1 / 9

TNA Mobility II

TNA Mobility II. By Henry N Jerez. TNA Principles. Persistent Identification of all: Network Components Services Users Functionality Abstraction Generic Host components: GHOSTs Service Host providers: Shells

Download Presentation

TNA Mobility II

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TNA Mobility II By Henry N Jerez

  2. TNA Principles • Persistent Identification of all: • Network Components • Services • Users • Functionality Abstraction • Generic Host components: GHOSTs • Service Host providers: Shells • Mobility built into the core via Ad-hoc network conformation and consolidation Principles

  3. TNA Environment

  4. TNA Persistent Identification • Evolution of the Handle System • Currently deployed identification tools: • Deployed at the Kernel Level • Ghost Identifiers,Shell Identifiers, User Identifiers • Service Identifiers (In progress) • Services at the kernel level • PI based routing • PI to MCL, AWDS and IP mapping • Naming translation Service

  5. Persistent Identification PI Efforts • Ongoing Work on Distributed resolution services. • First Application Implementation benefits measured. Very Encouraging Results • PI node revolvers and routers being deployed on I2, NLR and Internet • New seeder node infrastructure under development

  6. Functionality Abstraction • GHOST principles • Functionality abstraction into Business rules and execution engines • Data encapsulation and certification • Service Delegation • Shell Principles • Security Service Abstraction • Built in Services: PI resolution, Naming , DRM, Congestion and Agent Control Interfaces

  7. Functionality Abstraction • SHELL evolution • First Kernel Integrated prototype and communication API modules in place • Ongoing interface , DRM and data encapsulation work • Ghosts • Current GINI based Prototypes • Basic Technology Evolution • Distributed network control prototypes in place • DRM and VOIP (VOPI) applications currently deployed and under test

  8. Ad-hoc network conformation and consolidation • Area of Influence characteristics • Ad- Hoc certified conformation process • Intelligence in the network substrate • Distributed PI resolution • AoI identification and consolidation into Green Networks • Service Association and mobility • Basic Routing principles and Inter network routing

  9. AoI Progress • First conformation protocols formally characterized • Generic network conformation and negotiation protocol guidelines in place • Modeling and optimization under way • Service Distribution under optimization • Advancing towards AoI Mobility

More Related