Summary: Programming the Internet Relying on infrastructures/third parties for x... –Strategy-proof reputation/incentive systems –Design of protocols/languages/platforms.

Slides:



Advertisements
Similar presentations
TRAINING SERVICES NIGTEL-CS TRAINING SERVICE Mobile Telecommunications in Africa especially Nigeria has recorded rapid growth and expansion in the.
Advertisements

Routing Routing in an internetwork is the process of directing the transmission of data across two connected networks. Bridges seem to do this function.
May 2 nd, 2001, page n° 1 The Invisible Network. May 2 nd, 2001, page n° 2 List of contents Introduction The invisible network: an example Some trends.
1 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Next Generation Network Architectures Summary John.
Supercharging PlanetLab : a high performance, Multi-Application, Overlay Network Platform Written by Jon Turner and 11 fellows. Presented by Benjamin Chervet.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Grant agreement n° SDN architectures for orchestration of mobile cloud services with converged control of wireless access and optical transport network.
CSE University of Washington Multipath Routing Protocols in AdHoc Networks.
Why are all architectural problems from 2000 still unsolved? How would we know we had solved socio-economic problems anyway? Bob Briscoe Chief Researcher,
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Networks and Distributed Systems: Project Ideas
Matching Patterns Servers assemble sequences of notifications from smaller subsequences or from single notifications.This technique requires an advertisement.
The Design Philosophy of the DARPA Internet Protocols D. D. Clark.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
1 Future Internet Architectures: Toward an Architecture-Agnostic Architecture Jennifer Rexford Princeton University
1 Distributed Systems – Aims The main aim of the course is to introduce fundamental concepts and techniques for distributed systems, i.e., systems in which.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Exterior Gateway Protocols: EGP, BGP-4, CIDR Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Strategic Directions in Real- Time & Embedded Systems Aatash Patel 18 th September, 2001.
CS335 Networking & Network Administration Tuesday April 27, 2010.
Assessing the Nature of Internet traffic: Methods and Pitfalls Wolfgang John Chalmers University of Technology, Sweden together with Min Zhang Beijing.
Lecture 15 Summary Wireless Networks and Mobile Systems.
ICT 7: Advanced cloud infrastructures and services ICT 8: Boosting public sector productivity and innovation through cloud computing services Jorge GASOS.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
PURSUIT Architecture Mikko Särelä T
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
PhD Topic Template Based Composition PhD Course 5 th March – 9 th March 2012, Kaiserslautern.
1 Goals and Objectives Understand state-of-the-art in network protocols, architectures, and applications Process of networking research Constraints and.
Putting Intelligence in Internetworking: an Architecture of Two Level Overlay EE228 Project Anshi Liang Ye Zhou.
1 Evolving a Manageable Internet Tom Anderson University of Washington.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
Internetworking Concept and Architectural Model
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Chapter 1 Communication Networks and Services Network Architecture and Services.
Internetworking Concept and Architectural Model Chapter 3.
Software Defined Networks for Dynamic Datacenter and Cloud Environments.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
Page 1 of ?? Wireless Industry Congress 2003 NCAC Workshop (Ottawa) © Ramiro Liscano 2005 Context-based Coalition Access Control for Spontaneous Networking.
思科网络技术学院理事会. 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Graceful Label Numbering in Optical MPLS Networks Ibrahim C. Arkut Refik C. Arkut Nasir Ghani
Resilient Overlay Networks Robert Morris Frans Kaashoek and Hari Balakrishnan MIT LCS
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
Week 04 Object Oriented Analysis and Designing. What is a model? A model is quicker and easier to build A model can be used in simulations, to learn more.
Large Scale Networks and Future Network Architectures -session summary- Jim Kurose Department of Computer Science University of Massachusetts Amherst MA.
Architecture Tradeoff Analysis Method Software Engineering Institute Carnegie Mellon University Presented by: Senthil ayyasamy CS 590l- winter 2003.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 draft-pillay-esnault-ospf-service-distribution-00.txt Padma Pillay-Esnault.
MIT CFP Identity and Privacy: Social TV case study Security and Privacy Working Group CFP Plenary Meeting October 29, 2009.
Metrics for Performance Evaluation of Distributed Application Execution in Ubiquitous Computing Environments Prithwish Basu ECE Department, Boston University.
Evaluate container lifecycle support in TOSCA TOSCA – 174 Adhoc TC.
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
COMPUTER NETWORKS CS610 Lecture-22 Hammad Khalid Khan.
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
Random and Uninformed Summary Impressions (or, how Victor finally found something I could talk about) Scott Shenker.
Project JXTA By Jude Mercado.
IP Telephony (VoIP).
New Directions in Routing
A Common Machine Language for Communication-Exposed Architectures
CS 268: Computer Networking
Overview Jaringan Komputer
Services in a Converged WAN
V. Arun College of Information and Computer Sciences
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
UNIT – V NETWORK DESIGN.
CS-3013 Operating Systems Hugh C. Lauer
Services in a Converged WAN
Services in a Converged WAN
Overview of Networking
Presentation transcript:

Summary: Programming the Internet Relying on infrastructures/third parties for x... –Strategy-proof reputation/incentive systems –Design of protocols/languages/platforms to match the context Connection with Ad Hoc, Overlays, P2P New models of network programmability –Backward compatible Local/billable + end-to-end/free (best-effort) –Connection to measurement/modeling Mapping forwarding-time computations onto platforms: system- level view –Blue sky/”outside the box” Analog programming for optical, wireless channels and interconnects Beyond writing programs to “breeding” them Rule-based systems: unified support for policies

Programming the (Inter)Network Do we know how to do it predictably? –Tussles: trust, accounting, QoS, etc. –Safety: complexity comes from composition Do we need help from PL/OS communities? –Do we have a common programming language? –Compiler techniques, typing, etc.? –Vendor-independent network processor model

Observations: Common Themes Two very different (but valid!) research contexts –Existing Internet artifact Measurement, overlays, TCP modeling, traffic engineering Challenge: Do not ignore the ugly parts (billing, trust,...) –Different networks Question assumptions, new models Challenge: Choosing replacement assumptions well Policy –“It’s all about policy.” -- Ed Knightly –Whom do I trust? Why? sociology/economics/anthropology help? –Specification, management, analysis –Architectural “support” Importance of values –Need for validation, reproducibility of results –Tendency to consider areas “done” too soon –Are we doing a good job propagating good values?

Observations: What We Didn’t Hear Not much about routing –Do we fundamentally understand the relationship among addressing, topology, state, forwarding-time costs, convergence time? –Real problem is about address assignment Suggested additions: –Interactions among routing at different levels