1 / 9

Enhancing Network Services Through Persistent Identification and Mobility Principles

This document explores the principles outlined in TNA Mobility II by Henry N. Jerez, focusing on persistent identification of network components, services, and users. It involves a detailed analysis of functionality abstraction using GHOST components and service host providers. The paper discusses the evolution of identification tools at the kernel level, ongoing resolution services, and the implementation of new infrastructure for effective service routing and conformation. The results from prototype testing demonstrate significant advancements in network mobility and resource optimization.

swain
Télécharger la présentation

Enhancing Network Services Through Persistent Identification and Mobility Principles

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TNA Mobility II By Henry N Jerez

  2. TNA Principles • Persistent Identification of all: • Network Components • Services • Users • Functionality Abstraction • Generic Host components: GHOSTs • Service Host providers: Shells • Mobility built into the core via Ad-hoc network conformation and consolidation Principles

  3. TNA Environment

  4. TNA Persistent Identification • Evolution of the Handle System • Currently deployed identification tools: • Deployed at the Kernel Level • Ghost Identifiers,Shell Identifiers, User Identifiers • Service Identifiers (In progress) • Services at the kernel level • PI based routing • PI to MCL, AWDS and IP mapping • Naming translation Service

  5. Persistent Identification PI Efforts • Ongoing Work on Distributed resolution services. • First Application Implementation benefits measured. Very Encouraging Results • PI node revolvers and routers being deployed on I2, NLR and Internet • New seeder node infrastructure under development

  6. Functionality Abstraction • GHOST principles • Functionality abstraction into Business rules and execution engines • Data encapsulation and certification • Service Delegation • Shell Principles • Security Service Abstraction • Built in Services: PI resolution, Naming , DRM, Congestion and Agent Control Interfaces

  7. Functionality Abstraction • SHELL evolution • First Kernel Integrated prototype and communication API modules in place • Ongoing interface , DRM and data encapsulation work • Ghosts • Current GINI based Prototypes • Basic Technology Evolution • Distributed network control prototypes in place • DRM and VOIP (VOPI) applications currently deployed and under test

  8. Ad-hoc network conformation and consolidation • Area of Influence characteristics • Ad- Hoc certified conformation process • Intelligence in the network substrate • Distributed PI resolution • AoI identification and consolidation into Green Networks • Service Association and mobility • Basic Routing principles and Inter network routing

  9. AoI Progress • First conformation protocols formally characterized • Generic network conformation and negotiation protocol guidelines in place • Modeling and optimization under way • Service Distribution under optimization • Advancing towards AoI Mobility

More Related