Title: SAHARA Third Winter Retreat 12-14 January 2004
1SAHARA Third Winter Retreat12-14 January 2004
- Randy H. Katz, Anthony Joseph, Ion Stoica
- Computer Science Division
- Electrical Engineering and Computer Science
Department - University of California, Berkeley
- Berkeley, CA 94720-1776
2Retreat Goals Technology Transfer
People Project Status Work in Progress Prototype
Technology
Early Access to Technology Promising Directions
Reality Check Feedback
3Who is Here (Industry)
- Cisco
- Petre Dini
- Crazy Tulip Systems
- Chris Overton
- Hewlett-Packard Labs
- Wai-Tian Dan Tan
- KDD Japan
- Ayuymu Kubota (VIF)
- Lucent Bell Labs
- T. V. Lakshman
- Microsoft Research
- Helen Wang
- NTTDoCoMo
- Daichi Funato
- NTT MCL
- Anand Desai
- Tetsuya Nakamura
- Haruhiko Nishida
- Satomi Okazaki
- Sun Microsystems
- Erik Nordmark
- Univ. Helsinki/Nokia
- Kimmo Raatikainen
- Special Friends
- John Chuang
- Bryan Lyles
- Doug Tygar
Italics indicates Ph.D. from Berkeley VIFVisiting
Industrial Fellow Green First Retreat!
4Who is Here (Berkeley)
- Professors
- Anthony Joseph
- Randy Katz
- Ion Stoica
- Technical Admin Staff
- Bob Miller
- Glenda Smith
- Keith Sklower
- Grad Students
- Sharad Agarwal
- Marco Barreno
- Weidong Cui
- Steve Czerwinski
- Ling Huang
- Chris Karlof
- Karthik Lakshminarayanan
- Grad Students
- Yin Li
- Sridhar Machiraju
- Ana Sanz Merino
- Xuanlong Nguyen
- George Porter
- Anantha Rajagoplala-Rao
- Sean Rhea
- Mukund Seshadri
- Kevin Simler
- Lakshmi Subramanian
- Mel Tsai
- Fang Yu
- Ben Zhao
- Alice Zheng
- Shelley Zhuang
5Retreat Purpose
- Fifth SAHARA Retreat
- Project launched 1 July 2001
- Last year shift to new projects
- Common thread architectural elements for future
networks - Services inside the network code vs.
protocols, location/topology-aware - Spanning
- Independent service providers
- Converged data telecomm nets
- Hetero access core nets
- Co-lo w/ROC, New Project Start
- NSF Cybertrust Center Proposal Center for
Adaptive Trustworthy Systems (CATS) - Industrial feedback directions
- Plans for the new center
- Industrial endorsement for the proposal
6Project Relationships
P2P Search Mobility Overlays
Griffin
New Net Services and Applications
Adaptive, Network-Aware Applications
Net Storage Apps
Adaptive APIs
OASIS Programmable Network Elements
Exposed APIs
Tapestry Local-aware DOLR
High Level APIs
Enhanced Routing
SAHARA ComposedReachability BGP, Overlay
Support
Internet Indirection Infrastructure
IP Layer
7SAHARA Elevator Statement
- New mechanisms, techniques for end-to-end
services w/ desirable, predictable, enforceable
properties spanning potentially distrusting
service providers - Architecture for service composition and
inter-operation across separate administrative
domains, supporting peering and brokering, and
diverse business, value-exchange, access-control
models
8Routing as a Composed Service
- Routing as a Reachability Service
- Implementing paths between composed service
instances,e.g., links within an overlay
network - Multi-provider environment, no centralized
control - Desirable Properties
- Trust verify believability of routing
advertisements - Agility converge quickly in response to global
routing changes to retain good reachability
performance (e.g., latency)? - Reliability detect service composition path
failures quicklyto enable fast recomposition to
maintain reachability - Scalability and Interoperability Adapt protocols
via processing at impedance matching points
between administrative domains - Results are architectural elements rather than a
comprehensive architecture
9SAHARA Recent Progress
- Reachability as a Composed Network Service
- Strong focus on BGP
- Internets primary means for managing peering and
achieving end-to-end reachability - Limited visibility into AS policies makes it
difficult to achieve good global behaviors from
locally good specifications - Many well-known security vulnerabilities
- Motivation for overlays to achieve
application-specific reachability properties - Presentations during the Retreat
- Sharads highlight on interactions between global
and local routing - Matts talk on Root Cause Analysis of BGP
Dynamics - Lakshmis talk on Listen and Whisper Security
Mechanisms for BGP - Lakshmis poster on OverQOS Loss-rate vs.
bandwidth quality of service
10Other SAHARA Progress
- Access Network Services
- Cross-service provider authenticated roaming in
WLANs (Merino, Suzuki, Matsunaga) - Cross-service provider radio resource allocation
(Matsunaga) - Overlay Network Services
- Tapestry (Anthony Joseph) and I3 (Ion Stoica)
- Exploration of support for mobility, reliability,
P2P networking
11SAHARA Research Transitions
- Other network services, migrating towards
reliability and trustability - Weidong network monitoring infrastructure
- Fang router level intrusion detection
- Mukund end-host controlled routing
- Machi confidentiality in interdomain routing
- Overlays and Services for Internetworked Storage
(OASIS) - Mel Programmable Router Model and Environment
- George Streaming Packet Processing
- Li Storage Networking as an applications
domain
12Recent Sahara Theses
- Ph.D.
- Bhaskar Raman, An Architecture for Availability
and Performance in Wide-Area Service
Composition, (Ph.D., December 2002) - Yan Chen, Scalable Efficient Network-Aware
Content Distribution Networks, (Ph.D., Dec 2003) - Morley Mao, Solving the Interdomain Routing
PuzzleUnderstanding Interdomain Routing
Dynamics, (Ph.D., December 2003) - Sharad Agarwal, Influence of Interdomain Routing
on Intradomain Traffic Engineering, (Ph.D., May
2004?) - M.S.
- Lakshminarayanan Subramanian, On Inferring the
Geographic Properties of the Internet, (M.S.,
May 2002). - Fang Yu, Study of the Restoration Path Block
Problem in Optical Networks, (M.S., December
2002). - Mukund Seshadri, A Scalable Architecture for
Broadcast Federation, (M.S., December 2002). - Weidong Cui, Backup Path Allocation Based on a
Correlated Link Failure Probability Model in
Overlay Networks, (M.S., May 2003). - George Porter, Traffic Matrix Estimation for
Low-loss Routing in Hybrid Networks, (M.S., May
2003). - Sridhar Machiraju, A Scalable and Robust
Solution for Bandwidth Allocations, (M.S., May
2003).
13Center for Adaptive Trustworthy
SystemsConceptual Architecture
User
Programming Abstractions For Roll-back (Necula
Operator
Prototype Applications E-voting,
Messaging, E-Mail, etc.
Benchmarks,Tools for Human Operators (Patterson)
Crash-Only Middleware Servers, System
OC Infrastructure (Fox)
SLT Services
Application- Specific Overlay Network
Online Statistical Learning Algorithms (Jordan)
PNE
PNE
Edge Network
Edge Network
Protocols Enabling Fast Detection Route
Recovery, Network OC Infrastructure (Katz,
Stoica)
Router
Router
CommodityInternet IP networks
- Security and privacy consideration embedded
throughout (Tygar) - Reduction to practice of online SLT and
observe/analyze/act infrastructure - Reusable embeddable components
14Vulnerable Messaging Application that Requires
Trustworthiness
DHS/Federal Network
Coalition Internet
Trust Relations
Allies Networks
Allies Networks
Allies Networks
Allies Networks
Local Police, Fire, State Police
Incident Reports Responder Locations GIS Data Etc.
Compromised Network With Embedded Adversaries
15Summer03 Retreat Feedback
- Retreat Organization
- Better interactive session mix, poster session
very productive - Keep talks SHORT and allow time for discussion
following talks - Follow-up in 1-2 months, keep industrial
participants involved - Technical Comments
- Problem focus intended application and its
requirements for technology being developed
remains unclear - Clearly defining the need for overlays and P2P
systemswhat is the problem they solve and the
critical application they enable? - Clearly defining the PNE modelwho programs them
(system programmers? end users?) and what kind of
functionality run on them (network services?
arbitrary applications?) - Migration from performance focus to
reliability/trustability focus in collaboration
with ROC project is good - Research methodology (measure, model, simulate,
deploy) needs to be clearly specified
16Plan for the Retreat
- Monday, 12 January 2004
- 0745 Depart Berkeley
- 1200 Arrive Granlabbaken
- 1200-1300 Lunch
- 1300-1500 Session I Overview and Status
Introductions and Retreat - Overview, Randy Katz
- Randy Katz/Anthony Joseph/Ion Stoica Status
Presentations - Sharad Agarwal, Interaction of BGP and
Interdomain Traffic - 1500-1530 Break
- 1530-1700 Session II Dependability and
Trustworthiness - Matt Caesar "Root Cause Analysis of BGP Route
Failure" - Lakshmi Subramanian "Verifiable Protocols with
Listen and Whisper" - Sridhar Machiraju "Reconciling Confidentiality
with Cooperation in Interdomain Routing" - 1700-1800 Break
- 1800-1930 Dinner
- Dinner Speaker, Chris Overton, Crazy Tulip
Systems, Strategies for Modeling Large-scale IT
Systems - 1930-2100 Panel Session Reliable Adaptive
Distributed Systems (RADS) Proposal (David
Patterson, Armando Fox, Ion Stoica, Michael
Jordan, Doug Tygar) - 2100- Social Hour
17Plan for the Retreat
- Tuesday, 13 January 2004
- 0730-0830 Breakfast
- 0830-1000 OASIS Edge Services
- Mel Tsai "RouterVM Programmable Network Element
Specification - George Porter "Streaming Protocol Processing in
PNEs - Weidong Cui "Network Monitoring Infrastructure"
- Fang Yu "Router Level Support for Intrusion
Detection" - 1000-1030 Break
- 1030-1200 Overlay Networks I
- Mukund Seshadri "Dynamics of End Host-Controlled
Routing" - Ananth Rao "Scheduling transmissions in multihop
802.11 networks" - Steve Czerwinski Using Overlay Networks for
Proximity-based Discovery - 1200-1700 Bag Lunch and Afternoon Snow Sports (or
work, lounge, talk, relax, etc.) - 1700-1830 Overlay Networks II
- Panel Session of Short Student Talks and
Following Discussion - Karthik Lakshminarayanan "Loose virtual path
abstraction" - Ben Zhao Infrastructure-based Resilient
Routing - Sean Rhea Bamboo
- 1830-2000 Dinner
18Plan for the Retreat
- Wednesday, 14 January 2004
- 0730-0830 Breakfast
- 0830-0930 RADS Feedback from Industry
- 0930-1000 Break and Room Checkout
- 1000-1200 Individual Project Feedback
- 1200-1300 Lunch
- 1300 Depart Granlibakkan
- 1700 Arrive Berkeley
19Recent SAHARA-Related Publications
- Z. Mao, J. Rexford, J. Wang, R. H. Katz,
Towards an Accurate AS-Level Traceroute Tool ,
Proceedings ACM SIGCOMM Conference, Karlsruhe,
Germany, (August 2003). - Y. Matsunaga, A. Merino, T. Suzuki, R. H. Katz,
Secure Authentication System for Public WLAN,
Proceedings First ACM International Workshop on
Wireless Mobile Applications and Services on WLAN
Hotspots (ACM WMASH 2003), San Diego, CA,
(September 2003). - Y. Chen, D. Bindel, R. H. Katz, Tomography-based
Overlay Network Monitoring, Extended Abstract,
Proceedings Internet Measurement Conference
(ICM-03), Miami, FL, (October 2003). - L. Subramanian, I. Stoica, R. H. Katz, S.
Shenker, Listen and Whisper Security Mechanisms
for BGP, USENIX/ACM Symposium on Networked
System Design and Implementation (NSDI04), San
Francisco, CA, (March 2004). - L. Subramanian, I. Stoica, R. H. Katz, H.
Balakrishnan, OverQoS An Overlay Based
Architecture for Enhancing Internet QoS,
USENIX/ACM Symposium on Networked System Design
and Implementation (NSDI04), San Francisco, CA,
(March 2004). - Y. Matsunaga, R. H. Katz, Inter-Domain Radio
Resource Management for Wireless LANs, Wireless
Communications and Networking Conference
(WCNC2004), Atlanta, GA, (March 2004). - S. Zhuang, K. Lai, I. Stoica, R. Katz, S.
Shenker, Host Mobility Using an Internet
Indirection Infrastructure, ACM/Balzer Wireless
Networking (WINET) Journal, to appear.
20SaharaOverviewRandy H. KatzUniv. of
CaliforniaBerkeley, CA94720-1776