Future Internet - ANA. INF5090 Thomas Plagemann
|
|
- Timothy Hodge
- 5 years ago
- Views:
Transcription
1 Future Internet - ANA INF5090 Thomas Plagemann
2 Recap why a Future Internet? ANA - Project 2
3 Overview Motivation Blueprint ANA core Monitoring Framework ANA - Project 3
4 Motivation Variability in the Internet is above and below IP: it's the "hourglass" model. Application layer www, , ftp, ssh, DNS, peer-to-peer (emule, BitTorrent) VoIP (Skype), VoD, grid, IP also called the "waist" of the Internet Link layer Ethernet, wifi (802.11), ATM, SONET/SDH, FrameRelay, modem, ADSL, Cable, Changing/updating the Internet core (e.g., IPv6, Multicast, MIP, QoS, ) is difficult or impossible! 4
5 Motivation Solutions adopted so far : Patches to cope with challenges contradict the initial design paradigms Incoherencies patches to the patches Consensus in the research community that a next step beyond the Internet is needed. 5
6 ANA: finding the least common denominator Our contribution: enable & demonstrate autonomic networking. ANA abstractions allow variability at all levels of the architecture: variants to perform a given task, and networks co-exist and (can) compete, open for extensions (evolution) 6
7 Pitfalls in network architecture design Static/rigid standards instead of mechanisms for change management Global address space (requires uniqueness and global coordination) Leaking of and relying on network internal details Built-in address dependency (i.e. address-centric architecture) To avoid running into such pitfalls, we adopt an incremental approach via prototyping cycles Helps revealing faults or black-holes in the architecture design 7
8 You can't "build" an architecture, you have to "grow" it Project is articulated around 2 prototyping cycles. Methodology: design, test/validate, refine Design phase First "Blueprint" (architectural model) First prototyping phase Testing + feedback phase 2nd prototyping phase Final evaluation 2 nd design phase Mature "Blueprint" 8
9 ANA "one-size-fits-all" ANA does not want to propose another "one-size-fits-all network waist". ANA is a meta-architecture to host, interconnect and federate multiple heterogeneous networks Application layer Multiple "network instances" can co-exist. ANA framework Link layer 9
10 Core abstractions ANA abstractions: Compartment. Information Channel (IC). Information Dispatch Point (IDP). Functional Block (FB). More tricks with compartments: "Node compartment". Overlays and compartment inter-stitching. 10
11 ANA Compartment Compartment = wrapper for networks. ANA does not impose how network compartments should work internally: the ANA framework specifies how networks interact. ANA specifies interfaces and interactions with any network compartment Internal operation is not imposed leading to multiple and heterogeneous compartments but generic interaction ANA framework 11
12 Compartments (cont.) A (network) compartment defines how to join and leave a compartment: member registration, trust model, authentication, etc. Each compartment defines a conceptual membership database. Registration: explicit joining and exposing is required ("default-off" model). A= Register( A ) How registration is performed is specific to each compartment. Compartment 12
13 Compartments (cont.) Defines How to reach (communicate with) another member: peer resolution, addressing, routing, etc. Resolution: explicit request before sending ("no sending in the void"). A= A= resolve Request( A ) A Resolution process returns communication entry point a How resolution is performed is specific to each compartment. Compartment a A Compartment 13
14 Compartments (cont.) Compartments can be overlaid, i.e. compartments can use the communication services of other compartments. compartment abstraction serves as the unit for the federation of networks into global-scale communication systems. Has interaction rules with "external world", the compartment boundaries (administrative or technical), peerings with other compartments, etc. 14
15 Compartments (cont.) Compartments decompose communication systems and networks into smaller and easier manageable units. 15
16 What about addresses and names? Addressing and naming are left to compartments. Each compartment is free to use any addressing and naming schemes (or is free to not use addresses, for example in sensor networks). The main advantages are: No need to manage a unique global addressing scheme. No need to impose a unique way to resolve names. ANA is open to future addressing and naming schemes. The main drawbacks are: Back to the CATENET challenges : How to inter-work in such heterogeneous address/name spaces? 16
17 Local labels for handling (global) addresses Target resolution returns a local label = IDP Addresses (if any) and names (if any) limited as input for resolution The IDP maintains the state to reach the destination A= Resolution process returns communication entry point a A a Compartment 17
18 Local labels for handling (global) addresses Applications send data only to IDPs Bound to a flexibe element data is sent to IDP Name/address IC A Startpoints instead of endpoints.. 18
19 Information Channels (ICs) Resolution process returns access to an "information channel" that can be used to reach the target member(s). Various types of information channels. unicast multicast anycast concast 19
20 Core abstractions ANA abstractions: Compartment. Information Channel (IC). Information Dispatch Point (IDP). Functional Block (FB). More tricks with compartments: "Node compartment". Overlays and compartment inter-stitching. 20
21 Functional Blocks (FBs) Code and state that can process data packets. Protocols and algorithms are represented as FBs. FBs implement the Information Channels (abstract entities) Access to FBs is also via information dispatch points (IDPs). FBs can have multiple input and output IDPs. FB internally selects output IDP(s) to which data is sent. FB FB data is sent to IDP which has state to call correct function inside FB 21
22 How ICs, FBs, and IDPs fit together Node compartment Node compartment FB1 IC FB2 a b c 22
23 Modelling nodes as compartments Organize a node's functionalities as (compartment) members: Member database: catalog of available functions. Resolution step to access a given function. Also implements access control. Resolution instantiates functional blocks (FBs). The node compartment hosts/executes FBs and IDPs. Node Compartment App/service p e f a 23
24 Different views for a compartment A network compartment has different views, for different usage. This shows that there is really just one IDP "mapped" in the different views. Node compartment Node compartment Compartment exported view data in IC abstracts communication service provided by the compartment data out structural view imported view IC abstracts service provided by underlying hardware "ANA world" Send to medium (Ethernet, wifi, etc) Listen to medium (Ethernet, wifi, etc) Underlying Hardware 24
25 Implementation ANA Core Applications Legacy apps sockets Adaptation layer MINMEX controller MINMEX Node Compartment Information Dispatch Table ANA Playground + API compartments, learning logic, service checker, IP overlay, monitoring, turf, p2p, AN style Platform abstraction layer (optional) Platform OS 25
26 Basic design Two main components: The MINMEX i.e., the ANA "micro-kernel" Supports core API and inter-brick communications. Implements packet dispatching to IDPs. Implements the Node Compartment. "Bricks" i.e., individual components of the ANA Playground Can be a functional block which offers access to a network compartment. Can also provide processing support (e.g. encryption). 26
27 Basic design The ANA node can be distributed. We do not enforce that all the components of an "ANA Node" run on the same computer. The MINMEX and its bricks can communicate via various IPC types called "gates": Unix/UDP sockets, named pipes, generic netlink. The motivation was that the notion of a "node" was not restricted to being a physical device. 27
28 Basic design Three different API levels. Objective: better understand the level of complexity vs. flexibility we want to reach. API Level 0: maximum flexibility but developer must know all the details for encoding and decoding messages. API Level 1: good flexibility and developer can use functions to encode and decode messages. API Level 2: less flexibility, but function prototypes are very ease to use, code is easy to write. 28
29 Basic design One code, two platforms. The base code compiles as either userspace application or Linux kernel modules Userspace: easy for development and debugging, easy to use, most people can use it. Linux kernel: for best performance, permits to interact with kernel network internals. We also started lately a support for ANA bricks written in the Erlang Programming language 29
30 Basic design One code, two platforms. Bricks can be developed in a "platform-agnostic" way according to a standard template. The API library provides wrapper functions and mechanisms to properly handle function calls (e.g., malloc vs. kmalloc, main vs. init) We also provide "agnostic" libraries for system-specific functions such as threads and timers. Passing arguments to bricks via CLI is also done via a system-agnostic mechanism (à la argc/argv[ ]). 30
31 Available components MINMEX: node compartment, IDT, IDP manipulation, status interface, API libraries. Bricks: Ethernet and IP compartments. vlink sub-system for flexible "cabling" of ANA nodes. Monitoring components: core part, packet capture, measurements (CPU, net load), "ping". Inter-compartment routing with regular expressions. Content centered routing, Field Based routing Functional composition prototype. User side: chat application, various code examples. And many other bricks of project partners Tools QuickRep, timers, threads, Remote IDP Access 31
32 Monitoring - Motivation Blueprint Building blocks: - Measurement FBs - Info. Sharing (MCIS) ANA Core Efficient and user friendly monitoring with ANA properties for all ANA developers 32
33 Goals Extensibility: arbitrary measurement metrics and bricks can be added at any time no a priori knowledge Self-configuration: without manual configuration Self-optimization: optimize its service by adapting to client requirements, available bricks and current context Adjustable accuracy Efficiency Transparency 33
34 Conceptual Model 34
35 Conceptual Model (cont.) Orchestration Dispatcher Metric 1 Metric n Measuring FB1 Measuring FBy 35
36 Conceptual Model (cont.) Client Return results Dispatcher Client request Identify metric Metric 1 Metric n Select Measuring FB Measuring FB1 Measuring FBy 36
37 High-level Task of IMF Client brick forwards a monitoring request to IMF including the following fields: Nonce, Type, Type parameters, Metric, Metric parameter, Non-functional requirements, Reply IDP IMF analyses request: Which bricks can provide data for the specified metrics? If more than one brick which is the most suitable one (depends on context and client requirements) Dispatcher forwards client monitoring request to the selected brick 37
38 Challenge 1 How to achieve extensibility and avoid a priori knowledge? Who knows which metrics can be monitored? Minimal assumption: Each measuring brick developer knows which metrics the brick measures Each measuring brick developer knows the context that is relevant for the brick Each measuring brick developer knows the non-functional properties of the brick New bricks provide the information to IMF and IMF manages it Information Management 38
39 Challenge 2 How to select the best suited measuring brick? Available bricks Brick properties QoS requirements of client Context 39
40 Context & Brick Properties Example: Vivaldi brick: Always: resource consumption = low mobile: accuracy = bad Network type = static: accuracy = medium Ping brick: Always: resource consumption = medium Always: accuracy = good /* Impact on non-functional properties */ 40
41 Context Usage The context defines how the monitoring bricks are performing in the given situation (=context) The monitoring request includes the particular requirements, e.g. prefer high accuracy or low resource usage Example of a simplified monitoring request: Latency: <accuracy, medium or better, medium weight>, <resource consumption, low, high weigh 41
42 Context Usage (cont.) Instantiate the monitoring brick property descriptions and compare which one matches best the monitoring request Example: Monitoring brick properties Vivaldi brick: Always: resource consumption = low mobile: accuracy = bad Network type = static: accuracy = medium Ping brick: Always: resource consumption = medium Always: accuracy = good Monitoring request: Latency: <accuracy, medium or better, medium weight>, <resource consumption, low, high weight> Context : Network type = mobile -> Vivaldi: Resource consumption = low Accuracy = bad Ping: Resource consumption = medium Accuracy = good -> ping matches best 42
43 IMF Building Blocks Client request reply Dispatcher Brick Selection Information Management MCIS Measuring FB Measuring FB Extensible set of Measurement Functional Blocks 43
44 Vocabularies Assumptions: Vocabularies are shared Agreement on a set of vocabulary specification trees (VSTs) Vocabularies are extensible New subconcepts can be added in time Information sharing Each brick in general knows a subtree (a pruned version) of each VST The IMF knows the VSTs composed of the bricks subtrees 44
45 Shared Vocabularies BrickVST Brick types New bricks announce where they fit in the BrickVST MetricsVST Metrics New bricks announce their metrics and where it fits in the MetricsVST ContextVST Context types and corresponding values QoSVST QoS parameters and corresponding values New bricks announce their QoS profile QoSRequirementsVST 45
46 Example: Brick VST Brick Type Ping Network Monitoring Brick Monitoring Brick VC Context Brick Brick Selection Brick In BrickVST brick names like Ping and VC are probably not part of the shared vocabulary but are decided by the brick providers 46
47 Example: MetricsVST Metric Type Network Performance Metrics throughput latency jitter bandwidth Both metric types and metric names are part of the shared vocabulary 47
48 Example: ContextVST Context types and possible values Context Type Network Context Resource Context Node Type Context mobile static CPU Context Battery Context nodea nodeb cpu1 cpu2 batteryx batteryy 48
49 Example: QoSVST QoS Parameter accuracy resource consumption bad medium good low medium high QoS parameter names and corresponding possible values 49
50 Example: Metrics of Context Bricks corresponding metrics name Metric Type Context Type Context Metrics Network Context Node Type Context Network Context Node Type Context mobile static CPU Context Resource Context Battery Context nodea batteryy nodeb network context CPU Context Resource Context Battery Context node type context cpu1 cpu2 batteryx cpu context battery context 50
51 Information Model Brick brick type brick name metric type metric name QoS Profile brick type brick name QoS parameter context type context value QoS property 51
52 Summary ANA blueprint: IDPs ICs Compartments FBs and bricks Polymorphic Internet ANA core Monitoring Framework & semantics 52
Contents Outline Why do we need a new networking paradigm The drawbacks of the IP hourglass model The self-x attributes Example of network view
Contents Advanced Topics in Distributed Systems Dr. Andreas Mauthe, andreas@comp.lancs.ac.uk INF5090 Autonomic Networking University of Oslo 25 th March 2007 Outline Motivation Why do we need a new networking
More information2/14/2011. Three Internet Anniversaries in 2009? Outline. Acknowledgement. 20 years World-Wide Web. 30 years Usenet
Three Internet Anniversaries in 2009? 20 years World-Wide Web 30 years Usenet The Future Internet Motivation, Bachground, and Basics 40 years ARPANET Thomas Plagemann University of Oslo, Department of
More information2/21/2012. Three Internet Anniversaries in 2009? Acknowledgement. Outline. Motivation (cont.) Motivation. 20 years World-Wide Web.
Three Internet Anniversaries in 2009? 20 years World-Wide Web 30 years Usenet The Future Internet Motivation, Bachground, and Basics 40 years ARPANET Thomas Plagemann University of Oslo, Department of
More information416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018
416 Distributed Systems Networks review; Day 1 of 2 Jan 5 + 8, 2018 1 Distributed Systems vs. Networks Low level (c/go) Run forever Support others Adversarial environment Distributed & concurrent Resources
More informationPage 1. Goals for Today" What Is A Protocol?" CS162 Operating Systems and Systems Programming Lecture 10. Protocols, Layering and e2e Argument"
Goals for Today" CS162 Operating Systems and Systems Programming Lecture 10 Protocols, Layering and e2e Argument" What is a protocol?! Layering! End-to-end arguments!! October 3, 2011! Anthony D. Joseph
More informationLecture 3 Protocol Stacks and Layering
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
More informationDistributed Systems Principles and Paradigms. Chapter 01: Introduction
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Introduction Version: October 25, 2009 2 / 26 Contents Chapter
More informationDistributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Version: February 21, 2011 1 / 26 Contents Chapter 01: 02: Architectures
More informationA Polymorphic Network Architecture based on Autonomous Domains DIANA. Domain-Insulated Autonomous Network Architecture
A Polymorphic Network Architecture based on Autonomous Domains DIANA Domain-Insulated Autonomous Network Architecture Target of the Work Overall Views Building Blocks Frameworks Components Interactions
More informationInternet Design: Big Picture
Internet Design: Big Picture Internet architectural, design and implementation principles not scriptures, but guidelines understand pros and cons, trade-offs involves Original Internet Design Goals what
More informationWhy do we really want an ID/locator split anyway?
Why do we really want an ID/locator split anyway? Dave Thaler dthaler@microsoft.com MobiArch 2008 1 Starting from basics Users deal with names, not addresses (esp. in IPv6) Humans need friendly identifiers
More information416 Distributed Systems. Networks review; Day 2 of 2 And start of RPC Jan 13, 2016
416 Distributed Systems Networks review; Day 2 of 2 And start of RPC Jan 13, 2016 1 Last Time Modularity, Layering, and Decomposition Example: UDP layered on top of IP to provide application demux ( ports
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is
More informationCA464 Distributed Programming
1 / 25 CA464 Distributed Programming Lecturer: Martin Crane Office: L2.51 Phone: 8974 Email: martin.crane@computing.dcu.ie WWW: http://www.computing.dcu.ie/ mcrane Course Page: "/CA464NewUpdate Textbook
More informationArchitectural Styles. Software Architecture Lecture 5. Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved.
Architectural Styles Software Architecture Lecture 5 Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. Object-Oriented Style Components are objects Data and associated
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationDistributed Systems Principles and Paradigms
Distributed Systems Principles and Paradigms Chapter 01 (version September 5, 2007) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationThe ANA Project Development of the ANA-Core Software
Institut für Technische Informatik und Kommunikationsnetze Masters Thesis The ANA Project Development of the ANA-Core Software September 21, 2007 Ariane Keller Supervisor: Prof. Dr. B. Plattner Advisor:
More informationPart I: Future Internet Foundations: Architectural Issues
Part I: Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues 3 Introduction The Internet has evolved from a slow, person-to-machine, communication
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is
More informationThe Future Internet Motivation, Background, and Basics
The Future Internet Motivation, Background, and Basics Thomas Plagemann University of Oslo, Department of Informatics To create the future, we must understand the past Tim Kastelle October 2, 2015 2 1
More informationExploring Alternative Routes Using Multipath TCP
Exploring Alternative Routes Using Multipath TCP 1/51 Exploring Alternative Routes Using Multipath TCP Stephen Brennan Case Western Reserve University June 5, 2017 Exploring Alternative Routes Using Multipath
More information1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.
Lecture Slides 1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Additional Topics 1.1. Basic Operations
More information416 Distributed Systems. Networks review; Day 2 of 2 Fate sharing, e2e principle And start of RPC Jan 10, 2018
416 Distributed Systems Networks review; Day 2 of 2 Fate sharing, e2e principle And start of RPC Jan 10, 2018 1 Last Time Modularity, Layering, and Decomposition Example: UDP layered on top of IP to provide
More informationRemote Procedure Calls
CS 5450 Remote Procedure Calls Vitaly Shmatikov Abstractions Abstractions for communication TCP masks some of the pain of communicating over unreliable IP Abstractions for computation Goal: programming
More informationCS 640: Introduction to Computer Networks. Today s Lecture. Page 1
CS 640: Introduction to Computer Networks Aditya Akella Lecture 2 Layering, Protocol Stacks, and Standards 1 Today s Lecture Layers and Protocols A bit about s 2 Network Communication: Lots of Functions
More informationMemory Management Strategies for Data Serving with RDMA
Memory Management Strategies for Data Serving with RDMA Dennis Dalessandro and Pete Wyckoff (presenting) Ohio Supercomputer Center {dennis,pw}@osc.edu HotI'07 23 August 2007 Motivation Increasing demands
More informationSoftware Architecture
Software Architecture Does software architecture global design?, architect designer? Overview What is it, why bother? Architecture Design Viewpoints and view models Architectural styles Architecture asssessment
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationDescribing the architecture: Creating and Using Architectural Description Languages (ADLs): What are the attributes and R-forms?
Describing the architecture: Creating and Using Architectural Description Languages (ADLs): What are the attributes and R-forms? CIS 8690 Enterprise Architectures Duane Truex, 2013 Cognitive Map of 8090
More informationKernel Internals. Course Duration: 5 days. Pre-Requisites : Course Objective: Course Outline
Course Duration: 5 days Pre-Requisites : Good C programming skills. Required knowledge Linux as a User Course Objective: To get Kernel and User Space of Linux and related programming Linux Advance Programming
More informationVirtualization of networks
Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960
More informationGlobal Data Plane. The Cloud is not enough: Saving IoT from the Cloud & Toward a Global Data Infrastructure PRESENTED BY MEGHNA BAIJAL
Global Data Plane The Cloud is not enough: Saving IoT from the Cloud & Toward a Global Data Infrastructure PRESENTED BY MEGHNA BAIJAL Why is the Cloud Not Enough? Currently, peripherals communicate directly
More informationTheory of Network Communication
Theory of Network Communication Dr. Christian Scheideler Johns Hopkins University, Sept. 8 2004 1 Introduction The goal of this lecture is to give an introduction to the state of the art in the theory
More informationAnnouncements Computer Networking. What is the Objective of the Internet? Today s Lecture
Announcements 15-441 15-441 Computer ing 15-641 Lecture 2 Protocol Stacks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Sign up for piazza: https://piazza.com/cmu/fall2016/15441641 P1 will
More informationDistributed Systems Multicast & Group Communication Services
Distributed Systems 600.437 Multicast & Group Communication Services Department of Computer Science The Johns Hopkins University 1 Multicast & Group Communication Services Lecture 3 Guide to Reliable Distributed
More informationLecture 2: Internet Architecture
CS 3700 Networks and Distributed Systems Lecture 2: Internet Architecture Revised 1/6/14 Organizing Network Functionality 2 Organizing Network Functionality 2 Networks are built from many components! Networking
More informationCOMS Introduction to Computers. Networking
COMS 1001 Introduction to Computers Networking What's Ahead Networking layers Network Speeds Protocols, sockets, client/server Routing, DNS, Ethernet, LANs, wireless What is a Network? Loose definition:
More informationData Model Considerations for Radar Systems
WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,
More informationKernel Korner AEM: A Scalable and Native Event Mechanism for Linux
Kernel Korner AEM: A Scalable and Native Event Mechanism for Linux Give your application the ability to register callbacks with the kernel. by Frédéric Rossi In a previous article [ An Event Mechanism
More informationModule objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols
Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer
More informationNamed Data Networking (NDN) CLASS WEB SITE: NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing
CLASS WEB SITE: http://upmcsms.weebly.com/ Updated with Lecture Notes Named Data Networking (NDN) Introduction to NDN Named Data Networking (NDN) IP NDN Host-centric addressing Data-centric addressing
More informationExtensible Kernel Security through the TrustedBSD MAC Framework
03/13/2004 Extensible Kernel Security through the TrustedBSD MAC Framework Robert Watson, Research Scientist HIP Group, 03/13/2004 Page 2 Introduction Rationale for Security Extensions TrustedBSD MAC Framework
More informationCS 428/528 Computer Networks Lecture 01. Yan Wang
1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed
More informationOS Extensibility: SPIN and Exokernels. Robert Grimm New York University
OS Extensibility: SPIN and Exokernels Robert Grimm New York University The Three Questions What is the problem? What is new or different? What are the contributions and limitations? OS Abstraction Barrier
More informationMultimedia Networking
Multimedia Networking Victor Gau Information Processing Lab. 2008/03/07 Outline Introduction Network Basics Quality of Service Applications VoIP IPTV Telematics Multimedia Multimedia (Lat. Multum + Medium)
More informationA unified multicore programming model
A unified multicore programming model Simplifying multicore migration By Sven Brehmer Abstract There are a number of different multicore architectures and programming models available, making it challenging
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationMobile Network Architecture & Protocols WINLAB IAB Meeting October 29-30, 2001
Mobile Network Architecture & Protocols WINLAB IAB Meeting October 29-30, 2001 I. Seskar, D. Raychaudhuri MobNets: Introduction This project aims to explore the fundamentals of nextgeneration mobile network
More informationRemote Health Monitoring for an Embedded System
July 20, 2012 Remote Health Monitoring for an Embedded System Authors: Puneet Gupta, Kundan Kumar, Vishnu H Prasad 1/22/2014 2 Outline Background Background & Scope Requirements Key Challenges Introduction
More informationTitle. EMANE Developer Training 0.7.1
Title EMANE Developer Training 0.7.1 1 Extendable Mobile Ad-hoc Emulator Supports emulation of simple as well as complex network architectures Supports emulation of multichannel gateways Supports model
More informationUsing Industry Standards to Exploit the Advantages and Resolve the Challenges of Multicore Technology
Using Industry Standards to Exploit the Advantages and Resolve the Challenges of Multicore Technology September 19, 2007 Markus Levy, EEMBC and Multicore Association Enabling the Multicore Ecosystem Multicore
More informationCS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.
CS 268: Internet Architecture & E2E Arguments Scott Shenker and Ion Stoica (Fall, 2010) 1 Today s Agenda Design goals Layering (review) End-to-end arguments (review) 2 1 Internet Design Goals Goals 0 Connect
More informationCommunication Networks
Communication Networks A Concise Introduction Jean Walrand University of California, Berkeley Shyam Parekh Bell Labs, Alcatel-Lucent SYNTHESIS LECTURES ON COMMUNICATIONNETWORKS #4 vii entsi * s? m :W.
More informationIP Multicast. Overview. Casts. Tarik Čičić University of Oslo December 2001
IP Multicast Tarik Čičić University of Oslo December 00 Overview One-to-many communication, why and how Algorithmic approach (IP) multicast protocols: host-router intra-domain (router-router) inter-domain
More informationChapter 1 Introduction
Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationMulticast Communications. Tarik Čičić, 4. March. 2016
Multicast Communications Tarik Čičić, 4. March. 06 Overview One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic concepts in multicast
More informationDistributed Systems Question Bank UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems?
UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems? 2. What are different application domains of distributed systems? Explain. 3. Discuss the different
More informationJXTA TM Technology for XML Messaging
JXTA TM Technology for XML Messaging OASIS Symposium New Orleans, LA 27-April-2004 Richard Manning Senior Software Architect Advanced Technology & Edge Computing Center Sun Microsystems Inc. www.jxta.org
More informationIntroduction to Networks
Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationComputer Networking. Introduction. Quintin jean-noël Grenoble university
Computer Networking Introduction Quintin jean-noël Jean-noel.quintin@imag.fr Grenoble university Based on the presentation of Duda http://duda.imag.fr 1 Course organization Introduction Network and architecture
More informationCommunication Paradigms
Communication Paradigms Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Interprocess Communication Direct Communication: Sockets Indirect Communication: IP Multicast 2. High Level Communication
More informationLecture 8: February 19
CMPSCI 677 Operating Systems Spring 2013 Lecture 8: February 19 Lecturer: Prashant Shenoy Scribe: Siddharth Gupta 8.1 Server Architecture Design of the server architecture is important for efficient and
More informationProtocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017
CSC 401 Data and Computer Communications Networks Protocol Layers, Security Sec:1.5-1.6 Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017 Outline Computer Networks and the Internet (Ch 1) 1.1
More informationEC EMBEDDED AND REAL TIME SYSTEMS
EC6703 - EMBEDDED AND REAL TIME SYSTEMS Unit I -I INTRODUCTION TO EMBEDDED COMPUTING Part-A (2 Marks) 1. What is an embedded system? An embedded system employs a combination of hardware & software (a computational
More informationInternet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!
Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams
More informationProject Zygote. Rapid prototyping for the Internet of Things
Project Zygote Rapid prototyping for the Internet of Things The Problem we set out to solve How to make interconnecting things easier? What IoT means to us Seamless interconnection between any IoT enabled
More informationWorking with Contracts
Contracts, page 1 Filters, page 9 Taboo Contracts, page 12 Inter-Tenant Contracts, page 15 Contracts Contracts provide a way for the Cisco Application Centric Infrastructure (ACI) administrator to control
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More information6/20/2018 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES. Outline for Today. Architecture views C&C Views
1 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES Outline for Today 2 Architecture views C&C Views 1 Components and Connectors (C&C) Styles 3 Elements Relations Properties
More informationOPERETTA: An Optimal Energy Efficient Bandwidth Aggregation System
OPERETTA: An Optimal Energy Efficient Bandwidth Aggregation System Karim Habak, Khaled A. Harras, and Moustafa Youssef Egypt-Japan University of Sc. and Tech. (E-JUST) Carnegie Mellon University in Qatar
More informationCS4700/5700: Network fundamentals
Cristina Nita-Rotaru CS4700/5700: Network fundamentals. 1: Organizing network functionality } Networks are built from many components } Networking technologies } Ethernet, Wifi, Bluetooth, Fiber Optic,
More informationSecure Sharing of an ICT Infrastructure Through Vinci
Secure Sharing of an ICT Infrastructure Through Vinci Fabrizio Baiardi 1 Daniele Sgandurra 2 1 Polo G. Marconi - La Spezia, University of Pisa, Italy 2 Department of Computer Science, University of Pisa,
More informationOpal. Robert Grimm New York University
Opal Robert Grimm New York University The Three Questions What is the problem? What is new or different? What are the contributions and limitations? The Three Questions What is the problem? Applications
More informationSoftware Driven Verification at SoC Level. Perspec System Verifier Overview
Software Driven Verification at SoC Level Perspec System Verifier Overview June 2015 IP to SoC hardware/software integration and verification flows Cadence methodology and focus Applications (Basic to
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationQoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo.
QoS in IPv6 Madrid Global IPv6 Summit 2002 March 2002 Alberto López Toledo alberto@dit.upm.es, alberto@dif.um.es Madrid Global IPv6 Summit What is Quality of Service? Quality: reliable delivery of data
More informationCSCI Computer Networks
CSCI-1680 - Computer Networks Chen Avin (avin) Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Administrivia Sign and hand in Collaboration
More informationManagement of Future Internet with Autonomic Network Architecture and Model
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 10 (October 2012), PP 63-70 Management of Future Internet with Autonomic Network Architecture and Model Prof.P.P.Rewagad
More informationSoftware Design Patterns. Background 1. Background 2. Jonathan I. Maletic, Ph.D.
Software Design Patterns Jonathan I. Maletic, Ph.D. Department of Computer Science Kent State University J. Maletic 1 Background 1 Search for recurring successful designs emergent designs from practice
More informationResource Containers. A new facility for resource management in server systems. Presented by Uday Ananth. G. Banga, P. Druschel, J. C.
Resource Containers A new facility for resource management in server systems G. Banga, P. Druschel, J. C. Mogul OSDI 1999 Presented by Uday Ananth Lessons in history.. Web servers have become predominantly
More informationJump-Start Software-Driven Hardware Verification with a Verification Framework
Jump-Start Software-Driven Hardware Verification with a Verification Framework Matthew Ballance Mentor Graphics 8005 SW Boeckman Rd Wilsonville, OR 97070 Abstract- Software-driven hardware verification
More informationSoftware-Defined Multicast Network Overlay Framework draft-qi-bitar-intarea-sdn-multicast-overlay-00
Software-Defined Multicast Network Overlay Framework draft-qi-bitar-intarea-sdn-multicast-overlay-00 David Qi, Bloomberg Nabil Bitar, Nuage Networks/Nokia Truman Boyes, Bloomberg Senad Palislamovic, Nuage
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationInterrupts and System Calls
Interrupts and System Calls Open file hw1.txt App First lecture Ok, here s handle 4 App App Don Porter Libraries Libraries Libraries System Call Table (350 1200) Kernel User Supervisor Hardware 1 2-2 Today
More informationETSF10 Internet Protocols Routing on the Internet
ETSF10 Internet Protocols Routing on the Internet 2012, Part 2, Lecture 1.2 Kaan Bür, Jens Andersson Routing on the Internet Unicast routing protocols (part 2) [ed.4 ch.22.4] [ed.5 ch.20.3] Forwarding
More informationSJTU 2018 Fall Computer Networking. Wireless Communication
SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP
More informationADVANCED SOFTWARE DESIGN LECTURE 4 SOFTWARE ARCHITECTURE
ADVANCED SOFTWARE DESIGN LECTURE 4 SOFTWARE ARCHITECTURE Dave Clarke 1 THIS LECTURE At the end of this lecture you will know notations for expressing software architecture the design principles of cohesion
More informationSquare Pegs in a Round Pipe: Wire-Compatible Unordered Delivery In TCP and TLS
Square Pegs in a Round Pipe: Wire-Compatible Unordered Delivery In TCP and TLS Jana Iyengar*, Bryan Ford + Syed Obaid Amin* +, Michael F. Nowlan +, Nabin Tiwari* *Franklin & Marshall College + Yale University
More informationInternet of Things 2018/2019
Internet of Things 2018/2019 Resource Management for Dependable IoT Tanir Ozcelebi John Carpenter, 1982 1 What does resource management entail? Guiding questions What are the components of dependability?
More informationEmbedding Identity in Mobile Environments
Mobiarch 2007 - Kyoto, August 27 th, 2007 Embedding Identity in Mobile Environments Alfredo Matos Susana Sargento Rui L. Aguiar 2005, it -
More informationForwarding on Gates - a Clean-Slate Replacement for IP
Forwarding on Gates - a Clean-Slate Replacement for IP Florian Liers, Thomas Volkert Research seminar KIT Karlsruhe (February 2011) Main fields Electrical engineering Engineering Computer science Media
More informationOpportunistic Application Flows in Sensor-based Pervasive Environments
Opportunistic Application Flows in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian, and Manish Parashar ICPS 2004 1 Outline Introduction to pervasive sensor-based
More informationModule 1 - Distributed System Architectures & Models
Module 1 - Distributed System Architectures & Models System Architecture Defines the structure of the system components identified functions of each component defined interrelationships and interactions
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More information