Title: The information expressed here is the personal opinions of the presenters and the comments here should not be taken personally
1(No Transcript)
2Again? Well its an offense today!
Disclaimer
The information expressed here is the personal
opinions of the presenters and the comments here
should not be taken personally
During the course of this discussion, we were
forced to quote a few paragraphs from various
publications so bear with us when we read them
out ?
3Prologue
Err did I calculate the values correctly?
4(No Transcript)
5CONMan A Step Towards Network Manageability
Authors Hitesh Ballani, Paul Francis
Presentation By Rahul Potharaju, Rejaie
Johnson Advisor Aleksander Kuzmanovic
6Lets look at it once again
One of the Motivations Enterprise Networking and
Computing The Need for Con?guration
Management Published January 2004 ? 4 years
back Cited by
100
50
2?
0!
7Lets look at it once again
Anyways, what is the other 20? Which IT
industries were surveyed? 62 Configuration
errors?
8Its like writing a program without knowing the
operating system
we agree with their basic hypothesis and in
this paper assume the presence of a management
channel.
Hypothesis A message expressing an opinion based
on incomplete evidence Developing the system
without knowing its interface?
9A thing about the Management Channel
- Cannot dictate where the management channel
operates or does not operate of the same physical
links. Why? Would it be more beneficial if the
management channel takes more control of this. - How can this be done?
10Relying on others?
- What makes this better than the other research
areas? - Gaps can be filled in with other work. Why
cant it be your work?
However, there is the vast body of literature
that does deal with protocol implementation, i.e.
through abstraction...
11A few missing links
- Does not specify as to what the data plane does.
- Only talks about network management, but rarely
talks about how things are going to be forwarded
or routed to one network to the other. - What about cryptography? How will this work?
- Not a flaw but is your script inspired from a
particular language?
12Incentives?
- If this is going to be adopted, will other
networks be able to adapt to this? - Paper does forget to mention about ISPs.
13Aye Aye Captain!
Modules and pipes report on their performance
with these metrics. They can also advertise the
ability to o?er performance trade-o?s in terms of
these metrics.
How are these abilities monitored? Local or
Global Algorithms? Introduction of
unnecessary(or necessary but again, adding extra
problems) tussles? There are so many issues to
be addressed. For instance If this is extended
to global usage, hot potato routing becomes
dominant!
14What happens if you encounter an unfamiliar
protocol?
Take Skype for instance Would they give out the
protocol specifications? How would you deal with
it then?
there are scenarios where the NM will have to
deal with protocol-speci?c details.
Ok lets accept it. But how many will NM deal
with? With a protocol outburst, NM would soon
fade away.
15Goodbye QoS!
Did the authors miss that out or was it just
unnecessary to deal with it?
16- VPN Single Enterprise Domain All is well
Looks like a frog in a well scenario. How would
you account for Multiple Domain managements
etc..? - Again, VPN is being presented because it is
well suited for their problem? VPN doesnt
involve much of the headaches like various
parameter tunings etc
17Sometimes Tougher the task of altering network
operation, Tougher it is to compromise the
network security.
Con?gure connectivity between the customer-facing
interfaces ltETH,A,agt and ltETH,C,fgt for tra?c
between C1-S1 and C1-S2.
OK but how about this?
Drop connectivity between the customer-facing
interfaces ltETH,A,agt and ltETH,C,fgt for tra?c
between C1-S1 and C1-S2.
18Problem maybe correct but is the solution too
impractical to be correct?
Maybe it works only in VPN scenarios? Lets say
you managed to get CONMan deployed Now, if
there is a change in one of the low-level
protocols, how do you plan to propagate the
changes? Would NM be a central point of
failure? CONMan should be highly
flexible/adaptable/secure?
To incorporate the never ending list of low-level
protocols
To suit various enterprises
Enterprises rely on CONMan!
19Back to the Defense Team