The End of Internet Architecture Author: Timothy Roscoe Presented by Gross, Zhaosheng Zhu.

Slides:



Advertisements
Similar presentations
End-to-End and Innovation Geoff Huston Chief Scientist, APNIC.
Advertisements

1 Mata Architecture for the Future Network APAN2008 January Myung-Ki SHIN, ETRI
Cabo: Concurrent Architectures are Better than One Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton.
Eclipse, M2M and the Internet of Things
Towards Software Defined Cellular Networks
Introducing Campus Networks
Contents Shortcomings of QoS in the Current Internet About OpenFlow
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Jennifer Rexford Princeton University MW 11:00am-12:20pm Network Virtualization COS 597E: Software Defined Networking.
Supercharging PlanetLab : a high performance, Multi-Application, Overlay Network Platform Written by Jon Turner and 11 fellows. Presented by Benjamin Chervet.
1 Planetary Network Testbed Larry Peterson Princeton University.
Title or Title Event/Date Presenter, PresenterTitle, Internet2 Network Virtualization & the Internet2 Innovation Platform To keep our community at the.
IPv6 over xDSL: The DIODOS Proposal Athanassios Liakopoulos Greek Research & Technology Network International IPv6 Workshop, Kopaonik,
SDN and Openflow.
Network Innovation using OpenFlow: A Survey
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
1 GENI: Global Environment for Network Innovations Jennifer Rexford Princeton University
1 GENI: Global Environment for Network Innovations Jennifer Rexford On behalf of Allison Mankin (NSF)
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
The Future of Internet Research Scott Shenker (on behalf of many networking collaborators)
A Guide to major network components
Client/Server Architecture
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Copyright © 2012, QoS-aware Network Operating System for Software Defined Networking with Generalized OpenFlows Kwangtae Jeong, Jinwook Kim.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1-1 MPLS Concepts Introducing Basic MPLS Concepts.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Chapter 1: Hierarchical Network Design
Morteza Yousefi University of Science & Technology of Mazandaran Network Virtualization 1 of 22 Network Virtualization.
NETWORK SECURITY PRESENTed By SADASIVARAO.G. ABSTRACT:  Network security is a complicated subject, historically only tackled by well-trained and experienced.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
CSE 303 – Software Design and Architecture
1 Cabo: Concurrent Architectures are Better than One Jennifer Rexford Princeton University Joint work with Nick Feamster.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
1 Testbeds Breakout Tom Anderson Jeff Chase Doug Comer Brett Fleisch Frans Kaashoek Jay Lepreau Hank Levy Larry Peterson Mothy Roscoe Mehul Shah Ion Stoica.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
1 MPLS: Progress in the IETF Yakov Rekhter
Introduction & Vision. Introduction MANTICORE provides a software implementation and tools for providing and managing routers and IP networks as services.
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
SDN Management Layer DESIGN REQUIREMENTS AND FUTURE DIRECTION NO OF SLIDES : 26 1.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 1 – Introduction to Computers, the Internet and the World Wide Web Outline 1.1Introduction 1.2What.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
Presentation Layer (Graphical User Interface) AppGUI Logic Layer (Business Logic and data access) Network Discovery Device Information Extraction Network.
Network Virtualization Sandip Chakraborty. In routing table we keep both the next hop IP (gateway) as well as the default interface. Why do we require.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Scrapping the Internet Presented by Dhaval Joshi.
OpenFlow: Enabling Innovation in Campus Networks Yongli Chen.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
A Study of Certification Authority Integration Model in a PKI Trust Federation on Distributed Infrastructures for Academic Research Eisaku SAKANE, Takeshi.
SDN/NFV DDoS Requirements "The Mobile Use Case – 5G" Bipin Mistry, VP Product Management © 2015 Corero
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Distributed Systems Architectures. Topics covered l Client-server architectures l Distributed object architectures l Inter-organisational computing.
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Instructor Materials Chapter 7: Network Evolution
Design and Implementation of Spacecraft Avionics Software Architecture based on Spacecraft Onboard Interface Services and Packet Utilization Standard Beijing.
Firewalls.
* Essential Network Security Book Slides.
Software Defined Networking (SDN)
Network Virtualization
The Anatomy and The Physiology of the Grid
Next-generation Internet architecture
Calypso Service Architecture
Presentation transcript:

The End of Internet Architecture Author: Timothy Roscoe Presented by Gross, Zhaosheng Zhu

2 Outline  Introduction to internet architecture  Pressures for internet architecture  Why architecture?  GENI Platform and What we will do  Some challenges  Summary

3 Introduction to Internet Architecture r Internet Architecture does not act as a useful guide r Separates distributed systems from networking r Creates unnecessary problems for distributed systems

4 Pressures for Internet Architecture r Pressures from Within m Required Functionality QoS Security Against Attacks m Introduced Network Functionality Firewalls NAT boxes

5 Pressures for Internet Architecture r Pressure from Above m Overlay technology Increases burden on underlying networks Increases difficulty to manage data flow

6 Pressures for Internet Architecture r External Pressure m Gatewayed networks Phone Networks Sensor Network m Networks Proposed by Impasse paper

7 Why Architecture? r Architectures fail to m Offer interoperability across diverse networks m Allow for easier application coding m Allow providers to compete m Facilitate innovation

8 GENI platform: virtualization r The increasing trend toward programmability in networks needs virtualization technology r GENI Platform uses virtualization. The hardware components can be sliced and shared between different users

9 GENI makes things easy r Experiments under GENI is not complex. r Under GENI platform, You can use a set of libraries and software management services to control you experiment (acquire resources and build ensembles).

10 GENI: invert the traditional layering of applications and networks r GENI substrate views experiments embodying new networks architecture as applications sharing the platform. r But, in traditionally, it defines a network architecture as a substrate for applications.

11 Deploying a new network architecture under GENI 1. Assemble a slice, that is, a set of virtual servers, routers, links, radios, sensors, etc. 2. Write and deploy the software implementing the network architecture to be used. 3. Write and deploy the software to peer the network with the existing internet in some way. 4. Write and deploy the newly- enabled services and applications. r Why call software in step 2 network architect ure? Just some libraries!

12 However r GENI does not define a new network architecture, because: m It is not creating a fictional boundary between two disciplines. m Structure of GENI leaves the question of end-to- end connectivity an application defined issue. r But writing applications are not becoming harder. Remember we can reuse the libraries and services provided by other parties.

13 What we suggest is:  Take a application- centric look  Give users the ability to create virtual machines, virtual routers and virtual links and users write applications by themselves Benefits:  Services use explicit resources  Complex cross-provider bartering based on packet measurement is not needed at all!  Carriers just care for selling virtualized resources which is a easier task  More…

14 Why architecture? Distributed system Networking research Internet Arch. Distributed system Networking research

15 Better, but still has challenges Routing as a library r Each application is effectively setting up its own network. But until now there is little work on simultaneous routing on many overlapping graphs Discovery r How do applications discover and bind to a set of resources?

16 Some other challenges Composition and federation r As applications build their own networks, how will they talk to each other? Operations r How will operators manage the substrate? This is more like problem in distributed systems.

17 Summary r The concept of internet architecture has been useful in history but now is an obstacle for innovation. r Removing it can make us move forward with more basic problems such as how to build and peer distributed applications. r It is time to consider this.

18 Thank you !