3/21/001 What did we learn at this workshop? Dan Nessett, moderator Usenix Special Workshop on Intelligence At the Network Edge San Francisco, CA March.

Slides:



Advertisements
Similar presentations
1 Mata Architecture for the Future Network APAN2008 January Myung-Ki SHIN, ETRI
Advertisements

Fundamental Issues of Future Internet Introduction, Design Goals and Principles Mingwei Xu Qingdao.
Multi-service Architecture: Evolution of Network Architecture Keith Knightson Khalid Ahmad Carrier Data Networks Nortel Networks, Canada IP-Networking/Mediacom.
Scheduling in Web Server Clusters CS 260 LECTURE 3 From: IBM Technical Report.
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Lecture 12 Page 1 CS 111 Online Devices and Device Drivers CS 111 On-Line MS Program Operating Systems Peter Reiher.
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Middle Boxes Lixia Zhang UCLA Computer Science Dept Sprint Research Symposium March 8-9, 2000.
Citrix Partner Update The Citrix Delivery Centre.
Rethink the design of the Internet CSCI 780, Fall 2005.
A Framework for Scalable Global IP-Anycast Sigcomm 2000, Dina Katabi Presented by Wei Yu.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Circuit & Application Level Gateways CS-431 Dick Steflik.
A “net head” view on SIP Henning Schulzrinne Columbia University IRT Lab Siemens Munich -- January 2003.
1© Copyright 2015 EMC Corporation. All rights reserved. SDN INTELLIGENT NETWORKING IMPLICATIONS FOR END-TO-END INTERNETWORKING Simone Mangiante Senior.
Web Cache. Introduction what is web cache?  Introducing proxy servers at certain points in the network that serve in caching Web documents for faster.
Firewalls: General Principles & Configuration (in Linux)
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Voice over IP Fundamentals M. Arvai NEC Senior Technical Eng. 1.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Chapter 1: Hierarchical Network Design
1 Proxy-based Adaptation for Mobile Computing ECET 581 Spring 07 Authors: Markus Endler Hana Rubinsztejn Ricardo C. A. da Rocha Vagner Sacramento ISSN.
Norbert Niebert, Andreas Schieder, Henrik Abramowicz, Christian Prehofer, Holger Kart Ambient Networks projects, EU’s 6 th Framework Programme
1 Open Pluggable Edge Services OPES Abbie Barbir, Ph.D.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
A Combat Support Agency Defense Information Systems Agency GIG EWSE Application and Service (EE212) 17 August 2011 Tactical Edge Service: Service Adaption.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Sharing a single IPv4 address among many broadband customers
Putting Intelligence in Internetworking: an Architecture of Two Level Overlay EE228 Project Anshi Liang Ye Zhou.
Management for IP-based Applications Mike Fisher BTexaCT Research
1 FAQ’S ABOUT WAP Presented By Abhilash Pillai CSCI 5939-Independent Study.
Web Cache Redirection using a Layer-4 switch: Architecture, issues, tradeoffs, and trends Shirish Sathaye Vice-President of Engineering.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
A Combat Support Agency Defense Information Systems Agency GIG EWSE IA and NetOps (EE213) 17 August 2011 UNCLASSIFIED Tactical Edge Service: NetOps and.
1 IPv6 for the Network Edge Steve Deering March 20, 2000.
Codes, Peers and Mates Media processing meets future networks EU Workshop on thematic priorities in Networked Media Brussels January 19 th 2010 Ebroul.
Towards a Platform for Intelligent Activity at the Edge Hilarie Orman Advanced Development Group Novell, Inc.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
62 nd IETF – CAPWAP Working Group1 CAPWAP Objectives Saravanan Govindan March 2005.
IPv 邱文揚 Joseph 李家福 Frank. Introduction The scale of IPv4 Internet has become far larger than one could ever imagine when designing.
What comes next in Internet infrastructure: quality of service, IPv6, and more Brian E Carpenter Program Director, Internet Standards & Technology, IBM.
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
STORAGE ARCHITECTURE/ MASTER): Where IP and FC Storage Fit in Your Enterprise Randy Kerns Senior Partner The Evaluator Group.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Panel: "QoS Provisioning at the Network Edge" John Vicente Intel Corporation / Columbia University USENIX Special Workshop on Intelligence at the Network.
Multicast in Information-Centric Networking March 2012.
Towards more flexible networks -- backyard of IMT Takashi Egawa NEC Corporation Rapporteur, Q.14, SG13 1.
Chapter 1: Explore the Network
Networking in the Enterprise
IPv6 for the Network Edge
Design Decisions / Lessons Learned
ICAP at Network Edge Caches
Chapter 8: Subnetting IP Networks
Sizing …today. T: Here’s how. .
ICAP at Network Edge Caches
Advanced Computer Networks
CSE 542: Operating Systems
Presentation transcript:

3/21/001 What did we learn at this workshop? Dan Nessett, moderator Usenix Special Workshop on Intelligence At the Network Edge San Francisco, CA March 20, 2000

3/21/002 What did we learn at this workshop? What is the “edge” ? - A host? - An organizational or spatial boundary? - A protocol layer boundary (e.g., above layer 3)? Edge intelligence can be used for : - sub-multiplexing address/name spaces. - scalable QoS provisioning. - distribution of content processing and caching.

3/21/003 What did we learn at this workshop? Why put intelligence at the edge? - improves scalability. - raises difficult issue - do you make functionality transparent (translucent?) or visible? - when edge = end system, can shift responsibility for some services [but will this really work?]. - allows offload of functionality from less capable devices to “gateway” or “surrogate” with more capability. - but, why use IP for this? Can’t less capable devices be considered “peripherals”?

3/21/004 What did we learn at this workshop? Intelligence at the edge complicates (simplifies) management - may make fault diagnoses/correction harder. - may make management harder (heterogeneity). - however, can improve fault tolerance. - also, may make management more scalable (e.g., firewalls). How does end-to-end security affect edge intelligence? - E2E encryption can hide data used for decision making. - E2E encryption can prevent rewriting data in packets. - Will affect web proxies and network device packet classification significantly.

3/21/005 What did we learn at this workshop? Edge intelligence can break coherent architecture. - May introduce more problems than it solves. - Need an intelligent edge device “architecture” to help minimize problems introduced into overall system. Need work on middle box discovery; auto-configuration.