Virtualization Group FIND Meeting. Does Virtualization aid Security? Depends what you build on top –Were only providing mechanisms, not solutions Better:

Slides:



Advertisements
Similar presentations
-Grids and the OptIPuter Software Architecture Andrew A. Chien Director, Center for Networked Systems SAIC Chair Professor, Computer Science and Engineering.
Advertisements

Welcome to the Radionet Monitoring Secure-Com Presentation.
INTRODUCTION TO NETWORK VIRTUALIZATION Mosharaf Chowdhury Member, eNVy Project Wednesday, May 14, 2008 University of Waterloo - eNVy 1.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
COS 461 Fall 1997 Networks and Protocols u networks and protocols –definitions –motivation –history u protocol hierarchy –reasons for layering –quick tour.
Grant agreement n° SDN architectures for orchestration of mobile cloud services with converged control of wireless access and optical transport network.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
ToNC workshop Next generation architecture H. Balakrishnan, A. Goel, D. Johnson, S. Muthukrishnan, S.Tekinay, T. Wolf DAY 2, Feb
Network Rspecs in PlanetLab and VINI Andy Bavier PL Developer's Meeting May 13-14, 2008.
Why Wireless? The answer is simple: Reach users who are often on the move!
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Secure Cloud Computing with Virtualized Network Infrastructure HotCloud 10 By Xuanran Zong.
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
A Study in NoSQL & Distributed Database Systems John Hawkins.
Is Lambda Switching Likely for Applications? Tom Lehman USC/Information Sciences Institute December 2001.
Morteza Yousefi University of Science & Technology of Mazandaran Network Virtualization 1 of 22 Network Virtualization.
Hosting Virtual Networks on Commodity Hardware VINI Summer Camp.
FIND experimental requirements David D. Clark. FIND Future Internet Design (FIND) is an NSF program (now folded in to NetSE) to envision the Internet.
Chapter 3 : Distributed Data Processing Business Data Communications, 4e.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Resource Representations in GENI: A path forward Ilia Baldine, Yufeng Xin Renaissance Computing Institute,
Application Policy on Network Functions (APONF) G. Karagiannis and T.Tsou 1.
Introduction of CRON Lin Xue Feb What is CRON “cron.cct.lsu.edu” testbed project is based on the Emulab system in the University of Utah. Emulab:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Operating Systems Networking for Home and Small Businesses – Chapter.
Optical Edge / Access Networks for GENI Lokesh Mandvekar Dr. Chunming Qiao (PI)‏ Department of Computer Science.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Distributed Computing Systems CSCI 4780/6780. Geographical Scalability Challenges Synchronous communication –Waiting for a reply does not scale well!!
1 Testbeds Breakout Tom Anderson Jeff Chase Doug Comer Brett Fleisch Frans Kaashoek Jay Lepreau Hank Levy Larry Peterson Mothy Roscoe Mehul Shah Ion Stoica.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
CS533 - Concepts of Operating Systems 1 The Mach System Presented by Catherine Vilhauer.
An introduction to oneM2M
Networks and topology  Lesson Objective: Understand the main terminology about networks.  Learning Outcome: Understand the different types of network.
Group 3 Characterization of Wireless: Network layer and above.
Virtualization as Architecture - GENI CSC/ECE 573, Sections 001, 002 Fall, 2012 Some slides from Harry Mussman, GPO.
1 Application layer QoS Don Towsley Univ. Massachusetts.
Service Composition: Breakout Session Summary Randy Katz David Culler Summary: Bhaskaran Raman.
1 WRB 09/02 HPEC Lincoln Lab Sept 2002 Poster B: Software Technologies andSystems W. Robert Bernecky Naval Undersea Warfare Center Ph: (401) Fax:
2/18/2016Fatimah AlAkeel - Network 11 Introduction to Networks.
Characteristics of Scaleable Internetworks
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
CEG 2400 FALL 2012 Windows Servers Network Operating Systems.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Data Centers and Cloud Computing 1. 2 Data Centers 3.
WHAT IS SO SPECIAL? Wireless Router Analogue Telephone Adaptor + SMCWTVG.
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
SDN/NFV DDoS Requirements "The Mobile Use Case – 5G" Bipin Mistry, VP Product Management © 2015 Corero
An Engineering Perspective on the Layered and End-to-End Approaches Christopher S. Yoo University of Pennsylvania Law School May 6, 2010.
Network Virtualization Ben Pfaff Nicira Networks, Inc.
Breaking Up is Hard to Do
Juniper Software-Defined Secure Network
Atsushi Iwata, Takashi Egawa System Platforms Research Laboratories
Open Source distributed document DB for an enterprise
with distributed anchor routers
What is meant by a router? A Router is a small electronic and hardware device that joins multiple computer networks to via a wire and wireless.It is designed.
Introduction to Networks
CPE 401 / 601 Computer Network Systems
Introduction to Networks
Computer software.
Introduction to Networks
Microsoft Virtual Academy
An introduction to oneM2M
Partition Starter Find out what disk partitioning is, state key features, find a diagram and give an example.
Network Architecture By Dr. Shadi Masadeh 1.
Introduction 陳韋志 台中人 彰化師大資管系 電玩 單車 影集 任維廉老師實驗室.
Introduction to Networks
Next-generation Internet architecture
Introduction to Networks
Q1/13 - NGN Initial Considerations
Presentation transcript:

Virtualization Group FIND Meeting

Does Virtualization aid Security? Depends what you build on top –Were only providing mechanisms, not solutions Better: –Some level of isolation –Control set of users –Better defaults, reduce exposed vulnerabilities –Baked-in forensic capability; liability determination Worse: –Lots of vulnerabilities in optics –Unclear what the TCB is---finger pointing –Amplifies attack power based on hierarchy –Complex auditing task (many layers to demux) Tomography; mapping topologies frustrating Upgrading versions across multiple partitions

Do Sensors need Virtualization? Just build metanetwork specialized to sensors Useful for wireless sensor networks? –Same arguments apply as regular IP –Yes for GENI; not operationally? Interface between wireless/wired –Rich specification for optical network setup –Depends on how fast the setup/teardown needs –May hide changes in physical topology--e.g., delay

Suitability for Tomorrow Increasingly programmable components –Virtualization is a nice way to harness –Need to share? Enough to hand out individually? –Hard to envision technology cost being a constraint; increasingly less important Speeds surpass ability to source/sink –Need to divide; different interfaces (SAN, etc.) Isolation –Is it an economic issue or a technical one –Horizontal vs. vertical markets –Cloud-based services; distributed management

Active Networks? –What does it mean to do things in the network –Does topology matter? It does for data synthesis Maybe for location based services But BW is free, so we can tunnel things lots of places pretty darn easily –Is a middlebox core or edge? –Active network struggle all over again?