Download Scout: A Communication-Oriented Operating System

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Net neutrality wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Deep packet inspection wikipedia , lookup

Network tap wikipedia , lookup

Internet protocol suite wikipedia , lookup

Peering wikipedia , lookup

Computer network wikipedia , lookup

Net neutrality law wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Airborne Networking wikipedia , lookup

Net bias wikipedia , lookup

Peer-to-peer wikipedia , lookup

Quality of service wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Transcript
Grand Challenges in Networking
Larry Peterson
Princeton University / Intel Research
1
Catch-22
• The Internet is a huge commercial success
– increasing our dependency on it
– making it increasingly ossified
• Ossification makes the Internet vulnerable
– susceptible to attacks
– increasingly brittle
– growing management burden
• Ossification also marginalizes researchers
– difficult to deploy new solutions
Central Challenge: Evolving the Internet
• Lesson from the Internet…
– Flexibility, deployability, and evolvability are achieved
only when the truly universal portions of the architecture
are truly minimal.
– Not all questions can be answered quantitatively;
attention must also be paid to how interest groups affect
protocol design, so called tussles in cyberspace.
Evolvability by Widening the Waist
Applications
IP
+ QoS + multicast + caching + …
Transport Technologies
Evolvability through Overlay Networks
• Add a new layer to the network architecture
– use overlays to deploy disruptive technology
– use overlays to application-tune the network
• Multiple vantage points…
– enables observing and adapting to network behavior
– allows close proximity to data sources & sinks
• Examples
– network-embedded storage / content distribution
– anomaly detection / measuring the network
– robust routing / multicast routing
Technical Challenges
• Resource Allocation
– create an efficient market for acquiring resources
• Information Discovery & Dissemination
– enable information flow between layers
• Virtualization
– deploy version n on version n-1