pervasive 2002 zurich switzerland pervasive computing: it’s all about network services
DESCRIPTION
Pervasive 2002 Zurich Switzerland Pervasive Computing: It’s All About Network Services. Randy H. Katz The United Microelectronics Corporation Distinguished Professor Computer Science Division, EECS Department University of California, Berkeley Berkeley, CA 94720-1776 USA - PowerPoint PPT PresentationTRANSCRIPT
1
Randy H. KatzThe United Microelectronics Corporation Distinguished Professor
Computer Science Division, EECS DepartmentUniversity of California, BerkeleyBerkeley, CA 94720-1776 USA
Pervasive 2002Zurich Switzerland
Pervasive Computing:It’s All About Network Services
2
New Pervasive Networking Opportunity
• New things you can do inside the network• Connecting end-points to “services” with
processing embedded in the network fabric• Not protocols but “agents” well-specified
behavior, executing in places in the network• Layer violation to enhance awareness
acceptable: location, network topology, data format, protocol, subscriber identify, service in execution
• Scalable session and flow-oriented processing: measuring, monitoring, billing, prioritizing
• No single technical architecture likely to dominate: think overlays, system of systems
3
Network Services: Communications
4
Network Services: Access
5
New Kind of Communications-Oriented
Service Architecture• Emerging, still developing, in a highly
heterogeneous environment– Rapid development/deployment of new services & apps– Delivered to radically diverse end devices (phone,
computer, info appliance) over diverse access networks (PSTN, LAN, Wireless, Cellular, DSL, Cable, Satellite)
– Exploiting Internet-based technology core: clients/server, applications level routers, TCP/IP protocols, Web/XML formats
– Beyond traditional “call processing” model: client-proxy-server plus application-level partitioning
– New business model emerging: tension between traditional “managed” networks and services vs. “overlays” on top and services outside
– Composition via cooperation or brokering to achieve enhanced performance and reliability
6
Presentation Outline
• Inevitability of Heterogeneity• Service Composition via Cooperation,
Brokering, Peering, Overlays• An Approach to a New Service Architecture• A New Pervasive Networking Research
Agenda
7
Presentation Outline
• Inevitability of Heterogeneity• Service Composition via Cooperation,
Brokering, Peering, Overlays• An Approach to a New Service Architecture• A New Research Agenda
8
Automobiles663 Million
Telephones1.5 Billion
Electronic Chips30 Billion
X-Internet
“X-Internet” Beyond the PC
Forrester Research, May 2001
93Million
407 Million
Internet Computers
Internet UsersToday’s Internet
9
“X-Internet” Beyond the PC
Forrester Research, May 2001
0
5000
10000
1500020
01
2002
2003
2004
2005
2006
2007
2008
2009
2010
Millions
Year
XInternet
PCInternet
10
Shape of Things Now:Ever More Sophisticated
Phones
Siemens SL45i Ericsson T68
• Phone w/voice command, voice dialing, intelligent text for short msgs
• MP3 player + headset, digital voice recorder
• “Mobile Internet” with a built-in WAP Browser
• Java-enabled, over the air programmable
• Bluetooth + GPRS• Enhanced displays +
embedded cameras
11
Shape of Things Now:New Converged Products• Phone + Messenger + PDA Combinations
– E.g., Blackberry 5810 Wireless Phone/Handheld» Integration of PDA + Telephone» PLUS Gateway to Internet and Enterprise
applications» 1900 MHz GSM/GPRS (Euroversion at 900 Mhz)» SMS Messaging, Internet access» QWERTY Keyboard, 20 line display» JAVA applications capable» 8 MB flash + 1 MB SRAM
12
Locator Systems = GPS + 2-Way Messaging
13
Shape of Things to Come: Sensor Networks
• Embedded processing, time synchronization mechanisms, real-time event handling, multihop network routing, application development tools and environments
14
Environmental Sensing:Sensor-to-Remote
Researcher
• Great Duck Island– Remote investigation of microhabitats– David Culler, Alan Mainwaring, Intel Berkeley Laboratories
15
Devices in the eXtreme
Evolution
Information Appliances:Scaled down desktops,e.g., CarPC, PdaPC, etc.
Evolved DesktopsServers:
Scaled-up Desktops,Millennium
Revolution
Information Appliances:Many computers per person,
MEMs, CCDs, LCDs, connectivity
Servers: Integrated withcomms infrastructure;Lots of computing in
small footprint
Display
Keyboard Disk
Mem
Proc
PC Evolution
Display DisplayCamera
Smart
Sensors
Camera
Smart Spaces
ComputingRevolutionWAN
Server, Mem, Disk
InformationUtility
BANG!Display
Mem
Disk
Proc
16
Pervasive Computing = “Convergence”
Via Services in the Network• Not just about gadgets or access
technologies, which are becoming ever more diverse
• But services and applications, and how the net can best support them anywhere, anytime
• Bottlenecks are near the edge, not the core• Enabled by:
– Computing embedded in communications fabric: distributed, wide-area, topology-aware
– Per session characterization, processing, prioritization, monitoring, management, billing
17
Presentation Outline
• Inevitability of Heterogeneity• Service Composition via Cooperation,
Brokering, Peering, Overlays• An Approach to a New Service Architecture• A New Research Agenda
18
AccessNetworks
Core Networks
Putting it Together: Connectivity and Processing
Transit Net
Transit Net
Transit Net
PrivatePeering
NAPPublic
Peering
InternetDatacenter
PSTNRegionalWirelineRegionalVoiceVoice
CellCell
Cell
CableModem
LANLANLAN
Premises-based
WLANWLANWLAN
Premises-based
Operator-based
H.323Data
Data
RAS
Analog
DSLAM
H.323
19
Multi-Party Administered World: Agile or Fragile?
• Baltimore Tunnel Fire, 18 July 2001– “… The fire also damaged fiber optic cables, slowing Internet
service across the country, …”– “… Keynote Systems … says the July 19 Internet slowdown was
not caused by the spreading of Code Red. Rather, a train wreck in a Baltimore tunnel that knocked out a major UUNet cable caused it.”
– “PSINet, Verizon, WorldCom and AboveNet were some of the bigger communications companies reporting service problems related to ‘peering,’ methods used by Internet service providers to hand traffic off to others in the Web's infrastructure. Traffic slowdowns were also seen in Seattle, Los Angeles and Atlanta, possibly resulting from re-routing around the affected backbones.”
– “The fire severed two OC-192 links between Vienna, VA and New York, NY as well as an OC-48 link from, D.C. to Chicago. … Metromedia routed traffic around the fiber break, relying heavily on switching centers in Chicago, Dallas, and D.C.”
20
“The Network Effect”
• Creating and deploying new services– Development and deployment expense
» Cost of 3G licenses and networks» “Even if I had $1 billion and set up 1000s of locations, I
could never in my network have a completely ubiquitous footprint.”—Sky Dayton, founder of Boingo
• Achieving desirable end-to-end properties– Control of the end-to-end path
• Evolving network services– Difficult to change global operational infrastructure
• Approach: Peering, Composition, Overlays– Needed: a service architecture that supports this
21
PeeringPolicy-Based Routing
• Multi-homing– Reliability of network connectivity– Traffic discrimination
End Network
PrimaryTransit
Network
AlternativeTransit
NetworkPeer
NetworkPeerNetworkPeerNetwork
PeerNetworks
BerkeleyCampus
CalREN
ResearchTraffic
DormTraffic
Fail-over
New PrimaryTransit
22
GPRS Peering Network
GRXDNS
R
R
Operator C
SGSN
DNSBG
Operator C
SGSN
DNSBG
Per Johannson, Ericsson Research
Compositionfor GPRS Transit
R
ROperator B
SGSN
DNSBG
Operator A
GGSNBG
DNS
• eXchanges– Aicent, Belgacom, Cable & Wireless, Carrier1, Comfone/Infonet,
Deutsche Telekom, Ebone, Energis, France Telecom, Global Crossing, KPNQwest, Sonera/Equant, Telecom Italia, Telenor, Telia, Telecommunications Services Inc, WorldCom
GRXR
R
R
DNS
GRXR
R
R
DNS
GRXR
R
R
DNS
GPRS Peering Network
DNS.gprs
23
IsolatedIntra-cloud
serviceTraditional
unicastpeering
Administrativedomain
Admindomain
Administrativedomain
AdmindomainAdmin
domain
OverlaysCreating New Interdomain
Services• Deploy new services above the routing
layer– E.g., interdomain multicast management and peering– E.g., alternative connectivity for performance,
resilience
Steve McCanne
24
OverlaysBrokered Resources for
Applications• Examples:
– Multicast management and peering at application level
– Implement performance qualities at overlay level
Steve McCanne
25
Composition and Cooperation:
Mobile Virtual Network Operator
MVNO has everything but its own physical network
26
Single LocationNetwork Operator
(SLN)Single LocationNetwork Operator
(SLN)CooperativeNetworking
Full ServiceNetworkOperator
Full ServiceNetworkOperator
Composition of Wireless Infrastructure Services
Premises-basedAccess
Full ServiceNetworkOperator
Single LocationNetwork Operator
(SLN)
SLN Aggregator
WISP Aggregator
RevenueSharing
Single Sign-onUnified Billing
Billing, ECommerceAuthentication
Inter-site Mobility
Private Brand NetOperator (MVNO)
VPN Operator, Client-Software
27
“Mobile Internet Edge”
HW supports scaled monitoring/measurement for allocation of resources, network management, charging, …
Content optimization, policy-based filtering, security & authentication, session/content/location/subscriber-aware
28
Presentation Outline
• Inevitability of Heterogeneity• Service Composition via Cooperation,
Brokering, Peering, Overlays• An Approach to a New Service Architecture• A New Research Agenda
29
SAHARA ProjectServiceArchitecture forHeterogeneousAccessResources andApplications
30
Sprint
UserSalt Lake
City
Scenario: ServiceComposition
JAL
BabblefishTranslator
Zagat Guide
UI
User
NTTDoCoMo
RestaurantGuide Service
Tokyo
31
Service Composition• New mechanisms, techniques for end-to-end
services w/ desirable, predictable, enforceable properties spanning potentially distrusting service providers– Tech architecture for service composition & inter-operation across
separate admin domains, supporting peering & brokering, and diverse business, value-exchange, access-control models
– Functional elements» Service discovery» Service-level agreements» Service composition under constraints» Redirection to a service instance» Performance measurement infrastructure» Constraints based on performance, access control,
accounting/billing/settlements» Service modeling and verification
32
Service Composition Models• Cooperative
– Individual component service providers interact, with distributed responsibility, providing end-to-end composed service
• Brokered– Broker uses functionalities provided by underlying service
providers, encapsulates these to compose an end-to-end service
Service
Negotiation & control path
Service Service
Data flow
Negotiation & control pathBroker
Service ServiceService
Data flow
33
Layered Reference Model for Service Composition
IP Network
Enhanced Links
Enhanced Paths
End-to-End NetworkWith Desirable Properties
Middleware Services
Applications Services
End-User Applications
Conn
ectiv
ityPl
ane
Appl
icatio
nPl
ane
Serv
iceCo
mpo
sitio
n
34
Technical Themes
• Trust management and behavior verification– Meet promised functionality, performance, availability
• Adapting to network dynamics– Actively respond to shifting server-side workloads and network
congestion, based on pervasive monitoring & measurement– Awareness of network topology to drive service selection
• Adapting to user dynamics– Resource allocation responsive to client-side workload variations
• Resource provisioning and management– Service allocation and service placement
• Interoperability across multiple service providers– Interworking across similar services deployed by different providers
35
Presentation Outline
• Inevitability of Heterogeneity• Service Composition via Cooperation,
Brokering, Peering, Overlays• An Approach to a New Service Architecture• A New Research Agenda
36
Overlays to Deploy Disruptive Services in
Existing Networks• How can overlays be exploited for greater network
resilience and performance?– Faults be better isolated and diagnosed?– Abstractions of topology and performance?
• Placement, Paths, and Load Balancing– Server (“Application Level Router”) Placement
» For scaling, reliability, load balancing, latency» Where? Network topology discovery: WAN Core,
Metro/Regional, Access Networks– Choice of Inter-Server “Paths”
» For server-to-server latency/bandwidth/loss rate» Predictable/verifiable network performance (intra-ISP SLA)
– Redirection Mechanisms» Random, round-robin, load-informed redirection» Net vs. server as bottleneck
37
Placement of Intelligence in the Network
• Is the end-to-end model still the right conceptual framework?
• Composition via Brokering and Cooperation– Separation of Service, Server, Service Path– Assume “Server Centers” known, can be “discovered”
or register with a Service Placement Service (SPS)– How is Service named, described, performance
constraints expressed, and registered?– How is app/service-specific performance measured and
made known to Service Placement Service?• Service Appliances at the MIE
– How to exploit per-user session characterization and pervasive measurement and monitoring?
38
Pervasive Computing = Pervasive Communications
and Processing• Increasing diversity of interconnected devices• Increasing importance of “services” to
mitigate diversity and to provide new functionality and customization
• Enabled by processing embedded in the network interconnect, locally and globally
– “Active networking” is real• Global services realized through managed
composition– Recognition of the role of multiple service providers and
administrative domains– Separation of services from connectivity via overlays– No single operator deploys the global service
39
Pervasive 2002
Pervasive Computing
:It’s All About
Network Services
Randy H. Katz
Questions Please!