The Co-mingled Universe of R&E Networking: the reprise Ken Klingenstein Director, Internet2 Middleware and Security Ken Klingenstein Director, Internet2.

Slides:



Advertisements
Similar presentations
INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
Advertisements

Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
The Co-mingled Universe of R&E Networking Ken Klingenstein Director, Internet2 Middleware and Security Ken Klingenstein Director, Internet2 Middleware.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
Drive-By Dialogues. Presenter’s Name Topics The Long Strange Trip of I2 – NLR Merger A Brief Comment on Optical Networking Middleware Developments Security.
The Future of GÉANT: The Future Internet is Present in Europe Vasilis Maglaris Professor of Electrical & Computer Engineering, NTUA Chairman, NREN Policy.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Internet2 A Project of the University Corporation for Advanced Internet Development Ted Hanss Director, Applications Development VIEWNET April 1998.
Colombo, Sri Lanka, 7-10 April 2009 Multimedia Service Delivery on Next Generation Networks Pradeep De Almeida, Group Chief Technology Officer Dialog Telekom.
1 The Internet Introductory material. An overview lecture that covers Internet related topics, including a definition of the Internet, an overview of its.
Effectively and Securely Using the Cloud Computing Paradigm.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Internet 2 Corporate Value Proposition Stuart Kippelman (J&J) Jeff Lemmer (Ford) December 12, 2005.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
EDUCAUSE Midwest Regional March 24, 2003 Copyright Ann West This work is the intellectual property of the author. Permission is granted for this.
The Research and Education Network: Platform for Innovation Heather Boyles, Next Generation Network Symposium Malaysia 2007-March-15.
IST 2006 – 22/11/2006 Aljosa Pasic Atos Origin Security, Dependability and Trust in Service Infrastructures.
Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan CUMREC May 13, 2003.
Salsa Bits: A few things that the analysts aren't talking about... December 2006.
The Singapore Advanced Research & Education Network.
IT 347 Final Review Winter 2011 J.J. Ekstrom. IT 347 Course Topics Network Models Protocols and Encapsulation Reliable Delivery / Sliding Window Clients,
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Update. Internet2 Update2 Brief History Internet2 project 1996 Formed University Corporation for Advanced Internet Development UCAID developed national.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
NETWORKED EUROPEAN SOFTWARE & SERVICES INITIATIVE Future research challenges in dependability - an industrial perspective from NESSI Aljosa Pasic Atos.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
GRID ARCHITECTURE Chintan O.Patel. CS 551 Fall 2002 Workshop 1 Software Architectures 2 What is Grid ? "...a flexible, secure, coordinated resource- sharing.
The Internet The History and Future of the Internet.
1 European e-Infrastructure experiences gained and way ahead OGF 20 / EGEE User’s Forum 9 th May 2007 Mário Campolargo European Commission - DG INFSO Head.
3 December 2015 Examples of partnerships and collaborations from the Internet2 experience Interworking2004 Ottawa, Canada Heather Boyles, Internet2
Advanced Networks: The Past and the Future – The Internet2 Perspective APAN 7 July 2004, Cairns, Australia Douglas Van Houweling, President & CEO Internet2.
1. Nortel Confidential Information BUSINESS MADE SIMPLE 2 The Future of Telecommunications John A. Phillips Nortel, ETSI General Assembly Chairman 2007.
Ken Brumfield | Premier Field Engineer Ward Ralston| Group Product Manager Microsoft Corporation.
Security at Line Speed: Integrating Academic Research and Enterprise Security.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Internet2 and Cyberinfrastructure Russ Hobby Program Manager,
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
University Corporation for Advanced Internet Development (UCAID) INET’98 21 July 1998 Geneva, Switzerland.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Data Grid Plane Network Grid Plane Dynamic Optical Network Lambda OGSI-ification Network Resource Service Data Transfer Service Generic Data-Intensive.
30 November 2001 Advisory Panel on Cyber Infrastructure National Science Foundation Douglas Van Houweling November 30, 2001 National Science Foundation.
Advanced research and education networking in the United States: the Internet2 experience Heather Boyles Director, Member and Partner Relations Internet2.
Security Architectures and Advanced Networks Ken Klingenstein Day Job: Middleware Night Job: Network Security.
Can we save the OPEN Internet? with focus on The Two-Port Internet Problem and what to do about it Terry Gray Designated Prophet of Doom University of.
1 Future Internet Research and Experimentation. 2  Mobility and pervasiveness  Security, trust, dependability  QoS for commercial video streaming applications.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
Federated Security Services Ken Klingenstein Day Job: Middleware Night Job: Network Security.
Network Architecture and Security Ten Years Out Internet2 Member Meeting; Fall 2005 Deke Kassabian – University of Pennsylvania Mark Poepping – Carnegie.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Internet2 Members Meeting Washington, DC 1 Advanced Networking Infrastructure and Research (ANIR) Aubrey Bush Division Director, ANIR National Science.
A Brief history of the Internet Name:Ziyun Wang. Introduction Internet history revolves around four distinct aspects. 1. the technological evolution that.
Emerging StateNets Issues Associated with CI and the 3- Tier Networking Model Steve Corbató CI Strategic Initiatives, University of Utah StateNets – Tempe.
Internet2 Applications & Engineering Ted Hanss Director, Applications Development.
A Shift in the Data Security Paradigm
Federated IdM Across Heterogeneous Clouding Environment
How Smart Networks are Changing Corporate Networks
CSC 480 Software Engineering
thrilling applications that will drive usage of 5G networks
​​​​​​​​Brooklyn, New York, United States, 2 October 2018
The Internet and Its Applications
Presentation transcript:

The Co-mingled Universe of R&E Networking: the reprise Ken Klingenstein Director, Internet2 Middleware and Security Ken Klingenstein Director, Internet2 Middleware and Security

2 Topics A brief history from a good seat… Going forward “opportunities” Characteristics of R&E networking Relating to corporate requirements What does comingled mean? To the current commodity To the future clean slate…

3 A Brief History … Getting onto Arpanet… The mid ’80’s JVNC, NSFnet, ESNet, BITnet, CSNet On-campus, the shift from TN3270 to campus nets The mid ’90’s vBNS, Abilene, etc The emergence of the border router On-campus, from multiprotocols to TCP/IP

4 And now… A major R&E institution has several external connections, with distinct characteristics (performance, AUP’s, etc.) Complex campus networks, with high- performance meshes, lower-speed extensions, clusters of advanced nets, etc. Distributed management of networks and desktops Lots of special cases, like Medical Schools, Engineering Colleges, Dormitories

5 And now… Security challenges The demise of the fictitious perimeter Roaming devices Wireless Slow to deploy DNSSec and problematic IPSec The prospect of new types of external non-IP connections Complex, undiagnosable deployments Policy drivers for technology

6 Going Forward “Opportunities”… The prospect of on-demand personal “lambdas” Infocard Federated identity and trust Uneven economics

7 Characteristics of R&E Networking Enterprise centric Networking is part of an infrastructure provided to members. Operated often as a common good Often run to a building or POP in a sub-unit; often some wall-plate services as well Desktop autonomy Heterogeneity of platforms Loose desktop management Leading edge Early developers/adopters of new technologies Regulatory complexity HIPAA, FERPA, AUP, DMCA

8 More characteristics Demanding applications Bandwidth, latency, jitter, transparency Strong inter-institutional requirements Multiple external links AUP’s Performance distinctions Funding that favors one-time versus continuing costs

9 Relating to corporate needs From the Jericho forum: Can no longer assume that an organization owns, controls and is accountable for the ICT infrastructure it employs Should not assume that all individuals sit within organizations and are managed by a single IdM Vision statement: Cross-organizational security processes and services Open standards Assurance processes that when used in one organization can be trusted by others

10 Network Applications Consortium NAC - a group of major companies (Boeing, Bechtel, GlaxoSmithKline, PG&E, etc.) with intermingled research and operational environments Welcome to the Network Applications Consortium "where membership radically improves the delivery of agile IT infrastructure in support of business objectives" Original focus was on middleware, where Internet2 and NAC members have had meaningful if sporadic interactions Added focus over the last year on network security

11 NAC Enterprise Security Architecture Key Concepts: Security by design Usability and manageability Defense in depth Simplicity Enforced policy Key leveraging technologies: Identity Management Directory Services Border Protection Reusable tools Desktop management Role based security

12 Comingled with the commodity The commodity Internet is a part of the R&E network environment With its security issues With its packet disruption appliances With its legacy requirements True to being the original crucible, new deployments in commodity often begin in R&E Multicast, IPv6, DNSSec

13 Co-mingled with the future It is likely that any advanced network initiatives will have presence on campuses and require integration. Forces may drive management of long distance networking to the end points Layers of invention that new networking approaches could leverage are being developed in the R&E community Trust fabrics Manageability discussions

14 Distinctions? This workshop is more on architectures than protocols We have steep requirements around policy We are driven by researcher needs as much as by economics, capabilities, security, policy, etc.

15 Questions -1 Role of enterprise vs role of VO vs role of individual In authn/z In provisioning networking In resource discovery, etc… What role will the enterprise have in personal lambdas? What parts of the infrastructure will the enterprise own? Manage?

16 Questions -2 What parts of manageability matter? Costs, downtime, security, privacy… Does the control plane/data plane distinction continue to matter? Do we need more planes or less? (remember dynamic networking…) How will diagnostics happen in the face of complexity, higher levels of performance, scale, etc? How will resource discovery be addressed at so many layers?

17 Questions - 3 How important is e2e transparency? How important is innovation in the face of security? What will drive change? How will devices and appliances on the net change the problem? Will outsourcing, offshoring etc affect R&E nets?