SAHARA Third Winter Retreat 12-14 January 2004 - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

SAHARA Third Winter Retreat 12-14 January 2004

Description:

... Lucent Bell Labs T. V. Lakshman ... Grad Students Yin Li Sridhar Machiraju Ana Sanz Merino Xuanlong Nguyen George Porter Anantha Rajagoplala-Rao Sean Rhea ... – PowerPoint PPT presentation

Number of Views:50
Avg rating:3.0/5.0
Slides: 21
Provided by: Ran5164
Category:

less

Transcript and Presenter's Notes

Title: SAHARA Third Winter Retreat 12-14 January 2004


1
SAHARA Third Winter Retreat12-14 January 2004
  • Randy H. Katz, Anthony Joseph, Ion Stoica
  • Computer Science Division
  • Electrical Engineering and Computer Science
    Department
  • University of California, Berkeley
  • Berkeley, CA 94720-1776

2
Retreat Goals Technology Transfer
People Project Status Work in Progress Prototype
Technology
Early Access to Technology Promising Directions
Reality Check Feedback
3
Who is Here (Industry)
  • Cisco
  • Petre Dini
  • Crazy Tulip Systems
  • Chris Overton
  • Hewlett-Packard Labs
  • Wai-Tian Dan Tan
  • KDD Japan
  • Ayuymu Kubota (VIF)
  • Lucent Bell Labs
  • T. V. Lakshman
  • Microsoft Research
  • Helen Wang
  • NTTDoCoMo
  • Daichi Funato
  • NTT MCL
  • Anand Desai
  • Tetsuya Nakamura
  • Haruhiko Nishida
  • Satomi Okazaki
  • Sun Microsystems
  • Erik Nordmark
  • Univ. Helsinki/Nokia
  • Kimmo Raatikainen
  • Special Friends
  • John Chuang
  • Bryan Lyles
  • Doug Tygar

Italics indicates Ph.D. from Berkeley VIFVisiting
Industrial Fellow Green First Retreat!
4
Who is Here (Berkeley)
  • Professors
  • Anthony Joseph
  • Randy Katz
  • Ion Stoica
  • Technical Admin Staff
  • Bob Miller
  • Glenda Smith
  • Keith Sklower
  • Grad Students
  • Sharad Agarwal
  • Marco Barreno
  • Weidong Cui
  • Steve Czerwinski
  • Ling Huang
  • Chris Karlof
  • Karthik Lakshminarayanan
  • Grad Students
  • Yin Li
  • Sridhar Machiraju
  • Ana Sanz Merino
  • Xuanlong Nguyen
  • George Porter
  • Anantha Rajagoplala-Rao
  • Sean Rhea
  • Mukund Seshadri
  • Kevin Simler
  • Lakshmi Subramanian
  • Mel Tsai
  • Fang Yu
  • Ben Zhao
  • Alice Zheng
  • Shelley Zhuang

5
Retreat Purpose
  • Fifth SAHARA Retreat
  • Project launched 1 July 2001
  • Last year shift to new projects
  • Common thread architectural elements for future
    networks
  • Services inside the network code vs.
    protocols, location/topology-aware
  • Spanning
  • Independent service providers
  • Converged data telecomm nets
  • Hetero access core nets
  • Co-lo w/ROC, New Project Start
  • NSF Cybertrust Center Proposal Center for
    Adaptive Trustworthy Systems (CATS)
  • Industrial feedback directions
  • Plans for the new center
  • Industrial endorsement for the proposal

6
Project Relationships
P2P Search Mobility Overlays
Griffin
New Net Services and Applications
Adaptive, Network-Aware Applications
Net Storage Apps
Adaptive APIs
OASIS Programmable Network Elements
Exposed APIs
Tapestry Local-aware DOLR
High Level APIs
Enhanced Routing

SAHARA ComposedReachability BGP, Overlay
Support
Internet Indirection Infrastructure
IP Layer
7
SAHARA Elevator Statement
  • New mechanisms, techniques for end-to-end
    services w/ desirable, predictable, enforceable
    properties spanning potentially distrusting
    service providers
  • Architecture for service composition and
    inter-operation across separate administrative
    domains, supporting peering and brokering, and
    diverse business, value-exchange, access-control
    models

8
Routing as a Composed Service
  • Routing as a Reachability Service
  • Implementing paths between composed service
    instances,e.g., links within an overlay
    network
  • Multi-provider environment, no centralized
    control
  • Desirable Properties
  • Trust verify believability of routing
    advertisements
  • Agility converge quickly in response to global
    routing changes to retain good reachability
    performance (e.g., latency)?
  • Reliability detect service composition path
    failures quicklyto enable fast recomposition to
    maintain reachability
  • Scalability and Interoperability Adapt protocols
    via processing at impedance matching points
    between administrative domains
  • Results are architectural elements rather than a
    comprehensive architecture

9
SAHARA Recent Progress
  • Reachability as a Composed Network Service
  • Strong focus on BGP
  • Internets primary means for managing peering and
    achieving end-to-end reachability
  • Limited visibility into AS policies makes it
    difficult to achieve good global behaviors from
    locally good specifications
  • Many well-known security vulnerabilities
  • Motivation for overlays to achieve
    application-specific reachability properties
  • Presentations during the Retreat
  • Sharads highlight on interactions between global
    and local routing
  • Matts talk on Root Cause Analysis of BGP
    Dynamics
  • Lakshmis talk on Listen and Whisper Security
    Mechanisms for BGP
  • Lakshmis poster on OverQOS Loss-rate vs.
    bandwidth quality of service

10
Other SAHARA Progress
  • Access Network Services
  • Cross-service provider authenticated roaming in
    WLANs (Merino, Suzuki, Matsunaga)
  • Cross-service provider radio resource allocation
    (Matsunaga)
  • Overlay Network Services
  • Tapestry (Anthony Joseph) and I3 (Ion Stoica)
  • Exploration of support for mobility, reliability,
    P2P networking

11
SAHARA Research Transitions
  • Other network services, migrating towards
    reliability and trustability
  • Weidong network monitoring infrastructure
  • Fang router level intrusion detection
  • Mukund end-host controlled routing
  • Machi confidentiality in interdomain routing
  • Overlays and Services for Internetworked Storage
    (OASIS)
  • Mel Programmable Router Model and Environment
  • George Streaming Packet Processing
  • Li Storage Networking as an applications
    domain

12
Recent Sahara Theses
  • Ph.D.
  • Bhaskar Raman, An Architecture for Availability
    and Performance in Wide-Area Service
    Composition, (Ph.D., December 2002)
  • Yan Chen, Scalable Efficient Network-Aware
    Content Distribution Networks, (Ph.D., Dec 2003)
  • Morley Mao, Solving the Interdomain Routing
    PuzzleUnderstanding Interdomain Routing
    Dynamics, (Ph.D., December 2003)
  • Sharad Agarwal, Influence of Interdomain Routing
    on Intradomain Traffic Engineering, (Ph.D., May
    2004?)
  • M.S.
  • Lakshminarayanan Subramanian, On Inferring the
    Geographic Properties of the Internet, (M.S.,
    May 2002).
  • Fang Yu, Study of the Restoration Path Block
    Problem in Optical Networks, (M.S., December
    2002).
  • Mukund Seshadri, A Scalable Architecture for
    Broadcast Federation, (M.S., December 2002).
  • Weidong Cui, Backup Path Allocation Based on a
    Correlated Link Failure Probability Model in
    Overlay Networks, (M.S., May 2003).
  • George Porter, Traffic Matrix Estimation for
    Low-loss Routing in Hybrid Networks, (M.S., May
    2003).
  • Sridhar Machiraju, A Scalable and Robust
    Solution for Bandwidth Allocations, (M.S., May
    2003).

13
Center for Adaptive Trustworthy
SystemsConceptual Architecture
User
Programming Abstractions For Roll-back (Necula
Operator
Prototype Applications E-voting,
Messaging, E-Mail, etc.
Benchmarks,Tools for Human Operators (Patterson)
Crash-Only Middleware Servers, System
OC Infrastructure (Fox)
SLT Services
Application- Specific Overlay Network
Online Statistical Learning Algorithms (Jordan)
PNE
PNE
Edge Network
Edge Network
Protocols Enabling Fast Detection Route
Recovery, Network OC Infrastructure (Katz,
Stoica)
Router
Router
CommodityInternet IP networks
  • Security and privacy consideration embedded
    throughout (Tygar)
  • Reduction to practice of online SLT and
    observe/analyze/act infrastructure
  • Reusable embeddable components

14
Vulnerable Messaging Application that Requires
Trustworthiness
DHS/Federal Network
Coalition Internet
Trust Relations
Allies Networks
Allies Networks
Allies Networks
Allies Networks
Local Police, Fire, State Police
Incident Reports Responder Locations GIS Data Etc.
Compromised Network With Embedded Adversaries
15
Summer03 Retreat Feedback
  • Retreat Organization
  • Better interactive session mix, poster session
    very productive
  • Keep talks SHORT and allow time for discussion
    following talks
  • Follow-up in 1-2 months, keep industrial
    participants involved
  • Technical Comments
  • Problem focus intended application and its
    requirements for technology being developed
    remains unclear
  • Clearly defining the need for overlays and P2P
    systemswhat is the problem they solve and the
    critical application they enable?
  • Clearly defining the PNE modelwho programs them
    (system programmers? end users?) and what kind of
    functionality run on them (network services?
    arbitrary applications?)
  • Migration from performance focus to
    reliability/trustability focus in collaboration
    with ROC project is good
  • Research methodology (measure, model, simulate,
    deploy) needs to be clearly specified

16
Plan for the Retreat
  • Monday, 12 January 2004
  • 0745 Depart Berkeley
  • 1200 Arrive Granlabbaken
  • 1200-1300 Lunch
  • 1300-1500 Session I Overview and Status
    Introductions and Retreat
  • Overview, Randy Katz
  • Randy Katz/Anthony Joseph/Ion Stoica Status
    Presentations
  • Sharad Agarwal, Interaction of BGP and
    Interdomain Traffic
  • 1500-1530 Break
  • 1530-1700 Session II Dependability and
    Trustworthiness
  • Matt Caesar "Root Cause Analysis of BGP Route
    Failure"
  • Lakshmi Subramanian "Verifiable Protocols with
    Listen and Whisper"
  • Sridhar Machiraju "Reconciling Confidentiality
    with Cooperation in Interdomain Routing"
  • 1700-1800 Break
  • 1800-1930 Dinner
  • Dinner Speaker, Chris Overton, Crazy Tulip
    Systems, Strategies for Modeling Large-scale IT
    Systems
  • 1930-2100 Panel Session Reliable Adaptive
    Distributed Systems (RADS) Proposal (David
    Patterson, Armando Fox, Ion Stoica, Michael
    Jordan, Doug Tygar)
  • 2100- Social Hour

17
Plan for the Retreat
  • Tuesday, 13 January 2004
  • 0730-0830 Breakfast
  • 0830-1000 OASIS Edge Services
  • Mel Tsai "RouterVM Programmable Network Element
    Specification
  • George Porter "Streaming Protocol Processing in
    PNEs
  • Weidong Cui "Network Monitoring Infrastructure"
  • Fang Yu "Router Level Support for Intrusion
    Detection"
  • 1000-1030 Break
  • 1030-1200 Overlay Networks I
  • Mukund Seshadri "Dynamics of End Host-Controlled
    Routing"
  • Ananth Rao "Scheduling transmissions in multihop
    802.11 networks"
  • Steve Czerwinski Using Overlay Networks for
    Proximity-based Discovery
  • 1200-1700 Bag Lunch and Afternoon Snow Sports (or
    work, lounge, talk, relax, etc.)
  • 1700-1830 Overlay Networks II
  • Panel Session of Short Student Talks and
    Following Discussion
  • Karthik Lakshminarayanan "Loose virtual path
    abstraction"
  • Ben Zhao Infrastructure-based Resilient
    Routing
  • Sean Rhea Bamboo
  • 1830-2000 Dinner

18
Plan for the Retreat
  • Wednesday, 14 January 2004
  • 0730-0830 Breakfast
  • 0830-0930 RADS Feedback from Industry
  • 0930-1000 Break and Room Checkout
  • 1000-1200 Individual Project Feedback
  • 1200-1300 Lunch
  • 1300 Depart Granlibakkan
  • 1700 Arrive Berkeley

19
Recent SAHARA-Related Publications
  • Z. Mao, J. Rexford, J. Wang, R. H. Katz,
    Towards an Accurate AS-Level Traceroute Tool ,
    Proceedings ACM SIGCOMM Conference, Karlsruhe,
    Germany, (August 2003).
  • Y. Matsunaga, A. Merino, T. Suzuki, R. H. Katz,
    Secure Authentication System for Public WLAN,
    Proceedings First ACM International Workshop on
    Wireless Mobile Applications and Services on WLAN
    Hotspots (ACM WMASH 2003), San Diego, CA,
    (September 2003).
  • Y. Chen, D. Bindel, R. H. Katz, Tomography-based
    Overlay Network Monitoring, Extended Abstract,
    Proceedings Internet Measurement Conference
    (ICM-03), Miami, FL, (October 2003).
  • L. Subramanian, I. Stoica, R. H. Katz, S.
    Shenker, Listen and Whisper Security Mechanisms
    for BGP, USENIX/ACM Symposium on Networked
    System Design and Implementation (NSDI04), San
    Francisco, CA, (March 2004).
  • L. Subramanian, I. Stoica, R. H. Katz, H.
    Balakrishnan, OverQoS An Overlay Based
    Architecture for Enhancing Internet QoS,
    USENIX/ACM Symposium on Networked System Design
    and Implementation (NSDI04), San Francisco, CA,
    (March 2004).
  • Y. Matsunaga, R. H. Katz, Inter-Domain Radio
    Resource Management for Wireless LANs, Wireless
    Communications and Networking Conference
    (WCNC2004), Atlanta, GA, (March 2004).
  • S. Zhuang, K. Lai, I. Stoica, R. Katz, S.
    Shenker, Host Mobility Using an Internet
    Indirection Infrastructure, ACM/Balzer Wireless
    Networking (WINET) Journal, to appear.

20
SaharaOverviewRandy H. KatzUniv. of
CaliforniaBerkeley, CA94720-1776
Write a Comment
User Comments (0)
About PowerShow.com