Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Seserv dp-f2fmeeting


Published on

  • Be the first to comment

  • Be the first to like this

Seserv dp-f2fmeeting

  1. 1. Allow the Exchange of Information between Layers and Players Socio-Economic Services for European Research Projects Ioanna Papafili, AUEB George D. Stamoulis, AUEB Costas Kalogiros, AUEB Sergios Soursos, ICOM Krzysztof Wajda, AGH Burkhard Stiller, UZH FIArch workshop, Brussels, Belgium September 23, 2011 Future Internet Architecture Group Simple Economic Management Approaches of Overlay Traffic in Heterogeneous Internet Topologies
  2. 2. <ul><li>Many players acting simultaneously with conflicting interests  leading to tussles </li></ul><ul><ul><li>Customers/Users </li></ul></ul><ul><ul><li>Providers: ISPs, Application providers, Over-the-top providers, Content providers </li></ul></ul><ul><li>Targets: </li></ul><ul><ul><li>To address the information asymmetry between players (and layers) </li></ul></ul><ul><ul><li>To allow for variation in the outcome </li></ul></ul>The Internet Ecosystem: Current and Future
  3. 3. Layers and Players Different layers of the same player Different players at the same layer Different layers of different players e.g., DPI, mTCP e.g., mTCP, reECN e.g., overlay traffic management
  4. 4. Motivation <ul><li>Allow layers and players express their preferences/choices </li></ul><ul><li>Address information asymmetry between layers and players </li></ul><ul><li>Principle </li></ul><ul><li>Optional exchange of information, if serving the incentives of layers and players. </li></ul><ul><ul><li>Can lead to “all-win” </li></ul></ul>
  5. 5. Constituent elements <ul><li>Exposure of information </li></ul><ul><li>Collection of information </li></ul><ul><li>Assessment of information </li></ul><ul><li>Decision making </li></ul><ul><li>Abstracting/aggregating information </li></ul><ul><ul><li>Do not expose critical information </li></ul></ul>
  6. 6. Examples <ul><li>Overlay traffic management </li></ul><ul><ul><li>The overlay asks underlay for advice on resource selection </li></ul></ul><ul><li>Multipath TCP </li></ul><ul><ul><li>Congestion information is carried by flows; the end-host makes decision on how to shift load among flows </li></ul></ul><ul><li>Re-ECN </li></ul><ul><ul><li>Congestion information is made available to any node of the network </li></ul></ul>
  7. 7. No contradiction to the “end-to-end” principle? <ul><li>Different possibilities for means of information exchange: </li></ul><ul><li>Information is exchanged in packets </li></ul><ul><ul><li>No impact on routing </li></ul></ul><ul><li>If information is carried in the fields of the protocol headers </li></ul><ul><ul><li>Limited impact on routing </li></ul></ul><ul><ul><li>Complexity mostly to reside at the edges </li></ul></ul>
  8. 8. Thank you for your attention!