networks research - university college · pdf filesecure evolvable. computational networking...

14
networks research Bob Briscoe & Ben Bappu Dec 2004 networks research centre - themes networks of x x: computers, devices, people, physical phenomena new science framework for reasoning, proof, architecture, language, implementation necessity of relaying infrastructure? design for tussle: end to end design then modify to edge to edge commercial service vs. collaborative self-supply incentives for collaborative self-supply for commercial service (viability) social costs (e.g. congestion, loss-of-privacy) regulation & public policy collaborative vs. polity viability responsibility freedom scalability commercial simple secure evolvable

Upload: phungxuyen

Post on 31-Mar-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

networks research

Bob Briscoe & Ben Bappu

Dec 2004

networks research centre - themes

• networks of x• x: computers, devices, people, physical phenomena

• new science• framework for reasoning, proof, architecture, language, implementation

• necessity of relaying infrastructure?• design for tussle: end to end design then modify to edge to edge

• commercial service vs. collaborative self-supply

• incentives• for collaborative self-supply

• for commercial service (viability)• social costs (e.g. congestion, loss-of-privacy)

• regulation & public policy• collaborative vs. polity

viability

responsibility

freedom

scalability

commercial

simple

secure

evolvable

computational networkingprocess model

• Can implement typical network processes– routing ⊕ congestion pricing = congestion routing

• Provides an alternative view on (distributed) computing– convergence vs. transition– interaction vs. input/output

• Connects with– Economics, game theory– Constraint and functional programming,

message passing– Dynamic systems, control theory,

optimisation

– Electronic circuits, thermodynamics

• Offers a framework within which to address various research questions within networking – layer interaction, feedback, time scales, network economics

distributed information flow

networking(routing + flow)

computing(information dependence)

objectsagents

process calculi

ππππ-calculusambients

categorytheory

(graph)rewrite

systems

Turing m/cgraph

?Research!grid

λλλλ-calculus

Internet naming, addressing and routing

Research focusPrevious results showed that the Internet addressing, naming and routing architectures have been violated in different points and by different technological extensions. These extensions (shown in green arrows) represent point solutions that the communications industry has issues with, created by the new business-oriented role of the Internet, that the Internet architecture did not address.

Aims• Now major commercial environment upon which many businesses depend

• An unforeseen role that has forced the Internet to increasingly face evolutionary challenges• The Internet architecture

• The set of fundamental design principles that give direction to the evolution of the Internet• Mostly irrelevant and hence ignored by the communications industry

• Many Internet extensions have violated the original architecture• Thus reduced the evolvability of the Internet

• Today, many scientists believe that it is time to re-think the Internet architecture to:• Absorb within a new architecture the chaotic evolutionary patches that have modified today’s Internet• Make it relevant to the industry by introducing the missing sensitivity to commercial viability of its extensions

Our ultimate aim is to re-think, within today’s economic and societal context, the fundamental aspects of the Internet architecture that relate to addressing, naming and routing.

Internet naming, addressing and routing

Research approachTo analyse the existing extensions (as point solutions) and draw from these the design principles that, once generalised, are captured by the overall addressing, naming and routing architectures in order to naturally cope with these extensions.

Achievements – a meta-architecture for Internet identificationA meta-architecture for Internet identification, which defines a logical abstraction of the Internet, creating a class of architectures which capture a number of desirable properties of identification systems. It is used as a design tool to capture existing and new design principles for Internet identification by(1) showing that two properties are contradictory or cannot be both achieved, and(2) suggesting design rules or mechanisms that satisfy some property or set of properties.

Motivational Issues in Peer-to-Peer

Minimal use of central serversEdge computers (Peers)

Communicating directly Sharing information or system resources or (more interesting!) peoples’ time and effort.

Consumer ProviderOtherPeers

Social Control

Accountingand

Distribution

Service Usagetoken

service

Tokens

AggregatedInformation

Peer ControlPeer Control

Economic ArchitectureIn a community context Make the social control explicitUnderlying atoms of consumption and contribution

www.mmapps.org

Source TargetUseful relay

Less interference here

MASCAPONEMAximising Spectrum CAPacity Over mobile Networks

• How will next generation MAC layers perform in ad-hoc scenarios?

• What are the metrics for ad-hoc hybrid networking?

• What is the real value of co-operative MIMO approaches?

• MIT’s RF relaying – is it really practical?

• How much cross layer interaction do we need?

Simple propagation models understate gain AND overstate interference in a cooperative network

What is the transport capacity?

control& info

control& info

control& info

control& info

control& info

control& info

shared control; shared value 1) downstream knowledge upstream (re-feedback)

7838

S1

R1

R2

13

S2

-5 -1-2

-7

2

70

0

9 0

propagation timecongestionhop countetc

shared control; shared value2) contractual mobility

• User-selected route vs. user-selected edge-provider– Can the user selection of the edge provider (e.g. access provider) boost

competition of the wide area market?

– Or does the Internet need a ‘carrier pre-selection’ type of functionality (wide area providers selected by users)?

e2useruser

Offer disseminator

Offer disseminator

Offer disseminator

Offer disseminator

provider1 provider2 provider3 provider1 provider21repository

selectorroamer

Offer handler

2 34

contractual mobility - prototype

1 Offer disseminator

Shared control; shared value3) Deep Packet Inspection (DPI) Project

Research Motivation

Inspect and analyse data packets beyond the IP headers and deeper into the payload.• Analyse potential applications of DPI for BT• Propose an architectural framework for DPI applications• Propose a control structure for managing these DPI applications

DPI Applications - Firewalls, Intrusion Detection & Intrusion Prevention• Security• Policing - Monitoring traffic to enforce policies & contractual SLAs

BT’sNetworkCustomer ServicesISP trafficVoIP trafficp2p trafficBT ISP trafficVoIP trafficp2p trafficBT

DPI Applications

VoIPp2p BT’sNetworkhttpDPIp2phttpVoIPDoS PublicNetwork - Shaping, Capping, Load-balancing, Charging, QoS• Service Operations- Revenue assurance, Quality assessment, Information gathering, SLA monitoring • Internal Operations- Legal Intercept and Call records • Legal Requirements

IP End to End Quality of Service

Home Access Core Core Core HomeAccess

App

L3

L2

R R R R R R R

App

L3

L2L2 L2 L2 L2 L2

L1 L1 L1 L1 L1 L1 L1

L2 L2

End End

GQS region

- DSCP aware, strict priority queuing for guaranteed data

- ECN marking

- No per flow state

Congestion collapse as non rate adaptive UDP traffic increases

Congestion Collapse& DCCP

End to End QoS Coordination

Core IP QoS

2 QoS Modes:- Priority (EDCA) – simple but nonefficient for small packets

- Polling (HCCA) – complex and stilleffected by interfance

Little info on how to set parameters or integration into e2e QoS system

WLAN – 802.11e

GQS

ave.util/

%

congestion marking= (shadow) price

100

max

DIY QoStarget rate

(shadow) price

target rate

(shadow) price

target rate

(shadow) price

a

aa

aa

aa

a

TCP

ultra-elastic(p2p)

inelastic(streammedia)

Cambridge UniBT ResearchMicrosoft Research

www.m3i.org

guaranteed QoS synthesis

congestionpricingcongestion pricing

congestion pricing

best effort

reservation signalling

guaranteed

1

2

4

3

Reservationenabled

RSVP/ECNgateway

ECN only

Reserved flow processing

Policing flow entry to CP

Meter congestion per peer

Bulk ECN markingCP prioritised over BE

IP routers Data path processing

2

4

33

33

1

1

� intensive BT research� potential v. low cost PSTN replacement� identical guarantees, even televotes� core: classic Internet with minor mods� neither overprovisioning nor QoS smarts

e2e QoS signalling co-ordination

Application

Application

IR IRHG HGIR IRIR

R RR RR RRR

Home Access Core

RRR R RR

SSSS SSSS

Core Core HomeAccess

Wireless QoS Motivation – To support multimedia applications at wireless end nodes for Home/Private networks & Hotspots

where guaranteed QoS mechanisms may or may not exist on the core network.

- DCCP- Adaptive Codec

802.11eenabled

• Congestion Control– DCCP/IP with competing TCP/IP

flows does not starve either traffic

– RTP/DCCP/IP providing feedback to rate adaptive interactive voice application

• Lower layer resource management

– Economic and congestion pricing framework for WLAN

– ECN marking based on WLAN characteristics

• WMM and 802.11e testbedbeing built

– 802.11e simulations

– WMM using CISCO

Aggressive TCP

TFRC – easily satisfied but driven out

TFRC flow required rate

Fair share rate

Time

Thr

ough

put

Device Evolution

Devices are the customers’ gateway to our future networks & services, in the home, at the office & out and about.

Product Innovation• New Retail propositions

Vendor/Manufacturer/Supplier Complementary Strategies• Exploit BT Exact R&V partner relationships in LoBs

Service Capability through Multiple Co-operating

Devices • New business models between device owners

Seamless User Profiles on Devices (Home, Business etc.)• Customer-connected lifestyle matching service innovation –simple & complete

Seamless Mobility & Broadband Devices Joined-up Strategy

• Fixed-mobile broadband as one!

Device Technology & Product Watch

• Understand the rapidly changing world

Integrated Fixed-Mobile Showcase / Testbed

• Tangibly Demonstrate BT’s services to customers

Our research will inform BT strategy and ensure that networks & services we offer in the future are complemented by available devices.

event notificationindex-based

Index channels Application channels

Payload

2

1240

Payload

2

9021

Payload

80

7873

Payload

4

1683

Payload

3

987

Payload

21

1290

Payload

6

92

100

4

3987

41683

21240

807873

211290

102

6

Payload

4

163

29021

4163

692

101

3

3101

6102

202

7

5

4

4

8

5

IP

multicast

Generic Announcement Protocol (GAP)

Managed GAP

Watchcast Application

Business Solution

efficient & flexible

index-based event messaging

indexerevent1sender

event2sender

event3sender

potential receivers

joins (routing) data (forwarding)

multipoint request -reply

IP

multicast

Generic Announcement Protocol (GAP)

Managed GAP

Watchcast Application

Business Solution

zero cost forextra watches

Privacy in Pervasive Computing

Increasing business awareness of privacyReleasing value from untapped marketsIncreasing service acceptance and value

Developing Privacy Enhancing Technology

Contributing to 21C Network Vision

Privacy Control and Awareness

Contributing to 21C Network Vision

Privacy Control and AwarenessTargeted solutions

Innovative component technology

Targeted solutions

Innovative component technology

Healthcare & TelecarePatient records, home monitoring

21CPresence, Location, Directories,

Address Books, Diaries

TransportInformation, ticketing, congestion, insurance

Supply Chains, Logistics & RetailRFID Privacy & Security

Home and office environmentsUbiquitous services, home control, whereabouts

No Privacy Enhancing Technology

Complete Privacy ControlUsers opt-

out

Overly restrictive legislation

Damage to brand

Unusable

Too costly

Too intrusive

Lost market & failed services

Poor uncompetitive services

InformationParticipation

value

New valuable services

e.g. post-retail RFID

Mobile Location Provider

Dave

Car

Mobile

Satnav

Seats

Mary

Bluetooth IDPressure

Location

MobileLocation

Engine mgt.

GPSLocation

Preferences

RFID Tags

EPCs

DoorOpen/Close

Mobile Location Provider

Dave

Car

Mobile

Satnav

Seats

Mary

Bluetooth IDPressure

Location

MobileLocation

Engine mgt.

GPSLocation

Preferences

RFID Tags

EPCs

DoorOpen/Close

• Collaboration with UC Berkeley• Member of Cambridge TIME EPSRC/WINES proposal

CII: Communications Innovation Institute

• what’s it for?• co-ordinate future health of the communications industry

• why?• external innovation blocked • but history of innovation despite operators

• how? industry’s top analysts and architects working together– industry structure

• industry roadmapping• altering regulation

– technical architecture• emerging-technology watch• new Internet architecture

materials & process equip

comp-onents

equip makers

network owners

service providers

content & applics

appli-ances

end users

protection against revenue leakage & virus/spam attacks

working groups – an academia/industry bridge

publicindustry

research

education: Internet Economy MSc

new network architecturewithin socio-economic processes

• economics & design of next gen p2p • viral comms• network pricing• new routing & addressing arch• wireless over optical applicability• low cost WDM applicability

indu

stry

val

ue c

hain

•in

dust

ry r

oadm

appi

ng•

cont

ent a

nd m

edia

(tb

c)•

phot

onic

s•

wire

less

& s

pect

rum

publ

ic p

olic

y im

plic

atio

ns•

Wire

less

spe

ctru

m p

olic

y•

Inte

rnet

med

iate

d pa

rtic

ipat

ion

•B

road

band

dep

loym

ent

•In

tern

et P

iracy

know

ledg

e ex

chan

ge

commercialexploitation

publ

ic a

genc

y lia

ison

industry working groups• middle/edge control migration• intervention vs. security and privacy• broadband deployment• architecture: inter-{QoS|routing|DoS}• industry models for emerging tech (tbc)

businesstechnical

public policy

networks research centre - expertise

• networking architecture, layering, interconnect, naming & addressing

• network games, network security

• network pricing, business models

• optimisation, process algebra

• network protocol engineering & technology

• distributed systems, platforms

• messaging, group communications

• technical, economic, social

messaging

network research centre

control aspects of networking– economics and motivation as guiding principles

CII

privacy

architecture

deep pktinspection

IP e2e QoS

MIT

UCL

CambridgeBerkeley

collabspectrum

p2p motivation

comms companies

public agencies

devices