1 Open Pluggable Edge Services OPES Abbie Barbir, Ph.D.

Slides:



Advertisements
Similar presentations
Authentication Authorization Accounting and Auditing
Advertisements

PASSPrivacy, Security and Access Services Don Jorgenson Introduction to Security and Privacy Educational Session HL7 WG Meeting- Sept
1 Introducing the Specifications of the Metro Ethernet Forum.
GT 4 Security Goals & Plans Sam Meder
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
1 Understanding Web Services Presented By: Woodas Lai.
Arrow color indicates specific subset of Security Service Desk Common Backplane API. is DC Backplane API impledmented by the Backplane Services. Devices.
Securing the Broker Pattern Patrick Morrison 12/08/2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Jacob Boston Josh Pfeifer. Definition of HyperText Transfer Protocol How HTTP works How Websites work GoDaddy.com OSI Model Networking.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Streaming Media Protocols Jani Hautakorpi Henry Pohan.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Initial slides for Layered Service Architecture
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Web Services Glossary Summary of Holger Lausen
Integration Broker PeopleTools Integration Broker Steps –Introduction & terminologies –Application Server PUB/SUB services (Application Server)
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
OPES SMTP Use Cases OPES WG at 62 th IETF in Minneapolis OPES WG 62 th IETF, Minneapolis, MN, USA OPES SMTP Use Cases draft-ietf-opes-smtp-use-cases-00.txt.
Kuali Enterprise Workflow Presented at ITANA October 2009 Eric Westfall – Kuali Rice Project Manager.
OpenPASS Open Privacy, Access and Security Services “Quis custodiet ipsos custodes?”
Management for IP-based Applications Mike Fisher BTexaCT Research
AIMS’99 Workshop Heidelberg, May 1999 P805: Internet Roaming Giuseppe Sisto - Telecom Italia / CSELT Project participants:
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
11 December, th IETF, AAA WG1 AAA Proxies draft-ietf-aaa-proxies-01.txt David Mitton.
IETF70 DIME WG1 ; ; Diameter Routing Extensions (draft-tsou-dime-base-routing-ext.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
Open Pluggable Edge Services (opes) 61st IETF Meeting Washington, D.C., USA.
Infrastructure Service Approach to Handling Security in Service-Oriented Architecture Business Applications Doina Iepuras.
IETF67 DIME WG Towards the specification of a Diameter Resource Control Application Dong Sun IETF 67, San Diego, Nov 2006 draft-sun-dime-diameter-resource-control-requirements-00.txt.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Content Distribution Internetworking IETF BOF December 12, 2000 Phil Rzewski Gary Tomlinson.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
WREC Working Group IETF 49, San Diego Co-Chairs: Mark Nottingham Ian Cooper WREC Working Group.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
WEB SERVICES.
Configuring and Troubleshooting Routing and Remote Access
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Session Initiation Protocol (SIP)
ICAP at Network Edge Caches
Distributed Systems Bina Ramamurthy 11/30/2018 B.Ramamurthy.
Security & .NET 12/1/2018.
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
IS4680 Security Auditing for Compliance
Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-02 Rakesh Kumar Juniper networks.
SOA in Action Chapter 10 B. Ramamurthy 1/16/2019.
Presented by: Francisco Martin-Recuerda
ICAP at Network Edge Caches
Distributed Systems Bina Ramamurthy 4/22/2019 B.Ramamurthy.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Standards, Models and Language
Presentation transcript:

1 Open Pluggable Edge Services OPES Abbie Barbir, Ph.D.

2 Summary Summary Presents an overview of OPES model and architecture Core Model Elements are OPES Intermediary OPES Admin Server Remote Call-out Server Introduce Content Services Overlay Networks Current Issues of OPES in IETF

3 Some Definitions DELEGATE A 'caching proxy' located near or at the network access point of the 'user agent', delegated the authority to operate on behalf of, and typically working in close co-operation with a group of 'user agents‘.SURROGATE A gateway co-located with an origin server, or at a different point in the network, delegated the authority to operate on behalf of, and typically working in close co-operation with, one or more origin servers. Responses are typically delivered from an internal cache. OUT-OF-PATH Out-of-Path Content Services are not natively in the transport path of an application. In other words, they are not necessarily resident (or co- resident) on entities that are natively in the path of application flows. In-PATH In-Path Content Services are naturally within the message path of the application they are associated with. This may be an application proxy, gateway, or in the extreme case, one of the end-hosts, that is party to the application

4 Some Definitions POLICY DECISION POINT A logical entity that makes policy decisions for itself or for other network elements that request such decisions. POLICY ENFORCEMENT POINT A logical entity that enforces policy decisions. CONTENT SERVICE NETWORK An overlay network of 'intermediaries' layered onto an underlying network that incorporate 'content services' that operate on messages flowing through the 'content path' CONTENT PATH Describes the path that content requests and responses take through the network. Typically, Requests/Responses flow between a client, an 'OPES intermediary', and a 'content server‘

5 OPES System Model Local Exec. Env. Env. Remote Exec. Env. Env. OPES Engine/PEP OPESIntermediary ClientContentServer Authentication Authorization/PDP Accounting OPES Admin Server Remote Call-out Server ProvisionOPES ContentServices

6 OPES Engine Components Rule Module Rule Processor Message Parser ProxyletProxylet Proxylet Library RemoteCall-outStubRemoteCall-outStub Remote Call-out System Local Exec. Env. Remote Exec. Env. OPES Engine Remote Call-out Protocol(s) Proxylet Run-time System Clients ContentServers (1) (4) (2) (3)

7 Surrogate Authoritative Domain OPESIntermediary Remote Call-out Server OPES Admin Server OriginServer AuthoritativeDomain Client

8 Delegate Authoritative Domain OPESIntermediary Remote Call-out Server OPES Admin Server OriginServer AuthoritativeDomain Client

9 Content Service Overlay Networks Origin Server Client Packet Network Content Network Overlay Edge Node Content Services Network Overlay OPES Engine Remote Call-out Server OPES Admin Server

10 Relation to other Work Proxy cache iCAP Client Origin Server Client OPES iCAP Server P3P What I will let someone else do with which info P3P Specify what I do with info I collect CC/PP Client device capabilities User preferences……… TCN iCAP UPIP ContentEdge DIWG Device Capabilities ESI Object Level Cache

11 OPES Complementary efforts IETF Transparent Content Negotiation (TCN) W3C P3P CC/PP DIWG ESI ICAP Org ICAP ITU Content Description (MPEG-21) Others DRM Policy Audit, Log, Performance, Fault mgmt Security

12 OPES Issues in IETF OPES services should be traceable by the application endpoints of an OPES-involved transaction, OPES services should be traceable by the application endpoints of an OPES-involved transaction, Both service providers and end-users should detect and respond to inappropriate behavior by OPES components Both service providers and end-users should detect and respond to inappropriate behavior by OPES components Services provided in the OPES framework should be reversible by mutual agreement of the application endpoints Services provided in the OPES framework should be reversible by mutual agreement of the application endpoints OPES protocol must include authorization as one if its steps, and this must be by at least one of the of the application-layer endpoints (i.e. either the content provider or the content consumer). OPES protocol must include authorization as one if its steps, and this must be by at least one of the of the application-layer endpoints (i.e. either the content provider or the content consumer).

13 OPES Status in IETF WG status just approved WG status just approved New Charter New Charter Define a framework and protocols to both authorize and invoke distributed application services while maintaining the network's robustness and end-to-end data integrity Define a framework and protocols to both authorize and invoke distributed application services while maintaining the network's robustness and end-to-end data integrity Server-centric (administrative domain that includes the origin server) Server-centric (administrative domain that includes the origin server) client-centric (administrative domain that includes the user agent) client-centric (administrative domain that includes the user agent) Investigate whether the developed architecture must be to be compatible with the use of end-to-end integrity and encryption Investigate whether the developed architecture must be to be compatible with the use of end-to-end integrity and encryption May need to examine the requirements for both authorization and invocation of application services inside the network May need to examine the requirements for both authorization and invocation of application services inside the network Create an architecture for OPES services applied to application messages, and specify the protocol for HTTP and RTP/RTSP Create an architecture for OPES services applied to application messages, and specify the protocol for HTTP and RTP/RTSP Define methods for specification of policies, as well as the rules that enable application endpoints to control execution of such services Define methods for specification of policies, as well as the rules that enable application endpoints to control execution of such services

14 Q&A