RESEARCH QUESTIONS - Tuesday afternoon - Future Internet Summit2024-03-29T07:25:13Zhttp://fisummit.ning.com/forum/topics/research-questions-tuesday?commentId=4150545%3AComment%3A603&feed=yes&xn_auth=noQuestions for SILO:
- The cl…tag:fisummit.ning.com,2009-10-17:4150545:Comment:8322009-10-17T16:01:07.000ZRudra Duttahttp://fisummit.ning.com/profile/RudraDutta
Questions for SILO:<br />
<br />
- The claimed enrichment by introducing some amount of "meaning" thorough the ontology also claims to make it more possible to enable diverse (including currently unforeseen) security services, security strategies (services acting in unison), security policies (constraints on what services cannot/have-to act in unison). But this requires some representation of security semantics inside the ontology. What are the security-related information that must be required by the…
Questions for SILO:<br />
<br />
- The claimed enrichment by introducing some amount of "meaning" thorough the ontology also claims to make it more possible to enable diverse (including currently unforeseen) security services, security strategies (services acting in unison), security policies (constraints on what services cannot/have-to act in unison). But this requires some representation of security semantics inside the ontology. What are the security-related information that must be required by the architecture to be in the ontology? Will this be on per-service basis, or something else?<br />
<br />
- How does "collected wisdom" get inside the ontology? The ontology is supposed to store information about what services work well or do not work with others. Who is competent to put this information in the ontology? Does/should the mechanism to collect this information into the ontology form part of the architecture?<br />
<br />
- How do you know what to optimize? Who is competent to know what metric should be optimized? If there are multiple metrics, who gets to say which one has priority, or higher weight? Ken - one could use automatio…tag:fisummit.ning.com,2009-10-15:4150545:Comment:6842009-10-15T08:55:20.000ZJonathan Smithhttp://fisummit.ning.com/profile/JonathanSmith
Ken - one could use automation - as in cognitive networking. One vision for this is "Application-Private Networking" (APNets), where various cognitive mechanisms infer what applications need from the network and configure it<br />
accordingly.<br />
<br />
<br />
<cite>Ken Calvert said:</cite><blockquote cite="http://www.fisummit.info/forum/topics/research-questions-tuesday#4150545Comment588"><div><b>Postmodern research issues</b><br></br> <br></br> 1. Money flow - how to get money to flow to providers that will inves in…</div>
</blockquote>
Ken - one could use automation - as in cognitive networking. One vision for this is "Application-Private Networking" (APNets), where various cognitive mechanisms infer what applications need from the network and configure it<br />
accordingly.<br />
<br />
<br />
<cite>Ken Calvert said:</cite><blockquote cite="http://www.fisummit.info/forum/topics/research-questions-tuesday#4150545Comment588"><div><b>Postmodern research issues</b><br/> <br/>
1. Money flow - how to get money to flow to providers that will inves in infrastructure and new services?<br/>
<br/>
2. How should we build applications to take advantage of new services offered by the network? Can't ask (human) users, applications may not know their requirements, especially a priori. How to allow expression of policies for, e.g., choosing among paths? There are applications that know how to do this -- cf. protocols for video streaming.<br/>
<br/>
3. Performance - how do we add the things we need (motivation, accountability) to the forwarding operation without destroying performance? This is a question about engineering the fast path, but may also have to do with amelioration strategies - e.g., are there ways to avoid doing it in certain cases?</div>
</blockquote> Loci/methods for congestion c…tag:fisummit.ning.com,2009-10-14:4150545:Comment:6652009-10-14T20:06:46.000ZMichael O'Donnellhttp://fisummit.ning.com/profile/MichaelODonnell
<b>Loci/methods for congestion control</b><br />
<br />
Congestion control in TCP definitely helps, but it may not be sufficient. In fact, endpoint congestion control may not be sufficient.<br />
<br />
One principle of distributed systems exhorts us to <i>place information, power/competence, and incentive together</i>. However effective well executed endpoint control may be, we should expect cases when endpoints are incompetent or even malicious. E.g., a flooding attacker desires congestion, and will hardly…
<b>Loci/methods for congestion control</b><br />
<br />
Congestion control in TCP definitely helps, but it may not be sufficient. In fact, endpoint congestion control may not be sufficient.<br />
<br />
One principle of distributed systems exhorts us to <i>place information, power/competence, and incentive together</i>. However effective well executed endpoint control may be, we should expect cases when endpoints are incompetent or even malicious. E.g., a flooding attacker desires congestion, and will hardly co-operate to avoid it.<br />
<br />
Owners of forwarders/routers seem to have the most reliable incentive to maintain smooth network operation, and they certainly have the power/competence to drop packets. We should investigate how well they can discover which packets to drop in order to reduce loss of throughput due to congestion. Internet 3.0: Research Questi…tag:fisummit.ning.com,2009-10-14:4150545:Comment:6642009-10-14T19:54:24.000ZScott Middletonhttp://fisummit.ning.com/profile/ScottMiddleton
<b><i>Internet 3.0: Research Questions</i></b><br />
<br />
<b><i>Internet 3.0: Research Questions</i></b><br />
<br />
Given that virtualization app…tag:fisummit.ning.com,2009-10-14:4150545:Comment:6342009-10-14T12:59:30.000ZAaron Falkhttp://fisummit.ning.com/profile/AaronFalk
Given that virtualization appears in multiple groups, I'm posting the comments I received in the feedback session. I hope it's helpful! --aaron
Given that virtualization appears in multiple groups, I'm posting the comments I received in the feedback session. I hope it's helpful! --aaron Virtualization as an architec…tag:fisummit.ning.com,2009-10-14:4150545:Comment:6132009-10-14T00:13:52.000ZScott Middletonhttp://fisummit.ning.com/profile/ScottMiddleton
Virtualization as an architecture<br />
<br />
1. How do you interconnect slices<br />
- if there are 10? 10e7?<br />
- if there are heterogeneous technologies? Per slice service models<br />
<br />
2. If virtualization is fundamental, how so you create a trustworthy/available/robust/performance-sensitive resource allocation and control framework?<br />
<br />
3. Given that [ILECS] can own the resources and can build a virtualized network on top of that, how can [CLECs] get a level playing field?<br />
- motivates measurement<br />
- cloud-by-cloud vs.…
Virtualization as an architecture<br />
<br />
1. How do you interconnect slices<br />
- if there are 10? 10e7?<br />
- if there are heterogeneous technologies? Per slice service models<br />
<br />
2. If virtualization is fundamental, how so you create a trustworthy/available/robust/performance-sensitive resource allocation and control framework?<br />
<br />
3. Given that [ILECS] can own the resources and can build a virtualized network on top of that, how can [CLECs] get a level playing field?<br />
- motivates measurement<br />
- cloud-by-cloud vs. global Minimal Internet Architecture…tag:fisummit.ning.com,2009-10-13:4150545:Comment:6052009-10-13T21:58:24.000ZScott Middletonhttp://fisummit.ning.com/profile/ScottMiddleton
<b><i>Minimal Internet Architecture</i></b><br />
<br />
<i>Questions</i><br />
<br />
What is the minimal functionality?<br />
applications design to min(capabilities)<br />
How many service models?<br />
Why didn’t it (= QoS, security, …) work?<br />
Do we need a clean slate?<br />
What makes designs successful?<br />
The power and limitations of analogies?<br />
<br />
<i>Lessons Learnt</i><br />
<br />
User choice<br />
why not?<br />
interface choice … provider choice … interface issues<br />
need technical historian / innovation propagation expert<br />
<br />
What can’t we do?<br />
<br />
At home / Cisco /…
<b><i>Minimal Internet Architecture</i></b><br />
<br />
<i>Questions</i><br />
<br />
What is the minimal functionality?<br />
applications design to min(capabilities)<br />
How many service models?<br />
Why didn’t it (= QoS, security, …) work?<br />
Do we need a clean slate?<br />
What makes designs successful?<br />
The power and limitations of analogies?<br />
<br />
<i>Lessons Learnt</i><br />
<br />
User choice<br />
why not?<br />
interface choice … provider choice … interface issues<br />
need technical historian / innovation propagation expert<br />
<br />
What can’t we do?<br />
<br />
At home / Cisco / IETF / SIGCOMM<br />
Application-layer attacks<br />
Anonymity<br />
Multiple service levels<br />
<br />
<i>Analogies & minimal systems</i><br />
<br />
Highway systems<br />
Bits A - B<br />
1-to-1<br />
along the path (see: RAO)<br />
many-to-many (but: group membership)<br />
What can we do with traffic diversion?<br />
Certified priority A Robust Architecture for Div…tag:fisummit.ning.com,2009-10-13:4150545:Comment:6042009-10-13T21:52:24.000ZScott Middletonhttp://fisummit.ning.com/profile/ScottMiddleton
<b><i>A Robust Architecture for Diverse Mobile Wireless Networks</i></b><br />
<br />
<i>Mobility key architectural concern<br />
</i><br />
The architecture should assume mobility as a first class design concern.<br />
<br />
The architecture should enable seamless opportunistic usage of diverse access technologies (3G, WiFi, WiMAX etc.)<br />
<br />
The architecture should support intermittent connectivity<br />
<br />
<i>Q1: Routing under mobility</i><br />
<br />
How can the routing architecture be made<br />
robust to diverse levels of mobility?<br />
<br />
<i>Q2:…</i>
<b><i>A Robust Architecture for Diverse Mobile Wireless Networks</i></b><br />
<br />
<i>Mobility key architectural concern<br />
</i><br />
The architecture should assume mobility as a first class design concern.<br />
<br />
The architecture should enable seamless opportunistic usage of diverse access technologies (3G, WiFi, WiMAX etc.)<br />
<br />
The architecture should support intermittent connectivity<br />
<br />
<i>Q1: Routing under mobility</i><br />
<br />
How can the routing architecture be made<br />
robust to diverse levels of mobility?<br />
<br />
<i>Q2: Authenticated access</i><br />
<br />
How to enable authenticated access and associated privileges across diverse wireless access networks?<br />
<br />
<i>Q3: In-network storage<br />
</i><br />
<br />
How should content be stored and retrieved in the network?<br />
– Support for content addressability from the routing layer<br />
What are the implications of mobility for the persistence of in-network data?<br />
<br />
<i>Q4: Mobility-aware stack</i><br />
<br />
What are the key components of a mobility-aware network stack?<br />
Separating names and addresses<br />
Hop-by-hop vs. end-to-end<br />
Opportunistic network access<br />
<br />
How aware of mobility does the core need to be? Can mobility be managed entirely at the edge? Do cloud services need to be mobility aware? RISE: Research Questions
How…tag:fisummit.ning.com,2009-10-13:4150545:Comment:6032009-10-13T21:47:18.000ZScott Middletonhttp://fisummit.ning.com/profile/ScottMiddleton
<b><i>RISE: Research Questions</i></b><br />
<br />
How can we make sure that the architecture is flexible enough for existing and unforeseeable use cases?<br />
Content-Centric Networking<br />
DTNs<br />
Latency-sensitive Networking<br />
<br />
What are the appropriate interfaces to achieve usability? To applications? To users? To operators? What role does multiplicity play here?<br />
<br />
Should we have trust primitives? If so, what should they be?
<b><i>RISE: Research Questions</i></b><br />
<br />
How can we make sure that the architecture is flexible enough for existing and unforeseeable use cases?<br />
Content-Centric Networking<br />
DTNs<br />
Latency-sensitive Networking<br />
<br />
What are the appropriate interfaces to achieve usability? To applications? To users? To operators? What role does multiplicity play here?<br />
<br />
Should we have trust primitives? If so, what should they be? The Internet We All Use
How…tag:fisummit.ning.com,2009-10-13:4150545:Comment:6022009-10-13T21:46:29.000ZScott Middletonhttp://fisummit.ning.com/profile/ScottMiddleton
<b><i>The Internet We All Use</i></b><br />
<br />
How are new services created?<br />
What are the guidelines for Internet architecture design informed by economic incentives which also recognize economic viability?<br />
What information/knowledge will be needed for decentralized network management?
<b><i>The Internet We All Use</i></b><br />
<br />
How are new services created?<br />
What are the guidelines for Internet architecture design informed by economic incentives which also recognize economic viability?<br />
What information/knowledge will be needed for decentralized network management?