15-441: computer networking lecture 26: where do we go from here?

27
15-441: Computer Networking Lecture 26: Where do we go from here?

Upload: rodney-wells

Post on 26-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 15-441: Computer Networking Lecture 26: Where do we go from here?

15-441: Computer Networking

Lecture 26: Where do we go from here?

Page 2: 15-441: Computer Networking Lecture 26: Where do we go from here?

Overview

• Content is king

• Billions of devices

• The next billion users

• “Nothing is permanent but change”

2

Page 3: 15-441: Computer Networking Lecture 26: Where do we go from here?

Named Data Networking

• In the beginning...– First applications strictly focused on host-to-host

interprocess communication:• Remote login, file transfer, ...

– Internet was built around this host-to-host model.– Architecture is well-suited for communication between pairs

of stationary hosts.• ... while today

– Vast majority of Internet usage is data retrieval and service access.

– Users care about the content and are oblivious to location. They are often oblivious as to delivery time:• Fetching headlines from CNN, videos from YouTube, TV from Tivo• Accessing a bank account at www.bank.com.

3

Page 4: 15-441: Computer Networking Lecture 26: Where do we go from here?

To the beginning...

• What if you could re-architect the way “bulk” data transfer applications worked• HTTP• FTP• Email• etc.

• ... knowing what we know now?

4

Page 5: 15-441: Computer Networking Lecture 26: Where do we go from here?

Biggest content source

Third largest ISP

source: ‘ATLAS’ Internet Observatory 2009 Annual Report’, C. Labovitz et.al.

Level(3) GoogleGlobalCrossing

Google…

5

Page 6: 15-441: Computer Networking Lecture 26: Where do we go from here?

1995 - 2007:Textbook Internet

2009:Rise of theHyper Giants

source: ‘ATLAS’ Internet Observatory 2009 Annual Report’, C. Labovitz et.al.

6

Page 7: 15-441: Computer Networking Lecture 26: Where do we go from here?

ISP

ISP

What does the network look like…

7

Page 8: 15-441: Computer Networking Lecture 26: Where do we go from here?

ISP

ISP

What should the network look like…

8

Page 9: 15-441: Computer Networking Lecture 26: Where do we go from here?

Communication vs. Distribution

9

Page 10: 15-441: Computer Networking Lecture 26: Where do we go from here?

Overview

• Content is king

• Billions of devices

• The next billion users

• “Nothing is permanent but change”

10

Page 11: 15-441: Computer Networking Lecture 26: Where do we go from here?

11

Sensor Networks – Smart Devices

• First introduced in late 90’s by groups at UCB/UCLA/USC

• Small, resource limited devices• CPU, disk, power, bandwidth, etc.

• Simple scalar sensors – temperature, motion• Single domain of deployment

• farm, battlefield, bridge, rain forest

• for a targeted task • find the tanks, count the birds, monitor the bridge

• Ad-hoc wireless network

Page 12: 15-441: Computer Networking Lecture 26: Where do we go from here?

12

Sensor Example – Smart-Dust

• Hardware• UCB motes• 4 MHz CPU• 4 kB data RAM• 128 kB code• 50 kb/sec 917 Mhz radio• Sensors: light, temp.,

• Sound, etc.,

• And a battery.

Page 13: 15-441: Computer Networking Lecture 26: Where do we go from here?

13

Sensors, Power and Radios

• Limited battery life drives most goals

• Radio is most energy-expensive part.

• 800 instructions per bit. 200,000 instructions per packet. (!)

• That’s about one message per second for ~2 months if no CPU.

• Listening is expensive too. :(

Page 14: 15-441: Computer Networking Lecture 26: Where do we go from here?

14

Sensor Nets Goals

• Replace communication with computation

• Turn off radio receiver as often as possible

• Keep little state (limited memory).

Page 15: 15-441: Computer Networking Lecture 26: Where do we go from here?

15

Power

• Which uses less power?• Direct sensor base station Tx

• Total Tx power: distance^2

• Sensor sensor sensor base station?• Total Tx power: n * (distance/n) ^2 =~ d^2 / n

• Why? Radios are omnidirectional, but only one direction matters. Multi-hop approximates directionality.

• Power savings often makes up for multi-hop capacity• These devices are *very* power constrained!

Page 16: 15-441: Computer Networking Lecture 26: Where do we go from here?

16

Example: Aggregation

• Find average temperature in GHC 8th floor.• Naïve: Flood query, let a collection point compute avg.

• Huge overload near the CP. Lots of loss, and local nodes use lots of energy!

• Better:• Take local avg. first, & forward that.

• Send average temp + # of samples

• Aggregation is the key to scaling these nets.

• The challenge: How to aggregate.• How long to wait?• How to aggregate complex queries?• How to program?

Page 17: 15-441: Computer Networking Lecture 26: Where do we go from here?

Overview

• Content is king

• Billions of devices

• The next billion users

• “Nothing is permanent but change”

17

Page 18: 15-441: Computer Networking Lecture 26: Where do we go from here?

Example Routing Problem

18

Village

Internet

City

bike

2

3 1

Page 19: 15-441: Computer Networking Lecture 26: Where do we go from here?

Unstated Internet Assumptions

• Some path exists between endpoints• Routing finds (single) “best” existing route

• E2E RTT is not very large• Max of few seconds• Window-based flow/cong ctl. work well

• E2E reliability works well• Requires low loss rates

• Packets are the right abstraction• Routers don’t modify packets much• Basic IP processing

19

Page 20: 15-441: Computer Networking Lecture 26: Where do we go from here?

New Challenges

• Very large E2E delay• Propagation delay = seconds to minutes• Disconnected situations can make delay worse

• Intermittent and scheduled links• Disconnection may not be due to failure (e.g.

LEO satellite)• Retransmission may be expensive

• Many specialized networks won’t/can’t run IP

20

Page 21: 15-441: Computer Networking Lecture 26: Where do we go from here?

21

What about TCP?

• Reliable in-order delivery streams

• Delay sensitive [6 timers]:• connection establishment, retransmit, persist,

delayed-ACK, FIN-WAIT, (keep-alive)

• Three control loops:• Flow and congestion control, loss recovery

• Requires duplex-capable environment• Connection establishment and tear-down

Page 22: 15-441: Computer Networking Lecture 26: Where do we go from here?

Disruption Tolerant Networks

22

Page 23: 15-441: Computer Networking Lecture 26: Where do we go from here?

Disruption Tolerant Networks

23

Page 24: 15-441: Computer Networking Lecture 26: Where do we go from here?

Routing?

24

time (days)bike (data mule) intermittent high capacity

Geo satellite medium/low capacity

dial-up link low capacity

City

Village 1

Village 2

Connectivity: Village 1 – City

ban

dw

idth

bikesatellitephone

Page 25: 15-441: Computer Networking Lecture 26: Where do we go from here?

Overview

• Content is king

• Billions of devices

• The next billion users

• “Nothing is permanent but change”

25

Page 26: 15-441: Computer Networking Lecture 26: Where do we go from here?

Other Issues

• Security

• Mobility as the common case

• Clouds and replicated services

• Evolution support…

26

Page 27: 15-441: Computer Networking Lecture 26: Where do we go from here?

Now for a message from the sponsors…

• Interested in this type of stuff?• Networking group often takes students during

the semester or summer • Stop by office hours or email to chat

27