RINA: Update on research and prototyping activities. Global Future Internet Week 2012

RINA: Update on Research and
Prototyping Activities
Global Future Internet Summit
September 14th
, 2012
Eduard Grasa
Research Manager @ DANA
Fundació i2CAT
Before we start… our perspective
 What is the “Future Internet”?
 We don’t know, we’re just interested in building better computer networks
and finding out the correct ways of doing so.
 Is RINA “clean slate”?
 We’re retaking the direction of computer network research in the mid-70s,
continuing where INWG left off, and learning from the success and mistakes
of 40+ years of computer networking. If we were starting with “no
assumptions” we would not be learning from the past (“Those who don’t know
history are destined to repeat it”)
 What are the design goals of RINA?
 No design goals, we just look at solving the problem of computer networking
and try to maximize the invariances and minimize the discontinuities. All the
results and insights have emerged from listening to the problem.
 Do you have all the answers?
 No way! We’re just beginning to explore the properties of a new paradigm*
that simplifies computer networking by orders of magnitude. Do you want to
join us?
2* Not so new to be honest, initial computer network research (CYCLADES, INWG) was headed in this
Outline
 Quick Introduction to RINA
 Java prototype over IP
 Inter DIF Directory
 RINA Security Assessment
 FP7 IRATI Project: Kernel prototype over
Ethernet
3
RINA Architecture
4
• A structure of recursive layers
that provide IPC (Inter
Process Communication)
services to applications on
top
• There’s a single type of layer
that repeats as many times
as required by the network
designer
• Separation of mechanism
from policy
• All layers have the same functions, with different scope and range.
– Not all instances of layers may need all functions, but don’t need more.
• A Layer is a Distributed Application that performs and manages IPC.
– A Distributed IPC Facility (DIF)
• This yields a theory and an architecture that scales indefinitely,
– i.e. any bounds imposed are not a property of the architecture itself.
© John Day, All Rights Reserved, 2011
Naming and addressing in RINA
 All application processes
(including IPC processes) have a
name that uniquely identifies
them within the application
process namespace.
 In order to facilitate its operation
within a DIF, each IPC process
within a DIF gets a synonym that
may have be structured to
facilitate its use within the DIF
(i.e. an address).
5
 The scope of an address is the DIF, addresses are not visible outside of the DIF.
 The Flow Allocator function of the DIF finds the DIF IPC Process through which a
destination Application process can be accessed.
 Because the architecture is recursive, applications, nodes and PoAs are relative
 For a given DIF of rank N, the IPC Process is a node, the process at the layer N+1
is an application and the process at the layer N-1 is a Point of Attachment.
1 2 3 4
1 2 1 2 3 1 2
1 21 2
DIF A
DIF B
DIF C
DIF D
DIF E DIF F
RINA vs. the current Internet
 Architecture:
 Current: 5/7? layers, layers “2.5”, layer violations, “overlays”, “virtual networks”,
“middleboxes” (NATs, firewalls, application-layer gateways) Getting complex!
Unforeseen interactions
 RINA: Repeating structure, DIF (one type of layer, repeat as needed)
 Naming, addressing and routing:
 Current: No independent application names, no node names, just PoA names,
routing on PoAs (no wonder why multi-homing and mobility is hard to support)
 RINA: Complete naming & addressing, routing on the node; support for multi-
homing and mobility without special protocols. No need for global address
space.
 Congestion control:
 Current: Put in TCP, the worst place it could be, since it maximizes the delay and
variance of the control loop (makes the system chaotic: self-similar traffic)
 RINA: Each layer can perform congestion control, confining the effects of
congestion to that layer. The delay and variance of control loops can be
bound. 6
RINA vs. the current Internet
 Scalability:
 Current: Limited due to the fixed number of layers in the architecture
 RINA: Recursion provides a divide and conquer approach, the way to scalability
 Security:
 Current: No systematic approach to security, secure each protocol or add boxes in
between to improve security (firewalls).
 RINA: Strong design tells you where security functions go in the architecture (see
later in the presentation). DIFs are securable containers.
 Quality of Service:
 Current: Best effort is the dogma, “network neutrality”
 RINA: Each DIF is free to provide the QoS classes it wants, using different policies for
resource allocation, routing and data transfer
 Management:
 Current: Complex, reflecting the complexity in the architecture and the high
number of protocols.
 RINA: The commonality in the structure simplifies management by orders of
magnitude, 7
Outline
 Quick Introduction to RINA
 Java prototype over IP
 Inter DIF Directory
 RINA Security Assessment
 FP7 IRATI Project: Kernel prototype over
Ethernet
8
RINA Adoption strategy
 Start as an overlay to IP, validate technology, work on initial
concepts, develop DIF machinery.
 Useful by itself: internetwork layer(s), decouple application from infrastructure,
improved application API, support for multi-homing and mobility.
9
IP
Ethernet
Physical Media
Applications
Today
TCP or UDP
IP
Ethernet
Physical Media
Applications
Current Prototype
TCP or UDP
DIF
DIF
…
Ethernet
Physical Media
Applications
DIF
DIF
…
IP
Physical Media
Applications
TCP or UDP
DIF
DIF
…
Physical Media
Applications
DIF
DIF
…
End goal
RINA over IP benefits: Internetwork
layer(s)
 What if application A wants to communicate with Application C?
 It cannot do it, unless you start deploying middleboxes like NATs, application-layer gateways,
… The architecture doesn’t accommodate internetworking!
10
Data Link Data Link Data Link Data Link Data Link
IP
IP Layer A (Public Internet)
IP
IP Layer B (Enterprise
Network)
TCP
Appl. A Appl. B
Data Link Data Link Data Link Data Link Data Link
IP
IP Layer A (Public Internet)
IP
IP Layer B (Enterprise
Network)
Shim DIF
Appl. A Appl. B Appl. C
Shim DIF
DIF
TCP
Appl. C
RINA over IP benefits: Separate
applications from infrastructure
 There is no separate application namespace, but synonyms that
stand for an IP address and a TCP/UDP port number:
 A path to an application.
 This makes anything but client/server hard to achieve, e.g. mobility
 In RINA application names are independent of the layers below
(DIFs)
 Application names can be structured in a way that makes sense for
the application
 The application name doesn’t contain the semantics of where the
application is in the network (i.e. what is its point of attachment to the
layer below) 11
 http://pouzinsociety.org
Synonym of an
interface of a host
Port (Endpoint of TCP
connection)
:80
RINA over IP benefits: Next
generation VPN
 DIFs are customizable VPNs that can span multiple IP layers.
 Each DIF has its own addressing scheme, security mechanisms (authentication,
authorization), routing strategy, resource allocation strategy (support for
different levels of QoS), flow control strategy, data transfer/data transfer
control, …
 Processes (and not systems) are members of the DIFs (different processes can
access different DIFs in each system). Processes may not have access to the
whole range of DIFs available on their system
 DIFs open the door to VPNs optimized for certain applications
12
Data Link Data Link Data Link Data Link Data Link
IP
IP Layer A (Public Internet)
IP
IP Layer B (Enterprise
Network)
Shim DIF
Appl. A Appl. B Appl. C
Shim DIF
DIF
Architectural model
DIF
System (Host)
IPC
Process
IPC
Process
Mgmt
Agemt
System
(Router)
IPC
Process
IPC
Process
IPC
Process
Mgmt
Agemt
System
(Host)
IPC
Process
IPC
Process
Mgmt
Agemt
Appl.
Process
DIF DIF
Appl.
Process
IPC API
Data Transfer Data Transfer Control Layer Management
SDU Delimiting
Data Transfer
Relaying and
Multiplexing
SDU Protection
Transmission
Control
Retransmission
Control
Flow Control
RIB
Daemon
RIBRIB CDAP
Parser/Generator
CACEP Enrollment
Flow Allocation
Resource
Allocation
Forwarding Table
Generator
Authentication
StateVector
StateVectorStateVector
Data TransferData Transfer
Transmission
Control
Transmission
Control
Retransmission
Control
Retransmission
Control
Flow Control
Flow Control
13
IPC
Resource
Mgt.
Inter DIF
Directory
SDU
Protec
tion
Multipl
exing
IPC Mgt. Tasks
Other Mgt. Tasks
Application Specific
Tasks
Increasing timescale (functions performed less often) and complexity
The Shim DIF
14
Public Internet Private IP
network
“Shim IPC
Process”
“Shim IPC
Process”
IPC
Process
“Shim IPC
Process”
IPC
Process
IPC
Process
“Shim IPC
Process”
Shim DIFShim DIF
DIF
Appl.
Process
Appl.
Process
UDP flow UDP flow
TCP
flow(s)
TCP
flow(s)
 The “shim IPC Process” for IP layers is not a “real IPC Process”. It just
presents an IP layer as if it was a regular DIF.
 Wraps the IP layer with the DIF interface.
 Maps the names of the IPC Processes of the layer above to IP addresses in the
IP layer.
 Creates TCP and/or UDP flows based on the QoS requested by an “allocate
request”.
Implementation platform
 Implemented as part of the TINOS framework (a network
protocol experimentation framework)
 https://github.com/PouzinSociety/tinos
 Implemented in Java, using the OSGi technology (OSGi
container provided by Eclipse Virgo)
 OSGi is a component model that facilitates building modular Java
applications
 Developed on Mac OS X and Linux Debian, but should be multi-
platform (support all the platforms that Eclipse Virgo supports)
 Found some OS resource allocation issues with Mac OS X
 Not yet fully integrated with TINOS (once it is, it will be possible to
instantiate several “systems” within a single Java process, using
XMPP as the underlying “physical substrate”)
15
Java Virtual Machine
Why using TINOS instead of raw Java?
To facilitate experimentation: bigger scenarios without adding more hardware
IP (Jnode)
Data Link Data Link Data Link
Shim DIF
Data Link Data Link
IP (Jnode)
Shim DIF
DIF
Java Virtual Machine
IP (Jnode)
Data Link Data Link Data Link
Shim DIF
Data Link Data Link
IP (Jnode)
Shim DIF
DIF
Java Virtual Machine
Data Link
IP (OS stack)
Shim DIF
Java Virtual
Machine
Data Link
IP (JNode)
Shim DIF
Public
Internet
Data
Link
IP
(O
Sstack)
Shim
DIF
DIF
XMPP network
LAN
 With TINOS multiple nodes can be created within
the same Java JVM, with different network
connectivity with each other and other JVMs
(TINOS uses adapted IP stack from JNode and
XMPP for this)
Current status & some conclusions
 Since all the layers have the same mechanisms with different policies,
implementation becomes much simpler than today’s protocol
suite(therefore more effort can be devoted to making it more robust and
efficient)
 Also no need to distinguish between ‘physical’ or ‘virtual’ networking protocols: it’s all IPC.
 Customization & innovation in networking becomes much easier
 Just focus on the area you’re interested in and change the relevant policies for yours (NOTE:
Today “changing the policies” in the prototype means modifying the code, since
developing a pluggable policy framework is out of the scope of the initial prototype)
 Interoperability with existing networking technologies is not an issue
 Just wrap the XX layer as a shim DIF, and there you go 17
IPC API
Data Transfer Data Transfer Control Layer Management
SDU Delimiting
Data Transfer
Relaying and
Multiplexing
SDU Protection
Transmission
Control
Retransmission
Control
Flow Control
RIB
Daemon
RIBRIB CDAP
Parser/Generator
CACE Enrollment
Flow Allocation
Resource
Allocation
Forwarding Table
Generator
AuthenticationStateVector
StateVectorStateVector
Data TransferData Transfer
Transmission
Control
Transmission
Control
Retransmission
Control
Retransmission
Control
Flow Control
Flow Control
Outline
 Quick Introduction to RINA
 Java prototype over IP
 Inter DIF Directory
 RINA Security Assessment
 FP7 IRATI Project: Kernel prototype over
Ethernet
18
What’s a layer?
 Although the term “layer” has been extensively used in
networking, the concept itself has not been clearly defined.
 In its origin layers were adopted from its use in operating systems.
But in operating systems, using layers is a choice, whereas using
layers in networks is a necessity because of the distributed
shared state of different scopes
 The necessary and sufficient condition for a layer is distributed
shared state of different scope.
 Therefore we can describe a layer as the collection of
application processes that share state.
Physical
Data Link
Network
Transport
Application
Host or End System
Router
Less
Scope
More
Scope
19
Application discovery involves also layer
discovery
host H2
router R2 router R3
host H1
Layer 1
web server
application
B
web
browser
application
A
router R4
router R1
host H4
Layer 3
Layer 2
Layer 4
Layer 6
Layer 5
router R5
host H3
web server
application
C
20
The InterDIF Directory (IDD)
 A distributed application, Distributed Application Facility (DAF) as
it’s called in RINA, which is a collection of two or more
cooperating application processes in one or more processing
systems, which exchange information using IPC and maintain
shared state
 The IDD DAF maintains a distributed database that keeps
mappings of application names to list of supporting layers
 The IDD is responsible for two main distinct functions:
a) Discovery of the application
b) Creation of the supporting DIF
21
A) Discovery of the application (I)
 IDD-Request
 Destination IDD Name, Source IDD Name, Requested Application
Process Name, Access Control Information, Quality of Service,
Termination Condition
 Forwarding of the request between the peer IDDs until the
destination application is found or the pre-defined termination
condition is met
host H2
router R2 router R3
host H1
web server
application
B
web
browser
application
A
router R4
router R1
host H4
Layer 6
router R5
host H3
...
Layer 1
Layer 3
Layer 2
Layer 4Layer 5
IDD DAF
web server
application
C
22
A) Discovery of the application (II)
 Confirmation that the requested application is executing in
the destination system and authorization check that the
requesting application has the rights to access it
host H2
router R2 router R3
host H1
web server
application
B
web
browser
application
A
router R4
router R1
host H4
Layer 6
router R5
host H3
...
Layer 1
Layer 3
Layer 2
Layer 4Layer 5
IDD DAF
web server
application
C
23
B) Creation of the supporting DIF
 A DIF supporting the communication between the two user
applications has to be found
 This either involves creating a new DIF from scratch or
expanding (joining) an existing one so that it spans from the
source to the destination system
host H2
router R2 router R3
host H1
web server
application
B
web
browser
application
A
router R4
router R1
host H4
Layer 6
router R5
host H3
...
Layer 1
Layer 3
Layer 2
Layer 4Layer 5
IDD DAF
web server
application
C
24
Current status
 Ph.D. thesis ongoing
 Defined the IDD Framework. Current research is focused in
application discovery; looking at different policies to perform
the IDD search, the replication of the directory information,
and compare them in terms of:
 Time to discover the requested application
 Average number of messages generated on the IDD DAF per search
 Average number of hops needed to locate the destination application
 Time to distribute directory updates, and average number of messages
generated by directory update
 Java simulator of the IDD is being implemented. After results
have been tested in the simulator, the IDD framework and
some selected policies will be ported to the prototypes
25
Outline
 Quick Introduction to RINA
 Java prototype over IP
 Inter DIF Directory
 RINA Security Assessment
 FP7 IRATI Project: Kernel prototype over
Ethernet
26
 Benefits of having an architecture instead of a protocol suite: the
architecture tells you where security related functions are placed.
 Instead of thinking protocol security, think security of the architecture: no
more ‘each protocol has its own security’, ‘add another protocol for
security’ or ‘add another box that does security’
Allocating a flow to
destination application
Access control
Sending/receiving PDUs
through N-1 DIF
Confidentiality, integrity
Placement of security related functions
27
N DIF
N-1 DIF
IPC
Process
IPC
Process
IPC
Process
IPC
Process Joining a DIF
authentication,
access control
Sending/receiving PDUs
through N-1 DIF
Confidentiality, integrity
Allocating a flow to
destination application
Access control
IPC
Process
Appl.
Process
Access control
(DIF members)
Confidentiality, integrity
Authentication
Access control
(Flow allocations to apps)
DIF Operation
Logging
DIF Operation
Logging
DIFs are securable containers
 Master thesis on RINA security assessment (results to be
published)
 Possible attacks to a DIF
 Information required to perform these attacks
 Mitigation measures against these attacks
 Comparison to the current Internet
 Concludes that DIFs are securable containers if proper
standard security tools are used (authentication, access
control, confidentiality, integrity and strong auditing)
 Securable = A structure used to hold or transport something that can be
made to be not subject to threat
 Again, with a proper structure in place, achieving better
security in networks is much simpler and cost-effective than
in the current situation
28
Outline
 Quick Introduction to RINA
 Java prototype over IP
 Inter DIF Directory
 RINA Security Assessment
 FP7 IRATI Project: Kernel prototype over
Ethernet
29
 What? Main goal
 To advance the state of the art of RINA towards an architecture reference model and
specifications that are closer to enable implementations deployable in production
scenarios. The design and implementation of a RINA prototype on top of Ethernet will
enable the experimentation and evaluation of RINA in comparison to TCP/IP.
 Who? 4 partners
 How? Requested 870.000 € funding to the EC to perform 5 activities
 WP1: Project management
 WP2: Architecture, Use cases and Requirements
 WP3: Software Design and Implementation
 WP4: Deployment into OFELIA testbed, Experimentation and Validation
 WP5: Dissemination, Standardisation and Exploitation
Project at a glance
Nextworks
Interoute
i2CAT
IBBT
Thanks for your attention!
You can contact me at
eduard.grasa@i2cat.net
More information about RINA at http://rina.tssg.org,
http://pouzinsociety.org, http://csr.bu.edu/rina
More information about the prototype at
https://github.com/PouzinSociety/tinos/wiki/RINA-Prototype
More information about IRATI at
http://irati.eu
1 von 31

Recomendados

IRATI project presentation von
IRATI project presentationIRATI project presentation
IRATI project presentationEleni Trouva
1.6K views17 Folien
Unreliable inter process communication in Ethernet: Migrating to RINA with th... von
Unreliable inter process communication in Ethernet: Migrating to RINA with th...Unreliable inter process communication in Ethernet: Migrating to RINA with th...
Unreliable inter process communication in Ethernet: Migrating to RINA with th...Eleni Trouva
1.9K views22 Folien
RINA IRATI Korea-EU Workshop 2013 von
RINA IRATI Korea-EU Workshop 2013RINA IRATI Korea-EU Workshop 2013
RINA IRATI Korea-EU Workshop 2013Eleni Trouva
1.7K views17 Folien
Update on IRATI technical work after month 6 von
Update on IRATI technical work after month 6Update on IRATI technical work after month 6
Update on IRATI technical work after month 6Eleni Trouva
1.9K views78 Folien
Irati fire-engineering-workshop-nov2012 von
Irati fire-engineering-workshop-nov2012Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012Eleni Trouva
1.6K views15 Folien
Experimental evaluation of a RINA prototype - GC 2014 von
Experimental evaluation of a RINA prototype - GC 2014Experimental evaluation of a RINA prototype - GC 2014
Experimental evaluation of a RINA prototype - GC 2014Eleni Trouva
2.1K views16 Folien

Más contenido relacionado

Was ist angesagt?

RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7 von
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7Eleni Trouva
1.7K views51 Folien
Rina IRATI GLIF Singapore 2013 von
Rina IRATI GLIF Singapore 2013Rina IRATI GLIF Singapore 2013
Rina IRATI GLIF Singapore 2013Eleni Trouva
1.9K views29 Folien
IRATI Experimentation, US-EU FIRE Workshop von
IRATI Experimentation, US-EU FIRE WorkshopIRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE WorkshopEleni Trouva
1.7K views12 Folien
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012 von
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012Eleni Trouva
1.8K views46 Folien
Pristine glif 2015 von
Pristine glif 2015Pristine glif 2015
Pristine glif 2015ICT PRISTINE
1.4K views29 Folien
Irati goals and achievements - 3rd RINA Workshop von
Irati goals and achievements - 3rd RINA WorkshopIrati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA WorkshopEleni Trouva
650 views27 Folien

Was ist angesagt?(20)

RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7 von Eleni Trouva
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
Eleni Trouva1.7K views
Rina IRATI GLIF Singapore 2013 von Eleni Trouva
Rina IRATI GLIF Singapore 2013Rina IRATI GLIF Singapore 2013
Rina IRATI GLIF Singapore 2013
Eleni Trouva1.9K views
IRATI Experimentation, US-EU FIRE Workshop von Eleni Trouva
IRATI Experimentation, US-EU FIRE WorkshopIRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE Workshop
Eleni Trouva1.7K views
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012 von Eleni Trouva
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
Eleni Trouva1.8K views
Irati goals and achievements - 3rd RINA Workshop von Eleni Trouva
Irati goals and achievements - 3rd RINA WorkshopIrati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA Workshop
Eleni Trouva650 views
1. RINA motivation - TF Workshop von ARCFIRE ICT
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop
ARCFIRE ICT1.6K views
IRATI: an open source RINA implementation for Linux/OS von ICT PRISTINE
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
ICT PRISTINE2.1K views
Pristine rina-sdk-icc-2016 von ICT PRISTINE
Pristine rina-sdk-icc-2016Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016
ICT PRISTINE1.8K views
Architectures and buildings von ARCFIRE ICT
Architectures and buildingsArchitectures and buildings
Architectures and buildings
ARCFIRE ICT283 views
EU-Taiwan Workshop on 5G Research, PRISTINE introduction von ICT PRISTINE
EU-Taiwan Workshop on 5G Research, PRISTINE introductionEU-Taiwan Workshop on 5G Research, PRISTINE introduction
EU-Taiwan Workshop on 5G Research, PRISTINE introduction
ICT PRISTINE1.4K views
3. RINA use cases, results, benefits von ARCFIRE ICT
3. RINA use cases, results, benefits3. RINA use cases, results, benefits
3. RINA use cases, results, benefits
ARCFIRE ICT1.7K views
RINA research results - NGP forum - SDN World Congress 2017 von ARCFIRE ICT
RINA research results - NGP forum - SDN World Congress 2017RINA research results - NGP forum - SDN World Congress 2017
RINA research results - NGP forum - SDN World Congress 2017
ARCFIRE ICT656 views
RINA Tutorial @ IEEE Globecom 2014 von Eleni Trouva
RINA Tutorial @ IEEE Globecom 2014RINA Tutorial @ IEEE Globecom 2014
RINA Tutorial @ IEEE Globecom 2014
Eleni Trouva4.4K views
Reconstructing computer networking with RINA: how solid scientific foundation... von ICT PRISTINE
Reconstructing computer networking with RINA: how solid scientific foundation...Reconstructing computer networking with RINA: how solid scientific foundation...
Reconstructing computer networking with RINA: how solid scientific foundation...
ICT PRISTINE2.2K views
Pristine rina-tnc-2016 von ICT PRISTINE
Pristine rina-tnc-2016Pristine rina-tnc-2016
Pristine rina-tnc-2016
ICT PRISTINE1.4K views
2. RINA overview - TF workshop von ARCFIRE ICT
2. RINA overview - TF workshop2. RINA overview - TF workshop
2. RINA overview - TF workshop
ARCFIRE ICT1.6K views
Eucnc rina-tutorial von ICT PRISTINE
Eucnc rina-tutorialEucnc rina-tutorial
Eucnc rina-tutorial
ICT PRISTINE1.4K views
Rina acc-icc16-stein von ICT PRISTINE
Rina acc-icc16-steinRina acc-icc16-stein
Rina acc-icc16-stein
ICT PRISTINE1.4K views

Destacado

Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ von
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQAssuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQICT PRISTINE
656 views16 Folien
A Wake-Up Call for IoT von
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
1.6K views57 Folien
3 addressingthe problem130123 von
3 addressingthe problem1301233 addressingthe problem130123
3 addressingthe problem130123Eleni Trouva
463 views46 Folien
10 myths about cloud computing von
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computingAhmed Banafa
967 views40 Folien
Rina sim workshop von
Rina sim workshopRina sim workshop
Rina sim workshopICT PRISTINE
1.5K views17 Folien
The hague rina-workshop-welcome-miguel von
The hague rina-workshop-welcome-miguelThe hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguelICT PRISTINE
569 views2 Folien

Destacado(14)

Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ von ICT PRISTINE
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQAssuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
ICT PRISTINE656 views
A Wake-Up Call for IoT von Ahmed Banafa
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa1.6K views
3 addressingthe problem130123 von Eleni Trouva
3 addressingthe problem1301233 addressingthe problem130123
3 addressingthe problem130123
Eleni Trouva463 views
10 myths about cloud computing von Ahmed Banafa
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computing
Ahmed Banafa967 views
The hague rina-workshop-welcome-miguel von ICT PRISTINE
The hague rina-workshop-welcome-miguelThe hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguel
ICT PRISTINE569 views
Th hauge rina-workshop-sdn-virtualisation_neil von ICT PRISTINE
Th hauge rina-workshop-sdn-virtualisation_neilTh hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neil
ICT PRISTINE1K views
The hague rina-workshop-mobility-eduard von ICT PRISTINE
The hague rina-workshop-mobility-eduardThe hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduard
ICT PRISTINE808 views
The hague rina-workshop-interop-deployment_vincenzo von ICT PRISTINE
The hague rina-workshop-interop-deployment_vincenzoThe hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzo
ICT PRISTINE834 views
The hageu rina-workshop-security-peter von ICT PRISTINE
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peter
ICT PRISTINE848 views
The hague rina-workshop-nfv-diego von ICT PRISTINE
The hague rina-workshop-nfv-diegoThe hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diego
ICT PRISTINE893 views
The hague rina-workshop-congestioncontrol-peyman von ICT PRISTINE
The hague rina-workshop-congestioncontrol-peymanThe hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peyman
ICT PRISTINE876 views
Congestion Control in Recursive Network Architectures von ICT PRISTINE
Congestion Control in Recursive Network ArchitecturesCongestion Control in Recursive Network Architectures
Congestion Control in Recursive Network Architectures
ICT PRISTINE1.3K views
Pristine rina-security-icc-2016 von ICT PRISTINE
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016
ICT PRISTINE1.7K views

Similar a RINA: Update on research and prototyping activities. Global Future Internet Week 2012

RINA essentials, PISA Internet Festival 2015 von
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015ICT PRISTINE
299 views18 Folien
Rina converged network operator - etsi workshop von
Rina converged network operator -  etsi workshopRina converged network operator -  etsi workshop
Rina converged network operator - etsi workshopARCFIRE ICT
727 views13 Folien
5G Cellular D2D RDMA Clusters von
5G Cellular D2D RDMA Clusters5G Cellular D2D RDMA Clusters
5G Cellular D2D RDMA ClustersYitzhak Bar-Geva
4.3K views58 Folien
2016 06-10-ieee-sdn (1) von
2016 06-10-ieee-sdn (1)2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)ICT PRISTINE
873 views14 Folien
osi-tcp.ppt von
osi-tcp.pptosi-tcp.ppt
osi-tcp.pptRashmin Tanna
2 views29 Folien
Netsoft19 Keynote: Fluid Network Planes von
Netsoft19 Keynote: Fluid Network PlanesNetsoft19 Keynote: Fluid Network Planes
Netsoft19 Keynote: Fluid Network PlanesChristian Esteve Rothenberg
184 views66 Folien

Similar a RINA: Update on research and prototyping activities. Global Future Internet Week 2012(20)

RINA essentials, PISA Internet Festival 2015 von ICT PRISTINE
RINA essentials, PISA Internet Festival 2015RINA essentials, PISA Internet Festival 2015
RINA essentials, PISA Internet Festival 2015
ICT PRISTINE299 views
Rina converged network operator - etsi workshop von ARCFIRE ICT
Rina converged network operator -  etsi workshopRina converged network operator -  etsi workshop
Rina converged network operator - etsi workshop
ARCFIRE ICT727 views
2016 06-10-ieee-sdn (1) von ICT PRISTINE
2016 06-10-ieee-sdn (1)2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)
ICT PRISTINE873 views
The hague rina-workshop-intro-eduard von ICT PRISTINE
The hague rina-workshop-intro-eduardThe hague rina-workshop-intro-eduard
The hague rina-workshop-intro-eduard
ICT PRISTINE808 views
How Modbus Is A Type Of Communication von Monica Ramos
How Modbus Is A Type Of CommunicationHow Modbus Is A Type Of Communication
How Modbus Is A Type Of Communication
Monica Ramos2 views
Peer-to-peer Internet telephony von Kundan Singh
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephony
Kundan Singh1.9K views
Private Network Project for Colleges von Aditya Jain
Private Network Project for CollegesPrivate Network Project for Colleges
Private Network Project for Colleges
Aditya Jain6.3K views
Sinnreich Henry Johnston Alan Pt 2 von Carl Ford
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2
Carl Ford611 views
Cloud Camp Milan 2K9 Telecom Italia: Where P2P? von Gabriele Bozzi
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Gabriele Bozzi432 views
CloudCamp Milan 2009: Telecom Italia von Gabriele Bozzi
CloudCamp Milan 2009: Telecom ItaliaCloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom Italia
Gabriele Bozzi322 views
Resume_Appaji von Appaji K
Resume_AppajiResume_Appaji
Resume_Appaji
Appaji K399 views
Contextual Analysis Plan von Anna Shaw
Contextual Analysis PlanContextual Analysis Plan
Contextual Analysis Plan
Anna Shaw2 views

Último

AMD: 4th Generation EPYC CXL Demo von
AMD: 4th Generation EPYC CXL DemoAMD: 4th Generation EPYC CXL Demo
AMD: 4th Generation EPYC CXL DemoCXL Forum
126 views6 Folien
MemVerge: Gismo (Global IO-free Shared Memory Objects) von
MemVerge: Gismo (Global IO-free Shared Memory Objects)MemVerge: Gismo (Global IO-free Shared Memory Objects)
MemVerge: Gismo (Global IO-free Shared Memory Objects)CXL Forum
112 views16 Folien
Samsung: CMM-H Tiered Memory Solution with Built-in DRAM von
Samsung: CMM-H Tiered Memory Solution with Built-in DRAMSamsung: CMM-H Tiered Memory Solution with Built-in DRAM
Samsung: CMM-H Tiered Memory Solution with Built-in DRAMCXL Forum
105 views7 Folien
Empathic Computing: Delivering the Potential of the Metaverse von
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the MetaverseMark Billinghurst
449 views80 Folien
Transcript: The Details of Description Techniques tips and tangents on altern... von
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...BookNet Canada
119 views15 Folien
MemVerge: Memory Viewer Software von
MemVerge: Memory Viewer SoftwareMemVerge: Memory Viewer Software
MemVerge: Memory Viewer SoftwareCXL Forum
118 views10 Folien

Último(20)

AMD: 4th Generation EPYC CXL Demo von CXL Forum
AMD: 4th Generation EPYC CXL DemoAMD: 4th Generation EPYC CXL Demo
AMD: 4th Generation EPYC CXL Demo
CXL Forum126 views
MemVerge: Gismo (Global IO-free Shared Memory Objects) von CXL Forum
MemVerge: Gismo (Global IO-free Shared Memory Objects)MemVerge: Gismo (Global IO-free Shared Memory Objects)
MemVerge: Gismo (Global IO-free Shared Memory Objects)
CXL Forum112 views
Samsung: CMM-H Tiered Memory Solution with Built-in DRAM von CXL Forum
Samsung: CMM-H Tiered Memory Solution with Built-in DRAMSamsung: CMM-H Tiered Memory Solution with Built-in DRAM
Samsung: CMM-H Tiered Memory Solution with Built-in DRAM
CXL Forum105 views
Empathic Computing: Delivering the Potential of the Metaverse von Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst449 views
Transcript: The Details of Description Techniques tips and tangents on altern... von BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada119 views
MemVerge: Memory Viewer Software von CXL Forum
MemVerge: Memory Viewer SoftwareMemVerge: Memory Viewer Software
MemVerge: Memory Viewer Software
CXL Forum118 views
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum... von NUS-ISS
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
NUS-ISS28 views
Microchip: CXL Use Cases and Enabling Ecosystem von CXL Forum
Microchip: CXL Use Cases and Enabling EcosystemMicrochip: CXL Use Cases and Enabling Ecosystem
Microchip: CXL Use Cases and Enabling Ecosystem
CXL Forum129 views
Future of Learning - Yap Aye Wee.pdf von NUS-ISS
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
NUS-ISS38 views
Combining Orchestration and Choreography for a Clean Architecture von ThomasHeinrichs1
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean Architecture
ThomasHeinrichs168 views
JCon Live 2023 - Lice coding some integration problems von Bernd Ruecker
JCon Live 2023 - Lice coding some integration problemsJCon Live 2023 - Lice coding some integration problems
JCon Live 2023 - Lice coding some integration problems
Bernd Ruecker67 views
GigaIO: The March of Composability Onward to Memory with CXL von CXL Forum
GigaIO: The March of Composability Onward to Memory with CXLGigaIO: The March of Composability Onward to Memory with CXL
GigaIO: The March of Composability Onward to Memory with CXL
CXL Forum126 views
Understanding GenAI/LLM and What is Google Offering - Felix Goh von NUS-ISS
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS39 views
Data-centric AI and the convergence of data and model engineering: opportunit... von Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier29 views
The Importance of Cybersecurity for Digital Transformation von NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS25 views
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV von Splunk
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk86 views
Astera Labs: Intelligent Connectivity for Cloud and AI Infrastructure von CXL Forum
Astera Labs:  Intelligent Connectivity for Cloud and AI InfrastructureAstera Labs:  Intelligent Connectivity for Cloud and AI Infrastructure
Astera Labs: Intelligent Connectivity for Cloud and AI Infrastructure
CXL Forum125 views
"How we switched to Kanban and how it integrates with product planning", Vady... von Fwdays
"How we switched to Kanban and how it integrates with product planning", Vady..."How we switched to Kanban and how it integrates with product planning", Vady...
"How we switched to Kanban and how it integrates with product planning", Vady...
Fwdays61 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 von Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi113 views

RINA: Update on research and prototyping activities. Global Future Internet Week 2012

  • 1. RINA: Update on Research and Prototyping Activities Global Future Internet Summit September 14th , 2012 Eduard Grasa Research Manager @ DANA Fundació i2CAT
  • 2. Before we start… our perspective  What is the “Future Internet”?  We don’t know, we’re just interested in building better computer networks and finding out the correct ways of doing so.  Is RINA “clean slate”?  We’re retaking the direction of computer network research in the mid-70s, continuing where INWG left off, and learning from the success and mistakes of 40+ years of computer networking. If we were starting with “no assumptions” we would not be learning from the past (“Those who don’t know history are destined to repeat it”)  What are the design goals of RINA?  No design goals, we just look at solving the problem of computer networking and try to maximize the invariances and minimize the discontinuities. All the results and insights have emerged from listening to the problem.  Do you have all the answers?  No way! We’re just beginning to explore the properties of a new paradigm* that simplifies computer networking by orders of magnitude. Do you want to join us? 2* Not so new to be honest, initial computer network research (CYCLADES, INWG) was headed in this
  • 3. Outline  Quick Introduction to RINA  Java prototype over IP  Inter DIF Directory  RINA Security Assessment  FP7 IRATI Project: Kernel prototype over Ethernet 3
  • 4. RINA Architecture 4 • A structure of recursive layers that provide IPC (Inter Process Communication) services to applications on top • There’s a single type of layer that repeats as many times as required by the network designer • Separation of mechanism from policy • All layers have the same functions, with different scope and range. – Not all instances of layers may need all functions, but don’t need more. • A Layer is a Distributed Application that performs and manages IPC. – A Distributed IPC Facility (DIF) • This yields a theory and an architecture that scales indefinitely, – i.e. any bounds imposed are not a property of the architecture itself. © John Day, All Rights Reserved, 2011
  • 5. Naming and addressing in RINA  All application processes (including IPC processes) have a name that uniquely identifies them within the application process namespace.  In order to facilitate its operation within a DIF, each IPC process within a DIF gets a synonym that may have be structured to facilitate its use within the DIF (i.e. an address). 5  The scope of an address is the DIF, addresses are not visible outside of the DIF.  The Flow Allocator function of the DIF finds the DIF IPC Process through which a destination Application process can be accessed.  Because the architecture is recursive, applications, nodes and PoAs are relative  For a given DIF of rank N, the IPC Process is a node, the process at the layer N+1 is an application and the process at the layer N-1 is a Point of Attachment. 1 2 3 4 1 2 1 2 3 1 2 1 21 2 DIF A DIF B DIF C DIF D DIF E DIF F
  • 6. RINA vs. the current Internet  Architecture:  Current: 5/7? layers, layers “2.5”, layer violations, “overlays”, “virtual networks”, “middleboxes” (NATs, firewalls, application-layer gateways) Getting complex! Unforeseen interactions  RINA: Repeating structure, DIF (one type of layer, repeat as needed)  Naming, addressing and routing:  Current: No independent application names, no node names, just PoA names, routing on PoAs (no wonder why multi-homing and mobility is hard to support)  RINA: Complete naming & addressing, routing on the node; support for multi- homing and mobility without special protocols. No need for global address space.  Congestion control:  Current: Put in TCP, the worst place it could be, since it maximizes the delay and variance of the control loop (makes the system chaotic: self-similar traffic)  RINA: Each layer can perform congestion control, confining the effects of congestion to that layer. The delay and variance of control loops can be bound. 6
  • 7. RINA vs. the current Internet  Scalability:  Current: Limited due to the fixed number of layers in the architecture  RINA: Recursion provides a divide and conquer approach, the way to scalability  Security:  Current: No systematic approach to security, secure each protocol or add boxes in between to improve security (firewalls).  RINA: Strong design tells you where security functions go in the architecture (see later in the presentation). DIFs are securable containers.  Quality of Service:  Current: Best effort is the dogma, “network neutrality”  RINA: Each DIF is free to provide the QoS classes it wants, using different policies for resource allocation, routing and data transfer  Management:  Current: Complex, reflecting the complexity in the architecture and the high number of protocols.  RINA: The commonality in the structure simplifies management by orders of magnitude, 7
  • 8. Outline  Quick Introduction to RINA  Java prototype over IP  Inter DIF Directory  RINA Security Assessment  FP7 IRATI Project: Kernel prototype over Ethernet 8
  • 9. RINA Adoption strategy  Start as an overlay to IP, validate technology, work on initial concepts, develop DIF machinery.  Useful by itself: internetwork layer(s), decouple application from infrastructure, improved application API, support for multi-homing and mobility. 9 IP Ethernet Physical Media Applications Today TCP or UDP IP Ethernet Physical Media Applications Current Prototype TCP or UDP DIF DIF … Ethernet Physical Media Applications DIF DIF … IP Physical Media Applications TCP or UDP DIF DIF … Physical Media Applications DIF DIF … End goal
  • 10. RINA over IP benefits: Internetwork layer(s)  What if application A wants to communicate with Application C?  It cannot do it, unless you start deploying middleboxes like NATs, application-layer gateways, … The architecture doesn’t accommodate internetworking! 10 Data Link Data Link Data Link Data Link Data Link IP IP Layer A (Public Internet) IP IP Layer B (Enterprise Network) TCP Appl. A Appl. B Data Link Data Link Data Link Data Link Data Link IP IP Layer A (Public Internet) IP IP Layer B (Enterprise Network) Shim DIF Appl. A Appl. B Appl. C Shim DIF DIF TCP Appl. C
  • 11. RINA over IP benefits: Separate applications from infrastructure  There is no separate application namespace, but synonyms that stand for an IP address and a TCP/UDP port number:  A path to an application.  This makes anything but client/server hard to achieve, e.g. mobility  In RINA application names are independent of the layers below (DIFs)  Application names can be structured in a way that makes sense for the application  The application name doesn’t contain the semantics of where the application is in the network (i.e. what is its point of attachment to the layer below) 11  http://pouzinsociety.org Synonym of an interface of a host Port (Endpoint of TCP connection) :80
  • 12. RINA over IP benefits: Next generation VPN  DIFs are customizable VPNs that can span multiple IP layers.  Each DIF has its own addressing scheme, security mechanisms (authentication, authorization), routing strategy, resource allocation strategy (support for different levels of QoS), flow control strategy, data transfer/data transfer control, …  Processes (and not systems) are members of the DIFs (different processes can access different DIFs in each system). Processes may not have access to the whole range of DIFs available on their system  DIFs open the door to VPNs optimized for certain applications 12 Data Link Data Link Data Link Data Link Data Link IP IP Layer A (Public Internet) IP IP Layer B (Enterprise Network) Shim DIF Appl. A Appl. B Appl. C Shim DIF DIF
  • 13. Architectural model DIF System (Host) IPC Process IPC Process Mgmt Agemt System (Router) IPC Process IPC Process IPC Process Mgmt Agemt System (Host) IPC Process IPC Process Mgmt Agemt Appl. Process DIF DIF Appl. Process IPC API Data Transfer Data Transfer Control Layer Management SDU Delimiting Data Transfer Relaying and Multiplexing SDU Protection Transmission Control Retransmission Control Flow Control RIB Daemon RIBRIB CDAP Parser/Generator CACEP Enrollment Flow Allocation Resource Allocation Forwarding Table Generator Authentication StateVector StateVectorStateVector Data TransferData Transfer Transmission Control Transmission Control Retransmission Control Retransmission Control Flow Control Flow Control 13 IPC Resource Mgt. Inter DIF Directory SDU Protec tion Multipl exing IPC Mgt. Tasks Other Mgt. Tasks Application Specific Tasks Increasing timescale (functions performed less often) and complexity
  • 14. The Shim DIF 14 Public Internet Private IP network “Shim IPC Process” “Shim IPC Process” IPC Process “Shim IPC Process” IPC Process IPC Process “Shim IPC Process” Shim DIFShim DIF DIF Appl. Process Appl. Process UDP flow UDP flow TCP flow(s) TCP flow(s)  The “shim IPC Process” for IP layers is not a “real IPC Process”. It just presents an IP layer as if it was a regular DIF.  Wraps the IP layer with the DIF interface.  Maps the names of the IPC Processes of the layer above to IP addresses in the IP layer.  Creates TCP and/or UDP flows based on the QoS requested by an “allocate request”.
  • 15. Implementation platform  Implemented as part of the TINOS framework (a network protocol experimentation framework)  https://github.com/PouzinSociety/tinos  Implemented in Java, using the OSGi technology (OSGi container provided by Eclipse Virgo)  OSGi is a component model that facilitates building modular Java applications  Developed on Mac OS X and Linux Debian, but should be multi- platform (support all the platforms that Eclipse Virgo supports)  Found some OS resource allocation issues with Mac OS X  Not yet fully integrated with TINOS (once it is, it will be possible to instantiate several “systems” within a single Java process, using XMPP as the underlying “physical substrate”) 15
  • 16. Java Virtual Machine Why using TINOS instead of raw Java? To facilitate experimentation: bigger scenarios without adding more hardware IP (Jnode) Data Link Data Link Data Link Shim DIF Data Link Data Link IP (Jnode) Shim DIF DIF Java Virtual Machine IP (Jnode) Data Link Data Link Data Link Shim DIF Data Link Data Link IP (Jnode) Shim DIF DIF Java Virtual Machine Data Link IP (OS stack) Shim DIF Java Virtual Machine Data Link IP (JNode) Shim DIF Public Internet Data Link IP (O Sstack) Shim DIF DIF XMPP network LAN  With TINOS multiple nodes can be created within the same Java JVM, with different network connectivity with each other and other JVMs (TINOS uses adapted IP stack from JNode and XMPP for this)
  • 17. Current status & some conclusions  Since all the layers have the same mechanisms with different policies, implementation becomes much simpler than today’s protocol suite(therefore more effort can be devoted to making it more robust and efficient)  Also no need to distinguish between ‘physical’ or ‘virtual’ networking protocols: it’s all IPC.  Customization & innovation in networking becomes much easier  Just focus on the area you’re interested in and change the relevant policies for yours (NOTE: Today “changing the policies” in the prototype means modifying the code, since developing a pluggable policy framework is out of the scope of the initial prototype)  Interoperability with existing networking technologies is not an issue  Just wrap the XX layer as a shim DIF, and there you go 17 IPC API Data Transfer Data Transfer Control Layer Management SDU Delimiting Data Transfer Relaying and Multiplexing SDU Protection Transmission Control Retransmission Control Flow Control RIB Daemon RIBRIB CDAP Parser/Generator CACE Enrollment Flow Allocation Resource Allocation Forwarding Table Generator AuthenticationStateVector StateVectorStateVector Data TransferData Transfer Transmission Control Transmission Control Retransmission Control Retransmission Control Flow Control Flow Control
  • 18. Outline  Quick Introduction to RINA  Java prototype over IP  Inter DIF Directory  RINA Security Assessment  FP7 IRATI Project: Kernel prototype over Ethernet 18
  • 19. What’s a layer?  Although the term “layer” has been extensively used in networking, the concept itself has not been clearly defined.  In its origin layers were adopted from its use in operating systems. But in operating systems, using layers is a choice, whereas using layers in networks is a necessity because of the distributed shared state of different scopes  The necessary and sufficient condition for a layer is distributed shared state of different scope.  Therefore we can describe a layer as the collection of application processes that share state. Physical Data Link Network Transport Application Host or End System Router Less Scope More Scope 19
  • 20. Application discovery involves also layer discovery host H2 router R2 router R3 host H1 Layer 1 web server application B web browser application A router R4 router R1 host H4 Layer 3 Layer 2 Layer 4 Layer 6 Layer 5 router R5 host H3 web server application C 20
  • 21. The InterDIF Directory (IDD)  A distributed application, Distributed Application Facility (DAF) as it’s called in RINA, which is a collection of two or more cooperating application processes in one or more processing systems, which exchange information using IPC and maintain shared state  The IDD DAF maintains a distributed database that keeps mappings of application names to list of supporting layers  The IDD is responsible for two main distinct functions: a) Discovery of the application b) Creation of the supporting DIF 21
  • 22. A) Discovery of the application (I)  IDD-Request  Destination IDD Name, Source IDD Name, Requested Application Process Name, Access Control Information, Quality of Service, Termination Condition  Forwarding of the request between the peer IDDs until the destination application is found or the pre-defined termination condition is met host H2 router R2 router R3 host H1 web server application B web browser application A router R4 router R1 host H4 Layer 6 router R5 host H3 ... Layer 1 Layer 3 Layer 2 Layer 4Layer 5 IDD DAF web server application C 22
  • 23. A) Discovery of the application (II)  Confirmation that the requested application is executing in the destination system and authorization check that the requesting application has the rights to access it host H2 router R2 router R3 host H1 web server application B web browser application A router R4 router R1 host H4 Layer 6 router R5 host H3 ... Layer 1 Layer 3 Layer 2 Layer 4Layer 5 IDD DAF web server application C 23
  • 24. B) Creation of the supporting DIF  A DIF supporting the communication between the two user applications has to be found  This either involves creating a new DIF from scratch or expanding (joining) an existing one so that it spans from the source to the destination system host H2 router R2 router R3 host H1 web server application B web browser application A router R4 router R1 host H4 Layer 6 router R5 host H3 ... Layer 1 Layer 3 Layer 2 Layer 4Layer 5 IDD DAF web server application C 24
  • 25. Current status  Ph.D. thesis ongoing  Defined the IDD Framework. Current research is focused in application discovery; looking at different policies to perform the IDD search, the replication of the directory information, and compare them in terms of:  Time to discover the requested application  Average number of messages generated on the IDD DAF per search  Average number of hops needed to locate the destination application  Time to distribute directory updates, and average number of messages generated by directory update  Java simulator of the IDD is being implemented. After results have been tested in the simulator, the IDD framework and some selected policies will be ported to the prototypes 25
  • 26. Outline  Quick Introduction to RINA  Java prototype over IP  Inter DIF Directory  RINA Security Assessment  FP7 IRATI Project: Kernel prototype over Ethernet 26
  • 27.  Benefits of having an architecture instead of a protocol suite: the architecture tells you where security related functions are placed.  Instead of thinking protocol security, think security of the architecture: no more ‘each protocol has its own security’, ‘add another protocol for security’ or ‘add another box that does security’ Allocating a flow to destination application Access control Sending/receiving PDUs through N-1 DIF Confidentiality, integrity Placement of security related functions 27 N DIF N-1 DIF IPC Process IPC Process IPC Process IPC Process Joining a DIF authentication, access control Sending/receiving PDUs through N-1 DIF Confidentiality, integrity Allocating a flow to destination application Access control IPC Process Appl. Process Access control (DIF members) Confidentiality, integrity Authentication Access control (Flow allocations to apps) DIF Operation Logging DIF Operation Logging
  • 28. DIFs are securable containers  Master thesis on RINA security assessment (results to be published)  Possible attacks to a DIF  Information required to perform these attacks  Mitigation measures against these attacks  Comparison to the current Internet  Concludes that DIFs are securable containers if proper standard security tools are used (authentication, access control, confidentiality, integrity and strong auditing)  Securable = A structure used to hold or transport something that can be made to be not subject to threat  Again, with a proper structure in place, achieving better security in networks is much simpler and cost-effective than in the current situation 28
  • 29. Outline  Quick Introduction to RINA  Java prototype over IP  Inter DIF Directory  RINA Security Assessment  FP7 IRATI Project: Kernel prototype over Ethernet 29
  • 30.  What? Main goal  To advance the state of the art of RINA towards an architecture reference model and specifications that are closer to enable implementations deployable in production scenarios. The design and implementation of a RINA prototype on top of Ethernet will enable the experimentation and evaluation of RINA in comparison to TCP/IP.  Who? 4 partners  How? Requested 870.000 € funding to the EC to perform 5 activities  WP1: Project management  WP2: Architecture, Use cases and Requirements  WP3: Software Design and Implementation  WP4: Deployment into OFELIA testbed, Experimentation and Validation  WP5: Dissemination, Standardisation and Exploitation Project at a glance Nextworks Interoute i2CAT IBBT
  • 31. Thanks for your attention! You can contact me at eduard.grasa@i2cat.net More information about RINA at http://rina.tssg.org, http://pouzinsociety.org, http://csr.bu.edu/rina More information about the prototype at https://github.com/PouzinSociety/tinos/wiki/RINA-Prototype More information about IRATI at http://irati.eu

Hinweis der Redaktion

  1. Application name spaces are not tied to any layer or DIF. Recognizing that they may all be members of other DIFs.
  2. An API overlay to isolate applications and develop a DIF, then just push the use of the architecture down further and further up.
  3. Remember, this is the architecture! DAF Support Tasks: The IPC Management (and other management: memory, storage, CPU) tasks are usually implemented as OS functionality. IPC Resource Management: Creation/Deletion of IPC processes Multiplexing (Usually inverse multiplexing, an application flow into multiple DIF flows, for example: 1 for video, 1 for audio, 1 for text, …) SDU Protection (CRCs, encryption, TTL, …) IDD (Inter DIF Directory, find out in what DIF the destination application process is executing)
  4. Stress that with our scientific approach we are trying maximize the invariances, and minimize how much policy is necessary, as opposed to the craft tradition being pursued by others to minimize invariance.
  5. Mention Dijkstra was right, but don’t repeat functions on the same scope.
  6. A simple case that illustrates the problem under research is given in Fig. 1. In the scenario shown the web browser (application A) residing in host H3 requests to communicate with the web page (application C) on host H1. What discovering the requested application does require is finding which layers make it available, and then choosing an existing layer to join or creating a new one to enable the communication.
  7. Each processing system has an instance of the IDD, an application process that enables the system to make available its applications and discover other applications. The application processes that are members of the same DAF are called “peer IDDs” are able to exchange messages for the discovery of applications. As every other DAF the IDD is supported by one DIF or a collection (set) of underlying DIFs that provide to the distributed application IPC services. Communication in RINA implies that the two systems that the communicating applications are residing share a DIF which provides IPC service. When an application wants to communi- cate with another application, first all the DIFs available to the source system are examined to see if the requested application is available through them. If none of the available DIFs returns a positive result, the IDD is responsible to first find the requested application and then attempt to create a supporting DIF between the two systems for the communication. The DAPs that comprise the IDD will forward a request from one to another asking for the requested application. Forwarding begins at the IDD DAP of the source system and will be based on the forwarding policies between the members of the DAF. The forwarding continues until the IDD DAP of the system in which the requested application resides is found or when some other predefined termination condition is met to prevent infinite searching.
  8. In the case that the destination system is reached, the IDD will have first to verify that the requested application is still there and then that the requesting application is allowed to communicate with it. If both checks are positive, the next action for the IDD is to find a DIF that will support the communication between the two applications.
  9. Since a common DIF between the source and the destination systems does not exist, a new one will have to be created by either expanding (joining) an existing DIF or creating a new one from scratch. The creation of the supporting DIF involves choosing a path from the source to the destination and coordination with the intermediate IDD DAPs for authorization control and creation and initialization of the new IPC application processes. Once the supporting DIF is in place, communication between the two applications can start.
  10. Might cite the results of Gotham’s paper that analyzing the attacks that can be mounted on TCP don’t work on delta-t even though delta-t was designed decades before the attacks were known. The same is true of the IPC Model. No consideration given to security. However the model is more secure. Strong design has more to do with security than security does.