Future Internet Architecture Panel Discussion 2006 Broadnets Conference San Jose October 4, 2006 John Musacchio Assistant Professor Technology and Information.

Slides:



Advertisements
Similar presentations
Brief-out: Isolation Working Group Topic discussion leader: Ken Birman.
Advertisements

Secure Routing Panel FIND PI Meeting (June 27, 2007) Morley Mao, Jen Rexford, Xiaowei Yang.
Market Enabling Network Architecture NSF FIND PI Meeting Arlington, VA June 27, 2007 John Musacchio Assistant Professor Technology and Information Management.
1 Mata Architecture for the Future Network APAN2008 January Myung-Ki SHIN, ETRI
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
EC-GIN Europe-China Grid InterNetworking. Enriched with customised network mechanisms Original Internet technology Overview of Project Traditional Internet.
Policy and Regulatory Challenges – Technology Providers View February 14 Challenges for Successful Implementation of ICT Projects Challenges for Successful.
1 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Next Generation Network Architectures Summary John.
Layering and the network layer CS168, Fall 2014 Sylvia Ratnasamy
PlanetLab Architecture Larry Peterson Princeton University.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Barath Raghavan, Kashi Vishwanath, Sriram Ramabhadran, Kenneth Yocum, Alex C. Snoeren Defense: Rejaie Johnson, Xian Yi Teng.
How Much? For What? Thoughts on Economic Issues in Networks Jean Walrand U.C. Berkeley Thoughts on Economic Issues in Networks Jean Walrand U.C. Berkeley.
Tussle in Cyberspace: Defining Tomorrow’s Internet by David D. Clark, John Wroclawski Karen R. Sollins, Robert Braden Offense: Ionut Trestian.
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Amit Mondal Courtesy to Ahamed Mohammed/Rice.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
The End of Internet Architecture Author: Timothy Roscoe Presented by Gross, Zhaosheng Zhu.
Supporting Classroom Interaction with Networked Tablet PCs Richard Anderson Professor of Computer Science and Engineering University of Washington.
Using Prices to Allocate Resources at Access Points Jimmy Shih, Randy Katz, Anthony Joseph One Administrative Domain Access Point A Access Point B Network.
UCB Communication Networks: Big Picture Jean Walrand U.C. Berkeley
Communication Networks A Second Course Jean Walrand Department of EECS University of California at Berkeley.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Internet Infrastructure and Pricing. Internet Pipelines Technology of the internet enables ecommerce –Issues of congestion and peak-load pricing –Convergence.
Software Defined Network (SDN) and Network Virtualization
Service Oriented VoIP (SOVoIP): True Convergence of Data and Voice Networks Presented By Mohammed Jubaer Arif Supervisors Dr Shanika Karunasekera and Dr.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,
©2014 Extreme Networks, Inc. All rights reserved. Microsoft Skype for Business Integration Overview Leveraging the Power of Technology Partnerships Niels.
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Ahamed Mohammed.
Resilience of the Internet Interconnection Ecosystem Chris Hall Ross Anderson Richard Clayton Evangelos Ouzounis Panagiotis Trimintzios WEIS 14 th June.
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
Internet Basics Monopoly Concerns & Review TC 310 May 22, 2008.
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 2: Overview of Computer Network.
ECEN “Internet Protocols and Modeling”, Spring 2012 Slide 2.
VOICE OVER INTERNET PROTOCOL. INTRODUCTION SCENARIOS IN INTERNET TELEPHONY VOIP GATEWAYS IMPORTANCE OF VOICE OVER IP BENEFITS & APPLICATIONS ADVANTAGES.
QoS research in a complicated world Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
1 Purdue CWSA Workshop 2004 Grand Challenges in Wireless Wide Area Networks (WAN) – A System Perspective Junyi Li Senior Director of Technology Flarion.
A Community Information Management System by Pangea Foundation.
Covilhã, 30 June Atílio Gameiro Page 1 The information in this document is provided as is and no guarantee or warranty is given that the information is.
WHAT IS NETWORKING?. Networking is … How computers talk to each other.
Jean Walrand – NSF – April 24-25, 20031/5 Economic Mechanisms Grand Challenge: Design economic mechanisms that provide incentives for increasing the utility.
Scott Teeters, Jr. MicroSolved, Inc. in partnership with Sogeti USA How to Fail A Penetration Test Concepts in Securing a Network.
DriveSense’14 NSF Workshop on Large-Scale Traffic and Driving Activity Data DriveSense’14, Oct 30-31, Norfolk, VA.
International Telecommunication Union Workshop on Next Generation Networks: What, When & How? Geneva, 9-10 July 2003 NGN Research in China Jiang lin-tao.
Group 3 Characterization of Wireless: Network layer and above.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
1 Protocol Layering Myungchul Kim Tel:
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
1 Thrust 5: Secure Wireless Networking Technologies For future generation wireless packet networks, two most important aspects need to be addressed: QoS.
Content Delivery Networks: Status and Trends Speaker: Shao-Fen Chou Advisor: Dr. Ho-Ting Wu 5/8/
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Scrapping the Internet Presented by Dhaval Joshi.
Electronic Commerce Semester 2 Term 2 Lecture 14.
September 2009Network Neutrality – the Norwegian ApproachPage 1 Network Neutrality – the Norwegian Approach Senior Adviser Frode Soerensen Norwegian Post.
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
Customer Guide to Limited-Time Offer
CHAPTER 2 Application Layer.
Internet Interconnection
Software Defined Networking (SDN)
ECE 4450:427/527 - Computer Networks Spring 2017
Internet Traffic Management: Security vs. Economics
Telecommunications and Networking
Application Layer Mobility Management Scheme for Wireless Internet
Good Morning 1/17/2019.
Communication Networks
Outline The concept of perimeter defense and networks Firewalls.
Presentation transcript:

Future Internet Architecture Panel Discussion 2006 Broadnets Conference San Jose October 4, 2006 John Musacchio Assistant Professor Technology and Information Management University of California, Santa Cruz

Challenges Design a network for applications yet to be invented! Ideal architecture needs to be: – Flexible to allow innovation at the application layer – “Lightweight” – strongpoint of current Internet design. – Address shortcomings Security Real time applications Others? John Musacchio – Broadnets 2006

What makes problem easier? Don’t worry about: – Problems decoupled from network layer (Innovation can happen independently of network architecture.)

Issues: Quality of Service over wireless – co-existence of TCP and traffic from real time applications Pricing granularity Security – Current Internet designed for community of “colleagues” – Enable markets for security Revenue sharing – Between transport providers – Between Transport and Content Providers – (May or may not require architectural changes.) Markets for service quality – Current Internet often inadequate for high-bit rate real time apps. WEB Real time Per Link Cong. Pricing Flat Rate User Pricing, Peering Agreements complexity ISP 1ISP 2 $ ? John Musacchio – Broadnets 2006

Possible Non Issues? Problems that are best dealt with at the application layer – New to Peer to Peer architectures? – Multicast Functionality achieved through CDNs and application layer multicast. Physical and Link Layers of wired links – Innovation can happen independent of transport and network layers – However wireless can benefit from more cross-layer communication. Balance between cross layer coordination vs. “spaghetti architecture.” John Musacchio – Broadnets 2006

NSF-Find: Market-Enabling Network Architecture (9/ /2009) Jean Walrand Venkat Anantharam John Musacchio John Musacchio – Broadnets 2006 Issues specific to our project on Market- Enabling Network Architecture

Internet Today – Service Inadequacy Problems: – User has no visibility to bottlenecks. means to go around bottleneck. way to signal willingness to pay to bottleneck. – Bottleneck ISP has little incentive to upgrade. Some of the benefits of upgrade may accrue to other providers. Bottleneck USER with High willingness to pay For high rate, real time service. ISP1 ISP2 John Musacchio – Broadnets 2006

Service Choice Idea: Users offered real-time choice: “red” and “blue” – “red” and “blue” not specified to users in detail; – Users decide based on which they think gives better performance – Market will push providers to make improvements, and offer services more suitable for intensive real-time applications. – No need to dictate QoS parameters a “standard.” Let the market decide! John Musacchio – Broadnets 2006

Internet Today – Security Inadequacy Users do not see full cost of poor computer and network maintenance – Example By failing to update my antivirus software, my computer can spread viruses to others. Drivers do not see full cost of reckless driving. By forcing drivers to get liability insurance, drivers incentivized to be careful. ANALOGY John Musacchio – Broadnets 2006

Markets for Security Use power of markets to improve network security. Example: – Users pay to be certified by a Certification Agency (CA) – CA takes on liability for attacks traced back to user – CA incentivized to encourage users to take due care $ Zzzz OS Update Antivirus Update

Markets for Security Possible incentives for users to go to CA – Make it Mandated? (probably not realistic) – Network drops discards uncertified packets in crisis. Architectural Requirements: – Improve traceability of attacks – Mechanism for dropping uncertified packers John Musacchio – Broadnets 2006