Congestion Control in Recursive Network ArchitecturesICT PRISTINE
Presentation on Congestion Control in Recursive Network
Architectures at IETF 95, in the IRTF research group, Internet Congestion Control (ICCRG) meeting.
Congestion Control in Recursive Network ArchitecturesICT PRISTINE
Presentation on Congestion Control in Recursive Network
Architectures at IETF 95, in the IRTF research group, Internet Congestion Control (ICCRG) meeting.
5G cellular communications opens an opportunity for a wider realm in networking, one which can encompass the Internet (including IOT). With D2D, Device-to-Device communications, devices can cluster themselves into high power computing platforms.
We show the practicality of mapping RDMA over wireless. Think wireless InfiniBand or wireless OmniPath.
The ensuing number of cluster can be exponentially larger than the number of devices. Clusters can run side-by-side as multi instance software.
See how protocol-free networking becomes realistic as D2D clusters facilitate networking code becoming loadable, user-space software.
This talk discusses RINA a bit more in-depth, taking the audience through several use cases and discussing results showcasing RINA benefits published in a number of conferences and journals. The talk includes a demo of application discovery and distributed mobility management in RINA networks.
RINA Tutorial presented at the 3rd meeting of the ETSI ISG NGP, showing basic RINA structure and mechanisms, as well as a "toy" example of a mobile network with RINA
Next Generation Network Architecture, by Sunny Yeung.
A presentation given at APRICOT 2016’s Opening Ceremony and APRICOT Plenary 1 session on 22 February 2016.
3 hours course on IEEE and IETF protocols introducing the 6TiSCH architecture and the RPL routing protocol. Course given at telecom Bretagne on Feb 12th 2014
VL2: A scalable and flexible Data Center NetworkAnkita Mahajan
This Data Center Network Architecture introduces a virtual layer 2.5 in the protocol stack of hosts and uses a directory service to achieve efficient forwarding. It uses separate location/identifier IPs
5G cellular communications opens an opportunity for a wider realm in networking, one which can encompass the Internet (including IOT). With D2D, Device-to-Device communications, devices can cluster themselves into high power computing platforms.
We show the practicality of mapping RDMA over wireless. Think wireless InfiniBand or wireless OmniPath.
The ensuing number of cluster can be exponentially larger than the number of devices. Clusters can run side-by-side as multi instance software.
See how protocol-free networking becomes realistic as D2D clusters facilitate networking code becoming loadable, user-space software.
This talk discusses RINA a bit more in-depth, taking the audience through several use cases and discussing results showcasing RINA benefits published in a number of conferences and journals. The talk includes a demo of application discovery and distributed mobility management in RINA networks.
RINA Tutorial presented at the 3rd meeting of the ETSI ISG NGP, showing basic RINA structure and mechanisms, as well as a "toy" example of a mobile network with RINA
Next Generation Network Architecture, by Sunny Yeung.
A presentation given at APRICOT 2016’s Opening Ceremony and APRICOT Plenary 1 session on 22 February 2016.
3 hours course on IEEE and IETF protocols introducing the 6TiSCH architecture and the RPL routing protocol. Course given at telecom Bretagne on Feb 12th 2014
VL2: A scalable and flexible Data Center NetworkAnkita Mahajan
This Data Center Network Architecture introduces a virtual layer 2.5 in the protocol stack of hosts and uses a directory service to achieve efficient forwarding. It uses separate location/identifier IPs
The dark side of SDN and OpenFlow
Security & Dependability issues, challenges, and research opportunities.
Attack vectors and threats.
Practical security assessment of OpenFlow-enabled networks.
Vulnerabilities of current Network Operating Systems (e.g., Cisco IOS).
Cloud is recognized as facilitating “speed-to-market” – and for its ability to drive business agility. This is because cloud supports rapid experimentation and innovation by allowing companies to quickly try and even adopt new solutions without significant up-front costs. The Cloud can be a highly agile wrapper around different systems, different behavior and bringing it all together in an engagement cycle. By changing the way people interact with technology, cloud enables new forms of consumer engagement, expand collaboration across the value chain and bring innovation to companies’ core business models.
Welcome to the world of Internet of Things wherein a glut of devices are connected to the internet which emanates massive amounts of data. But we have many hoops to jump before we can claim that crown starting with a huge number of devices lacking unified platform with serious issues of security standards threating the very progress of IoT.
Anomaly detection and root cause analysis in distributed application transact...Yuchen Zhao
Presentation slide deck for SF Big Analytics.
As “software is eating the world”, we have seen an emergence of software-defined businesses and a radical digital disruption across almost all industries. Meanwhile, the application architecture is changing rapidly to cloud, NOSQL and abundant distributed services with a focus on big data.
Since the application complexity is exploding, applications could easily lose control and their management, diagnosis and root cause analysis are particularly challenging. Simple questions such as “why and when the application crashed” or “why it works for some users but not for others” can be tricky to answer and investigate. In addition, the data collected by application performance monitoring (APM) products for analysis is complex, heterogeneous and often semi-structured.
In this talk, Yuchen will share insights on building a powerful end-to-end machine learning system that collects application related data and provides insightful relevant fields analysis in addition to search and filtering. He will discuss details on field extraction, indexing, relevant field processing and dynamic baseline derivation. He will also demonstrate the effectiveness of various machine learning scoring algorithms. Real-world use cases show relevant fields analysis is effective to detect application anomalies and discover root causes of application incidents.
Data Science in Industry - Applying Machine Learning to Real-world ChallengesYuchen Zhao
This slide deck gives an introduction on data science focusing on three most common tasks including regression, classification and clustering. Each task comes with a real world data science project to illustrate the concepts. This presentation was initially created for a one-hour guest lecture at Utah State University for teaching and education purposes.
The Sierra Supercomputer: Science and Technology on a Missioninside-BigData.com
In this deck from the Stanford HPC Conference, Adam Bertsch from LLNL presents: The Sierra Supercomputer: Science and Technology on a Mission.
"LLNL just celebrated its 65th anniversary. Since 1952, the laboratory has been at the forefront of high performance computing. Initially, HPC was used to accelerate the design and testing of the nation's nuclear stockpile. Since the last U.S. nuclear test in 1992, HPC has been used to validate the safety, security, and reliability of stockpile without nuclear testing.
Our next flagship HPC system at LLNL will be called Sierra. A collaboration between multiple government and industry partners, Sierra and its sister system Summit at ORNL, will pave the way towards Exascale computing architectures and predictive capability."
Watch the video: https://wp.me/p3RLHQ-i4K
Learn more: https://computation.llnl.gov/computers/sierra
and
http://hpcadvisorycouncil.com
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Introduce IPv6 related activities in ITU-T especially focused on SG13 and near future expectation of using IPv6 jointly with Ubiquitous Networking concept.
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsRadisys Corporation
View these slides, presented by Prakash Siva, VP, Technology & Strategy, hosted by Intel Network Builders, around the subject of Mobile Edge Computing.
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...IOSR Journals
Abstract:A Reprogramming service should be efficient, reliable and secured in Wireless sensor network.
Wireless reprogramming for wireless sensor network emphasize over the process of changing or improving the
functionality of simulation or existing code. For challenging and on demand security purpose, secure and
distributed routing protocols such as SDRP and ISDRP were developed. This paper reviews and compares the
propagation delay for two reprogramming protocols, SDRP and ISDRP, which based on hierarchy of energies
in network. Both are based on identity-based cryptography. But in the improved protocol the keys are
distributed to the network as per the sorting and communication capabilities to improve the broadcast or
communication nature of the network. Moreover, ISDRP demonstrates the security concepts, which deals over
the key encryption properties using heap sort algorithm and the confidentiality parameter is enhanced by
changing the private key values after certain interval of time for cluster head in respect to different public keys.
The ISDRP shows high efficiency rate clearly with the throughput and propagation results by implementation in
practice over SRDP.
Keywords: identity-based cryptography,ISDRP, heapsort algorithm, Reprogramming, SDRP, Wireless sensor
network.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...Yi-Hsueh Tsai
3GPP Overview
TSG Plenary Status
Progress and content of SA1 5G Study Item - SMARTER
- Introduction and Status
- Radio Interface Technology definition
- Time Delay analysis
- Use Cases and Summary
RAN workshop on 5G Chairman Summary
- Use Cases & Services
- New radio
- 5G Time Line and Phasing
- Next steps
NGMN Alliance’ 5G Use Cases
6G Training Course Part 7: 6G Technologies - Introduction3G4G
After our successful launch of '5G for Absolute Beginners' course (http://bit.ly/5Gbegins) in 2020, we decided to create an introductory training course on 6G Mobile Wireless Communications technology. The course is ready and the best way to navigate it is via the Free 6G Training page at: https://bit.ly/6Gintro - this will ensure that you have the latest version of each video and also the most recent version of the 6G technologies videos as and they are added.
In this part we will look at 6G Technologies. As this is a huge topic, we are only going to discuss the technologies at a very high level. Later on we will create more detailed presentations on 6G technologies. In this part we will look at some of the 6G technologies being proposed by other researchers, organisations, vendors and operators and create a summary of the 6G technologies that are being discussed. These technologies each merit their own little presentation that we hope to make in the future
This course is part of #Free6Gtraining initiative (https://www.free6gtraining.com/)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
6G and Beyond-5G Page: https://www.3g4g.co.uk/6G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Free 6G Training Blog: https://www.free6gtraining.com/
Presentation from Networkshop46.
GÉANT, by Mian Usman, GÉANT.
Campus network refresh, by David Stockdale, Imperial College London.
Multicast QUIC for video content delivery, by Richard Bradbury, BBC Research & Development.
Using ICN to simplify data delivery, mobility management and secure transmissionITU
ICN provides a unified network and transport layer addressing content by name rather than by location. By disrupting traditional connection-oriented communication model, ICN simplifies data delivery, mobility management and secure transmission over an heterogeneous network access. In the demo, we select DASH video delivery as use case and show the benefits of ICN mobility management, in-network control (rate/loss) and network-assisted bitrate adaptation for a multi-homed user device.
We also illustrate how ICN can effectively reduce transport cost via native edge caching and multi-point/multi-source communications over the backhaul. To that aim, we orchestrate an ICN-enhanced virtualized network backhaul and shows its utilization over time.
Author : Giovanna Carofiglio, Cisco Systems
Presented at ITU-T Focus Group IMT-2020 Workshop and Demo Day, 7 December 2016.
More details on the event : http://www.itu.int/en/ITU-T/Workshops-and-Seminars/201612/Pages/Programme.aspx
Presented by Andy Sutton, Principal Network Architect - Chief Architect’s Office, TSO, BT at IET "Towards 5G Mobile Technology – Vision to Reality" seminar on 25th Jan 2017
Shared with permission
Reconstructing computer networking with RINA: how solid scientific foundation...ICT PRISTINE
Reconstructing computer networking with RINA: how solid scientific foundations can allow Europe to become a world leader in internetworking, RINA tutorial to the EC
EC Net Tech FI Cluster meeting October 23 2014 PRISTINEICT PRISTINE
Presentation made by Dr. Stein Gjessing of the University of Oslo, Norway on behalf of the EC PRISTINE project, a research project looking to Programmability In RINA for European supremacy of virTualised NEtworks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...JeyaPerumal1
A cellular network, frequently referred to as a mobile network, is a type of communication system that enables wireless communication between mobile devices. The final stage of connectivity is achieved by segmenting the comprehensive service area into several compact zones, each called a cell.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Benefits of programmable topological routing policies in RINA-enabled large scale DCs
1. Benefits of Programmable Topological
Routing Policies in RINA-enabled
Large-scale Datacenters
Sergio Leon(1), Jordi Perelló(1), Davide Careglio(1), Eduard Grasa(2),
Diego R. López(3) and Pedro A. Aranda (3)
(1) Universitat Politècnica de Catalunya (UPC)
(2) Fundació Privada i2CAT (i2CAT)
(3) Telefónica I+D
* This research has been funded by the European Project FP7 PRISTINE, as well as the
Spanish National project SUNSET. 1
2. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
Summary
Datacenter networks overview
A quick look into RINA
RINA-enabled datacenter scenario
Topological forwarding
Rules
Exceptions
Failure centered routing
Numerical results
Conclusions
2
3. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
Datacenter networks overview
Large number of nodes, but well distributed
Large routing and forwarding tables:
TCP/IP routing solutions does not take profit from the topology
IP does not differentiate well between forwarding domains
3
4. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
A quick look into RINA(1/2)
RINA : Recursive InterNetworking Architecture
Key idea:
“Networking is Inter Process
Communication (IPC) and only IPC”
What it really is:
Clean-slate recursive Internet model
Same type of layer, Distributed IPC Facility (DIF), at each level
All DIFs share the same functionality
Even so, each DIF can be fully configured via any policy
(addressing and routing included)
Each DIF may provide full support for a wide range of QoS
4
5. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
A quick look into RINA(2/2)
Each IPC Process (IPCP) shares the same API
Upper IPCPs and applications use it to request flows with
specific QoS requirements
5
6. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
RINA-enabled datacenter scenario(1/3)
RINA-enabled Datacenter networks with multiple layers:
DC-Fabric DIF:: ToR-2-ToR and ToR-2-Edge communication
DC DIF:: Server-2-Server and Server-2-Gateway communication
Tenant DIFs – Application-2-Application communication
6
7. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
RINA-enabled datacenter scenario(2/3)
Leaf-spine DCN (e.g., Google)
Proposed addressing scheme:
ToR switch <Pod_id . (ToR_id + #Fabrics)>
Fabric switch <Pod_id . Fabric_id>
Spine switch <0 . Spine_id>
7
8. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
RINA-enabled datacenter scenario(3/3)
Clos DCN (e.g., Facebook)
Proposed addressing scheme:
ToR switch <(Pod_id + #SpineSets) . (ToR_id + #Fabrics)>
Fabric switch <(Pod_id + #SpineSets) . Fabric_id>
Spine switch <Spine_set . Spine_id>
8
9. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
Topological forwarding - Rules
Non-failure scenario
Forwarding decisions are simple
e.g., to reach a ToR switch:
At a ToR switch, go to any neighbor
At a fabric switch, either destination is a neighbor or use any
spine switch neighbor
At spine switch, go to any fabric switch in the destination pod
Simple rules can be executed quickly
Groups of neighbors can be used to simplify rules
9
10. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
Topological forwarding - Exceptions
Failures in the network → Few rules may fail
Exceptions to overwrite non-valid rules
Similar to traditional forwarding entries
But support different encodings (e.g., use any neighbor but X)
Common failures may require 1 or no exception
Hardware with support for rules and exceptions can
replace traditional forwarding tables
10
11. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
Failure centered routing
Expected network graph known at “0-cost”
Only failures and recovery need to be shared
Exception computation directed near failures
Routing can be distributed
e.g., link-state-based policies for failure propagation
Or Centralized
e.g., take profit from existing servers to compute exceptions
and populate forwarding policies
11
12. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
Numerical results(1/2)
Non-failure scenario
Number of entries
required for forwarding
minimized to almost
the number of
neighbors
Size of entries also
greatly reduced
12
13. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
Numerical results(2/2)
Amount of entries
remains almost
constant with failures
in the network
As the datacenter
size grows, the
number of entries
remains quite steady
13
14. UPC
NGN.9 - Sergio Leon, Jordi Perelló, Davide Careglio, Eduard Grasa, Diego R. López and Pedro A. Aranda,
“Benefits of Programmable Topological Routing Policies in RINA-enabled Large-scale Datacenters”
Conclusions
IP-based datacenters have multiple scalability
limitations
RINA-based datacenters already avoid the sharing of
unnecessary addresses between forwarding domains
And the use of policies tailored to the network
Our policies minimize the required forwarding
knowledge to only that of connected neighbor nodes
Additionally, failure based routing reduces both cost of
sharing and computing new network states
14
15. Thanks. Questions?
The authors of this work would like to thank all members
of the PRISTINE Project consortium for the valuable
discussions and inputs
15