networks research - university college · pdf filesecure evolvable. computational networking...
TRANSCRIPT
networks research
Bob Briscoe & Ben Bappu
Dec 2004
networks research centre - themes
• networks of x• x: computers, devices, people, physical phenomena
• new science• framework for reasoning, proof, architecture, language, implementation
• necessity of relaying infrastructure?• design for tussle: end to end design then modify to edge to edge
• commercial service vs. collaborative self-supply
• incentives• for collaborative self-supply
• for commercial service (viability)• social costs (e.g. congestion, loss-of-privacy)
• regulation & public policy• collaborative vs. polity
viability
responsibility
freedom
scalability
commercial
simple
secure
evolvable
computational networkingprocess model
• Can implement typical network processes– routing ⊕ congestion pricing = congestion routing
• Provides an alternative view on (distributed) computing– convergence vs. transition– interaction vs. input/output
• Connects with– Economics, game theory– Constraint and functional programming,
message passing– Dynamic systems, control theory,
optimisation
– Electronic circuits, thermodynamics
• Offers a framework within which to address various research questions within networking – layer interaction, feedback, time scales, network economics
distributed information flow
networking(routing + flow)
computing(information dependence)
objectsagents
process calculi
ππππ-calculusambients
categorytheory
(graph)rewrite
systems
Turing m/cgraph
?Research!grid
λλλλ-calculus
Internet naming, addressing and routing
Research focusPrevious results showed that the Internet addressing, naming and routing architectures have been violated in different points and by different technological extensions. These extensions (shown in green arrows) represent point solutions that the communications industry has issues with, created by the new business-oriented role of the Internet, that the Internet architecture did not address.
Aims• Now major commercial environment upon which many businesses depend
• An unforeseen role that has forced the Internet to increasingly face evolutionary challenges• The Internet architecture
• The set of fundamental design principles that give direction to the evolution of the Internet• Mostly irrelevant and hence ignored by the communications industry
• Many Internet extensions have violated the original architecture• Thus reduced the evolvability of the Internet
• Today, many scientists believe that it is time to re-think the Internet architecture to:• Absorb within a new architecture the chaotic evolutionary patches that have modified today’s Internet• Make it relevant to the industry by introducing the missing sensitivity to commercial viability of its extensions
Our ultimate aim is to re-think, within today’s economic and societal context, the fundamental aspects of the Internet architecture that relate to addressing, naming and routing.
Internet naming, addressing and routing
Research approachTo analyse the existing extensions (as point solutions) and draw from these the design principles that, once generalised, are captured by the overall addressing, naming and routing architectures in order to naturally cope with these extensions.
Achievements – a meta-architecture for Internet identificationA meta-architecture for Internet identification, which defines a logical abstraction of the Internet, creating a class of architectures which capture a number of desirable properties of identification systems. It is used as a design tool to capture existing and new design principles for Internet identification by(1) showing that two properties are contradictory or cannot be both achieved, and(2) suggesting design rules or mechanisms that satisfy some property or set of properties.
Motivational Issues in Peer-to-Peer
Minimal use of central serversEdge computers (Peers)
Communicating directly Sharing information or system resources or (more interesting!) peoples’ time and effort.
Consumer ProviderOtherPeers
Social Control
Accountingand
Distribution
Service Usagetoken
service
Tokens
AggregatedInformation
Peer ControlPeer Control
Economic ArchitectureIn a community context Make the social control explicitUnderlying atoms of consumption and contribution
www.mmapps.org
Source TargetUseful relay
Less interference here
MASCAPONEMAximising Spectrum CAPacity Over mobile Networks
• How will next generation MAC layers perform in ad-hoc scenarios?
• What are the metrics for ad-hoc hybrid networking?
• What is the real value of co-operative MIMO approaches?
• MIT’s RF relaying – is it really practical?
• How much cross layer interaction do we need?
Simple propagation models understate gain AND overstate interference in a cooperative network
What is the transport capacity?
control& info
control& info
control& info
control& info
control& info
control& info
shared control; shared value 1) downstream knowledge upstream (re-feedback)
7838
S1
R1
R2
13
S2
-5 -1-2
-7
2
70
0
9 0
propagation timecongestionhop countetc
shared control; shared value2) contractual mobility
• User-selected route vs. user-selected edge-provider– Can the user selection of the edge provider (e.g. access provider) boost
competition of the wide area market?
– Or does the Internet need a ‘carrier pre-selection’ type of functionality (wide area providers selected by users)?
e2useruser
Offer disseminator
Offer disseminator
Offer disseminator
Offer disseminator
provider1 provider2 provider3 provider1 provider21repository
selectorroamer
Offer handler
2 34
contractual mobility - prototype
1 Offer disseminator
Shared control; shared value3) Deep Packet Inspection (DPI) Project
Research Motivation
Inspect and analyse data packets beyond the IP headers and deeper into the payload.• Analyse potential applications of DPI for BT• Propose an architectural framework for DPI applications• Propose a control structure for managing these DPI applications
DPI Applications - Firewalls, Intrusion Detection & Intrusion Prevention• Security• Policing - Monitoring traffic to enforce policies & contractual SLAs
BT’sNetworkCustomer ServicesISP trafficVoIP trafficp2p trafficBT ISP trafficVoIP trafficp2p trafficBT
DPI Applications
VoIPp2p BT’sNetworkhttpDPIp2phttpVoIPDoS PublicNetwork - Shaping, Capping, Load-balancing, Charging, QoS• Service Operations- Revenue assurance, Quality assessment, Information gathering, SLA monitoring • Internal Operations- Legal Intercept and Call records • Legal Requirements
IP End to End Quality of Service
Home Access Core Core Core HomeAccess
App
L3
L2
R R R R R R R
App
L3
L2L2 L2 L2 L2 L2
L1 L1 L1 L1 L1 L1 L1
L2 L2
End End
GQS region
- DSCP aware, strict priority queuing for guaranteed data
- ECN marking
- No per flow state
Congestion collapse as non rate adaptive UDP traffic increases
Congestion Collapse& DCCP
End to End QoS Coordination
Core IP QoS
2 QoS Modes:- Priority (EDCA) – simple but nonefficient for small packets
- Polling (HCCA) – complex and stilleffected by interfance
Little info on how to set parameters or integration into e2e QoS system
WLAN – 802.11e
GQS
ave.util/
%
congestion marking= (shadow) price
100
max
DIY QoStarget rate
(shadow) price
target rate
(shadow) price
target rate
(shadow) price
a
aa
aa
aa
a
TCP
ultra-elastic(p2p)
inelastic(streammedia)
Cambridge UniBT ResearchMicrosoft Research
www.m3i.org
guaranteed QoS synthesis
congestionpricingcongestion pricing
congestion pricing
best effort
reservation signalling
guaranteed
1
2
4
3
Reservationenabled
RSVP/ECNgateway
ECN only
Reserved flow processing
Policing flow entry to CP
Meter congestion per peer
Bulk ECN markingCP prioritised over BE
IP routers Data path processing
2
4
33
33
1
1
� intensive BT research� potential v. low cost PSTN replacement� identical guarantees, even televotes� core: classic Internet with minor mods� neither overprovisioning nor QoS smarts
e2e QoS signalling co-ordination
Application
Application
IR IRHG HGIR IRIR
R RR RR RRR
Home Access Core
RRR R RR
SSSS SSSS
Core Core HomeAccess
Wireless QoS Motivation – To support multimedia applications at wireless end nodes for Home/Private networks & Hotspots
where guaranteed QoS mechanisms may or may not exist on the core network.
- DCCP- Adaptive Codec
802.11eenabled
• Congestion Control– DCCP/IP with competing TCP/IP
flows does not starve either traffic
– RTP/DCCP/IP providing feedback to rate adaptive interactive voice application
• Lower layer resource management
– Economic and congestion pricing framework for WLAN
– ECN marking based on WLAN characteristics
• WMM and 802.11e testbedbeing built
– 802.11e simulations
– WMM using CISCO
Aggressive TCP
TFRC – easily satisfied but driven out
TFRC flow required rate
Fair share rate
Time
Thr
ough
put
Device Evolution
Devices are the customers’ gateway to our future networks & services, in the home, at the office & out and about.
Product Innovation• New Retail propositions
Vendor/Manufacturer/Supplier Complementary Strategies• Exploit BT Exact R&V partner relationships in LoBs
Service Capability through Multiple Co-operating
Devices • New business models between device owners
Seamless User Profiles on Devices (Home, Business etc.)• Customer-connected lifestyle matching service innovation –simple & complete
Seamless Mobility & Broadband Devices Joined-up Strategy
• Fixed-mobile broadband as one!
Device Technology & Product Watch
• Understand the rapidly changing world
Integrated Fixed-Mobile Showcase / Testbed
• Tangibly Demonstrate BT’s services to customers
Our research will inform BT strategy and ensure that networks & services we offer in the future are complemented by available devices.
event notificationindex-based
Index channels Application channels
Payload
2
1240
Payload
2
9021
Payload
80
7873
Payload
4
1683
Payload
3
987
Payload
21
1290
Payload
6
92
100
4
3987
41683
21240
807873
211290
102
6
Payload
4
163
29021
4163
692
101
3
3101
6102
202
7
5
4
4
8
5
IP
multicast
Generic Announcement Protocol (GAP)
Managed GAP
Watchcast Application
Business Solution
efficient & flexible
index-based event messaging
indexerevent1sender
event2sender
event3sender
potential receivers
joins (routing) data (forwarding)
multipoint request -reply
IP
multicast
Generic Announcement Protocol (GAP)
Managed GAP
Watchcast Application
Business Solution
zero cost forextra watches
Privacy in Pervasive Computing
Increasing business awareness of privacyReleasing value from untapped marketsIncreasing service acceptance and value
Developing Privacy Enhancing Technology
Contributing to 21C Network Vision
Privacy Control and Awareness
Contributing to 21C Network Vision
Privacy Control and AwarenessTargeted solutions
Innovative component technology
Targeted solutions
Innovative component technology
Healthcare & TelecarePatient records, home monitoring
21CPresence, Location, Directories,
Address Books, Diaries
TransportInformation, ticketing, congestion, insurance
Supply Chains, Logistics & RetailRFID Privacy & Security
Home and office environmentsUbiquitous services, home control, whereabouts
No Privacy Enhancing Technology
Complete Privacy ControlUsers opt-
out
Overly restrictive legislation
Damage to brand
Unusable
Too costly
Too intrusive
Lost market & failed services
Poor uncompetitive services
InformationParticipation
value
New valuable services
e.g. post-retail RFID
Mobile Location Provider
Dave
Car
Mobile
Satnav
Seats
Mary
Bluetooth IDPressure
Location
MobileLocation
Engine mgt.
GPSLocation
Preferences
RFID Tags
EPCs
DoorOpen/Close
Mobile Location Provider
Dave
Car
Mobile
Satnav
Seats
Mary
Bluetooth IDPressure
Location
MobileLocation
Engine mgt.
GPSLocation
Preferences
RFID Tags
EPCs
DoorOpen/Close
• Collaboration with UC Berkeley• Member of Cambridge TIME EPSRC/WINES proposal
CII: Communications Innovation Institute
• what’s it for?• co-ordinate future health of the communications industry
• why?• external innovation blocked • but history of innovation despite operators
• how? industry’s top analysts and architects working together– industry structure
• industry roadmapping• altering regulation
– technical architecture• emerging-technology watch• new Internet architecture
materials & process equip
comp-onents
equip makers
network owners
service providers
content & applics
appli-ances
end users
protection against revenue leakage & virus/spam attacks
working groups – an academia/industry bridge
publicindustry
research
education: Internet Economy MSc
new network architecturewithin socio-economic processes
• economics & design of next gen p2p • viral comms• network pricing• new routing & addressing arch• wireless over optical applicability• low cost WDM applicability
indu
stry
val
ue c
hain
•in
dust
ry r
oadm
appi
ng•
cont
ent a
nd m
edia
(tb
c)•
phot
onic
s•
wire
less
& s
pect
rum
publ
ic p
olic
y im
plic
atio
ns•
Wire
less
spe
ctru
m p
olic
y•
Inte
rnet
med
iate
d pa
rtic
ipat
ion
•B
road
band
dep
loym
ent
•In
tern
et P
iracy
know
ledg
e ex
chan
ge
commercialexploitation
publ
ic a
genc
y lia
ison
industry working groups• middle/edge control migration• intervention vs. security and privacy• broadband deployment• architecture: inter-{QoS|routing|DoS}• industry models for emerging tech (tbc)
businesstechnical
public policy
networks research centre - expertise
• networking architecture, layering, interconnect, naming & addressing
• network games, network security
• network pricing, business models
• optimisation, process algebra
• network protocol engineering & technology
• distributed systems, platforms
• messaging, group communications
• technical, economic, social