SlideShare une entreprise Scribd logo
1  sur  41
Télécharger pour lire hors ligne
The Pouzin Society	

© John Day, 2013 1	

Rights Reserved	

DAFs and Management
in RINA	

PSOC Workshop	

Dublin, Ireland	

John Day and Eleni Trouva
The Pouzin Society	

© John Day, 2013 2	

Rights Reserved	

A DAF consists of two or more DAPs	

•  Notice that everything is a DAF. An Application that does not use
IPC has no output and hence does nothing.	

•  A DAF in which all DAPs are of the same type is homogeneous.	

•  A DAF with DAPs of different types is heterogeneous.	

•  A new Application Process joining a DAF must enroll.	

–  It works just like DIFs, actually DIFs work just like DAFs.	

•  The DAF may assign the member DAPs a synonym with scope
limited to the DAF and structured to facilitate its use within the DAF.
The Pouzin Society	

© John Day, 2013 3	

Rights Reserved	

DAFs Operate Over A DIF	

•  There seems to be no architectural reason why not.	

•  This requires at least one DAP relaying which could allow information
to leak between domains.	

•  Rules can be made but are hard to enforce, but these are not as strong as
it being enforced by the structure.	

Distributed Application Facility (DAF)
Distributed IPC Facility (DIF)
Can a DAF span more than One DIF?	

DIF DIF
The Pouzin Society	

© John Day, 2013 4	

Rights Reserved	

A DAP Consists of	

•  This requires considerably more exploration.	

•  Conjecture: In general the Tasks do not use IPC, but the RIB Daemon
makes the information available that the tasks need.	

–  IOW, the function of a distributed application is reduced to a local
programming problem.	

–  Not only is there only one application protocol but there is only one user
of that application protocol?	

Sched
Mem
Mgt IPC
Local Resource
Management
Tasks
IPCManagement	

RIBDaemon	

ResourceAllocation	

DAFManagement	

Distributed Resource
Management
The Pouzin Society	

© John Day, 2013 5	

Rights Reserved	

DAP Infrastructure	

•  DAF Management is the local task involved in the management of the
DAF as a whole. It can range in complexity from a simple agent to a
full participant in the management. (more on this later)	

•  Task Scheduling - is the local task that coordinates with its peers the
work of the DAF. (In a DIF, this is generally relates to routing and QoS.)	

•  RIB Daemon - is the local task that ensures replicated information in
the RIB is updated as required and services requests for information
from the Tasks of the DAF. (In a DIF, this is a generalization of combining
routing update and event management.)	

•  IPC Management - IPC Management manages the DAP’s use of the
underlying DIF to communicate with its members. (There is much more to
say about this)
The Pouzin Society	

© John Day, 2013 6	

Rights Reserved	

IPC Management	

•  In the IPC Model, there was a function that was used to choose which
DIF to use. This is it.	

•  IPC Management is the part of a DAP that manages the use of the
supporting DIF.	

–  SDU Protection and Multiplexing are the same as in DIFs.	

–  The IPC Resource Manager (IRM) does the actual management	

–  The Inter-DIF-Directory (IDD) is used to find applications that may be on
DIFs that this DAP does not have direct access to.	

SDU Protection
Muxing
IDDIPC Resource
Mngt (IRM)
The Pouzin Society	

© John Day, 2013 7	

Rights Reserved	

Naming Considerations for DAFs	

•  The members of a DAF cooperate to perform a set of functions. Hence,
they may have a shared schema that describes the information they use.	

–  And policies governing replication, ACID, authoritative value, etc.	

•  This schema may or may not be made visible to the users of the DAF.	

•  One of the roles of the RIB Daemon is to maintain the mapping
between this schema and how to access the information, i.e. where in
the DAF this information resides.	

–  Hence, synonyms may be assigned to facilitate this, e.g. DHTs, LC	

•  The Tasks of the DAF use this schema to access the information
required to perform the functions of the DAF.	

–  The schema made visible by the tasks may be different than the schema
used within the RIB.
The Pouzin Society	

© John Day, 2013 8	

Rights Reserved	

Very Interesting . . .	

•  How much in common DAFs and DIFs are:	

–  SDU Protection	

–  Multiplexing	

–  RIB Daemon	

–  Enrollment	

–  Addresses (Synonyms)	

•  Ignoring differences of policies, not much is unique to DIFs:	

–  Flow Allocator	

–  Delimiting	

–  Error and Flow Control	

–  (Relaying)	

•  Like I said, Very Interesting. . .
The Pouzin Society	

© John Day, 2013 9	

Rights Reserved	

Can DAFs Use DAFs?	

•  Yes, of course. But there are two forms it can take.	

–  Invoke 	

–  RPC	

•  In general, a DAF provides some function (or set of functions) and will
provide the result of that function to the member of the DAF that
invoked.	

–  Assume DAF B provides f(x) and it is invoked by a member of DAF A	

–  B returns the result to the member that made the request. The fact that it
was a distributed computation is not visible to A, is termed asymmetric.	

–  A rare form of DAF, where performing f(x) by one user may result in f-1(x)
being performed elsewhere, is termed symmetric, e.g. a DIF.	

DAF A	

DAF B	

 DAF C	

y = f(x)
The Pouzin Society	

© John Day, 2013 10	

Rights Reserved	

DAFs Can Include DAFs	

•  A DAF can include another DAF in a symbiotic relation, where the
encompassing DAF provides all of the infrastructure services, 	

•  Distinct DAF where the encompassed DAF provides its own
infrastructure.	

DAF A	

DAF B
The Pouzin Society	

© John Day, 2013 11	

Rights Reserved	

Can DAFs Use DAFs? (cont) 	

•  The Remote Procedure Call form:	

–  A DAP, a, in DAF A opens a connection to a DAP, b, in DAF B, (which
includes authenticating) and sends f(x).	

•  a and b must be in two DAFs at the same time. 	

–  This could constitute any number of security problems.	

•  Information available to a as a member of A may not be shared with B. Major
assumptions have to be made about the veracity of a. 	

•  The previous method provided more structural isolation.	

–  Note that f(x) is not enrollment. For this sort of service, there are a
number of possibilities: distinct DAN, distinct AE in a DAP, or distinct
DAPs to provide the function and isolate it from the rest of the DAF.	

DAF A	

 DAF B	

DIF
The Pouzin Society	

© John Day, 2013 12	

Rights Reserved	

Can DAFs Use DAFs? (cont)	

•  Do all members of A have access to the same supporting DAFs?	

–  For a homogeneous DAF, yes. For a heterogeneous DAF, perhaps not.	

–  If one member of A invokes f(x), the result might not be the same if another
member of A invokes f(x)	

DAF A	

DAF B	

 DAF C	

DAF A	

DAF B	

 DAF C	

y = f(x)	

 y = f(x)	

where y may not equal y
The Pouzin Society	

© John Day, 2013 13	

Rights Reserved	

Can DAFs Use DAFs? (still cont)	

•  A DIF is a special case such that when f(x) is invoked, f-1(x) is invoked
elsewhere, i.e. symmetric.	

–  Are there other forms of symmetric DAFs where f(x) causes action at a
distance where f, f-1, or even g are invoked?	

•  Yes, email, various messaging schemes or some delay tolerant networks	

•  Ultimately, it would seem that a DAF has at least one supporting DIF for
sharing information among its members.	

–  Is there an example that proves this statement wrong?	

DAF A	

DAF B	

 DAF C
The Pouzin Society	

© John Day, 2013 14	

Rights Reserved	

Conjectures	

•  Peer to Peer [sic] systems are asymmetric homogeneous DAFs, where
the RIB Daemon maintains a schema to locate information at one or
more members of the DAF and then transfer the information to the
requesting DAF member.	

•  Email is a symmetric DAF that stores a message with the user of
another member. The message may be retrieved at some point by
another member of this DAF or by another DAF.	

–  Mail could be a DIF if there is an upper bound on how long a message
will be held before pick up.	

•  Content-centric networking is simply a distributed database DAF.	

•  Others?
The Pouzin Society	

© John Day, 2013 15	

Rights Reserved	

Management DAFs
The Pouzin Society	

© John Day, 2013 16	

Rights Reserved	

An Important Class of DAFs:
DAF Management Systems	

•  There are four major kinds of distributed management systems (DMS):	

–  Operating System 	

 	

– Network Management	

–  Distributed Applications 	

 – Name Space Management	

•  There were the beginnings of progress in this area in the late 80s.	

•  However, thanks to the SNMP debacle of the early 90s,	

–  The IETF were played for suckers and took the bait 	

•  It pretty much reverted to the primitive state of 70s with ad hoc,
largely, proprietary solutions and kludges,	

•  Effectively aimed at keeping account control and using management as
a barrier to entry.
The Pouzin Society	

© John Day, 2013 17	

Rights Reserved	

DAF Management Systems	

•  There is a commonality to their structure and	

•  A range in their complexity from distributed to centralized	

•  Each DAF/DIF has a DAF Management Task. These constitute data
collection and autonomic functions, what IEEE calls layer management.	

•  The DAF Manager can be considered the nervous system of a DAF.	

–  A DAF Manager might manage more than one DAF or 	

–  In a degenerate case, the DAF Management Tasks might constitute the DAF
Manager.	

DAF Manager
The Pouzin Society	

© John Day, 2013 18	

Rights Reserved	

Application and Operating System DMS	

•  Application-DMSs will generally be needed for large complex
applications and of course, are very application specific, so there is not
much we can say beyond the general model.	

•  A traditional OS is a heterogeneous DAF that includes the peripherals.
–  The traditional device drivers are members of the DAF.
–  In the case of the disk, it might have several members: one, looks like a
file system, one that looks like a database, and one that yields track and
sector access.
–  And a short step from this to this:
USB-DIF WiFi-DIF
OS - DMS
Printer Disk
Laptop
System
The Pouzin Society	

© John Day, 2013 19	

Rights Reserved	

Even More Distributed	

•  A traditional OS is a heterogeneous DAF that includes the peripherals.
–  Where ever they are.
•  Somehow this is much different once you look at the picture.	

•  An OS is distributed resource manager that in previous years operated
under severe connectivity constraints.	

•  The differences between OS and Network Management becomes a
matter of degree.	

OS - DAF
Printer Disk
Laptop
System
The Pouzin Society	

© John Day, 2013 20	

Rights Reserved	

We Know More About This	

•  And down the side were the labels	

•  This became the core of our approach to Network Management	

Cerebellum	

	

Cerebrum	

	

Hypothalamus	

(Ganglia)	

	

Peripheral	

Increasing	

Aggregation	

Sensor	

Agent	

Manager	

Coordinator	

Raw Data	

Filtered	

Processed Data	

Planning Data	

Increasing	

Cycle Time
The Pouzin Society	

© John Day, 2013 21	

Rights Reserved	

But More Importantly It was Clear that
Network Management is	

•  The whole point is that events are happening too fast for
humans to be in the loop. They can manage, but not control.	

•  Control must be autonomic.	

Monitor and Repair	

But not Control
The Pouzin Society	

© John Day, 2013 22	

Rights Reserved	

The Management Architecture
Central Nervous System	

•  While there might be managers for distinct subnets (domains) and the subnets
might be a hierarchy, the managers were peers.	

–  Many talked about managers of managers but there is really nothing for second level
managers to do. (that generalizes?)	

•  Fault Management isn t an app, it is a management system with a small domain.	

•  Then Realized what was missing: Where s the Homunculus?	

Agent	

Event	

Config	

Perf	

Fault	

Agent	

Agent	

Agent	

Agent	

Reliable	

Req/Resp	

Best Effort	

Telemetry	

Agent	

MIB	

Network	

Management	

System (NMS)	

Devices to be Managed	

NMS	

Agent	

 Agent	

 Agent	

Agent
The Pouzin Society	

© John Day, 2013 23	

Rights Reserved	

Autonomic or Layer Management	

•  Clearly Routing was the primary example. It was clear that routing
and resource allocation were confused. 	

–  But there seemed to be so much variation in what the layers did	

–  Also resource limitations prevented much practical exploration.	

•  There are those who believe autonomic is all that is needed:	

•  This is true, it can be.	

–  As long as the complexity never gets beyond that of	

–  Mycetozoa, porifera, or coelenterata.	

•  slim molds, sponges and maybe jelly fish.	

–  It can find local optimal points, but tends to miss global ones.	

•  But just as in nature, there are interesting configurations along the line
from fully distributed to very centralized.
The Pouzin Society	

© John Day, 2013 24	

Rights Reserved	

On Autonomic vs Centralized
Or What I remember from
taking Invertebrate Zoology	

•  As the last slide indicates rudimentary central nervous system appears
in fairly primitive organisms, such as Platyhelminthes (flatworms).	

–  But so do eyespots. 	

–  Clearly monitoring and reporting must be centralized.	

•  Some actions can be done without a central nervous system, see
coelenterate locomotion and tentacles.	

–  Some rhythmic behaviors as well, where reacting to neighbors suffice.	

•  However, complex actions across the organism may require more
coordination, as will finding true optima rather than local optima.	

–  In nature, we find that ganglia suffice for this much of the time with
ganglia often being larger than the “brain.”	

•  Food for thought for management.
The Pouzin Society	

© John Day, 2013 25	

Rights Reserved	

The DAF Management Model
Is Perfect for Exploring It	

•  Have already seen the traditional centralized configuration.	

•  Could also have configurations where the functionality of the DAPs
was more or less the same, OR	

•  Where some DAPs served as area coordinators or ganglia as they
are called providing local centralization.	

•  This is an area for much further exploration.	

DAF Manager
The Pouzin Society	

© John Day, 2013 26	

Rights Reserved	

The Most Important Property
for Management	

•  Commonality, Commonality, Commonality.	

–  Reduce the Parts Count.	

•  Not Necessarily just make everything look alike, but	

•  Effectively separating the like from the unlike	

–  Maximizing invariance and minimizing discontinuities	

•  Bounding the range of variation (divide and conquer)	

•  This is what the principles we have uncovered do, and have been	

•  Embodied in RINA.	

–  RINA was not designed to do this. We worked out the principles and then
did what they said. (There wasn’t that much leeway.)	

–  We aren’t done. We have pushed commonality into major parts of the
model but there are more principles, invariances to find.	

•  It is subtle, greatest generality with least constraint, often requires shift in POV
The Pouzin Society	

© John Day, 2013 27	

Rights Reserved	

Name Space Management DSMs
The Pouzin Society	

© John Day, 2013 28	

Rights Reserved	

Name Space Management (NSM)	

•  The IPC Model posits a function that allows the Application Name Space
to have a greater scope than any one DIF.	

–  Which we have called the Inter-DIF Directory (for lack of a better term)	

–  Entity associated with the IPC Management in DAPs may query what
applications are available in a system.	

–  This forms a graph where the nodes are NSM-DAPs and the arcs are DIFs	

DIFs	

NSM-DAPs
The Pouzin Society	

© John Day, 2013 29	

Rights Reserved	

NSM-DSMs	

•  Considering this a Name Space Management DMS reveals the
functions:	

–  Authenticate applications that are allowed to query the NSM-DMS	

–  Authenticate and authorize entities that are allowed to update or modify
the NSM-DMS.	

–  Implement the policies for updating and replicating data to meet load and
reliability requirements, including creating forwarding tables.	

–  Check credentials of a request to determine requestor has access to the
requested DAF and if so, return a list of DIFs and supporting DIFs.	

–  Manage the name space, determine who gets assigned what.	

–  Manage the creation of a common DIF between the requesting and
requested DAPs.
The Pouzin Society	

© John Day, 2013 30	

Rights Reserved	

NSM-DSMs	

•  For an environment of any size, we can expect that information on
available applications will be organized to shorten search time.	

–  Hence some NSM-DAPs will contain only local information: 	

–  While others will be repositories for aggregate information:	

•  The repositories might be organized by a hierarchy, DHTs, the Dewey
Decimal System, etc.	

–  This implies two kinds of forwarding tables:	

•  Find the next repository, either aggregate or local.	

•  Forward among NSM-DAPs to get to those repositories.	

NSM-DAF (top and
side views)	

DIFs
The Pouzin Society	

© John Day, 2013 31	

Rights Reserved	

NSM-DSMs	

•  Clearly there is a potential scaling problem here, if we are not careful.	

•  For large systems, a management system (either an OS-DMS or NM-
DMS) will be responsible for access control domains.	

–  These DMSs will be authorized to update or modify information
aggregated with a NSM-DMS, will provide the local NSM-DAP, and
participate in creating or joining new DIFs.	

–  Everything else will be a NSM-client only, i.e. can only submit queries.	

•  May not be considered a member of the NSM-DAF or a lesser member.	

•  For small systems, it degenerates into the DAF structure.	

OS or NM-DMS	

 NSM-DMS	

Processing System	

Updates	

Queries
The Pouzin Society	

© John Day, 2013 32	

Rights Reserved	

Discovery of the application	
  
  Forwarding of the request between the peer NSM-DAPs
until the destination application is found or the pre-defined
termination condition is met	

host H2	

router R2	

 router R3	

host H1	

web server	

application
B	

web
browser	

application
A	

router R4	

router R1	

host H4	

Layer 6	

router R5	

host H3	

...	

Layer 1	

Layer 3	

Layer 2	

Layer 4	

Layer 5	

NSM DAF	

web server	

application
C	

32
The Pouzin Society	

© John Day, 2013 33	

Rights Reserved	

NSM Information	

•  Naming / synonyms	

•  Neighbor Table	

•  Search Table	

•  Repository	

Search Table	

Application Process 	

Name	

List of Peer NSM DAP Names	

Naming Information	

IDD Application Process Name	

synomyms (optional)	

 Neighbor Table	

Peer NSM DAP Name	

 List of Peer NSM DAP Names	

Repository	

Application Process { Name, Access Control Information } 	

List of supporting DIFs { Name, Access Control Information, supported QoS }	

33
The Pouzin Society	

© John Day, 2013 34	

Rights Reserved	

What the NSM request looks like?	

•  A CDAP Read Request for an NSM-Record	

NSM-Request 	

requested-Application-Process-Naming-Information	

requesting-Application-Process-Access Control Information,	

QoS parameters	

	

	

•  The CDAP Read Request can be encapsulated in an A-Unit-Data 	

A-Unit-Data 	

destination s NSM DAP name	

source s NSM DAP name	

termination condition (e.g. hop count)	

CDAP-PDU	

34
The Pouzin Society	

© John Day, 2013 35	

Rights Reserved	

How is it forwarded?	

35
CDAP-PDU	

Requested-Application-Process-Naming-Info	

Requesting-Application-Process-Access Control Info	

QoS parameters	

A-Data-Unit	

	

Destination s NSM DAP name	

Source s NSMDAP name	

Termination condition	

	

CDAP-PDU
The Pouzin Society	

© John Day, 2013 36	

Rights Reserved	

How is it forwarded?	

•  From any DAP to the other you forward A-Data-Units	

•  In the first, the last and all the red DAPs you process the CDAP PDU	

•  Only in the destination NSM DAP (last one) you do a CDAP Read for
an NSM-Record	

NSM-DAPs	

DIFs	

Source	

 Destination
The Pouzin Society	

© John Day, 2013 37	

Rights Reserved	

Discovery of the application	
  
•  Confirmation that the requested application is available in the
destination system and authorization check that the requesting
application has the rights to access it	

host H2	

router R2	

 router R3	

host H1	

web server	

application
B	

web
browser	

application
A	

router R4	

router R1	

host H4	

Layer 6	

router R5	

host H3	

...	

Layer 1	

Layer 3	

Layer 2	

Layer 4	

Layer 5	

IDD DAF	

web server	

application
C	

37
The Pouzin Society	

© John Day, 2013 38	

Rights Reserved	

Creation of the supporting DIF	

  A DIF supporting the communication between the two user
applications has to be found	

  This either involves creating a new DIF from scratch or expanding
(joining) an existing one so that it spans from the source to the
destination system	

host H2	

router R2	

 router R3	

host H1	

web server	

application
B	

web
browser	

application
A	

router R4	

router R1	

host H4	

Layer 6	

router R5	

host H3	

...	

Layer 1	

Layer 3	

Layer 2	

Layer 4	

Layer 5	

NSM DAF	

web server	

application
C	

38
The Pouzin Society	

© John Day, 2013 39	

Rights Reserved	

Implications	

•  There is no application discovery mechanism in the Internet today,
not just pointers to where to search next as today with DNS 	

•  Applications do not have to be in the same layer to discover each
other, especially not on the same one layer as with IP	

•  Elimination of the need for layers with large address spaces 	

•  No need for a single application namespace. Name spaces can be
tailored to environments.	

•  Greater security by having multiple application namespaces and by
better compartmentalization without impairing reachability	

39
The Pouzin Society	

© John Day, 2013 40	

Rights Reserved	

Another Interesting Pattern	

•  Notice that the pattern exhibited by the NSM-DSM of:	

–  Look up among distributed data bases (NSM-repositories) followed by the
creation of distributed shared state (DIF).	

•  Has precisely the same structure as the Flow Allocator:	

–  Look up among distributed data bases (Directory) followed by the creation of
distributed shared state (Connection).	

•  Which has precisely the same structure as Routing:	

–  Look up (computation) among distributed data bases (forwarding table)
followed by the creation of distributed shared state (routes).	

•  The first involves with multiple management domains and DIFs	

•  The second involves possibly multiple management domains and one DIF	

•  While the third is one management domain and one DIF.	

•  There may be another collapse here.
The Pouzin Society	

© John Day, 2013 41	

Rights Reserved	

Questions?

Contenu connexe

Tendances

Dublin addressingtheproblem131224
Dublin addressingtheproblem131224Dublin addressingtheproblem131224
Dublin addressingtheproblem131224ICT PRISTINE
 
RINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussionRINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussionEleni Trouva
 
Pristine rina-tnc-2016
Pristine rina-tnc-2016Pristine rina-tnc-2016
Pristine rina-tnc-2016ICT PRISTINE
 
RINA Tutorial at ETSI ISG NGP#3
RINA Tutorial at ETSI ISG NGP#3RINA Tutorial at ETSI ISG NGP#3
RINA Tutorial at ETSI ISG NGP#3ARCFIRE ICT
 
3. RINA use cases, results, benefits
3. RINA use cases, results, benefits3. RINA use cases, results, benefits
3. RINA use cases, results, benefitsARCFIRE ICT
 
Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016ICT PRISTINE
 
Reconstructing computer networking with RINA: how solid scientific foundation...
Reconstructing computer networking with RINA: how solid scientific foundation...Reconstructing computer networking with RINA: how solid scientific foundation...
Reconstructing computer networking with RINA: how solid scientific foundation...ICT PRISTINE
 
Update on IRATI technical work after month 6
Update on IRATI technical work after month 6Update on IRATI technical work after month 6
Update on IRATI technical work after month 6Eleni Trouva
 
Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012Eleni Trouva
 
The hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduardThe hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduardICT PRISTINE
 
Eucnc rina-tutorial
Eucnc rina-tutorialEucnc rina-tutorial
Eucnc rina-tutorialICT PRISTINE
 
IRATI project presentation
IRATI project presentationIRATI project presentation
IRATI project presentationEleni Trouva
 
RINA: Update on research and prototyping activities. Global Future Internet W...
RINA: Update on research and prototyping activities. Global Future Internet W...RINA: Update on research and prototyping activities. Global Future Internet W...
RINA: Update on research and prototyping activities. Global Future Internet W...Eleni Trouva
 
Pristine glif 2015
Pristine glif 2015Pristine glif 2015
Pristine glif 2015ICT PRISTINE
 
IRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, DublinIRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, DublinEleni Trouva
 
Advanced network experiments in FED4FIRE
Advanced network experiments in FED4FIREAdvanced network experiments in FED4FIRE
Advanced network experiments in FED4FIREARCFIRE ICT
 
RINA IRATI Korea-EU Workshop 2013
RINA IRATI Korea-EU Workshop 2013RINA IRATI Korea-EU Workshop 2013
RINA IRATI Korea-EU Workshop 2013Eleni Trouva
 
Congestion Control in Recursive Network Architectures
Congestion Control in Recursive Network ArchitecturesCongestion Control in Recursive Network Architectures
Congestion Control in Recursive Network ArchitecturesICT PRISTINE
 
Layers of tcpip.65 to 66
Layers of tcpip.65 to 66Layers of tcpip.65 to 66
Layers of tcpip.65 to 66myrajendra
 
Experimental evaluation of a RINA prototype - GC 2014
Experimental evaluation of a RINA prototype - GC 2014Experimental evaluation of a RINA prototype - GC 2014
Experimental evaluation of a RINA prototype - GC 2014Eleni Trouva
 

Tendances (20)

Dublin addressingtheproblem131224
Dublin addressingtheproblem131224Dublin addressingtheproblem131224
Dublin addressingtheproblem131224
 
RINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussionRINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussion
 
Pristine rina-tnc-2016
Pristine rina-tnc-2016Pristine rina-tnc-2016
Pristine rina-tnc-2016
 
RINA Tutorial at ETSI ISG NGP#3
RINA Tutorial at ETSI ISG NGP#3RINA Tutorial at ETSI ISG NGP#3
RINA Tutorial at ETSI ISG NGP#3
 
3. RINA use cases, results, benefits
3. RINA use cases, results, benefits3. RINA use cases, results, benefits
3. RINA use cases, results, benefits
 
Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016
 
Reconstructing computer networking with RINA: how solid scientific foundation...
Reconstructing computer networking with RINA: how solid scientific foundation...Reconstructing computer networking with RINA: how solid scientific foundation...
Reconstructing computer networking with RINA: how solid scientific foundation...
 
Update on IRATI technical work after month 6
Update on IRATI technical work after month 6Update on IRATI technical work after month 6
Update on IRATI technical work after month 6
 
Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012
 
The hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduardThe hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduard
 
Eucnc rina-tutorial
Eucnc rina-tutorialEucnc rina-tutorial
Eucnc rina-tutorial
 
IRATI project presentation
IRATI project presentationIRATI project presentation
IRATI project presentation
 
RINA: Update on research and prototyping activities. Global Future Internet W...
RINA: Update on research and prototyping activities. Global Future Internet W...RINA: Update on research and prototyping activities. Global Future Internet W...
RINA: Update on research and prototyping activities. Global Future Internet W...
 
Pristine glif 2015
Pristine glif 2015Pristine glif 2015
Pristine glif 2015
 
IRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, DublinIRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, Dublin
 
Advanced network experiments in FED4FIRE
Advanced network experiments in FED4FIREAdvanced network experiments in FED4FIRE
Advanced network experiments in FED4FIRE
 
RINA IRATI Korea-EU Workshop 2013
RINA IRATI Korea-EU Workshop 2013RINA IRATI Korea-EU Workshop 2013
RINA IRATI Korea-EU Workshop 2013
 
Congestion Control in Recursive Network Architectures
Congestion Control in Recursive Network ArchitecturesCongestion Control in Recursive Network Architectures
Congestion Control in Recursive Network Architectures
 
Layers of tcpip.65 to 66
Layers of tcpip.65 to 66Layers of tcpip.65 to 66
Layers of tcpip.65 to 66
 
Experimental evaluation of a RINA prototype - GC 2014
Experimental evaluation of a RINA prototype - GC 2014Experimental evaluation of a RINA prototype - GC 2014
Experimental evaluation of a RINA prototype - GC 2014
 

Similaire à Dublin mngmt140120

5 mngmt idd130115
5 mngmt idd1301155 mngmt idd130115
5 mngmt idd130115ARCFIRE ICT
 
5 mngmt idd130115jd
5 mngmt idd130115jd5 mngmt idd130115jd
5 mngmt idd130115jdARCFIRE ICT
 
Big data components - Introduction to Flume, Pig and Sqoop
Big data components - Introduction to Flume, Pig and SqoopBig data components - Introduction to Flume, Pig and Sqoop
Big data components - Introduction to Flume, Pig and SqoopJeyamariappan Guru
 
DB2 Data Sharing Performance
DB2 Data Sharing PerformanceDB2 Data Sharing Performance
DB2 Data Sharing PerformanceMartin Packer
 
How to write shared libraries!
How to write shared libraries!How to write shared libraries!
How to write shared libraries!Stanley Ho
 
Connecting DMPs & Repositories
Connecting DMPs & RepositoriesConnecting DMPs & Repositories
Connecting DMPs & RepositoriesSarah Jones
 
Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptxChapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptxmeharikiros2
 
Consequences of dns-based Internet filtering
Consequences of dns-based Internet filteringConsequences of dns-based Internet filtering
Consequences of dns-based Internet filteringAfnic
 
My research proposal slides.
My research proposal slides.My research proposal slides.
My research proposal slides.Bu Sawoo
 
Educational seminar lessons learned from customer db2 for z os health check...
Educational seminar   lessons learned from customer db2 for z os health check...Educational seminar   lessons learned from customer db2 for z os health check...
Educational seminar lessons learned from customer db2 for z os health check...John Campbell
 
tibco online training
tibco online trainingtibco online training
tibco online trainingsapbest
 
Top10 list planningpostgresdeployment.2014
Top10 list planningpostgresdeployment.2014Top10 list planningpostgresdeployment.2014
Top10 list planningpostgresdeployment.2014EDB
 
Terraform: Taming the Machines Through Continuous Integration
Terraform: Taming the Machines Through Continuous IntegrationTerraform: Taming the Machines Through Continuous Integration
Terraform: Taming the Machines Through Continuous IntegrationJustin Rice
 
Database 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvanDatabase 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvanIftikhar Ahmad
 
Unit-1 Introduction to Big Data.pptx
Unit-1 Introduction to Big Data.pptxUnit-1 Introduction to Big Data.pptx
Unit-1 Introduction to Big Data.pptxAnkitChauhan817826
 

Similaire à Dublin mngmt140120 (20)

5 mngmt idd130115
5 mngmt idd1301155 mngmt idd130115
5 mngmt idd130115
 
5 mngmt idd130115jd
5 mngmt idd130115jd5 mngmt idd130115jd
5 mngmt idd130115jd
 
Big data components - Introduction to Flume, Pig and Sqoop
Big data components - Introduction to Flume, Pig and SqoopBig data components - Introduction to Flume, Pig and Sqoop
Big data components - Introduction to Flume, Pig and Sqoop
 
DB2 Data Sharing Performance
DB2 Data Sharing PerformanceDB2 Data Sharing Performance
DB2 Data Sharing Performance
 
How to write shared libraries!
How to write shared libraries!How to write shared libraries!
How to write shared libraries!
 
Why Learn Terraform?
Why Learn Terraform?Why Learn Terraform?
Why Learn Terraform?
 
Dsohowto
DsohowtoDsohowto
Dsohowto
 
Connecting DMPs & Repositories
Connecting DMPs & RepositoriesConnecting DMPs & Repositories
Connecting DMPs & Repositories
 
Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptxChapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
 
Consequences of dns-based Internet filtering
Consequences of dns-based Internet filteringConsequences of dns-based Internet filtering
Consequences of dns-based Internet filtering
 
Hdg geo discussion
Hdg geo discussionHdg geo discussion
Hdg geo discussion
 
My research proposal slides.
My research proposal slides.My research proposal slides.
My research proposal slides.
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
Hadoop
HadoopHadoop
Hadoop
 
Educational seminar lessons learned from customer db2 for z os health check...
Educational seminar   lessons learned from customer db2 for z os health check...Educational seminar   lessons learned from customer db2 for z os health check...
Educational seminar lessons learned from customer db2 for z os health check...
 
tibco online training
tibco online trainingtibco online training
tibco online training
 
Top10 list planningpostgresdeployment.2014
Top10 list planningpostgresdeployment.2014Top10 list planningpostgresdeployment.2014
Top10 list planningpostgresdeployment.2014
 
Terraform: Taming the Machines Through Continuous Integration
Terraform: Taming the Machines Through Continuous IntegrationTerraform: Taming the Machines Through Continuous Integration
Terraform: Taming the Machines Through Continuous Integration
 
Database 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvanDatabase 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvan
 
Unit-1 Introduction to Big Data.pptx
Unit-1 Introduction to Big Data.pptxUnit-1 Introduction to Big Data.pptx
Unit-1 Introduction to Big Data.pptx
 

Plus de ICT PRISTINE

Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQAssuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQICT PRISTINE
 
Benefits of programmable topological routing policies in RINA-enabled large s...
Benefits of programmable topological routing policies in RINA-enabled large s...Benefits of programmable topological routing policies in RINA-enabled large s...
Benefits of programmable topological routing policies in RINA-enabled large s...ICT PRISTINE
 
The hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diegoThe hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diegoICT PRISTINE
 
The hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzoThe hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzoICT PRISTINE
 
The hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peymanThe hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peymanICT PRISTINE
 
The hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterICT PRISTINE
 
Th hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neilTh hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neilICT PRISTINE
 
The hague rina-workshop-intro-eduard
The hague rina-workshop-intro-eduardThe hague rina-workshop-intro-eduard
The hague rina-workshop-intro-eduardICT PRISTINE
 
The hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguelThe hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguelICT PRISTINE
 
2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)ICT PRISTINE
 
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016ICT PRISTINE
 
Rina acc-icc16-stein
Rina acc-icc16-steinRina acc-icc16-stein
Rina acc-icc16-steinICT PRISTINE
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015ICT PRISTINE
 
SFR: Scalable Forwarding with RINA for Distributed Clouds
SFR: Scalable Forwarding with RINA for Distributed CloudsSFR: Scalable Forwarding with RINA for Distributed Clouds
SFR: Scalable Forwarding with RINA for Distributed CloudsICT PRISTINE
 
RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks ICT PRISTINE
 
EC Net Tech FI Cluster meeting October 23 2014 PRISTINE
EC Net Tech FI Cluster meeting October 23 2014 PRISTINEEC Net Tech FI Cluster meeting October 23 2014 PRISTINE
EC Net Tech FI Cluster meeting October 23 2014 PRISTINEICT PRISTINE
 

Plus de ICT PRISTINE (18)

Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQAssuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
 
Benefits of programmable topological routing policies in RINA-enabled large s...
Benefits of programmable topological routing policies in RINA-enabled large s...Benefits of programmable topological routing policies in RINA-enabled large s...
Benefits of programmable topological routing policies in RINA-enabled large s...
 
The hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diegoThe hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diego
 
The hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzoThe hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzo
 
The hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peymanThe hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peyman
 
The hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peter
 
Th hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neilTh hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neil
 
The hague rina-workshop-intro-eduard
The hague rina-workshop-intro-eduardThe hague rina-workshop-intro-eduard
The hague rina-workshop-intro-eduard
 
The hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguelThe hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguel
 
2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)
 
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016
 
Rina acc-icc16-stein
Rina acc-icc16-steinRina acc-icc16-stein
Rina acc-icc16-stein
 
Rina sim workshop
Rina sim workshopRina sim workshop
Rina sim workshop
 
6 security130123
6 security1301236 security130123
6 security130123
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015
 
SFR: Scalable Forwarding with RINA for Distributed Clouds
SFR: Scalable Forwarding with RINA for Distributed CloudsSFR: Scalable Forwarding with RINA for Distributed Clouds
SFR: Scalable Forwarding with RINA for Distributed Clouds
 
RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks
 
EC Net Tech FI Cluster meeting October 23 2014 PRISTINE
EC Net Tech FI Cluster meeting October 23 2014 PRISTINEEC Net Tech FI Cluster meeting October 23 2014 PRISTINE
EC Net Tech FI Cluster meeting October 23 2014 PRISTINE
 

Dernier

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...sonatiwari757
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goasexy call girls service in goa
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 

Dernier (20)

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 

Dublin mngmt140120

  • 1. The Pouzin Society © John Day, 2013 1 Rights Reserved DAFs and Management in RINA PSOC Workshop Dublin, Ireland John Day and Eleni Trouva
  • 2. The Pouzin Society © John Day, 2013 2 Rights Reserved A DAF consists of two or more DAPs •  Notice that everything is a DAF. An Application that does not use IPC has no output and hence does nothing. •  A DAF in which all DAPs are of the same type is homogeneous. •  A DAF with DAPs of different types is heterogeneous. •  A new Application Process joining a DAF must enroll. –  It works just like DIFs, actually DIFs work just like DAFs. •  The DAF may assign the member DAPs a synonym with scope limited to the DAF and structured to facilitate its use within the DAF.
  • 3. The Pouzin Society © John Day, 2013 3 Rights Reserved DAFs Operate Over A DIF •  There seems to be no architectural reason why not. •  This requires at least one DAP relaying which could allow information to leak between domains. •  Rules can be made but are hard to enforce, but these are not as strong as it being enforced by the structure. Distributed Application Facility (DAF) Distributed IPC Facility (DIF) Can a DAF span more than One DIF? DIF DIF
  • 4. The Pouzin Society © John Day, 2013 4 Rights Reserved A DAP Consists of •  This requires considerably more exploration. •  Conjecture: In general the Tasks do not use IPC, but the RIB Daemon makes the information available that the tasks need. –  IOW, the function of a distributed application is reduced to a local programming problem. –  Not only is there only one application protocol but there is only one user of that application protocol? Sched Mem Mgt IPC Local Resource Management Tasks IPCManagement RIBDaemon ResourceAllocation DAFManagement Distributed Resource Management
  • 5. The Pouzin Society © John Day, 2013 5 Rights Reserved DAP Infrastructure •  DAF Management is the local task involved in the management of the DAF as a whole. It can range in complexity from a simple agent to a full participant in the management. (more on this later) •  Task Scheduling - is the local task that coordinates with its peers the work of the DAF. (In a DIF, this is generally relates to routing and QoS.) •  RIB Daemon - is the local task that ensures replicated information in the RIB is updated as required and services requests for information from the Tasks of the DAF. (In a DIF, this is a generalization of combining routing update and event management.) •  IPC Management - IPC Management manages the DAP’s use of the underlying DIF to communicate with its members. (There is much more to say about this)
  • 6. The Pouzin Society © John Day, 2013 6 Rights Reserved IPC Management •  In the IPC Model, there was a function that was used to choose which DIF to use. This is it. •  IPC Management is the part of a DAP that manages the use of the supporting DIF. –  SDU Protection and Multiplexing are the same as in DIFs. –  The IPC Resource Manager (IRM) does the actual management –  The Inter-DIF-Directory (IDD) is used to find applications that may be on DIFs that this DAP does not have direct access to. SDU Protection Muxing IDDIPC Resource Mngt (IRM)
  • 7. The Pouzin Society © John Day, 2013 7 Rights Reserved Naming Considerations for DAFs •  The members of a DAF cooperate to perform a set of functions. Hence, they may have a shared schema that describes the information they use. –  And policies governing replication, ACID, authoritative value, etc. •  This schema may or may not be made visible to the users of the DAF. •  One of the roles of the RIB Daemon is to maintain the mapping between this schema and how to access the information, i.e. where in the DAF this information resides. –  Hence, synonyms may be assigned to facilitate this, e.g. DHTs, LC •  The Tasks of the DAF use this schema to access the information required to perform the functions of the DAF. –  The schema made visible by the tasks may be different than the schema used within the RIB.
  • 8. The Pouzin Society © John Day, 2013 8 Rights Reserved Very Interesting . . . •  How much in common DAFs and DIFs are: –  SDU Protection –  Multiplexing –  RIB Daemon –  Enrollment –  Addresses (Synonyms) •  Ignoring differences of policies, not much is unique to DIFs: –  Flow Allocator –  Delimiting –  Error and Flow Control –  (Relaying) •  Like I said, Very Interesting. . .
  • 9. The Pouzin Society © John Day, 2013 9 Rights Reserved Can DAFs Use DAFs? •  Yes, of course. But there are two forms it can take. –  Invoke –  RPC •  In general, a DAF provides some function (or set of functions) and will provide the result of that function to the member of the DAF that invoked. –  Assume DAF B provides f(x) and it is invoked by a member of DAF A –  B returns the result to the member that made the request. The fact that it was a distributed computation is not visible to A, is termed asymmetric. –  A rare form of DAF, where performing f(x) by one user may result in f-1(x) being performed elsewhere, is termed symmetric, e.g. a DIF. DAF A DAF B DAF C y = f(x)
  • 10. The Pouzin Society © John Day, 2013 10 Rights Reserved DAFs Can Include DAFs •  A DAF can include another DAF in a symbiotic relation, where the encompassing DAF provides all of the infrastructure services, •  Distinct DAF where the encompassed DAF provides its own infrastructure. DAF A DAF B
  • 11. The Pouzin Society © John Day, 2013 11 Rights Reserved Can DAFs Use DAFs? (cont) •  The Remote Procedure Call form: –  A DAP, a, in DAF A opens a connection to a DAP, b, in DAF B, (which includes authenticating) and sends f(x). •  a and b must be in two DAFs at the same time. –  This could constitute any number of security problems. •  Information available to a as a member of A may not be shared with B. Major assumptions have to be made about the veracity of a. •  The previous method provided more structural isolation. –  Note that f(x) is not enrollment. For this sort of service, there are a number of possibilities: distinct DAN, distinct AE in a DAP, or distinct DAPs to provide the function and isolate it from the rest of the DAF. DAF A DAF B DIF
  • 12. The Pouzin Society © John Day, 2013 12 Rights Reserved Can DAFs Use DAFs? (cont) •  Do all members of A have access to the same supporting DAFs? –  For a homogeneous DAF, yes. For a heterogeneous DAF, perhaps not. –  If one member of A invokes f(x), the result might not be the same if another member of A invokes f(x) DAF A DAF B DAF C DAF A DAF B DAF C y = f(x) y = f(x) where y may not equal y
  • 13. The Pouzin Society © John Day, 2013 13 Rights Reserved Can DAFs Use DAFs? (still cont) •  A DIF is a special case such that when f(x) is invoked, f-1(x) is invoked elsewhere, i.e. symmetric. –  Are there other forms of symmetric DAFs where f(x) causes action at a distance where f, f-1, or even g are invoked? •  Yes, email, various messaging schemes or some delay tolerant networks •  Ultimately, it would seem that a DAF has at least one supporting DIF for sharing information among its members. –  Is there an example that proves this statement wrong? DAF A DAF B DAF C
  • 14. The Pouzin Society © John Day, 2013 14 Rights Reserved Conjectures •  Peer to Peer [sic] systems are asymmetric homogeneous DAFs, where the RIB Daemon maintains a schema to locate information at one or more members of the DAF and then transfer the information to the requesting DAF member. •  Email is a symmetric DAF that stores a message with the user of another member. The message may be retrieved at some point by another member of this DAF or by another DAF. –  Mail could be a DIF if there is an upper bound on how long a message will be held before pick up. •  Content-centric networking is simply a distributed database DAF. •  Others?
  • 15. The Pouzin Society © John Day, 2013 15 Rights Reserved Management DAFs
  • 16. The Pouzin Society © John Day, 2013 16 Rights Reserved An Important Class of DAFs: DAF Management Systems •  There are four major kinds of distributed management systems (DMS): –  Operating System – Network Management –  Distributed Applications – Name Space Management •  There were the beginnings of progress in this area in the late 80s. •  However, thanks to the SNMP debacle of the early 90s, –  The IETF were played for suckers and took the bait •  It pretty much reverted to the primitive state of 70s with ad hoc, largely, proprietary solutions and kludges, •  Effectively aimed at keeping account control and using management as a barrier to entry.
  • 17. The Pouzin Society © John Day, 2013 17 Rights Reserved DAF Management Systems •  There is a commonality to their structure and •  A range in their complexity from distributed to centralized •  Each DAF/DIF has a DAF Management Task. These constitute data collection and autonomic functions, what IEEE calls layer management. •  The DAF Manager can be considered the nervous system of a DAF. –  A DAF Manager might manage more than one DAF or –  In a degenerate case, the DAF Management Tasks might constitute the DAF Manager. DAF Manager
  • 18. The Pouzin Society © John Day, 2013 18 Rights Reserved Application and Operating System DMS •  Application-DMSs will generally be needed for large complex applications and of course, are very application specific, so there is not much we can say beyond the general model. •  A traditional OS is a heterogeneous DAF that includes the peripherals. –  The traditional device drivers are members of the DAF. –  In the case of the disk, it might have several members: one, looks like a file system, one that looks like a database, and one that yields track and sector access. –  And a short step from this to this: USB-DIF WiFi-DIF OS - DMS Printer Disk Laptop System
  • 19. The Pouzin Society © John Day, 2013 19 Rights Reserved Even More Distributed •  A traditional OS is a heterogeneous DAF that includes the peripherals. –  Where ever they are. •  Somehow this is much different once you look at the picture. •  An OS is distributed resource manager that in previous years operated under severe connectivity constraints. •  The differences between OS and Network Management becomes a matter of degree. OS - DAF Printer Disk Laptop System
  • 20. The Pouzin Society © John Day, 2013 20 Rights Reserved We Know More About This •  And down the side were the labels •  This became the core of our approach to Network Management Cerebellum Cerebrum Hypothalamus (Ganglia) Peripheral Increasing Aggregation Sensor Agent Manager Coordinator Raw Data Filtered Processed Data Planning Data Increasing Cycle Time
  • 21. The Pouzin Society © John Day, 2013 21 Rights Reserved But More Importantly It was Clear that Network Management is •  The whole point is that events are happening too fast for humans to be in the loop. They can manage, but not control. •  Control must be autonomic. Monitor and Repair But not Control
  • 22. The Pouzin Society © John Day, 2013 22 Rights Reserved The Management Architecture Central Nervous System •  While there might be managers for distinct subnets (domains) and the subnets might be a hierarchy, the managers were peers. –  Many talked about managers of managers but there is really nothing for second level managers to do. (that generalizes?) •  Fault Management isn t an app, it is a management system with a small domain. •  Then Realized what was missing: Where s the Homunculus? Agent Event Config Perf Fault Agent Agent Agent Agent Reliable Req/Resp Best Effort Telemetry Agent MIB Network Management System (NMS) Devices to be Managed NMS Agent Agent Agent Agent
  • 23. The Pouzin Society © John Day, 2013 23 Rights Reserved Autonomic or Layer Management •  Clearly Routing was the primary example. It was clear that routing and resource allocation were confused. –  But there seemed to be so much variation in what the layers did –  Also resource limitations prevented much practical exploration. •  There are those who believe autonomic is all that is needed: •  This is true, it can be. –  As long as the complexity never gets beyond that of –  Mycetozoa, porifera, or coelenterata. •  slim molds, sponges and maybe jelly fish. –  It can find local optimal points, but tends to miss global ones. •  But just as in nature, there are interesting configurations along the line from fully distributed to very centralized.
  • 24. The Pouzin Society © John Day, 2013 24 Rights Reserved On Autonomic vs Centralized Or What I remember from taking Invertebrate Zoology •  As the last slide indicates rudimentary central nervous system appears in fairly primitive organisms, such as Platyhelminthes (flatworms). –  But so do eyespots. –  Clearly monitoring and reporting must be centralized. •  Some actions can be done without a central nervous system, see coelenterate locomotion and tentacles. –  Some rhythmic behaviors as well, where reacting to neighbors suffice. •  However, complex actions across the organism may require more coordination, as will finding true optima rather than local optima. –  In nature, we find that ganglia suffice for this much of the time with ganglia often being larger than the “brain.” •  Food for thought for management.
  • 25. The Pouzin Society © John Day, 2013 25 Rights Reserved The DAF Management Model Is Perfect for Exploring It •  Have already seen the traditional centralized configuration. •  Could also have configurations where the functionality of the DAPs was more or less the same, OR •  Where some DAPs served as area coordinators or ganglia as they are called providing local centralization. •  This is an area for much further exploration. DAF Manager
  • 26. The Pouzin Society © John Day, 2013 26 Rights Reserved The Most Important Property for Management •  Commonality, Commonality, Commonality. –  Reduce the Parts Count. •  Not Necessarily just make everything look alike, but •  Effectively separating the like from the unlike –  Maximizing invariance and minimizing discontinuities •  Bounding the range of variation (divide and conquer) •  This is what the principles we have uncovered do, and have been •  Embodied in RINA. –  RINA was not designed to do this. We worked out the principles and then did what they said. (There wasn’t that much leeway.) –  We aren’t done. We have pushed commonality into major parts of the model but there are more principles, invariances to find. •  It is subtle, greatest generality with least constraint, often requires shift in POV
  • 27. The Pouzin Society © John Day, 2013 27 Rights Reserved Name Space Management DSMs
  • 28. The Pouzin Society © John Day, 2013 28 Rights Reserved Name Space Management (NSM) •  The IPC Model posits a function that allows the Application Name Space to have a greater scope than any one DIF. –  Which we have called the Inter-DIF Directory (for lack of a better term) –  Entity associated with the IPC Management in DAPs may query what applications are available in a system. –  This forms a graph where the nodes are NSM-DAPs and the arcs are DIFs DIFs NSM-DAPs
  • 29. The Pouzin Society © John Day, 2013 29 Rights Reserved NSM-DSMs •  Considering this a Name Space Management DMS reveals the functions: –  Authenticate applications that are allowed to query the NSM-DMS –  Authenticate and authorize entities that are allowed to update or modify the NSM-DMS. –  Implement the policies for updating and replicating data to meet load and reliability requirements, including creating forwarding tables. –  Check credentials of a request to determine requestor has access to the requested DAF and if so, return a list of DIFs and supporting DIFs. –  Manage the name space, determine who gets assigned what. –  Manage the creation of a common DIF between the requesting and requested DAPs.
  • 30. The Pouzin Society © John Day, 2013 30 Rights Reserved NSM-DSMs •  For an environment of any size, we can expect that information on available applications will be organized to shorten search time. –  Hence some NSM-DAPs will contain only local information: –  While others will be repositories for aggregate information: •  The repositories might be organized by a hierarchy, DHTs, the Dewey Decimal System, etc. –  This implies two kinds of forwarding tables: •  Find the next repository, either aggregate or local. •  Forward among NSM-DAPs to get to those repositories. NSM-DAF (top and side views) DIFs
  • 31. The Pouzin Society © John Day, 2013 31 Rights Reserved NSM-DSMs •  Clearly there is a potential scaling problem here, if we are not careful. •  For large systems, a management system (either an OS-DMS or NM- DMS) will be responsible for access control domains. –  These DMSs will be authorized to update or modify information aggregated with a NSM-DMS, will provide the local NSM-DAP, and participate in creating or joining new DIFs. –  Everything else will be a NSM-client only, i.e. can only submit queries. •  May not be considered a member of the NSM-DAF or a lesser member. •  For small systems, it degenerates into the DAF structure. OS or NM-DMS NSM-DMS Processing System Updates Queries
  • 32. The Pouzin Society © John Day, 2013 32 Rights Reserved Discovery of the application     Forwarding of the request between the peer NSM-DAPs until the destination application is found or the pre-defined termination condition is met host H2 router R2 router R3 host H1 web server application B web browser application A router R4 router R1 host H4 Layer 6 router R5 host H3 ... Layer 1 Layer 3 Layer 2 Layer 4 Layer 5 NSM DAF web server application C 32
  • 33. The Pouzin Society © John Day, 2013 33 Rights Reserved NSM Information •  Naming / synonyms •  Neighbor Table •  Search Table •  Repository Search Table Application Process Name List of Peer NSM DAP Names Naming Information IDD Application Process Name synomyms (optional) Neighbor Table Peer NSM DAP Name List of Peer NSM DAP Names Repository Application Process { Name, Access Control Information } List of supporting DIFs { Name, Access Control Information, supported QoS } 33
  • 34. The Pouzin Society © John Day, 2013 34 Rights Reserved What the NSM request looks like? •  A CDAP Read Request for an NSM-Record NSM-Request requested-Application-Process-Naming-Information requesting-Application-Process-Access Control Information, QoS parameters •  The CDAP Read Request can be encapsulated in an A-Unit-Data A-Unit-Data destination s NSM DAP name source s NSM DAP name termination condition (e.g. hop count) CDAP-PDU 34
  • 35. The Pouzin Society © John Day, 2013 35 Rights Reserved How is it forwarded? 35 CDAP-PDU Requested-Application-Process-Naming-Info Requesting-Application-Process-Access Control Info QoS parameters A-Data-Unit Destination s NSM DAP name Source s NSMDAP name Termination condition CDAP-PDU
  • 36. The Pouzin Society © John Day, 2013 36 Rights Reserved How is it forwarded? •  From any DAP to the other you forward A-Data-Units •  In the first, the last and all the red DAPs you process the CDAP PDU •  Only in the destination NSM DAP (last one) you do a CDAP Read for an NSM-Record NSM-DAPs DIFs Source Destination
  • 37. The Pouzin Society © John Day, 2013 37 Rights Reserved Discovery of the application   •  Confirmation that the requested application is available in the destination system and authorization check that the requesting application has the rights to access it host H2 router R2 router R3 host H1 web server application B web browser application A router R4 router R1 host H4 Layer 6 router R5 host H3 ... Layer 1 Layer 3 Layer 2 Layer 4 Layer 5 IDD DAF web server application C 37
  • 38. The Pouzin Society © John Day, 2013 38 Rights Reserved Creation of the supporting DIF   A DIF supporting the communication between the two user applications has to be found   This either involves creating a new DIF from scratch or expanding (joining) an existing one so that it spans from the source to the destination system host H2 router R2 router R3 host H1 web server application B web browser application A router R4 router R1 host H4 Layer 6 router R5 host H3 ... Layer 1 Layer 3 Layer 2 Layer 4 Layer 5 NSM DAF web server application C 38
  • 39. The Pouzin Society © John Day, 2013 39 Rights Reserved Implications •  There is no application discovery mechanism in the Internet today, not just pointers to where to search next as today with DNS •  Applications do not have to be in the same layer to discover each other, especially not on the same one layer as with IP •  Elimination of the need for layers with large address spaces •  No need for a single application namespace. Name spaces can be tailored to environments. •  Greater security by having multiple application namespaces and by better compartmentalization without impairing reachability 39
  • 40. The Pouzin Society © John Day, 2013 40 Rights Reserved Another Interesting Pattern •  Notice that the pattern exhibited by the NSM-DSM of: –  Look up among distributed data bases (NSM-repositories) followed by the creation of distributed shared state (DIF). •  Has precisely the same structure as the Flow Allocator: –  Look up among distributed data bases (Directory) followed by the creation of distributed shared state (Connection). •  Which has precisely the same structure as Routing: –  Look up (computation) among distributed data bases (forwarding table) followed by the creation of distributed shared state (routes). •  The first involves with multiple management domains and DIFs •  The second involves possibly multiple management domains and one DIF •  While the third is one management domain and one DIF. •  There may be another collapse here.
  • 41. The Pouzin Society © John Day, 2013 41 Rights Reserved Questions?