls several forwarding devices. (That’s it)

Software Control Plane Intended consequences... 1.Put network owners and operators in control. 2.Networks that are more reliable and more secure. 3.Networks that cost less: simpler, streamlined hardware. 4.Networks that cost less to operate (fewer features). SDN

An example Routing

function Dijkstra(Graph, source): for each vertex v in Graph: dist[v] := infinity ; previous[v] := undefined; dist[source] := 0 ; Q := the set of all nodes in Graph ; while Q is not empty: // The main loop u := vertex in Q with smallest distance in dist[] ; remove u from Q ; if dist[u] = infinity: break ; for each neighbor v of u: alt := dist[u] + dist_between(u, v) ; if alt < dist[v]: dist[v] := alt ; previous[v] := u ; decrease-key v in Q; return dist[], previous[]; end function Edsger Dikjstra Photo: Hamilton Richards

The Opte Project

1 2 3 “If, send to 3” Data “If a packet is going to B, then send it to output 3” 1.Figure out which routers and links are present. 2.Run Dijkstra’s algorithm to find shortest paths.

95% 5% 50,000 lines of code 1.Figure out which routers and links are present. 2.Run Dijkstra’s algorithm to find shortest paths.

Dijkstra Network OS IS-IS BGP MPLS Firewall… Global Network Map