Feeds

DARPA collab launches fast cloud-to-cloud provisioning

Yet another elastic cloud

Internet Security Threat Report 2014

A DARPA-driven project based on OpenStack has been demonstrated in the US, with the bold claim that it will eventually lead to sub-second provisioning for connectivity between clouds.

The world is already familiar with the concept of elastic clouds, with Amazon, Google, Microsoft, and World+Dog offering some variant on such themes for customers on their services. Cloud-to-cloud elasticity is another matter, since carriers and their optical networks have to be pulled into the stack.

IBM, AT&T, and Applied Communications Sciences worked together on the project, which IBM describes as a proof of concept demonstrating “a cloud system that monitors and automatically scales the network up or down as applications need”.

The basic signalling is quite simple, Doug Freimuth from IBM Research explains in the post we've linked to above: “It works by the cloud data centre sending a signal to a network controller that describes the bandwidth needs, and which cloud data centre need to connect”.

For that, Freimuth says, the system needs an orchestrator between data centres, akin to the in-data-centre orchestration already pursued by cloud vendors and the open source world alike.

The idea is also to get rid of truck rolls to wind up or down the WAN muscle connecting the clouds, instead assuming that the optical medium has the necessary bandwidth, and all that's really needed is for the carrier's equipment to be able to respond to provisioning requests and pass that change onto billing systems.

According to R&D Magazine, AT&T developed the bandwidth-on-demand networking architecture, while ACS provided its optical-layer routing and signalling technology.

AT&T Labs' Robert Doverspike said the proof-of-concept combined SDN concepts with “advanced, cost-efficient network routing in a realistic carrier network environment”.

“This prototype was implemented on OpenStack, an open-source cloud-computing platform for public and private clouds, elastically provisioning WAN connectivity and placing virtual machines between two clouds for the purpose of load balancing virtual network functions,” R&D Mag continues.

The prototype was developed under DARPA's seven-year-old CORONET program. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.