SlideShare a Scribd company logo
1 of 36
Download to read offline
The Pouzin Society
© John Day, 2014
All Rights Reserved
1
Welcome to the RINAissance!

An Introduction
to the RINA Architecture
Part I
3rd Annual International
RINA Workshop
John Day
Ghent 2015
In a network of devices why would
we route between processes?
- Toni Stoey, RRG 2009
The Pouzin Society
© John Day, 2014
All Rights Reserved
2
Levels of Abstraction
(Abstraction is Invariance)
•  Maximize the Invariant and minimize the discontinuties.
•  Today there are essentially no levels of abstraction.
Reference Model
Service Definitions
Protocols
Procedures
Policies
Implementation
DecreasingLevelsofAbstraction
InvariantVariable
The Pouzin Society
© John Day, 2014
All Rights Reserved
3
Unlike the Internet
•  In RINA, most layers are private. This means that there can be much
greater variability in them.
–  Here, there is much greater freedom and independence, but with the same
code base.
•  The Reference Model, APIs, and Protocol Specifications can be
combined with off-the-shelf or custom policies to specify a layer.
•  The concept of a public network is meaningless in RINA.
–  There may be a public layer, but a public network is a non-sequitor.
•  Groups may agree on common DIF definitions and policy sets.
–  The focus is not on designing protocols, but on defining policies and
configuring DIFs.
•  Maximizing Invariance reduces operating and equipment complexity,
costs and thereby improves management.
•  Our goal is to make networks simpler, more predictable, more
manageable, and more efficient.
The Pouzin Society
© John Day, 2014
All Rights Reserved
4
What Do We Mean by Invariance?
•  An Easy Example: Separating Mechanism and Policy
–  Concept first proposed by Bill Wulf [1975] for operating systems.
•  Separating what is common across solutions from what is uncommon.
•  Mechanics of memory management are the same, allocation scheme or page
replacement policy is what varies.
•  In protocols, there are a few mechanisms. Virtually all of the variation
is in the policies.
–  Acknowledgement is mechanism; when to Ack is policy.
–  This has major implication for the structure of protocols.
•  We can apply this across the board to simplify and ensure that
cooperating layers behave in a compatible manner.
•  Leverage is in the commonality, but letting what must vary vary.
–  Never take it to extremes. It is subtle task.
The Pouzin Society
© John Day, 2014
All Rights Reserved
5
The Structure of Protocols
•  If we separate mechanism and policy, we find there are
•  Two kinds of mechanisms:
–  Tightly-Bound: Those that must be associated with the Transfer PDU
•  policy is imposed by the sender.
–  Loosely-Bound: Those that don’t have to be.
•  policy is imposed by the receiver.
–  Furthermore, the two are only loosely coupled through a state vector.
•  Implies a very different structure for protocols and their implementations
•  Noting that syntactic differences are minimal, we can conclude that
•  There is one data transfer protocol with a small number of encodings.
Tightly-bound
(pipelined)
Loosely-bound
(Policy processing)
The Pouzin Society
© John Day, 2014
All Rights Reserved
6
Implications: Protocols
•  Data Transfer Protocols modify state internal to the Protocol.
Application Protocols modify state external to the protocol.
•  There are only two protocols (full stop):
–  A data transfer protocol, based on Watson’s results,
–  An Application protocol that can perform 6 operations on objects:
•  Read/Write – Create/Delete – Start/Stop
–  There is no distinct protocol like IP.
•  Was just a common header fragment anyway.
•  A Layer provides IPC to either another layer or to a Distributed
Application with a programming language model. The application
protocol is the “assembly language” for distributed computing.
–  As we shall see, we have now made network architecture independent of
protocols.
The Pouzin Society
© John Day, 2014
All Rights Reserved
7
Delta-t Results (1978)
•  Richard Watson proves that the necessary and sufficient conditions for
distributed synchronization requires only that 3 timers are bounded:
•  Maximum Packet Lifetime
•  Maximum number of Retries
•  Maximum time before Ack
•  Develops delta-t to demonstrate the result, which has some unique
implications:
–  Assumes all connections exist all the time.
–  TCBs are simply caches of state on ones with recent activity
•  1981 paper, Watson shows that TCP has all three timers and more.
–  Matta et al. (2009) shows that delta-t is more robust under harsh conditions
than TCP. Boddapati et al. (2012) shows that it is more secure.
The Pouzin Society
© John Day, 2014
All Rights Reserved
8
Flaw in the Concept of Connection
(in the Internet and OSI)
•  In both, a connection starts in the (N+1)-entity and goes to the peer (N+1)-entity.
–  This is a beads-on-a-string view.
•  (In OSI, while the PTTs insisted on it in the model, it was ignored in practice)
•  This combines port allocation and synchronization
•  What Watson is saying when he assumes:
–  all connections exist all the time.
•  Is that Port allocation and Synchronization are distinct.
(N+1)-entities
(N)-entities
(N)-address
• •
(N)-connection
Connection-
Endpoint
(port-id)
The Pouzin Society
© John Day, 2014
All Rights Reserved
9
Concept of Connection
Synchronization
Connection
Endpoint
Port Allocation
Port-id
Connection
•  Instead delta-t works differently:
–  Ports are allocated, then protocol machines create synchronization (shared state)
–  And connection-end points are bound to the port-ids.
–  We use the term “connection” within the DIF; “flow,” for the service provided
•  Not conflating the two has significant implications.
–  No traffic for 2MPL, connection disappears, but ports remain allocated
–  Bindings are local. We will later see other implications of this.
The Pouzin Society
© John Day, 2014
All Rights Reserved
10
Implications of Watson’s Results
•  No explicit state synchronization, i.e. hard state, is necessary.
•  SYNs, FINs are unnecessary
•  All properly designed data transfer protocols are soft-state.
•  Including protocols like HDLC
•  And One Other Thing:
•  Watson’s result also defines the bounds of networking or IPC:
–  It is IPC if and only if Maximum Packet Lifetime can be bounded.
–  If MPL can’t be bounded, it is remote storage.
The Pouzin Society
© John Day, 2014
All Rights Reserved
11
Connectionless is a Function,
Not a Service
•  It should not be visible to applications. The choice is made by the layer.
–  Another mistake the Internet makes
•  Connectionless is characterized by the maximal dissemination of state
information and dynamic resource allocation.
•  Connection-oriented mechanisms attempt to limit dissemination of state
information and tends toward static resource allocation.
•  Applications request the allocation of comm resources.
•  The layer determines what mechanisms and policies to use.
•  Tends toward CO when traffic density is high and deterministic.
•  CL when traffic density is low and stochastic.
The Pouzin Society
© John Day, 2014
All Rights Reserved
12
Applications and Communication: I
Is the Application in or out of the IPC environment?
•  The early ARPANet/Internet didn’t worry too much about it. They didn’t need
to. They weren’t doing any new application development.
•  By 1985, OSI had tackled the problem, partly due to turf. Was the Application
process inside or outside OSI?
•  It wasn’t until the web came along that we had an example that in general an
application protocol might be part of many applications and an application
might have many application protocols.
•  The only known example of a political turf battle leading to a major insight!
The Pouzin Society
© John Day, 2014
All Rights Reserved
13
Applications and Communication: II
•  The Application-Entity (AE) is that part of the application concerned
with communication, i.e. shared state with its peer.
–  This will turn out to be the “tip of the iceberg,” part of a larger structure.
•  The rest of the Application Process is concerned with the reason for
the application in the first place.
•  An Application Process may have multiple AEs, they assumed, for
different application protocols.
•  It turns out that this was the tip of an iceberg.
Application
Process
Application
Entity
Application
Entity
Inside the Network
Outside the Network
The Pouzin Society
© John Day, 2014
All Rights Reserved
14

The IPC Model
(A Purely CS View)
Relaying
Appl
EFCP
EFCP
EFCP EFCP EFCP EFCP EFCP EFCP
Mux
Mux
User Applications
DistributedIPCFacilities
The Pouzin Society
© John Day, 2014
All Rights Reserved
15
The Implications
•  Networking is IPC and only IPC.
–  We had been concentrating on the differences, rather than the similarities.
–  Of course, there are layers! What else do you call cooperating shared state
that is treated as a black box? A waffle!?
•  Notice the model never required separate protocols for relaying and error and
flow control, i.e. separating TCP and IP. Always do what the model says.*
•  All layers have the same functions, with different scope and range.
–  Not all instances of layers may need all functions, but don’t need more.
–  As we will see, strong layering is better than soft layering.
•  A Layer is a Distributed Application that performs and manages IPC.
–  A Distributed IPC Facility (DIF)
•  This yields a theory and an architecture that scales indefinitely,
–  i.e. any bounds imposed are not a property of the architecture itself.
•  But this also begs the question:
–  If a layer is a Distributed Application that does IPC, then what is a
Distributed Application?
The Pouzin Society
© John Day, 2014
All Rights Reserved
16
*Always Do What the Problem Says
This requires a bit more consideration.
•  Those who did IP would tell you they were following the problem!
–  It was clear that there could be different kinds of transport protocol and
they were allowing for that by splitting IP from TCP.
•  The problem is that the Problem is a bit coy, she just hints where to go
and we have to figure out what she means. ;-)
•  In this case, splitting IP from TCP creates problems with
fragmentation/reassembly. It breaks the rules.
–  Must not be the direction to take. There must be another way to solve the
same problem. We have to look for it.
•  Those who say “simplifying here will merely produce complexity elsewhere”
lack imagination.
•  If there is a devil in the details, then there is something wrong with the
design. A wrong invariance has been chosen.
•  The problem is always an angel! ;-)
–  We have to avoid the devils.
The Pouzin Society
© John Day, 2014
All Rights Reserved
17
That Wasn’t the Only Question
•  Well Over a Decade Ago
•  We Figured Out that Layers Repeated
•  That Created a Potential Problem:
The Pouzin Society
© John Day, 2014
All Rights Reserved
18
Dykstra says Layers are all Different
•  Once a function is done in a layer, it isn’t repeated.
•  If you are going to contradict Dykstra,
–  you better have a good argument, so . . . Better see what he said.
•  The Layers of Dykstra’s THE Operating System
•  (THE - Technische Hogeschool Eindhoven)
•  “The Structure of the THE-Multiprogramming System,” CACM 11(5) 1968.
–  Layer 0 - Multiprogramming
–  Layer 1 - Memory Management
–  Layer 2 - Console communication
–  Layer 3 - I/O
–  Layer 4 - User Programs
–  Layer 5 - Users (“not implemented by us” - EWD)
•  Seem a bit dated, don’t they?
How Do You Do This . . .
Without This?
The Pouzin Society
© John Day, 2014
All Rights Reserved
19
A Few Days Later
•  Musing about Dykstra’s layers:
–  A bit arcane, but 1968 was a long time ago. Machines were far
smaller and much more resource constrained.
•  We wouldn’t do those layers in an OS today.
•  What would we do . . . .
–  kernel, supervisor, user . . .
–  and they all do the same thing!
•  scheduling, memory management and IPC
–  OMG! OSs are recursive as well!
•  As one might guess, virtualization is not recursion.
•  That lead to
hmmmmmm
The Pouzin Society
© John Day, 2014
All Rights Reserved
20
Returned to OSs After A 30 Year Hiatus
•  Knowing that the Days Were Over When H/W was a
Major Constraint and Distorted Possible Solutions!
–  Now things could done the way they should be!
•  But what I found was,
–  Nothing had Changed. Still same old timesharing systems!
•  No one Seems to have Noticed.
•  What had Everyone Been Doing!?
The Pouzin Society
© John Day, 2014
All Rights Reserved
21
What I Saw
•  Threads and Heap management were kludgey with all sorts of warts.
•  They never answered the question, if a thread is the locus of
processing, then what does that make the “process”?
•  Answer: The process is the OS for the threads. The OS is recursive.
•  Hence,
–  system ::= h/w isolationprocess
–  process ::= scheduling memory mngt IPCthread*
–  thread ::= process
•  All Peripherals have their own processor and hence their own
specialized OS.
–  There is no I/O, only IPC.
•  For most OSs, IPC wasn’t there or something cumbersome.
•  There were other implications and more to question . . .
The Pouzin Society
© John Day, 2014
All Rights Reserved
22
The Structure of a Process
•  A Process has a recursive structure consisting of task scheduling,
memory management, and inteprocess communication to manage its
tasks, which are, in turn, processes.
•  This is the rest of the Iceberg that OSI only saw the tip of:
•  AEs were just the IPC piece of this more general structure.
Task sched
Mem
Mngt IPC
Tasks
The Pouzin Society
© John Day, 2014
All Rights Reserved
23
What Should a Modern OS
Look Like?
•  It certainly isn’t a 70s timesharing system
The Pouzin Society
© John Day, 2014
All Rights Reserved
24
The OS is actually
a Distributed Management System (DMS)
•  A traditional OS is a heterogeneous DAF that includes the peripherals.
–  The traditional device drivers are members of the DAF.
–  In the case of the disk, it might have several members: one, looks like a
file system, one that looks like a database, and one that yields track and
sector access.
USB-DIF WiFi-DIF
OS - DMS
Printer Disk
Laptop
System
The Pouzin Society
© John Day, 2014
All Rights Reserved
25
The Basic Model
•  A Processing System is the hardware within which processes can
synchronize with shared memory.
•  A Computing System is a collection of processing systems wholly or
partially under the same management domain.
–  The concept of “my computer” or a computing domain
•  The Operating System then is really only the kernel
•  What has been traditionally called the OS is necessarily a distributed
management system, you wouldn’t know it by what is said.
•  Above that may be complex applications that manage their own
resources, i.e. with their own OS.
The Pouzin Society
© John Day, 2014
All Rights Reserved
26
Recursive Operating Systems
Sched Mem IPC
Sched Mem IPC
Sched Mem IPCSched Mem IPC Sched Mem IPC
Sched Mem IPCSched Mem IPC Sched Mem IPC
Device Driver
Device Driver Device Driver
Supervisor
Shell
User Process
User Process
Kernel
Sched Mem IPCSched Mem IPCSched Mem IPC
Each Process has an OS at its core to manage the “Tasks” of that process.
However, “Tasks” are processes to their “tasks” and so on. “Tasks” may be
allocated to their own processor.
The Pouzin Society
© John Day, 2014
All Rights Reserved
27
Gee, that is nice, BUT. . .
•  We are solving Networking problems!
•  Stay focused. One thing at a time!
•  Except that the problem keeps dragging us into answering what is a
distributed application?
•  Well, okay! . . . Then lets just use what we have . . .
The Pouzin Society
© John Day, 2014
All Rights Reserved
28
This Has Implications for DAFs
•  If a DIF is a set of IPC Processes,
–  really Distributed IPC Processes (DIPs?)
•  Then a DAF must be a set of Distributed Application
Processes
–  What else but, DAPs!
•  What Does a DAP look like?
–  If OSs are recursive and are the resource allocators for
Application Processes, then we should use that to organize
DAPs and by extension IPC Processes.
–  Do we have to call them DIPs?
The Pouzin Society
© John Day, 2014
All Rights Reserved
29
Structure of DAP
•  Local Resource Management is the basic Process structure.
–  Have to manage local resources.
•  Then a task for each of these to coordinate with other DAPs in the DAF.
Sched
Mem
Mgt IPC
Local Resource
Management
Tasks
IPCManagement
RIBDaemon
ResourceAllocation
DistDAFManagement
Distributed Resource
Management
The Pouzin Society
© John Day, 2014
All Rights Reserved
30
What Do They Do?
•  DAF Management - is the local agent for the overall management of
the DAF.
•  Resource Allocation - corresponds to task scheduling and manages the
distributed aspects of the load generated by the tasks.
•  RIB Daemon - ensures that the information necessary for the DAP to
perform its function is available, both for tasks and the DAF
components.
•  IPC Management - manages the DAP’s use of supporting DIFs.
The Pouzin Society
© John Day, 2014
All Rights Reserved
31
Distributed Application Facility (DAF)
•  A DAF consists of cooperating DAPs. Each one has
•  The Basic Infrastructure:
–  Resource Management - Cooperates with its peers to manage load, generate forwarding table, etc.
–  RIB Daemon - ensures that information for tasks is available on whatever period or event require, a
schema pager.
–  IPC Management - manages the supporting DIFs, multiplexing and SDU Protection.
–  Tasks - the real work specific to why the DAF exists.
•  DAPs might be assigned synonyms with scope within the DAF and structured to
facilitate use within the DAF. (!)
•  Therefore, a DIF is . . . .
DAF Management
IPC Management Common Application
Protocol
Distributed Resource
Allocation
RIB Daemon
IRM
Tasks
The Pouzin Society
© John Day, 2014
All Rights Reserved
32
Distributed IPC Facility (DIF)
•  A DAF consists of cooperating DAPs. Each one has.
•  The Basic Infrastructure:
–  Resource Management - Cooperates with its peers to manage load.
–  RIB Daemon - ensures that information for tasks is available on whatever period or event
the tasks (and the DAF components) required, routing update, other event notifications
–  IPC Management - manages the supporting DIFs, multiplexing and SDU Protection.
–  Tasks - Flow Allocator, EFCP, and relaying.
•  IPC Processes are assigned synonyms with scope within the DIF and structured to
facilitate routing.
DIF Management
IPC Management Common Application
Protocol
Distributed Resource
Allocation
RIB Daemon
IRM
RMT
EFCP
Flow Allocator
The Pouzin Society
© John Day, 2014
All Rights Reserved
33
A Single Unified Model that Encompasses Operating
Systems, Distributed Applications and Networking
Printer
USB-
DIF
WiFi-
DIF
OS - DAF
DiskLaptop
Operating Systems
IRM
DAPs
IRM
DIFs
Task
sched
Mem
Mngt
IPC
Tasks
Application Process
The Pouzin Society
© John Day, 2014
All Rights Reserved
34
•  Part 1: Basic Concepts of Distributed Systems
•  Part 2: Distributed Applications
–  Chapter 1: Basic Concepts of Distributed Applications
–  Chapter 2: Introduction to Distributed Management Systems
•  Part 3: Distributed InterProcess Communication
–  Chapter 1: Fundamental Structure
–  Chapter 2: DIF Operations
•  New Chapters and Extensions are expected as we learn more.
The Organization of
The RINA Reference Model
The Pouzin Society
© John Day, 2014
All Rights Reserved
35
There’s More to Come
•  DIFs, their Naming and How They Work
•  Then a Look at the Internal Operation of a DIF and the
Implementations.
•  But for Now. . .
The Pouzin Society
© John Day, 2014
All Rights Reserved
36
Questions?

More Related Content

What's hot

1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF WorkshopARCFIRE ICT
 
IRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE WorkshopIRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE WorkshopEleni Trouva
 
RINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussionRINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussionEleni Trouva
 
Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016ICT PRISTINE
 
3. RINA use cases, results, benefits
3. RINA use cases, results, benefits3. RINA use cases, results, benefits
3. RINA use cases, results, benefitsARCFIRE ICT
 
The hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduardThe hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduardICT PRISTINE
 
Reconstructing computer networking with RINA: how solid scientific foundation...
Reconstructing computer networking with RINA: how solid scientific foundation...Reconstructing computer networking with RINA: how solid scientific foundation...
Reconstructing computer networking with RINA: how solid scientific foundation...ICT PRISTINE
 
Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012Eleni Trouva
 
IRATI project presentation
IRATI project presentationIRATI project presentation
IRATI project presentationEleni Trouva
 
Experimental evaluation of a RINA prototype - GC 2014
Experimental evaluation of a RINA prototype - GC 2014Experimental evaluation of a RINA prototype - GC 2014
Experimental evaluation of a RINA prototype - GC 2014Eleni Trouva
 
Update on IRATI technical work after month 6
Update on IRATI technical work after month 6Update on IRATI technical work after month 6
Update on IRATI technical work after month 6Eleni Trouva
 
Rina sdn-2016 mobility
Rina sdn-2016 mobilityRina sdn-2016 mobility
Rina sdn-2016 mobilityARCFIRE ICT
 
RINA Tutorial at ETSI ISG NGP#3
RINA Tutorial at ETSI ISG NGP#3RINA Tutorial at ETSI ISG NGP#3
RINA Tutorial at ETSI ISG NGP#3ARCFIRE ICT
 
IRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, DublinIRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, DublinEleni Trouva
 
Pristine glif 2015
Pristine glif 2015Pristine glif 2015
Pristine glif 2015ICT PRISTINE
 
4. Clearwater on rina
4. Clearwater on rina4. Clearwater on rina
4. Clearwater on rinaARCFIRE ICT
 
Architectures and buildings
Architectures and buildingsArchitectures and buildings
Architectures and buildingsARCFIRE ICT
 
RINA research results - NGP forum - SDN World Congress 2017
RINA research results - NGP forum - SDN World Congress 2017RINA research results - NGP forum - SDN World Congress 2017
RINA research results - NGP forum - SDN World Congress 2017ARCFIRE ICT
 
RINA IRATI Korea-EU Workshop 2013
RINA IRATI Korea-EU Workshop 2013RINA IRATI Korea-EU Workshop 2013
RINA IRATI Korea-EU Workshop 2013Eleni Trouva
 

What's hot (20)

1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop
 
IRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE WorkshopIRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE Workshop
 
RINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussionRINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussion
 
Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016
 
3. RINA use cases, results, benefits
3. RINA use cases, results, benefits3. RINA use cases, results, benefits
3. RINA use cases, results, benefits
 
The hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduardThe hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduard
 
Reconstructing computer networking with RINA: how solid scientific foundation...
Reconstructing computer networking with RINA: how solid scientific foundation...Reconstructing computer networking with RINA: how solid scientific foundation...
Reconstructing computer networking with RINA: how solid scientific foundation...
 
Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012
 
IRATI project presentation
IRATI project presentationIRATI project presentation
IRATI project presentation
 
Experimental evaluation of a RINA prototype - GC 2014
Experimental evaluation of a RINA prototype - GC 2014Experimental evaluation of a RINA prototype - GC 2014
Experimental evaluation of a RINA prototype - GC 2014
 
Update on IRATI technical work after month 6
Update on IRATI technical work after month 6Update on IRATI technical work after month 6
Update on IRATI technical work after month 6
 
Rina sdn-2016 mobility
Rina sdn-2016 mobilityRina sdn-2016 mobility
Rina sdn-2016 mobility
 
RINA Tutorial at ETSI ISG NGP#3
RINA Tutorial at ETSI ISG NGP#3RINA Tutorial at ETSI ISG NGP#3
RINA Tutorial at ETSI ISG NGP#3
 
IRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, DublinIRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, Dublin
 
Pristine glif 2015
Pristine glif 2015Pristine glif 2015
Pristine glif 2015
 
4. Clearwater on rina
4. Clearwater on rina4. Clearwater on rina
4. Clearwater on rina
 
Architectures and buildings
Architectures and buildingsArchitectures and buildings
Architectures and buildings
 
RINA research results - NGP forum - SDN World Congress 2017
RINA research results - NGP forum - SDN World Congress 2017RINA research results - NGP forum - SDN World Congress 2017
RINA research results - NGP forum - SDN World Congress 2017
 
RINA IRATI Korea-EU Workshop 2013
RINA IRATI Korea-EU Workshop 2013RINA IRATI Korea-EU Workshop 2013
RINA IRATI Korea-EU Workshop 2013
 
Intro RINA
Intro RINAIntro RINA
Intro RINA
 

Similar to RINA Introduction, part I

2 introto rina-e130123
2 introto rina-e1301232 introto rina-e130123
2 introto rina-e130123ARCFIRE ICT
 
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokePranoti Doke
 
PacNOG 25: Keeping local traffic local by doing local peering
PacNOG 25: Keeping local traffic local by doing local peering PacNOG 25: Keeping local traffic local by doing local peering
PacNOG 25: Keeping local traffic local by doing local peering APNIC
 
1 lost layer130123
1 lost layer1301231 lost layer130123
1 lost layer130123ARCFIRE ICT
 
DS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfDS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfSantoshUpreti6
 
KHNOG 1: IXPs and Peering
KHNOG 1: IXPs and PeeringKHNOG 1: IXPs and Peering
KHNOG 1: IXPs and PeeringAPNIC
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6APSU
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
 
Three years of OFELIA - taking stock
Three years of OFELIA - taking stockThree years of OFELIA - taking stock
Three years of OFELIA - taking stockFIBRE Testbed
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
The stories of IXP development and the way forward, MYNOG 7
The stories of IXP development and the way forward, MYNOG 7The stories of IXP development and the way forward, MYNOG 7
The stories of IXP development and the way forward, MYNOG 7APNIC
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applicationsjajinekkanti
 
Topic02-Architecture.pptx
Topic02-Architecture.pptxTopic02-Architecture.pptx
Topic02-Architecture.pptxImXaib
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For CybersecurityMohammed Adam
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenĐô GiẢn
 

Similar to RINA Introduction, part I (20)

2 introto rina-e130123
2 introto rina-e1301232 introto rina-e130123
2 introto rina-e130123
 
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti doke
 
PacNOG 25: Keeping local traffic local by doing local peering
PacNOG 25: Keeping local traffic local by doing local peering PacNOG 25: Keeping local traffic local by doing local peering
PacNOG 25: Keeping local traffic local by doing local peering
 
1 lost layer130123
1 lost layer1301231 lost layer130123
1 lost layer130123
 
DS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfDS Unit-4-Communication .pdf
DS Unit-4-Communication .pdf
 
data communication
data communicationdata communication
data communication
 
Vtc keynote201110
Vtc keynote201110Vtc keynote201110
Vtc keynote201110
 
KHNOG 1: IXPs and Peering
KHNOG 1: IXPs and PeeringKHNOG 1: IXPs and Peering
KHNOG 1: IXPs and Peering
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Three years of OFELIA - taking stock
Three years of OFELIA - taking stockThree years of OFELIA - taking stock
Three years of OFELIA - taking stock
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
The stories of IXP development and the way forward, MYNOG 7
The stories of IXP development and the way forward, MYNOG 7The stories of IXP development and the way forward, MYNOG 7
The stories of IXP development and the way forward, MYNOG 7
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Topic02-Architecture.pptx
Topic02-Architecture.pptxTopic02-Architecture.pptx
Topic02-Architecture.pptx
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
 

More from ICT PRISTINE

Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQAssuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQICT PRISTINE
 
Benefits of programmable topological routing policies in RINA-enabled large s...
Benefits of programmable topological routing policies in RINA-enabled large s...Benefits of programmable topological routing policies in RINA-enabled large s...
Benefits of programmable topological routing policies in RINA-enabled large s...ICT PRISTINE
 
The hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diegoThe hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diegoICT PRISTINE
 
The hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzoThe hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzoICT PRISTINE
 
The hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peymanThe hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peymanICT PRISTINE
 
The hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterICT PRISTINE
 
Th hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neilTh hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neilICT PRISTINE
 
The hague rina-workshop-intro-eduard
The hague rina-workshop-intro-eduardThe hague rina-workshop-intro-eduard
The hague rina-workshop-intro-eduardICT PRISTINE
 
The hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguelThe hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguelICT PRISTINE
 
Eucnc rina-tutorial
Eucnc rina-tutorialEucnc rina-tutorial
Eucnc rina-tutorialICT PRISTINE
 
2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)ICT PRISTINE
 
Pristine rina-tnc-2016
Pristine rina-tnc-2016Pristine rina-tnc-2016
Pristine rina-tnc-2016ICT PRISTINE
 
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016ICT PRISTINE
 
Rina acc-icc16-stein
Rina acc-icc16-steinRina acc-icc16-stein
Rina acc-icc16-steinICT PRISTINE
 
Congestion Control in Recursive Network Architectures
Congestion Control in Recursive Network ArchitecturesCongestion Control in Recursive Network Architectures
Congestion Control in Recursive Network ArchitecturesICT PRISTINE
 
Dublin addressingtheproblem131224
Dublin addressingtheproblem131224Dublin addressingtheproblem131224
Dublin addressingtheproblem131224ICT PRISTINE
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015ICT PRISTINE
 
SFR: Scalable Forwarding with RINA for Distributed Clouds
SFR: Scalable Forwarding with RINA for Distributed CloudsSFR: Scalable Forwarding with RINA for Distributed Clouds
SFR: Scalable Forwarding with RINA for Distributed CloudsICT PRISTINE
 
RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks ICT PRISTINE
 

More from ICT PRISTINE (20)

Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQAssuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
 
Benefits of programmable topological routing policies in RINA-enabled large s...
Benefits of programmable topological routing policies in RINA-enabled large s...Benefits of programmable topological routing policies in RINA-enabled large s...
Benefits of programmable topological routing policies in RINA-enabled large s...
 
The hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diegoThe hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diego
 
The hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzoThe hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzo
 
The hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peymanThe hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peyman
 
The hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peter
 
Th hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neilTh hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neil
 
The hague rina-workshop-intro-eduard
The hague rina-workshop-intro-eduardThe hague rina-workshop-intro-eduard
The hague rina-workshop-intro-eduard
 
The hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguelThe hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguel
 
Eucnc rina-tutorial
Eucnc rina-tutorialEucnc rina-tutorial
Eucnc rina-tutorial
 
2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)
 
Pristine rina-tnc-2016
Pristine rina-tnc-2016Pristine rina-tnc-2016
Pristine rina-tnc-2016
 
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016
 
Rina acc-icc16-stein
Rina acc-icc16-steinRina acc-icc16-stein
Rina acc-icc16-stein
 
Congestion Control in Recursive Network Architectures
Congestion Control in Recursive Network ArchitecturesCongestion Control in Recursive Network Architectures
Congestion Control in Recursive Network Architectures
 
Rina sim workshop
Rina sim workshopRina sim workshop
Rina sim workshop
 
Dublin addressingtheproblem131224
Dublin addressingtheproblem131224Dublin addressingtheproblem131224
Dublin addressingtheproblem131224
 
RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015
 
SFR: Scalable Forwarding with RINA for Distributed Clouds
SFR: Scalable Forwarding with RINA for Distributed CloudsSFR: Scalable Forwarding with RINA for Distributed Clouds
SFR: Scalable Forwarding with RINA for Distributed Clouds
 
RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks
 

Recently uploaded

办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 

RINA Introduction, part I

  • 1. The Pouzin Society © John Day, 2014 All Rights Reserved 1 Welcome to the RINAissance! An Introduction to the RINA Architecture Part I 3rd Annual International RINA Workshop John Day Ghent 2015 In a network of devices why would we route between processes? - Toni Stoey, RRG 2009
  • 2. The Pouzin Society © John Day, 2014 All Rights Reserved 2 Levels of Abstraction (Abstraction is Invariance) •  Maximize the Invariant and minimize the discontinuties. •  Today there are essentially no levels of abstraction. Reference Model Service Definitions Protocols Procedures Policies Implementation DecreasingLevelsofAbstraction InvariantVariable
  • 3. The Pouzin Society © John Day, 2014 All Rights Reserved 3 Unlike the Internet •  In RINA, most layers are private. This means that there can be much greater variability in them. –  Here, there is much greater freedom and independence, but with the same code base. •  The Reference Model, APIs, and Protocol Specifications can be combined with off-the-shelf or custom policies to specify a layer. •  The concept of a public network is meaningless in RINA. –  There may be a public layer, but a public network is a non-sequitor. •  Groups may agree on common DIF definitions and policy sets. –  The focus is not on designing protocols, but on defining policies and configuring DIFs. •  Maximizing Invariance reduces operating and equipment complexity, costs and thereby improves management. •  Our goal is to make networks simpler, more predictable, more manageable, and more efficient.
  • 4. The Pouzin Society © John Day, 2014 All Rights Reserved 4 What Do We Mean by Invariance? •  An Easy Example: Separating Mechanism and Policy –  Concept first proposed by Bill Wulf [1975] for operating systems. •  Separating what is common across solutions from what is uncommon. •  Mechanics of memory management are the same, allocation scheme or page replacement policy is what varies. •  In protocols, there are a few mechanisms. Virtually all of the variation is in the policies. –  Acknowledgement is mechanism; when to Ack is policy. –  This has major implication for the structure of protocols. •  We can apply this across the board to simplify and ensure that cooperating layers behave in a compatible manner. •  Leverage is in the commonality, but letting what must vary vary. –  Never take it to extremes. It is subtle task.
  • 5. The Pouzin Society © John Day, 2014 All Rights Reserved 5 The Structure of Protocols •  If we separate mechanism and policy, we find there are •  Two kinds of mechanisms: –  Tightly-Bound: Those that must be associated with the Transfer PDU •  policy is imposed by the sender. –  Loosely-Bound: Those that don’t have to be. •  policy is imposed by the receiver. –  Furthermore, the two are only loosely coupled through a state vector. •  Implies a very different structure for protocols and their implementations •  Noting that syntactic differences are minimal, we can conclude that •  There is one data transfer protocol with a small number of encodings. Tightly-bound (pipelined) Loosely-bound (Policy processing)
  • 6. The Pouzin Society © John Day, 2014 All Rights Reserved 6 Implications: Protocols •  Data Transfer Protocols modify state internal to the Protocol. Application Protocols modify state external to the protocol. •  There are only two protocols (full stop): –  A data transfer protocol, based on Watson’s results, –  An Application protocol that can perform 6 operations on objects: •  Read/Write – Create/Delete – Start/Stop –  There is no distinct protocol like IP. •  Was just a common header fragment anyway. •  A Layer provides IPC to either another layer or to a Distributed Application with a programming language model. The application protocol is the “assembly language” for distributed computing. –  As we shall see, we have now made network architecture independent of protocols.
  • 7. The Pouzin Society © John Day, 2014 All Rights Reserved 7 Delta-t Results (1978) •  Richard Watson proves that the necessary and sufficient conditions for distributed synchronization requires only that 3 timers are bounded: •  Maximum Packet Lifetime •  Maximum number of Retries •  Maximum time before Ack •  Develops delta-t to demonstrate the result, which has some unique implications: –  Assumes all connections exist all the time. –  TCBs are simply caches of state on ones with recent activity •  1981 paper, Watson shows that TCP has all three timers and more. –  Matta et al. (2009) shows that delta-t is more robust under harsh conditions than TCP. Boddapati et al. (2012) shows that it is more secure.
  • 8. The Pouzin Society © John Day, 2014 All Rights Reserved 8 Flaw in the Concept of Connection (in the Internet and OSI) •  In both, a connection starts in the (N+1)-entity and goes to the peer (N+1)-entity. –  This is a beads-on-a-string view. •  (In OSI, while the PTTs insisted on it in the model, it was ignored in practice) •  This combines port allocation and synchronization •  What Watson is saying when he assumes: –  all connections exist all the time. •  Is that Port allocation and Synchronization are distinct. (N+1)-entities (N)-entities (N)-address • • (N)-connection Connection- Endpoint (port-id)
  • 9. The Pouzin Society © John Day, 2014 All Rights Reserved 9 Concept of Connection Synchronization Connection Endpoint Port Allocation Port-id Connection •  Instead delta-t works differently: –  Ports are allocated, then protocol machines create synchronization (shared state) –  And connection-end points are bound to the port-ids. –  We use the term “connection” within the DIF; “flow,” for the service provided •  Not conflating the two has significant implications. –  No traffic for 2MPL, connection disappears, but ports remain allocated –  Bindings are local. We will later see other implications of this.
  • 10. The Pouzin Society © John Day, 2014 All Rights Reserved 10 Implications of Watson’s Results •  No explicit state synchronization, i.e. hard state, is necessary. •  SYNs, FINs are unnecessary •  All properly designed data transfer protocols are soft-state. •  Including protocols like HDLC •  And One Other Thing: •  Watson’s result also defines the bounds of networking or IPC: –  It is IPC if and only if Maximum Packet Lifetime can be bounded. –  If MPL can’t be bounded, it is remote storage.
  • 11. The Pouzin Society © John Day, 2014 All Rights Reserved 11 Connectionless is a Function, Not a Service •  It should not be visible to applications. The choice is made by the layer. –  Another mistake the Internet makes •  Connectionless is characterized by the maximal dissemination of state information and dynamic resource allocation. •  Connection-oriented mechanisms attempt to limit dissemination of state information and tends toward static resource allocation. •  Applications request the allocation of comm resources. •  The layer determines what mechanisms and policies to use. •  Tends toward CO when traffic density is high and deterministic. •  CL when traffic density is low and stochastic.
  • 12. The Pouzin Society © John Day, 2014 All Rights Reserved 12 Applications and Communication: I Is the Application in or out of the IPC environment? •  The early ARPANet/Internet didn’t worry too much about it. They didn’t need to. They weren’t doing any new application development. •  By 1985, OSI had tackled the problem, partly due to turf. Was the Application process inside or outside OSI? •  It wasn’t until the web came along that we had an example that in general an application protocol might be part of many applications and an application might have many application protocols. •  The only known example of a political turf battle leading to a major insight!
  • 13. The Pouzin Society © John Day, 2014 All Rights Reserved 13 Applications and Communication: II •  The Application-Entity (AE) is that part of the application concerned with communication, i.e. shared state with its peer. –  This will turn out to be the “tip of the iceberg,” part of a larger structure. •  The rest of the Application Process is concerned with the reason for the application in the first place. •  An Application Process may have multiple AEs, they assumed, for different application protocols. •  It turns out that this was the tip of an iceberg. Application Process Application Entity Application Entity Inside the Network Outside the Network
  • 14. The Pouzin Society © John Day, 2014 All Rights Reserved 14 The IPC Model (A Purely CS View) Relaying Appl EFCP EFCP EFCP EFCP EFCP EFCP EFCP EFCP Mux Mux User Applications DistributedIPCFacilities
  • 15. The Pouzin Society © John Day, 2014 All Rights Reserved 15 The Implications •  Networking is IPC and only IPC. –  We had been concentrating on the differences, rather than the similarities. –  Of course, there are layers! What else do you call cooperating shared state that is treated as a black box? A waffle!? •  Notice the model never required separate protocols for relaying and error and flow control, i.e. separating TCP and IP. Always do what the model says.* •  All layers have the same functions, with different scope and range. –  Not all instances of layers may need all functions, but don’t need more. –  As we will see, strong layering is better than soft layering. •  A Layer is a Distributed Application that performs and manages IPC. –  A Distributed IPC Facility (DIF) •  This yields a theory and an architecture that scales indefinitely, –  i.e. any bounds imposed are not a property of the architecture itself. •  But this also begs the question: –  If a layer is a Distributed Application that does IPC, then what is a Distributed Application?
  • 16. The Pouzin Society © John Day, 2014 All Rights Reserved 16 *Always Do What the Problem Says This requires a bit more consideration. •  Those who did IP would tell you they were following the problem! –  It was clear that there could be different kinds of transport protocol and they were allowing for that by splitting IP from TCP. •  The problem is that the Problem is a bit coy, she just hints where to go and we have to figure out what she means. ;-) •  In this case, splitting IP from TCP creates problems with fragmentation/reassembly. It breaks the rules. –  Must not be the direction to take. There must be another way to solve the same problem. We have to look for it. •  Those who say “simplifying here will merely produce complexity elsewhere” lack imagination. •  If there is a devil in the details, then there is something wrong with the design. A wrong invariance has been chosen. •  The problem is always an angel! ;-) –  We have to avoid the devils.
  • 17. The Pouzin Society © John Day, 2014 All Rights Reserved 17 That Wasn’t the Only Question •  Well Over a Decade Ago •  We Figured Out that Layers Repeated •  That Created a Potential Problem:
  • 18. The Pouzin Society © John Day, 2014 All Rights Reserved 18 Dykstra says Layers are all Different •  Once a function is done in a layer, it isn’t repeated. •  If you are going to contradict Dykstra, –  you better have a good argument, so . . . Better see what he said. •  The Layers of Dykstra’s THE Operating System •  (THE - Technische Hogeschool Eindhoven) •  “The Structure of the THE-Multiprogramming System,” CACM 11(5) 1968. –  Layer 0 - Multiprogramming –  Layer 1 - Memory Management –  Layer 2 - Console communication –  Layer 3 - I/O –  Layer 4 - User Programs –  Layer 5 - Users (“not implemented by us” - EWD) •  Seem a bit dated, don’t they? How Do You Do This . . . Without This?
  • 19. The Pouzin Society © John Day, 2014 All Rights Reserved 19 A Few Days Later •  Musing about Dykstra’s layers: –  A bit arcane, but 1968 was a long time ago. Machines were far smaller and much more resource constrained. •  We wouldn’t do those layers in an OS today. •  What would we do . . . . –  kernel, supervisor, user . . . –  and they all do the same thing! •  scheduling, memory management and IPC –  OMG! OSs are recursive as well! •  As one might guess, virtualization is not recursion. •  That lead to hmmmmmm
  • 20. The Pouzin Society © John Day, 2014 All Rights Reserved 20 Returned to OSs After A 30 Year Hiatus •  Knowing that the Days Were Over When H/W was a Major Constraint and Distorted Possible Solutions! –  Now things could done the way they should be! •  But what I found was, –  Nothing had Changed. Still same old timesharing systems! •  No one Seems to have Noticed. •  What had Everyone Been Doing!?
  • 21. The Pouzin Society © John Day, 2014 All Rights Reserved 21 What I Saw •  Threads and Heap management were kludgey with all sorts of warts. •  They never answered the question, if a thread is the locus of processing, then what does that make the “process”? •  Answer: The process is the OS for the threads. The OS is recursive. •  Hence, –  system ::= h/w isolationprocess –  process ::= scheduling memory mngt IPCthread* –  thread ::= process •  All Peripherals have their own processor and hence their own specialized OS. –  There is no I/O, only IPC. •  For most OSs, IPC wasn’t there or something cumbersome. •  There were other implications and more to question . . .
  • 22. The Pouzin Society © John Day, 2014 All Rights Reserved 22 The Structure of a Process •  A Process has a recursive structure consisting of task scheduling, memory management, and inteprocess communication to manage its tasks, which are, in turn, processes. •  This is the rest of the Iceberg that OSI only saw the tip of: •  AEs were just the IPC piece of this more general structure. Task sched Mem Mngt IPC Tasks
  • 23. The Pouzin Society © John Day, 2014 All Rights Reserved 23 What Should a Modern OS Look Like? •  It certainly isn’t a 70s timesharing system
  • 24. The Pouzin Society © John Day, 2014 All Rights Reserved 24 The OS is actually a Distributed Management System (DMS) •  A traditional OS is a heterogeneous DAF that includes the peripherals. –  The traditional device drivers are members of the DAF. –  In the case of the disk, it might have several members: one, looks like a file system, one that looks like a database, and one that yields track and sector access. USB-DIF WiFi-DIF OS - DMS Printer Disk Laptop System
  • 25. The Pouzin Society © John Day, 2014 All Rights Reserved 25 The Basic Model •  A Processing System is the hardware within which processes can synchronize with shared memory. •  A Computing System is a collection of processing systems wholly or partially under the same management domain. –  The concept of “my computer” or a computing domain •  The Operating System then is really only the kernel •  What has been traditionally called the OS is necessarily a distributed management system, you wouldn’t know it by what is said. •  Above that may be complex applications that manage their own resources, i.e. with their own OS.
  • 26. The Pouzin Society © John Day, 2014 All Rights Reserved 26 Recursive Operating Systems Sched Mem IPC Sched Mem IPC Sched Mem IPCSched Mem IPC Sched Mem IPC Sched Mem IPCSched Mem IPC Sched Mem IPC Device Driver Device Driver Device Driver Supervisor Shell User Process User Process Kernel Sched Mem IPCSched Mem IPCSched Mem IPC Each Process has an OS at its core to manage the “Tasks” of that process. However, “Tasks” are processes to their “tasks” and so on. “Tasks” may be allocated to their own processor.
  • 27. The Pouzin Society © John Day, 2014 All Rights Reserved 27 Gee, that is nice, BUT. . . •  We are solving Networking problems! •  Stay focused. One thing at a time! •  Except that the problem keeps dragging us into answering what is a distributed application? •  Well, okay! . . . Then lets just use what we have . . .
  • 28. The Pouzin Society © John Day, 2014 All Rights Reserved 28 This Has Implications for DAFs •  If a DIF is a set of IPC Processes, –  really Distributed IPC Processes (DIPs?) •  Then a DAF must be a set of Distributed Application Processes –  What else but, DAPs! •  What Does a DAP look like? –  If OSs are recursive and are the resource allocators for Application Processes, then we should use that to organize DAPs and by extension IPC Processes. –  Do we have to call them DIPs?
  • 29. The Pouzin Society © John Day, 2014 All Rights Reserved 29 Structure of DAP •  Local Resource Management is the basic Process structure. –  Have to manage local resources. •  Then a task for each of these to coordinate with other DAPs in the DAF. Sched Mem Mgt IPC Local Resource Management Tasks IPCManagement RIBDaemon ResourceAllocation DistDAFManagement Distributed Resource Management
  • 30. The Pouzin Society © John Day, 2014 All Rights Reserved 30 What Do They Do? •  DAF Management - is the local agent for the overall management of the DAF. •  Resource Allocation - corresponds to task scheduling and manages the distributed aspects of the load generated by the tasks. •  RIB Daemon - ensures that the information necessary for the DAP to perform its function is available, both for tasks and the DAF components. •  IPC Management - manages the DAP’s use of supporting DIFs.
  • 31. The Pouzin Society © John Day, 2014 All Rights Reserved 31 Distributed Application Facility (DAF) •  A DAF consists of cooperating DAPs. Each one has •  The Basic Infrastructure: –  Resource Management - Cooperates with its peers to manage load, generate forwarding table, etc. –  RIB Daemon - ensures that information for tasks is available on whatever period or event require, a schema pager. –  IPC Management - manages the supporting DIFs, multiplexing and SDU Protection. –  Tasks - the real work specific to why the DAF exists. •  DAPs might be assigned synonyms with scope within the DAF and structured to facilitate use within the DAF. (!) •  Therefore, a DIF is . . . . DAF Management IPC Management Common Application Protocol Distributed Resource Allocation RIB Daemon IRM Tasks
  • 32. The Pouzin Society © John Day, 2014 All Rights Reserved 32 Distributed IPC Facility (DIF) •  A DAF consists of cooperating DAPs. Each one has. •  The Basic Infrastructure: –  Resource Management - Cooperates with its peers to manage load. –  RIB Daemon - ensures that information for tasks is available on whatever period or event the tasks (and the DAF components) required, routing update, other event notifications –  IPC Management - manages the supporting DIFs, multiplexing and SDU Protection. –  Tasks - Flow Allocator, EFCP, and relaying. •  IPC Processes are assigned synonyms with scope within the DIF and structured to facilitate routing. DIF Management IPC Management Common Application Protocol Distributed Resource Allocation RIB Daemon IRM RMT EFCP Flow Allocator
  • 33. The Pouzin Society © John Day, 2014 All Rights Reserved 33 A Single Unified Model that Encompasses Operating Systems, Distributed Applications and Networking Printer USB- DIF WiFi- DIF OS - DAF DiskLaptop Operating Systems IRM DAPs IRM DIFs Task sched Mem Mngt IPC Tasks Application Process
  • 34. The Pouzin Society © John Day, 2014 All Rights Reserved 34 •  Part 1: Basic Concepts of Distributed Systems •  Part 2: Distributed Applications –  Chapter 1: Basic Concepts of Distributed Applications –  Chapter 2: Introduction to Distributed Management Systems •  Part 3: Distributed InterProcess Communication –  Chapter 1: Fundamental Structure –  Chapter 2: DIF Operations •  New Chapters and Extensions are expected as we learn more. The Organization of The RINA Reference Model
  • 35. The Pouzin Society © John Day, 2014 All Rights Reserved 35 There’s More to Come •  DIFs, their Naming and How They Work •  Then a Look at the Internal Operation of a DIF and the Implementations. •  But for Now. . .
  • 36. The Pouzin Society © John Day, 2014 All Rights Reserved 36 Questions?