An Architecture for Concurrent Future Networks



Similar documents
Using & Offering Wholesale Ethernet Network and Operational Considerations

The Sierra Clustered Database Engine, the technology at the heart of

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

REDEFINING THE ENTERPRISE OS RED HAT ENTERPRISE LINUX 7

Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond

SiteCelerate white paper

Preparing Your IP Network for High Definition Video Conferencing

Performance Oriented Management System for Reconfigurable Network Appliances

The Reduced Address Space (RAS) for Application Memory Authentication

Preparing Your IP network for High Definition Video Conferencing

Components and Concepts of the Ambient Networks Architecture

Business transformation with Hybrid Cloud

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Roland Bless, Stephan Baucke Ericsson Research

ARIS 9 Highlights and Outlook

Ariba: A Framework for Developing Decentralized Services

ASPERA HIGH-SPEED TRANSFER SOFTWARE. Moving the world s data at maximum speed

Towards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things...

The Evolution of Cloud Storage - From "Disk Drive in the Sky" to "Storage Array in the Sky" Allen Samuels Co-founder & Chief Architect

CCN. CCNx 1.0 Internet of Things Architectural Overview. Computer Science Laboratory Networking & Distributed Systems March 2014

API Architecture. for the Data Interoperability at OSU initiative

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist

Sentinet for BizTalk Server SENTINET

ABC of Storage Security. M. Granata NetApp System Engineer

Using Story Points to Estimate Software Development Projects in the Commercial Phase

Software-defined Storage Architecture for Analytics Computing

Donky Technical Overview

EMC IRODS RESOURCE DRIVERS

.NET and J2EE Intro to Software Engineering

Deploying telecom-grade products in the cloud

IRTF Network Virtualization BAR-BOF

Secure and Semantic Web of Automation

DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández

Eliminating End User and Application Downtime. Continuous Availability for your Business Applications

Sentinet for Windows Azure SENTINET

DOCUMENT REFERENCE: SQ EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015

The Design and Implementation of the Zetta Storage Service. October 27, 2009

ITU-T Future Networks and Its Framework of Virtualization

Blue Planet. Introduction. Blue Planet Components. Benefits

How To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine)

Reducing Configuration Complexity with Next Gen IoT Networks

A Distributed Approach to Business Intelligence Systems Synchronization

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Application Monitoring Maturity: The Road to End-to-End Monitoring

Master Course Computer Networks IN2097

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

2.1 What are distributed systems? What are systems? Different kind of systems How to distribute systems? 2.2 Communication concepts

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11

Policy-based Pre-Processing in Hadoop

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Charter Text Network Design and Configuration

SAVI/GENI Federation. Research Progress. Sushil Bhojwani, Andreas Bergen, Hausi A. Müller, Sudhakar Ganti University of Victoria.

Where IT perceptions are reality. Test Report. OCe14000 Performance. Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Architecture of distributed network processors: specifics of application in information security systems

VPN. Date: 4/15/2004 By: Heena Patel

GigaSpaces Real-Time Analytics for Big Data

ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center

Wireless Sensor Networks Chapter 14: Security in WSNs

Cisco Wide Area Application Services (WAAS) Software Version 4.0

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

Lecture 02b Cloud Computing II

Cisco Network Optimization Service

Figure 1: Illustration of service management conceptual framework

Microsoft Exchange 2010 /Outlook 2010 Performance with Riverbed WAN Optimization

Generalised Socket Addresses for Unix Squeak

Cloud Infrastructure Planning. Chapter Six

Designing a Cloud Storage System

IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11

Collaboration. Michael McCabe Information Architect black and white solutions for a grey world

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

How Network Operators Do Prepare for the Rise of the Machines

NEW BSS ARCHITECTURE. Michael Levitin June 2015

Network Architecture and Topology

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

Introduction to Network Management

Enterprise Integration using AssetWise

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

SDN Testbed Experiences: Challenges and Next Steps

Transport SDN Toolkit: Framework and APIs. John McDonough OIF Vice President NEC BTE 2015

In Memory Accelerator for MongoDB

Realizing the next step in storage/converged architectures

Workspace & Storage Infrastructure for Service Providers

MDM for the Enterprise: Complementing and extending your Active Data Warehousing strategy. Satish Krishnaswamy VP MDM Solutions - Teradata

BT 21CN Network IPv6 Transformation

ENOVIA V6 Architecture Performance Capability Scalability

Oracle Solaris: Aktueller Stand und Ausblick

Copyright 2011, Storage Strategies Now, Inc. All Rights Reserved.

Best Practices for Implementing Oracle Data Integrator (ODI) July 21, 2011

Bluetooth Health Device Profile and the IEEE Medical Device Frame Work

Transcription:

An Architecture for Concurrent Future Networks Future Internet 2008 Karlsruhe, 11.11.2008 Lars Völker, Denis Martin, Ibtissam El Khayat, Christoph Werle, Martina Zitterbart (Universität Karlsruhe (TH) / Ericsson GmbH) Motivation 4WARD-Project: Let 1000 networks bloom Network Virtualization Vast amount of (virtual) networks User might have multiple Networks side-by-side How can we do this? How can we run multiple networks? What must a node look like? How do we connect an application to the correct network? What about Security, QoS, and Mobility? Rapid creation of such networks? 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 2

Definitions Just to make life easier for us Network Architecture A common understanding within a network. Usually involves common protocols as well as naming and addressing. Network Architect Designer of networks and/or network architectures. 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 3 Structure of this talk Motivation Definitions Node Architecture at a glance Important Concepts of the Node Architecture Node Architecture put together Rapid creation with the Design Process Conclusion and Outlook 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 4

Node Architecture at a glance Simplified version App App App as Protocol Container Selection Architecture-specific Multiplexer Network Access Virtual or physical Networks Network Access Manager NA Multiplexer Network Access Manager NA NA Node Management Network Accesses (physical or virtual) 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 5 The A container for Future Internet protocols ( Protocol Stack) Is usually based on one Network Architecture Fits usually just one Network Architecture NAI has to be compatible to Network Architecture AI Control Data NAI Application Interface (AI) Tuning Interface (TI) Data Control Network Access Interface (NAI) depends on Net. Architecture Could be build many different ways: Writing Code, Code Generation, 3rd party, Composition, AI Interop connects multiple Network Architectures Data NAI Control Data NAI Control 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 6

Application Interface Moving forward from the Socket API Today s interfaces to the applications (e.g. Socket API) have drawbacks Peer is described by address and not by name Usually simple name resolution rule (e.g. IPv6 first, IPv4 second) With 1000 networks, choice of the network important! Applications might have requirements on communication! Please protect this connection Needed changes: Move name resolver from application to system Allow application to influence choice of network with requirements 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 7 Network Access Interface Transparently support Network Virtualization With 1000 networks, many of them will be virtual networks! That means: Virtual Networks won t be special Possibly the common case The Network Access Interface Hides the differences of physical and virtual networks Supports the description of the underlying network e.g., latency, energy consumption, cost Triggers of network events So the selection of s could also be based on the network properties 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 8

Automatic Selection Choosing the best With 1000 networks the user cannot just manually choose the network! Idea: Let application, user, and administrator describe requirements/goals Description of underlying network Estimate the s behavior Rank the s based on this This is based on Multi Attribute Utility Theory (MAUT) and [1] [1] Lars Völker, Christoph Werle, Martina Zitterbart, Decision Process for Automated Selection of Security Protocols, 33nd IEEE Conference on Local Computer Networks (LCN 2008), IEEE, p. 223--229, Montreal, QB, Canada, Oct 2008. 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 9 Criteria To determine what s best we need to describe s! We looked at several criteria, here some examples Criteria Security QoS Energy Consump. Effective Bit Strength Protocol Properties Latency Latency Jitter Throughput Overhead 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 10

Calculating total value How to aggregate the criteria to overall utility: 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 11 Value Functions Function to translate the individual criteria s values to a (generic) utility This function has to fit to the criterion Each criterion could have a specific value function It should be adaptable A possible Value Function for Latency 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 12

Strength of Security!? Determine Effective Bit Strength (EBS) of involved cryptographic primitives: Authentication, Key Exchange, Encryption, Message Authentication Aggregate those EBS values using the Min-Function EBS Utility Value Value is not linear for most users 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 13 Influencing the Decision Process Value functions Can be replaced and/or adjusted Weights Put criteria into proportion Requirements Describe which values are ok for criterion Works also for qualitative criteria 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 14

Design Time (Offline) Run Time Node Architecture Application AR AR UP Application requirements User policies for network selection Selection Name & Addr Mapper Decision Engine UP Creator Tuning / Optimization Agent Opt Cache Management Multiplexer Repository NA Manager Logical View of Node NA NA NA Network Accesses 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 15 Design Process Accelerating the Creation of s Iterative process aiding the future network architect to design new networks The network architect will start with his own requirements and will refine them during the process He will derive a Blue Print for the network architecture s components and functionalities With this Blue Print Components of the network architecture can be implemented (if not using standard components already existing on the market) Network topologies can be designed by network administrators 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 16

Requirements (Meta) Modeling Network Architect Building blocks, Components, Architecture patterns Design Design Process (including iterations) Guidelines, building blocks Composition of functionality Interoperability 4WARD Architecture Framework Blue Print of network architecture Implementation 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 17 Conclusion / Benefits Create a new network architecture if needed Every virtual network can have their own You could even have applications come with their own Has to be a simple process! The Design Process enables this s can be treated as almost arbitrary black boxes Approaches like RNA and SILO can run in a We try to not introduce too many invariants Allow for future development Choosing the and Network Architecture dynamically 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 18

Thank you for your attention Dipl.-Inform. Lars Völker Zirkel 2 Geb. 20.20 76128 Karlsruhe Tel.: +49 721 608-64 04 Fax: - 67 89 E-Mail: Lars.Voelker@tm.uka.de http://www.tm.uka.de/~voelker Peter Baumung The Project Website: http://www.4ward-project.eu/ 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 19