SlideShare a Scribd company logo
Large scale RINA Experimentation on FIRE +
RINA high-level Overview
RINA Workshop @ Telefonica
TBD
HOW TO CONSTRUCT A BETTER
NETWORK ARCHITECTURE
4
2
So.. What do we want?
β€’ As much invariants as possible in the architecture, so that we can minimize the
number of protocols and maximize their commonality
3
Architecture:
patterns, invariants, building blocks,
methods
Protocols
Today:
β€’ Architecture has too little
patterns/commonality, and they are a bit
broken
β€’ Too many protocols, too little
commonality
Architecture:
patterns, invariants, building blocks,
methods
What we want:
β€’ Architecture provides as much invariants
as possible
β€’ Few protocols, sharing lots of
commonalityProtocols
Application API: IPC services
β€’ Application names are location independent (the network locates the apps); addresses internal to
the network
β€’ Application provides service requirements for their flows (loss, delay, etc.), the network chooses
the right protocols to provide them
4
Host Host
App
A
App
B
App A
IPC API
OS
IPC
1. Register/Unregister App
2. Allocate/Deallocate flows
3. Write data (SDUs) to flows
4. Read data (SDUs) from flows
The network locates the destination application (directory), and configures
protocols for each flow
β€œThe network” provides communication flows
What is the nework?
β€’ Provides IPC services, but what is it? Some hints:
– Executes in computers running operating systems (PCs, laptops, routers, sensors,
smartphones, tables, switches, etc.)
– Has instances distributed through many machines, exchanging information and collaborating
– Just like… the web, Skype, email, etc.
β€’ Therefore the network is just a distributed application specialised to
provide IPC
– We’ll call this application a DIF (Distributed IPC Facility)
5
Host
DIF
Host
App
A
App
B
RouterRouter
Structure: layering (I)
β€’ But a single DIF for all applications and all machines in the world/universe is not
very scalable ...
– We need to isolate scopes (link, network, Internet, VPN, etc.)
β€’ Multiple DIFs, providing IPC services to each other!
– After all a DIF is just a distributed application, right?
6
Host
Border router Interior Router
DIF
DIF DIF
Border router
DIF
DIF
DIF
Host
App
A
App
B
Consistent API
through layers
Layering, a better pattern (II)
β€’ Single type of layer, providing an IPC Service that repeats as many times as
needed by the network designer
β€’ A layer is a resource allocator that provides an manages the IPC service over a
given scope (link, network, Internet, VPN, etc.). A layer allocates resources
(memory in buffers, scheduling capacity, bandwidth) to competing flows.
Host Router Router Border
Router
Router Router HostBorder
Router
Network 2
SNAC
SNDC
SNIC
Application
DIF DIF DIF DIF DIF DIFDIF
DIF DIF
DIF
7
Network 1
Let’s go to our to-do list
β€’ We have improved
– Structure
– Protocol design
– Naming and addressing scheme
– Service model / Application API
– Security
– Network management
β€’ Still work to do, let’s move on!
8
What protocols inside a DIF?
β€’ A DIF is a distributed application, how can we organise its functions?
– Remember: data transfer, data transfer control, layer management
β€’ But we want to limit the variability in protocols to the minimum: apply
separation of mechanism and policy
– Mechanism are the parts in a protocol that are fixed (e.g. an acknowledgement ACK)
– Policy is the part of the protocol that can change (e.g. when to send an ACK is policy)
β€’ Each DIF has different requirements, so we cannot have the same protocols in
all of them, but can we abstract invariances so that we end up with:
– 1 protocol (framework) for data transfer?
– 1 protocol (framework) for layer management?
9
EFCP: Error and Flow Control Protocol
β€’ By separating data transfer protocol elements between mechanism (invariant) and
policy (variant), it is possible to specify a data transfer protocol framework from which
multiple data transfer protocols can be generated by
– Choosing a concrete syntax (length of header fields)
– Plugging in the right policies (for flow control, retx. control, congestion contol)
10
IPC API
Data Transfer Data Transfer Control Layer Management
SDU Delimiting
Data Transfer
Relaying and Multiplexing
SDU Protection
Retransmission Control
Flow Control
RIB Daemon
RIB
CDAP Parser/Generator
CACEP
Enrollment
Flow Allocation
Resource Allocation
Routing
Authentication
StateVector
StateVector
StateVector
Data TransferData Transfer
Retransmission ControlRetransmission Control
Flow Control
Flow Control
Namespace Management Security ManagementEFCP
App A
IPC API
IPC
Process
Unified layer management
11
Resource Information Base (RIB): Schema that defines the external representation of the set of objects that model the state of the
IPCP (object names, attributes, relationships, allowed CDAP operations and their effects)
Common Distributed Application Protocol (CDAP): Application protocol that allows two applications to operate on the objects of
each other’s RIB. Provides 6 operations (create/delete/read/write/start/stop).
RIB Daemon: Entity that processes incoming CDAP messages (delegating RIB operations to layer mgmt tasks) and generates outgoing
CDAP messages from layer management tasks’ requests
Benefits of unified layer management framework
β€’ Only need one common layer management protocol for all layers, which allows
layer management functions to remotely operate on objects (which model the
function’s externally visible state)
β€’ Only need one common distributed memory/database manager for layer
management functions
– With pluggable replication policies (on demand, event-based, periodic, etc..)
β€’ Layer management functions just need to specify an object schema, and the
behaviour when the common protocol operations are invoked on the objects
β€’ This is a huge reduction in network complexity, coming from a world were every
single layer management/control plane function has one or more standalone
protocols, independently designed (ICMP, RSVP, OSPF, RIP, BGP, IS-IS, ARP,
DNS, etc..)
12
Let’s go to our to-do list
β€’ We have improved
– Structure
– Protocol design
– Naming and addressing scheme
– Service model / Application API
– Security
– Network management
β€’ Still work to do, let’s move on!
13
Naming and addressing, mobility, routing
No need for special protocols
14
Name Indicates Property RINA IP
Application name What Location independent Yes No
Node address Where Location dependent, route
independent
Yes No
Point of Attachment How to get there Route dependent Yes Yes (twice: IP,
MAC)
Implications for multi-homing
15
G
A
B
C
E
D
F
H
1
2
6
5
8
3 14
18
17 16
15
19
21
13
20
9
11
10
12
4
7
2
2
G
A
B
C
E
D
F
H
1
2
3
1
2
1
3
4
1
2
3
1
2
3
1 2
3
1
1
2
2
2
β€’ Addressing the node instead of the interface: 3-4x
time routing/forwarding table reduction!
β€’ No need for special protocols to support multi-
homing
Addresses assigned to interfaces (like in IP) Addresses assigned to nodes (like in RINA)
Security: DIFs are securable containers
Secure layers instead of protocols, expose less to apps, scope
16
Allocating a flow to destination
application
Access control
Sending/receiving SDUs
through N-1 DIF
Confidentiality, integrity
N DIF
N-1 DIF
IPC
Process
IPC
Process
IPC
Process
IPC
Process Joining a DIF
authentication, access control
Sending/receiving SDUs
through N-1 DIF
Confidentiality, integrity
Allocating a flow to destination
application
Access control
IPC
Process
Appl.
Process
DIF Operation
Logging/Auditing
DIF Operation
Logging/Auditing
RINA IP protocol suite
Consistent security model, enforced by each layer via pluggable
policies
Each protocol has its own security model/functions (IPsec, TLS,
BGPsec, DNSsec, etc.)
Scope as a native construct: controlled connectivity by default Single scope (global), connectivity to everyone by default. Scope
via ad-hoc means: firewalls, ACLs, VLANs, VPNs, etc.
Complete naming and addressing, separation of synchronization
from port allocation
No application names, addresses exposed to applications, well-
known ports
Network management
Commonality is the key to effective network management
17
β€’ Commonality and consistency in RINA greatly simplifies management models, opening the door
to increased automation in multi-layer networks
– Reduce opex, network downtime, speed-up network service delivery, reduce components that need to
be standardised
From managing a set of layers, each with its own protocols,
concepts and definitions …
… to managing a common, repeating structure of two protocols
and different policies
RINA Introduction
Let’s go to our to-do list
β€’ We have improved
– Structure
– Protocol design
– Naming and addressing scheme
– Service model / Application API
– Security
– Network management
β€’ And made Homer happy!
18
Summing up.. RINA is not a protocol!
19
β€’ Network architecture resulting from a fundamental theory of computer networking
β€’ Networking is InterProcess Communication (IPC) and only IPC. Unifies networking and
distributed computing: the network is a distributed application that provides IPC
β€’ There is a single type of layer with programmable functions, that repeats as many times as
needed by the network designers (DIF!)
β€’ All layers provide the same service: instances or communication (flows) to two or more
application instances, with certain characteristics (delay, loss, in-order-delivery, etc)
β€’ There are only 3 types of systems: hosts, interior and border routers. No middleboxes (firewalls,
NATs, etc) are needed
β€’ Deploy it over, under and next to current networking technologies
1
2
3
4
5
6
AND HOW DO YOU PRETEND TO DEPLOY
THIS STUFF?
5
20
Incremental deployment
β€’ IPv6 brings very small improvements to IPv4, but requires a clean slate
deployment (not compatible to IPv4)
β€’ RINA can be deployed incrementally where it has the right incentives, and
interoperate with current technologies (IP, Ethernet, MPLS, etc.)
– Over IP (just like any overlay such as VXLAN, NVGRE, GTP-U, etc.)
– Below IP (just like any underlay such as MPLS or MAC-in-MAC)
– Next to IP (gateways/protocol translation such as IPv6)
IP Network
RINA Provider
RINA Network
Sockets ApplicationsRINA supported Applications
IP or Ethernet or MPLS, etc
21

More Related Content

PPTX
Intro RINA
PPTX
Arcfire fire forum 2015
PPTX
1. RINA motivation - TF Workshop
PPTX
RINA research results - NGP forum - SDN World Congress 2017
PPTX
Rina sdn-2016 mobility
PPTX
3. RINA use cases, results, benefits
PPTX
4. Clearwater on rina
PPTX
Architectures and buildings
Intro RINA
Arcfire fire forum 2015
1. RINA motivation - TF Workshop
RINA research results - NGP forum - SDN World Congress 2017
Rina sdn-2016 mobility
3. RINA use cases, results, benefits
4. Clearwater on rina
Architectures and buildings

What's hot (20)

PPTX
Rina converged network operator - etsi workshop
PDF
Rina renumbering, EUCNC 2017
PPTX
The hague rina-workshop-mobility-eduard
PPTX
RINA Distributed Mobility Management over WiFi
PDF
Advanced network experiments in FED4FIRE
PPTX
RINA Tutorial at ETSI ISG NGP#3
PDF
Multi-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
PPTX
The hageu rina-workshop-security-peter
PDF
Rumba presentation at FEC2
PPTX
Generic network architecture discussion
PDF
Rina p4 rina workshop
PPT
EU-Taiwan Workshop on 5G Research, PRISTINE introduction
PPTX
RINA detailed components overview and implementation discussion
PPTX
The hague rina-workshop-interop-deployment_vincenzo
PPTX
Update on IRATI technical work after month 6
PPTX
Experimental evaluation of a RINA prototype - GC 2014
PPTX
IRATI @ RINA Workshop 2014, Dublin
PDF
Rlite software-architecture (1)
PPTX
Pristine rina-sdk-icc-2016
PDF
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
Rina converged network operator - etsi workshop
Rina renumbering, EUCNC 2017
The hague rina-workshop-mobility-eduard
RINA Distributed Mobility Management over WiFi
Advanced network experiments in FED4FIRE
RINA Tutorial at ETSI ISG NGP#3
Multi-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
The hageu rina-workshop-security-peter
Rumba presentation at FEC2
Generic network architecture discussion
Rina p4 rina workshop
EU-Taiwan Workshop on 5G Research, PRISTINE introduction
RINA detailed components overview and implementation discussion
The hague rina-workshop-interop-deployment_vincenzo
Update on IRATI technical work after month 6
Experimental evaluation of a RINA prototype - GC 2014
IRATI @ RINA Workshop 2014, Dublin
Rlite software-architecture (1)
Pristine rina-sdk-icc-2016
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
Ad

Similar to 2. RINA overview - TF workshop (20)

PPTX
RINA essentials, PISA Internet Festival 2015
PPTX
Web technologies: recap on TCP-IP
PPTX
The hague rina-workshop-intro-eduard
PPTX
IRATI: an open source RINA implementation for Linux/OS
PPTX
Pristine rina-security-icc-2016
PPT
RINA: Update on research and prototyping activities. Global Future Internet W...
PPTX
Basic Foundation For Cybersecurity
PDF
2016 06-10-ieee-sdn (1)
PPTX
Apache Thrift, a brief introduction
PPTX
Pristine rina-tnc-2016
PPTX
Pristine rina-tnc-2016
PPTX
ITN_Module_17.pptx
DOCX
Network management
PPTX
Presentation on network_protocols
Β 
PPTX
ITNCCNA_NATWORKCOMMUNICATION_Module_17.pptx
PPTX
Irati goals and achievements - 3rd RINA Workshop
PDF
Introduction_to_RoutingThere are many types of routers some of them are discu...
PPTX
L05 _TCP_IP.pptx computer networks TCP IP
PPT
Bhargava Presentation.ppt
PPT
Bhargava Presentation.ppt
RINA essentials, PISA Internet Festival 2015
Web technologies: recap on TCP-IP
The hague rina-workshop-intro-eduard
IRATI: an open source RINA implementation for Linux/OS
Pristine rina-security-icc-2016
RINA: Update on research and prototyping activities. Global Future Internet W...
Basic Foundation For Cybersecurity
2016 06-10-ieee-sdn (1)
Apache Thrift, a brief introduction
Pristine rina-tnc-2016
Pristine rina-tnc-2016
ITN_Module_17.pptx
Network management
Presentation on network_protocols
Β 
ITNCCNA_NATWORKCOMMUNICATION_Module_17.pptx
Irati goals and achievements - 3rd RINA Workshop
Introduction_to_RoutingThere are many types of routers some of them are discu...
L05 _TCP_IP.pptx computer networks TCP IP
Bhargava Presentation.ppt
Bhargava Presentation.ppt
Ad

More from ARCFIRE ICT (19)

PDF
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
PDF
Large-scale Experimentation with Network Abstraction for Network Configuratio...
PDF
Design Considerations for RINA Congestion Control over WiFi Links
PDF
One of the Ways How to Make RIB Distributed
PDF
Unifying WiFi and VLANs with the RINA model
PDF
First Contact: Can Switching to RINA save the Internet?
PDF
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
PPTX
Exp3mq
PPTX
Distributed mobility management and application discovery
PPTX
Mobility mangement rina iwcnc
PDF
6 security130123
PDF
5 mngmt idd130115
PDF
5 mngmt idd130115jd
PDF
4 addressing theory130115
PDF
3 addressingthe problem130123
PDF
2 introto rina-e130123
PDF
1 lost layer130123
PDF
Rumba CNERT presentation
PDF
5. Rumba presentation
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
Large-scale Experimentation with Network Abstraction for Network Configuratio...
Design Considerations for RINA Congestion Control over WiFi Links
One of the Ways How to Make RIB Distributed
Unifying WiFi and VLANs with the RINA model
First Contact: Can Switching to RINA save the Internet?
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
Exp3mq
Distributed mobility management and application discovery
Mobility mangement rina iwcnc
6 security130123
5 mngmt idd130115
5 mngmt idd130115jd
4 addressing theory130115
3 addressingthe problem130123
2 introto rina-e130123
1 lost layer130123
Rumba CNERT presentation
5. Rumba presentation

Recently uploaded (20)

PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
Β 
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
Internet___Basics___Styled_ presentation
PDF
Testing WebRTC applications at scale.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
Digital Literacy And Online Safety on internet
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
DOCX
Unit-3 cyber security network security of internet system
PPTX
Introuction about WHO-FIC in ICD-10.pptx
Sims 4 Historia para lo sims 4 para jugar
SASE Traffic Flow - ZTNA Connector-1.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
international classification of diseases ICD-10 review PPT.pptx
The Internet -By the Numbers, Sri Lanka Edition
Β 
Tenda Login Guide: Access Your Router in 5 Easy Steps
Cloud-Scale Log Monitoring _ Datadog.pdf
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Internet___Basics___Styled_ presentation
Testing WebRTC applications at scale.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
522797556-Unit-2-Temperature-measurement-1-1.pptx
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
An introduction to the IFRS (ISSB) Stndards.pdf
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Digital Literacy And Online Safety on internet
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Unit-3 cyber security network security of internet system
Introuction about WHO-FIC in ICD-10.pptx

2. RINA overview - TF workshop

  • 1. Large scale RINA Experimentation on FIRE + RINA high-level Overview RINA Workshop @ Telefonica TBD
  • 2. HOW TO CONSTRUCT A BETTER NETWORK ARCHITECTURE 4 2
  • 3. So.. What do we want? β€’ As much invariants as possible in the architecture, so that we can minimize the number of protocols and maximize their commonality 3 Architecture: patterns, invariants, building blocks, methods Protocols Today: β€’ Architecture has too little patterns/commonality, and they are a bit broken β€’ Too many protocols, too little commonality Architecture: patterns, invariants, building blocks, methods What we want: β€’ Architecture provides as much invariants as possible β€’ Few protocols, sharing lots of commonalityProtocols
  • 4. Application API: IPC services β€’ Application names are location independent (the network locates the apps); addresses internal to the network β€’ Application provides service requirements for their flows (loss, delay, etc.), the network chooses the right protocols to provide them 4 Host Host App A App B App A IPC API OS IPC 1. Register/Unregister App 2. Allocate/Deallocate flows 3. Write data (SDUs) to flows 4. Read data (SDUs) from flows The network locates the destination application (directory), and configures protocols for each flow β€œThe network” provides communication flows
  • 5. What is the nework? β€’ Provides IPC services, but what is it? Some hints: – Executes in computers running operating systems (PCs, laptops, routers, sensors, smartphones, tables, switches, etc.) – Has instances distributed through many machines, exchanging information and collaborating – Just like… the web, Skype, email, etc. β€’ Therefore the network is just a distributed application specialised to provide IPC – We’ll call this application a DIF (Distributed IPC Facility) 5 Host DIF Host App A App B RouterRouter
  • 6. Structure: layering (I) β€’ But a single DIF for all applications and all machines in the world/universe is not very scalable ... – We need to isolate scopes (link, network, Internet, VPN, etc.) β€’ Multiple DIFs, providing IPC services to each other! – After all a DIF is just a distributed application, right? 6 Host Border router Interior Router DIF DIF DIF Border router DIF DIF DIF Host App A App B Consistent API through layers
  • 7. Layering, a better pattern (II) β€’ Single type of layer, providing an IPC Service that repeats as many times as needed by the network designer β€’ A layer is a resource allocator that provides an manages the IPC service over a given scope (link, network, Internet, VPN, etc.). A layer allocates resources (memory in buffers, scheduling capacity, bandwidth) to competing flows. Host Router Router Border Router Router Router HostBorder Router Network 2 SNAC SNDC SNIC Application DIF DIF DIF DIF DIF DIFDIF DIF DIF DIF 7 Network 1
  • 8. Let’s go to our to-do list β€’ We have improved – Structure – Protocol design – Naming and addressing scheme – Service model / Application API – Security – Network management β€’ Still work to do, let’s move on! 8
  • 9. What protocols inside a DIF? β€’ A DIF is a distributed application, how can we organise its functions? – Remember: data transfer, data transfer control, layer management β€’ But we want to limit the variability in protocols to the minimum: apply separation of mechanism and policy – Mechanism are the parts in a protocol that are fixed (e.g. an acknowledgement ACK) – Policy is the part of the protocol that can change (e.g. when to send an ACK is policy) β€’ Each DIF has different requirements, so we cannot have the same protocols in all of them, but can we abstract invariances so that we end up with: – 1 protocol (framework) for data transfer? – 1 protocol (framework) for layer management? 9
  • 10. EFCP: Error and Flow Control Protocol β€’ By separating data transfer protocol elements between mechanism (invariant) and policy (variant), it is possible to specify a data transfer protocol framework from which multiple data transfer protocols can be generated by – Choosing a concrete syntax (length of header fields) – Plugging in the right policies (for flow control, retx. control, congestion contol) 10 IPC API Data Transfer Data Transfer Control Layer Management SDU Delimiting Data Transfer Relaying and Multiplexing SDU Protection Retransmission Control Flow Control RIB Daemon RIB CDAP Parser/Generator CACEP Enrollment Flow Allocation Resource Allocation Routing Authentication StateVector StateVector StateVector Data TransferData Transfer Retransmission ControlRetransmission Control Flow Control Flow Control Namespace Management Security ManagementEFCP App A IPC API IPC Process
  • 11. Unified layer management 11 Resource Information Base (RIB): Schema that defines the external representation of the set of objects that model the state of the IPCP (object names, attributes, relationships, allowed CDAP operations and their effects) Common Distributed Application Protocol (CDAP): Application protocol that allows two applications to operate on the objects of each other’s RIB. Provides 6 operations (create/delete/read/write/start/stop). RIB Daemon: Entity that processes incoming CDAP messages (delegating RIB operations to layer mgmt tasks) and generates outgoing CDAP messages from layer management tasks’ requests
  • 12. Benefits of unified layer management framework β€’ Only need one common layer management protocol for all layers, which allows layer management functions to remotely operate on objects (which model the function’s externally visible state) β€’ Only need one common distributed memory/database manager for layer management functions – With pluggable replication policies (on demand, event-based, periodic, etc..) β€’ Layer management functions just need to specify an object schema, and the behaviour when the common protocol operations are invoked on the objects β€’ This is a huge reduction in network complexity, coming from a world were every single layer management/control plane function has one or more standalone protocols, independently designed (ICMP, RSVP, OSPF, RIP, BGP, IS-IS, ARP, DNS, etc..) 12
  • 13. Let’s go to our to-do list β€’ We have improved – Structure – Protocol design – Naming and addressing scheme – Service model / Application API – Security – Network management β€’ Still work to do, let’s move on! 13
  • 14. Naming and addressing, mobility, routing No need for special protocols 14 Name Indicates Property RINA IP Application name What Location independent Yes No Node address Where Location dependent, route independent Yes No Point of Attachment How to get there Route dependent Yes Yes (twice: IP, MAC)
  • 15. Implications for multi-homing 15 G A B C E D F H 1 2 6 5 8 3 14 18 17 16 15 19 21 13 20 9 11 10 12 4 7 2 2 G A B C E D F H 1 2 3 1 2 1 3 4 1 2 3 1 2 3 1 2 3 1 1 2 2 2 β€’ Addressing the node instead of the interface: 3-4x time routing/forwarding table reduction! β€’ No need for special protocols to support multi- homing Addresses assigned to interfaces (like in IP) Addresses assigned to nodes (like in RINA)
  • 16. Security: DIFs are securable containers Secure layers instead of protocols, expose less to apps, scope 16 Allocating a flow to destination application Access control Sending/receiving SDUs through N-1 DIF Confidentiality, integrity N DIF N-1 DIF IPC Process IPC Process IPC Process IPC Process Joining a DIF authentication, access control Sending/receiving SDUs through N-1 DIF Confidentiality, integrity Allocating a flow to destination application Access control IPC Process Appl. Process DIF Operation Logging/Auditing DIF Operation Logging/Auditing RINA IP protocol suite Consistent security model, enforced by each layer via pluggable policies Each protocol has its own security model/functions (IPsec, TLS, BGPsec, DNSsec, etc.) Scope as a native construct: controlled connectivity by default Single scope (global), connectivity to everyone by default. Scope via ad-hoc means: firewalls, ACLs, VLANs, VPNs, etc. Complete naming and addressing, separation of synchronization from port allocation No application names, addresses exposed to applications, well- known ports
  • 17. Network management Commonality is the key to effective network management 17 β€’ Commonality and consistency in RINA greatly simplifies management models, opening the door to increased automation in multi-layer networks – Reduce opex, network downtime, speed-up network service delivery, reduce components that need to be standardised From managing a set of layers, each with its own protocols, concepts and definitions … … to managing a common, repeating structure of two protocols and different policies RINA Introduction
  • 18. Let’s go to our to-do list β€’ We have improved – Structure – Protocol design – Naming and addressing scheme – Service model / Application API – Security – Network management β€’ And made Homer happy! 18
  • 19. Summing up.. RINA is not a protocol! 19 β€’ Network architecture resulting from a fundamental theory of computer networking β€’ Networking is InterProcess Communication (IPC) and only IPC. Unifies networking and distributed computing: the network is a distributed application that provides IPC β€’ There is a single type of layer with programmable functions, that repeats as many times as needed by the network designers (DIF!) β€’ All layers provide the same service: instances or communication (flows) to two or more application instances, with certain characteristics (delay, loss, in-order-delivery, etc) β€’ There are only 3 types of systems: hosts, interior and border routers. No middleboxes (firewalls, NATs, etc) are needed β€’ Deploy it over, under and next to current networking technologies 1 2 3 4 5 6
  • 20. AND HOW DO YOU PRETEND TO DEPLOY THIS STUFF? 5 20
  • 21. Incremental deployment β€’ IPv6 brings very small improvements to IPv4, but requires a clean slate deployment (not compatible to IPv4) β€’ RINA can be deployed incrementally where it has the right incentives, and interoperate with current technologies (IP, Ethernet, MPLS, etc.) – Over IP (just like any overlay such as VXLAN, NVGRE, GTP-U, etc.) – Below IP (just like any underlay such as MPLS or MAC-in-MAC) – Next to IP (gateways/protocol translation such as IPv6) IP Network RINA Provider RINA Network Sockets ApplicationsRINA supported Applications IP or Ethernet or MPLS, etc 21

Editor's Notes

  • #9: Number and scope of layers is not decided by architecture but by the network designer: use the best number for each building Invariant structure with respect to the type of network being designed: the repeating building block with a consistent service interface (IPC) helps network designers to bound structural complexity We still face the problem of what is the internal structure of such a generic IPC layer? How many protocols? How do they look like? Are there invariants we can extract to further simplify and streamline the process of network design?
  • #11: Reduce the number of data transfer protocols to a few (maybe 10 or so?), all sharing the same abstract syntax and the same mechanisms Much easier to specify, implement and debug Networks become much easier to understand, manage and troubleshoot -> cheaper to operate and more reliable Innovation becomes much easier -> don’t need to design and implement full-fledged protocols, just new policies E.g. almost all TCP variants are just a little change in the congestion control policy We can share some work done on PRISTINE to understand what it means to specify/develop this data transfer policies
  • #14: Number and scope of layers is not decided by architecture but by the network designer: use the best number for each building Invariant structure with respect to the type of network being designed: the repeating building block with a consistent service interface (IPC) helps network designers to bound structural complexity We still face the problem of what is the internal structure of such a generic IPC layer? How many protocols? How do they look like? Are there invariants we can extract to further simplify and streamline the process of network design?
  • #18: Core/backbone: IP/MPLS Metro aggregation: Carrier Ethernet Access: xDSL, FTTH (PON tech), WiFI, LTE Services: L2/L3 VPNs, Internet access, IMS Micro DC: C-RAN, Mobile Edge computing Metro/regional/national DCs: provider service platforms (DNS, SMTP, etc…) LTE EPC (S-GW and/or P-GW, MME), IMS, cloud hosting, NOC, etc
  • #19: Number and scope of layers is not decided by architecture but by the network designer: use the best number for each building Invariant structure with respect to the type of network being designed: the repeating building block with a consistent service interface (IPC) helps network designers to bound structural complexity We still face the problem of what is the internal structure of such a generic IPC layer? How many protocols? How do they look like? Are there invariants we can extract to further simplify and streamline the process of network design?
  • #22: Core/backbone: IP/MPLS Metro aggregation: Carrier Ethernet Access: xDSL, FTTH (PON tech), WiFI, LTE Services: L2/L3 VPNs, Internet access, IMS Micro DC: C-RAN, Mobile Edge computing Metro/regional/national DCs: provider service platforms (DNS, SMTP, etc…) LTE EPC (S-GW and/or P-GW, MME), IMS, cloud hosting, NOC, etc