Recursive InterNetwork Architecture. A policy-based recursive approach to building a better Internet



Similar documents
Load Balancing in Recursive Networks using Whatevercast Names

IRATI - Investigating RINA as an Alternative to TCP/IP

Experimental evaluation of a Recursive InterNetwork Architecture prototype

GENI Network Virtualization Concepts

10CS64: COMPUTER NETWORKS - II

BOSTON UNIVERSITY METROPOLITAN COLLEGE. Thesis PATTERNS IN NETWORK SECURITY: AN ANALYSIS OF ARCHITECTURAL COMPLEXITY IN SECURING

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Network Virtualization: A Tutorial

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming IP routing

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

MetroNet6 - Homeland Security IPv6 R&D over Wireless

Network Security TCP/IP Refresher

Protocols. Packets. What's in an IP packet

Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

Internet 3.0: Ten Problems with Current Internet Architecture and a Proposal for the Next Generation

Networking Test 4 Study Guide

6LoWPAN Technical Overview

SBSCET, Firozpur (Punjab), India

Bit Chat: A Peer-to-Peer Instant Messenger

Design of a SIP Outbound Edge Proxy (EPSIP)

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

12. Firewalls Content

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

CSE 3461 / 5461: Computer Networking & Internet Technologies

SANE: A Protection Architecture For Enterprise Networks

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel

Tomás P. de Miguel DIT-UPM. dit UPM

Linux Network Security

IP address format: Dotted decimal notation:

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Internet inter-as routing: BGP

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Chapter 9. IP Secure

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network)

How To Write A Transport Layer Protocol For Wireless Networks

Communications and Computer Networks

Facility Usage Scenarios

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Software Defined Networking & Openflow

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

Transport and Network Layer

21.4 Network Address Translation (NAT) NAT concept

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Chapter 9 Firewalls and Intrusion Prevention Systems

VPN Lesson 2: VPN Implementation. Summary

Does SDN accelerate network innovations? Example of Flexible Service Creation

Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach

Network performance in virtual infrastructures

The TCP/IP Reference Model

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Definition. A Historical Example

Layered Architectures and Applications

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

Internet Peering, IPv6, and NATs. Mike Freedman V Networks

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast

Telematics. 9th Tutorial - IP Model, IPv6, Routing

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Internet Architecture


Internet Infrastructure Measurement: Challenges and Tools

Cisco PIX vs. Checkpoint Firewall

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Network Security Administrator

IP Subnetting and Addressing

Flow processing and the rise of the middle.

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

What would you like to protect?

INTRODUCTION TO NETWORK VIRTUALIZATION

SAVI/GENI Federation. Research Progress. Sushil Bhojwani, Andreas Bergen, Hausi A. Müller, Sudhakar Ganti University of Victoria.

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Data Communication Networks Introduction

Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments

Wireless Encryption Protection

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Steelcape Product Overview and Functional Description

(Refer Slide Time: 02:17)

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Transcription:

Recursive InterNetwork Architecture A policy-based recursive approach to building a better Internet Abraham Matta College of Arts & Sciences Computer Science Boston University March 2014 1

Collaborators q PhD Students: Yuefeng Wang Nabeel Akhtar q Alumni: Flavio Esposito, Exegy Karim Mattar, Akamai Vatche Ishakian, BBN Gowtham Boddapati, Akamai Gonca Gursun, Ozyegin U. (Turkey) Joseph Akinwumi q Faculty John Day Lou Chitkushev q Outside Collaborators: Eduard Grasa, i2cat, Spain Eleni Trouva, i2cat, Spain Steve Bunch, TRIA Network Systems Peter DeWolf, TRIA Miguel Ponce de Leon, TSSG, Ireland Patrick Phelan, x-tssg, Ireland Xavier Hesselbach-Serra, UPC, Spain Louis Pouzin, father of connectionless networking 2

What s wrong with Ad-Hoc Wireless Network Laptop today s Internet? Wireless Mesh Backbone Cell phone PDA Internet Cellular Data Network Mesh router with gateway Wireless Sensor Network Laptop Sensor Event VoIP + video/tv streaming Sensor PDA Base Station q The brave new world Cell phone larger scale, more diverse technologies new services: content-driven, cloud-based, context-aware, mobile, socially-driven, secure, profitable, q Custom point-solutions: No or little science q Lots of problems: Denial-of-service attacks, bad performance, hard to manage, 3 Sink

Questions q Is the Internet s architecture fundamentally broken that we need to clean slate? q Can we find a new architecture that is complete, yet minimal? If so, what is it? q Can we transition to it without requiring everyone to adopt it? q YES q RINA (Recursive InterNetwork Architecture)? Based on Networking is inter-process communication --Robert Metcalfe 72 q YES 4

Talk Outline q Problems with today s Internet architecture q Our Recursive IPC-based Net Architecture one IPC layer that repeats over different scopes q One Data Transfer Protocol (DTP) soft-state (ala Delta-t) approach q One Common Distributed Application Protocol (CDAP) stateless (ala CMIP), used by management applications naming & addressing multihoming, mobility q Prototyping, evaluation, conclusions

Talk Outline q Problems with today s Internet architecture q Our Recursive IPC-based Net Architecture one IPC layer that repeats over different scopes q One Data Transfer Protocol (DTP) soft-state (ala Delta-t) approach q One Common Distributed Application Protocol (CDAP) stateless (ala CMIP), used by management applications naming & addressing multihoming, mobility q Prototyping, evaluation, conclusions

Internet s view: one big, flat, open net Application Web, email, ftp, Application Transport TCP, UDP, IP protocol Transport Network Network Network Data Link DL DL Data Link Physical PHY PHY Physical www.cs.bu.edu 128.10.0.0 128.197.0.0 128.197.15.10 q There s no building block q The hour-glass model imposed a least common denominator q We named and addressed the wrong things (i.e., interfaces) 7

Internet s view: one big, flat, open net Application Web, email, ftp, Application Transport Network Data Link Physical TCP, UDP, IP protocol Network DL DL PHY PHY Transport Network Data Link Physical www.cs.bu.edu 128.10.0.0 128.197.0.0 128.197.15.10 q We exposed addresses to applications q We hacked in middleboxes q Built a network of boxes, rather than networks of processes 8

Ex1: Bad Addressing & Routing Want to send message to Bob Alice Bob à I 1 I 1 Bob ` multi-homed destination To: I 1 I 2 q Naming interfaces application bound to a path (point-of-attachment address) huge routing tables q Hard to deal with multihoming and mobility 9

Ex2: Ad hoc Scalability & Security Mapping Table can t initiate connection NAT, id A ß à B, id B A NAT B ` To: NAT, id A message To: B, id B message q Network Address Translator aggregates private addresses q NAT acts as firewall preventing attacks on private addresses & ports causing so-called layer violations q Hard to coordinate communication across domains when we want to 10

Talk Outline q Problems with today s Internet architecture q Our Recursive IPC-based Net Architecture one IPC layer that repeats over different scopes q One Data Transfer Protocol (DTP) soft-state (ala Delta-t) approach q One Common Distributed Application Protocol (CDAP) stateless (ala CMIP), used by management applications naming & addressing multihoming, mobility q Prototyping, evaluation, conclusions

Our Solution: divide-and-conquer [ReArch/CoNEXT 08] q Application processes communicate over Distributed IPC Facility (DIF) a distributed application that does IPC q DIF management is internal è better security q IPC processes are application processes to lower DIF s q Recurse as needed è better management & scalability q Well-defined interfaces è predictable service 12

Recursive Architecture based on IPC Base Repeat Case 2-DIF 1-DIF 0-DIF 0-DIF 0-DIF node 1 node 2 node 3 node 4 DIF = Distributed IPC Facility (locus of shared state=scope) Policies are tailored to scope of DIF 13

RINA allows scoping of services Application Web, email, ftp, Transport TCP, UDP, Network IP Network DIF Data Link DL DL DIF Physical PHY PHY DIF Application Transport Network Data Link Physical q The DIF is the building block (layer) and can be composed A DIF has all that is needed to manage a network, i.e. it integrates routing, transport and management q E2E (end-to-end principle) is not relevant! Each DIF layer provides transport flow service/qos over its scope q IPv6 is/was a waste of time! Each DIF layer has its private addresses 14

What goes into a DIF? IPC Transfer Delimiting Transfer Relaying/ Muxing PDU Protection DTSV IPC Control RIB IPC Management q Processing at 3 timescales, decoupled by either a State Vector or a Resource Information Base IPC Transfer actually moves the data Applications, e.g., routing, resource allocation, access control, etc. Common Distributed Application Protocol IPC Control (optional) for transmission, error, flow control, etc. IPC Management for routing, resource allocation, locating applications, access control, monitoring lower layer, etc. 15

Talk Outline q Problems with today s Internet architecture q Our Recursive IPC-based Net Architecture one IPC layer that repeats over different scopes q One Data Transfer Protocol (DTP) soft-state (ala Delta-t) approach q One Common Distributed Application Protocol (CDAP) stateless (ala CMIP), used by management applications naming & addressing multihoming, mobility q Prototyping, evaluation, conclusions

Only one Data Transfer Protocol [NetDB 09, PFLDNeT 10] port-id Flow Allocation Local Mapping conn-id DIF q RINA decouples port allocation and access control from data synchronization and transfer q At each end, port and conn ID are allocated dynamically and bound to each other by management (using CDAP) in a hardstate fashion 17

Only one Data Transfer Protocol (2) port-id Local Mapping conn-id DIF q Once allocated, Data Transfer can start following Delta-t [Watson 81], a soft-state protocol Timers are necessary and sufficient for data synchronization and transfer Flows without data transfer control are UDP-like. Different policies support different requirements If there is a long idle period, conn state is discarded, but ports remain Conn IDs can be changed during data transfer and bound to same ports 18

RINA: Good Transport leads to Better Security [NPSec/ICNP 12] q In RINA, requesting applications never see addresses nor conn IDs No well-known ports Ports, dynamically allocated, are not part of conn IDs Service requested by application name Traditional port scanning attacks not possible Scanning application names is much more difficult, far larger name space port-id Local Mapping conn-id DIF 19

RINA: Good Transport leads to Better Security q In RINA, state of data transfer is soft, and conn IDs are allocated dynamically (and can change on the fly) Need to be authenticated and member of the DIF No explicit control messages to fabricate Conn IDs are hard to guess Conn opening and data transfer attacks are harder to mount port-id Local Mapping conn-id DIF 20

Talk Outline q Problems with today s Internet architecture q Our Recursive IPC-based Net Architecture one IPC layer that repeats over different scopes q One Data Transfer Protocol (DTP) soft-state (ala Delta-t) approach q One Common Distributed Application Protocol (CDAP) stateless (ala CMIP), used by management applications naming & addressing multihoming, mobility q Prototyping, evaluation, conclusions

Only One Application Protocol q For management applications, need only one stateless (soft-state) application protocol to access objects It does Read/Write, Create/Delete, Start/Stop q The objects are outside the protocol IPC Transfer Delimiting Transfer Relaying/ Muxing PDU Protection DTSV IPC Control RIB IPC Management Applications, e.g., routing, resource allocation, access control, etc. Common Distributed Application Protocol

RINA: Good Addressing private mgmt want to send message to Bob Bob Bob à B DIF B To: B DIF P q Each DIF is privately managed It assigns private node addresses to IPC processes It internally maps app/service name to node address An address is a synonym for an IPC process whose scope is limited to the DIF and may be structured to be useful within the DIF 23

RINA: Good Addressing recursive want to send message to Bob Bob DIF B To: B Bà P DIF P B and P are IPC processes on same system q Node address mapped to PoA (point-of-attachment) address q Roles are relative: node address is name for lower DIF, and PoA for higher DIF q Processes on a system are members of various DIF layers 24

RINA: Better Scalability & Security secure containers A relay B Public Internet Private Enterprise Network q Nothing more than applications establishing communication Authenticating that A is a valid member of the DIF Initializing it with current DIF information Assigning it an internal address for use in coordinating IPC This is enrollment, i.e., explicit negotiation to join DIF (access control) RINA decouples authentication from connection management and integrity/confidentiality 25

Good Design leads to Better Security q In RINA, underlying IPC processes must be authenticated to join DIF only insider attacks possible a hurdle that is not present in TCP/IP networks q Authentication and encryption are applied recursively no shim sublayers application process authentication module IPC process DIF integrity & confidentiality module 26

Good Design leads to Better Routing [FutureNet-III 10, WWIC 11, NoF 11, CC 12] source destination q Back to naming-addressing basics [Saltzer 82] Service/app name (location-independent) Node address (location-dependent) PoA address (path-dependent) Path q We clearly distinguish the last 2 mappings q Route: sequence of node addresses q Next-hop node address is mapped to PoA by lower DIF 27

Mobility is Inherent MH CH q Mobility is a dynamic form of multihoming q Mobile joins new DIF layers and leaves old ones q Local movement results in local routing updates 28

Mobility is Inherent CH q Mobility is a dynamic form of multihoming q Mobile joins new DIF layers and leaves old ones q Local movement results in local routing updates 29

Mobility is Inherent CH q Mobility is a dynamic form of multihoming q Mobile joins new DIF layers and leaves old ones q Local movement results in local routing updates 30

Simulation Results: RINA vs. LISP vs. [FutureNet-III 10, CC 12] RINA LISP LISP RINA q RINA inherently limits the scope of location update & inconsistency LISP (loc/id split): loc is still path-dependent! q RINA uses direct routing to destination node 31

Talk Outline q Problems with today s Internet architecture q Our Recursive IPC-based Net Architecture one IPC layer that repeats over different scopes q One Data Transfer Protocol (DTP) soft-state (ala Delta-t) approach q One Common Distributed Application Protocol (CDAP) stateless (ala CMIP), used by management applications naming & addressing multihoming, mobility q Prototyping, evaluation, conclusions

ProtoRINA [TR-2013-013,NSDI 13,GREE 13,GREE 14] q Overview Boston University s user-space prototype of the RINA architecture Experimental tool for new (non-ip) applications / policies Teaching tool for networking and distributed systems classes q Status cross-debugging with two other RINA prototypes (IRATI and TRIA) around 55,000 lines of Java code not complete; we continue to modify/add elements code and user manual available online 33

RINA Node q Distributed Application Facility (DAF): Distributed Application Processes cooperating to perform a certain function: communication, weather forecast, genomics, etc. q A DIF is a specific DAF whose job is only to provide IPC 34

IPC Process Provides communication service for application processes or higher level IPC processes 35

RINA API: IRM q Applications use it to allocate / deallocate flows, send / receive data, register / unregister their service 36

RINA API: RIB Daemon q Applications use this publish/subscribe API to access objects in a local RIB, or remote RIB (using CDAP) q Configuration files allow for selecting different policies (authentication, routing, etc.) 37

Dynamic Formation of a Virtual Private Cloud DIF App1 App2 E1 E2 Enterprise DIF CP1 CP2 Cloud Provider DIF q In RINA, Flow Allocation may involve instantiation of an underlying DIF, if one does not exist 38

Dynamic Formation of a Virtual Private Cloud DIF VPC1 Virtual Private Cloud DIF VPC2 VPC3 E1 E2 Enterprise DIF CP1 CP2 Cloud Provider DIF q A new application acts as a relay IPC 39

Dynamic Formation of a Virtual Private Cloud DIF App1 Customer Application DAF App2 VPC1 Virtual Private Cloud DIF VPC2 VPC3 E1 E2 Enterprise DIF CP1 CP2 Cloud Provider DIF 40

Policy-based Dynamic Service Management [TR-2013-014] App1 Customer Application DAF App2 VPC1 Virtual Private Cloud DIF VPC2 VPC3 E1 E2 Enterprise DIF CP1 CP2 Cloud Provider DIF Layer/DIF Management Layer/DIF Management 41

Policy-based Dynamic Service Management Network Management App1 Customer Application DAF App2 VPC1 Virtual Private Cloud DIF VPC2 VPC3 E1 E2 Enterprise DIF CP1 CP2 Cloud Provider DIF 42

Policy-based Dynamic Service Management App1 Customer Application DAF App2 Naming Management VPC1 Virtual Private Cloud DIF VPC2 VPC3 E1 E2 Enterprise DIF CP1 CP2 Cloud Provider DIF 43

Policy-based Dynamic Service Management Application Management App1 Customer Application DAF App2 VPC1 Virtual Private Cloud DIF VPC2 VPC3 E1 E2 Enterprise DIF CP1 CP2 Cloud Provider DIF 44

ProtoRINA over the GENI Testbed q Large-scale experimentation for correctness and performance q Run ProtoRINA within a long-lived slice over GENI researchers and educators can opt-in and experiment with programmable management policies 45

Example: One-level DIF Topology Node1 Node 2 App A App B Node A Node B Node C IPC 2 IPC 3 IPC 4 IPC 1 IPC 5 DIF IPC 6 IPC 7 IPC 8 Node D Node E Node F q Link-state updates sent every 10 seconds

Example: Two-level DIF Topology Node 1 Node 2 App A App B Node B DIF 5 IPC 14 IPC 13 IPC 16 IPC 15 Node A Node C IPC 2 IPC 3 IPC 4 IPC 5 IPC 6 IPC 1 DIF 1 DIF 2 IPC 12 DIF 4 IPC 11 IPC 10 IPC 9 IPC 8 Node D Node E Node F q 0-DIFs: Link-state updates sent every 10 seconds q 1-DIF: Link-state updates sent every 5 seconds IPC 7 DIF 3

GENI Resources q each RINA node on one VM from NYU aggregate nine VM s (one runs a naming service) 48

Effect of DIF Mgmt & Routing Policies Scoping (2-level DIF) yields faster convergence and less OOO packets with similar routing overhead* * Generally lower routing overhead for larger multi-level DIF topologies

How does RINA compare? q Related work: many, but not holistic We claim RINA is more complete and minimal RINA subsumes the mechanisms and policies of other architectural proposals q Security: DIF is a secure container of coordinated IPC processes RINA supports secure address spaces as in XIA q Manageability: DIF defines a scope that is locally managed RINA separates mechanisms from policies RINA has one recursive layer configurable with policies beyond middleware, tunneling, cross-layer approaches RINA supports virtual slices as in Nebula 50

How does RINA compare? (2) q Scalability: the multi-level DIF structure limits the scope of control and management Routing table size of a system depends on only those DIFs to which its IPC processes join q Content-based: service/app name is locationindependent, node address is not path-dependent beyond loc/id split approaches RINA supports multihoming and mobility as in Serval or Mobility-First, but inherently via local routing updates RINA supports content discovery as in NDN q Socially-driven / Cloud-based: DIF is dynamically formed to enable IPC among cloud / peer processes 51

How does RINA compare? (3) q Adoption: DIF is an overlay, internally managed using only two protocols: data transfer and management q Network neutrality: not relevant User has a choice of which DIF to join DIF differentiates its services via policies mechanisms are the same q Marketplace: individual services of DIFs can be (recursively) composed to offer new user services 52

References q q q q q q q [Book 08] John Day. "Patterns in Network Architecture: A Return to Fundamentals". Prentice Hall, Jan. 2008. [ReArch/CoNEXT 08] John Day, Ibrahim Matta, and Karim Mattar. "Networking is IPC: A Guiding Principle to a Better Internet". In ReArch'08 (with CoNEXT), Madrid, SPAIN, Dec. 2008. [NetDB 09] Karim Mattar, Ibrahim Matta, John Day, Vatche Ishakian, and Gonca Gursun. "Declarative Transport: A Customizable Transport Service for the Future Internet". In 5 th Int. Workshop on Networking Meets Databases (with SOSP), Big Sky, MT, Oct. 2009. [PFLDNet 10] Gonca Gursun, Ibrahim Matta, and Karim Mattar. "On the Performance and Robustness of Managing Reliable Transport Connections". In 8 th Int. Workshop on Protocols for Future, Large-Scale and Diverse Network Transports, Lancester, PA, Nov. 2010. [NPSec/ICNP 12] Gowtham Boddapati, John Day, Ibrahim Matta, and Lou Chitkushev. "Assessing the Security of a Clean-Slate Internet Architecture". In 7 th Workshop on Secure Network Protocols (with ICNP), Austin, Texas, Oct. 2012. [FutureNet-III 10] Vatche Ishakian, Joseph Akinwumi, Ibrahim Matta. "On the Cost of Supporting Multihoming and Mobility". In 3 rd Int. Workshop on the Network of the Future (with GLOBECOM 2010), Miami, Florida, Dec. 2010. [WWIC 11] Eleni Trouva, Eduard Grasa, John Day, Ibrahim Matta, Lou Chitkushev, Steve Bunch, Miguel Ponce de Leon, Patrick Phelan, and Xavier Hesselbach-Serra. "Transport over Heterogeneous Networks Using the RINA Architecture. In 9 th Int. Conference on Wired/ Wireless Internet Communications, Barcelona, SPAIN, June 2011. 53

References q q q q q q q [NoF 11] John Day, Eleni Trouva, Eduard Grasa, Patrick Phelan, Miguel Ponce de Leon, Steve Bunch, Ibrahim Matta, Lou Chitkushev, and Louis Pouzin. "Bounding the Router Table Size in an ISP Network using RINA". In 2 nd Int. Conference on Network of the Future, Universite Pierre et Marie Curie, Paris, FRANCE, Nov. 2011. [CC 12] Vatche Ishakian, Joseph Akinwumi, Flavio Esposito, Ibrahim Matta. "On Supporting Mobility and Multihoming in Recursive Internet Architectures". Computer Communications, Volume 35 Issue 13, July 2012. [TR-2013-013] Yuefeng Wang, Flavio Esposito, Ibrahim Matta and John Day. Boston University s RINA Prototype: Programming Manual. Technical Report BUCS-TR-2013-013, Boston University, 2013. [NSDI 13] Flavio Esposito, Yuefeng Wang, Ibrahim Matta and John Day. "Dynamic Layer Instantiation as a Service". Demo at USENIX Symp. on Networked Systems Design and Implementation, Lombard, IL, April 2013. [GREE 13] Yuefeng Wang, Flavio Esposito and Ibrahim Matta. "Demonstrating RINA using the GENI Testbed". In 2 nd GENI Research and Educational Experiment Workshop, Salt Lake City, Utah, Mar. 2013. [GREE 14] Yuefeng Wang, Ibrahim Matta and Nabeel Akhtar. "Experimenting with Routing Policies using ProtoRINA over GENI". In 3 rd GENI Research and Educational Experiment Workshop, Atlanta, Georgia, Mar. 2014. [TR-2013-014] Yuefeng Wang, Flavio Esposito, Ibrahim Matta and John Day. "RINA: An Architecture for Policy-Based Dynamic Service Management". Technical Report BUCS- TR-2013-014, Boston University, 2013. 54

More @ http://csr.bu.edu/rina irati.eu pouzinsociety.org 55