Self-Managed Networks: Dream or Reality? Jawad Khaki Corporate Vice President Windows Networking & Device Technologies.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Network Systems Sales LLC
NDN in Local Area Networks Junxiao Shi The University of Arizona
Autonomic Systems Justin Moles, Winter 2006 Security in an Autonomic Computing Environment Paper by: D. M. Chess, C. C. Palmer S. R. White Presentation.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Catalyst Smart Operations Automates the trivial and repetitive tasks.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
Building Enterprise Applications Using Visual Studio ®.NET Enterprise Architect.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
The state of home networks CSE481M: Home Networking Capstone March 30 th, 2011.
Traffic Engineering With Traditional IP Routing Protocols
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
The Design Philosophy of the DARPA Internet Protocols D. D. Clark.
Chapter 1 Read (again) chapter 1.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
1© Copyright 2015 EMC Corporation. All rights reserved. SDN INTELLIGENT NETWORKING IMPLICATIONS FOR END-TO-END INTERNETWORKING Simone Mangiante Senior.
Oracle Database Administration. Rana Almurshed 2 course objective After completing this course you should be able to: install, create and administrate.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
What is Network Administration ??
Private Cloud: Application Transformation Business Priorities Presentation.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
ATIF MEHMOOD MALIK KASHIF SIDDIQUE Improving dependability of Cloud Computing with Fault Tolerance and High Availability.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Essence and Accident in Software Engineering By: Mike Hastings.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
1 Autonomic Computing An Introduction Guenter Kickinger.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
Reliability Andy Jensen Sandy Cabadas.  Understanding Reliability and its issues can help one solve them in relatable areas of computing Thesis.
Software Software is omnipresent in the lives of billions of human beings. Software is an important component of the emerging knowledge based service.
Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,
Hospitality Management. The Big Problem in Hospitality Poor task and event execution of corporate strategy costs – 2% – 5% of Annual Revenues Analysts.
Private Cloud: Manage Data Center Services Business Priorities Presentation.
Addressing Issues David Conrad Internet Software Consortium.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Microsoft.com/publicsector Records Management Microsoft Records Management for Government Agencies.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
Microsoft Management Seminar Series SMS 2003 Change Management.
Virtual Infrastructure By: Andy Chau Farzana Mohsini Anya Mojiri Virginia Nguyen Bobby Phimmasane.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
CSE 303 – Software Design and Architecture
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
1 The Requirements Problem Chapter 1. 2 Standish Group Research Research paper at:  php (1994)
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
NetModule Cloud Solution Professional M2M Networking out of the Cloud © 2014 NetModule AG Slide 1.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
Routing Semester 2, Chapter 11. Routing Routing Basics Distance Vector Routing Link-State Routing Comparisons of Routing Protocols.
1 Automating Network Diagnostics to Help End-Users Dave Thaler
Organizing and leading the IT function Two set of tensions guide policies for developing, deploying and managing IT systems. 1.Innovation and control a.How.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Chapter 19 - Why The Internet Works Well Introduction The Internet Works Well Open System (non-proprietary) IP Provides Flexibility [uses "layered protocol"
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
Chapter 21 Successfully Implementing The Information System.
Constraints on Automated Key Management for Routing Protocols
Building Enterprise Applications Using Visual Studio®
Cisco Compliance Management and Configuration Service
Azure Primed Randy Pagels Sr. Developer Technology Specialist
Your Business Opportunity
Software Defined Networking (SDN)
The Globus Toolkit™: Information Services
Appliances And Incident Response
Routing in Multiple Layers: Opportunities and Challenges
CS385T Software Engineering Dr.Doaa Sami
Presentation transcript:

Self-Managed Networks: Dream or Reality? Jawad Khaki Corporate Vice President Windows Networking & Device Technologies

Current Situation Management is expensive Devices only understand low-level settings Diagnostics/monitoring is primitive Need a comprehensive network solution ISP, hotspot EnterpriseHome

IT Complexity & Cost IT Budgets

Pain Points Complexity due to inconsistency Heterogeneous world Different configuration models Variety of monitoring techniques Version/vendor specific repair procedures Hard to understand dependencies Networking problems are a significant cause of overall service failure (Oppenheimer, USITS’03) Network causes 15% of all problems resulting in downtime (Forrester survey of IT pros)

Not humanly solvable Operator error is largest cause of service failures in some environments (Oppenheimer, USITS’03) 40% of downtime is due to human operators (Candea, ’03) In many environments, operator may not be tech savvy (e.g., home) or even immediately available (e.g., space, sensor nets). Consumer networking support calls are time consuming, e.g., power cycle router/modem = avg 53 min (MS PSS)

End-to-End Approach Essential Apps/users understand behavior desired Network admins understand high-level design goals/constraints The dream is to integrate end-user knowledge and administrative goals

Big Dreams Self-managing networks Self-deploying and self-cleaning Self-configuring and self-adapting Self-optimizingSelf-protectingSelf-monitoringSelf-diagnosingSelf-healing Prevention more than cure A self-* system requires knowledge of itself and its environment, it is self-aware

Some Real Examples Today Policy distribution systems allow auto- deployment of configuration across a network Routing protocols auto-adapt to topology changes and failures TCP auto-adapts to congestion

Demos

Product Engineering Challenge Design for experience End user: Focus on the task not technology Network manager: Design, deploy, operate Must get the fundamentals right Essential to think through scenarios Work flow IntelligenceEnvironment Always keeping the customer in mind

Hard issues

Multiple administrative organizations Different relationships PeersCustomer-providerArbitrary Lack of trust motivates privacy constraints Unaligned goals means configuration is a challenge

Possibility of catastrophic failure Defect in automation can have disastrous results “Rogue equipment can create a monster headache. It can easily waste a million dollars of resources.” -IT admin, large LA corporation Broadcast storms due to protocol or software bugs (Spurgeon, 1989) One router vendor tried offering automated config repair features, but found that customers were afraid to deploy it Possibility of exploitation by malware

Tension between control and automation Flexibility of business models and preferred treatments Compliance requirements Job security for operators Natural aversion to loss of control Change to unfamiliar technology

Need to find the right balance Policy to express high-level constraints Self-management within those constraints Control Automation Static routes Static addresses etc Dynamic routing Dynamic addresses etc BALANCE

Summary Innovation in fundamentals just as important as new scenarios Make secure, effortless, reliable, efficient operation the forethought Let humans succeed at what they’re good at Let’s solve the hard issues

Dealing with heterogeneity of device types and vendors Hard to visualize existing state and dependencies Expensive to maintain multiple configuration/monitoring systems Need for common solutions Simplicity Heterogeneity

Dealing with poorly written applications “Some applications need to know what machine a person is on...we found that giving the docking stations a static IP address and the laptop a static IP address makes it easier for us.” (IT Admin, Medium Org, New York)