The information expressed here is the personal opinions of the presenters and the comments here should not be taken personally - PowerPoint PPT Presentation

About This Presentation
Title:

The information expressed here is the personal opinions of the presenters and the comments here should not be taken personally

Description:

The information expressed here is the personal opinions of the presenters and the comments here should not be taken personally During the course of this discussion ... – PowerPoint PPT presentation

Number of Views:49
Avg rating:3.0/5.0
Slides: 20
Provided by: Leg140
Category:

less

Transcript and Presenter's Notes

Title: The information expressed here is the personal opinions of the presenters and the comments here should not be taken personally


1
(No Transcript)
2
Again? Well its an offense today!
Disclaimer
The information expressed here is the personal
opinions of the presenters and the comments here
should not be taken personally
During the course of this discussion, we were
forced to quote a few paragraphs from various
publications so bear with us when we read them
out ?
3
Prologue
Err did I calculate the values correctly?
4
(No Transcript)
5
CONMan A Step Towards Network Manageability
Authors Hitesh Ballani, Paul Francis
Presentation By Rahul Potharaju, Rejaie
Johnson  Advisor Aleksander Kuzmanovic
6
Lets look at it once again
One of the Motivations Enterprise Networking and
Computing The Need for Con?guration
Management Published January 2004 ? 4 years
back Cited by
100
50
2?
0!
7
Lets look at it once again
Anyways, what is the other 20? Which IT
industries were surveyed? 62 Configuration
errors?
8
Its like writing a program without knowing the
operating system
we agree with their basic hypothesis and in
this paper assume the presence of a management
channel.
Hypothesis A message expressing an opinion based
on incomplete evidence Developing the system
without knowing its interface?
9
A thing about the Management Channel
  • Cannot dictate where the management channel
    operates or does not operate of the same physical
    links. Why? Would it be more beneficial if the
    management channel takes more control of this.
  • How can this be done?

10
Relying on others?
  • What makes this better than the other research
    areas?
  • Gaps can be filled in with other work. Why
    cant it be your work?

However, there is the vast body of literature
that does deal with protocol implementation, i.e.
through abstraction...
11
A few missing links
  • Does not specify as to what the data plane does.
  • Only talks about network management, but rarely
    talks about how things are going to be forwarded
    or routed to one network to the other.
  • What about cryptography? How will this work?
  • Not a flaw but is your script inspired from a
    particular language?

12
Incentives?
  • If this is going to be adopted, will other
    networks be able to adapt to this?
  • Paper does forget to mention about ISPs.

13
Aye Aye Captain!
Modules and pipes report on their performance
with these metrics. They can also advertise the
ability to o?er performance trade-o?s in terms of
these metrics.
How are these abilities monitored? Local or
Global Algorithms? Introduction of
unnecessary(or necessary but again, adding extra
problems) tussles? There are so many issues to
be addressed. For instance If this is extended
to global usage, hot potato routing becomes
dominant!
14
What happens if you encounter an unfamiliar
protocol?
Take Skype for instance Would they give out the
protocol specifications? How would you deal with
it then?
there are scenarios where the NM will have to
deal with protocol-speci?c details.
Ok lets accept it. But how many will NM deal
with? With a protocol outburst, NM would soon
fade away.
15
Goodbye QoS!
Did the authors miss that out or was it just
unnecessary to deal with it?
16
  • VPN Single Enterprise Domain All is well
    Looks like a frog in a well scenario. How would
    you account for Multiple Domain managements
    etc..?
  • Again, VPN is being presented because it is
    well suited for their problem? VPN doesnt
    involve much of the headaches like various
    parameter tunings etc

17
Sometimes Tougher the task of altering network
operation, Tougher it is to compromise the
network security.
Con?gure connectivity between the customer-facing
interfaces ltETH,A,agt and ltETH,C,fgt for tra?c
between C1-S1 and C1-S2.
OK but how about this?
Drop connectivity between the customer-facing
interfaces ltETH,A,agt and ltETH,C,fgt for tra?c
between C1-S1 and C1-S2.
18
Problem maybe correct but is the solution too
impractical to be correct?
Maybe it works only in VPN scenarios? Lets say
you managed to get CONMan deployed Now, if
there is a change in one of the low-level
protocols, how do you plan to propagate the
changes? Would NM be a central point of
failure? CONMan should be highly
flexible/adaptable/secure?
To incorporate the never ending list of low-level
protocols
To suit various enterprises
Enterprises rely on CONMan!
19
Back to the Defense Team
Write a Comment
User Comments (0)
About PowerShow.com