1 sahara/i 3 first summer retreat 10-12 june 2002 randy h. katz, anthony joseph, ion stoica computer...
Post on 18-Dec-2015
216 Views
Preview:
TRANSCRIPT
1
SAHARA/I3 First Summer Retreat
10-12 June 2002
Randy H. Katz, Anthony Joseph, Ion StoicaComputer Science Division
Electrical Engineering and Computer Science DepartmentUniversity of California, Berkeley
Berkeley, CA 94720-1776
2
Retreat Goals &Technology Transfer
UC Berkeley Project Team Industrial CollaboratorsFriends
PeopleProject Status
Work in ProgressPrototype Technology
Early Access to TechnologyPromising Directions
Reality CheckFeedback
3
Who is Here (Industry)• AT&T Research
– Yatin Chawathe
• CMU– Hui Zhang
• Ericsson Research– Per Johansson (VIF)– Martin Korling
• Hewlett-Packard Labs– John Apostolopoulos– Wai-Tian Dan Tan
• Intel Research– Timothy Roscoe
• Keynote Systems– Chris Overton
• Microsoft Research– Venkat Padmanabhan– Lili Qui– Helen Wang
• Nokia– Hannu Flinck
• Nortel Networks– Tal Lavian (PhD student)
• NTTDoCoMo– Takashi Suzuki (VIF)– Gang Wu
• Sprint ATL– Bryan Lyles– Paul Jardetzky
• UC Davis– Chen-nee Chuah– Dipak Ghosal
• Univ. Helsinki– Kimmo Raatikainen
• Univ. Washington– Tom Anderson
• Other Affiliation– Peter Danzig
Italics indicates Ph.D. from BerkeleyVIF=Visiting Industrial Fellow
4
Who is Here (Berkeley)• Professors
– Anthony Joseph– Randy Katz– Ion Stoica– Doug Tygar
• Postdocs– Kevin Lai
• Technical & Admin Staff
– Nathan Berneman– Bob Miller– Keith Sklower
• Grad Students– Sharad Agarwal– Matt Caesar– Weidong Cui– Steve Czerwinski
• Grad Students– Yitao Duan– Ling Huang– Almadena Konrad– Karthik Lakshminarayanan– Yin Li– Huang Ling– Sridhar Machiraju– George Porter– Bhaskar Raman– Anantha Rajagoplala-Rao– Mukund Seshadri– Jimmy Shih– Lakshmi Subramanian– Ben Zhao– Shelley Zhuang
5
Retreat Purpose• Second SAHARA retreat
– Project launched 1 July 2001– Review progress, set directions, particularly in terms of
integrating the diverse efforts underway
• “Generation after next” networks– Software “agents,” not protocols– Converged data and telecommunications networks– Heterogeneous access plus core networks
• Emerging network-aware distributed architecture– Confederation vs. brokering in service provisioning– Exploiting network structure-awareness– Four layer “reference” architecture
• Industrial feedback and directions– Real-world networking problems/limitations– Helping us do relevant research at Internet-scale
6
Plan for the Retreat
• Monday, 10 June 2002– 1200-1315 Lunch– 1315-1500 Retreat Overview and Introductions (Randy)
» Retreat Overview & Sahara Progress, Randy Katz» Research on Adaptive Systems, Anthony Joseph» I3 Overview, Ion Stoica
– 1500-1530 Break– 1530-1700 Routing as a Cross-Domain Service (Randy)
» Ion Student: Multicast on I3» Mukund: Interdomain Multicast» Sharad: Policy Agent for Interdomain Routing» Lakshmi: Overlay QoS
– 1700-1730 View from a Tier-1 ISP (Chen-nee)– 1730-1800 Break– 1800-1915 Dinner (Joint with ROC Retreat)– 1915-2015 Alfred Spector, IBM (Joint with ROC Retreat)– 2015-2100 Student Poster Session
7
Plan for the Retreat• Tuesday, 11 June 2002
– 0730-0830 Breakfast– 0830-1000 Joint I3/Tapestry Session (Kubi/Ion)
» Services on Infrastructure, Kubi/Ion» Mobility on I3, Shelley/Kevin» Mobility on Tapestry, Ben
– 1000-1030 Break– 1030-1200 Adaptation and Applications (Anthony)
» Modeling/Analysis of Non-Stationary Net Characteristics, Almudena» Always Best Connected, Machi» VoIP Gateway Selection, Matt
– 1200-1300 Lunch– 1300-1600 Long Break– 1600-1800 SAHARA Architecture and Brainstorming Session (Randy)
» Four Layer Architecture, Bhaskar » Hot Spot WLAN Testbed for Sahara Integration, Jimmy
– 1800-1915 Dinner (Joint with ROC Retreat)– 1915-2000 Panel on Robust Manageable Distributed Systems– 2000-2130 Second Graduate Student Poster Session
8
Plan for the Retreat
• Wednesday, 12 June 2002– 0730-0830 Breakfast– 0830-1000 Six Month Planning (Anthony)– 1000-1030 Break/Room Checkout/Photo Session– 1030-1200 Industrial Feedback (Randy)– 1200-1300 Lunch– 1300-1700 Bus back to Berkeley
9
SAHARA: 2001-2003
• Service• Architecture for• Heterogeneous• Access,• Resources, and• Applications
10
Sprint
UserSalt Lake
City
Scenario: ServiceComposition
JAL
BabblefishTranslator
Zagat Guide
UI
User
NTTDoCoMo
RestaurantGuide Service
Tokyo
11
Sahara Research Themes
• New mechanisms, techniques for end-to-end services w/ desirable, predictable, enforceable properties spanning potentially distrusting service providers– Architecture for service composition & inter-operation across
separate admin domains, supporting peering & brokering, and diverse business, value-exchange, access-control models
– Functional elements» Service discovery» Service-level agreements» Service composition under constraints» Redirection to a service instance» Performance measurement infrastructure» Constraints based on performance, access control,
accounting/billing/settlements» Service modeling and verification
12
AccessNetworks
Core Networks
Connectivity and Processing
Transit Net
Transit Net
Transit Net
PrivatePeering
NAP
PublicPeering
InternetDatacenter
PSTNRegional
WirelineRegionalVoiceVoice
CellCell
Cell
CableModem
LAN
LAN
LAN
Premises-based
WLAN
WLAN
WLAN
Premises-based
Operator-based
H.323Data
Data
RAS
Analog
DSLAM
H.323
13
Service
Negotiation & control path
Service Composition Models
Service Service
Data flow
Cooperative
BrokeredNegotiation & control path
Broker
Service ServiceService
Data flow
14
Layered Reference Model for Service Composition
IP Network
Enhanced Links
Enhanced Paths
End-to-End NetworkWith Desirable Properties
Middleware Services
Applications Services
End-User Applications
Connect
ivit
yPla
ne
Applic
ati
on
Pla
ne
Serv
ice
Com
posi
tion
15
Layered Reference Modelfor Service Composition
Services at Layer i-1Services at Layer i-1Services at Layer i-1
Services at Layer i-1Other Servicesat Layer iComponent Services
Composed Service at Layer i
PolicyManagement
Dynamic ResourceAllocation
InteroperabiltyMeasurement-based
Adaptation
Trust Management/Verification
UnderlyingCompositionTechniques
16
Mechanisms for Service Composition
• Measurement-based Adaptation– Examples
» General-purpose third party end-to-end Internet host distance monitoring and estimation service
» Universal In-box: Application-specific middleware measurement layer to exchange network and server load using link-state algorithm
» Content Distribution Networks: measurement-based DNS-based server selection to redirect client to closest service instance
17
Mechanisms for Service Composition
• Utility-based Resource Allocation Mechanisms– Examples
» Auctions to dynamically allocate resources; applied for spectrum/bandwidth resource assignments to MVNO from underlying competiting MNOs
» Congestion pricing: influence user behavior to better utilize scarce resources; applied in:
• Voice port allocation to user-initiated calls in H.323 gateway/Voice over IP service management
• Wireless LAN bandwidth allocation and management• H.323 gateway selection, redirection, and load balancing for Voice over
IP services
18
Mechanisms for Service Composition
• Trust Mgmt/Verification of Service & Usage– Authentication, Authorization, Accounting Services
» Authorization control scheme w/ credential transformations to enable cross-domain service invocation
» Federated admin domains with credential transformation rules based on established peering agreements
» AAA server makes authorization decisions, liberating providers from preparing rules for each affiliated domain
– Service Level Agreement Verification» Verification and usage monitoring to ensure properties
specified in SLA are being honored» Border routers monitoring control traffic from different
providers to detect malicious route advertisements
19
Mechanisms for Service Composition
• Policy Management– Visibility into local policies to better coordinate global
policies among (cooperating) service providers– Developing inter-AS architecture for load balancing,
performance and failure mode policies to be applied throughout the network
» Internet topology discovery through AS relationship map of the Internet plus measurement infrastructure
» Policy agent framework for inter-AS negotiation to manage incoming traffic
20
Mechanisms for Service Composition
• Interoperability through Transformation– Interoperability of data, protocols, policies among
composed service providers– Example
» Broadcast federation: global multicast service composed from multicast implementations in different provider domains
» Protocol transformation gateways between admin domains employing non-interoperable multicast protocol implementations
21
Summary and Conclusions
• Goal: Evolve (mobile) Internet architecture to better support multi-network/multi-service provider model– Dynamic environment, location-based implies larger numbers
of service providers & service instances
• Status: architectural specification driven by selected applications and underlying wide-area services
• Focus: – Composition across confederated vs. independent service
providers: peer-to-peer vs. brokering– Explore new techniques/technologies:
» Market-based mechanisms» Trust management, SLA verification, perf. monitoring
top related