MIA 3/30/10. Core message Evolutionary rather than ditch-everything/clean-slate – “cleaned slate” rather than clean-slate – overly complex – doesn’t solve.

Slides:



Advertisements
Similar presentations
NetServ Dynamic in-network service deployment Henning Schulzrinne (Columbia University) Srinivasan Seetharaman (Georgia Tech) Volker Hilt (Bell Labs)
Advertisements

1 Data-Oriented Network Architecture (DONA) Scott Shenker (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, I. Stoica)
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
Internet Area IPv6 Multi-Addressing, Locators and Paths.
Internetworking II: MPLS, Security, and Traffic Engineering
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
The Future Internet: A clean-slate design? Nicholas Erho.
Group #1: Protocols for Wireless Mobile Environments.
Flow Space Virtualization on Shared Physical OpenFlow Networks Hiroaki Yamanaka, Shuji Ishii, Eiji Kawai (NICT), Masayoshi Shimamura, Katsuyoshi Iida (TITECH),
Resource Pooling A system exhibits complete resource pooling if it behaves as if there was a single pooled resource. The Internet has many mechanisms for.
ToNC workshop Next generation architecture H. Balakrishnan, A. Goel, D. Johnson, S. Muthukrishnan, S.Tekinay, T. Wolf DAY 2, Feb
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
Anycast Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
1 CCNA 1 v3.1 Module 10 Review. 2 What is the address that is changed when a frame is received at a router interface? MAC address.
Networking and Internetworking Devices Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009.
Multipath Routing Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Announcements List Lab is still under construction Next session we will have paper discussion, assign papers,
A Study of MPLS Department of Computing Science & Engineering DE MONTFORT UNIVERSITY, LEICESTER, U.K. By PARMINDER SINGH KANG
A Scalable, Commodity Data Center Network Architecture.
WAN Technologies.
C OLUMBIA U NIVERSITY Lightwave Research Laboratory Embedding Real-Time Substrate Measurements for Cross-Layer Communications Caroline Lai, Franz Fidler,
Data Communications and Networks
Fall 2006Computer Networks19-1 Chapter 19. Host-to-Host Delivery: Internetworking, Addressing, and Routing 19.1 Internetworks 19.2 Addressing 19.3 Routing.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Common Devices Used In Computer Networks
Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Aug. 19, 2010
HAIR: Hierarchical Architecture for Internet Routing Anja Feldmann TU-Berlin / Deutsche Telekom Laboratories Randy Bush, Luca Cittadini, Olaf Maennel,
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
1 November 2006 in Dagstuhl, Germany
Internetworking Concept and Architectural Model
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Copyright © 2007 Pearson Education, Inc. Slide 3-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Multimedia & Mobile Communications Lab.
A policy-based per-flow mobility management system design
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
TCP/IP Protocol Architecture CSE 3213 – Fall
An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
SDN Management Layer DESIGN REQUIREMENTS AND FUTURE DIRECTION NO OF SLIDES : 26 1.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
Minimal Internet Architecture Henning Schulzrinne (scribe)
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
SDN and Beyond Ghufran Baig Mubashir Adnan Qureshi.
CPS110: Networks Landon Cox March 25, Network hardware reality  Lots of different network interface cards (NICs)  3Com/Intel, Ethernet/802.11x.
WAN Technologies. 2 Large Spans and Wide Area Networks MAN networks: Have not been commercially successful.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
Advanced Computer Networks
CIS 700-5: The Design and Implementation of Cloud Networks
Grid Optical Burst Switched Networks
University of Maryland College Park
15-744: Computer Networking
Inter domain signaling protocol
CS 268: Computer Networking
Global Locator, Local Locator, and Identifier Split (GLI-Split)
Chapter 3 Part 3 Switching and Bridging
Chapter 7 Backbone Network
IP Addressing Introductory material.
IP Addressing Introductory material.
Software Defined Networking (SDN)
ECE453 – Introduction to Computer Networks
An Update on Multihoming in IPv6 Report on IETF Activity
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Computer Networking A Top-Down Approach Featuring the Internet
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

MIA 3/30/10

Core message Evolutionary rather than ditch-everything/clean-slate – “cleaned slate” rather than clean-slate – overly complex – doesn’t solve everything we want – re-use foundations what worked well service model = packets (may be optical “dynamic circuits”) Evolvable – needs to be able to evolve to meet needs for years –  programmability General & minimal – small set of generalizable abstractions packet forwarding, lookup, state setup & observation, … Resilient – emphasize infrastructure security & reliability

Why? What benefits? – network layer capabilities (e.g., multipath, discovery/hiding) – evolvability (programmability) – trust & value flow (market failure) – lack of resilience – programmer friendliness What problems? – no incentives to deploy advanced services & lack of mechanisms useful to society  creates incentives build in some incentive mechanism outsource residual risk to third parties enable useful transactions – network resources How is this better than the Internet? – earlier active/programmable work

Last time Small number of general, programmable components (architecture needs to last 20+ years, so need to accommodate unanticipated demands; some of the existing parts of the Internet are straining because they are too special-purpose) – RISC approach to networking Provide small set of core support services (identifier mapping, economic support [clearing houses? "banks"? bonding?], property assertion [includes location and identity assertion, maybe even bonding]) - we have learned that the core services define what we can do. Having a smaller number of generic mechanisms allows to fix security properties once, rather than for every one of dozens of protocols. System/infrastructure resilience (more precise than generic "security")We also talked about economic mechanisms that we use to manage large economic systems without a strong central trust anchor, such as insurance, bonding, and rating. Can these economic ideas be leveraged for increase resilience and "security"?

What’s to solve? Ease of use Security & trustworthiness – multicast failed couldn’t charge for it – economic support infrastructure clearing house

Low-level problems “what’s the killer app?” (AN) Multihoming Multipath – only provide destination no control over routing decisions e.g., list of k paths, opaque handles for choice – multipath-TCP? L-I split Separate signaling plane Visibility of internals to application/programmer? – observability instead of guessing games – hide things that should be hidden Tools for establishing trust – identity, location, affiliation, bonding, …

What’s kept and new? Circuit paradigm observability (introspection), controllability, time scale separation – better reveal (or hide) – e.g., is there path splitting? – packets ask for information (“ask for directions”) NOT: router  general purpose computing – ephemeral state processing interests served (“tussle”?) – why deploy? – mechanisms in forwarding path (fast path) – before session and per-packet

Forwarding mechanisms 4-5 mechanisms in silicon – lookup/filter longest prefix (set up via routing) bit mask (filter – set up by policy and signaling) – limited rewriting (transformational) lookup table (NAT-like?) – packet copying (multicast, DTN, network coding?) prevent avalanches/amplification – no good mechanism? – storage storage hierarchy (speed, volume) economic allocation use it from the control plane

Locating & naming Names – fine-grained (services, content) – provable – some ID, some topological – SDSI and SPKI (IETF ten years ago) tuple-oriented – hierarchy: allocation provenance (who owns what) – million vs. billion resolution deferral (incremental refinement) business model – policy

Economic support infrastructure TBD, but important insurance (see Vishal’s slides) value flow for computation & storage – provenance idea? – utility model

What’s in and what’s out? replace IP – ID-locator – redirection – for CDN, anycast, ask for directions separate control & per-packet – control plane mechanism TCP – SCTP – not prevent multi-path BGP (policy routing hammer) – unsatisfactory DNS – global DHT – opportunity – general global lookup mechanism

Security DNS – ssh keys Fine-grained addressing Strong ID-locator split Improve privacy – privacy-enhanced addressing – geolocation

Multi-* Fix TCP assumptions

Optical Programmable – more flexible access aggregation network more efficient access provision – program switches at the optical layer routing & dropping – circuits on a semi-permanent basis + packets – make measurements of the optical layer Infinera: measure power, OSNR & (intrapacket) BER – drop on a packet-by-packet basis detect intrusion routing & reconfiguration Network on the fly – multicast

Minimal Internet Architecture (MIA) “Deliver packets from point A to B” – where A and B are globally unique identifiers datagrams device-centric protocols content-based networks human-centered protocols name translation routing signaling (path-state mgt.) MAC & PHY name translation routing libraries Feb. 2010

MIA node overview network API internetworking layer signaling (install state & code) language binding Network elements should offer communication (everyone) computation storage Network elements should offer communication (everyone) computation storage everywhere fast & low cost general- purpose CPU common functionality modules (e.g., pub-sub, CDN) common functionality modules (e.g., pub-sub, CDN) Feb. 2010

Assignments IP (naming/locating/”business model”) – Ken, Volker low-level primitives? Extroversion vs. modesty – Dan Trustworthiness – Dan, Steve Economic infrastructure – Vishal

Proposal 20 pages Vision (2-3)  Henning Architecture (2-3)  everyone Research agenda – lower layers (optical)  Keren – network support (L3)  Ken, Jim – routing  JI – supporting infrastructure (bindings, lookup, …)  Keith, Volker – introspection & modesty  Dan – security & privacy infrastructure  Steve – economic infrastructure  Vishal – social aspect: network neutrality? economic incentives? policy issues?  Bob Atkinson Collaboration Education & Outreach

switch CPU 10GigE router storage & computation POP

network MAC PHY transport application PHY MAC network transport application distribute code gather data manage nodes distribute code gather data manage nodes storag e binding service assuranc e service signaling (control plane) end node router