SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
The Pouzin Society	

© John Day, 2013 1	

Rights Reserved	

DAFs and Management
in RINA	

IRATI Workshop	

Barcelona, Spain	

John Day and Eleni Trouva
The Pouzin Society	

© John Day, 2013 2	

Rights Reserved	

Name Space Management DMSs
The Pouzin Society	

© John Day, 2013 3	

Rights Reserved	

Name Space Management (NSM)	

•  The IPC Model posits a function that allows the Application Name Space
to have a greater scope than any one DIF.	

–  Which we have called the Inter-DIF Directory (for lack of a better term)	

–  Entity associated with the IPC Management in DAPs may query what
applications are available in a system.	

–  This forms a graph where the nodes are NSM-DAPs and the arcs are DIFs	

DIFs	

NSM-DAPs
The Pouzin Society	

© John Day, 2013 4	

Rights Reserved	

NSM-DSMs	

•  Considering this a Name Space Management DMS reveals the
functions:	

–  Authenticate applications that are allowed to query the NSM-DMS	

–  Authenticate and authorize entities that are allowed to update or modify
the NSM-DMS.	

–  Implement the policies for updating and replicating data to meet load and
reliability requirements, including creating forwarding tables.	

–  Check credentials of a request to determine requestor has access to the
requested DAF and if so, return a list of DIFs and supporting DIFs.	

–  Manage the name space, determine who gets assigned what.	

–  Manage the creation of a common DIF between the requesting and
requested DAPs.
The Pouzin Society	

© John Day, 2013 5	

Rights Reserved	

NSM-DSMs	

•  For an environment of significant size, we can expect that information
on available applications will be organized to shorten search time.	

–  Hence some NSM-DAPs will contain only local information: 	

–  While others will be repositories for aggregate information:	

•  The repositories might be organized by a hierarchy, DHTs, the Dewey
Decimal System, etc.	

–  This implies two kinds of forwarding tables:	

•  Find the next repository, either aggregate or local.	

•  Forward among NSM-DAPs to get to those repositories.	

NSM-DAF (top and
side views)	

DIFs
The Pouzin Society	

© John Day, 2013 6	

Rights Reserved	

NSM-DSMs	

•  Clearly there is a potential scaling problem here, if we are not careful.	

•  For large systems, a management system (either an OS-DMS or NM-
DMS) will be responsible for access control domains.	

–  These DMSs will be authorized to update or modify information
aggregated with a NSM-DMS, will provide the local NSM-DAP, and
participate in creating or joining new DIFs.	

–  Everything else will be a NSM-client only, i.e. can only submit queries.	

•  May not be considered a member of the NSM-DAF or a lesser member.	

•  For small systems, it degenerates into the DAF structure.	

OS or NM-DMS	

 NSM-DMS	

Processing System	

Updates	

Queries
The Pouzin Society	

© John Day, 2013 7	

Rights Reserved	

Discovery of the application	
  
  Forwarding of the request between the peer IDDs until the
destination application is found or the pre-defined
termination condition is met	

host H2	

router R2	

 router R3	

host H1	

web server	

application
B	

web
browser	

application
A	

router R4	

router R1	

host H4	

Layer 6	

router R5	

host H3	

...	

Layer 1	

Layer 3	

Layer 2	

Layer 4	

Layer 5	

IDD DAF	

web server	

application
C	

7
The Pouzin Society	

© John Day, 2013 8	

Rights Reserved	

IDD Information	

•  Naming / synonyms	

•  Neighbor Table	

•  Search Table	

•  Directory	

Search Table	

Application Process 	

Name	

List of Peer IDDs Application 	

Process Names	

Naming Information	

IDD Application Process Name	

synomyms (optional)	

 Neighbor Table	

Peer IDD Application
Process Name	

List of Peers IDDs Application
Process Names	

Directory	

Application Process { Name, Access Control Information } 	

List of supporting DIFs { Name, Access Control Information, supported QoS }	

8
The Pouzin Society	

© John Day, 2013 9	

Rights Reserved	

What does the IDD request look like?	

•  A CDAP Read Request for an IDD-Record	

IDD-Request 	

requested-Application-Process-Naming-Information	

requesting-Application-Process-Access Control Information,	

QoS parameters	

•  The CDAP Read Request can be encapsulated in an A-Unit-Data 	

A-Unit-Data 	

destination’s IDD DAP name	

source’s IDD DAP name	

termination condition (e.g. hop count)	

CDAP-PDU	

9
The Pouzin Society	

© John Day, 2013 10	

Rights Reserved	

How is it forwarded?	

10
CDAP-PDU	

Requested-Application-Process-Naming-Info	

Requesting-Application-Process-Access Control Info	

QoS parameters	

A-Data-Unit	

Destination’s IDD DAP name	

Source’s IDD DAP name	

Termination condition	

CDAP-PDU
The Pouzin Society	

© John Day, 2013 11	

Rights Reserved	

How is it forwarded?	

•  From any DAP to the other you forward A-Data-Units	

•  In the first, the last and all the red DAPs you process the CDAP PDU	

•  Only in the destination IDD DAP (last one) you do a CDAP Read for
an IDD-Record	

NSM-DAPs	

DIFs	

Source	

 Destination
The Pouzin Society	

© John Day, 2013 12	

Rights Reserved	

Discovery of the application	
  
•  Confirmation that the requested application is available in the
destination system and authorization check that the requesting
application has the rights to access it	

host H2	

router R2	

 router R3	

host H1	

web server	

application
B	

web
browser	

application
A	

router R4	

router R1	

host H4	

Layer 6	

router R5	

host H3	

...	

Layer 1	

Layer 3	

Layer 2	

Layer 4	

Layer 5	

IDD DAF	

web server	

application
C	

12
The Pouzin Society	

© John Day, 2013 13	

Rights Reserved	

Creation of the supporting DIF	

  A DIF supporting the communication between the two user
applications has to be found	

  This either involves creating a new DIF from scratch or expanding
(joining) an existing one so that it spans from the source to the
destination system	

host H2	

router R2	

 router R3	

host H1	

web server	

application
B	

web
browser	

application
A	

router R4	

router R1	

host H4	

Layer 6	

router R5	

host H3	

...	

Layer 1	

Layer 3	

Layer 2	

Layer 4	

Layer 5	

IDD DAF	

web server	

application
C	

13
The Pouzin Society	

© John Day, 2013 14	

Rights Reserved	

Implications	

•  There is no application discovery mechanism in the Internet today,
just pointers to where to search next as it happens with DNS 	

•  Applications do not have to be in the same layer to discover each
other, especially not on the same one layer as with IP	

•  Elimination of the need for layers with large address spaces	

–  In other words there’s no need for a global address space 	

•  No need for a single application namespace. Name spaces can be
tailored to environments.	

•  Greater security by having multiple application namespaces and by
better compartmentalization without impairing reachability	

14
The Pouzin Society	

© John Day, 2013 15	

Rights Reserved	

Another Interesting Pattern	

•  Notice that the pattern exhibited by the NSM-DSM of:	

–  Look up among distributed data bases (NSM-repositories) followed by
determining a path (of DIFs).	

•  Has precisely the same structure as the Flow Allocator:	

–  Look up among distributed data bases (Directory) followed by determining a
path of relays (Routing).	

•  The first involves multiple DIFs	

•  The second involves multiple IPC Processes.	

•  There may be another collapse here.
The Pouzin Society	

© John Day, 2013 16	

Rights Reserved	

Questions?

Mais conteúdo relacionado

Semelhante a 5 mngmt idd130115jd

Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Denodo
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationDenodo
 
A sdn based application aware and network provisioning
A sdn based application aware and network provisioningA sdn based application aware and network provisioning
A sdn based application aware and network provisioningStanley Wang
 
Large-Scale System Integration with DDS for SCADA, C2, and Finance
Large-Scale System Integration with DDS for SCADA, C2, and FinanceLarge-Scale System Integration with DDS for SCADA, C2, and Finance
Large-Scale System Integration with DDS for SCADA, C2, and FinanceRick Warren
 
Consequences of dns-based Internet filtering
Consequences of dns-based Internet filteringConsequences of dns-based Internet filtering
Consequences of dns-based Internet filteringAfnic
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network conceptsDuressa Teshome
 
Traffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield SystemsTraffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield SystemsMyNOG
 
Wed roman tut_open_datapub
Wed roman tut_open_datapubWed roman tut_open_datapub
Wed roman tut_open_datapubeswcsummerschool
 
Greenplum for Internet Scale Analytics and Mining - Greenplum Summit 2018
Greenplum for Internet Scale Analytics and Mining - Greenplum Summit 2018Greenplum for Internet Scale Analytics and Mining - Greenplum Summit 2018
Greenplum for Internet Scale Analytics and Mining - Greenplum Summit 2018VMware Tanzu
 
Lesson 1: Introduction to DBMS
Lesson 1: Introduction to DBMSLesson 1: Introduction to DBMS
Lesson 1: Introduction to DBMSAmrit Kaur
 

Semelhante a 5 mngmt idd130115jd (20)

Coolie @ call
Coolie @ callCoolie @ call
Coolie @ call
 
Distributed dbms (ddbms)
Distributed dbms (ddbms)Distributed dbms (ddbms)
Distributed dbms (ddbms)
 
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data Virtualization
 
A sdn based application aware and network provisioning
A sdn based application aware and network provisioningA sdn based application aware and network provisioning
A sdn based application aware and network provisioning
 
Large-Scale System Integration with DDS for SCADA, C2, and Finance
Large-Scale System Integration with DDS for SCADA, C2, and FinanceLarge-Scale System Integration with DDS for SCADA, C2, and Finance
Large-Scale System Integration with DDS for SCADA, C2, and Finance
 
Consequences of dns-based Internet filtering
Consequences of dns-based Internet filteringConsequences of dns-based Internet filtering
Consequences of dns-based Internet filtering
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
DB_Lec_1 and 2.pptx
DB_Lec_1 and 2.pptxDB_Lec_1 and 2.pptx
DB_Lec_1 and 2.pptx
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
 
Hadoop introduction
Hadoop introductionHadoop introduction
Hadoop introduction
 
Aioug big data and hadoop
Aioug  big data and hadoopAioug  big data and hadoop
Aioug big data and hadoop
 
Big Data and Hadoop
Big Data and HadoopBig Data and Hadoop
Big Data and Hadoop
 
Traffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield SystemsTraffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield Systems
 
Wed roman tut_open_datapub
Wed roman tut_open_datapubWed roman tut_open_datapub
Wed roman tut_open_datapub
 
Greenplum for Internet Scale Analytics and Mining - Greenplum Summit 2018
Greenplum for Internet Scale Analytics and Mining - Greenplum Summit 2018Greenplum for Internet Scale Analytics and Mining - Greenplum Summit 2018
Greenplum for Internet Scale Analytics and Mining - Greenplum Summit 2018
 
Best Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDSBest Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDS
 
DDS Enabling Open Architecture
DDS Enabling Open ArchitectureDDS Enabling Open Architecture
DDS Enabling Open Architecture
 
Lesson 1: Introduction to DBMS
Lesson 1: Introduction to DBMSLesson 1: Introduction to DBMS
Lesson 1: Introduction to DBMS
 

Mais de ARCFIRE ICT

Multi-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
Multi-operator "IPC" VPN Slices: Applying RINA to Overlay NetworkingMulti-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
Multi-operator "IPC" VPN Slices: Applying RINA to Overlay NetworkingARCFIRE ICT
 
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...ARCFIRE ICT
 
Large-scale Experimentation with Network Abstraction for Network Configuratio...
Large-scale Experimentation with Network Abstraction for Network Configuratio...Large-scale Experimentation with Network Abstraction for Network Configuratio...
Large-scale Experimentation with Network Abstraction for Network Configuratio...ARCFIRE ICT
 
Design Considerations for RINA Congestion Control over WiFi Links
Design Considerations for RINA Congestion Control over WiFi LinksDesign Considerations for RINA Congestion Control over WiFi Links
Design Considerations for RINA Congestion Control over WiFi LinksARCFIRE ICT
 
One of the Ways How to Make RIB Distributed
One of the Ways How to Make RIB DistributedOne of the Ways How to Make RIB Distributed
One of the Ways How to Make RIB DistributedARCFIRE ICT
 
Unifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA modelUnifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA modelARCFIRE ICT
 
First Contact: Can Switching to RINA save the Internet?
First Contact: Can Switching to RINA save the Internet?First Contact: Can Switching to RINA save the Internet?
First Contact: Can Switching to RINA save the Internet?ARCFIRE ICT
 
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...ARCFIRE ICT
 
Pristine rina-tnc-2016
Pristine rina-tnc-2016Pristine rina-tnc-2016
Pristine rina-tnc-2016ARCFIRE ICT
 
Distributed mobility management and application discovery
Distributed mobility management and application discoveryDistributed mobility management and application discovery
Distributed mobility management and application discoveryARCFIRE ICT
 
Mobility mangement rina iwcnc
Mobility mangement rina   iwcncMobility mangement rina   iwcnc
Mobility mangement rina iwcncARCFIRE ICT
 
6 security130123
6 security1301236 security130123
6 security130123ARCFIRE ICT
 
4 addressing theory130115
4 addressing theory1301154 addressing theory130115
4 addressing theory130115ARCFIRE ICT
 
3 addressingthe problem130123
3 addressingthe problem1301233 addressingthe problem130123
3 addressingthe problem130123ARCFIRE ICT
 
2 introto rina-e130123
2 introto rina-e1301232 introto rina-e130123
2 introto rina-e130123ARCFIRE ICT
 
1 lost layer130123
1 lost layer1301231 lost layer130123
1 lost layer130123ARCFIRE ICT
 
Rumba CNERT presentation
Rumba CNERT presentationRumba CNERT presentation
Rumba CNERT presentationARCFIRE ICT
 
5. Rumba presentation
5. Rumba presentation5. Rumba presentation
5. Rumba presentationARCFIRE ICT
 
4. Clearwater on rina
4. Clearwater on rina4. Clearwater on rina
4. Clearwater on rinaARCFIRE ICT
 

Mais de ARCFIRE ICT (20)

Multi-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
Multi-operator "IPC" VPN Slices: Applying RINA to Overlay NetworkingMulti-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
Multi-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
 
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
 
Large-scale Experimentation with Network Abstraction for Network Configuratio...
Large-scale Experimentation with Network Abstraction for Network Configuratio...Large-scale Experimentation with Network Abstraction for Network Configuratio...
Large-scale Experimentation with Network Abstraction for Network Configuratio...
 
Design Considerations for RINA Congestion Control over WiFi Links
Design Considerations for RINA Congestion Control over WiFi LinksDesign Considerations for RINA Congestion Control over WiFi Links
Design Considerations for RINA Congestion Control over WiFi Links
 
One of the Ways How to Make RIB Distributed
One of the Ways How to Make RIB DistributedOne of the Ways How to Make RIB Distributed
One of the Ways How to Make RIB Distributed
 
Unifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA modelUnifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA model
 
First Contact: Can Switching to RINA save the Internet?
First Contact: Can Switching to RINA save the Internet?First Contact: Can Switching to RINA save the Internet?
First Contact: Can Switching to RINA save the Internet?
 
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
 
Exp3mq
Exp3mqExp3mq
Exp3mq
 
Pristine rina-tnc-2016
Pristine rina-tnc-2016Pristine rina-tnc-2016
Pristine rina-tnc-2016
 
Distributed mobility management and application discovery
Distributed mobility management and application discoveryDistributed mobility management and application discovery
Distributed mobility management and application discovery
 
Mobility mangement rina iwcnc
Mobility mangement rina   iwcncMobility mangement rina   iwcnc
Mobility mangement rina iwcnc
 
6 security130123
6 security1301236 security130123
6 security130123
 
4 addressing theory130115
4 addressing theory1301154 addressing theory130115
4 addressing theory130115
 
3 addressingthe problem130123
3 addressingthe problem1301233 addressingthe problem130123
3 addressingthe problem130123
 
2 introto rina-e130123
2 introto rina-e1301232 introto rina-e130123
2 introto rina-e130123
 
1 lost layer130123
1 lost layer1301231 lost layer130123
1 lost layer130123
 
Rumba CNERT presentation
Rumba CNERT presentationRumba CNERT presentation
Rumba CNERT presentation
 
5. Rumba presentation
5. Rumba presentation5. Rumba presentation
5. Rumba presentation
 
4. Clearwater on rina
4. Clearwater on rina4. Clearwater on rina
4. Clearwater on rina
 

Último

Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 

Último (20)

Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 

5 mngmt idd130115jd

  • 1. The Pouzin Society © John Day, 2013 1 Rights Reserved DAFs and Management in RINA IRATI Workshop Barcelona, Spain John Day and Eleni Trouva
  • 2. The Pouzin Society © John Day, 2013 2 Rights Reserved Name Space Management DMSs
  • 3. The Pouzin Society © John Day, 2013 3 Rights Reserved Name Space Management (NSM) •  The IPC Model posits a function that allows the Application Name Space to have a greater scope than any one DIF. –  Which we have called the Inter-DIF Directory (for lack of a better term) –  Entity associated with the IPC Management in DAPs may query what applications are available in a system. –  This forms a graph where the nodes are NSM-DAPs and the arcs are DIFs DIFs NSM-DAPs
  • 4. The Pouzin Society © John Day, 2013 4 Rights Reserved NSM-DSMs •  Considering this a Name Space Management DMS reveals the functions: –  Authenticate applications that are allowed to query the NSM-DMS –  Authenticate and authorize entities that are allowed to update or modify the NSM-DMS. –  Implement the policies for updating and replicating data to meet load and reliability requirements, including creating forwarding tables. –  Check credentials of a request to determine requestor has access to the requested DAF and if so, return a list of DIFs and supporting DIFs. –  Manage the name space, determine who gets assigned what. –  Manage the creation of a common DIF between the requesting and requested DAPs.
  • 5. The Pouzin Society © John Day, 2013 5 Rights Reserved NSM-DSMs •  For an environment of significant size, we can expect that information on available applications will be organized to shorten search time. –  Hence some NSM-DAPs will contain only local information: –  While others will be repositories for aggregate information: •  The repositories might be organized by a hierarchy, DHTs, the Dewey Decimal System, etc. –  This implies two kinds of forwarding tables: •  Find the next repository, either aggregate or local. •  Forward among NSM-DAPs to get to those repositories. NSM-DAF (top and side views) DIFs
  • 6. The Pouzin Society © John Day, 2013 6 Rights Reserved NSM-DSMs •  Clearly there is a potential scaling problem here, if we are not careful. •  For large systems, a management system (either an OS-DMS or NM- DMS) will be responsible for access control domains. –  These DMSs will be authorized to update or modify information aggregated with a NSM-DMS, will provide the local NSM-DAP, and participate in creating or joining new DIFs. –  Everything else will be a NSM-client only, i.e. can only submit queries. •  May not be considered a member of the NSM-DAF or a lesser member. •  For small systems, it degenerates into the DAF structure. OS or NM-DMS NSM-DMS Processing System Updates Queries
  • 7. The Pouzin Society © John Day, 2013 7 Rights Reserved Discovery of the application     Forwarding of the request between the peer IDDs until the destination application is found or the pre-defined termination condition is met host H2 router R2 router R3 host H1 web server application B web browser application A router R4 router R1 host H4 Layer 6 router R5 host H3 ... Layer 1 Layer 3 Layer 2 Layer 4 Layer 5 IDD DAF web server application C 7
  • 8. The Pouzin Society © John Day, 2013 8 Rights Reserved IDD Information •  Naming / synonyms •  Neighbor Table •  Search Table •  Directory Search Table Application Process Name List of Peer IDDs Application Process Names Naming Information IDD Application Process Name synomyms (optional) Neighbor Table Peer IDD Application Process Name List of Peers IDDs Application Process Names Directory Application Process { Name, Access Control Information } List of supporting DIFs { Name, Access Control Information, supported QoS } 8
  • 9. The Pouzin Society © John Day, 2013 9 Rights Reserved What does the IDD request look like? •  A CDAP Read Request for an IDD-Record IDD-Request requested-Application-Process-Naming-Information requesting-Application-Process-Access Control Information, QoS parameters •  The CDAP Read Request can be encapsulated in an A-Unit-Data A-Unit-Data destination’s IDD DAP name source’s IDD DAP name termination condition (e.g. hop count) CDAP-PDU 9
  • 10. The Pouzin Society © John Day, 2013 10 Rights Reserved How is it forwarded? 10 CDAP-PDU Requested-Application-Process-Naming-Info Requesting-Application-Process-Access Control Info QoS parameters A-Data-Unit Destination’s IDD DAP name Source’s IDD DAP name Termination condition CDAP-PDU
  • 11. The Pouzin Society © John Day, 2013 11 Rights Reserved How is it forwarded? •  From any DAP to the other you forward A-Data-Units •  In the first, the last and all the red DAPs you process the CDAP PDU •  Only in the destination IDD DAP (last one) you do a CDAP Read for an IDD-Record NSM-DAPs DIFs Source Destination
  • 12. The Pouzin Society © John Day, 2013 12 Rights Reserved Discovery of the application   •  Confirmation that the requested application is available in the destination system and authorization check that the requesting application has the rights to access it host H2 router R2 router R3 host H1 web server application B web browser application A router R4 router R1 host H4 Layer 6 router R5 host H3 ... Layer 1 Layer 3 Layer 2 Layer 4 Layer 5 IDD DAF web server application C 12
  • 13. The Pouzin Society © John Day, 2013 13 Rights Reserved Creation of the supporting DIF   A DIF supporting the communication between the two user applications has to be found   This either involves creating a new DIF from scratch or expanding (joining) an existing one so that it spans from the source to the destination system host H2 router R2 router R3 host H1 web server application B web browser application A router R4 router R1 host H4 Layer 6 router R5 host H3 ... Layer 1 Layer 3 Layer 2 Layer 4 Layer 5 IDD DAF web server application C 13
  • 14. The Pouzin Society © John Day, 2013 14 Rights Reserved Implications •  There is no application discovery mechanism in the Internet today, just pointers to where to search next as it happens with DNS •  Applications do not have to be in the same layer to discover each other, especially not on the same one layer as with IP •  Elimination of the need for layers with large address spaces –  In other words there’s no need for a global address space •  No need for a single application namespace. Name spaces can be tailored to environments. •  Greater security by having multiple application namespaces and by better compartmentalization without impairing reachability 14
  • 15. The Pouzin Society © John Day, 2013 15 Rights Reserved Another Interesting Pattern •  Notice that the pattern exhibited by the NSM-DSM of: –  Look up among distributed data bases (NSM-repositories) followed by determining a path (of DIFs). •  Has precisely the same structure as the Flow Allocator: –  Look up among distributed data bases (Directory) followed by determining a path of relays (Routing). •  The first involves multiple DIFs •  The second involves multiple IPC Processes. •  There may be another collapse here.
  • 16. The Pouzin Society © John Day, 2013 16 Rights Reserved Questions?