3. SURF as umbrella
• All ICT activities for Higher Education and Research in the
Netherlands are under the SURF umbrella
Cyber Summit 2014 — Banff, Canada — September 2014
3
Scientific Computing
& Big Data
Commercial ICT
Products & Services
National Research &
Education Network
eScience Collaboration
and Tools
4. Serving the core elements
CYBERINFRASTRUCTURE
Cyber Summit 2014 — Banff, Canada — September 2014
4
Adapted from: Berman, 2001 & Lippincott, 2011
People & Training
Broadband Network
Connectivity
Large Databases &
Libraries
High Performance Instrumentation
Computing
Collaboration
5. Friend or foe?
Cyber Summit 2014 — Banff, Canada — September 2014
5
6. Spinning out of control?
2005
130 EB
2010
1,227 EB
2015
7,910 EXABYTE
2020
1,000 ZETABYTE?
2000
Cyber Summit 2014 — Banff, Canada — September 2014
6
7. Entropy
Cyber Summit 2014 — Banff, Canada — September 2014
7
KNOWLEDGE
CHAOS
Required Processing Power
Amount of Data
Limit of
processing power
8. Long tail of science
ACCELERATION
Cyber Summit 2014 — Banff, Canada — September 2014
8
# of researchers
Scale
Large
Scale, Multi-
Disciplinary and
Complex
Small Scale
but getting
complexer
9. Secret of their success
Cyber Summit 2014 — Banff, Canada — September 2014
9
12. …or just keep patching?
Cyber Summit 2014 — Banff, Canada — September 2014
12
13. Network A Network B
Cyber Summit 2014 — Banff, Canada — September 2014
Network C
Just within our reach…
13
14. Face the chasm
WAITING TO HAPPEN
Chasm
...technology and
performance
Cyber Summit 2014 — Banff, Canada — September 2014
14
...solutions
and convenience
Techies Visionaries Pragmatics Conservatives Laggards
time
# of customers
Source: Geoffrey A. Moore c.s.
15. Closing the gap
ITS IS HAPPENING
Cyber Summit 2014 — Banff, Canada — September 2014
Source: Geoffrey A. Moore c.s.
15
Chasm
Techies Visionaries
time
# of customers
… The Rest
7-9 YEARS
2006 2009 2014 2016
16. Open Exchanges
• Open Exchanges is a stepping stone for open
collaborations (e.g. technical or organisational) where
trust plays important part
• Anyone may become a member of an Open Exchange
• Links may be connected to the Open Exchange
• All members are allowed to exchange any kind of traffic
• There’s no policy inside the Open Exchange
preventing any destination
or kind of data
• “Policy is open”
Cyber Summit 2014 — Banff, Canada — September 2014
16
Open Exchange
member
member
member member
member
member
17. Open Exchanges
• An Open Internet Exchange (e.g. AMS-IX and AlbertIX)
plays a supporting role by offering a shared and open
infrastructure where multiple networks can meet at a
central location in order to exchange IP traffic
• Open Lightpath Exchanges (e.g. MAN LAN and
Netherlight)
• Open Collaboration Exchange (OCX) is an exchange point
where (inter)national Identity Providers and Service
Providers can be interconnected at the lowest “cost”
• What is coming: Open Mobile Exchange
• Next to the technical infrastructure the exchange requires
a policy and is also likely to include a governance body
Cyber Summit 2014 — Banff, Canada — September 2014
17
18. Higher ground on Netherlight
Independent
Cyber Summit 2014 — Banff, Canada — September 2014
18
OPEN LIGHTPATH
EXCHANGE
Marketplace
Suppliers &
Customers
Economics International
Networks &
Exchanges
Cloud
Providers
Lightpath Exchange
19. Stepping stone
Cyber Summit 2014 — Banff, Canada — September 2014
19
Lightpath
Exchanges
Instruments
Service
Providers
High Performance
Computing
Institutes
Institutes
Content Delivery
Networks
20. Low prices high service
Cyber Summit 2014 — Banff, Canada — September 2014
20
21. Getting geared up
Cyber Summit 2014 — Banff, Canada — September 2014
21
22. Mobile explosion
• With around 20 million subscribers, the volume increased over
3,000% since 2008, peaking at 12 PB in first half of 2014
• Comparison: the Large Hadron Collider generates roughly 15
Petabytes annually...
12 PB
9 PB
6 PB
3 PB
Cyber Summit 2014 — Banff, Canada — September 2014
22
0 PB
2008 - H1 2009 - H1 2010 - H1 2011 - H1 2012 - H1 2013 - H1 2014 - H1
Mobile data volume in Petabyte (per half year) Source: ACM
23. Less = Free
Cyber Summit 2014 — Banff, Canada — September 2014
Wi-Fi as a Service
23
WIREFREE
EU Procurement
eduroam
MoLAN
govroam
eVA
24. Key features Mobile LAN (MoLAN)
• Scalable quality access and support beyond the confines
of the campus
• Seamless integration of 3G/4G with office and campus
Wi-Fi
- Integrate 3G/4G access with the current campus ICT environment
(monitoring, security,..)
- Bring Your Own Device: offers transparent ICT service offerings
• Unified identity management, based on eduroam
principles
• Conform 3GPP standards; works with every mobile
operator
Cyber Summit 2014 — Banff, Canada — September 2014
24
25. MoLAN options
Cyber Summit 2014 — Banff, Canada — September 2014
25
PUBLIC APN MVNO
Mobile
Operator
Mobile
Operator as
Bearer Only
Home Institution
Home
Institution
DATA
DATA
First step towards
Open Mobile
Exchange
Netherlight
Internet
Internet
26. How the solution works technically
• Device authenticates with the credentials on SIM card
• End-user specifies details for APN for edu.nl with
eduroam credentials
• Device requests access to APN
- Mobile operator uses Radius to send user information to SURFnet
- SURFnet proxies user information to the institution
- Institution informs SURFnet of successful authentication and
authorises access to institutional traffic or generic traffic
- SURFnet or Institutions assigns IP address
- Mobile operator requests L2TP tunnel from SURFnet
• User can send and receive data via 3G / 4G
Cyber Summit 2014 — Banff, Canada — September 2014
26
27. eduroam vs 4G public APN
Cyber Summit 2014 — Banff, Canada — September 2014
27
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
RADIUS
Internet
Internet
Internet
eduroam
4G Generic
Traffic
4G
Institutional
Traffic
DATA
DATA
DATA
Visited Institution
Home Institution
Mobile
Operator
DATA
28. Own the card
Cyber Summit 2014 — Banff, Canada — September 2014
28
29. One iMNC to rule them all
• Each NREN can choose its own mobile network operator
to handle traffic
• When traveling, local operator sees international MNC and
hence always associates the user with the local NREN
• Use a federated authentication approach to authenticate
users
• Route traffic to the internet, as we use to do for fixed
infrastructures
• No SIM exchanges when NREN chooses other mobile
network operator
• Smart card can contain other applications
• One can pay an operator / MVNE to manage the service
Cyber Summit 2014 — Banff, Canada — September 2014
29
30. eduroam vistor access
Cyber Summit 2014 — Banff, Canada — September 2014
30
Provide Individual
Self-Service
Through SMS
Access Day passes
Bulk Provisioning
eVA