SlideShare a Scribd company logo
1 of 24
1
The Wireless FRINGE
Pascal Thubert
Advanced Architecture and Research
June 27th, 2013
2
The Fringe of the Internet
The Fringe backbone
The Deterministic Fringe
6TSCH
Polymorphic Flows
3
The Internet
Fully engineered
Hierarchical, Aggregations, ASs, Wire links
Fully distributed States
Shows limits (BGP tables, addr. depletion)
Reached adult size, mature to aging
Conceptually unchanged by IPv6
IPv4 Intranets
Same structure as the Internet
Yet decoupled from the Internet
NAT, Socks, Proxies
First model for Internet extension
4
L2 mesh Under
Autonomic meshes
Still Proprietary mission specific products
Deterministic (WiHART, ISA100.11a)
L3 Route Over
Migration to IETF Protocols (RPL, PCEP, RSVP)
Internet of Things (IOT, M2M)
Polymorphic IPv6 (6LoWPAN, 6TSCH)
Mobile Overlays
Global reachability (NEMO, LISP, DMM)
DataCenter Network virtualization (NVO3, LISP)
Route Projection
Fixed wired Infrastructure
5
6
7
8
CB
1
3
2
A
4
A’s
Home
B’s
Home
MANET
Mesh
The Fringe DOES NOT LEAK
into the
Routing Infrastructure
NEMO
Edge
6
1000*scale => No leak in the Internet
=> Opaque Fringe operations
=> Federating backbone
Reachability => Radio
Addressing => IPv6
Density => spatial reuse
=> Routing
7
The Fringe of the Internet
The Fringe backbone
The Deterministic Fringe
6TSCH
Polymorphic Flows
8
Wired or Wireless
Switches and Controllers
Wireless ND
Global Mobility integration
Virtualized Functions
PCE for deterministic route
computation
Legacy Appliances e.g. industrial PLC
Fringe
Network
Intranet
Fringe
Network
Backbone
Router
PCE NMS
Virtual
devices
9
A new Efficient ND, aka WiND for Wireless ND
Registration for Duplicate Address Detection
extending 6LoWPAN ND over the backbone
Proxy ND operation
Resolution
Distributed through proxy-ND
Routing in not-onlink mode
21
The Fringe of the Internet
The Fringe backbone
The Deterministic Fringe
6TSCH
Polymorphic Flows
22
New level of guarantees
For deterministic traffic (known a priori)
Network synchronization and Timely transmission
Centralized routing and scheduling optimization
25
The Fringe of the Internet
The Fringe backbone
The Deterministic challenge
6TSCH
Polymorphic Flows
26
Align existing standards
(RPL, 6LoWPAN, PANA, RSVP, PCEP, MPLS) over 802.15.4e TSCH
Support Mix of centralized and distributed deterministic routing
Design 6TUS sublayer for L3 interactions
Open source implementations (openWSN…)
Build Ecosystem (DUST, NIVIS, IoT6, uni.lux, uni.bari, Berkeley…
6 active drafts (Archi, 6TUS, …)
Preparing for BoF in Berlin this summer
28
IEEE 802.15.4e TSCH
6LoWPAN HC
IPv6
RPL
6TUS
TCP UDP ICMP RSVP
PCEP/PCC CoAP/DTLS PANA 6LoWPAN ND
Path
Computation
Element
Datagram
Transport
Layer Security
Protocol for carrying
Authentication for
Network Access
6LoWPAN Neighbor Discovery
Compares to
ISA100.11a
Data Link Layer
}
Resource Reservation
Setup Protocol
29
Centralized
God’s view optimization
Multipath redundancy
Deterministic (optimized)
Virtualization
Distributed
Autonomic & Mobile
Highly available (DARPA)
Deterministic
Scalability
37
The Fringe of the Internet
The Fringe backbone
The Deterministic challenge
6TSCH
Polymorphic Flows
38
The RPL instance ID allows different routing optimizations, constraints and policies.
D Local Instance ID 0..64
0 1 2 3 4 5 6 7
0 Global Instance ID 0..128
0 1 2 3 4 5 6 7
1
The RPL instance ID is encoded in 1 octet. The first bit indicates whether Global or Local.
“A local RPLInstanceID is autoconfigured by the node that owns the DODAGID and it MUST be unique for that
DODAGID. The DODAGID used to configure the local RPLInstanceID MUST be a reachable IPv6 address of the
node, and it MUST be used as an endpoint of all communications within that Local instance.”
Inside a packet: “If the 'D' flag is set to 1, then the destination address of the IPv6 packet MUST be the DODAGID. If the
'D' flag is cleared, then the source address of the IPv6 packet MUST be the DODAGID.”
6TSCH extends RPL’s language of DODAGID to route (reservation) endpoint.
39
128 global instances per network
Indexed by tuple (IPv6, InstanceID)
Running as Ships-in-the-night
1 instance = 1 VRF = 1 « L3 vlan »
Serving different Objective Functions
Using different metrics
Can be shared between RPL and PCE
RPL along a DODAG
PCE adding orthogonal shortcuts
Clusterhead
0
1
1
1
2
2
2
2
2
3
3
3
3
3
3
2
3
5
4
4
4
4
Clusterhead
Constrained instance
Default instance
Potential link
A
40
Clusterhead
5
Clusterhead
0
1
1
1
2
2
2
2
2
3
3
3
3
3
3
2
3
5
4
4
4
4
64 local Instances
per IPv6 source address
Indexed by tuple (IPv6, InstanceID)
Used by RPL or PCE
RPL: for P2P applications
RPL: to index RSVP path
PCE: Serves as Track ID,
included in PCEP request
from the source device
Track –PCE)
RSVP reservation for RPL
Potential link
41 4
0 1 1 HLIM SAM DAM
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
10
TF 2 bits Traffic Class and Flow Label
NH 1 bit Next Header
HLIM 2 bits Hop Limit
CID 1 bit Context Identifier Extension
SAC 1 bit Source Address Context
SAM 2 bits Source Address Mode
M 1 bit Multicast Address Compression
DAC 1 bit Destination Address Context
DAM 2 bits Destination Address Mode
CIDTF NH SAC M DAC
Addressing
42 4
0 1 1 HLIM SAM DAM
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
TF NH SAC M DAC
Flow Label
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1 2 30
ECN DSCP rsv
Flow Label
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
1 20
ECN rsv
0 1 2 3 4 5 6 7
0
ECN DSCP
TF = 0
TF = 1
TF = 2
TF = 3 Traffic Class and Flow Label elided.
10
CID
43
Places in Flow Label the RPL Packet Information is defined in RFC 6550 Section 11.2
Save extra HbH header bytes incurred in RFC 6553 AND eventual IPinIP tunneling
“When the router is the source of the original packet and the destination is known to be within the same RPL Instance, the router SHOULD include the RPL
Option directly within the original packet. Otherwise, routers MUST use IPv6-in-IPv6 tunneling [RFC2473] and place the RPL Option in the tunnel header.”
Discussed with Brian Carpenter on the ROLL ML
http://www.ietf.org/mail-archive/web/roll/current/msg06967.html
Need to take to 6MAN to resolve violation of RFC6437
O R F SenderRank InstanceID
0 1 2 3 4 6 7 8 9 0 1 34 5
20
5 6 7 8 9 0 1 2
1
32
?
44
The Fringe of the Internet
The Fringe backbone
The Deterministic challenge
6TSCH
Polymorphic Flows
45
Control anything from the network
Learn from Industrial.
Replicate and generalize with open standards
A converged network provides
high availability, flow isolation, security,
Guaranteed bandwidth and Determinism
Coexistence involves:
Location and Scheduling
At L2 and L3, for wired and wireless.
New, higher end paradigm
Reaching more devices and data, farther, cheaper,
with better guarantees
SiSi SiSi
PlantInternet
Wireless Sensor Network
Thank you.

More Related Content

What's hot

TCP over 6LoWPAN for Industrial Applications
TCP over 6LoWPAN for Industrial ApplicationsTCP over 6LoWPAN for Industrial Applications
TCP over 6LoWPAN for Industrial ApplicationsAhmed Ayadi
 
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
BPF  & Cilium - Turning Linux into a Microservices-aware Operating SystemBPF  & Cilium - Turning Linux into a Microservices-aware Operating System
BPF & Cilium - Turning Linux into a Microservices-aware Operating SystemThomas Graf
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domainPhu Nguyen
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiTania Ellinidou
 
Fast i pv4 lookup using local memory
Fast i pv4 lookup using local memoryFast i pv4 lookup using local memory
Fast i pv4 lookup using local memoryVipin Varghese
 
MultiPath TCP - The path to multipath
MultiPath TCP - The path to multipathMultiPath TCP - The path to multipath
MultiPath TCP - The path to multipathDiogo Mónica
 
Timing Analysis of a Linux-Based CAN-to-CAN Gateway
Timing Analysis of a Linux-Based CAN-to-CAN GatewayTiming Analysis of a Linux-Based CAN-to-CAN Gateway
Timing Analysis of a Linux-Based CAN-to-CAN GatewayMichal Sojka
 
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Maximilan Wilhelm
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPMaximilan Wilhelm
 
BPF: Next Generation of Programmable Datapath
BPF: Next Generation of Programmable DatapathBPF: Next Generation of Programmable Datapath
BPF: Next Generation of Programmable DatapathThomas Graf
 
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFDynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFMaximilan Wilhelm
 
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...Communication Systems & Networks
 

What's hot (20)

TCP over 6LoWPAN for Industrial Applications
TCP over 6LoWPAN for Industrial ApplicationsTCP over 6LoWPAN for Industrial Applications
TCP over 6LoWPAN for Industrial Applications
 
Polyraptor
PolyraptorPolyraptor
Polyraptor
 
6LoWPAN: An open IoT Networking Protocol
6LoWPAN: An open IoT Networking Protocol6LoWPAN: An open IoT Networking Protocol
6LoWPAN: An open IoT Networking Protocol
 
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
BPF  & Cilium - Turning Linux into a Microservices-aware Operating SystemBPF  & Cilium - Turning Linux into a Microservices-aware Operating System
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domain
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in Contiki
 
Fast i pv4 lookup using local memory
Fast i pv4 lookup using local memoryFast i pv4 lookup using local memory
Fast i pv4 lookup using local memory
 
Question
QuestionQuestion
Question
 
Lustre, RoCE, and MAN
Lustre, RoCE, and MANLustre, RoCE, and MAN
Lustre, RoCE, and MAN
 
MultiPath TCP - The path to multipath
MultiPath TCP - The path to multipathMultiPath TCP - The path to multipath
MultiPath TCP - The path to multipath
 
Timing Analysis of a Linux-Based CAN-to-CAN Gateway
Timing Analysis of a Linux-Based CAN-to-CAN GatewayTiming Analysis of a Linux-Based CAN-to-CAN Gateway
Timing Analysis of a Linux-Based CAN-to-CAN Gateway
 
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
 
Polyraptor
PolyraptorPolyraptor
Polyraptor
 
Rpl dodag
Rpl dodagRpl dodag
Rpl dodag
 
IPv6 im Jahre 2018
IPv6 im Jahre 2018IPv6 im Jahre 2018
IPv6 im Jahre 2018
 
BPF: Next Generation of Programmable Datapath
BPF: Next Generation of Programmable DatapathBPF: Next Generation of Programmable Datapath
BPF: Next Generation of Programmable Datapath
 
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFDynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
 
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
 
Sensor networks: 6LoWPAN & LPWAN
Sensor networks: 6LoWPAN & LPWANSensor networks: 6LoWPAN & LPWAN
Sensor networks: 6LoWPAN & LPWAN
 

Viewers also liked

JCSA 2012 03 Daniel Karrenberg : Some thoughts about vulnerabilities and resi...
JCSA 2012 03 Daniel Karrenberg : Some thoughts about vulnerabilities and resi...JCSA 2012 03 Daniel Karrenberg : Some thoughts about vulnerabilities and resi...
JCSA 2012 03 Daniel Karrenberg : Some thoughts about vulnerabilities and resi...Afnic
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetAfnic
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...Afnic
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...Afnic
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...Afnic
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013Afnic
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...Afnic
 
Restitution des résultats de l'enquête sur la "toile de fond technologique" ...
Restitution des résultats de l'enquête sur la "toile de fond technologique" ...Restitution des résultats de l'enquête sur la "toile de fond technologique" ...
Restitution des résultats de l'enquête sur la "toile de fond technologique" ...Afnic
 
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilience
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilienceJCSA 2012 02 Florent Chabaud : L'Organisation de la résilience
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilienceAfnic
 
JCSA 2012 06 Alexandre Clame (INIT Marketing) et Mohsen Souissi (Afnic) : Pré...
JCSA 2012 06 Alexandre Clame (INIT Marketing) et Mohsen Souissi (Afnic) : Pré...JCSA 2012 06 Alexandre Clame (INIT Marketing) et Mohsen Souissi (Afnic) : Pré...
JCSA 2012 06 Alexandre Clame (INIT Marketing) et Mohsen Souissi (Afnic) : Pré...Afnic
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...Afnic
 
JCSA 2012 01 Laurent Toutain : Présentation du Conseil scientifique de l'Afnic
JCSA 2012 01 Laurent Toutain : Présentation du Conseil scientifique de l'AfnicJCSA 2012 01 Laurent Toutain : Présentation du Conseil scientifique de l'Afnic
JCSA 2012 01 Laurent Toutain : Présentation du Conseil scientifique de l'AfnicAfnic
 
JCSA 2012 04 François Contat & Guillaume Valandon (ANSSI) et Stéphane Bortzme...
JCSA 2012 04 François Contat & Guillaume Valandon (ANSSI) et Stéphane Bortzme...JCSA 2012 04 François Contat & Guillaume Valandon (ANSSI) et Stéphane Bortzme...
JCSA 2012 04 François Contat & Guillaume Valandon (ANSSI) et Stéphane Bortzme...Afnic
 
JCSA 2012 Tutoriel Afnic par Stéphane Bortzmeyer : Securité des noms de domaines
JCSA 2012 Tutoriel Afnic par Stéphane Bortzmeyer : Securité des noms de domainesJCSA 2012 Tutoriel Afnic par Stéphane Bortzmeyer : Securité des noms de domaines
JCSA 2012 Tutoriel Afnic par Stéphane Bortzmeyer : Securité des noms de domainesAfnic
 

Viewers also liked (14)

JCSA 2012 03 Daniel Karrenberg : Some thoughts about vulnerabilities and resi...
JCSA 2012 03 Daniel Karrenberg : Some thoughts about vulnerabilities and resi...JCSA 2012 03 Daniel Karrenberg : Some thoughts about vulnerabilities and resi...
JCSA 2012 03 Daniel Karrenberg : Some thoughts about vulnerabilities and resi...
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
 
Restitution des résultats de l'enquête sur la "toile de fond technologique" ...
Restitution des résultats de l'enquête sur la "toile de fond technologique" ...Restitution des résultats de l'enquête sur la "toile de fond technologique" ...
Restitution des résultats de l'enquête sur la "toile de fond technologique" ...
 
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilience
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilienceJCSA 2012 02 Florent Chabaud : L'Organisation de la résilience
JCSA 2012 02 Florent Chabaud : L'Organisation de la résilience
 
JCSA 2012 06 Alexandre Clame (INIT Marketing) et Mohsen Souissi (Afnic) : Pré...
JCSA 2012 06 Alexandre Clame (INIT Marketing) et Mohsen Souissi (Afnic) : Pré...JCSA 2012 06 Alexandre Clame (INIT Marketing) et Mohsen Souissi (Afnic) : Pré...
JCSA 2012 06 Alexandre Clame (INIT Marketing) et Mohsen Souissi (Afnic) : Pré...
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
 
JCSA 2012 01 Laurent Toutain : Présentation du Conseil scientifique de l'Afnic
JCSA 2012 01 Laurent Toutain : Présentation du Conseil scientifique de l'AfnicJCSA 2012 01 Laurent Toutain : Présentation du Conseil scientifique de l'Afnic
JCSA 2012 01 Laurent Toutain : Présentation du Conseil scientifique de l'Afnic
 
JCSA 2012 04 François Contat & Guillaume Valandon (ANSSI) et Stéphane Bortzme...
JCSA 2012 04 François Contat & Guillaume Valandon (ANSSI) et Stéphane Bortzme...JCSA 2012 04 François Contat & Guillaume Valandon (ANSSI) et Stéphane Bortzme...
JCSA 2012 04 François Contat & Guillaume Valandon (ANSSI) et Stéphane Bortzme...
 
JCSA 2012 Tutoriel Afnic par Stéphane Bortzmeyer : Securité des noms de domaines
JCSA 2012 Tutoriel Afnic par Stéphane Bortzmeyer : Securité des noms de domainesJCSA 2012 Tutoriel Afnic par Stéphane Bortzmeyer : Securité des noms de domaines
JCSA 2012 Tutoriel Afnic par Stéphane Bortzmeyer : Securité des noms de domaines
 

Similar to JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet

Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questionszahadath
 
Cilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPCilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPThomas Graf
 
6LowPAN etc.pptx computer network and IOT devices in future technology
6LowPAN etc.pptx computer network and IOT devices in future technology6LowPAN etc.pptx computer network and IOT devices in future technology
6LowPAN etc.pptx computer network and IOT devices in future technologyHRJEETSINGH
 
Introduction to Hybrid Information-Centric Networking
Introduction to Hybrid Information-Centric NetworkingIntroduction to Hybrid Information-Centric Networking
Introduction to Hybrid Information-Centric NetworkingLuca Muscariello
 
Gohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptxGohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptxJuvil2
 
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...PROIDEA
 
LinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking WalkthroughLinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking WalkthroughThomas Graf
 
Analise NetFlow in Real Time
Analise NetFlow in Real TimeAnalise NetFlow in Real Time
Analise NetFlow in Real TimePiotr Perzyna
 
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...gogo6
 

Similar to JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet (20)

Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
6lowpan introduction
6lowpan introduction6lowpan introduction
6lowpan introduction
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Networking revolution
Networking revolutionNetworking revolution
Networking revolution
 
Ospf
OspfOspf
Ospf
 
IPv6 ND 2020
IPv6 ND 2020IPv6 ND 2020
IPv6 ND 2020
 
Cilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPCilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDP
 
Network Layer And I Pv6
Network Layer And I Pv6Network Layer And I Pv6
Network Layer And I Pv6
 
Rpl2018
Rpl2018Rpl2018
Rpl2018
 
i pv6
i pv6i pv6
i pv6
 
TransPAC3/ACE Measurement & PerfSONAR Update
TransPAC3/ACE Measurement & PerfSONAR UpdateTransPAC3/ACE Measurement & PerfSONAR Update
TransPAC3/ACE Measurement & PerfSONAR Update
 
6LowPAN etc.pptx computer network and IOT devices in future technology
6LowPAN etc.pptx computer network and IOT devices in future technology6LowPAN etc.pptx computer network and IOT devices in future technology
6LowPAN etc.pptx computer network and IOT devices in future technology
 
Introduction to Hybrid Information-Centric Networking
Introduction to Hybrid Information-Centric NetworkingIntroduction to Hybrid Information-Centric Networking
Introduction to Hybrid Information-Centric Networking
 
Gohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptxGohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptx
 
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
 
LinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking WalkthroughLinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking Walkthrough
 
Analise NetFlow in Real Time
Analise NetFlow in Real TimeAnalise NetFlow in Real Time
Analise NetFlow in Real Time
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
 

More from Afnic

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Afnic
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Afnic
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolAfnic
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANEAfnic
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Afnic
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Afnic
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle Afnic
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frAfnic
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesAfnic
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineAfnic
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Afnic
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresAfnic
 
Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012Afnic
 
Afnic Annual Report 2012
Afnic Annual Report 2012Afnic Annual Report 2012
Afnic Annual Report 2012Afnic
 
Afnic Public Consultation on EXPERTS WIPO ADR overview
Afnic Public Consultation on EXPERTS WIPO ADR overviewAfnic Public Consultation on EXPERTS WIPO ADR overview
Afnic Public Consultation on EXPERTS WIPO ADR overviewAfnic
 
Afnic synthese consultation publique experts PARL OMPI
Afnic synthese consultation publique experts PARL OMPIAfnic synthese consultation publique experts PARL OMPI
Afnic synthese consultation publique experts PARL OMPIAfnic
 
Consequences of dns-based Internet filtering
Consequences of dns-based Internet filteringConsequences of dns-based Internet filtering
Consequences of dns-based Internet filteringAfnic
 
Conséquences du filtrage Internet par le DNS
Conséquences du filtrage Internet par le DNSConséquences du filtrage Internet par le DNS
Conséquences du filtrage Internet par le DNSAfnic
 

More from Afnic (19)

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .fr
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain names
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 characters
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
 
Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012
 
Afnic Annual Report 2012
Afnic Annual Report 2012Afnic Annual Report 2012
Afnic Annual Report 2012
 
Afnic Public Consultation on EXPERTS WIPO ADR overview
Afnic Public Consultation on EXPERTS WIPO ADR overviewAfnic Public Consultation on EXPERTS WIPO ADR overview
Afnic Public Consultation on EXPERTS WIPO ADR overview
 
Afnic synthese consultation publique experts PARL OMPI
Afnic synthese consultation publique experts PARL OMPIAfnic synthese consultation publique experts PARL OMPI
Afnic synthese consultation publique experts PARL OMPI
 
Consequences of dns-based Internet filtering
Consequences of dns-based Internet filteringConsequences of dns-based Internet filtering
Consequences of dns-based Internet filtering
 
Conséquences du filtrage Internet par le DNS
Conséquences du filtrage Internet par le DNSConséquences du filtrage Internet par le DNS
Conséquences du filtrage Internet par le DNS
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet

  • 1. 1 The Wireless FRINGE Pascal Thubert Advanced Architecture and Research June 27th, 2013
  • 2. 2 The Fringe of the Internet The Fringe backbone The Deterministic Fringe 6TSCH Polymorphic Flows
  • 3. 3 The Internet Fully engineered Hierarchical, Aggregations, ASs, Wire links Fully distributed States Shows limits (BGP tables, addr. depletion) Reached adult size, mature to aging Conceptually unchanged by IPv6 IPv4 Intranets Same structure as the Internet Yet decoupled from the Internet NAT, Socks, Proxies First model for Internet extension
  • 4. 4 L2 mesh Under Autonomic meshes Still Proprietary mission specific products Deterministic (WiHART, ISA100.11a) L3 Route Over Migration to IETF Protocols (RPL, PCEP, RSVP) Internet of Things (IOT, M2M) Polymorphic IPv6 (6LoWPAN, 6TSCH) Mobile Overlays Global reachability (NEMO, LISP, DMM) DataCenter Network virtualization (NVO3, LISP) Route Projection Fixed wired Infrastructure 5 6 7 8 CB 1 3 2 A 4 A’s Home B’s Home MANET Mesh The Fringe DOES NOT LEAK into the Routing Infrastructure NEMO Edge
  • 5. 6 1000*scale => No leak in the Internet => Opaque Fringe operations => Federating backbone Reachability => Radio Addressing => IPv6 Density => spatial reuse => Routing
  • 6. 7 The Fringe of the Internet The Fringe backbone The Deterministic Fringe 6TSCH Polymorphic Flows
  • 7. 8 Wired or Wireless Switches and Controllers Wireless ND Global Mobility integration Virtualized Functions PCE for deterministic route computation Legacy Appliances e.g. industrial PLC Fringe Network Intranet Fringe Network Backbone Router PCE NMS Virtual devices
  • 8. 9 A new Efficient ND, aka WiND for Wireless ND Registration for Duplicate Address Detection extending 6LoWPAN ND over the backbone Proxy ND operation Resolution Distributed through proxy-ND Routing in not-onlink mode
  • 9. 21 The Fringe of the Internet The Fringe backbone The Deterministic Fringe 6TSCH Polymorphic Flows
  • 10. 22 New level of guarantees For deterministic traffic (known a priori) Network synchronization and Timely transmission Centralized routing and scheduling optimization
  • 11. 25 The Fringe of the Internet The Fringe backbone The Deterministic challenge 6TSCH Polymorphic Flows
  • 12. 26 Align existing standards (RPL, 6LoWPAN, PANA, RSVP, PCEP, MPLS) over 802.15.4e TSCH Support Mix of centralized and distributed deterministic routing Design 6TUS sublayer for L3 interactions Open source implementations (openWSN…) Build Ecosystem (DUST, NIVIS, IoT6, uni.lux, uni.bari, Berkeley… 6 active drafts (Archi, 6TUS, …) Preparing for BoF in Berlin this summer
  • 13. 28 IEEE 802.15.4e TSCH 6LoWPAN HC IPv6 RPL 6TUS TCP UDP ICMP RSVP PCEP/PCC CoAP/DTLS PANA 6LoWPAN ND Path Computation Element Datagram Transport Layer Security Protocol for carrying Authentication for Network Access 6LoWPAN Neighbor Discovery Compares to ISA100.11a Data Link Layer } Resource Reservation Setup Protocol
  • 14. 29 Centralized God’s view optimization Multipath redundancy Deterministic (optimized) Virtualization Distributed Autonomic & Mobile Highly available (DARPA) Deterministic Scalability
  • 15. 37 The Fringe of the Internet The Fringe backbone The Deterministic challenge 6TSCH Polymorphic Flows
  • 16. 38 The RPL instance ID allows different routing optimizations, constraints and policies. D Local Instance ID 0..64 0 1 2 3 4 5 6 7 0 Global Instance ID 0..128 0 1 2 3 4 5 6 7 1 The RPL instance ID is encoded in 1 octet. The first bit indicates whether Global or Local. “A local RPLInstanceID is autoconfigured by the node that owns the DODAGID and it MUST be unique for that DODAGID. The DODAGID used to configure the local RPLInstanceID MUST be a reachable IPv6 address of the node, and it MUST be used as an endpoint of all communications within that Local instance.” Inside a packet: “If the 'D' flag is set to 1, then the destination address of the IPv6 packet MUST be the DODAGID. If the 'D' flag is cleared, then the source address of the IPv6 packet MUST be the DODAGID.” 6TSCH extends RPL’s language of DODAGID to route (reservation) endpoint.
  • 17. 39 128 global instances per network Indexed by tuple (IPv6, InstanceID) Running as Ships-in-the-night 1 instance = 1 VRF = 1 « L3 vlan » Serving different Objective Functions Using different metrics Can be shared between RPL and PCE RPL along a DODAG PCE adding orthogonal shortcuts Clusterhead 0 1 1 1 2 2 2 2 2 3 3 3 3 3 3 2 3 5 4 4 4 4 Clusterhead Constrained instance Default instance Potential link A
  • 18. 40 Clusterhead 5 Clusterhead 0 1 1 1 2 2 2 2 2 3 3 3 3 3 3 2 3 5 4 4 4 4 64 local Instances per IPv6 source address Indexed by tuple (IPv6, InstanceID) Used by RPL or PCE RPL: for P2P applications RPL: to index RSVP path PCE: Serves as Track ID, included in PCEP request from the source device Track –PCE) RSVP reservation for RPL Potential link
  • 19. 41 4 0 1 1 HLIM SAM DAM 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 10 TF 2 bits Traffic Class and Flow Label NH 1 bit Next Header HLIM 2 bits Hop Limit CID 1 bit Context Identifier Extension SAC 1 bit Source Address Context SAM 2 bits Source Address Mode M 1 bit Multicast Address Compression DAC 1 bit Destination Address Context DAM 2 bits Destination Address Mode CIDTF NH SAC M DAC Addressing
  • 20. 42 4 0 1 1 HLIM SAM DAM 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 TF NH SAC M DAC Flow Label 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 1 2 30 ECN DSCP rsv Flow Label 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 1 20 ECN rsv 0 1 2 3 4 5 6 7 0 ECN DSCP TF = 0 TF = 1 TF = 2 TF = 3 Traffic Class and Flow Label elided. 10 CID
  • 21. 43 Places in Flow Label the RPL Packet Information is defined in RFC 6550 Section 11.2 Save extra HbH header bytes incurred in RFC 6553 AND eventual IPinIP tunneling “When the router is the source of the original packet and the destination is known to be within the same RPL Instance, the router SHOULD include the RPL Option directly within the original packet. Otherwise, routers MUST use IPv6-in-IPv6 tunneling [RFC2473] and place the RPL Option in the tunnel header.” Discussed with Brian Carpenter on the ROLL ML http://www.ietf.org/mail-archive/web/roll/current/msg06967.html Need to take to 6MAN to resolve violation of RFC6437 O R F SenderRank InstanceID 0 1 2 3 4 6 7 8 9 0 1 34 5 20 5 6 7 8 9 0 1 2 1 32 ?
  • 22. 44 The Fringe of the Internet The Fringe backbone The Deterministic challenge 6TSCH Polymorphic Flows
  • 23. 45 Control anything from the network Learn from Industrial. Replicate and generalize with open standards A converged network provides high availability, flow isolation, security, Guaranteed bandwidth and Determinism Coexistence involves: Location and Scheduling At L2 and L3, for wired and wireless. New, higher end paradigm Reaching more devices and data, farther, cheaper, with better guarantees SiSi SiSi PlantInternet Wireless Sensor Network

Editor's Notes

  1. ; should allow for reading sensor data from 20 sensors within 10ms.