Reconstructing computer networking with RINA: how solid scientific foundations can allow Europe to become a world leader in internetworking
29 de Jun de 2015•0 recomendaciones•2,214 vistas
Descargar para leer sin conexión
Denunciar
Internet
Reconstructing computer networking with RINA: how solid scientific foundations can allow Europe to become a world leader in internetworking, RINA tutorial to the EC
Similar a Reconstructing computer networking with RINA: how solid scientific foundations can allow Europe to become a world leader in internetworking(20)
Reconstructing computer networking with RINA: how solid scientific foundations can allow Europe to become a world leader in internetworking
1. Reconstructing computer networking with RINA:
how solid scientific foundations can allow
Europe to become a world leader in
internetworking
European Commission. Brussels, June 25th 2015
Eduard Grasa, Sergi Figuerola (Fundació i2CAT)
With slides and input from John Day, IRATI and PRISTINE consortiums
2. Three ideas to get out of this tutorial
• Current networking technology hasn’t got solid
foundations
– Just because something is widely used and deployed it
doesn’t mean it’s a good technical solution
• There is a scientific alternative based on a sound
theory, which yields cheaper, simpler, more
performing, predictable and reliable networks
• Europe has an incredible opportunity to lead this
distributed computing and networking revolution,
which could impact Europe’s Distributed computing
& Telecom industry in a massive way
RINA tutorial to the EC 2
1
2
3
3. WARNING!
• Please, please, please,
interrupt me at any time,
ask questions, etc..
• The goal is not to cover
the whole material, but
that you understand
some/most of the points
supporting the three
previous ideas
RINA tutorial to the EC 3
10. ARPANET Layers
• The ARPANET was the first, so feeling our way.
• BBN is building the Subnet and it is necessarily somewhere between a
traditional data comm network and a new packet network, but there are
no layer diagrams of it.
• So everyone just sees layers in the host as modularity.
• But with the advantage of an example and a lot collaboration with BBN
Physical
IMP-Host
Host-Host (NCP)
Telnet
File Transfer
Physical
IMP-Host
Host-Host (NCP)
Telnet
File Transfer
IMP Subnet
25. IPv6: Makes Matters Worse
• Primary Problem: Router Table Size; secondarily address exhaustion.
• 1992 Rejection of IPv7 (CLNP), which named the node and was
already deployed and operational in the routers. (the transition was over.)
– By continuing to name the interface, avoided reducing router table size by
a factor 3 – 4 times (as well as address usage) Reducing router table size was
Major Problem
– This decision above all was totally irresponsible, but typical of mob rule
– Not only does it make multihoming impossible, but makes mobility the
cumbersome mess MIPv6 creates.
– Long list of problems today, and loc/id split only dug the hole deeper.
• But did get more addresses, but can only route on /64, the rest are
for NSA.
– Barely able to route 1 IPv4 address space, no idea how to route 4.3 billion.
– But that is okay, as we will see a global address space is unnecessary in a
well-formed architecture. (More addresses isn’t a problem).
• Yes, there is good news a-comin’!
31RINA Tutorial to the EC
32. • With a Transport Layer, this is the same as the INWG model.
• OSI stayed the course with a similar split to TCP/IP.
• So OSI had an Internet Architecture and the Internet has a
Network Architecture.
• And signs of a repeating structure.
Transport Layer
Subnet Independent
Subnet Dependent
Subnet Access
Data Link LLC
Data Link MAC
The OSI
network layer
was soon
subdivided
into 3 layers
Relaying and multiplexing
Error and flow control
Relaying and multiplexing
Error and flow control
Relaying and multiplexing
Error and flow control
Data link scope
Network scope
Internetwork
scope
OSI also came to the INWG model
43
36. 47
Naming and addressing in RINA
• All application processes
(including IPC processes) have
a name that uniquely identifies
them within the application
process namespace.
• In order to facilitate its operation
within a DIF, each IPC process
within a DIF gets a synonym that
may be structured to facilitate
its use within the DIF (i.e. an
address).
The scope of an address is the DIF, addresses are not visible outside of the DIF.
The Flow Allocator function of the DIF finds the DIF IPC Process through which a
destination Application process can be accessed.
Because the architecture is recursive, applications, nodes and PoAs are relative
For a given DIF of rank N, the IPC Process is a node, the process at the layer N+1
is an application and the process at the layer N-1 is a Point of Attachment.
1 2 3 4
1 2 1 2 3 1 2
1 21 2
DIF A
DIF B
DIF C
DIF D
DIF E DIF F
RINA Tutorial to the EC
69. 82
• Benefits of having an architecture instead of a protocol suite: the
architecture tells you where security related functions are placed.
– Instead of thinking protocol security, think security of the architecture: no
more ‘each protocol has its own security’, ‘add another protocol for
security’ or ‘add another box that does security’
Allocating a flow to
destination application
Access control
Sending/receiving PDUs
through N-1 DIF
Confidentiality, integrity
Placement of security related functions
N DIF
N-1 DIF
IPC Process IPC Process
IPC Process
IPC Process
Joining a DIF
authentication, access
control
Sending/receiving PDUs
through N-1 DIF
Confidentiality, integrity
Allocating a flow to
destination application
Access control
IPC Process
Appl.
Process
Access control
(DIF members)
Confidentiality, integrity
Authentication
Access control
(Flow allocations to apps)
DIF Operation
Logging
DIF Operation
Logging
RINA Tutorial to the EC
78. Simpler networks
• Clean and simple structure at the macro-level: single type
of layer that repeats as needed, uniform API between
layers
– No need to differentiate “physical” vs. “virtual”, vs overlays, etc..
– Much simpler networks, with less devices and no middleboxes (no
need for firewalls, NATs, tunnel terminators, DPI, etc). Just three
types of systems: hosts, interior routers and border routers.
– Unification of all forms of I/O and networking under the IPC
paradigm
– Applications can communicate with other applications just by
name – regardless of their location – and request specific
characteristics for the communication instance (max. delay, max
loss, in order delivery, …)
– See next two slides
RINA Tutorial to the EC 93
79. Network layers today (example)
Host
Enterprise router
IEEE 802.3 (Ethernet)
Enterprise router
TCP/UDP
App
A
Application
A
Sockets API
OS Sockets
Layer
1. Bind/Listen to interface and port
2. Accept incoming connections
3. Connect to a remote address/port
4. Send datagram
5. Write data (bytes) to socket
6. Read data (bytes) from socket
7. Destroy socket
IP
IEEE 802.11 (WiFi)
Carrier Ethernet
Switch
IEEE 802.1q (VLAN)
IEEE 802.1ah (PBB)
Each tech has a different
API, and all are different
from the application API
Carrier Ethernet
Switch
RINA Tutorial to the EC 94
80. Network layers with RINA (example)
Host
Border router Interior Router
DIF
DIF DIF
Border router
DIF
DIF
DIF
App
A
The layer API is always
the same (and the
same as the
application API)
Application
A
Layer (DIF) API
IPC
Process
1. Register application
2. Allocate/Deallocate flows
3. Write data (SDUs) to flows
4. Read data (SDUs) from flows
5. Get layer information (QoS cubes,
Max SDU size, etc..)
RINA Tutorial to the EC 95
81. Simpler networks (II)
• Each layer has the same components and structure,
programmable via “policies” to optimize each layer for its
operating environment
– No need to define new protocols for different layers, just different
policies
– Implementations can leverage this structure to obtain a more
compact, simple, reliable and performing “network stack”
– Given that layers have the same API and internal structure,
interactions between layers become simpler and predictable.
Multi-layer network management becomes much more simple,
allowing for more sophisticated automation deployed at larger
scales.
– A layer is just a distributed application dedicated to do Inter
Process Communication (IPC). An instantiation of a layer in a
computing system is called IPC Process.
– See next slide
RINA Tutorial to the EC 96
82. Internal structure of an IPC Process
IPC
Process
IPC API
Data Transfer Data Transfer Control Layer Management
SDU Delimiting
Data Transfer
Relaying and
Multiplexing
SDU Protection
Retransmission
Control
Flow Control
RIB
Daemon
RIB
CDAP
Parser/Generator
CACEP
Enrollment
Flow Allocation
Resource Allocation
Routing
Authentication
StateVector
StateVectorStateVector
Data TransferData Transfer
Retransmission
Control
Retransmission
Control
Flow Control
Flow Control
Namespace
Management
Security
Management
Increasing timescale (functions performed less often)
System (Host)
• Each IPC Process has components to provide IPC (data transfer and data
transfer control), as well as components to manage IPC (enrollment, routing,
flow allocation, resource allocation, security management, etc..).
– Layer management components use a common abstraction (the RIB) and protocol (CDAP) to
exchange information with neighbor IPCPs. This exchange of information is modeled as 6
remote operations (create, delete, reqd, write, start, stop) on obects.
RINA Tutorial to the EC
97
83. Service Provider Networks
Example scenario (Fixed networks)
Border
RouterHost
Home /Enterprise DIF
Customer network
(Simplification, can have more
internal structure probably)
Access DIF
Border
Router
Interior
Router
P2P DIF P2P DIF
Border
Router
P2P DIF
Interior
Router
P2P DIF
Border
Router
P2P DIF P2P DIF
Interior
Router
Border
Router
Provider 1 Backbone DIF
P2P DIF
Border
Router
Provider 1 Regional DIF
P2P DIF
Border
Router
Provider 1 Metropolitan DIF
Border
Router
P2P DIF P2P DIF
Provider 2
Metro DIF
Interior
Router
P2P DIFP2P DIF
Public Internet DIF
Application-specific DIF
DAP
Provider 1 network Provider 2 network
98
RINA Tutorial to the EC
85. E-mall
DIF
E-mall
DIF
Metropolitan DIF
Connectivity graph and example policies
• Supports different “e-malls” – DIFs designed to support applications.
• Organized in subDIF, each subDIF could map to a city.
• Topological addressing (<city.IPCP>), link state within a subDIF.
• Need to multiplex traffic from potentially very different characteristics:
need to provide multiple QoS cubes.
• Strong security requirements since the DIF is exposed to customer
routers
MR
BR
BR
IR
BR
BR
ISP
BR
BR
BR
IR
IR
BR
IR
IR
IR
MR
BR
BR
BR
IR BRBR
SubDIF 3
BR
SubDIF 1
SubDIF 2
Regional DIF
E-mall
DIF
E-mall
DIF
E-mall
DIF
E-mall
DIF
E-mall
DIF
E.mall
DIF
IR = IPCP at Interior Router
BR = IPCP at Border Router
E-mall
DIF
100
RINA Tutorial to the EC
86. Regional DIF
Connectivity graph and example policies
• Provides connectivity to the different subDIFs of the metropolitan DIF.
• Organized in subDIF, each subDIF could map to a region.
• Topological addressing (<region.IPCP>), link state within a subDIF.
• Traffic more aggregated than in metros, still probably need to provide
support for multiple QoS cubes.
MR
BR
BR
IR
BR
BR
ISP
BR
BR
BR
IR
IR
BR
IR
IR
IR
MR
BR
BR
BR
IR
MR
BRBRBR
SubDIF 3
BR
SubDIF 1
SubDIF 2
Backbone DIF
Metro
DIF
Metro
DIF
Metro
DIF
Metro
DIF
Metro
DIF
Metro
DIF
IR = IPCP at Interior Router
BR = IPCP at Border Router
101
RINA Tutorial to the EC
87. Backbone DIF
Connectivity graph and example policies
• Provides connectivity to the different subDIFs of the regional DIF.
• Traffic is aggregated and therefore more deterministic, more connection-
oriented like resource allocation policies make sense.
• Security policies can be more relaxed: all the infrastructure is in control of
the provider and not exposed outside.
• Relatively small number of IPCPs: flat addressing and link-state routing may
be enough (no subDIFs).
• Meshed connectivity graph.
IR = IPCP at Interior Router
BR = IPCP at Border Router
BR
BR
BR
BR
BR
BR
IR
IR
IR
IR
IR
IR
IR
Regional
DIF
Regional
DIF
Regional
DIF
Regional
DIF
Regional
DIF
Regional
DIF
102
RINA Tutorial to the EC
93. Why do we have a separate
mobile network architecture?
• RINA can be used to design and build mobile access
networks, no need for a separate architecture
– It provides an ideal framework to materialize the “5G”
concepts, unifying: fixed networks, mobile networks, wireless,
virtual networks, overlays, etc.
RINA Tutorial to the EC 108
94. Border
Router
Service Provider Networks
Example scenario (Mobile networks)
P2P DIF
Metro DIF
Provider Fixed Network
(necklace with e-mall at the top)
P2P DIF
Border
Router
P2P DIF
Border
Router
Interior
Router
(Base Station)
Host
(Mobile)
Multi-access DIF
(radio) P2P DIF
District DIF
Metro DIF
Regional DIF
Public Internet DIF
Application-specific DIF
DAP
Border
Router
Regional DIF
P2P DIF
Mobile Infrastructure NetworkCustomer Terminal
P2P DIF
Interior
Router
Border
Router
P2P DIF
Backbone DIF
Regional
Metro
District
P2P DIF
Interior
Router
109RINA Tutorial to the EC
95. Radio Access DIF and District DIF
Example connectivity graphs
Multi-homed host
BR
BS
H H H
BS
H
Metro
DIF
Metro
DIF
Metro
DIF
BR
BS
H H H
BS
H
Metro
DIF
Metro
DIF
Metro
DIF
Multi-homed host
Metro
DIF
Metro
DIF
Metro
DIF
District DIF 1 District DIF 2
Radio DIF
Radio
DIF
Radio DIF
Radio
DIF
DISTRICT DIF
BS = IPCP at Base Station
H = IPCP at Host
BR = IPCP at Border Router
BS
H
BS
H H
H
H
Multi-access DIF 1
(radio) Multi-access DIF 2
(radio)
District
DIF
District
DIF
District
DIF
District
DIF
District
DIF
District
DIF
MULTI-ACCESS
RADIO DIF
BS = IPCP at Base Station
H = IPCP at Host
110RINA Tutorial to the EC
96. E-mall
DIF
Metro DIF and Regional DIF
Example connectivity graphs
METRO DIF
H = IPCP at Host
BR = IPCP at Border Router
H H H H H
BR
H H H H H
BR
Multi-homed host
Reg.
DIF
H H H H
H
BR
H
District
DIF
District
DIF
District
DIF
BR
Regional
DIF
H
H H HH H HH H H HH H HH H H HH H HH H H HH H H
Metro
DIF
BR
HH H HH H H HH H HH H H HH H HH H HH H HH
Metro
DIF
BR
BR
Metro DIF
(fixed)
Public
Internet DIF
REGIONAL DIF
H = IPCP at Host
BR = IPCP at Border Router
111RINA Tutorial to the EC
97. Mobility, what is needed?
• Nothing new!
• Enrollment to new DIFs follows usual procedures
• Allocation of flows follows usual procedures
• Changing address of IPCPs within a DIF as they move through it
as described before
• New lower layer DIFs (points of attachment) are acquired as
usual
• Current points of attachment are discarded when they can no
longer provide an acceptable QoS (defined per DIF)
112RINA Tutorial to the EC
99. Net neutrality (I)
• Lots of definitions, but the aim is protecting the user/consumer.
As with other businesses, it should be regulated by outcomes, not
trying to specify how networks should process packets.
• “All packets should be treated equal” doesn’t make sense:
– Assumes all applications will have the same requirements (WRONG!
interactive vs. bulk)
– Assumes all traffic is equally valid (WRONG! What about spam?)
– Assumes different traffic streams are perfectly isolated (WRONG! My video
stream is your Denial of Service attack)
– Assumes individual packets are significant (WRONG! Flows are what matters)
• Why on earth shouldn’t network operators be able to provide a
differentiated service offering to their customers?
– Do we ban airlines from providing business class?
– Do we ban restaurants from serving different meals with different quality at a
different price?
– Etc …
114RINA Tutorial to the EC
100. Net neutrality (II)
• What matters is that (as in any other business)
– Operators have a clear service offering, based on
measurable outcomes (e.g. you will get a delay of less than
200 ms 95% of the time, and in any case no bigger than 1 s).
– Operators don’t discriminate users based on sex, religion,
etc..
• But providing quality of service in the current Internet
is hard.. what about RINA networks?
– Next slide
RINA tutorial to the EC 115
101. Propagating QoS requirements through
the layers
RINA tutorial to the EC 116
Host
Border router Interior Router
DIF
DIF DIF
Border router
DIF
DIF
DIF
App
A
The layer API is always
the same (and the
same as the
application API)
Application
A
Layer (DIF) API
IPC
Process
1. Register application
2. Allocate/Deallocate flows
3. Write data (SDUs) to flows
4. Read data (SDUs) from flows
5. Get layer information (QoS cubes,
Max SDU size, etc..)
103. Transition? No, Adoption
Public Internet
Rina Provider
RINA Network
RINA ApplicationsRINA supported Applications
• Adopt. Don’t transition.
– If the old stuff is okay in the Internet e-mall, leave it there.
– Do the new capabilities in RINA
• Operate RINA over, under, around and through the Internet.
– The Internet can’t be fixed, but it will run better over RINA.
– New applications and new e-malls will be better without the legacy and
run better along side or over the Internet.
• The Microsoft Approach or the Apple approach?
– Microsoft tried to prolong the life of DOS. It still haunts them.
• A clean break with the past. The legacy is just too costly.
• We need engineering based on science, not myth and tradition.
RINA Tutorial to the EC 118
104. Shim DIFs
General requirements
• The task of a shim DIF is to put a small as possible veneer over a
legacy protocol to allow a RINA DIF to use it unchanged.
• The shim DIF should provide no more service or capability than
the legacy protocol provides.
119RINA Tutorial to the EC
105. Shim DIF over 802.1Q
Environment
• (Disclaimer: Other shim DIFs over Ethernet are possible: with no
VLANs; using LLC; over carrier Ethernet; …)
• A shim DIF over Ethernet maps to a VLAN
– The DIF name is the VLAN name
• The shim DIF only supports on class of service: unreliable
• ARP can be used to map upper layer IPC Process names to shim
DIF addresses (MAC addresses)
120RINA Tutorial to the EC
Shim DIF over Ethernet
Ethernet II PCI Application data
106. Shim DIF over TCP/UDP
• Wraps an IP network with the DIF IPC API
• Two QoS cubes possible: reliable and in-order-delivery of flows (TCP),
unreliable (UDP)
– More could be possible depending on the capabilities of the underlying IP
network
• IPCP name is mapped to an IP address and a port number
– Using proprietary procedures or leveraging DNS (via SRV records)
121
IPCP
a.1
IPCP
b.1
Shim DIF over IP networks
IP layer
UDP Port:2524UDP Port:2524
Shim IPCP
X.1
Shim IPCP
Y.1
IP: 4.3.2.1 IP: 5.3.5.8
2 5
Flow
RINA Tutorial to the EC
107. RINA under IP
• RINA-based ISP, internal layers are RINA, can transport IP
(can be treated as just another app) and/or other DIFs.
• Almost all routing is done in RINA layers. From the IP layer
perspective, the ISP is a single hop
– Directly connects access routers between them or with border
routers
122
App
Customer network
Home router
Regional DIF
ISP access router
Shim DIF Shim DIF
Shim DIF Shim DIF
Backbone DIF
Regional
router
Regional-
bacbone
border
router
Backbone
router
ISP border
router (runs
BGP sessions
with peers)
Customer
network is not
RINA enabled
Public Internet layer (IP)
Data transfer/control: TCP/IP Layer management: ICMP, BGP, etc…
Access network
layer (e.g
Ethernet)
AS-to-AS layer
(e.g Ethernet)
Peer AS is not
RINA-enabled
RINA Tutorial to the EC
108. Faux sockets API
An aid to adoption
• Sockets API implementation that internally maps sockets
API calls to RINA IPC API calls
– Allows applications to be deployed over RINA networks unchanged
(won’t leverage the full RINA benefits)
• Mapping
– Need to map hostnames and transport ports to RINA names
• Applications that pass IP addresses are more problematic to support
– Binding a socket = Registering an application to a DIF
• Single DIF vs. Multiple DIFs
– Connecting a socket = Allocating a flow to a destination app
• No need to perform DNS lookup since names are resolved by DIFs
– Accepting incoming connections = Accepting incoming flows
– Read/write to a socket = Read/write to a flow
– Closing a socket = Deallocating a flow
123RINA Tutorial to the EC
109. RINA STATUS, HOW CAN THE EC HELP
MOVE RINA FORWARD?
RINA Tutorial to the EC 124
4
110. RINA state of the art
• Draft RINA reference model and specifications
• Theoretical and experimental research on RINA properties
(using FIRE, GENI, particular testbeds)
– BU John Day’s team
– EC projects: FP7 IRATI, FP7 PRISTINE, G3+ OC winner IRINA
• Open source implementations
– IRATI (FP7 IRATI, FP7 IRINA, FP7 PRISTINE)
– protoRINA
– RINAsim (a simulator under development by FP7 IRATI)
• PSOC (Pouzin Society): coordination of international R&D
activities, maintenance of draft reference model and
specifications
T-5 Alternatives to TCP/IP 125
111. Flow of RINA R&D activities
126
Prototyping & Tool
Development
Different
Platforms
Java
VM
Linux
OS
Android
OS
NetFP
GA
Coexisting
with
different
technologies
TCP/UDP
/IP
VLANs
WiFi
LTEMPLS
Prototy
pes &
Tools
Tools
Test
apps
Prot.
analyz
SDKs
Research on
RINA
reference
model
Core
RINA
specs
Research on
policies for
different
areas
Data
transfer
Manage
ment
Security
Routing
Resource
allocation
Enrollment
Application
discovery
Multiplexing
DIF
creation
Policy
specs
Design and
development of
simulators
Simul
ators
Study different
use cases and
deployment
options
Use
case
analy
sis
Experiment
ation and
validation
Data
and
conclu
sions
New
Insights &
Invariances
RINA Tutorial to the EC
112. IRATI @ a Glance
• What? Main goals
– To advance the state of the art of RINA towards an architecture
reference model and specifications that are closer to enable
implementations deployable in production scenarios.
– The design and implementation of a RINA prototype on top of Ethernet
will enable the experimentation and evaluation of RINA in comparison to
TCP/IP.
Budget
Total Cost 1.126.660 €
EC Contribution 870.000 €
Duration 2 years
Start Date 1st January 2013
External Advisory Board
Juniper Networks, ATOS,
Cisco Systems, Telecom Italia
5 activities:
WP1: Project management
WP2: Arch., Use cases and Req.
WP3: SW Design and Implementation
WP4: Deployment into OFELIA
WP5: Dissemination, Standardisation
and Exploitation
Who? 5 partners
127
From 2014
113. 128
IRATI contributions to RINA roadmap
• Reference model and core specifications
– Detect inconsistencies and errors
• Research on policies for different areas
– Routing (link-state), Shim DIF over Ethernet VLANs (802.1q), shim DIFs for
Hypervisors, Faux sockets API
• Use cases
– Corporate VPNs and VM networking
• Prototyping
– Initial implementation for Linux OS (user-space and kernel)
• Experimentation
– First experimental analysis of RINA against TCP/IP in similar conditions
(focusing in LAN environments)
114. PRISTINE @ a Glance
• What? Main goals
– To design and develop an SDK for the IRATI RINA prototype, to unleash the programmability
provided by RINA.
– To use the SDK to design, implement and trial a set of a policies to create optimized DIFs for
different use cases: distributed cloud, datacenter networking and network service provider.
– To design and implement the first RINA multi-layer management system.
Budget
Total Cost 5.034.961 €
EC Contribution 3.337.000 €
Duration 2.5 years
Start Date 1st January 2014
External Advisory Board
Cisco Systems, Telecom Italia,
Deutsche Telekom, Colt Telecom,
BU, Interoute
7 activities:
WP1: Project management
WP2: Use cases, req. analysis and
programmable reference architecture
WP3: Programmable performance-
enhancing functions and protocols
WP4: Innovative security and reliability
enablers
WP5: Multi-layer management plane
WP6: System-level integration, validation,
trials and assessment
WP7: Dissemination, standardisation and
exploitation
Who? 15 partners
WIT-TSSG, i2CAT, TID, Ericsson, NXW, Thales,
Nexedi, Atos, BISDN, Juniper, Telecom
SudParis, U Brno, UiO, CREATE-NET, iMinds
115. 130
PRISTINE contributions to RINA roadmap
• Reference model and core specifications
– Detect inconsistencies and errors
• Research on policies for different areas
– Congestion control, distributed resource allocation, addressing, routing,
authentication, access control, encryption, DIF management
• Use cases
– Decentralized cloud, DC networking, network service provider
• Prototyping
– Build on IRATI implementation for Linux OS. Develop SDK to allow easier
customization, develop sophisticated policies with SDK. Prototype first DIF
Management System
• Simulators
– Development of a RINA simulator, based on OMNeT++
• Experimentation
– More realistic experimentation, with more complex deployments, coexisting
with several technologies at once (IPv4, IPv6, Ethernet)
116. 131
IRINA @ a glance
• What? Main goals
– To make a study of RINA against the current networking state of the art and
the most relevant clean-slate architectures under research.
– To perform a use-case study of how RINA could be better used in the NREN
scenario, and showcase a lab-trial of the use case
– To involve the NREN and GEANT community in the different steps of the
project, in order to to get valuable feedback
Budget
Total Cost 199.940 €
EC Contribution 149.955 €
Duration 18 months
Start Date 1st November 2013
5 activities:
WP1: Technical coordination and
interaction with GEANT3+
WP2: Comparative analysis of
network architectures
WP3: Use case study and lab trials
WP4: Dissemination and workshop
organization
Who? 4 partners
117. 132
IRINA contributions to RINA roadmap
• Reference model and core specifications
– Compare with other architectures
• Use cases
– Research network operators (NRENs and GEANT environment)
• Prototyping
– Little adaptations to the IRATI prototype (Linux OS), to be able to trial
the use case in the lab
• Experimentation
– Focus on the requirements of NRENs
118. Open source IRATI
133
• IRATI github side
• http://irati.github.io/stack
• Hosts code, docs, issues
• Installation guide
• Experimenters (tutorials)
• Developers (software arch)
• Mailing list for users and
developers
• irati@freelists.org
• Procedures to contribute
under discussion, doc ongoing
119. How could the EC contribute? (I)
• In general
– Get more informed on RINA and potential impacts. Don’t
believe it: understand it!
– Consider motivating research on RINA by including it as a
relevant item in future work programmes
– Europe can lead this networking and distributed computing
revolution this time! (unlike with the Internet or SDN)
• FIRE
– A RINA testbed to do research in networking would facilitate
spreading the technology and its concepts among academics,
research centres, SMEs and industry
• 5G
– RINA provides the perfect foundation to support the
requirements of the 5G vision (blog post by ICT pristine)
RINA tutorial to the EC 134
1
2
3
120. How could the EC contribute? (II)
• Operating Systems Research
– Recursive Operating Systems would also simplify current OSs,
making them more flexible and robust (recursion as opposed
to virtualization)
• Distributed applications research
– The DAF model provides a generic framework that would
speed up the development of robust and flexible distributed
applications
RINA tutorial to the EC 135
4
5
121. Thanks for your attention!
ict-pristine.eu
pouzinsociety.org
@ictpristine
@iratiproject