SlideShare a Scribd company logo
CS7002 Data Communications
The Nebula Future Internet Architecture
RANJAN DHAR
dharr@tcd.ie
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Overview
• Three basic foundations of Nebula.
• Sponsored and supported by National Science
Foundation and CISCO systems.
• Focussed on a future network enabling enabling the
vision of cloud computing.
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Motivation/Problem
• The bloom of Cloud Computing.
• Security of network.
• Broad applicability.
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Motivation / Problem
“”We need a new network architecture !!!””
• Availability and Dependability.
• Cloud Computing have embraced weak consistency.
• Redefined security.
• Smarter network. (Flexible and Extensible)
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Example ( Critical Application)
Monitor current glucose level
Monitor what was being eaten
Monitor exercise activity
Insulin infusion recommendation
Machine Learning
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Enters “NEBULA”
• Nebula is an architecture for the cloud based future
Internet.
• Comprehensive, Clean slate and Reliable.
• Basic decisions include use of packet switching, multiple
paths & store-and-forward routers.
• Backbone of Data Centers.
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Principles & Architecture
ARCHITECTURE
• Services provided by cloud data
centers.
• Multiple cloud providers, that use
replication
• Variety of access mechanisms.
• Transit networks to interconnect
data centers.
PRINCIPLES
• Ultra reliable interconnecting
data centers.
• Parallel paths between data
centers and core routers.
• Secure and authentic connection
establishment.
• Policy based path selection.
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA – Building blocks
NEBULA
NCORE NDP NVENT
• Nebula Core Architecture.
• Nebula Data Plane.
• Nebula Virtual and Extensible Networking Techniques.
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NCORE)
• High Performance Core Routers.
• Highly Reliable.
• Programmable.
• Load balancing.
• Supports features like Network Provence, failure detection
and path diversity.
• Problems can be diagnosed and repaired during runtime.
ROUTERS
FIRE
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA(NCORE)
ROUTERS
Redundant paths.
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
SCENARIO’S
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NDP)
• Primarily focussed on Distributed multiple path
establishment and policy enforcement.
• Policies may include security, privacy and fault tolerance
requests.
• Uses path verification mechanism known as ICING.
• Proof of Consent & Proof of Provenance.
• It must check whether the path is authorized.
• It must also check whether the authorized path was
followed.
DATA PLANE
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NDP)
Data Plane
other
fields
payload...
hop 1
info
hop n
info
hop
#counter
Proof of
Consent
Proof of
Path
Domain ID
MPLS-style
token
42n bytes6 bytes 1 byte 6 bytes
42 bytes
• POC is basically a Cryptographic token.
• As packet traverses the path, it is incrementally marked with POP.
• Enforces network provenance by using POP.
• Denial of service attacks are much difficult to carry out. (Secure)
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NVENT)
• Nebula Virtual and Extensible Networking Technology.
• NVENT embodies new control-plane technologies that
focus on policy specification, policy-based path setup and
service naming.
• NVENT uses declarative networking.
CONTROL PLANE
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NVENT)
CONTROL PLANE
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NVENT)
• Declarative Networking is a programming methodology
that enables developers to concisely
specify network protocols and services, which are directly
compiled to a dataflow framework that executes the
specifications.
• Just as BGP in the current Internet, NVENT provides a set
of default paths to ensure global reachability, but it also
provides an interface to NDP, which is available to users for
requesting custom paths, e.g., for applications that require
high reliability
CONTROL PLANE
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NVENT)
CONTROL PLANE
NVENT
NDP
policy
engine
policy
engine
policy
engine
policy
engine
consent
engine
consent
engine
consent
engine
consent
engine
d
a
t
ad
a
t
a
1
2
2
3
4
5
path
req
path
spec
10
d
a
t
a
d
a
t
a
d
a
t
a
8 96 7
SLA
1
SLA
2 gst
employees
lan
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
PUTTING NEBULA TOGETHER
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
PUTTING NEBULA TOGETHER
• Cell phone contacts NVENT & requests a path to NCORE.
• NVENT looks for path compiling to the policy and contacts
NDP policy server to obtain necessary POC’s.
• NVENT returns all the POC’s to the cell phone.
• Cell phone uses these POC’s to send packets via NDP to
nearest NCORE router.
• NCORE performs network provenance to verify the path and
forwards packets to Data Center.
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
PUTTING NEBULA TOGETHER
• Nebula’s security can be related to the
immigration process.
• Detailed security with high efficiency.
• POP’s usually happen at boundaries.
• Policy Server may have 0 or more
policies.
• If Policies = 0, then DEFAULT DENY.
• Policies are cacheable.
• Policies can be queried by clients.
• Example: NEBULAPATH = HIPAA.
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
PROTOTYPE - ZODIAC
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
RESEARCH QUESTIONS ?
• ICING vs. TorIP vs. TaaS.
• Application interface to specify policy.
• Relationship between Policy enforcing plane and NCORE
routers still in flux.
• Organization contracts ?
• Name service implementation ?
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA CONFIGURATION & OPERATION
• Policy Configuration – API level work in NVENT to
determine client requirements.
• Path Setup – Policy request.
• Forwarding - POC’s & POP’s.
• Naming – TorIP (ISP, ID) “ID indentifies a mailbox”
ICING (DNS augmented by policy enforcement)
www. foo . comEXAMPLE(ICING):
POC1 POC2
Remember POC’s
are cacheable
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA ARCHITECTURAL CHOICES
Design Goal NEBULA
Communication must continue despite loss
of networks, links, or gateways.
NEBULA uses multiple dynamically allocated
paths and reliable transport.
Allow host attachment and operation with
a low level of effort
NVENT/NDP is as easy to automate and use
as DHCP/IP.
Support secure communication
(authentication, authorization, integrity,
confidentiality) among trusted nodes.
Mutually suspicious NDP nodes self-select
paths exhibiting cryptographic proofs of
properties required for security.
Provide a cost-effective communications
infrastructure
NCORE places resources where
architecturally needed; policy analysis.
Implement network and user policies Policies implemented with NDP and NVENT.
The architecture must accommodate a
variety of networks.
NDP sends packets by encapsulation, NVENT
networks by virtualization
The architecture must permit distributed
management of its resources.
NDP path establishment decentralized,
NVENT
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
FUTURE
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
HOW NEBULA WILL REDEFINE INTERNET ?
• From best effort to delivery assurance.
• Dynamic routers.
• Evolution in network rather than at end points.
• Revolutionising cloud infrastructure.
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
EVALUATION
• The design choices for NDP was strongly focused on the
following parameters:
1. Assured Paths.
2. Controlled Access.
3. Availability.
4. Autonomous control of resources.
5. Privacy enhanced communication.
“NDP provides a superset of the union of the features
provided by other projects.” Eg : BGP, Byzantine routing.
Average header = 250 bytes
Average packet = 1300 bytes
20 % more space
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
• Nebula is a future internet architecture that is intrinsically more
secure and addresses threats to the emerging computer utility
capabilities (cloud computing) while meeting the challenges of
flexibility, extensibility and economic viability.
• Architecture divided into NDP, NCORE and NVENT.
• Interconnecting data centers is the primary focus.
• Highly secure, realiable & efficient.
• Can be used in areas such as Biotelemetry & Defence.
SUMMARY
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
• Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer,
Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives,
Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazières, Antonio
Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael
Walfish, Hakim Weatherspoon, and Christopher S. Yoo. The NEBULA Future
Internet Architecture, volume 7858 of LNCS. Springer Verlag, 2013.
• NEBULA project web page - http://nebula-fia.org/.
• Douglas Comer. A future Internet architecture that supports Cloud
Computing. In Proc. 6th International Conference on Future Internet
Technologies (CFI), June 2011.
• Andrei Agapi, Ken Birman, Robert M. Broberg, Chase Cotton, Thilo Kielmann,
Martin Millnert, Rick Payne, Robert Surton, and Robbert van Renesse. Routers
for the Cloud: Can the Internet achieve 5-nines availability? IEEE Internet
Computing, 15(5):72–77, 2011.
ACKNOWLEDGEMENTS
Trinity College Dublin, The University of Dublin
CS7002 Data Communications
• Birman, K.P., Huang, Q., Freedman, D.: Overcoming the “D” in CAP: Using
Isis2 to build locally responsive cloud services. IEEE Internet Computing 12,
50–58 (2012)Aditya, P., Zhao, M., Lin, Y., Haeberlen, A., Druschel, P., Maggs,
B., Wishon, B.Reliable client accounting for hybrid contentdistribution
networks. In: Proc. NSDI(April 2012)
• Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau
Loo, and Micah Sherr. 23rd ACM Symposium on Operating Systems Principles
(SOSP '11), Cascais, Portugal, Oct 2011. DOI 10.1145/2043556.2043584.
• Setty, S., McPherson, R., Blumberg, A.J., Walfish, M.: Making argument
systemsfor outsourced computation practical (sometimes). In: Proc. NDSS
(February 2012)
• Zhou,W., Fei, Q., Narayan, A., Haeberlen, A., Loo, B.T., Sherr, M.: Secure
network provenance. In: Proc. SOSP (October 2011)
ACKNOWLEDGEMENTS
QUESTIONS ?
THANK YOU

More Related Content

Similar to Nebula - The Future Internet Architecture

Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
Trinity Dwarka
 
Ephemeral Wireless Networks
Ephemeral Wireless NetworksEphemeral Wireless Networks
Ephemeral Wireless Networks
Johann Marquez-Barja
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
Trinity Dwarka
 
Slideshare
SlideshareSlideshare
Slideshare
Somesh Ransubhe
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
Stenio Fernandes
 
Campus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptxCampus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptx
mdshoaghossain
 
Psdn and ccitt x series
Psdn and ccitt x seriesPsdn and ccitt x series
Psdn and ccitt x series
Jeffrey Des Binwag
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
Sai Sirisha
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
SherefHesham
 
Expl sw chapter_07_wireless rev.01
Expl sw chapter_07_wireless rev.01Expl sw chapter_07_wireless rev.01
Expl sw chapter_07_wireless rev.01
aghacrom
 
15827 sr no01
15827 sr no0115827 sr no01
15827 sr no01
pratiklpu
 
Tasnimul hasan shaon.pdf
Tasnimul hasan shaon.pdfTasnimul hasan shaon.pdf
Tasnimul hasan shaon.pdf
Tasnimul Shaon
 
Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...
Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...
Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...
MyNOG
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
silpa sajeevan
 
LDSS for mobile cloud
LDSS for mobile cloud  LDSS for mobile cloud
LDSS for mobile cloud
sreelekshmi kishna
 
Icacci presentation-intrusion
Icacci presentation-intrusionIcacci presentation-intrusion
Icacci presentation-intrusion
vinaykumar R
 
Benjamin Fang Resume
Benjamin Fang ResumeBenjamin Fang Resume
Benjamin Fang Resume
benjamin fang
 
CAN2
CAN2CAN2
Harvard university i tv3.2
Harvard university i tv3.2Harvard university i tv3.2
Harvard university i tv3.2
kevin_donovan
 
RESUME
RESUMERESUME
RESUME
James Craven
 

Similar to Nebula - The Future Internet Architecture (20)

Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Ephemeral Wireless Networks
Ephemeral Wireless NetworksEphemeral Wireless Networks
Ephemeral Wireless Networks
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Slideshare
SlideshareSlideshare
Slideshare
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 
Campus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptxCampus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptx
 
Psdn and ccitt x series
Psdn and ccitt x seriesPsdn and ccitt x series
Psdn and ccitt x series
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
Expl sw chapter_07_wireless rev.01
Expl sw chapter_07_wireless rev.01Expl sw chapter_07_wireless rev.01
Expl sw chapter_07_wireless rev.01
 
15827 sr no01
15827 sr no0115827 sr no01
15827 sr no01
 
Tasnimul hasan shaon.pdf
Tasnimul hasan shaon.pdfTasnimul hasan shaon.pdf
Tasnimul hasan shaon.pdf
 
Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...
Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...
Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
 
LDSS for mobile cloud
LDSS for mobile cloud  LDSS for mobile cloud
LDSS for mobile cloud
 
Icacci presentation-intrusion
Icacci presentation-intrusionIcacci presentation-intrusion
Icacci presentation-intrusion
 
Benjamin Fang Resume
Benjamin Fang ResumeBenjamin Fang Resume
Benjamin Fang Resume
 
CAN2
CAN2CAN2
CAN2
 
Harvard university i tv3.2
Harvard university i tv3.2Harvard university i tv3.2
Harvard university i tv3.2
 
RESUME
RESUMERESUME
RESUME
 

Recently uploaded

AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 

Recently uploaded (20)

AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 

Nebula - The Future Internet Architecture

  • 1. CS7002 Data Communications The Nebula Future Internet Architecture RANJAN DHAR dharr@tcd.ie
  • 2. Trinity College Dublin, The University of Dublin CS7002 Data Communications Overview • Three basic foundations of Nebula. • Sponsored and supported by National Science Foundation and CISCO systems. • Focussed on a future network enabling enabling the vision of cloud computing.
  • 3. Trinity College Dublin, The University of Dublin CS7002 Data Communications Motivation/Problem • The bloom of Cloud Computing. • Security of network. • Broad applicability.
  • 4. Trinity College Dublin, The University of Dublin CS7002 Data Communications Motivation / Problem “”We need a new network architecture !!!”” • Availability and Dependability. • Cloud Computing have embraced weak consistency. • Redefined security. • Smarter network. (Flexible and Extensible)
  • 5. Trinity College Dublin, The University of Dublin CS7002 Data Communications Example ( Critical Application) Monitor current glucose level Monitor what was being eaten Monitor exercise activity Insulin infusion recommendation Machine Learning
  • 6. Trinity College Dublin, The University of Dublin CS7002 Data Communications Enters “NEBULA” • Nebula is an architecture for the cloud based future Internet. • Comprehensive, Clean slate and Reliable. • Basic decisions include use of packet switching, multiple paths & store-and-forward routers. • Backbone of Data Centers.
  • 7. Trinity College Dublin, The University of Dublin CS7002 Data Communications Principles & Architecture ARCHITECTURE • Services provided by cloud data centers. • Multiple cloud providers, that use replication • Variety of access mechanisms. • Transit networks to interconnect data centers. PRINCIPLES • Ultra reliable interconnecting data centers. • Parallel paths between data centers and core routers. • Secure and authentic connection establishment. • Policy based path selection.
  • 8. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA – Building blocks NEBULA NCORE NDP NVENT • Nebula Core Architecture. • Nebula Data Plane. • Nebula Virtual and Extensible Networking Techniques.
  • 9. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA
  • 10. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA (NCORE) • High Performance Core Routers. • Highly Reliable. • Programmable. • Load balancing. • Supports features like Network Provence, failure detection and path diversity. • Problems can be diagnosed and repaired during runtime. ROUTERS FIRE
  • 11. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA(NCORE) ROUTERS Redundant paths.
  • 12. Trinity College Dublin, The University of Dublin CS7002 Data Communications SCENARIO’S
  • 13. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA (NDP) • Primarily focussed on Distributed multiple path establishment and policy enforcement. • Policies may include security, privacy and fault tolerance requests. • Uses path verification mechanism known as ICING. • Proof of Consent & Proof of Provenance. • It must check whether the path is authorized. • It must also check whether the authorized path was followed. DATA PLANE
  • 14. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA (NDP) Data Plane other fields payload... hop 1 info hop n info hop #counter Proof of Consent Proof of Path Domain ID MPLS-style token 42n bytes6 bytes 1 byte 6 bytes 42 bytes • POC is basically a Cryptographic token. • As packet traverses the path, it is incrementally marked with POP. • Enforces network provenance by using POP. • Denial of service attacks are much difficult to carry out. (Secure)
  • 15. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA (NVENT) • Nebula Virtual and Extensible Networking Technology. • NVENT embodies new control-plane technologies that focus on policy specification, policy-based path setup and service naming. • NVENT uses declarative networking. CONTROL PLANE
  • 16. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA (NVENT) CONTROL PLANE
  • 17. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA (NVENT) • Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. • Just as BGP in the current Internet, NVENT provides a set of default paths to ensure global reachability, but it also provides an interface to NDP, which is available to users for requesting custom paths, e.g., for applications that require high reliability CONTROL PLANE
  • 18. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA (NVENT) CONTROL PLANE NVENT NDP policy engine policy engine policy engine policy engine consent engine consent engine consent engine consent engine d a t ad a t a 1 2 2 3 4 5 path req path spec 10 d a t a d a t a d a t a 8 96 7 SLA 1 SLA 2 gst employees lan
  • 19. Trinity College Dublin, The University of Dublin CS7002 Data Communications PUTTING NEBULA TOGETHER
  • 20. Trinity College Dublin, The University of Dublin CS7002 Data Communications PUTTING NEBULA TOGETHER • Cell phone contacts NVENT & requests a path to NCORE. • NVENT looks for path compiling to the policy and contacts NDP policy server to obtain necessary POC’s. • NVENT returns all the POC’s to the cell phone. • Cell phone uses these POC’s to send packets via NDP to nearest NCORE router. • NCORE performs network provenance to verify the path and forwards packets to Data Center.
  • 21. Trinity College Dublin, The University of Dublin CS7002 Data Communications PUTTING NEBULA TOGETHER • Nebula’s security can be related to the immigration process. • Detailed security with high efficiency. • POP’s usually happen at boundaries. • Policy Server may have 0 or more policies. • If Policies = 0, then DEFAULT DENY. • Policies are cacheable. • Policies can be queried by clients. • Example: NEBULAPATH = HIPAA.
  • 22. Trinity College Dublin, The University of Dublin CS7002 Data Communications PROTOTYPE - ZODIAC
  • 23. Trinity College Dublin, The University of Dublin CS7002 Data Communications RESEARCH QUESTIONS ? • ICING vs. TorIP vs. TaaS. • Application interface to specify policy. • Relationship between Policy enforcing plane and NCORE routers still in flux. • Organization contracts ? • Name service implementation ?
  • 24. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA CONFIGURATION & OPERATION • Policy Configuration – API level work in NVENT to determine client requirements. • Path Setup – Policy request. • Forwarding - POC’s & POP’s. • Naming – TorIP (ISP, ID) “ID indentifies a mailbox” ICING (DNS augmented by policy enforcement) www. foo . comEXAMPLE(ICING): POC1 POC2 Remember POC’s are cacheable
  • 25. Trinity College Dublin, The University of Dublin CS7002 Data Communications NEBULA ARCHITECTURAL CHOICES Design Goal NEBULA Communication must continue despite loss of networks, links, or gateways. NEBULA uses multiple dynamically allocated paths and reliable transport. Allow host attachment and operation with a low level of effort NVENT/NDP is as easy to automate and use as DHCP/IP. Support secure communication (authentication, authorization, integrity, confidentiality) among trusted nodes. Mutually suspicious NDP nodes self-select paths exhibiting cryptographic proofs of properties required for security. Provide a cost-effective communications infrastructure NCORE places resources where architecturally needed; policy analysis. Implement network and user policies Policies implemented with NDP and NVENT. The architecture must accommodate a variety of networks. NDP sends packets by encapsulation, NVENT networks by virtualization The architecture must permit distributed management of its resources. NDP path establishment decentralized, NVENT
  • 26. Trinity College Dublin, The University of Dublin CS7002 Data Communications FUTURE
  • 27. Trinity College Dublin, The University of Dublin CS7002 Data Communications HOW NEBULA WILL REDEFINE INTERNET ? • From best effort to delivery assurance. • Dynamic routers. • Evolution in network rather than at end points. • Revolutionising cloud infrastructure.
  • 28. Trinity College Dublin, The University of Dublin CS7002 Data Communications EVALUATION • The design choices for NDP was strongly focused on the following parameters: 1. Assured Paths. 2. Controlled Access. 3. Availability. 4. Autonomous control of resources. 5. Privacy enhanced communication. “NDP provides a superset of the union of the features provided by other projects.” Eg : BGP, Byzantine routing. Average header = 250 bytes Average packet = 1300 bytes 20 % more space
  • 29. Trinity College Dublin, The University of Dublin CS7002 Data Communications • Nebula is a future internet architecture that is intrinsically more secure and addresses threats to the emerging computer utility capabilities (cloud computing) while meeting the challenges of flexibility, extensibility and economic viability. • Architecture divided into NDP, NCORE and NVENT. • Interconnecting data centers is the primary focus. • Highly secure, realiable & efficient. • Can be used in areas such as Biotelemetry & Defence. SUMMARY
  • 30. Trinity College Dublin, The University of Dublin CS7002 Data Communications • Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, and Christopher S. Yoo. The NEBULA Future Internet Architecture, volume 7858 of LNCS. Springer Verlag, 2013. • NEBULA project web page - http://nebula-fia.org/. • Douglas Comer. A future Internet architecture that supports Cloud Computing. In Proc. 6th International Conference on Future Internet Technologies (CFI), June 2011. • Andrei Agapi, Ken Birman, Robert M. Broberg, Chase Cotton, Thilo Kielmann, Martin Millnert, Rick Payne, Robert Surton, and Robbert van Renesse. Routers for the Cloud: Can the Internet achieve 5-nines availability? IEEE Internet Computing, 15(5):72–77, 2011. ACKNOWLEDGEMENTS
  • 31. Trinity College Dublin, The University of Dublin CS7002 Data Communications • Birman, K.P., Huang, Q., Freedman, D.: Overcoming the “D” in CAP: Using Isis2 to build locally responsive cloud services. IEEE Internet Computing 12, 50–58 (2012)Aditya, P., Zhao, M., Lin, Y., Haeberlen, A., Druschel, P., Maggs, B., Wishon, B.Reliable client accounting for hybrid contentdistribution networks. In: Proc. NSDI(April 2012) • Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr. 23rd ACM Symposium on Operating Systems Principles (SOSP '11), Cascais, Portugal, Oct 2011. DOI 10.1145/2043556.2043584. • Setty, S., McPherson, R., Blumberg, A.J., Walfish, M.: Making argument systemsfor outsourced computation practical (sometimes). In: Proc. NDSS (February 2012) • Zhou,W., Fei, Q., Narayan, A., Haeberlen, A., Loo, B.T., Sherr, M.: Secure network provenance. In: Proc. SOSP (October 2011) ACKNOWLEDGEMENTS