trend: networking age

64
Trend: Networking Age Sept. 2007 Sept. 2007

Upload: carrie

Post on 08-Jan-2016

50 views

Category:

Documents


4 download

DESCRIPTION

Trend: Networking Age. Sept. 2007. Trend: Networking Age. Virtual Schools Virtual Workplace Electronic commerce virtual enterprise new forms of value chains virtual Cash Internet entertainment interactive sitcom Ubiquitous. Trend: Ubiquitous. Trend: Convergence. Telephone - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Trend: Networking Age

Trend Networking Age

Sept 2007 Sept 2007

Trend Networking Age

Virtual Schools Virtual Workplace Electronic commerce

virtual enterprise new forms of value chains virtual Cash

Internet entertainment interactive sitcom

UbiquitousUbiquitous

Trend Ubiquitous

Trend Convergence

TelephoneTelephone Voice TransportVoice Transport

Cable TVCable TV Video TransportVideo Transport

ComputerComputer Digital Media StorageHandlingDigital Media StorageHandling

NewsAdvertisingNewsAdvertising Digital Media ProductionDigital Media Production

Merging of Content Providers and Content transportersMerging of Content Providers and Content transporters Phone companies cable companies entertainment Phone companies cable companies entertainment

industry and computer companiesindustry and computer companies Convergence stagesConvergence stages

Networking devices consumerNetworking devices consumer

Trend Information Glut

Web =gt Web =gt Information production and dissemination Information production and dissemination

costs are almost zerocosts are almost zero Too much information Too much information Needles in the haystackNeedles in the haystack

Thousands of hits on each searchThousands of hits on each search Need tools for summarizing the informationNeed tools for summarizing the information Opportunities for Opportunities for artificial intelligenceartificial intelligence Need to express information so that both Need to express information so that both

human and computers can understandhuman and computers can understand

Networking Trends

More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP

NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous

Trend Faster Media Backbone

LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984

Wireless networks 54100 Mbps (100m 300m 2km)

25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998

Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993

DWDM - Dense Wavelength Division Multiplexing

13101510 nm

13101510 nm

16 uncorrelated wavelengths

λ1 λ2 λ3 λ4 λ5 λ16

2488 Gbps (1)

2488 Gbps (16)

162488 Gbps = 40 Gbps

1530-1565 nm ramge

16 stabilized correlated wavelengts

Why Optical Networks DWDM optoelectricl metro network

Trend Wireless Mobile

Trend Wi-Fi (Wireless Fidelity) in Your Future (1)

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 2: Trend: Networking Age

Trend Networking Age

Virtual Schools Virtual Workplace Electronic commerce

virtual enterprise new forms of value chains virtual Cash

Internet entertainment interactive sitcom

UbiquitousUbiquitous

Trend Ubiquitous

Trend Convergence

TelephoneTelephone Voice TransportVoice Transport

Cable TVCable TV Video TransportVideo Transport

ComputerComputer Digital Media StorageHandlingDigital Media StorageHandling

NewsAdvertisingNewsAdvertising Digital Media ProductionDigital Media Production

Merging of Content Providers and Content transportersMerging of Content Providers and Content transporters Phone companies cable companies entertainment Phone companies cable companies entertainment

industry and computer companiesindustry and computer companies Convergence stagesConvergence stages

Networking devices consumerNetworking devices consumer

Trend Information Glut

Web =gt Web =gt Information production and dissemination Information production and dissemination

costs are almost zerocosts are almost zero Too much information Too much information Needles in the haystackNeedles in the haystack

Thousands of hits on each searchThousands of hits on each search Need tools for summarizing the informationNeed tools for summarizing the information Opportunities for Opportunities for artificial intelligenceartificial intelligence Need to express information so that both Need to express information so that both

human and computers can understandhuman and computers can understand

Networking Trends

More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP

NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous

Trend Faster Media Backbone

LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984

Wireless networks 54100 Mbps (100m 300m 2km)

25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998

Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993

DWDM - Dense Wavelength Division Multiplexing

13101510 nm

13101510 nm

16 uncorrelated wavelengths

λ1 λ2 λ3 λ4 λ5 λ16

2488 Gbps (1)

2488 Gbps (16)

162488 Gbps = 40 Gbps

1530-1565 nm ramge

16 stabilized correlated wavelengts

Why Optical Networks DWDM optoelectricl metro network

Trend Wireless Mobile

Trend Wi-Fi (Wireless Fidelity) in Your Future (1)

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 3: Trend: Networking Age

Trend Ubiquitous

Trend Convergence

TelephoneTelephone Voice TransportVoice Transport

Cable TVCable TV Video TransportVideo Transport

ComputerComputer Digital Media StorageHandlingDigital Media StorageHandling

NewsAdvertisingNewsAdvertising Digital Media ProductionDigital Media Production

Merging of Content Providers and Content transportersMerging of Content Providers and Content transporters Phone companies cable companies entertainment Phone companies cable companies entertainment

industry and computer companiesindustry and computer companies Convergence stagesConvergence stages

Networking devices consumerNetworking devices consumer

Trend Information Glut

Web =gt Web =gt Information production and dissemination Information production and dissemination

costs are almost zerocosts are almost zero Too much information Too much information Needles in the haystackNeedles in the haystack

Thousands of hits on each searchThousands of hits on each search Need tools for summarizing the informationNeed tools for summarizing the information Opportunities for Opportunities for artificial intelligenceartificial intelligence Need to express information so that both Need to express information so that both

human and computers can understandhuman and computers can understand

Networking Trends

More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP

NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous

Trend Faster Media Backbone

LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984

Wireless networks 54100 Mbps (100m 300m 2km)

25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998

Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993

DWDM - Dense Wavelength Division Multiplexing

13101510 nm

13101510 nm

16 uncorrelated wavelengths

λ1 λ2 λ3 λ4 λ5 λ16

2488 Gbps (1)

2488 Gbps (16)

162488 Gbps = 40 Gbps

1530-1565 nm ramge

16 stabilized correlated wavelengts

Why Optical Networks DWDM optoelectricl metro network

Trend Wireless Mobile

Trend Wi-Fi (Wireless Fidelity) in Your Future (1)

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 4: Trend: Networking Age

Trend Convergence

TelephoneTelephone Voice TransportVoice Transport

Cable TVCable TV Video TransportVideo Transport

ComputerComputer Digital Media StorageHandlingDigital Media StorageHandling

NewsAdvertisingNewsAdvertising Digital Media ProductionDigital Media Production

Merging of Content Providers and Content transportersMerging of Content Providers and Content transporters Phone companies cable companies entertainment Phone companies cable companies entertainment

industry and computer companiesindustry and computer companies Convergence stagesConvergence stages

Networking devices consumerNetworking devices consumer

Trend Information Glut

Web =gt Web =gt Information production and dissemination Information production and dissemination

costs are almost zerocosts are almost zero Too much information Too much information Needles in the haystackNeedles in the haystack

Thousands of hits on each searchThousands of hits on each search Need tools for summarizing the informationNeed tools for summarizing the information Opportunities for Opportunities for artificial intelligenceartificial intelligence Need to express information so that both Need to express information so that both

human and computers can understandhuman and computers can understand

Networking Trends

More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP

NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous

Trend Faster Media Backbone

LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984

Wireless networks 54100 Mbps (100m 300m 2km)

25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998

Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993

DWDM - Dense Wavelength Division Multiplexing

13101510 nm

13101510 nm

16 uncorrelated wavelengths

λ1 λ2 λ3 λ4 λ5 λ16

2488 Gbps (1)

2488 Gbps (16)

162488 Gbps = 40 Gbps

1530-1565 nm ramge

16 stabilized correlated wavelengts

Why Optical Networks DWDM optoelectricl metro network

Trend Wireless Mobile

Trend Wi-Fi (Wireless Fidelity) in Your Future (1)

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 5: Trend: Networking Age

Trend Information Glut

Web =gt Web =gt Information production and dissemination Information production and dissemination

costs are almost zerocosts are almost zero Too much information Too much information Needles in the haystackNeedles in the haystack

Thousands of hits on each searchThousands of hits on each search Need tools for summarizing the informationNeed tools for summarizing the information Opportunities for Opportunities for artificial intelligenceartificial intelligence Need to express information so that both Need to express information so that both

human and computers can understandhuman and computers can understand

Networking Trends

More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP

NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous

Trend Faster Media Backbone

LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984

Wireless networks 54100 Mbps (100m 300m 2km)

25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998

Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993

DWDM - Dense Wavelength Division Multiplexing

13101510 nm

13101510 nm

16 uncorrelated wavelengths

λ1 λ2 λ3 λ4 λ5 λ16

2488 Gbps (1)

2488 Gbps (16)

162488 Gbps = 40 Gbps

1530-1565 nm ramge

16 stabilized correlated wavelengts

Why Optical Networks DWDM optoelectricl metro network

Trend Wireless Mobile

Trend Wi-Fi (Wireless Fidelity) in Your Future (1)

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 6: Trend: Networking Age

Networking Trends

More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP

NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous

Trend Faster Media Backbone

LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984

Wireless networks 54100 Mbps (100m 300m 2km)

25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998

Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993

DWDM - Dense Wavelength Division Multiplexing

13101510 nm

13101510 nm

16 uncorrelated wavelengths

λ1 λ2 λ3 λ4 λ5 λ16

2488 Gbps (1)

2488 Gbps (16)

162488 Gbps = 40 Gbps

1530-1565 nm ramge

16 stabilized correlated wavelengts

Why Optical Networks DWDM optoelectricl metro network

Trend Wireless Mobile

Trend Wi-Fi (Wireless Fidelity) in Your Future (1)

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 7: Trend: Networking Age

Trend Faster Media Backbone

LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984

Wireless networks 54100 Mbps (100m 300m 2km)

25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998

Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993

DWDM - Dense Wavelength Division Multiplexing

13101510 nm

13101510 nm

16 uncorrelated wavelengths

λ1 λ2 λ3 λ4 λ5 λ16

2488 Gbps (1)

2488 Gbps (16)

162488 Gbps = 40 Gbps

1530-1565 nm ramge

16 stabilized correlated wavelengts

Why Optical Networks DWDM optoelectricl metro network

Trend Wireless Mobile

Trend Wi-Fi (Wireless Fidelity) in Your Future (1)

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 8: Trend: Networking Age

DWDM - Dense Wavelength Division Multiplexing

13101510 nm

13101510 nm

16 uncorrelated wavelengths

λ1 λ2 λ3 λ4 λ5 λ16

2488 Gbps (1)

2488 Gbps (16)

162488 Gbps = 40 Gbps

1530-1565 nm ramge

16 stabilized correlated wavelengts

Why Optical Networks DWDM optoelectricl metro network

Trend Wireless Mobile

Trend Wi-Fi (Wireless Fidelity) in Your Future (1)

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 9: Trend: Networking Age

Why Optical Networks DWDM optoelectricl metro network

Trend Wireless Mobile

Trend Wi-Fi (Wireless Fidelity) in Your Future (1)

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 10: Trend: Networking Age

Trend Wireless Mobile

Trend Wi-Fi (Wireless Fidelity) in Your Future (1)

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 11: Trend: Networking Age

Trend Wi-Fi (Wireless Fidelity) in Your Future (1)

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 12: Trend: Networking Age

Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high

speed and low expense Internet access

3G3G WLANWLAN

Wide areaWide area Local areaLocal area

Low bit rate Low bit rate

(2M when stand still)(2M when stand still)

High bit rateHigh bit rate

(11M to 54M)(11M to 54M)

DataVoice serviceDataVoice service

((QoS supportQoS support))

Data serviceData service

High expenseHigh expense Low expenseLow expense

High mobilityHigh mobility Low mobilityLow mobility

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 13: Trend: Networking Age

Trend Everything over IP

Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and

SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI

IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation

protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt

Internet technology + ATM philosophyInternet technology + ATM philosophy

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 14: Trend: Networking Age

Future Internet Research and Experimentation

Oct 2007 Oct 2007

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 15: Trend: Networking Age

Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot

Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 16: Trend: Networking Age

Tomorrowrsquos Internet

Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)

Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers

New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 17: Trend: Networking Age

Vint Cerf Open Challenges

My primary disappointment has been the slow pace of high speed access for residential customers hellip

The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)

Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 18: Trend: Networking Age

How to make the Internet better Addressing current problems

Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766

Wireless mesh networks1048766 sensors1048766 Mobility1048766

New cool apps1048766 What is after IPTV VoIP BitTorrent

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 19: Trend: Networking Age

Why Internet2 (1996)

The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction

But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 20: Trend: Networking Age

Internet2 Project Develop and deploy advanced network Develop and deploy advanced network

applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet

GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network

capabilitycapability Transfer capability to the global production Transfer capability to the global production

InternetInternet 206 University Members Jan 2005206 University Members Jan 2005

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 21: Trend: Networking Age

Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene

Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware

A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity

EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology

Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 22: Trend: Networking Age

Abilene Connections Apr-2000Abilene Connections July 2006

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 23: Trend: Networking Age

Abilene Connections Apr-2000Abilene International Peering 2006

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 24: Trend: Networking Age

Research andDevelopment

Commercialization

Partnerships

Privatization

Internet Development Spiral

Todayrsquos Internet

Internet2

Source Ivan Moura Campos

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 25: Trend: Networking Age

University-led Federal agency-led

Developing education and research driven applications

Agency mission-driven and general purpose applications

Building out campus networks gigaPoPs and inter-gigapop infrastructure

Funding research testbeds and agency research networks

Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced

research and education applications

Internet2 and the Next Generation Internet Initiative

Internet2 NGI

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 26: Trend: Networking Age

Our Founding (Funding) Fable

Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design

This is complete BS

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 27: Trend: Networking Age

Do Traditional Testbeds Really Test

Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes

Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation

Both are expensive (dedicated bandwidth)

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 28: Trend: Networking Age

What about Deployment

Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation

- All have huge sunk investment in the status quo

ISPs are unlikely candidates for architectural change

Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 29: Trend: Networking Age

We are at an Impasse

We canrsquot test new architectures- Despite sizable investments in testbeds

We canrsquot deploy new architectures- And things are getting worse not better

Yet there are pressing requirements for which the current architecture is not well suited

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 30: Trend: Networking Age

The Communityrsquos Response

Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)

Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering

Have largely abandoned hope of effecting fundamental architectural change

Living with rather than overcoming the impasse

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 31: Trend: Networking Age

Overcoming the Impasse

Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers

Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough

If someone put us in charge what would we do What about deployment

Several options none good but no excuse to not have an answer to the grand challenge

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 32: Trend: Networking Age

Testing Virtual Testbed

Overlay testbed (think RON etc) Host proxy directs packets to overlay

Proxy must architecturally neutral and flexible

Individuals (anywhere) opt-in by turning on proxy

Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments

Slicing on per-packet timescales Virtualized routers

These ideas have turned into the GENI program

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 33: Trend: Networking Age

Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)

The original designing idea of current information networks is basically a specific network supports one major service

The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)

The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable

We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet

Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 34: Trend: Networking Age

GENI (Global Environment for Network Innovations) - NSF 2005 (1)

What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community

back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research

focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 35: Trend: Networking Age

GENI (Global Environment for Network Innovations) (2)

The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century

to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems

to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services

enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future

Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 36: Trend: Networking Age

GENI Research Opportunities (3)

Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)

a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture

todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities

bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate

future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 37: Trend: Networking Age

GENI Research Opportunities (4)

GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to

include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running

inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)

Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult

Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved

to support emerging overlay services to support emerging overlay services

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 38: Trend: Networking Age

GENI Facility Concept (5)

Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and

deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech

GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale

Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a

collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net

On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the

substratesubstrate

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 39: Trend: Networking Age

GENI Facility Concept (6)

Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to

embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs

Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)

GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services

GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 40: Trend: Networking Age

FIND (Future Internet Network Design) ndash NSF 2006 (1)

FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15

years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network

today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 41: Trend: Networking Age

FIND (Future Internet Network Design) (2)

FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years

How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like

How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture

What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 42: Trend: Networking Age

Clean Slate Network (1)

100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT

Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet

has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the

conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle

Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how

would we design a global communications would we design a global communications infrastructureinfrastructure

How should the Internet look How should the Internet look in 15 yearsin 15 years

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 43: Trend: Networking Age

Clean Slate Network (2)

Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy

Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 44: Trend: Networking Age

FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)

Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices

ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management

Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity

require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 45: Trend: Networking Age

FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on

Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic

aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies

and services and services FIRE RESEARCHFIRE RESEARCH

Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility

constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic

Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and

socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between

security accountability and privacysecurity accountability and privacy

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 46: Trend: Networking Age

FIRE (3)

FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and

concepts for the future internet and related service concepts for the future internet and related service architectures architectures

Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts

Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures

no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 47: Trend: Networking Age

Looking Over the Fence at Networking

Jennifer RexfordJennifer Rexford

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 48: Trend: Networking Age

Internet Success Leads to Ossification

Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking

Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing

System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and

firewallsfirewalls

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 49: Trend: Networking Age

A Need to Invigorate Networking Research

MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future

ModelingModeling Performance models faithful to Internet Performance models faithful to Internet

realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability

security hellipsecurity hellip PrototypingPrototyping

Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 50: Trend: Networking Age

Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities

ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability

Challenging to model or even to quantifyChallenging to model or even to quantify

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 51: Trend: Networking Age

A Need for Interdisciplinary Work

Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 52: Trend: Networking Age

Discussion

Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from

components located in different parts of the components located in different parts of the networknetwork

Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and

accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 53: Trend: Networking Age

Discussion

Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network

Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new

protocols and mechanisms than controlling themprotocols and mechanisms than controlling them

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 54: Trend: Networking Age

Discussion

Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance

Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the

end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 55: Trend: Networking Age

Discussion

Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives

Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes

Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74
Page 56: Trend: Networking Age

The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo

Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem

Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve

Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored

New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)

Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology

Will this happen with the InternetWill this happen with the Internet

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 10
  • Slide 11
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 19
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • Slide 53
  • Slide 54
  • Slide 55
  • Slide 56
  • Slide 57
  • Slide 58
  • Slide 59
  • Slide 60
  • Slide 61
  • Slide 62
  • Slide 63
  • Slide 64
  • Slide 65
  • Slide 66
  • Slide 67
  • Slide 68
  • Slide 69
  • Slide 70
  • Slide 71
  • Slide 72
  • Slide 73
  • Slide 74