Summary&Conclusions of Clean Slate Stacks v. Heaps Role Based Architectures, Control Plane deconstruction of layers Virtualisation Software v. hardware.

Slides:



Advertisements
Similar presentations
INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
Advertisements

Cross-layer Design in Wireless Mesh Networks Hu Wenjie Computer Network and Protocol Testing Laboratory, Dept. of Computer Science & Technology, Tsinghua.
Floating Cloud Tiered Internet Architecture Current: Rochester Institute of Technology, Rensselaer Polytechnic Institute, University of Nevada, Reno Level.
ICS 434 Advanced Database Systems
NEW OUTLOOK ON MULTI-DOMAIN AND MULTI-LAYER TRAFFIC ENGINEERING Adrian Farrel
Kevin Workman CSC /04/12. Week 7 and 8 Internet regulation is basically restricting access to certain information. Examples of Internet regulation.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
October 22, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint, Part II SOEN321-Information-Systems Security.
Networks and Distributed Systems: Project Ideas
Computer Networks Fall, 2007 Prof Peterson. CIS 235: Networks Fall, 2007 Western State College  What are the main layers? What happens at each?
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
Wireless Networks.
1-1 Introduction to Computer Networks and Data Communications.
ISOC-Chicago 2001John Kristoff - DePaul University1 Journey to the Center of the Internet John Kristoff DePaul University.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Information Technologies -- Computer Networks 林永松 台灣大學資訊管理學系 (02)
28 August 2015T Kari Laitinen1 T Seminar on Wireless Future 3 ECTS cr Dr. Kari Laitinen Principal Lecturer Oulu University of Applied Sciences.
Introduction 1 Lecture 23 Link Layer (Error Detection/Correction) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 1: Overview of the Data Link layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
Chapter 5 Networks Communicating and Sharing Resources
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
CPS Today’s topics Computer Applications Computer Communications Upcoming Computer Security ( Great Ideas, Chapter 11) Reading Great Ideas, Chapter.
CSE 486/586, Spring 2014 CSE 486/586 Distributed Systems The Internet in 2 Hours: The First Hour Steve Ko Computer Sciences and Engineering University.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
GROUP INVOLVED IN A WEB APPLICATION DEVELOPMENT Continue.
IP NETWORKING NT2640.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
From “input” to “parameter”: The Topology Dichotomy in the Future Wireless Internet NSF FIND Mobility Workshop, Sep. 27, 2007 Ram Ramanathan BBN Technologies.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
EE3402- Data Communication Networks Lecture 1 Muhammad Qaisar Shafi.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
1 Thrust 5: Secure Wireless Networking Technologies For future generation wireless packet networks, two most important aspects need to be addressed: QoS.
Dynamic Network Services In Internet2 John Vollbrecht /Dec. 4, 2006 Fall Members Meeting.
SDN/OPENFLOW IN LHCONE A discussion June 5, 2013
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
CSE 486/586, Spring 2013 CSE 486/586 Distributed Systems The Internet in 2 Hours: The First Hour Steve Ko Computer Sciences and Engineering University.
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
Mesh Networks and DTN Break Out Group  Common research challenges  A representative experiment  Issues for a one page writeup  what incentive for the.
Assignment 3 Jacob Seiz. Hub A hub provides a central access point for a network. Through multiple I/O ports a hub can connect multiple Ethernet devices.
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
Developing an Implementation Framework for the Future Internet using the Y-Comm Architecture, SDN and NFV Glenford Mapp Associate Professor Middlesex University,
QM/BUPT Joint Programme
Computer Communications
Architecture and Algorithms for an IEEE 802
Graciela Perera Introduction Graciela Perera
Part 0: Networking Review
Steve Ko Computer Sciences and Engineering University at Buffalo
Dynamic Network Services In Internet2
Steve Ko Computer Sciences and Engineering University at Buffalo
NT1210 Introduction to Networking
Chapter 1: Introduction
Application Layer Mobility Management Scheme for Wireless Internet
Laura Getting started with Laura
V. Arun College of Information and Computer Sciences
Wireless & Mobile Networking CS 752/852 - Spring 2011
Network Systems and Throughput Preservation
Introduction and Overview
General Packet Radio Service (GPRS), 2 credits
Technologies and Applications of Computer Networks
Technologies and Applications of Computer Networks
EEL 6935 Wireless Ad Hoc Networks
Steve Ko Computer Sciences and Engineering University at Buffalo
Presentation transcript:

Summary&Conclusions of Clean Slate Stacks v. Heaps Role Based Architectures, Control Plane deconstruction of layers Virtualisation Software v. hardware Declarative/metarouting high level languages for systems on networks Privacy preserving network measurement Distributed or in archives Radical Wireless Net stuff Power saving - need more info on traffic Mobility - use vehicular info to trade-off differently See next … Can people send me slides to dist to attendees Do we mind putting agenda/attendee (NOT of course) and/or slides on web? Who needs the bus (6.30) - or walk to castle, then jesus (now)?

Adjacency - what is a network (graphs, queues, links etc)??? Jon. Crowcroft Computer Lab University of Cambridge

Shared Media v. Pt2Pt v. Switches (NBMA) etc etc Wireless Mesh (multiple overlapping mesh and radio?) And Packet v. Connection v. (say) swarms (see later)? There is no connection How to build a testbed What are the interesting questions?

clouds Net folk often draw clouds - this is not a crazy abstraction Encapsulate a notion of “useful adjancy” Usefulness defined by Community (policy in AS sense) Reachability (in same comms protocol role/layer sense) Information rate (e.g. spectrum, or lambda) (SIR Can recurse/nest, or merge/split Spectrum management for incumbent, community mesh, C^3 Multipath, multi-radio, distributed MIMO Mpls LSRs Etc etc etc - so what is the Computer Science instantiation of this architecture

Swarms (tm:) Is my mad idea to replace packets and circuits with A pure network layer version of bittorrent Using cross layer net coding (if needed) No sender/receiver Pub/sub or event/notify, but as first class net ADU is net object (e.g. in end system, but also in net) (e.g. imagine rabin fingerprint/coded object being net coded in XORS in the air sense Or 10Mbyte or 1Gbyte MTU/MSS packet in photonics case

Questions? Cloud is a fuzzier notion of a net than a “Set” Basically, convolves performance AND reachability I.e. like a potential well w/ depth… Other than that…I havnt got a clue :-)