3
Randy H. Katz, Anthony Joseph, Ion Stoica
Computer Science Division
Electrical Engineering and Computer Science Department
University of California, Berkeley
Berkeley, CA 94720-1776
1
People
Project Status
Work in Progress
Prototype Technology
UC Berkeley Project Team
Early Access to Technology
Promising Directions
Reality Check
Feedback
Industrial Collaborators
Friends
2
• AT&T Research
– Yatin Chawathe
• CMU
– Hui Zhang
• Ericsson Research
– Per Johansson (VIF)
– Martin Korling
• Hewlett-Packard Labs
– John Apostolopoulos
– Wai-Tian Dan Tan
• Intel Research
– Timothy Roscoe
• Keynote Systems
– Chris Overton
• Microsoft Research
– Venkat Padmanabhan
– Lili Qui
– Helen Wang
• Nokia
– Hannu Flinck
• Nortel Networks
– Tal Lavian (PhD student)
• NTTDoCoMo
– Takashi Suzuki (VIF)
– Gang Wu
• Sprint ATL
– Bryan Lyles
– Paul Jardetzky
• UC Davis
– Chen-nee Chuah
– Dipak Ghosal
• Univ. Helsinki
– Kimmo Raatikainen
• Univ. Washington
– Tom Anderson
• Other Affiliation
– Peter Danzig
Italics indicates Ph.D. from Berkeley
VIF=Visiting Industrial Fellow 3
• Professors
– Anthony Joseph
– Randy Katz
– Ion Stoica
– Doug Tygar
• Postdocs
– Kevin Lai
• Technical & Admin Staff
– Nathan Berneman
– Bob Miller
– Keith Sklower
• Grad Students
– Sharad Agarwal
– Matt Caesar
– Weidong Cui
– Steve Czerwinski
• Grad Students
– Yitao Duan
– Ling Huang
– Almadena Konrad
– Karthik Lakshminarayanan
– Yin Li
– Huang Ling
– Sridhar Machiraju
– George Porter
– Bhaskar Raman
– Anantha Rajagoplala-Rao
– Mukund Seshadri
– Jimmy Shih
– Lakshmi Subramanian
– Ben Zhao
– Shelley Zhuang
4
• Second SAHARA retreat
– Project launched 1 July 2001
– Review progress, set directions, particularly in terms of integrating the diverse efforts underway
• “Generation after next” networks
– Software “agents,” not protocols
– Converged data and telecommunications networks
– Heterogeneous access plus core networks
• Emerging network-aware distributed architecture
– Confederation vs. brokering in service provisioning
– Exploiting network structure-awareness
– Four layer “reference” architecture
• Industrial feedback and directions
– Real-world networking problems/limitations
– Helping us do relevant research at Internet-scale
5
• Monday, 10 June 2002
– 1200-1315 Lunch
– 1315-1500 Retreat Overview and Introductions (Randy)
» Retreat Overview & Sahara Progress, Randy Katz
» Research on Adaptive Systems, Anthony Joseph
» I3 Overview, Ion Stoica
– 1500-1530 Break
– 1530-1700 Routing as a Cross-Domain Service (Randy)
» Ion Student: Multicast on I3
» Mukund: Interdomain Multicast
» Sharad: Policy Agent for Interdomain Routing
» Lakshmi: Overlay QoS
– 1700-1730 View from a Tier-1 ISP (Chen-nee)
– 1730-1800 Break
– 1800-1915 Dinner (Joint with ROC Retreat)
– 1915-2015 Alfred Spector, IBM (Joint with ROC Retreat)
– 2015-2100 Student Poster Session
6
• Tuesday, 11 June 2002
– 0730-0830 Breakfast
– 0830-1000 Joint I3/Tapestry Session (Kubi/Ion)
» Services on Infrastructure, Kubi/Ion
» Mobility on I3, Shelley/Kevin
» Mobility on Tapestry, Ben
– 1000-1030 Break
– 1030-1200 Adaptation and Applications (Anthony)
» Modeling/Analysis of Non-Stationary Net Characteristics, Almudena
» Always Best Connected, Machi
» VoIP Gateway Selection, Matt
– 1200-1300 Lunch
– 1300-1600 Long Break
– 1600-1800 SAHARA Architecture and Brainstorming Session (Randy)
» Four Layer Architecture, Bhaskar
» Hot Spot WLAN Testbed for Sahara Integration, Jimmy
– 1800-1915 Dinner (Joint with ROC Retreat)
– 1915-2000 Panel on Robust Manageable Distributed Systems
– 2000-2130 Second Graduate Student Poster Session
7
• Wednesday, 12 June 2002
– 0730-0830 Breakfast
– 0830-1000 Six Month Planning (Anthony)
– 1000-1030 Break/Room Checkout/Photo Session
– 1030-1200 Industrial Feedback (Randy)
– 1200-1300 Lunch
– 1300-1700 Bus back to Berkeley
8
• S ervice
• A rchitecture for
• H eterogeneous
• A ccess,
• R esources, and
• A pplications
9
Babblefish
Translator
JAL
UI
Restaurant
Guide Service
NTTDoCoMo
Zagat Guide
Sprint
User
Tokyo
User
Salt Lake
City
10
• New mechanisms, techniques for end-to-end services w/ desirable, predictable, enforceable properties spanning potentially distrusting service providers
– Architecture for service composition & inter-operation across separate admin domains, supporting peering & brokering, and diverse business, value-exchange, access-control models
– Functional elements
» Service discovery
» Service-level agreements
» Service composition under constraints
» Redirection to a service instance
» Performance measurement infrastructure
» Constraints based on performance, access control, accounting/billing/settlements
» Service modeling and verification
11
Cable
Modem
Access
Networks
Premisesbased
LAN
Transit Net
LAN
LAN
Premisesbased
Core Networks
Private
Peering
WLAN Transit Net
WLAN
WLAN
NAP
Internet
Datacenter
Analog
Operatorbased
Cell
Cell
Cell
Regional
Public
Peering
Data
H.323
Voice
Transit Net
PSTN
RAS DSLAM
H.323
Data
Voice
Wireline
Regional
12
Negotiation & control path
Service Service Service
Data flow
Negotiation & control path
Broker
Service
Data flow
Service Service
13
End-User Applications
Applications Services
Middleware Services
End-to-End Network
With Desirable Properties
Enhanced Paths
Enhanced Links
IP Network
14
Composed Service at Layer i
Measurement-based
Adaptation
Interoperabilty
Dynamic Resource
Allocation
Policy
Management
Trust Management/
Verification
Underlying
Composition
Techniques
Component Services
Services at Layer i-1 at Layer i
15
• Measurement-based Adaptation
– Examples
» General-purpose third party end-to-end Internet host distance monitoring and estimation service
» Universal In-box: Application-specific middleware measurement layer to exchange network and server load using link-state algorithm
» Content Distribution Networks: measurement-based
DNS-based server selection to redirect client to closest service instance
16
• Utility-based Resource Allocation Mechanisms
– Examples
» Auctions to dynamically allocate resources; applied for spectrum/bandwidth resource assignments to MVNO from underlying competiting MNOs
» Congestion pricing: influence user behavior to better utilize scarce resources; applied in:
• Voice port allocation to user-initiated calls in H.323 gateway/Voice over IP service management
• Wireless LAN bandwidth allocation and management
• H.323 gateway selection, redirection, and load balancing for Voice over IP services
17
• Trust Mgmt/Verification of Service & Usage
– Authentication, Authorization, Accounting Services
» Authorization control scheme w/ credential transformations to enable cross-domain service invocation
» Federated admin domains with credential transformation rules based on established peering agreements
» AAA server makes authorization decisions, liberating providers from preparing rules for each affiliated domain
– Service Level Agreement Verification
» Verification and usage monitoring to ensure properties specified in
SLA are being honored
» Border routers monitoring control traffic from different providers to detect malicious route advertisements
18
• Policy Management
– Visibility into local policies to better coordinate global policies among (cooperating) service providers
– Developing inter-AS architecture for load balancing, performance and failure mode policies to be applied throughout the network
» Internet topology discovery through AS relationship map of the Internet plus measurement infrastructure
» Policy agent framework for inter-AS negotiation to manage incoming traffic
19
• Interoperability through Transformation
– Interoperability of data, protocols, policies among composed service providers
– Example
» Broadcast federation: global multicast service composed from multicast implementations in different provider domains
» Protocol transformation gateways between admin domains employing non-interoperable multicast protocol implementations
20
• Goal: Evolve (mobile) Internet architecture to better support multi-network/multi-service provider model
– Dynamic environment, location-based implies larger numbers of service providers & service instances
• Status: architectural specification driven by selected applications and underlying wide-area services
• Focus:
– Composition across confederated vs. independent service providers: peer-to-peer vs. brokering
– Explore new techniques/technologies:
» Market-based mechanisms
» Trust management, SLA verification, perf. monitoring
21
44