Download - Future Networking

Transcript
  • 7/29/2019 Future Networking

    1/61

    Future of Networking, 20061Gregor v. Bochmann, University of Ottawa

    Presentation given at the e-Science Institute, Edinburgh

    September 14, 2006

    Gregor v. Bochmann

    School of Information Technology and Engineering (SITE)University of OttawaCanada

    http://www.site.uottawa.ca/~bochmann/talks/FutureNetworking

    Challenges

    for the Future of Networking

  • 7/29/2019 Future Networking

    2/61

    Future of Networking, 20062Gregor v. Bochmann, University of Ottawa

    Abstract

    The technical foundations for the Internet were developed more than 30years ago. Since over 10 years, it has developed into a generalcommunication infrastructure used by people and industry for a varietyof applications. While e-mail and the Web were first the most importantapplications, newer developments have introduced wirelesscommunication and new applications, including multimedia, e-commerce, etc. Certain applications, e.g. in the area of e-science, have

    extreme requirements in terms of bandwidth or delay that cannot beprovided by the current Internet. - This talk will give a personal view ofthe challenges that must be faced for the future of the Internet and thedistributed applications using it, including managerial and technicalaspects. Some of these issues are (1) the integration of wireless LANsand ad-hoc networks with the wired network, (2) fast optical switching,

    (3) user-empowered network management, (4) security and trustmanagement, (5) standards for distributed applications (e.g. ServiceOriented Architecture) and (6) ubiquitous computing. The talk willprovide a general discussion of these issues and present certainexamples of innovative applications.

  • 7/29/2019 Future Networking

    3/61

    Future of Networking, 20063Gregor v. Bochmann, University of Ottawa

    Overview

    The current Internet and applications Research management - Grand

    Challenges

    Research issues in networking

    Optical networks (the physical level)

    Issues for distributed applications

    Conclusions

  • 7/29/2019 Future Networking

    4/61

    Future of Networking, 20064Gregor v. Bochmann, University of Ottawa

    Internet: Some Characteristics

    Packet switching Buffered in each router or switch (delay)

    IP : connection-less Logically simple, but requiring address look-up for each packet Connection-oriented service allows for more efficient switching, e.g. new

    MPLS technology

    There are not enough addresses. Solutions: use of internal addresses and address translation (NAT); however, internal

    addresses are not reachable or better: use IPv6

    TCP : controls flow between end-systems Provides reliable information flow Many applications need a logical connection between processes running in

    different hosts Not suitable for interactive voice or video traffic (retransmission introduces

    delays) Not suitable for very large bandwidths (order of Gbps)

    UDP : non-reliable alternative to TCP

  • 7/29/2019 Future Networking

    5/61

    Future of Networking, 20065Gregor v. Bochmann, University of Ottawa

    Some extreme applications

    Large bandwidth and low delay : Videoteleconference (e.g. round-trip delay of0.1 sec at 10 000 km)

    Need for multicasting: video broadcasting

    (e.g. 10 Mbps to 10 000 users : 100 Gbps) Extreme large bandwidth: e.g. 10 Gbps for

    e-science applications

    Extremely low delays: tele-manipulation(e.g. eye surgery training); distributedmusic ensemble

    Ad hoc networking (without fixed

    infrastructure) people in local meeting

  • 7/29/2019 Future Networking

    6/61

  • 7/29/2019 Future Networking

    7/61Future of Networking, 20067Gregor v. Bochmann, University of Ottawa

    Network management and scalability

    Need for interworking between differentdomains (subnetworks belonging todifferent organizations) Limited visibility

    Service level agreements (static dynamic)

    Large number of (scalability) Domains

    Routers / switches

    Host computers

    Communicating devices (terminals, phones, TVs, kitchen stoves, etc.)

    Security and reliability A faulty behavior of a single router should only have local impact;

    idem for failures

  • 7/29/2019 Future Networking

    8/61Future of Networking, 20068Gregor v. Bochmann, University of Ottawa

    R&D - a long path:From new idea to market place

    Typical time : 20 years Example: Modeling distributed systems by state transition

    diagrams 1969: Bartlett describes a communication protocol with finite state

    machines (FSM) 1976: First version of SDL includes FSM notation 1977: Bochmann and Gecsei propose Extended FSMs for modeling

    communication protocols 1980ies: Standardization of formal description techniques (FDTs) by

    ISO and ITU, including SDL; university-based tool development 1987: Harel proposes State Charts (including certain extensions of

    above notations) 1990ies: Commercial development of software tools supporting

    these notations 1995 ?: Unified Modeling Language (UML) defined by OMG Around 2005: Integration between SDL and UML Version 2

  • 7/29/2019 Future Networking

    9/61

  • 7/29/2019 Future Networking

    10/61Future of Networking, 200610Gregor v. Bochmann, University of Ottawa

    The research planning process (B)

    Community-based research planning Consensus building: through mailing lists, discussions

    at workshops / conferences, research collaborations

    Examples:

    The UK Grand Challenges: a perspective on long-term basic andapplied research

    NSF (USA) Workshop on Overcoming Barriers to DisruptiveInnovation in Networks

    Research program of E-NEXT (a EU - FP6 Network ofExcellence)

    CoNEXT conference in Toulouse, Oct. 2005 http://dmi.ensica.fr/conext/

    Canadian research network on Agile All-Photonic Networks(AAPN, funded by NSERC and 6 industrial partners)

    G d Ch ll i i t

    http://dmi.ensica.fr/conext/http://dmi.ensica.fr/conext/
  • 7/29/2019 Future Networking

    11/61Future of Networking, 200611Gregor v. Bochmann, University of Ottawa

    Grand Challenges e ine in t eUK)

    See http://www.ukcrc.org.uk/grand_challenges/index.cfm Definition of a Grand Challenge

    A grand challenge should be defined as to have international scope, so thatcontributions by a single nation to its achievement will raise ourinternational profile.

    The ambition of a grand challenge can be far greater than what can beachieved by a single research team in the span of a single research grant.

    The grand challenge should be directed towards a revolutionary advance,rather than the evolutionary improvement of legacy products that isappropriate for industrial funding and support.

    The topic for a grand challenge should emerge from a consensus of thegeneral scientific community, to serve as a focus for curiosity-drivenresearch or engineering ambition, and to support activities in which they

    personally wish to engage, independent of funding policy or politicalconsiderations. (Note: the quotes, here and in subsequent slides, indicatethat the text is copied from the source documentation)

    The following two slides are from Robin Milners talkA scientifichorizon for computingat the World Congres 2004 of the InternationalFederation for Information Processing (IFIP), held in Toulouse.

    http://www.ukcrc.org.uk/grand_challenges/index.cfmhttp://www.ukcrc.org.uk/grand_challenges/index.cfm
  • 7/29/2019 Future Networking

    12/61Future of Networking, 200612Gregor v. Bochmann, University of Ottawa

    Grand Challenge Exercise

  • 7/29/2019 Future Networking

    13/61Future of Networking, 200613Gregor v. Bochmann, University of Ottawa

    UK Grand Challenge Proposals

    Note: No GC is dedicated to networking issues

  • 7/29/2019 Future Networking

    14/61Future of Networking, 200614Gregor v. Bochmann, University of Ottawa

    Ubiquitous ComputingGrand Challenge

    Combination of GC 2 and GC 4 See http://www-dse.doc.ic.ac.uk/Projects/UbiNet/GC/index.html

    Objective:We propose to develop scientific theory and the designprinciples ofGlobal Ubiquitous Computingtogether, in a tight

    experimental loop.

    Engineering challenges: design devices to work from solar power, are aware of their

    location and what other devices are nearby, and form cheap,efficient, secure, complex, changing groupings and interconnectionswith other devices;

    engineer systems that are self-configuring and manage their own

    exceptions; devise methods to filter and aggregate information so as to cope

    with large volumes of data, and to certify its provenience.

    business model for ubiquitous computing, and other human-levelinteractions.

    b

    http://www-dse.doc.ic.ac.uk/Projects/UbiNet/GC/index.htmlhttp://www-dse.doc.ic.ac.uk/Projects/UbiNet/GC/index.htmlhttp://www-dse.doc.ic.ac.uk/Projects/UbiNet/GC/index.htmlhttp://www-dse.doc.ic.ac.uk/Projects/UbiNet/GC/index.html
  • 7/29/2019 Future Networking

    15/61Future of Networking, 200615Gregor v. Bochmann, University of Ottawa

    Ubiquitous ComputingGrand Challenge (ii)

    Scientific challenges: discover mathematical models for space and mobility, and develop their

    theories; devise mathematical tools for the analysis of dynamic networks; develop model checking, as well as techniques to analyse stochastic

    aspects of systems, as these are pervasive in ubiquitous computing; devise models of trust and its dynamics;

    design programming languages for ubiquitous computing. A comment: It is not clear where in the context of

    ubiquitous computingNetworkingstops and Computingstarts. In fact, networking involves much distributedsystems management (including databases); and for theInternet applications, the application layer protocols arejust as important as (if not more than) the underlyingnetworking protocols.

    Note:Milner has developed a new description formalism Bigraphs forMobile Processes

    ( see http://www.cl.cam.ac.uk/users/rm135/ )

    http://www.cl.cam.ac.uk/users/rm135/http://www.cl.cam.ac.uk/users/rm135/
  • 7/29/2019 Future Networking

    16/61Future of Networking, 200616Gregor v. Bochmann, University of Ottawa

    Research topics in Networking

    Issues Network layer:

    new wireless technologies: cellular, LAN, PAN, ad-hoc, sensor, etc. Integration with wire-line Internet Higher bandwidth

    Inter-layer control and management according to application needs

    Physical layer: technology push Faster electronic components, e.g. 10 Gbps Ethernet Fast optical switching Trend: IP over Dense Wavelength Division Multiplexing (DWDM); elimination of

    intermediate layers of ATM, SONET; however, it may be IP over MPLS over DWDM.

    Application layer many new applications: importance of multimedia application will increase New protocols for organizing applications: Web Services, Grid, peer-to-peer New ways for identifying and searching services, including concern for security and

    trust

    Networkservice

    Architectural levels of Networking Technologya narrow-waisted hourglass model:

    O i B i

  • 7/29/2019 Future Networking

    17/61Future of Networking, 200617Gregor v. Bochmann, University of Ottawa

    Overcoming Barriers toDisruptive Innovation in Networks

    Workshop organized by NSF (USA) Overcoming Barriers to Disruptive Innovation in

    Networking(Jan. 2005) see http://www.arl.wustl.edu/netv/noBarriers_final_report.pdf

    Starting point: The Internet is ossified: Adopting a new

    architecture not only requires modifications to routers andhost software, but given the multi-provider nature of theInternet, also requires that ISPs jointly agree on thatarchitecture. The need for consensus is doubly damning;not only is agreement among the many providers hard to

    reach, it also removes any competitive advantage fromarchitectural innovation. This discouraging combination ofdifficulty reaching consensus, lack of incentives fordeployment, and substantial costs of upgrading theinfrastructure leaves little hope for fundamentalarchitectural change.

    http://www.arl.wustl.edu/netv/noBarriers_final_report.pdfhttp://www.arl.wustl.edu/netv/noBarriers_final_report.pdf
  • 7/29/2019 Future Networking

    18/61

    Future of Networking, 200618Gregor v. Bochmann, University of Ottawa

    NSF workshop (ii)

    Requirements for the new Internet: Minimize trust assumptions: the Internet originally viewed network

    traffic as fundamentally friendly, but should view it as adversarial; Enable user choice: the Internet was originally developed independent of

    any commercial considerations, but today the network architecture musttake competition and economic incentives into account;

    Allow for edge diversity: the Internet originally assumed host computerswere connected to the edges of the network, but host-centric assumptionsare not appropriate in a world with an increasing number of sensors andmobile devices;

    Design for network transparency: the Internet originally did notexpose information about its internal configuration, but there is value toboth users and network administrators in making the network more

    transparent; and Meet application requirements: the Internet originally provided only a

    best-effort packet delivery service, but there is value in enhancing (addingfunctionality to) the network to meet application requirements.

    Identified 7 areas of research (see next slides)

  • 7/29/2019 Future Networking

    19/61

    Future of Networking, 200619Gregor v. Bochmann, University of Ottawa

    7 research areas:

    Security Economic incentives

    Address binding

    End-host assumptions

    User-level route choice

    Control and management

    Meeting application requirements

    (see next slides)

  • 7/29/2019 Future Networking

    20/61

    Future of Networking, 200620Gregor v. Bochmann, University of Ottawa

    Security

    Problem indications traffic must be viewed as adversarial rather than cooperative To take one example, a single mistyped command at a router at one ISP

    recently caused widespread, cascading disruption of Internet connectivityacross many of its neighbors.

    Benefits of better security1. improve network robustness through protocols that work despite

    misbehaving participants,2. enable security problems to be addressed quickly once identified,3. isolate ISPs, organizations, and users from inadvertent errors or attacks;4. prevent epidemic-style attacks such as worms, viruses, and distributed

    denial of service;5. enable or simplify deployment of new high-value applications and critical

    services that rely on Internet communication such as power grid control,on-line trading networks, or an Internet emergency communicationchannel; and

    6. reduce lost productivity currently aimed at coping with security problemsvia patching holes, recovering from attacks, or identifying attackers.

  • 7/29/2019 Future Networking

    21/61

    Future of Networking, 200621Gregor v. Bochmann, University of Ottawa

    Security (ii)

    Interesting architectural approaches: prevent denial of service by allowing a receiver to

    control who can send packets to it making firewalls a fully recognized component of the

    architecture instead of an add-on that is either turned

    off or gets in the way of deploying new applications. Aclean specification for security that makes clear thebalance of responsibility for routers, for operatingsystems and for applications can move us from thehodge-podge of security building blocks we have today

    to a real security architecture A careful design of mechanisms for identity can

    balance, in an intentional way rather than by accident,the goals of privacy and accountability. Ideally, thedesign will permit us to apply real world consequences(e.g. legal or financial) for misbehavior.

  • 7/29/2019 Future Networking

    22/61

    Future of Networking, 200622Gregor v. Bochmann, University of Ottawa

    Economic incentives

    Proposition:A future design for an Internet should take into

    account that a network architecture induces anindustry structure, and the economic structure

    of that industry. The architecture can use userchoice (to impose the discipline of competitionon the players), indications of value flow (tomake explicit the right direction of payment

    flow), and careful attention to what informationis revealed and what is kept hidden (to shapethe nature of transactions across a competitiveboundary).

  • 7/29/2019 Future Networking

    23/61

    Future of Networking, 200623Gregor v. Bochmann, University of Ottawa

    Address binding

    Problem with IP addresses There are not enough solution: IPv6 They serve as machine identity (instead of only identifying the

    network attachment point, the location) this leads to difficulties for mobile devices (e.g. Mobile IP routing is not

    straightforward IP address changing dynamically)

    IP address (as machine identifier) also used for security Proposed solution approaches

    Host Identity Protocol It provides secure host identification Routing is based on IP addresses that are treated only as ephemeral

    locators

    end-points (as equated with physical machines or operatingsystems) need not have any globally known identity at all. Instead,application level entities have shared identities , and higher levelname spaces such as a redesigned DNS are used to give globalnames to services, so that they can be found.

  • 7/29/2019 Future Networking

    24/61

    Future of Networking, 200624Gregor v. Bochmann, University of Ottawa

    End host assumptions

    Issues with sensor networks sensors may be intermittently connected

    routing may be based on data values

    Solution approaches: Overlay networks Overlay for realizing special routing functions,

    e.g. diffusion routing

    Overlay for delay-tolerant routing (e.g. for e-mail; also allowing access in a variety ofimpoverished and poorly connected regions )

  • 7/29/2019 Future Networking

    25/61

    Future of Networking, 200625Gregor v. Bochmann, University of Ottawa

    User-level route choice

    Objectives:increase the users choice andintroduce more competition Instead of applying a "one-size-fits-all" policy to their

    traffic, ISPs could perform routing and trafficengineering based upon the user traffic preferences offer unique policies such as keeping all traffic withinthe continental United States for security reasons.

    This selection creates a more complex economic

    environment; it offers potential rewards in user choiceand competition, but requires solutions to issues ofaccounting, pricing, billing, and inter-ISP contracts.

  • 7/29/2019 Future Networking

    26/61

    Future of Networking, 200626Gregor v. Bochmann, University of Ottawa

    Control and management

    Statement: Management of the Internet is very complex(for all parties involved)

    Solutions: not clear (there are references to ongoingwork)

    One problem: limited visibility of internal parameters fromoutside the network (opaqueness) A network should support communication of operationally relevant

    information to each other. Such information could be aggregatedand analyzed, thereby facilitating load balancing, fault diagnosis,anomaly detection, application optimization, and other traffic

    engineering and network management functions. One needs a compromise between information hiding and visibility

    for management.

  • 7/29/2019 Future Networking

    27/61

    Future of Networking, 200627Gregor v. Bochmann, University of Ottawa

    Meeting application requirements

    Protocol layer architecture is a narrow-waisted hourglass model

    Additional requirements: QoS control, multicast, anycast,

    policy-based routing, data caching

    Possible solutions: Add more functions to IP layer

    Use overlay networks to provide additional functions

    IP Networkservice

  • 7/29/2019 Future Networking

    28/61

    Future of Networking, 200628Gregor v. Bochmann, University of Ottawa

    Some personal comments

    Overlay networks Principle: A certain number of servers connected to the Internet

    play the role of virtual routers in the overlay network. Note: Thisis the way MBone implements multicasting over the current IP Internetservice.

    The NSF workshop stresses the use of overlay networks for

    experimentation with new approaches Could such architectures present the final solution ?

    NO, overlay technology, such as peer-to-peer computing, may be useful forcertain applications, but cannot be a solution for building a network

    Existing well-known applications

    Napster and BitTorrent media distribution, and other peer-to-peerapplications

    Multicasting of multimedia presentations, possibly including differentquality variants

    A Testbed: US-based Planetlab http://planet-lab.org/; see alsohttp://www.arl.wustl.edu/netv/main.html

    http://planet-lab.org/http://www.arl.wustl.edu/netv/main.htmlhttp://www.arl.wustl.edu/netv/main.htmlhttp://planet-lab.org/http://planet-lab.org/http://planet-lab.org/
  • 7/29/2019 Future Networking

    29/61

    Future of Networking, 200629Gregor v. Bochmann, University of Ottawa

    Some personal comments (2)

    Lightpaths -Underlay Networks ? Experimental research networks provide high-bandwidth

    lightpaths between different sites for e-science and otherapplications that require guaranteed high-bandwidth connections. For an overview of current applications, see

    http://www.internet2.edu/presentations/fall05/20050920-lambdas-sauver.htm

    User-Controlled Lightpath Provisioning (UCLP) allows the e-scienceusers to establish lightpaths dynamically through a graphic userinterface. Note: UCLP has been initiated in Canada with partial funding from

    Canarie (the Canadian research network), see for instancehttp://www.uclp.ca

    These networks make use of user-owned fibers and condominiumfacilities for long-haul transmission and switching

    This is not an overlay, but also provides a new networkingservice, independently from the existing Internet. TheInternet can be built on top of it.

    http://www.internet2.edu/presentations/fall05/20050920-lambdas-sauver.htmhttp://www.internet2.edu/presentations/fall05/20050920-lambdas-sauver.htmhttp://www.uclp.ca/http://www.uclp.ca/http://www.uclp.ca/http://www.internet2.edu/presentations/fall05/20050920-lambdas-sauver.htmhttp://www.internet2.edu/presentations/fall05/20050920-lambdas-sauver.htmhttp://www.internet2.edu/presentations/fall05/20050920-lambdas-sauver.htmhttp://www.internet2.edu/presentations/fall05/20050920-lambdas-sauver.htmhttp://www.internet2.edu/presentations/fall05/20050920-lambdas-sauver.htm
  • 7/29/2019 Future Networking

    30/61

    Future of Networking, 200630Gregor v. Bochmann, University of Ottawa

    Some personal comments (3)

    Packets vs. (virtual) connections The old debate between packet switching and circuit switching

    (from the 1970ies) is not dead !! Distinction: In packet switching, the header of the

    packet/frame/cell/burst contains the destination address; in circuitswitching, it contains a number (label) identifying the circuit (in TDM,this number is the timing position).

    MPLS (label switching) provides packet switching over dynamicallyestablished paths (virtual connections)

    Optical lightpaths are connection-oriented. It is expected thatexisting ROADM (Reconfigurable optical add/drop multiplexers)technology will be widely deployed within a few years; see for instancehttp://lw.pennnet.com/Articles/Article_Display.cfm?Section=ARTCL&ARTICLE_ID=203231&VERSION_NUM=1

    An optical lightpath at a given wavelength is very large, typically 10Gbps. Sub-multiplexing of a lightpath in the time domain isproposed by many research projects; Sharing between packets or virtual connections ??

    http://lw.pennnet.com/Articles/Article_Display.cfm?Section=ARTCL&ARTICLE_ID=203231&VERSION_NUM=1http://lw.pennnet.com/Articles/Article_Display.cfm?Section=ARTCL&ARTICLE_ID=203231&VERSION_NUM=1
  • 7/29/2019 Future Networking

    31/61

    Future of Networking, 200631Gregor v. Bochmann, University of Ottawa

    Some personal comments (4)

    Appearently contradictory approaches IP : packet-oriented switching The concept of virtual connections are natural for

    providing QoS guarantees. The lower layers of broadband wireline networks appear

    to use connection-oriented technologies. The overlay networks would like to obtain more visibility

    about the performance aspects of the underlying IPservice.

    Suggestion: Maybe there should be more visibility atthe IP service level about the underlying virtual andphysical circuits that exist within the network and theirperformance parameters; and the application shouldhave some choice about the routing of its data.

  • 7/29/2019 Future Networking

    32/61

    Future of Networking, 200632Gregor v. Bochmann, University of Ottawa

    Optical networks

    Currently deployed: optical transmission with DWDM

    Some optical switching

    Note: most optical switches convert the opticalsignal into the electrical domain and perform theswitching in the electrical domain.

    Expected to be deployed:

    ROADM used for transparent optical switching inthe millisecond speed range; good for protectionswitching and bandwidth on demand.

  • 7/29/2019 Future Networking

    33/61

    Future of Networking, 200633Gregor v. Bochmann, University of Ottawa

    Burst switching

    Question:Can one do packet switching in the opticaldomain (without oeo conversion)?

    At a switching speed of 1 s, one could switch bursts of10 s length (typically containing many packets)

    Traditional packet switching involves packet buffering inthe switching nodes. Should one introduce optical buffersin the form of delay lines?

    The term burst switching originally meant nobuffering: in case of conflict for an output port, one of

    the incoming bursts would be dropped.

    Note:Burst switching allows to share the large opticalbandwidth among several virtual connections.

  • 7/29/2019 Future Networking

    34/61

    Future of Networking, 200634Gregor v. Bochmann, University of Ottawa

    AAPN

    An NSERCResearch Network

    The Agile

    All-Photonic Network

    Project leader: David Plant, McGill University

    Theme 1: Network architecturesGregor v. Bochmann, University of Ottawa

    Theme 2: Device technologies for transmission and

    switching

  • 7/29/2019 Future Networking

    35/61

    Future of Networking, 200635Gregor v. Bochmann, University of Ottawa

    AAPN Professors (Theme 1 in red)

    McGill: Lawrence Chen, Mark Coats,Andrew Kirk, LorneMason, David Plant (Theme #2 Lead), and Richard Vickers

    U. of Ottawa: Xiaoyi Bao, Gregor Bochmann (Theme #1Lead), Trevor Hall, and Oliver Yang

    U. of Toronto: Stewart AitchisonandTed Sargent McMaster: Wei-Ping Huang

    Queens: John Cartledge (Theme #3 Lead)

    Note: Theme 2 deals with device technologies fortransmission and switchingFor further information see: http://www.aapn.mcgill.ca/

  • 7/29/2019 Future Networking

    36/61

    Future of Networking, 200636Gregor v. Bochmann, University of Ottawa

    The AAPN research network

    Our vision: Connectivity at the end of thestreet to a dynamically reconfigurablephotonic network that supports highbandwidth telecommunication services.

    Technical approach: Simplified network architecture (overlaid stars) Specific version of burst switching

    Fixed burst size, coordinated switching at core node for all inputports (this requires precise synchronization between edge nodes

    and the core) See for instance

    http://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Hall05a.pdf

    Burst switching with reservation per flow (virtual connection),either fixed or dynamically varying

    See for instancehttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Agus05a.pdf

    http://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Hall05a.pdfhttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Hall05a.pdfhttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Agus05a.pdfhttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Agus05a.pdfhttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Hall05a.pdf
  • 7/29/2019 Future Networking

    37/61

    Future of Networking, Lausanne, 200537

    Edge node with slotted transmission(e.g. 10 Gb/s capacity per wavelength)

    Opto-electronic interface

    Fast photonic core switch

    (one space switch per wavelength)

    -Provisions sub-multiples of a

    wavelength

    - Large number of

    edge nodes

    Agile All-Photonic Network

    Overlaid stars architecture

  • 7/29/2019 Future Networking

    38/61

    Future of Networking, 200638Gregor v. Bochmann, University of Ottawa

    Starting Assumptions

    Avoid difficult technologies such as Wavelength conversion

    Optical memory

    Optical packet header recognition and replacement

    Current state of the art for data rates,channel spacing, and optical bandwidth

    Simplified topology based on overlaid stars

    Edge based control in small/medium sizeedge nodes

  • 7/29/2019 Future Networking

    39/61

    Future of Networking, 200639Gregor v. Bochmann, University of Ottawa

    Starting Assumptions (ii)

    No distinction between long-haul and metronetworks

    Fast optical space switching (

  • 7/29/2019 Future Networking

    40/61

    Future of Networking, 200640Gregor v. Bochmann, University of Ottawa

    Bandwidth allocation schemes

    For flows between edge nodes Optical wavelength: Whole wavelength (for

    large bandwidth flows) like the PetaWeb explored byNortel Networks

    Optical circuit: One or several time slots withineach TDM frame

    Burst switching: individual bursts (with orwithout reservation)

    Coordination by controller at core node Signaling protocol between edge and core node

    (suitable for metro and long-haul networks)

  • 7/29/2019 Future Networking

    41/61

    Future of Networking, 200641Gregor v. Bochmann, University of Ottawa

    Integration higher layer (MPLS and IP)

    MPLS flows passing through the AAPN With N edge nodes, there are N x N links

    in the AAPN (scalability problem for IProuting protocol)

    Virtual router star architecture

    OSPF sub-areas How to find optimal inter-area route

    (work sponsored

    by Telus)

  • 7/29/2019 Future Networking

    42/61

    Future of Networking, 200642Gregor v. Bochmann, University of Ottawa

    Deployment aspects - Questions

    Long-haul or Metro ? connectivity at the end of the street; to a server farm

    AANP as a backbone network ?

    High capacity (many wavelengths) or low capacity(single or few wavelengths) ?

    Multiple core nodes ? For reliability

    For load sharing Transmission infrastructure ?

    Using dedicated fibers

    Using wavelength channels provided by ROADM network

    Issues for

  • 7/29/2019 Future Networking

    43/61

    Future of Networking, 200643Gregor v. Bochmann, University of Ottawa

    Issues for

    Distributed applications Multimedia Ubiquitous computing and location-awareness

    Service-oriented architecture and Grid

    computing Making it easy for the end-user

    Scalability peer-to-peer computing

    Related technologies Security

    Trust management

    Software development technology

  • 7/29/2019 Future Networking

    44/61

    Future of Networking, 200644Gregor v. Bochmann, University of Ottawa

    Distributed multimedia applications

    The basics are relatively well understood Video requires high bandwidth

    Conversational applications require short transmissiondelays

    In many cases, multicasting is required (possiblyprovided through the overlay approach)

    Aspects to be further explored Shared virtual environments, e.g. for collaborative work

    or games Tactile applications; tele-haptics require very short

    delays

    Quality of service management for multiple receivers;media transcoding

    Example: Locating suitable

  • 7/29/2019 Future Networking

    45/61

    Future of Networking, 200645Gregor v. Bochmann, University of Ottawa

    Example: Locating suitabletranscoding servers (El-Khatib)

    See http://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/ElKh04c.pdf

    Ubiquitous computing and

  • 7/29/2019 Future Networking

    46/61

    Future of Networking, 200646Gregor v. Bochmann, University of Ottawa

    Ubiquitous computing andlocation-awareness

    See Grand Challenge Example: Some issues encountered in our

    project on teleconferencing for mobile users Problem: In ad-hoc environment (e.g. on a trip) find out what

    devices may be useful to the user to establish a video-conference

    with a friend in another country. Consider quality of service (QoS) negotiation to find most suitable

    devices according to the users preferences and the remote site. Assumption: User has a PDA that can detect through short-range

    wireless communication (e.g. Bluetooth) which devices areavailable in the environment.

    Approach: We use a Home Directory to store the preferences ofthe user; it must be down-loaded into the PDA for processing (itmay be a rented PDA). Seehttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/ElKh04a.pdf

    Example: Device selection in an

    http://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/ElKh04a.pdfhttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/ElKh04a.pdf
  • 7/29/2019 Future Networking

    47/61

    Future of Networking, 200647Gregor v. Bochmann, University of Ottawa

    Example: Device selection in anad-hoc environment

    Internet

    Bobs HDA

    Alices HDA

    Alice

    PA

    (PDA)

    1

    2 3

    4

    44

    75

    56

    5

    4

    4

    4

    555

    7

    Example: Session mobility

  • 7/29/2019 Future Networking

    48/61

    Future of Networking, 200648Gregor v. Bochmann, University of Ottawa

    Example: Session mobilityand QoS adaptation

    QoSNegotiation

    and Selection

    Agent User

    Context

    Agent

    Personal Agent

    User Profile

    Service

    Registry

    Communic-

    ation Agent

    Service

    Discovery

    Agent

    Service-oriented architecture

  • 7/29/2019 Future Networking

    49/61

    Future of Networking, 200649Gregor v. Bochmann, University of Ottawa

    Service oriented architectureand Grid applications

    Concepts RPC for accessing services

    Directory service

    Realizations: CORBA, Jini(Java environment)

    WS and SOA:use similar concepts Use HTTP and SOAP (based on XML)

    Workflow specifications (BPEL, etc.)

    Advantages: use of HTTP (firewalls)

    programming language independent (like CORBA)

  • 7/29/2019 Future Networking

    50/61

    Future of Networking, 200650Gregor v. Bochmann, University of Ottawa

    Notes on XML

    text-oriented encoding of data structures (basedon SGML, like HTML)

    used for storage and/or transmission

    Data structure (type) definition in the form ofDTD or XML Schema

    Developed by WWW Consortiumhttp://www.w3.org/

    Used for a multitude of applications, see forinstance list of resources athttp://www.extensinet.com/

    http://www.w3.org/http://www.extensinet.com/http://www.extensinet.com/http://www.w3.org/
  • 7/29/2019 Future Networking

    51/61

    Future of Networking, 200651Gregor v. Bochmann, University of Ottawa

    WS: Example applications

    E-commerce: Historical: First e-commerce: Electronic Data Interchange (EDI)

    Standards about data elements required in purchase order, invoice, shippingdocuments, etc.

    Standard coding format Message transmission over telephone or leased lines

    Transition to the use of the Internet: Development of SOAP (new codingstandard based on XML)

    Nowadays: many new applications and developments See Electronic Business using XMLhttp://www.ebxml.org/ OASIS http://www.oasis-open.org/

    Resource sharing E-science projects - Grid computing Network management, e.g. UCLP (see above)

    Need for common understanding ofinformation (semantics) Work by the W3C on the Semantic Webhttp://www.w3.org/2001/sw/

    http://www.ebxml.org/http://www.oasis-open.org/http://www.w3.org/2001/sw/http://www.w3.org/2001/sw/http://www.oasis-open.org/http://www.oasis-open.org/http://www.oasis-open.org/http://www.ebxml.org/
  • 7/29/2019 Future Networking

    52/61

    Future of Networking, 200652Gregor v. Bochmann, University of Ottawa

    Making it easy for the end-user

    Everyday use(for our normal day activities) Content creation by the end-user

    See It's A Whole New Web (Businessweek)http://www.businessweek.com/magazine/content/05_39/b3952401.htm

    http://www.businessweek.com/magazine/content/05_39/b3952401.htmhttp://www.businessweek.com/magazine/content/05_39/b3952401.htm
  • 7/29/2019 Future Networking

    53/61

    Future of Networking, 200653Gregor v. Bochmann, University of Ottawa

    Peer-to-peer computing

    Scalability to the millions and more Load is shared on a peer-to-peer basis

    Individual servers may come and go

    Robustness of the overall system Example of service:

    distributed storage and search facility

    Not only applicable to file sharing Note: this is an overlay system

  • 7/29/2019 Future Networking

    54/61

    Future of Networking, 200654Gregor v. Bochmann, University of Ottawa

    Related technologies Security Trust management

    Software development technology

  • 7/29/2019 Future Networking

    55/61

    Future of Networking, 200655Gregor v. Bochmann, University of Ottawa

    Security

    Services Privacy of message exchanges

    Integrity of messages

    Authentication of users and devices

    Signature with non-repudiation

    Cryptographic technologies Secret key encryption

    Public key encryption (RCA, elliptic, etc.)

    Hash functions, etc.

    Secure private and public networks

    Integration of security into application layer protocols

    New types of applications Electronic cash

  • 7/29/2019 Future Networking

    56/61

    Future of Networking, 200656Gregor v. Bochmann, University of Ottawa

    Trust management

    trust is the outcome ofobservationsleadingto thebeliefthat the actions of another maybe relied upon, withoutexplicitguarantee,to achieve agoalin a risky situation

    -- Greg ElofsonKey elements

    Observations (experience, interaction)

    Belief (assumption)

    Goal (expectation)

    Without guarantee (risk)

    Subjective

  • 7/29/2019 Future Networking

    57/61

    Future of Networking, 200657Gregor v. Bochmann, University of Ottawa

    Trust: An example scenario

    Alice visits her friend Bob who lives since a year in a foreigncountry. She wants to invite Bob and some of his friends forsupper. She does not know which restaurant to choose,since she wants tasty food, a nice atmosphere and goodservice.

    In her own city, she has experienced many restaurants and

    she knows the restaurants she would choose depending onhow important food, atmosphere and service is for theoccasion. She trusts these restaurants, based on her pastexperience.

    Now she asks Bob for his experience in order to select anappropriate restaurant. She trusts Bob for telling her the

    truth and for evaluating restaurants based on similarcriteria as herself. Then she selects a restaurant with good food, because the

    friends find food more important than service. (Note: food isthe utility to be optimized)

  • 7/29/2019 Future Networking

    58/61

    Future of Networking, 200658Gregor v. Bochmann, University of Ottawa

    Some observations Trust is used for decision making Trust means a prediction of the outcome of a service invocation

    E.g. based on the experience, we predict that the chosen restaurant will provide tastyfood.

    Our trust model based on statistics and Bayesian estimationhttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Shi04a.pdf

    The space of possible outcomes usually depends on the context in which the trust model isused

    Trust is the estimation of a probability distribution over the possible outcomes of experiences

    Our own experience is more reliable than the experience of peers, however,peers may have more experiences than we. Question: can we trust the recommendations of others ? Our recommendation evaluation algorithm

    http://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Shi05a.pdf

    Weight each recommendation according to the trust in the recommender The trust in the recommender will decrease if a given recommendation is unfair How can one determine the fairness of a recommendation ??

    How detailed should the trust model be ? Should one distinguish different dimensions, e.g. food, atmosphere and service, or

    simply have one evaluation category, e.g. the restaurant being either excellent, good,bad or very bad ?

    Is it possible to determine the expected error of predictions?

    http://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Shi04a.pdfhttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Shi05a.pdfhttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Shi05a.pdfhttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Shi05a.pdfhttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Shi04a.pdf
  • 7/29/2019 Future Networking

    59/61

    Future of Networking, 200659Gregor v. Bochmann, University of Ottawa

    Transactions based on trustExisting access control model for mobile users: Autonomic

    Distributed Authorization Middleware

    Systematic development of

  • 7/29/2019 Future Networking

    60/61

    Future of Networking, 200660Gregor v. Bochmann, University of Ottawa

    Systematic development ofdistributed applications

    UK Grand Challenge Dependable SystemsEvolution use of assertions for defining component requirements

    verifying compiler as a goal Personal comment: Is this the right approach ??

    UML - formalizing its semantics Work in Ottawa:

    Defining requirements by scenarios (seehttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Sand05a.pdf)

    Using notations of Activity Diagrams or Use Case Maps (UCMs) (see

    http://www.site.uottawa.ca/~damyot/pub/index.shtml ) Define semantics of these languages based on Coloured Petri nets

    Consideration of performance parameters (seehttp://www.sce.carleton.ca/rads/puma/ )

    Relationship to workflow modeling, transaction processing, BPEL

    http://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Sand05a.pdfhttp://www.site.uottawa.ca/~damyot/pub/index.shtmlhttp://www.sce.carleton.ca/rads/puma/http://www.sce.carleton.ca/rads/puma/http://www.site.uottawa.ca/~damyot/pub/index.shtmlhttp://beethoven.site.uottawa.ca/dsrg/PublicDocuments/Publications/Sand05a.pdf
  • 7/29/2019 Future Networking

    61/61

    Conclusions

    Networking implies different system layers physical transmission

    network services and their management

    distributed applications

    There is technology push (higherbandwidth, wireless transmission,computing power) and application pull(after e-mail and WWW:IP telephony and

    conferencing, VOD, e-commerce, e-society) There are many interesting topics of

    research relevant to the future of