1Presentation_ID © 1999, Cisco Systems, Inc. Unified Field Theory of Middleware Bob Aiken Internet Ronin Advanced Internet Initiatives Office of the CTO.

Slides:



Advertisements
Similar presentations
Authentication Authorization Accounting and Auditing
Advertisements

Electronic Visualization Laboratory University of Illinois at Chicago EVL Optical Networking Research Oliver Yu Electronic Visualization Laboratory University.
Using the Collaborative Tools in NEESgrid Charles Severance University of Michigan.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Contextualized Information-Centric Home Networking (draft-ravindran-cibus-01.txt) IRTF/ICN-RG (IETF-89) Ravi Ravindran, Asit Chakraborti, G.Q.Wang.
Authenticated QoS Signaling William A. (Andy) Adamson Olga Kornievskaia CITI, University of Michigan.
Web Services Security Enterprise Architect Summit – 2004 Mark O’Neill CEO.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
GridFTP Introduction – Page 1Grid Forum 5 GridFTP Steve Tuecke Argonne National Laboratory.
A Computation Management Agent for Multi-Institutional Grids
Authorization of a QoS path based on Generic AAA SC2002 Baltimore NOV Bas van Oudenaarde Advanced Internet Research Group University of Amsterdam.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
USING THE GLOBUS TOOLKIT This summary by: Asad Samar / CALTECH/CMS Ben Segal / CERN-IT FULL INFO AT:
1Presentation_ID © 1999, Cisco Systems, Inc. Persistent Presence BOF - TERENA Robert (Bob) Aiken Manager of University Research Office of the CTO.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Workload Management Workpackage Massimo Sgaravatto INFN Padova.
1 Presentation_ID © 1999, Cisco Systems, Inc. Programmable Networks OPENSIG-99 Industry Panel John Hopprich.
Is 'Designing' Cyberinfrastructure - or, Even, Defining It - Possible? Peter A. Freeman National Science Foundation January 29, 2007 The views expressed.
1 Directory related work in the Global Grid Forum 3rd TF-LSD Meeting in Antalya Peter Gietz
Update and Discussions on Technology Initiatives TSAG Meeting 4/11/02.
Presenter: Vikash Nath MCP, CCNA, MCTS. On-Premise Private Cloud Public Cloud Hybrid Cloud.
W3C XML Query Language Working Group Mark Needleman Data Research Associates ZIG Current Awareness Session July 13, 2000.
Windows 2003 and 802.1x Secure Wireless Deployments.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
1 Directories and Policy-Based Networking - Strassner Directories & Policy-Based Networking 0827_02F8_c1 John Strassner Cisco Systems.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
VAN HOAI TRAN FACULTY OF COMPUTER SCIENCE & ENGINEERING HCMC UNIVERSITY OF TECHNOLOGY AAOS 2008 Open Grid Computing Architecture.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
LDAP: Introduction CNS 4650 Fall 2004 Rev. 2. LDAP History Simplify directory access protocol Front-end to X.500 Developed my UMich.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
A Framework for Internetworking Heterogeneous High-Performance Networks via GMPLS and Web Services Xi Yang, Tom Lehman Information Sciences Institute (ISI)
Major Grid Computing Initatives Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer Science The.
Virtual Data Grid Architecture Ewa Deelman, Ian Foster, Carl Kesselman, Miron Livny.
Perspectives on Grid Technology Ian Foster Argonne National Laboratory The University of Chicago.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
11 December, th IETF, AAA WG1 AAA Proxies draft-ietf-aaa-proxies-01.txt David Mitton.
Ames Research CenterDivision 1 Information Power Grid (IPG) Overview Anthony Lisotta Computer Sciences Corporation NASA Ames May 2,
1 Policy-based architecture. 2 Policy management view of the architecture IP MMed domain is a converged services domain where voice, video, data are provided.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
The Grid the united computing power Jian He Amit Karnik.
GRID ARCHITECTURE Chintan O.Patel. CS 551 Fall 2002 Workshop 1 Software Architectures 2 What is Grid ? "...a flexible, secure, coordinated resource- sharing.
The Globus Toolkit®: The Open Source Solution for Grid Computing
Globus Toolkit Massimo Sgaravatto INFN Padova. Massimo Sgaravatto Introduction Grid Services: LHC regional centres need distributed computing Analyze.
TERENA update Karel Vietsch TERENA CEO Internet2 Fall Meeting, Atlanta 30 October 2000.
111 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID Mobile IPv4 Dynamic Home Agent Assignment Framework (draft-kulkarni-mobileip-dynamic-assignment-01.txt)
Middleware Solution for What Problem? Cees de Laat Faculty of Physics and Astronomy Utrecht University.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
7. Grid Computing Systems and Resource Management
X.509 Proxy Certificates for Dynamic Delegation Ian Foster, Jarek Gawor, Carl Kesselman, Sam Meder, Olle Mulmo, Laura Perlman, Frank Siebenlist, Steven.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
TNA Mobility II By Henry N Jerez. TNA Principles Persistent Identification of all:  Network Components  Services  Users Functionality Abstraction 
Policy Modeling in a PBM Architecture 6WIND / Euronetlab
1 Comments on OGSA platform document draft-2 03/06/2003 Andreas Savva, Ph.D. Hiro Kishimoto, Ph.D. Fujitsu GGF7 OGSA-WG.
Multicast in Information-Centric Networking March 2012.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
The ITU-T X.500 series and X.509 in a changing world
SDN RG State of the Nation
Securing the Network Perimeter with ISA 2004
Introducing Novell IPv6 Stack
Software Defined Networking (SDN)
Extending MPLS/BGP VPNs to End-Systems
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
Distributed Systems Bina Ramamurthy 4/22/2019 B.Ramamurthy.
Global Grid Forum (GGF) Orientation
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Presentation transcript:

1Presentation_ID © 1999, Cisco Systems, Inc. Unified Field Theory of Middleware Bob Aiken Internet Ronin Advanced Internet Initiatives Office of the CTO

2Presentation_ID © 1999, Cisco Systems, Inc. Middleware Workshop Co-sponsored by Cisco, IBM, iCAIR, and NSF in 12/98 ; chaired by Cisco Goal: define middlware- existing/R&D Applications, MW, & Network experts Initial focus - persistent core services

3Presentation_ID © 1999, Cisco Systems, Inc. WHY Middleware ? Intelligent advanced applications mobile and nomadic environments 3D tele-immersive applications/CAVEs ubiquitous computing (BANS, PANs,..) electronic persistent presence (EPP) - “being on the net” : agents, avatars...

4Presentation_ID © 1999, Cisco Systems, Inc. And the MW definition is: By a very rough ( and I mean VERY rough- IETF style - hmmmmmm) consensus - well its something sort of like - uh - like somewhere between the API and - umm - the IP transport - generally speaking that is. Its hard to say what it is - but we can recognize it if we see it - maybe.

5Presentation_ID © 1999, Cisco Systems, Inc. HISTORY of Middleware first the earth cooled then there were dinosaurs then there was oil then there were Mercedes Benz then there was middleware

6Presentation_ID © 1999, Cisco Systems, Inc. HISTORY of Middleware Distributed Computing 1970-present IETF RFC by IAB I-WAY / SC95 NGI 1996 R&D workshop Globus, Legion, Condor,... December 1998 MW workshop draft-aiken-middleware-reqndef-00.txt

7Presentation_ID © 1999, Cisco Systems, Inc. Perspectives Applications MW enabling Network Services OS and End System enabling services Security (AAA, AAAA, AAAAA,…) Networked Info Discovery and Retrieval Directories Policy - Resource Management

8Presentation_ID © 1999, Cisco Systems, Inc. Policy Management Model Management Tool Policy Decision Point Policy Enforcement Point Policy Repository Translation Validation Control LDAP/XML Telnet/CLI, COPS, SNMP LDAP, COPS, proprietary Entry & Viewing Modification Enabling/Disabling Admin/Mgmt Policy Conflict Resolution Satisfiability Feasibility, Optimization Traffic Conditioning Filtering Access Control Encryption

9Presentation_ID © 1999, Cisco Systems, Inc. MW Research topics Inter and Intra domain policy management (policy conflict?) resource / policy management and specification languages providing infrastructure status (real time) to applications and other MW metadata - for objects/relationships/...

10Presentation_ID © 1999, Cisco Systems, Inc. MW Research topics ctd PKI related MW : revocation lists, multiple certificate proxy agents multidomain accounting/billing scheduling for resources/ deadlock? support for load balancing/ mirroring New MW for Ubiquitous computing and electronic persistent presence (EPP)

11Presentation_ID © 1999, Cisco Systems, Inc. Summary Defining MW is like boiling the ocean No dictionary definition of MW - dependent on context / perspective NO 1 core set of middleware services that ALL applications required we identified some essential core persistent MW building blocks : directories, naming services, AAA, etc.

12Presentation_ID © 1999, Cisco Systems, Inc. Summary ctd MW services (e.g. resource mgrs) will build on core sets of MW services Education Folks felt a need for a focus group to define EDU core MW services IETF Informational Draft out May 99 Do we need a forum / mechanism to focus the many activities and standards: IETF, DMTF,WWW, GRIDs, ?

13Presentation_ID © 1999, Cisco Systems, Inc.