SAHARA Third Winter Retreat 12-14 January 2004 Randy H. Katz, Anthony Joseph, Ion Stoica Computer Science Division Electrical Engineering and Computer Science Department University of California, Berkeley Berkeley, CA 94720-1776 1 Retreat Goals & Technology Transfer People Project Status Work in Progress Prototype Technology Early Access to Technology Promising Directions Industrial Collaborators UC Berkeley Project Team Reality Check Friends Feedback 2 Who is Here (Industry) • Cisco – Petre Dini • Crazy Tulip Systems – Chris Overton • Hewlett-Packard Labs – Wai-Tian Dan Tan • KDD Japan – Ayuymu Kubota (VIF) • Lucent Bell Labs – T. V. Lakshman • Microsoft Research – Helen Wang • NTTDoCoMo • NTT MCL – – – – Anand Desai Tetsuya Nakamura Haruhiko Nishida Satomi Okazaki • Sun Microsystems – Erik Nordmark • Univ. Helsinki/Nokia – Kimmo Raatikainen • Special Friends – John Chuang – Bryan Lyles – Doug Tygar – Daichi Funato Italics indicates Ph.D. from Berkeley VIF=Visiting Industrial Fellow 3 Green = First Retreat! Who is Here (Berkeley) • Professors – Anthony Joseph – Randy Katz – Ion Stoica • Technical & Admin Staff – Bob Miller – Glenda Smith – Keith Sklower • Grad Students – – – – – – – Sharad Agarwal Marco Barreno Weidong Cui Steve Czerwinski Ling Huang Chris Karlof Karthik Lakshminarayanan • Grad Students – – – – – – – – – – – – – – – Yin Li Sridhar Machiraju Ana Sanz Merino Xuanlong Nguyen George Porter Anantha Rajagoplala-Rao Sean Rhea Mukund Seshadri Kevin Simler Lakshmi Subramanian Mel Tsai Fang Yu Ben Zhao Alice Zheng Shelley Zhuang 4 Retreat Purpose • Fifth SAHARA Retreat – Project launched 1 July 2001 – Last year: shift to new projects • Common thread: architectural elements for future networks – “Services” inside the network: code vs. protocols, location/topology-aware – Spanning: » Independent service providers » Converged data + telecomm nets » Hetero access + core nets • Co-lo w/ROC, New Project Start – NSF Cybertrust Center Proposal: Center for Adaptive Trustworthy Systems (CATS) • Industrial feedback & directions – Plans for the new center – Industrial endorsement for the proposal 5 Project Relationships New Net Services and Applications Adaptive, Network-Aware Applications Griffin Adaptive APIs High Level APIs Tapestry Local-aware DOLR Net Storage Apps P2P Search Mobility Overlays OASIS Exposed APIs Programmable Network Elements SAHARA Composed Reachability BGP, Overlay Support Internet Indirection Infrastructure Enhanced Routing IP Layer 6 SAHARA “Elevator” Statement • New mechanisms, techniques for end-to-end services w/ desirable, predictable, enforceable properties spanning potentially distrusting service providers • Architecture for service composition and inter-operation across separate administrative domains, supporting peering and brokering, and diverse business, value-exchange, accesscontrol models 7 Routing as a Composed Service • Routing as a Reachability “Service” – Implementing paths between composed service instances, e.g., “links” within an overlay network – Multi-provider environment, no centralized control • Desirable Properties – Trust: verify believability of routing advertisements – Agility: converge quickly in response to global routing changes to retain good reachability “performance” (e.g., latency)? – Reliability: detect service composition path failures quickly to enable fast recomposition to maintain reachability – Scalability and Interoperability: Adapt protocols via processing at “impedance” matching points between administrative domains • Results are architectural elements rather than a comprehensive architecture 8 SAHARA Recent Progress • “Reachability” as a Composed Network Service – Strong focus on BGP » Internet’s primary means for managing peering and achieving end-to-end reachability » Limited visibility into AS policies makes it difficult to achieve good global behaviors from locally good specifications » Many well-known security vulnerabilities » Motivation for overlays to achieve application-specific reachability properties – Presentations during the Retreat » Sharad’s highlight on interactions between global and local routing » Matt’s talk on “Root Cause Analysis of BGP Dynamics” » Lakshmi’s talk on “Listen and Whisper: Security Mechanisms for BGP” » Lakshmi’s poster on “OverQOS: Loss-rate vs. bandwidth quality of service” 9 Other SAHARA Progress • Access Network Services – Cross-service provider authenticated roaming in WLANs (Merino, Suzuki, Matsunaga) – Cross-service provider radio resource allocation (Matsunaga) • Overlay Network Services – Tapestry (Anthony Joseph) and I3 (Ion Stoica) – Exploration of support for mobility, reliability, P2P networking 10 SAHARA Research Transitions • Other network services, migrating towards reliability and trustability – – – – Weidong: network monitoring infrastructure Fang: router level intrusion detection Mukund: end-host controlled routing Machi: confidentiality in interdomain routing • Overlays and Services for Internetworked Storage (OASIS) – Mel: Programmable Router Model and Environment – George: Streaming Packet Processing – Li: Storage Networking as an “applications” domain 11 Recent Sahara Theses • Ph.D. – Bhaskar Raman, “An Architecture for Availability and Performance in Wide-Area Service Composition,” (Ph.D., December 2002) – Yan Chen, “Scalable Efficient Network-Aware Content Distribution Networks,” (Ph.D., Dec 2003) – Morley Mao, “Solving the Interdomain Routing Puzzle—Understanding Interdomain Routing Dynamics,” (Ph.D., December 2003) – Sharad Agarwal, “Influence of Interdomain Routing on Intradomain Traffic Engineering,” (Ph.D., May 2004?) • M.S. – Lakshminarayanan Subramanian, “On Inferring the Geographic Properties of the Internet,” (M.S., May 2002). – Fang Yu, “Study of the Restoration Path Block Problem in Optical Networks,” (M.S., December 2002). – Mukund Seshadri, “A Scalable Architecture for Broadcast Federation,” (M.S., December 2002). – Weidong Cui, “Backup Path Allocation Based on a Correlated Link Failure Probability Model in Overlay Networks,” (M.S., May 2003). – George Porter, “Traffic Matrix Estimation for Low-loss Routing in Hybrid Networks,” (M.S., May 2003). – Sridhar Machiraju, “A Scalable and Robust Solution for Bandwidth Allocations,” (M.S., May 2003). 12 Center for Adaptive Trustworthy Systems Conceptual Architecture Programming Abstractions For Roll-back (Necula Crash-Only Middleware & Servers, System O&C Infrastructur e (Fox) Protocols Enabling Fast Detection & Route Recovery, Network O&C Infrastructure (Katz, Stoica) User Operator Prototype Applications: E-voting, Messaging, E-Mail, etc. Client Server Distributed Middleware SLT Services Distributed Middleware PNE Edge Network ApplicationSpecific Overlay Network EdgePNE Network Router Router Commodity Internet & IP networks Benchmarks, Tools for Human Operators (Patterson) Online Statistical Learning Algorithms (Jordan) • Security and privacy consideration embedded throughout (Tygar) • Reduction to practice of online SLT and observe/analyze/act infrastructure • Reusable embeddable components 13 Vulnerable Messaging Application that Requires Trustworthiness Net Failure DHS/Federal Network Active Adversary Service Attacks Coalition Internet Trust Relations Allies Networks Adversary Allies NetworksNet Failure Allies Networks Allies Networks Local Police, Fire, Adversary State Police Compromised Network With Embedded Adversaries Incident Reports Responder Locations GIS Data Etc. 14 Summer03 Retreat Feedback • Retreat Organization: – Better interactive session mix, poster session very productive – Keep talks SHORT and allow time for discussion following talks – Follow-up in 1-2 months, keep industrial participants involved • Technical Comments: – Problem focus: intended application and its requirements for technology being developed remains unclear » Clearly defining the need for overlays and P2P systems—what is the problem they solve and the critical application they enable? » Clearly defining the PNE model—who programs them (system programmers? end users?) and what kind of functionality run on them (network services? arbitrary applications?) – Migration from performance focus to reliability/trustability focus in collaboration with ROC project is good – Research methodology (measure, model, simulate, deploy) needs to be clearly specified 15 Plan for the Retreat • Monday, 12 January 2004 – – – – – – – – – – 0745 Depart Berkeley 1200 Arrive Granlabbaken 1200-1300 Lunch 1300-1500 Session I: Overview and Status Introductions and Retreat » Overview, Randy Katz » Randy Katz/Anthony Joseph/Ion Stoica Status Presentations » Sharad Agarwal, “Interaction of BGP and Interdomain Traffic” 1500-1530 Break 1530-1700 Session II: Dependability and Trustworthiness » Matt Caesar: "Root Cause Analysis of BGP Route Failure" » Lakshmi Subramanian: "Verifiable Protocols with Listen and Whisper" » Sridhar Machiraju: "Reconciling Confidentiality with Cooperation in Interdomain Routing" 1700-1800 Break 1800-1930 Dinner » Dinner Speaker, Chris Overton, Crazy Tulip Systems, “Strategies for Modeling Large-scale IT Systems” 1930-2100 Panel Session: Reliable Adaptive Distributed Systems (RADS) Proposal (David Patterson, Armando Fox, Ion Stoica, Michael Jordan, Doug Tygar) 2100- Social Hour 16 Plan for the Retreat • Tuesday, 13 January 2004 – 0730-0830 Breakfast – 0830-1000 OASIS Edge Services » Mel Tsai: "RouterVM Programmable Network Element Specification“ » George Porter: "Streaming Protocol Processing in PNEs“ » Weidong Cui: "Network Monitoring Infrastructure" » Fang Yu: "Router Level Support for Intrusion Detection" – 1000-1030 Break – 1030-1200 Overlay Networks I » Mukund Seshadri: "Dynamics of End Host-Controlled Routing" » Ananth Rao: "Scheduling transmissions in multihop 802.11 networks" » Steve Czerwinski: “Using Overlay Networks for Proximity-based Discovery” – 1200-1700 Bag Lunch and Afternoon Snow Sports (or work, lounge, talk, relax, etc.) – 1700-1830 Overlay Networks II » Panel Session of Short Student Talks and Following Discussion » Karthik Lakshminarayanan: "Loose virtual path abstraction" » Ben Zhao: “Infrastructure-based Resilient Routing” » Sean Rhea: Bamboo – 1830-2000 Dinner » Dinner Speaker, Paul Brett, HP, “Real-World Systems Failures, A Systemic View” – 2000-2130 Student Poster Session – 2130 Evening Socializing 17 Plan for the Retreat • Wednesday, 14 January 2004 – – – – – – – 0730-0830 Breakfast 0830-0930 RADS Feedback from Industry 0930-1000 Break and Room Checkout 1000-1200 Individual Project Feedback 1200-1300 Lunch 1300 Depart Granlibakkan 1700 Arrive Berkeley 18 Recent SAHARA-Related Publications • • • • • • • Z. Mao, J. Rexford, J. Wang, R. H. Katz, “Towards an Accurate AS-Level Traceroute Tool ,” Proceedings ACM SIGCOMM Conference, Karlsruhe, Germany, (August 2003). Y. Matsunaga, A. Merino, T. Suzuki, R. H. Katz, “Secure Authentication System for Public WLAN,” Proceedings First ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (ACM WMASH 2003), San Diego, CA, (September 2003). Y. Chen, D. Bindel, R. H. Katz, “Tomography-based Overlay Network Monitoring,” Extended Abstract, Proceedings Internet Measurement Conference (ICM-03), Miami, FL, (October 2003). L. Subramanian, I. Stoica, R. H. Katz, S. Shenker, “Listen and Whisper: Security Mechanisms for BGP,” USENIX/ACM Symposium on Networked System Design and Implementation (NSDI’04), San Francisco, CA, (March 2004). L. Subramanian, I. Stoica, R. H. Katz, H. Balakrishnan, “OverQoS: An Overlay Based Architecture for Enhancing Internet QoS,” USENIX/ACM Symposium on Networked System Design and Implementation (NSDI’04), San Francisco, CA, (March 2004). Y. Matsunaga, R. H. Katz, “Inter-Domain Radio Resource Management for Wireless LANs,” Wireless Communications and Networking Conference (WCNC’2004), Atlanta, GA, (March 2004). S. Zhuang, K. Lai, I. Stoica, R. Katz, S. Shenker, “Host Mobility Using an Internet Indirection Infrastructure,” ACM/Balzer Wireless Networking (WINET) Journal, to appear. 19 Sahara Overview Randy H. Katz Univ. of California Berkeley, CA 94720-1776 20