2011-09-12 AK T-110.6120: Publish/Subscribe Internetworking 1 Introduction Arto Karila Aalto-HIIT T-110.6120 – Special Course on Data.

Slides:



Advertisements
Similar presentations
Where Do We Go From Here? John Curran ARIN President & CEO
Advertisements

Introduction to e-Business. History of WWW Late 1960s, ARPA (Advanced Research Project Agency) of Dept of Defense sponsored some of MIT graduate student.
MCT620 – Distributed Systems
Computer Networks TCP/IP Protocol Suite.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
1 Mata Architecture for the Future Network APAN2008 January Myung-Ki SHIN, ETRI
Fundamental Issues of Future Internet Introduction, Design Goals and Principles Mingwei Xu Qingdao.
Security Issues In Mobile IP
IPv6 Transition for Enterprises Light Reading Live 14 July 2011 John Curran President and CEO ARIN.
Planning Your Conversion from IPv4 to IPv6 John Curran ARIN President & CEO This presentation describes the impending depletion of Internet Protocol version.
Deploying IPv6: The time is now Are you ready? SFTA 24 May 2012 John Curran President and CEO, ARIN.
Migration to IPv6 – Has Tomorrow Finally Arrived? John Curran ARIN President & CEO.
Demystifying IPv6: Ensuring a Smooth Transition John Curran ARIN President & CEO This presentation describes the impending depletion of Internet Protocol.
NORDUnet: Hannu H. Kari/HUT/CS/TMLPage 1/22 Mobility in the Wireless and Wired World Hannu H. KARI Helsinki University of Technology (HUT) professor/TML-laboratory/CS/HUT.
Nortel Proprietary Information 2 The Impact of the World Wide Web on Carrier Networks – an Historic Opportunity Geoff Hall Chief Technology Officer, EMEA.
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
P2P Media Summit Silicon Valley August 4, 2008 Jeff Capone.
SOA for EGovernment 1 Emergency Services Enterprise Framework: A Service-Oriented Approach Sukumar Dwarkanath COMCARE Michael Daconta Oberon Associates.
Public B2B Exchanges and Support Services
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
The internet. Background Created in 1969, connected computers at UCLA, Stanford Research Institute, U. of Utah, and UC at Santa Barbara With an estimated.
Internet Applications
What Is the Internet? A network of networks, joining many government, university and private computers together and providing an infrastructure for the.
Advanced Computer Networks Fall 2011
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
1 Chapter One Introduction to Computer Networks and Data Communications.
Gold Country Computer Learning Center March 2006 Is Wireless for You? Roger Thornburn.
Water Utility Business Applications. 2 Agenda Industry overview and trends Our application visionary solution Business values Wireless network components.
Distributed Data Processing
Discovering Computers Fundamentals, 2012 Edition
Introduction to Computer Administration. Computer Network - Basic Concepts Computer Networks Computer Networks Communication Model Communication Model.
Christophe Jelger – CS221 Network and Security - Universität Basel Christophe Jelger Post-doctoral researcher IP Multicasting.
IPv4 to IPv6 transition ALS Capacity Building April 2014
IBM’s Transformation to a Services Company and the Growth of Digital Trade Michael DiPaula-Coyle IBM Governmental Programs.
Cloud Computing for Education & Cloud Learning Minjuan Wang to BT Research Center (Abu Dhabi) Educational Technology San Diego State University
ICS 434 Advanced Database Systems
IPv6 Activities and Update in Thailand Sinchai Kamolphiwong IPv6 Forum Thailand IPv6 WG, UniNet NGI.
Business Drivers for IPv6 John King
The Internet–Illustrated Introductory, Fourth Edition
PSIRP Publish-Subscribe Internet Routing Paradigm 08-Oct /27.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
IPv4 Depletion IPv6 Adoption 3 February /8s Remaining.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Plan Introduction What is Cloud Computing?
Internet Addressing. When your computer is on the Internet, anything you do requires data to be transmitted and received. For example, when you visit.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Exploring the Network.
Chapter 1. Introduction. By Sanghyun Ahn, Deot. Of Computer Science and Statistics, University of Seoul A Brief Networking History §Internet – started.
IPv6 for ISP Industry Sify Technologies Ltd Somasundaram Padmanabhan Network Engineering IPv6 Awareness Workshop.
Introduction The network is the computer By Waseem Anwar Chaudhri.
Multimedia & Mobile Communications Lab.
Internet Protocol TeleVision
Critical Decisions, Myths & Lessons Learned in Networking What is important at the time may be only apparent with hindsight What seems important at the.
How would you define a computer? Computers are... Electronic devices that receives (input), processes & stores data & produces a result (output).
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Cloud Computing ENG. YOUSSEF ABDELHAKIM. Agenda :  The definitions of Cloud Computing.  Examples of Cloud Computing.  Which companies are using Cloud.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
21/1/20101 Lecture 1: The Current Internet and its Problems D.Sc. Arto Karila Helsinki Institute for Information Technology (HIIT)
Chapter 1: Explore the Network
Chapter 1: Exploring the Network
Internet Interconnection
Presentation transcript:

AK T : Publish/Subscribe Internetworking 1 Introduction Arto Karila Aalto-HIIT T – Special Course on Data Communications Software: Publish/Subscribe Internetworking

AK T : Publish/Subscribe Internetworking 2 ICT and productivity It is generally believed that increasing use of ICT is the most important single tool for increasing productivity (see e.g. OECD study “ICT and Economic Growth…”) Typically deployment of ICT has increased productivity by 10 to 20 %, especially when processed have been revised at the same time With mobile solutions even 40% increases have been achieved Experience from developing countries shows that ICT can boost productivity there at least as much as in developed countries We are still probably utilizing less than 10% of the opportunities of ICT

AK T : Publish/Subscribe Internetworking 3 Opportunities of ICT… ICT can be utilized a lot more in all areas of life: Public sector: –Health and elderly care –Education –All public services –True openness and direct participation Enterprises: –Logistics, ERP, CRM, groupware, … –Mobile access to business-critical systems –Networking with partners, customers, and others –Integration of voice and video

AK T : Publish/Subscribe Internetworking 4 … Opportunities of ICT Private life: –Social media –Entertainment (TV, music, gaming etc.) –Secure and mobile access to public and private services: Health, social services, taxes etc. Education Banking etc. All this requires a lot from the underlying network!

AK T : Publish/Subscribe Internetworking 5 Computer networking Computer networking was developed for mainframes (on the left ENIAC and on the right IBM S/360) Sharing devices: computers, mass memory, printers etc. which have addresses Traffic is point-to-point between two devices or network interfaces The old paradigm still lives even though the world around has completely changed Something has to be done about this Picture source: IDG News Service

AK T : Publish/Subscribe Internetworking 6 History of the Internet… 1957:Advanced Research Projects Agency (ARPA) was founded after the launch of the Soviet satellite Sputnik 1968:ARPA started the development of the ARPANET 1969:The first four nodes of the ARPANET were connected (the first message: ”lo”) 1974:Robert Kahn and Vinton Cerf defined the basic Internet architecture (TCP/IP) 1975:DARPA started the development of Internet technology 1983:On 1/1/1983 the ARPANET was converted to TCP/IP BSD 4.2 had TCP/IP protocol stack 1988:FUNET joined the Internet

AK T : Publish/Subscribe Internetworking 7 … History of the Internet 1989:Telecom Finland published DataNet BGP-1 was defined 1990:NSFNET was founded 1991:The first World Wide Web (WWW) client Mosaic was published at CERN 1993:CIDR and BGP-4 were adopted 1990’s:The Internet secured its position as the leading network architecture 2000:The number of Internet hosts exceeded 100,000, :The number of Internet hosts is approaching 1 billion (1000,000,000)

AK T : Publish/Subscribe Internetworking 8 Growth of the Internet

AK T : Publish/Subscribe Internetworking 9 Problems with the current Internet Over the past 30 years, several major changes have been made to the Internet – always at the last moment Internet’s success is largely based on its ability to adapt to the changing requirements With these changes, the end-to-end principle is already destroyed by middle-boxes (NAT and firewalls) We have reached a point, where the Internet is ossified and new transport protocols are virtually impossible The Internet should be able to accommodate a wider range of tussles We need a clear separation of the naming space and network functions The Internet is working on the terms of the sender

AK T : Publish/Subscribe Internetworking 10 Why the Internet only just works See: Why the Internet only just works, M. Handley, BT Technology Journal, Vol 24 No 3, July 2006 Throughout its life, the Internet has only just worked and all of the major changes have been made at the last possible time CIDR and NAT were introduced because of the exhaustion of the IPv4 address space These were supposed to be temporary solutions, waiting for IPv6 to break through, but they have become permanent At the same time firewalls proliferated The end-to-end principle of the Internet no longer works because of the middle boxes (firewalls and NAT) This has lead to it being virtually impossible to make any changes to the transport layer (TCP/UDP)

AK T : Publish/Subscribe Internetworking 11 Ossification of the Internet We have ended up in a vicious circle: –Developers cannot use a new protocol because it cannot traverse firewalls and NAT –It is not worth while for the developers of firewalls and NAT to change the middle boxes because there are no users of new transport protocols No major changes have been made to the core protocols of the Internet since 1993 The core protocols of the Internet are ossified while the needs have developed significantly Innovation in the Internet is withering

AK T : Publish/Subscribe Internetworking 12 Security and Trust Junk mail (Spam) and other types of unsolicited traffic are growing problems There still are no effective defense strategies against Distributed Denial of Service (DDoS) attacks Worms, viruses, Trojan horses, spyware, and other malware is spreading fast throughout the Internet Phishing is a growing problem The Internet was developed for a community where everybody was assumed trustworthy – now trust in the Internet has eroded Now that the Internet is used by everybody, we need to enable communication between distrusting parties We need mechanisms by which people and companies can build and evaluate trust Combining privacy and reputation is challenging

AK T : Publish/Subscribe Internetworking 13 Some challenges of the Internet Among the well understood requirements for the Internet are the following: –Multicast –Mobility –Multi-homing –Security –Quality of Service (QoS) –Ability to handle massive video (including IPTV) –Scalability to future needs (Network of Things etc.) Solutions to many of the needs listed above have been developed but not widely deployed Operators don’t have incentives to bring new features to the market because they are only useful if they are interoperable with other operators, in which case they give no competitive advantage

AK T : Publish/Subscribe Internetworking 14 IPv6 IPv6 was defined in 1995 and expected to spread fast It is still hardly used in Western countries The main improvement of IPv6 is moving from 32-bit to 128-bit addresses IPv6 was defined at a time when nobody could foresee all of the uses and needs of the Internet that we have now CIDR and NAT have eased the shortage of IPv4 addresses but now they are really running out The transition to IPv6 will be a long one and it won’t solve most of the problems

AK T : Publish/Subscribe Internetworking 15 Expensive transit The current inter-operator routing protocol BGP-4 does not fulfill modern requirements but there is no successor to it in sight Tier-1 operators (AT&T, MCI, Sprint, C&W etc.) are a group of about a dozen global operators with mutual peering agreements Tier-1 operators don’t pay for transit while others pay to them (tier-2 operators directly and others indirectly) In Practice they form a cartel, which wants to cement the market and is not advocating development

AK T : Publish/Subscribe Internetworking 16 Storage vs. Transit Price Source: Dr. Pekka Nikander

AK T : Publish/Subscribe Internetworking 17 Microeconomics Over the past decade, microeconomics have grown in importance We need economic mechanisms that encourage people to do good for the community The Internet was developed with public funds for research and education without any commercial considerations If we want to inject resources into the network, it must be possible for the party paying for them to also receive (some of) the revenues We need to create ways for companies and people to improve their own economies by doing things beneficial for the community

AK T : Publish/Subscribe Internetworking 18 Users – Applications – Data Users, applications and data are involved in computing All three are becoming increasingly mobile The network has to bring these three together in a reliable, secure and efficient way Network Users Appl. Data

AK T : Publish/Subscribe Internetworking 19 Clouds and Grids Applications are increasingly run in cloud and grid environments Cloud computing was created to cut down the cost and increase the flexibility of computing In a cloud, dynamically scalable and often virtualized ICT resources are offered as services over the Internet Google started packing cheap off-the-shelf computers and DC UPS’s into containers and placing them every- where, cutting the cost of data centers by a factor of 10 While clouds still are based on computing centers, grids can run in millions of PCs With ever more powerful portable devices and the proliferation of mobile data, also grids will be increasingly mobile

AK T : Publish/Subscribe Internetworking 20 Scalability The Internet has already scaled to a level that was unconceivable to its original developers However, new trends will raise the scalability requirement of the Internet to a much higher level: –Proliferation of video (YouTube, IPTV etc.) –Ubiquitous computing (ubicomp) –Sensor networks –Internet of things The amount of video traffic is growing rapidly in wireline and wireless networks We have to be ready for dozens and hundreds of billions of nodes in the network in the near future The capacities and abilities of nodes will vary highly

AK T : Publish/Subscribe Internetworking 21 About applications Most applications are still generic in nature and basically the same as in the 1980’s (e.g. office suites) On the other hand, ERP systems (such as SAP) tend to cement the existing flawed processes We should be developing applications that directly support work flows thereby increasing productivity With modern tools (e.g. AJAX and QT) and methods (e.g. agile programming) we should be able to cut down the development time and cost by a factor of 10 Middleware is getting standardized and applications becoming component-based, easing integration Applications are dealing with information, which is structured and linked

AK T : Publish/Subscribe Internetworking 22 Requirements The network has to meet the needs of the applications of today and the future: –Mobility of users, data and computation –Scalability up to hundreds of billions of nodes –Efficient handling of video –In-built security, including protection against SPAM and DoS attacks We are interested in information content – not who is storing it and where Network has to support access to and processing of large amounts of hierarchically organized information There needs to be a simple, powerful and efficient API for accessing the services of the network – the API could be generic and run on different networks

AK T : Publish/Subscribe Internetworking 23 Conclusions There is a growing consensus among researchers of internetworking that a fundamental reform is needed We need to be able to name and address information rather than hosts or interfaces We need mechanisms for structuring information and limiting its visibility We need to have a way to store information graphs in the network and retrieve and process them in an efficient way, not caring about their whereabouts Information Centric Networking (ICN) and, more specifically, the Publish/Subscribe (pub/sub) paradigm seem to offer solutions to our needs PSIRP/PURSUIT is an attempt to that direction