Information Services, Topology and Discovery Working Group IS-WG Winter Joint Techs February 1 st, 2010.

Slides:



Advertisements
Similar presentations
DC8 Registries Breakout. Goals of the session Discuss and clarify : Requirements for registry Framework for policy Relate issues raised to EOR prototype.
Advertisements

Registry breakout group DC-8, National Library of Canada 5 October 2000.
Circuit Monitoring July 16 th 2011, OGF 32: NMC-WG Jason Zurawski, Internet2 Research Liaison.
NSI wg Architecture Elements John Vollbrecht Internet2.
5/30/2012. Provides a method for finding services/data on the Exchange Network – discover data. Supports User Friendly Tools Can automatically collect.
Nigel Titley. RIPE 54, 9 May 2007, Tallinn, Estonia. 1 RIPE NCC Certification Task Force Update Presented by Nigel Titley RIPE NCC.
Internet2 Technology Update Eric Boyd Deputy Technology Officer Internet2 TIP 2008 January 21, 2008 Honolulu, HI.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Feb On*Vector Workshop Semantic Web for Hybrid Networks Dr. Paola Grosso SNE group University of Amsterdam The Netherlands.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Identity, Spheres and Privacy Rules Henning Schulzrinne (with Hannes Tschofenig and Richard Barnes) Workshop on Identity, Information and Context October.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
ESnet On-demand Secure Circuits and Advance Reservation System (OSCARS) Chin Guok Network Engineering Group Thomas Ndousse Visit February Energy.
Ietf-65 draft-kulmala-l3vpn-interas-option-d-02.txt ASBR VRF Context for BGP/MPLS IP VPN IETF-65 draft-kulmala-l3vpn-interas-option-d-02.txt Marko Kulmala.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
Routing and Routing Protocols Dynamic Routing Overview.
THE GITB TESTING FRAMEWORK Jacques Durand, Fujitsu America | December 1, 2011 GITB |
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
PerfSONAR Architecture: Design, Usage, Extension and Next Steps Presented by Prof. Martin Swany University of Delaware / Internet2 05 August, th.
PerfSONAR Information Services Update Jason Zurawski Feb 2, 2009 Winter Joint Techs 2009, College Station Texas.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIIS and Its Higher Layer Transport Requirements: Ad hoc Update and Discussion on.
Connecting for Health: Common Framework. 2 What is Connecting for Health? Broad-based, public-private coalition More than 100 collaborators –Providers.
Internet2 Performance Update Jeff W. Boote Senior Network Software Engineer Internet2.
PerfSONAR Information Discovery February 11 th 2010, APAN 29 – perfSONAR Workshop Jeff Boote, Assistant Director R&D.
InterDomain Dynamic Circuit Network Demo Joint Techs - Hawaii Jan 2008 John Vollbrecht, Internet2
Improving pS-PS Service Architecture , perfSONAR-PS Developers Meeting Aaron Brown, Andrew Lake, Eric Pouyoul.
OGF DMNR BoF Dynamic Management of Network Resources Documents available at: Guy Roberts, John Vollbrecht.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
CLRC and the European DataGrid Middleware Information and Monitoring Services The current information service is built on the hierarchical database OpenLDAP.
Joint Information Systems Committee Supporting Higher and Further Education Rachel Bruce Programme Manager, JISC Executive Collection.
Omniran CF00 1 OmniRAN R3 Considerations Date: Authors: NameAffiliationPhone Max RiegelNSN
Cyberinfrastructure What is it? Russ Hobby Internet2 Joint Techs, 18 July 2007.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Network Schemata Martin Swany. Perspective UNIS – Uniform Network Information Schema –Unification of perfSONAR Lookup Service (LS) and Topology Service.
Cole David Ronnie Julio. Introduction Globus is A community of users and developers who collaborate on the use and development of open source software,
Information Services, Topology and Discovery Working Group IS-WG Spring Member Meeting April 28th, 2009.
WG2 – Enabling Technologies Status of white paper Olaf Droegehorn, Klaus David University of Kassel Chair for Communication Technology (ComTec)
© 2006 Open Grid Forum Network Monitoring and Usage Introduction to OGF Standards.
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
LAMP: Leveraging and Abstracting Measurements with perfSONAR Guilherme Fernandes
DetNet WG 1 ST Meeting Chairs: Lou Berger Pat Thaler Secretary: Jouni Korhonen.
January 16 GGF14 NMWG Chicago (June 05) Jeff Boote – Internet2 Eric Boyd - Internet2.
Dynamic Circuit Network An Introduction John Vollbrecht, Internet2 May 26, 2008.
6 February 2004 Internet2 Priorities 2004 Internet2 Industry Strategy Council Douglas Van Houweling.
IT Infrastructure Planning Committee Service Model Task Service Layer Entity Service Layer Utility Service Layer Logical service abstraction layers categorize.
UNCLASSIFIED Service Oriented Architecture, Information Sharing and the FEA DRM 23 January 2006 Bryan Aucoin DNI CIO Chief Architect
Java Programming: Advanced Topics 1 Enterprise JavaBeans Chapter 14.
PerfSONAR-PS Working Group Aaron Brown/Jason Zurawski January 21, 2008 TIP 2008 – Honolulu, HI.
DICE: Authorizing Dynamic Networks for VOs Jeff W. Boote Senior Network Software Engineer, Internet2 Cándido Rodríguez Montes RedIRIS TNC2009 Malaga, Spain.
Internet2 Strategic Directions October Fundamental Questions  What does higher education (and the rest of the world) require from the Internet.
Federated Wireless Network Authentication Kevin Miller Duke University Internet2 Joint Techs Salt Lake City February, 2005.
HLS Overview Jason Zurawski perfSONAR-PS Developer Meeting April 30, 2009.
22-Mar-2005 Internet2 Performance Architecture & Technologies Update Jeff W. Boote.
Circuit Monitoring , perfSONAR-PS Developers Meeting Aaron Brown, Ezra Kissel.
PiPEfitters Salt Lake City Jt Techs (Feb 05) Jeff Boote - Internet2.
ISWG / SIF / GEOSS OOSSIW - November, 2008 GEOSS “Interoperability” Steven F. Browdy (ISWG, SIF, SCC)
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
SPEERMINT Architecture - Reinaldo Penno Juniper Networks SPEERMINT, IETF 70 Vancouver, Canada 2 December 2007.
DetNet WG Chairs: Lou Berger Pat Thaler Secretary: Jouni Korhonen
1 Deploying Measurement Systems in ESnet Joint Techs, Feb Joseph Metzger ESnet Engineering Group Lawrence Berkeley National Laboratory.
Anima IETF 93 draft-pritikin-anima-bootstrapping- keyinfra-02 Design Team Update.
PerfSONAR Schema and Topology Martin Swany. Schema Key Goals: Extensibility, Normalization, Readability Break representation of performance measurements.
GÉANT Multi-Domain Bandwidth-on-Demand Service
InterDomain Dynamic Circuit Network Demo
NSI wg Architecture Elements
Grid Metadata Management
A distributed spectrum monitoring system
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

Information Services, Topology and Discovery Working Group IS-WG Winter Joint Techs February 1 st, 2010

Agenda WG Purpose Current Status and Deployment Use-case review Topology Document IS Architecture – IP Summarization – Query models – Database technology – Trust models

WG Purpose Various network services use a common "Information Services plane" that allows users to discover network topology and the location and capabilities of network services within that topology. As global federation of network services occurs, the standardization and flexibility of the network-centric Information Services becomes even more critical Currently, the same infrastructure is used by – DCN/ION – perfSONAR – Phoebus data movement service In order to help catalyze and focus the development of these common information services, the Internet2 Network Advisory Committee (NTAC) has commissioned the creation of this working group The group will work to – further define the role and functionality of Information Services – drive design and development – Interface with standards and community organizations (IETF, OGF, GLIF)

Ongoing Tasks Discuss and “publish” topology schema document – Consistent with DCN 0.5+ and perfSONAR-PS 3.1 – Identifying differences – Formalize terminology

Current Status As part of perfSONAR, we have defined a common IS for network services What are the requirements? – Represent services with network context We have a topology schema that helps address this

Deployment

Use cases Control Plane – Host discovery – Service discovery – Pathfinding Performance Measurement – Archived data discovery – Measurement point discovery Network topology abstractions – “What is close?” – This includes proximity to the querier, proximity to a path, proximity to another resource

Use cases Control Plane – Host discovery – Service discovery – Pathfinding Performance Measurement – Archived data discovery – Measurement point discovery Network topology abstractions – “What is close?” – This includes proximity to the querier, proximity to a path, proximity to another resource

IP Summarization

IP Summarization Status Ongoing work on the algorithm Tension between “close” summarization and broad summarizations Can we augment the IS model with CIDR-style queries – Longest match – All matches – Exact maches ps/wiki/IPSummarization

Discussion: Trust Topology elements and services are registered at the edges What is the trust model? What is necessary?

Trust Issues Hypothesis: Information is more valuable if it is signed by whomever registers it – “Who says?” We might add “Authority” to Authentication, Authorization If topology is signed, how can it be validated? Is a chain of agents sufficient?

Authority topo