TNA Mobility II By Henry N Jerez. TNA Principles Persistent Identification of all:  Network Components  Services  Users Functionality Abstraction 

Slides:



Advertisements
Similar presentations
Transient Network Architecture Joud Khoury University of New Mexico, ECE department CNRI Handle System Workshop, Washington.
Advertisements

SHELL Hub and ioAgents. Hub and IO Agents SHELL HUB SCR SR VLE MIS PDP SR VLE PDP = IO Agent.
Secure Mobile IP Communication
INTRODUCTION WIRELESS TECHNOLOGY BECOMING HOTTER WIRELESS TECHNOLOGY BECOMING HOTTER TRANSITION TOWARDS MOBILITY OVER PAST 20 YEARS TRANSITION TOWARDS.
Why do current IP semantics cause scaling issues? −Today, “addressing follows topology,” which limits route aggregation compactness −Overloaded IP address.
6.033: Intro to Computer Networks Layering & Routing Dina Katabi & Sam Madden Some slides are contributed by N. McKewon, J. Rexford, I. Stoica.
P. Bellavista, A. Corradi, C. Stefanelli - ISADS'99 - Tokyo, 22 March A Secure and Open Mobile Agent (SOMA) Programming Environment Paolo Bellavista,
Project Byzantium Networking for the Zombie Apocalypse.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Arsitektur Jaringan Terkini
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
1 GENI: Global Environment for Network Innovations Jennifer Rexford On behalf of Allison Mankin (NSF)
Management of IP networks and services AIMS‘99 Workshop Heidelberg May, 1999 Dr. Stefan Covaci GMD FOKUS, Berlin Some Ideas on Management of IP Networks.
COS 420 Day 17. Agenda Assignment 4 Posted Chap Due April 6 Group project program requirements due Individual Project Graded 2 A’s and 1 B Today.
OSMOSIS Final Presentation. Introduction Osmosis System Scalable, distributed system. Many-to-many publisher-subscriber real time sensor data streams,
Mobile Agents: A Key for Effective Pervasive Computing Roberto Speicys Cardoso & Fabio Kon University of São Paulo - Brazil.
Wireless Sensor Network for Tracking the Traffic in INTERNET Network Routers Supervisor: Mark Shifrin Students: Yuriy Kipnis Nir Bar-Or Networked Software.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
DMM Framework based on Functional Elements draft-liebsch-dmm-framework-analysis-02 M. Liebsch, P. Seite, G. Karagiannis IETF88, Vancouver DMM WG 08 th.
Lecture 15 Summary Wireless Networks and Mobile Systems.
Wireless Ad Hoc VoIP Thesis by: Patrick Stuedi & Gustavo Alonso Presentation by: Anil Kumar Marukala & Syed Khaja Najmuddin Ahmed.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse 2.
BMC Software confidential. BMC Performance Manager Will Brown.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
 ====!"§==Systems= IPonAir T-Systems Nova Content Project goals Reference architecture Reference scenarios Terminology and definition Design principles.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
CSE Senior Design II Overview: Software System Architecture Software System Test Mike O’Dell Based on an earlier presentation by Bill Farrior, UTA, modified.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 Cisco Learning Credits A Solid Business Value Proposition.
Network Administration. What is a Systems Administrator?  Person responsible for:  Setting up servers  Configuring the environment for web and other.
Ch 13. Wireless Management and Support Myungchul Kim
Sponsored by the National Science Foundation Research & Experiments on GENI GENI CC-NIE Workshop NSF Mark Berman, Mike Zink January 7,
XIP™ – the eXtensible Imaging Platform A rapid application development and deployment platform Lawrence Tarbox, Ph.D. September, 2010.
15/06/1999HP OVUA Workshop - Bologna - Italy1 An Integrated Environment for the Management of Network Resources and Services Paolo Bellavista, Antonio.
FIRE – GENI collaboration workshop Sep 2015 Washington.
Margherita Forcolin (Insiel S.p.A.) Thessaloniki, 13 October 2011.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 / Name / Date IDA Interface for Distributed Automation The journey toward Distributed Intelligence.
Hierarchical Network Design – a Review 1 RD-CSY3021.
HP Overview. HP Overview is a family of integrated network and system management solution for managing the complete IT enterprises, including networks,
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
October 7, 1999Reactive Sensor Network1 Workshop - RSN Update Richard R. Brooks Head Distributed Intelligent Systems Dept. Applied Research Laboratory.
Module 5: Designing Security for Internal Networks.
Introduction to Active Network Technology Bernhard Plattner Computer Engineering and Networks Laboratory ETH Zurich, Switzerland.
Cloud Strategy made Simple David G. Fletcher. 2 Hybrid Cloud Approach Utah is building a private cloud to provision services from its virtualized infrastructure.
Olga Ratsimor Vladimir Korolev Anupam Joshi Timothy Finin Department of Computer Science and Electrical Engineering University of Maryland Baltimore County.
Panther Media for Large Scale Development Network Architecture.
The DIFFERENCE Consortium DIFFERENCE Evolution of Telecom Management Systems.
Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most.
Ad Hoc VO Akylbek Zhumabayev Images. Node Discovery vs. Registration VO Node Resource User discover register Resource.
PI2134 Software Engineering IT Telkom.  Layered technology  Software Process  Generic Process (by Pressman)  Fundamental activities (by Sommerville)
© 2015 Pittsburgh Supercomputing Center Opening the Black Box Using Web10G to Uncover the Hidden Side of TCP CC PI Meeting Austin, TX September 29, 2015.
Cloud-based e-science drivers for ESAs Sentinel Collaborative Ground Segment Kostas Koumandaros Greek Research & Technology Network Open Science retreat.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
MIT Lincoln Laboratory Dynamic Declarative Networking Exploiting Declarative Knowledge To Enable Energy Efficient Collaborative Sensing Daniel J. Van Hook.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
MUHAMAD SHAZNI BIN MOHAMMAD SHAH. Gateway Using different protocols for interfacing network by network nodes Contain device such as protocol translator,
COM594: Mobile Technologies Location-Identifier Separation.
Lecture 14 Mobile IP. Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile.
1 IPv6 and Mobile IPv6 For Mobile Networks Hesham Soliman Director, Elevate Technologies Octorber 2012.
Routing and Addressing in Next-Generation EnteRprises (RANGER)
Issues need harmonization
ANTS Goals Today’s networks lack flexibility …
Extending MPLS/BGP VPNs to End-Systems
Other Routing Protocols
High Interest Subject: Internet Protocol Over Wireless
Calypso Service Architecture
Mobile Networking Through Mobile IP
Presentation transcript:

TNA Mobility II By Henry N Jerez

TNA Principles Persistent Identification of all:  Network Components  Services  Users Functionality Abstraction  Generic Host components: GHOSTs  Service Host providers: Shells Mobility built into the core via Ad-hoc network conformation and consolidation Principles

TNA Environment

TNA Persistent Identification Evolution of the Handle System Currently deployed identification tools:  Deployed at the Kernel Level Ghost Identifiers,Shell Identifiers, User Identifiers Service Identifiers (In progress) Services at the kernel level  PI based routing  PI to MCL, AWDS and IP mapping  Naming translation Service

Persistent Identification PI Efforts Ongoing Work on Distributed resolution services. First Application Implementation benefits measured. Very Encouraging Results PI node revolvers and routers being deployed on I2, NLR and Internet New seeder node infrastructure under development

Functionality Abstraction GHOST principles  Functionality abstraction into Business rules and execution engines  Data encapsulation and certification  Service Delegation Shell Principles  Security Service Abstraction  Built in Services: PI resolution, Naming, DRM, Congestion and Agent Control Interfaces

Functionality Abstraction SHELL evolution  First Kernel Integrated prototype and communication API modules in place  Ongoing interface, DRM and data encapsulation work Ghosts  Current GINI based Prototypes  Basic Technology Evolution  Distributed network control prototypes in place  DRM and VOIP (VOPI) applications currently deployed and under test

Ad-hoc network conformation and consolidation Area of Influence characteristics  Ad- Hoc certified conformation process  Intelligence in the network substrate  Distributed PI resolution  AoI identification and consolidation into Green Networks Service Association and mobility Basic Routing principles and Inter network routing

AoI Progress First conformation protocols formally characterized Generic network conformation and negotiation protocol guidelines in place Modeling and optimization under way Service Distribution under optimization Advancing towards AoI Mobility