Concerns with Network Research Funding S.Floyd & R. Atkinson, Editors Internet Architecture Board draft-iab-research-funding-02.txt.

Slides:



Advertisements
Similar presentations
Whos who in the IETF Zoo? Geoff Huston Executive Director, Internet Architecture Board.
Advertisements

All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Identifying MPLS Applications
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Quality of Service(QoS). Outline Why QoS is important? What is QoS? QoS approach. Conclusion.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
UNCW UNCW SIGGRAPH 2002 Topic #3: Continuous Media in Wired and Wireless Environments Ronald J. Vetter Department of Computer Science University of North.
Networks and Distributed Systems: Project Ideas
Middle Boxes Lixia Zhang UCLA Computer Science Dept Sprint Research Symposium March 8-9, 2000.
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
EECS 122 Communications Networks Department of Electrical Engineering and Computer Sciences University of California Berkeley Slides: K. Fall, K. Lai,
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
Internet Research Needs a Critical Perspective Towards Models –Sally Floyd –IMA Workshop, January 2004.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Chapter 1 Read (again) chapter 1.
Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers C. E. Perkins & P. Bhagwat Presented by Paul Ampadu.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
CS 268: Future Internet Architectures Ion Stoica May 6, 2003.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
Internet Protocol Security (IPSec)
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Abstraction and Control of Transport Networks (ACTN) BoF
MPLS networking at PSP Co Multi-Protocol Label Switching Presented by: Hamid Sheikhghanbari 1.
Chapter 14 Managerial issues in networking. Overview Network design Network management – Hardware – Software Technology standards Role of government and.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
1 WP2.5: Definition of the network architecture. 2 Outline About M20 Analysis of business models Analysis of physical and link layer Topology under consideration.
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
End-to-End QoS Specification Issues in the Wired and Wireless Environment 通工所 陳昱豪.
Concerns with Network Research Funding S.Floyd & R. Atkinson, Editors Internet Architecture Board.
Update on the Internet Research Task Force Aaron Falk IRTF Chair IETF-72 – Dublin.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Final Review EECS 489 Computer Networks Z. Morley Mao Monday April 16, 2007.
Chapter 1. Introduction. By Sanghyun Ahn, Deot. Of Computer Science and Statistics, University of Seoul A Brief Networking History §Internet – started.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Standard for a Convergent Digital Home Network for Heterogeneous Technologies Zhimeng Du 12/5/2013.
Apartado Porto Codexwww.inescporto.pt tel (351) fax (351) /April/2005 Research Activities in 4G Networks at INESC Porto.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Securing IPv6 Ken Renard WareOnEarth Communications, Inc.
AKARI New Generation Network Architecture SeungHo Lee.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
A Combat Support Agency Defense Information Systems Agency GIG EWSE IA and NetOps (EE213) 17 August 2011 UNCLASSIFIED Tactical Edge Service: NetOps and.
1 Events that Took Place... Exposure to interesting applications and their requirements (buildings, fountains, theatre,...) Discussion about radically.
Multimedia & Mobile Communications Lab.
APPLICATION LAYER MULTICASTING
Security in Cloud Computing Zac Douglass Chris Kahn.
1 Computer Engineering Department Islamic University of Gaza ECOM 6303: Advanced Computer Networks (Graduate Course) Spr Prof. Mohammad A. Mikki.
Network Reliability and Interoperability Council VII NRIC Council Meeting Focus Group 1B Network Architectures for Emergency Communications in 2010 September.
Internet Protocol Addresses What are they like and how are the managed? Paul Wilson APNIC.
Future for internet streaming media Adolfo M. Rosas EU workshop January 19, 2010 Future research priorities in the Networked Media Systems research area.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
Multimob_BarBOF_dvh.ppt Multimob requirements towards existing mobility protocols Issues for update of draft ‚Multicast Support Requirements for Proxy.
Internet Technology & Network Management Lecture # 01 Information Technology Lucky Sharma Subject Code: IT 603.
Inter-domain Routing Outline Border Gateway Protocol.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Spring 2016.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
15-849: Hot Topics in Networking Policy and Networks Srinivasan Seshan 1.
Multicast in Information-Centric Networking March 2012.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
SDN challenges Deployment challenges
Potential Areas of Research Activity – March 2000
SECURING NETWORK TRAFFIC WITH IPSEC
SCTP: Stream Control Transport Protocol
Presentation transcript:

Concerns with Network Research Funding S.Floyd & R. Atkinson, Editors Internet Architecture Board draft-iab-research-funding-02.txt

Objectives Describe a wide range of open networking research topics Advocate increased network research funding

Summary of IAB Concerns Ongoing research in networking is important for future Internet health. Commercial research funding is necessary and important, but has proven insufficient. Non-commercial funding for networking research declined in the mid/late 1990s

Today’s Reality Industry focus is on applied research Longer-term, higher-risk, research significantly less likely to garner industry funding Architectural work has had minimal funding for several years There are many open Internet research topics

Examples of Open Research Topics

Important Caveats IAB is not trying to acquire research funding for itself or IRTF (or IETF). IAB is not trying to list each/every open research topic in this document. Goal of our list is simply to demonstrate the breadth of the open research topics.

Naming Internet has several namespaces at present: –IP addresses, Sockets, Domain Names Many IRTF NSRG members think additional namespaces desirable –NSRG did not reach smooth consensus on details, however DNS has various inconvenient limitations and issues –What alternative approaches might exist? –How can we remove some limitations ?

Unicast Routing Concerns about end-to-end BGP convergence times growing as routing table size increases Desires for improved, more sophisticated routing metrics –Lowest monetary-cost, lowest packet loss, others Concerns about site multi-homing Desire for additional/improved routing algorithms –Something beyond link-state, distance-vector, path- vector –Includes work on graph theory applicable to routing

Multicast Routing Desires for improved multicast routing architectures Desires for new/improved routing algorithms Desires for approaches that are easier to deploy Desires for approaches that are easier to operate

Mobile & Ad-Hoc Routing Current work interesting, but not the final word Desire for mobility to be a native property of the Internet –rather than mobility via an add-on protocol Self-organising and dynamic routing systems create new security challenges Desire for alternative approaches to wireless scalability.

Security: Formal Methods & Key Mgmt Formal Methods work: –Security Models, –Trust Models, –Cryptographic Protocols, etc. Key Management work: –Non-hierarchical key management –More general approaches to multicast key mgmt

Security: Distributed Computing Kerberos is great, but… –Not easy to initially deploy –Has centralised security model Desires include: –Improved support for ad-hoc computing –Easier-to-deploy approaches –Better support for inter-domain authentication –Better support for grid computing

Security: Deployment Considerations Theoretically perfect security often impractical to deploy “Mostly secure” approaches that are easy to deploy might provide greater risk reduction Need security mechanisms that are: –Easy to implement correctly –Easy to deploy correctly –Easy to manage

Network Management SNMP & MIBs are great, but not the last word Monitoring devices has been more successful than managing networks --> need to manage networks Funding organisations don’t always consider Network Management “legitimate” research –Need to change that mindset

Quality of Service IETF has several QoS mechanisms: –Integrated Services (e.g. RSVP) –Differentiated Services (e.g. IP ToS) Inter-domain QoS mechanisms available today create easily exploited DDOS vulnerabilities Today’s de facto QoS deployments rely on over- provisioned network capacity IETF lacks an overall QoS architecture Need more research on QoS architecture

Congestion Control Modifying congestion control for new environments: –Streaming media; multicast applications. –Wireless; paths with reordering, intermittent connectivity, etc. –Very high-bandwidth paths. Communication between transport and other layers ? Router-based congestion control mechanisms Understanding traffic dynamics in large, complex networks.

Evolution of the Internet We need to better understand the factors that affect evolution of the Internet: Technical and architectural issues. Changes in the infrastructure over time. The role of standards. Economic and public policy factors.

Obstacles to Evolution Need to better understand the obstacles to evolution: –Increased complexity –Interactions between layers –Interventions by middleboxes, etc. Need to understand how to accomodate increased complexity without unduly constraining evolution.

Additional Topics There are lots of good research topics not mentioned in this document.

Conclusions Increased research funding, particularly from non-commercial sources is desirable Increased support for basic research, including architectural work needed Absent additional research funding, future of the Internet might not be as bright

Issues not addressed by the IAB draft: Research about topics not related to IETF standards. Promising avenues for future research. The needs for basic research.