Trend: Networking Age
description
Transcript of Trend: Networking Age
Trend Networking Age
Sept 2007 Sept 2007
Trend Networking Age
Virtual Schools Virtual Workplace Electronic commerce
virtual enterprise new forms of value chains virtual Cash
Internet entertainment interactive sitcom
UbiquitousUbiquitous
Trend Ubiquitous
Trend Convergence
TelephoneTelephone Voice TransportVoice Transport
Cable TVCable TV Video TransportVideo Transport
ComputerComputer Digital Media StorageHandlingDigital Media StorageHandling
NewsAdvertisingNewsAdvertising Digital Media ProductionDigital Media Production
Merging of Content Providers and Content transportersMerging of Content Providers and Content transporters Phone companies cable companies entertainment Phone companies cable companies entertainment
industry and computer companiesindustry and computer companies Convergence stagesConvergence stages
Networking devices consumerNetworking devices consumer
Trend Information Glut
Web =gt Web =gt Information production and dissemination Information production and dissemination
costs are almost zerocosts are almost zero Too much information Too much information Needles in the haystackNeedles in the haystack
Thousands of hits on each searchThousands of hits on each search Need tools for summarizing the informationNeed tools for summarizing the information Opportunities for Opportunities for artificial intelligenceartificial intelligence Need to express information so that both Need to express information so that both
human and computers can understandhuman and computers can understand
Networking Trends
More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP
NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous
Trend Faster Media Backbone
LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984
Wireless networks 54100 Mbps (100m 300m 2km)
25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998
Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993
DWDM - Dense Wavelength Division Multiplexing
13101510 nm
13101510 nm
16 uncorrelated wavelengths
λ1 λ2 λ3 λ4 λ5 λ16
2488 Gbps (1)
2488 Gbps (16)
162488 Gbps = 40 Gbps
1530-1565 nm ramge
16 stabilized correlated wavelengts
Why Optical Networks DWDM optoelectricl metro network
Trend Wireless Mobile
Trend Wi-Fi (Wireless Fidelity) in Your Future (1)
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Trend Networking Age
Virtual Schools Virtual Workplace Electronic commerce
virtual enterprise new forms of value chains virtual Cash
Internet entertainment interactive sitcom
UbiquitousUbiquitous
Trend Ubiquitous
Trend Convergence
TelephoneTelephone Voice TransportVoice Transport
Cable TVCable TV Video TransportVideo Transport
ComputerComputer Digital Media StorageHandlingDigital Media StorageHandling
NewsAdvertisingNewsAdvertising Digital Media ProductionDigital Media Production
Merging of Content Providers and Content transportersMerging of Content Providers and Content transporters Phone companies cable companies entertainment Phone companies cable companies entertainment
industry and computer companiesindustry and computer companies Convergence stagesConvergence stages
Networking devices consumerNetworking devices consumer
Trend Information Glut
Web =gt Web =gt Information production and dissemination Information production and dissemination
costs are almost zerocosts are almost zero Too much information Too much information Needles in the haystackNeedles in the haystack
Thousands of hits on each searchThousands of hits on each search Need tools for summarizing the informationNeed tools for summarizing the information Opportunities for Opportunities for artificial intelligenceartificial intelligence Need to express information so that both Need to express information so that both
human and computers can understandhuman and computers can understand
Networking Trends
More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP
NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous
Trend Faster Media Backbone
LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984
Wireless networks 54100 Mbps (100m 300m 2km)
25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998
Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993
DWDM - Dense Wavelength Division Multiplexing
13101510 nm
13101510 nm
16 uncorrelated wavelengths
λ1 λ2 λ3 λ4 λ5 λ16
2488 Gbps (1)
2488 Gbps (16)
162488 Gbps = 40 Gbps
1530-1565 nm ramge
16 stabilized correlated wavelengts
Why Optical Networks DWDM optoelectricl metro network
Trend Wireless Mobile
Trend Wi-Fi (Wireless Fidelity) in Your Future (1)
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Trend Ubiquitous
Trend Convergence
TelephoneTelephone Voice TransportVoice Transport
Cable TVCable TV Video TransportVideo Transport
ComputerComputer Digital Media StorageHandlingDigital Media StorageHandling
NewsAdvertisingNewsAdvertising Digital Media ProductionDigital Media Production
Merging of Content Providers and Content transportersMerging of Content Providers and Content transporters Phone companies cable companies entertainment Phone companies cable companies entertainment
industry and computer companiesindustry and computer companies Convergence stagesConvergence stages
Networking devices consumerNetworking devices consumer
Trend Information Glut
Web =gt Web =gt Information production and dissemination Information production and dissemination
costs are almost zerocosts are almost zero Too much information Too much information Needles in the haystackNeedles in the haystack
Thousands of hits on each searchThousands of hits on each search Need tools for summarizing the informationNeed tools for summarizing the information Opportunities for Opportunities for artificial intelligenceartificial intelligence Need to express information so that both Need to express information so that both
human and computers can understandhuman and computers can understand
Networking Trends
More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP
NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous
Trend Faster Media Backbone
LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984
Wireless networks 54100 Mbps (100m 300m 2km)
25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998
Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993
DWDM - Dense Wavelength Division Multiplexing
13101510 nm
13101510 nm
16 uncorrelated wavelengths
λ1 λ2 λ3 λ4 λ5 λ16
2488 Gbps (1)
2488 Gbps (16)
162488 Gbps = 40 Gbps
1530-1565 nm ramge
16 stabilized correlated wavelengts
Why Optical Networks DWDM optoelectricl metro network
Trend Wireless Mobile
Trend Wi-Fi (Wireless Fidelity) in Your Future (1)
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Trend Convergence
TelephoneTelephone Voice TransportVoice Transport
Cable TVCable TV Video TransportVideo Transport
ComputerComputer Digital Media StorageHandlingDigital Media StorageHandling
NewsAdvertisingNewsAdvertising Digital Media ProductionDigital Media Production
Merging of Content Providers and Content transportersMerging of Content Providers and Content transporters Phone companies cable companies entertainment Phone companies cable companies entertainment
industry and computer companiesindustry and computer companies Convergence stagesConvergence stages
Networking devices consumerNetworking devices consumer
Trend Information Glut
Web =gt Web =gt Information production and dissemination Information production and dissemination
costs are almost zerocosts are almost zero Too much information Too much information Needles in the haystackNeedles in the haystack
Thousands of hits on each searchThousands of hits on each search Need tools for summarizing the informationNeed tools for summarizing the information Opportunities for Opportunities for artificial intelligenceartificial intelligence Need to express information so that both Need to express information so that both
human and computers can understandhuman and computers can understand
Networking Trends
More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP
NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous
Trend Faster Media Backbone
LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984
Wireless networks 54100 Mbps (100m 300m 2km)
25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998
Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993
DWDM - Dense Wavelength Division Multiplexing
13101510 nm
13101510 nm
16 uncorrelated wavelengths
λ1 λ2 λ3 λ4 λ5 λ16
2488 Gbps (1)
2488 Gbps (16)
162488 Gbps = 40 Gbps
1530-1565 nm ramge
16 stabilized correlated wavelengts
Why Optical Networks DWDM optoelectricl metro network
Trend Wireless Mobile
Trend Wi-Fi (Wireless Fidelity) in Your Future (1)
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Trend Information Glut
Web =gt Web =gt Information production and dissemination Information production and dissemination
costs are almost zerocosts are almost zero Too much information Too much information Needles in the haystackNeedles in the haystack
Thousands of hits on each searchThousands of hits on each search Need tools for summarizing the informationNeed tools for summarizing the information Opportunities for Opportunities for artificial intelligenceartificial intelligence Need to express information so that both Need to express information so that both
human and computers can understandhuman and computers can understand
Networking Trends
More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP
NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous
Trend Faster Media Backbone
LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984
Wireless networks 54100 Mbps (100m 300m 2km)
25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998
Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993
DWDM - Dense Wavelength Division Multiplexing
13101510 nm
13101510 nm
16 uncorrelated wavelengths
λ1 λ2 λ3 λ4 λ5 λ16
2488 Gbps (1)
2488 Gbps (16)
162488 Gbps = 40 Gbps
1530-1565 nm ramge
16 stabilized correlated wavelengts
Why Optical Networks DWDM optoelectricl metro network
Trend Wireless Mobile
Trend Wi-Fi (Wireless Fidelity) in Your Future (1)
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Networking Trends
More Internet TrafficMore Internet Traffic Data gt Voice (1998)Data gt Voice (1998) Traffic gt Capacity Traffic gt Capacity Traffic EngineeringTraffic Engineering Faster Media Backbone Faster Media Backbone Bandwidth Bandwidth Everything over IPEverything over IP
NGI - NGNNGI - NGN WirelessMobile 3G 4G Wi-FiWirelessMobile 3G 4G Wi-Fi UbiquitousUbiquitous
Trend Faster Media Backbone
LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984
Wireless networks 54100 Mbps (100m 300m 2km)
25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998
Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993
DWDM - Dense Wavelength Division Multiplexing
13101510 nm
13101510 nm
16 uncorrelated wavelengths
λ1 λ2 λ3 λ4 λ5 λ16
2488 Gbps (1)
2488 Gbps (16)
162488 Gbps = 40 Gbps
1530-1565 nm ramge
16 stabilized correlated wavelengts
Why Optical Networks DWDM optoelectricl metro network
Trend Wireless Mobile
Trend Wi-Fi (Wireless Fidelity) in Your Future (1)
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Trend Faster Media Backbone
LAN 1 Gbps over 4-pair UTP-5 up to 100 m 10G being discussed Was 1 Mbps (1Base-5) in 1984
Wireless networks 54100 Mbps (100m 300m 2km)
25 Gbps to 5km using light Was 1 Mbps (IEEE 80211) in 1998
Backbone Dense Wavelength Division Multiplexing (DWDM) OC-768 = 40 Gbps a to 65 km 16 - 10 Tbps Was 100 Mbps (FDDI) in 1993
DWDM - Dense Wavelength Division Multiplexing
13101510 nm
13101510 nm
16 uncorrelated wavelengths
λ1 λ2 λ3 λ4 λ5 λ16
2488 Gbps (1)
2488 Gbps (16)
162488 Gbps = 40 Gbps
1530-1565 nm ramge
16 stabilized correlated wavelengts
Why Optical Networks DWDM optoelectricl metro network
Trend Wireless Mobile
Trend Wi-Fi (Wireless Fidelity) in Your Future (1)
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
DWDM - Dense Wavelength Division Multiplexing
13101510 nm
13101510 nm
16 uncorrelated wavelengths
λ1 λ2 λ3 λ4 λ5 λ16
2488 Gbps (1)
2488 Gbps (16)
162488 Gbps = 40 Gbps
1530-1565 nm ramge
16 stabilized correlated wavelengts
Why Optical Networks DWDM optoelectricl metro network
Trend Wireless Mobile
Trend Wi-Fi (Wireless Fidelity) in Your Future (1)
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Why Optical Networks DWDM optoelectricl metro network
Trend Wireless Mobile
Trend Wi-Fi (Wireless Fidelity) in Your Future (1)
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Trend Wireless Mobile
Trend Wi-Fi (Wireless Fidelity) in Your Future (1)
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Trend Wi-Fi (Wireless Fidelity) in Your Future (1)
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Integration of 3G and WLAN- offer possibility of achieving anywhere anytime high
speed and low expense Internet access
3G3G WLANWLAN
Wide areaWide area Local areaLocal area
Low bit rate Low bit rate
(2M when stand still)(2M when stand still)
High bit rateHigh bit rate
(11M to 54M)(11M to 54M)
DataVoice serviceDataVoice service
((QoS supportQoS support))
Data serviceData service
High expenseHigh expense Low expenseLow expense
High mobilityHigh mobility Low mobilityLow mobility
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Trend Everything over IP
Data over IP =gt IP needs Traffic engineeringData over IP =gt IP needs Traffic engineering Voice over IP =gt Quality of Service and Voice over IP =gt Quality of Service and
SignalingSignaling Backbone -- Optic networksIBackbone -- Optic networksI
IP and DWDMIP and DWDM =gt =gt WinningWinning combination combination IPIP for route calculation traffic aggregation for route calculation traffic aggregation
protection protection DWDM DWDM =gt Cheap bandwidth=gt Cheap bandwidthAvoid the cost of Avoid the cost of SONETATM SONETATM equipmntequipmnt
Internet technology + ATM philosophyInternet technology + ATM philosophy
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Future Internet Research and Experimentation
Oct 2007 Oct 2007
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Todayrsquos Internet Millions of usersMillions of users Web email low-quality audio amp videoWeb email low-quality audio amp video Interconnect personal computers and serversInterconnect personal computers and servers Applications adapt to underlying technologyApplications adapt to underlying technology Todayrsquos Internet DoesnrsquotTodayrsquos Internet Doesnrsquot
Provide reliable end-to-end performanceProvide reliable end-to-end performanceEncourage cooperation on new capabilitiesEncourage cooperation on new capabilitiesAllow testing of new technologiesAllow testing of new technologiesSupport development of revolutionary Support development of revolutionary applicationsapplications
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Tomorrowrsquos Internet
Billions of users and devicesBillions of users and devices Convergence of todayrsquos applications with Convergence of todayrsquos applications with multimedia (telephony video-conference multimedia (telephony video-conference HDTV)HDTV)
Interconnect personal computers servers Interconnect personal computers servers and embedded computersand embedded computers
New technologies enable unanticipated New technologies enable unanticipated applications (and create new challenges)applications (and create new challenges)
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Vint Cerf Open Challenges
My primary disappointment has been the slow pace of high speed access for residential customers hellip
The second area of disappointment is the slow uptake of version 6 of the Internet protocol (IPv6)
Perhaps the third area is the continuing difficulty caused by viruses worms and distributed denial of service attacksrdquo
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
How to make the Internet better Addressing current problems
Security1048766 Privacy1048766 Self-diagnosis amp self-healing networks1048766 Cheap connectivity for poor area and third world countries1048766
Wireless mesh networks1048766 sensors1048766 Mobility1048766
New cool apps1048766 What is after IPTV VoIP BitTorrent
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Why Internet2 (1996)
The Internet was not designed forThe Internet was not designed forMillions of usersMillions of usersCongestionCongestionMultimediaMultimediaReal time interactionReal time interaction
But only the Internet canBut only the Internet canAccommodate explosive growthAccommodate explosive growthEnable convergence of information work Enable convergence of information work mass media and human collaborationmass media and human collaboration
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Internet2 Project Develop and deploy advanced network Develop and deploy advanced network
applications and technologies accelerating the applications and technologies accelerating the creation of tomorrowrsquos Internetcreation of tomorrowrsquos Internet
GoalsGoals Enable new generation of applicationsEnable new generation of applications Re-create leading edge RampE network Re-create leading edge RampE network
capabilitycapability Transfer capability to the global production Transfer capability to the global production
InternetInternet 206 University Members Jan 2005206 University Members Jan 2005
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Internet2 Focus Areas Advanced Network Infrastructure - AbileneAdvanced Network Infrastructure - Abilene
Backbones operate at 10 Gbps capacity - 100 Gbps (2007)Backbones operate at 10 Gbps capacity - 100 Gbps (2007) MiddlewareMiddleware
A layer of software between the network and the applications A layer of software between the network and the applications AuthenticationAuthentication IdentificationIdentification AuthorizationAuthorization DirectoriesDirectories SecuritySecurity
EngineeringEngineering IPv6 Measurement Multicast QoS Routing Security TopologyIPv6 Measurement Multicast QoS Routing Security Topology
Advanced ApplicationsAdvanced Applications Distributed computationDistributed computation Virtual laboratoriesVirtual laboratories Digital librariesDigital libraries Distributed learningDistributed learning Digital videoDigital video Tele-immersionTele-immersion All of the above in combinationAll of the above in combination
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Abilene Connections Apr-2000Abilene Connections July 2006
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Abilene Connections Apr-2000Abilene International Peering 2006
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Research andDevelopment
Commercialization
Partnerships
Privatization
Internet Development Spiral
Todayrsquos Internet
Internet2
Source Ivan Moura Campos
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
University-led Federal agency-led
Developing education and research driven applications
Agency mission-driven and general purpose applications
Building out campus networks gigaPoPs and inter-gigapop infrastructure
Funding research testbeds and agency research networks
Interconnecting and interoperating to provide advanced networking capabilities needed to support advanced
research and education applications
Internet2 and the Next Generation Internet Initiative
Internet2 NGI
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Our Founding (Funding) Fable
Researchers invent new architectures Architectures are validated on a testbed IETF ISPs and router vendors collaborate to deploy new design
This is complete BS
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Do Traditional Testbeds Really Test
Production-oriented testbeds Real traffic provides good validation But can test only very incremental changes
Research-oriented testbeds Can test radical architectures Lack of real traffic results in poor validation
Both are expensive (dedicated bandwidth)
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
What about Deployment
Architectural change requires ISP consensus- Hard to agree- No competitive advantage from architectural innovation
- All have huge sunk investment in the status quo
ISPs are unlikely candidates for architectural change
Architecture isnrsquot just static its decaying Ad hoc workarounds muddy the architectural waters
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
We are at an Impasse
We canrsquot test new architectures- Despite sizable investments in testbeds
We canrsquot deploy new architectures- And things are getting worse not better
Yet there are pressing requirements for which the current architecture is not well suited
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
The Communityrsquos Response
Focus on areas where we can have impact Empirical studies Incremental changes (subject to current constraints)
Small stream of architectural proposals Paper designs without hope of deployment More science fiction than engineering
Have largely abandoned hope of effecting fundamental architectural change
Living with rather than overcoming the impasse
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Overcoming the Impasse
Must be able to test new architectures Wide range of architectures Real traffic from willing individuals Low overhead for individual researchers
Meet the grand challenge of reinventing the Internet Empirical incremental research is great but not enough
If someone put us in charge what would we do What about deployment
Several options none good but no excuse to not have an answer to the grand challenge
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Testing Virtual Testbed
Overlay testbed (think RON etc) Host proxy directs packets to overlay
Proxy must architecturally neutral and flexible
Individuals (anywhere) opt-in by turning on proxy
Shared testing infrastructure (think Planetlab) Overlay nodes shared among experiments
Slicing on per-packet timescales Virtualized routers
These ideas have turned into the GENI program
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Why GENI (Global Environment for Network Innovations) Future Internet Network (2005)
The original designing idea of current information networks is basically a specific network supports one major service
The limitation of the original designing idea can not support the multiple requirements for networks and services (such as Telecom network Internet)
The original design mode of Internet leads to itrsquos shortage in mobility security controllable and administrable
We urgently need redesign the framework of new generation Internet to overcome the serious shortage of current Internet
Providing pervasive and trusted services based on a specific network has became the key research directions of national informatization
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
GENI (Global Environment for Network Innovations) - NSF 2005 (1)
What is GENIWhat is GENIGENI is GENI is a facility concepta facility concept being explored by the being explored by the US computing community US computing community
back to an NSF workshop in 2005back to an NSF workshop in 2005focus on focus on architecturalarchitectural research and provide research and provide the the experimentalexperimental infrastructure needed to infrastructure needed to support that researchsupport that research
focus on the research agenda (and focus on the research agenda (and infrastructure needs) of the infrastructure needs) of the opticaloptical wirelesswireless sensorsensor network and network and distributeddistributed systems systems communitiescommunities
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
GENI (Global Environment for Network Innovations) (2)
The goal of GENI The goal of GENI Goal a Future Internet that meets the demands Goal a Future Internet that meets the demands of 21st centuryof 21st century
to increase the to increase the qualityquality and and quantityquantity of of experimental experimental researchresearch outcomes in networking and distributed outcomes in networking and distributed systemssystems
to accelerate the to accelerate the transitiontransition of these outcomes into of these outcomes into products and servicesproducts and services
enhance economic competitiveness and secure the enhance economic competitiveness and secure the Nations futureNations future
Ultimately to lead to a Ultimately to lead to a transition of the Internettransition of the Internet
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
GENI Research Opportunities (3)
Two dichotomy thought (false or at least Two dichotomy thought (false or at least unnecessary)unnecessary)
a a clean slateclean slate reconceptualization of Internet reconceptualization of Internet architecture architecture
todays 30-year-old architecture that todays 30-year-old architecture that limit its abilitylimit its ability to cope with emerging threats and opportunitiesto cope with emerging threats and opportunities
bull eroding trust reduced innovation slowing eroding trust reduced innovation slowing updateupdate
future innovation will take the form of new services and future innovation will take the form of new services and applications running applications running on top of the Interneton top of the Internet
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
GENI Research Opportunities (4)
GENI discussion GENI discussion First we interpret Future Internet very broadly to First we interpret Future Internet very broadly to
include innovations at include innovations at any levelany level of the architecture of the architecture alternative protocols and architectures running alternative protocols and architectures running
inside the network (as overlays on top of todays inside the network (as overlays on top of todays network) network)
Second research should employ Second research should employ clean slate clean slate thinkingthinking but this does but this does not imply that an entirely newnot imply that an entirely new Internet will Internet will be necessary In other words clean slate is a be necessary In other words clean slate is a processprocess not a not a resultresult
Third opportunities Third opportunities betweenbetween two perspectives two perspectives exploring how todays architecture is best evolved exploring how todays architecture is best evolved
to support emerging overlay services to support emerging overlay services
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
GENI Facility Concept (5)
Facility ConceptFacility Concept experimental platforms for experimental platforms for bothboth research and research and
deploymentdeployment filling the filling the gapgap between small-scale exp and mature tech between small-scale exp and mature tech
GENI evaluate new network systems on large-scaleGENI evaluate new network systems on large-scale
Two levelsTwo levels Physical level Physical level GENI substrateGENI substrate will consist of a will consist of a
collection of links forwarders storage processors and collection of links forwarders storage processors and wireless net wireless net
On top of this substrate a On top of this substrate a software software management management frameworkframework will be overlay network experiments on the will be overlay network experiments on the
substratesubstrate
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
GENI Facility Concept (6)
Four key ideasFour key ideas substrate components will be substrate components will be programmableprogrammable - - possible to possible to
embed any network experiment including clean-slate embed any network experiment including clean-slate designs designs
Substrate will be Substrate will be virtualizable virtualizable -- possible to embed multiple possible to embed multiple slices in the substrate at the same time (allow slices in the substrate at the same time (allow experimental services and architectures to run experimental services and architectures to run continuously) continuously)
GENI will include mechanisms that allow end-users to GENI will include mechanisms that allow end-users to seamlessly seamlessly opt-inopt-in to experimental services to experimental services
GENI will be GENI will be modularmodular ( (architecture and interfaces) - architecture and interfaces) - possible to extend GENI with new networking technologies possible to extend GENI with new networking technologies GENI will not be a static artifact but rather a GENI will not be a static artifact but rather a dynamic dynamic infrastructureinfrastructure that is continually renewed that is continually renewed
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
FIND (Future Internet Network Design) ndash NSF 2006 (1)
FIND asks two broad questionsFIND asks two broad questions What are the What are the requirementsrequirements for the global network in 15 for the global network in 15
years years How How would we would we re-conceivere-conceive tomorrows global network tomorrows global network
today if we could design it from scratch today if we could design it from scratch FIND program solicits FIND program solicits clean slate processclean slate process research proposals in the broad area of network research proposals in the broad area of network architecture principles and designarchitecture principles and design
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
FIND (Future Internet Network Design) (2)
FIND research might address wide questionsFIND research might address wide questions What will the What will the edgeedge of the network look like in 15 years of the network look like in 15 years
How might the network How might the network architecturearchitecture of 15 years hence of 15 years hence best accommodate sensors embedded systems and the best accommodate sensors embedded systems and the like like
How might the network of 15 years from now How might the network of 15 years from now supportsupport what users really do (and care about) How might such what users really do (and care about) How might such functions as information access location management or functions as information access location management or identity management best fit into a new overall network identity management best fit into a new overall network architecture architecture
What will the What will the core core of the network look like in 15 years of the network look like in 15 years How might the changing economics of optical systems How might the changing economics of optical systems affect the overall design of the larger networkaffect the overall design of the larger network
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Clean Slate Network (1)
100x100 Clean Slate Project - NSF November 2003100x100 Clean Slate Project - NSF November 2003 CMU Fraser Research Stanford Berkeley Rice ATT CMU Fraser Research Stanford Berkeley Rice ATT
Research Internet 2Research Internet 2 Clean Slate Network ndash Stanford 2005Clean Slate Network ndash Stanford 2005 They believe that the current Internet They believe that the current Internet
has significant deficiencies that need to be solvedhas significant deficiencies that need to be solved Internets shortcomings will Internets shortcomings will not be resolvednot be resolved by the by the
conventional incremental and conventional incremental and backward-compatiblebackward-compatible stylestyle
Program can be characterized by two research questions Program can be characterized by two research questions Today if we were to Today if we were to start againstart again with a clean slate how with a clean slate how
would we design a global communications would we design a global communications infrastructureinfrastructure
How should the Internet look How should the Internet look in 15 yearsin 15 years
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Clean Slate Network (2)
Five key areas for researchFive key areas for research Network architecture Network architecture Heterogeneous applications Heterogeneous applications Heterogeneous physical layer technologies Heterogeneous physical layer technologies Security Security Economics amp policy Economics amp policy
Research projectsResearch projects FlowFlow Level Models for the Future Internet Level Models for the Future Internet Clean Slate Approach to Clean Slate Approach to Wireless Wireless Spectrum UsageSpectrum Usage Fast Dynamic Fast Dynamic OpticalOptical Light Paths for the Internet core Light Paths for the Internet core A Clean Slate Approach to Enterprise Network A Clean Slate Approach to Enterprise Network SecuritySecurity
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
FIRE (Future Internet Research and Experimentation) ndash European 2007 (1)
Internet has Internet has growngrown to an unexpected reach as for to an unexpected reach as for the the numbernumber of users of users capacitycapacity of the links of the links broadband penetration to the broadband penetration to the homehome servicesservices
ProblemsProblems spam viruses denial of service spam viruses denial of service attacks complexity of managementattacks complexity of management
Internet drawbacks and Internet drawbacks and limitationslimitations ndash to ndash to scalabilityscalability suitabilitysuitability mobilitymobility transparencytransparency securitysecurity
require new radical approaches to require new radical approaches to fundamentally redesign its protocols and fundamentally redesign its protocols and architectures architectures
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
FIRE (2) FIRE is an FIRE is an experimentallyexperimentally-driven -driven longlong-term research initiative on -term research initiative on
Future Internet Future Internet conceptsconcepts protocolsprotocols and and architecturesarchitectures encompassing technological industrial and socio-economic encompassing technological industrial and socio-economic
aspects aspects acting as proof-of-concept of the newly proposed technologies acting as proof-of-concept of the newly proposed technologies
and services and services FIRE RESEARCHFIRE RESEARCH
Long term multidisciplinary research on future internet paradigms Long term multidisciplinary research on future internet paradigms Open to Open to fresh bottom-upfresh bottom-up ideas with ideas with no backwards-compatibilityno backwards-compatibility
constraints constraints Building on the FET SAC initiative ldquoSituated and Autonomic Building on the FET SAC initiative ldquoSituated and Autonomic
Communicationsrdquo Communicationsrdquo Considering at the Considering at the same timesame time technological economic and technological economic and
socialpolicy aspects socialpolicy aspects Build in from the outset and on all levels the right Build in from the outset and on all levels the right balancebalance between between
security accountability and privacysecurity accountability and privacy
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
FIRE (3)
FIRE EXPERIMENTATIONFIRE EXPERIMENTATION Large scale experimentationLarge scale experimentation of new paradigms and of new paradigms and
concepts for the future internet and related service concepts for the future internet and related service architectures architectures
Learning through broad experimentation Learning through broad experimentation Integrating and validating new conceptsIntegrating and validating new concepts
Federating and extending Federating and extending existing testbedsexisting testbeds and and research infrastructures research infrastructures
no backwards-compatibility constraints no backwards-compatibility constraints European approach and develop a European identityEuropean approach and develop a European identity
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Looking Over the Fence at Networking
Jennifer RexfordJennifer Rexford
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Internet Success Leads to Ossification
Intellectual ossificationIntellectual ossification Pressure for backwards compatibility with InternetPressure for backwards compatibility with Internet Risks stifling innovative intellectual thinkingRisks stifling innovative intellectual thinking
Infrastructure ossificationInfrastructure ossification Limits on the ability to influence deploymentLimits on the ability to influence deployment Eg multicast IPv6 QoS and secure routingEg multicast IPv6 QoS and secure routing
System ossificationSystem ossification Shoe-horn solutions that increase system fragilityShoe-horn solutions that increase system fragility Eg NATs (network address translation) and Eg NATs (network address translation) and
firewallsfirewalls
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
A Need to Invigorate Networking Research
MeasurementMeasurement Understanding the Internet artifactUnderstanding the Internet artifact Better built-in measurement for the futureBetter built-in measurement for the future
ModelingModeling Performance models faithful to Internet Performance models faithful to Internet
realitiesrealities X-ities like manageability evolvability X-ities like manageability evolvability
security hellipsecurity hellip PrototypingPrototyping
Importance of creating disruptive technologyImportance of creating disruptive technology Emphasis on enabling new applicationsEmphasis on enabling new applications
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Modeling The X-ities (or Ilities) Beyond higher speed to consider X-itiesBeyond higher speed to consider X-ities
ReliabilityReliability ScalabilityScalability ManageabilityManageability ConfigurabilityConfigurability PredictabilityPredictability Non-fragilityNon-fragility SecuritySecurity EvolvabilityEvolvability
Challenging to model or even to quantifyChallenging to model or even to quantify
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
A Need for Interdisciplinary Work
Statistical analysisStatistical analysis Artificial intelligenceArtificial intelligence Maximum likelihood estimationMaximum likelihood estimation Streaming algorithmsStreaming algorithms CryptographyCryptography OptimizationOptimization Information theoryInformation theory Game theory and mechanism designGame theory and mechanism design helliphellip
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Discussion
Where should the intelligence resideWhere should the intelligence reside Traditional Internet says ldquothe edgerdquoTraditional Internet says ldquothe edgerdquo What about middle boxes (eg NAT)What about middle boxes (eg NAT) Need to assemble applications from Need to assemble applications from
components located in different parts of the components located in different parts of the networknetwork
Better isolation and diagnosis of faultsBetter isolation and diagnosis of faults Decentralized Internet makes this difficultDecentralized Internet makes this difficult Need to detection diagnosis and Need to detection diagnosis and
accountabilityaccountability Challenges the end-to-end argumentChallenges the end-to-end argument
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Discussion
Data as a first-class objectData as a first-class object Tradition Internet simple moves the bytesTradition Internet simple moves the bytes Naming search location management in the lsquonetNaming search location management in the lsquonet Modifying the data as it traverse the networkModifying the data as it traverse the network
Does the Internet have a control planeDoes the Internet have a control plane Traditional Internet stress data transportTraditional Internet stress data transport What about network management and controlWhat about network management and control Today we place more emphasis on designing new Today we place more emphasis on designing new
protocols and mechanisms than controlling themprotocols and mechanisms than controlling them
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Discussion
Abstractions on topology and performanceAbstractions on topology and performance Traditional Internet hides details from end hostsTraditional Internet hides details from end hosts Network properties are at best inferredNetwork properties are at best inferred Guidelines for placement of middle boxesGuidelines for placement of middle boxes Feedback info about topology and performanceFeedback info about topology and performance
Beyond cooperative congestion controlBeyond cooperative congestion control Traditional Internet places congestion control in the Traditional Internet places congestion control in the
end hosts and trusts them to behaveend hosts and trusts them to behave Is this trust misguided Is this trust misguided New alternatives to congestion controlNew alternatives to congestion control
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
Discussion
Incorporating economic factors in designIncorporating economic factors in design Traditional Internet ignores competitive forcesTraditional Internet ignores competitive forces Many constraints are economic not technicalMany constraints are economic not technical Better to constructalign economic incentivesBetter to constructalign economic incentives
Ways to deploy disruptive technologyWays to deploy disruptive technology Traditional core is not open to disruptive techTraditional core is not open to disruptive tech Overlay network as a deployment strategyOverlay network as a deployment strategy Other approaches Virtualization Middle boxes Other approaches Virtualization Middle boxes
Speaking the legacy protocols with new logicSpeaking the legacy protocols with new logic Experimental facilities A ldquodo overrdquoExperimental facilities A ldquodo overrdquo
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-
The Innovatorrsquos Dilemma Leading companies often miss ldquonext big thingrdquoLeading companies often miss ldquonext big thingrdquo
Eg disk-drive industry and excavation equipmentEg disk-drive industry and excavation equipment ProblemProblem
Listening to customers leads to incremental Listening to customers leads to incremental improvement on the existing technology curveimprovement on the existing technology curve
Disruptive technologies are often less effective for Disruptive technologies are often less effective for the existing customers so tend to be ignoredthe existing customers so tend to be ignored
New companies exploit the new technology for a new New companies exploit the new technology for a new market (eg desktops laptops)market (eg desktops laptops)
Eventually the new technology curve overtakes the Eventually the new technology curve overtakes the old technology usurping the old technologyold technology usurping the old technology
Will this happen with the InternetWill this happen with the Internet
- Slide 1
- Slide 2
- Slide 3
- Slide 4
- Slide 5
- Slide 6
- Slide 10
- Slide 11
- Slide 13
- Slide 14
- Slide 15
- Slide 19
- Slide 21
- Slide 22
- Slide 23
- Slide 24
- Slide 25
- Slide 26
- Slide 27
- Slide 28
- Slide 29
- Slide 30
- Slide 31
- Slide 32
- Slide 33
- Slide 34
- Slide 35
- Slide 36
- Slide 37
- Slide 38
- Slide 39
- Slide 40
- Slide 41
- Slide 44
- Slide 45
- Slide 46
- Slide 47
- Slide 48
- Slide 49
- Slide 50
- Slide 51
- Slide 52
- Slide 53
- Slide 54
- Slide 55
- Slide 56
- Slide 57
- Slide 58
- Slide 59
- Slide 60
- Slide 61
- Slide 62
- Slide 63
- Slide 64
- Slide 65
- Slide 66
- Slide 67
- Slide 68
- Slide 69
- Slide 70
- Slide 71
- Slide 72
- Slide 73
- Slide 74
-