networks research Bob Briscoe & Ben Bappu Dec 2004 networks - - PDF document

networks research
SMART_READER_LITE
LIVE PREVIEW

networks research Bob Briscoe & Ben Bappu Dec 2004 networks - - PDF document

networks research Bob Briscoe & Ben Bappu Dec 2004 networks research centre - themes networks of x x: computers, devices, people, physical phenomena new science framework for reasoning, proof, architecture, language,


slide-1
SLIDE 1

networks research

Bob Briscoe & Ben Bappu Dec 2004

networks research centre - themes

  • networks of x
  • x: computers, devices, people, physical phenomena
  • new science
  • framework for reasoning, proof, architecture, language, implementation
  • necessity of relaying infrastructure?
  • design for tussle: end to end design then modify to edge to edge
  • commercial service vs. collaborative self-supply
  • incentives
  • for collaborative self-supply
  • for commercial service (viability)
  • social costs (e.g. congestion, loss-of-privacy)
  • regulation & public policy
  • collaborative vs. polity

viability responsibility freedom scalability

commercial simple secure evolvable

slide-2
SLIDE 2

computational networking

process model

  • Can implement typical network processes

– routing ⊕ congestion pricing = congestion routing

  • Provides an alternative view on (distributed) computing

– convergence vs. transition – interaction vs. input/output

  • Connects with

– Economics, game theory – Constraint and functional programming, message passing – Dynamic systems, control theory,

  • ptimisation

– Electronic circuits, thermodynamics

  • Offers a framework within which to address various

research questions within networking

– layer interaction, feedback, time scales, network economics

distributed information flow networking (routing + flow) computing (information dependence)

  • bjects

agents process calculi π π π π-calculus ambients category theory (graph) rewrite systems Turing m/c graph ? Research! grid λ λ λ λ-calculus

Internet naming, addressing and routing

Research focus Previous results showed that the Internet addressing, naming and routing architectures have been violated in different points and by different technological

  • extensions. These extensions (shown in

green arrows) represent point solutions that the communications industry has issues with, created by the new business-oriented role of the Internet, that the Internet architecture did not address. Aims

  • Now major commercial environment upon which many businesses depend
  • An unforeseen role that has forced the Internet to increasingly face evolutionary challenges
  • The Internet architecture
  • The set of fundamental design principles that give direction to the evolution of the Internet
  • Mostly irrelevant and hence ignored by the communications industry
  • Many Internet extensions have violated the original architecture
  • Thus reduced the evolvability of the Internet
  • Today, many scientists believe that it is time to re-think the Internet architecture to:
  • Absorb within a new architecture the chaotic evolutionary patches that have modified today’s Internet
  • Make it relevant to the industry by introducing the missing sensitivity to commercial viability of its

extensions Our ultimate aim is to re-think, within today’s economic and societal context, the fundamental aspects of the Internet architecture that relate to addressing, naming and routing.

slide-3
SLIDE 3

Internet naming, addressing and routing

Research approach To analyse the existing extensions (as point solutions) and draw from these the design principles that, once generalised, are captured by the overall addressing, naming and routing architectures in order to naturally cope with these extensions. Achievements – a meta-architecture for Internet identification A meta-architecture for Internet identification, which defines a logical abstraction of the Internet, creating a class of architectures which capture a number of desirable properties of identification systems. It is used as a design tool to capture existing and new design principles for Internet identification by (1) showing that two properties are contradictory or cannot be both achieved, and (2) suggesting design rules or mechanisms that satisfy some property or set of properties.

Motivational Issues in Peer-to-Peer

Minimal use of central servers Edge computers (Peers) Communicating directly Sharing information or system resources or (more interesting!) peoples’ time and effort.

slide-4
SLIDE 4

Consumer Provider Other Peers

Social Control Accounting and Distribution Service Usage

token service Tokens Aggregated Information Peer Control Peer Control

Economic Architecture

In a community context Make the social control explicit Underlying atoms

  • f consumption and

contribution

www.mmapps.org

Source Target Useful relay Less interference here

MASCAPONE

MAximising Spectrum CAPacity Over mobile Networks

  • How will next generation MAC layers perform in ad-hoc

scenarios?

  • What are the metrics for ad-hoc hybrid networking?
  • What is the real value of co-operative MIMO approaches?
  • MIT’s RF relaying – is it really practical?
  • How much cross layer interaction do we need?

Simple propagation models understate gain AND overstate interference in a cooperative network

What is the transport capacity?

slide-5
SLIDE 5

control & info control & info control & info control & info control & info control & info

shared control; shared value

1) downstream knowledge upstream (re- feedback)

7 8 3 8 S1 R1 R2 13 S2

  • 5
  • 1
  • 2
  • 7

2 7 9

propagation time congestion hop count etc

shared control; shared value

2) contractual mobility

  • User-selected route vs. user-selected edge-provider

– Can the user selection of the edge provider (e.g. access provider) boost competition of the wide area market? – Or does the Internet need a ‘carrier pre-selection’ type of functionality (wide area providers selected by users)?

e2 user user

slide-6
SLIDE 6

Offer disseminator Offer disseminator Offer disseminator Offer disseminator

provider1 provider2 provider3 provider1 provider2

1

repository selector roamer Offer handler

2 3 4

contractual mobility - prototype

1

Offer disseminator

Shared control; shared value

3) Deep Packet Inspection (DPI) Project

Research Motivation

Inspect and analyse data packets beyond the IP headers and deeper into the payload.

  • Analyse potential applications of DPI for BT
  • Propose an architectural framework for DPI applications
  • Propose a control structure for managing these DPI applications
slide-7
SLIDE 7

DPI Applications

  • Firewalls, Intrusion Detection

& Intrusion Prevention

  • Security
  • Policing
  • Monitoring traffic to enforce policies &

contractual SLAs

BT’s Network Customer Services

ISP traffic VoIP traffic p2p traffic BT ISP traffic VoIP traffic p2p traffic BT

DPI Applications

VoIP p2p BT’s Network http DPI p2p http VoIP DoS Public Network

  • Shaping, Capping, Load-balancing,

Charging, QoS

  • Service Operations
  • Revenue assurance, Quality

assessment, Information gathering, SLA monitoring

  • Internal Operations
  • Legal Intercept and Call records
  • Legal Requirements
slide-8
SLIDE 8

IP End to End Quality of Service

Home Access Core Core Core Home Access App L3 L2 R R R R R R R App L3 L2 L2 L2 L2 L2 L2 L1 L1 L1 L1 L1 L1 L1 L2 L2 End End GQS region

  • DSCP aware, strict priority queuing for

guaranteed data

  • ECN marking
  • No per flow state

Congestion collapse as non rate adaptive UDP traffic increases

Congestion Collapse & DCCP End to End QoS Coordination Core IP QoS

2 QoS Modes:

  • Priority (EDCA) – simple but non

efficient for small packets

  • Polling (HCCA) – complex and still

effected by interfance Little info on how to set parameters or integration into e2e QoS system

WLAN – 802.11e GQS

ave. util/ %

congestion marking = (shadow) price

100 max

DIY QoS

target rate (shadow) price target rate (shadow) price target rate (shadow) price

a a a a a a a a

TCP ultra-elastic (p2p) inelastic (stream media)

Cambridge Uni BT Research Microsoft Research

www.m3i.org

slide-9
SLIDE 9

guaranteed QoS synthesis

congestion pricing congestion pricing

congestion pricing best effort

reservation signalling

guaranteed

1 2 4 3

Reservation enabled RSVP/ECN gateway ECN only

Reserved flow processing Policing flow entry to CP Meter congestion per peer Bulk ECN marking CP prioritised over BE

IP routers Data path processing

2 4 3 3 3 3 1 1

intensive BT research potential v. low cost PSTN replacement identical guarantees, even televotes core: classic Internet with minor mods neither overprovisioning nor QoS smarts

e2e QoS signalling co-ordination

Applicati

  • n

Applicati

  • n

IR IR HG HG IR IR IR R R R R R R R R Home Access Core R R R R R R

SS SS SS SS

Core Core Home Access

slide-10
SLIDE 10

Wireless QoS

Motivation – To support multimedia applications at wireless end nodes for Home/Private networks & Hotspots where guaranteed QoS mechanisms may

  • r may not exist on the core network.
  • D

C C P

  • A

d a p t i v e C

  • d

e c 802.11e enabled

  • Congestion Control

– DCCP/IP with competing TCP/IP flows does not starve either traffic – RTP/DCCP/IP providing feedback to rate adaptive interactive voice application

  • Lower layer resource

management

– Economic and congestion pricing framework for WLAN – ECN marking based on WLAN characteristics

  • WMM and 802.11e testbed

being built

– 802.11e simulations – WMM using CISCO Aggressive TCP TFRC – easily satisfied but driven out TFRC flow required rate Fair share rate Time Throughput

Device Evolution

Devices are the customers’ gateway to our future networks & services, in the home, at the office & out and about.

Product Innovation

  • New Retail propositions

Vendor/Manufacturer/Supplier Complementary Strategies

  • Exploit BT Exact R&V partner relationships in LoBs

Service Capability through Multiple Co-operating Devices

  • New business models

between device owners

Seamless User Profiles on Devices (Home, Business etc.)

  • Customer-connected lifestyle

matching service innovation – simple & complete

Seamless Mobility & Broadband Devices Joined-up Strategy

  • Fixed-mobile broadband as one!

Device Technology & Product Watch

  • Understand the rapidly

changing world

Integrated Fixed-Mobile Showcase / Testbed

  • Tangibly Demonstrate BT’s

services to customers

Our research will inform BT strategy and ensure that networks & services we offer in the future are complemented by available devices.

slide-11
SLIDE 11

event notification

index-based

Index channels Application channels

Payload 2 1240 Payload 2 9021 Payload 80 7873 Payload 4 1683 Payload 3 987 Payload 21 1290 Payload 6 92 100 4 3 987 4 1683 2 1240 80 7873 21 1290 102 6 Payload 4 163 2 9021 4 163 6 92 101 3 3 101 6 102 202 7 5 4 4 8 5

IP multicast Generic Announcement Protocol (GAP) Managed GAP Watchcast Application Business Solution

efficient & flexible

index-based event messaging

indexer event1 sender event2 sender event3 sender potential receivers joins (routing) data (forwarding) multipoint request-reply

IP multicast Generic Announcement Protocol (GAP) Managed GAP Watchcast Application Business Solution

zero cost for extra watches

slide-12
SLIDE 12

Privacy in Pervasive Computing

Increasing business awareness of privacy Releasing value from untapped markets Increasing service acceptance and value Developing Privacy Enhancing Technology Contributing to 21C Network Vision Privacy Control and Awareness Contributing to 21C Network Vision Privacy Control and Awareness Targeted solutions Innovative component technology Targeted solutions Innovative component technology

Healthcare & Telecare Patient records, home monitoring 21C Presence, Location, Directories, Address Books, Diaries Transport Information, ticketing, congestion, insurance Supply Chains, Logistics & Retail RFID Privacy & Security Home and office environments Ubiquitous services, home control, whereabouts No Privacy Enhancing Technology Complete Privacy Control

Users opt-

  • ut

Overly restrictive legislation Damage to brand Unusable Too costly Too intrusive

Lost market & failed services Poor uncompetitive services

Information Participation value

New valuable services e.g. post-retail RFID

Mobile Location Provider Dave

Car

Mobile

Satnav Seats

Mary

Bluetooth ID Pressure Location Mobile Location Engine mgt. GPS Location Preferences RFID Tags EPCs

Door

Open/Close Mobile Location Provider Dave

Car

Mobile

Satnav Seats

Mary

Bluetooth ID Pressure Location Mobile Location Engine mgt. GPS Location Preferences RFID Tags EPCs

Door

Open/Close

  • Collaboration with UC Berkeley
  • Member of Cambridge TIME EPSRC/WINES proposal

CII: Communications Innovation Institute

  • what’s it for?
  • co-ordinate future health of the communications industry
  • why?
  • external innovation blocked
  • but history of innovation despite operators
  • how? industry’s top analysts and architects working together

– industry structure

  • industry roadmapping
  • altering regulation

– technical architecture

  • emerging-technology watch
  • new Internet architecture

materials & process equip comp-

  • nents

equip makers network

  • wners

service providers content & applics appli- ances end users

protection against revenue leakage & virus/spam attacks

slide-13
SLIDE 13

working groups – an academia/industry bridge

public industry

research

education: Internet Economy MSc new network architecture within socio-economic processes

  • economics & design of next gen p2p
  • viral comms
  • network pricing
  • new routing & addressing arch
  • wireless over optical applicability
  • low cost WDM applicability

industry value chain

  • industry roadmapping
  • content and media (tbc)
  • photonics
  • wireless & spectrum

public policy implications

  • Wireless spectrum policy
  • Internet mediated participation
  • Broadband deployment
  • Internet Piracy

knowledge exchange commercial exploitation public agency liaison industry working groups

  • middle/edge control migration
  • intervention vs. security and privacy
  • broadband deployment
  • architecture: inter-{QoS|routing|DoS}
  • industry models for emerging tech (tbc)

business technical public policy

networks research centre - expertise

  • networking architecture, layering, interconnect,

naming & addressing

  • network games, network security
  • network pricing, business models
  • optimisation, process algebra
  • network protocol engineering & technology
  • distributed systems, platforms
  • messaging, group communications
  • technical, economic, social
slide-14
SLIDE 14

messaging

network research centre

control aspects of networking

– economics and motivation as guiding principles CII privacy architecture deep pkt inspection IP e2e QoS MIT UCL Cambridge Berkeley collab spectrum p2p motivation

comms companies public agencies

devices