Future Internet - ANA. INF5090 Thomas Plagemann

Size: px
Start display at page:

Download "Future Internet - ANA. INF5090 Thomas Plagemann"

Transcription

1 Future Internet - ANA INF5090 Thomas Plagemann

2 Recap why a Future Internet? ANA - Project 2

3 Overview Motivation Blueprint ANA core Monitoring Framework ANA - Project 3

4 Motivation Variability in the Internet is above and below IP: it's the "hourglass" model. Application layer www, , ftp, ssh, DNS, peer-to-peer (emule, BitTorrent) VoIP (Skype), VoD, grid, IP also called the "waist" of the Internet Link layer Ethernet, wifi (802.11), ATM, SONET/SDH, FrameRelay, modem, ADSL, Cable, Changing/updating the Internet core (e.g., IPv6, Multicast, MIP, QoS, ) is difficult or impossible! 4

5 Motivation Solutions adopted so far : Patches to cope with challenges contradict the initial design paradigms Incoherencies patches to the patches Consensus in the research community that a next step beyond the Internet is needed. 5

6 ANA: finding the least common denominator Our contribution: enable & demonstrate autonomic networking. ANA abstractions allow variability at all levels of the architecture: variants to perform a given task, and networks co-exist and (can) compete, open for extensions (evolution) 6

7 Pitfalls in network architecture design Static/rigid standards instead of mechanisms for change management Global address space (requires uniqueness and global coordination) Leaking of and relying on network internal details Built-in address dependency (i.e. address-centric architecture) To avoid running into such pitfalls, we adopt an incremental approach via prototyping cycles Helps revealing faults or black-holes in the architecture design 7

8 You can't "build" an architecture, you have to "grow" it Project is articulated around 2 prototyping cycles. Methodology: design, test/validate, refine Design phase First "Blueprint" (architectural model) First prototyping phase Testing + feedback phase 2nd prototyping phase Final evaluation 2 nd design phase Mature "Blueprint" 8

9 ANA "one-size-fits-all" ANA does not want to propose another "one-size-fits-all network waist". ANA is a meta-architecture to host, interconnect and federate multiple heterogeneous networks Application layer Multiple "network instances" can co-exist. ANA framework Link layer 9

10 Core abstractions ANA abstractions: Compartment. Information Channel (IC). Information Dispatch Point (IDP). Functional Block (FB). More tricks with compartments: "Node compartment". Overlays and compartment inter-stitching. 10

11 ANA Compartment Compartment = wrapper for networks. ANA does not impose how network compartments should work internally: the ANA framework specifies how networks interact. ANA specifies interfaces and interactions with any network compartment Internal operation is not imposed leading to multiple and heterogeneous compartments but generic interaction ANA framework 11

12 Compartments (cont.) A (network) compartment defines how to join and leave a compartment: member registration, trust model, authentication, etc. Each compartment defines a conceptual membership database. Registration: explicit joining and exposing is required ("default-off" model). A= Register( A ) How registration is performed is specific to each compartment. Compartment 12

13 Compartments (cont.) Defines How to reach (communicate with) another member: peer resolution, addressing, routing, etc. Resolution: explicit request before sending ("no sending in the void"). A= A= resolve Request( A ) A Resolution process returns communication entry point a How resolution is performed is specific to each compartment. Compartment a A Compartment 13

14 Compartments (cont.) Compartments can be overlaid, i.e. compartments can use the communication services of other compartments. compartment abstraction serves as the unit for the federation of networks into global-scale communication systems. Has interaction rules with "external world", the compartment boundaries (administrative or technical), peerings with other compartments, etc. 14

15 Compartments (cont.) Compartments decompose communication systems and networks into smaller and easier manageable units. 15

16 What about addresses and names? Addressing and naming are left to compartments. Each compartment is free to use any addressing and naming schemes (or is free to not use addresses, for example in sensor networks). The main advantages are: No need to manage a unique global addressing scheme. No need to impose a unique way to resolve names. ANA is open to future addressing and naming schemes. The main drawbacks are: Back to the CATENET challenges : How to inter-work in such heterogeneous address/name spaces? 16

17 Local labels for handling (global) addresses Target resolution returns a local label = IDP Addresses (if any) and names (if any) limited as input for resolution The IDP maintains the state to reach the destination A= Resolution process returns communication entry point a A a Compartment 17

18 Local labels for handling (global) addresses Applications send data only to IDPs Bound to a flexibe element data is sent to IDP Name/address IC A Startpoints instead of endpoints.. 18

19 Information Channels (ICs) Resolution process returns access to an "information channel" that can be used to reach the target member(s). Various types of information channels. unicast multicast anycast concast 19

20 Core abstractions ANA abstractions: Compartment. Information Channel (IC). Information Dispatch Point (IDP). Functional Block (FB). More tricks with compartments: "Node compartment". Overlays and compartment inter-stitching. 20

21 Functional Blocks (FBs) Code and state that can process data packets. Protocols and algorithms are represented as FBs. FBs implement the Information Channels (abstract entities) Access to FBs is also via information dispatch points (IDPs). FBs can have multiple input and output IDPs. FB internally selects output IDP(s) to which data is sent. FB FB data is sent to IDP which has state to call correct function inside FB 21

22 How ICs, FBs, and IDPs fit together Node compartment Node compartment FB1 IC FB2 a b c 22

23 Modelling nodes as compartments Organize a node's functionalities as (compartment) members: Member database: catalog of available functions. Resolution step to access a given function. Also implements access control. Resolution instantiates functional blocks (FBs). The node compartment hosts/executes FBs and IDPs. Node Compartment App/service p e f a 23

24 Different views for a compartment A network compartment has different views, for different usage. This shows that there is really just one IDP "mapped" in the different views. Node compartment Node compartment Compartment exported view data in IC abstracts communication service provided by the compartment data out structural view imported view IC abstracts service provided by underlying hardware "ANA world" Send to medium (Ethernet, wifi, etc) Listen to medium (Ethernet, wifi, etc) Underlying Hardware 24

25 Implementation ANA Core Applications Legacy apps sockets Adaptation layer MINMEX controller MINMEX Node Compartment Information Dispatch Table ANA Playground + API compartments, learning logic, service checker, IP overlay, monitoring, turf, p2p, AN style Platform abstraction layer (optional) Platform OS 25

26 Basic design Two main components: The MINMEX i.e., the ANA "micro-kernel" Supports core API and inter-brick communications. Implements packet dispatching to IDPs. Implements the Node Compartment. "Bricks" i.e., individual components of the ANA Playground Can be a functional block which offers access to a network compartment. Can also provide processing support (e.g. encryption). 26

27 Basic design The ANA node can be distributed. We do not enforce that all the components of an "ANA Node" run on the same computer. The MINMEX and its bricks can communicate via various IPC types called "gates": Unix/UDP sockets, named pipes, generic netlink. The motivation was that the notion of a "node" was not restricted to being a physical device. 27

28 Basic design Three different API levels. Objective: better understand the level of complexity vs. flexibility we want to reach. API Level 0: maximum flexibility but developer must know all the details for encoding and decoding messages. API Level 1: good flexibility and developer can use functions to encode and decode messages. API Level 2: less flexibility, but function prototypes are very ease to use, code is easy to write. 28

29 Basic design One code, two platforms. The base code compiles as either userspace application or Linux kernel modules Userspace: easy for development and debugging, easy to use, most people can use it. Linux kernel: for best performance, permits to interact with kernel network internals. We also started lately a support for ANA bricks written in the Erlang Programming language 29

30 Basic design One code, two platforms. Bricks can be developed in a "platform-agnostic" way according to a standard template. The API library provides wrapper functions and mechanisms to properly handle function calls (e.g., malloc vs. kmalloc, main vs. init) We also provide "agnostic" libraries for system-specific functions such as threads and timers. Passing arguments to bricks via CLI is also done via a system-agnostic mechanism (à la argc/argv[ ]). 30

31 Available components MINMEX: node compartment, IDT, IDP manipulation, status interface, API libraries. Bricks: Ethernet and IP compartments. vlink sub-system for flexible "cabling" of ANA nodes. Monitoring components: core part, packet capture, measurements (CPU, net load), "ping". Inter-compartment routing with regular expressions. Content centered routing, Field Based routing Functional composition prototype. User side: chat application, various code examples. And many other bricks of project partners Tools QuickRep, timers, threads, Remote IDP Access 31

32 Monitoring - Motivation Blueprint Building blocks: - Measurement FBs - Info. Sharing (MCIS) ANA Core Efficient and user friendly monitoring with ANA properties for all ANA developers 32

33 Goals Extensibility: arbitrary measurement metrics and bricks can be added at any time no a priori knowledge Self-configuration: without manual configuration Self-optimization: optimize its service by adapting to client requirements, available bricks and current context Adjustable accuracy Efficiency Transparency 33

34 Conceptual Model 34

35 Conceptual Model (cont.) Orchestration Dispatcher Metric 1 Metric n Measuring FB1 Measuring FBy 35

36 Conceptual Model (cont.) Client Return results Dispatcher Client request Identify metric Metric 1 Metric n Select Measuring FB Measuring FB1 Measuring FBy 36

37 High-level Task of IMF Client brick forwards a monitoring request to IMF including the following fields: Nonce, Type, Type parameters, Metric, Metric parameter, Non-functional requirements, Reply IDP IMF analyses request: Which bricks can provide data for the specified metrics? If more than one brick which is the most suitable one (depends on context and client requirements) Dispatcher forwards client monitoring request to the selected brick 37

38 Challenge 1 How to achieve extensibility and avoid a priori knowledge? Who knows which metrics can be monitored? Minimal assumption: Each measuring brick developer knows which metrics the brick measures Each measuring brick developer knows the context that is relevant for the brick Each measuring brick developer knows the non-functional properties of the brick New bricks provide the information to IMF and IMF manages it Information Management 38

39 Challenge 2 How to select the best suited measuring brick? Available bricks Brick properties QoS requirements of client Context 39

40 Context & Brick Properties Example: Vivaldi brick: Always: resource consumption = low mobile: accuracy = bad Network type = static: accuracy = medium Ping brick: Always: resource consumption = medium Always: accuracy = good /* Impact on non-functional properties */ 40

41 Context Usage The context defines how the monitoring bricks are performing in the given situation (=context) The monitoring request includes the particular requirements, e.g. prefer high accuracy or low resource usage Example of a simplified monitoring request: Latency: <accuracy, medium or better, medium weight>, <resource consumption, low, high weigh 41

42 Context Usage (cont.) Instantiate the monitoring brick property descriptions and compare which one matches best the monitoring request Example: Monitoring brick properties Vivaldi brick: Always: resource consumption = low mobile: accuracy = bad Network type = static: accuracy = medium Ping brick: Always: resource consumption = medium Always: accuracy = good Monitoring request: Latency: <accuracy, medium or better, medium weight>, <resource consumption, low, high weight> Context : Network type = mobile -> Vivaldi: Resource consumption = low Accuracy = bad Ping: Resource consumption = medium Accuracy = good -> ping matches best 42

43 IMF Building Blocks Client request reply Dispatcher Brick Selection Information Management MCIS Measuring FB Measuring FB Extensible set of Measurement Functional Blocks 43

44 Vocabularies Assumptions: Vocabularies are shared Agreement on a set of vocabulary specification trees (VSTs) Vocabularies are extensible New subconcepts can be added in time Information sharing Each brick in general knows a subtree (a pruned version) of each VST The IMF knows the VSTs composed of the bricks subtrees 44

45 Shared Vocabularies BrickVST Brick types New bricks announce where they fit in the BrickVST MetricsVST Metrics New bricks announce their metrics and where it fits in the MetricsVST ContextVST Context types and corresponding values QoSVST QoS parameters and corresponding values New bricks announce their QoS profile QoSRequirementsVST 45

46 Example: Brick VST Brick Type Ping Network Monitoring Brick Monitoring Brick VC Context Brick Brick Selection Brick In BrickVST brick names like Ping and VC are probably not part of the shared vocabulary but are decided by the brick providers 46

47 Example: MetricsVST Metric Type Network Performance Metrics throughput latency jitter bandwidth Both metric types and metric names are part of the shared vocabulary 47

48 Example: ContextVST Context types and possible values Context Type Network Context Resource Context Node Type Context mobile static CPU Context Battery Context nodea nodeb cpu1 cpu2 batteryx batteryy 48

49 Example: QoSVST QoS Parameter accuracy resource consumption bad medium good low medium high QoS parameter names and corresponding possible values 49

50 Example: Metrics of Context Bricks corresponding metrics name Metric Type Context Type Context Metrics Network Context Node Type Context Network Context Node Type Context mobile static CPU Context Resource Context Battery Context nodea batteryy nodeb network context CPU Context Resource Context Battery Context node type context cpu1 cpu2 batteryx cpu context battery context 50

51 Information Model Brick brick type brick name metric type metric name QoS Profile brick type brick name QoS parameter context type context value QoS property 51

52 Summary ANA blueprint: IDPs ICs Compartments FBs and bricks Polymorphic Internet ANA core Monitoring Framework & semantics 52

Contents Outline Why do we need a new networking paradigm The drawbacks of the IP hourglass model The self-x attributes Example of network view

Contents Outline Why do we need a new networking paradigm The drawbacks of the IP hourglass model The self-x attributes Example of network view Contents Advanced Topics in Distributed Systems Dr. Andreas Mauthe, andreas@comp.lancs.ac.uk INF5090 Autonomic Networking University of Oslo 25 th March 2007 Outline Motivation Why do we need a new networking

More information

2/14/2011. Three Internet Anniversaries in 2009? Outline. Acknowledgement. 20 years World-Wide Web. 30 years Usenet

2/14/2011. Three Internet Anniversaries in 2009? Outline. Acknowledgement. 20 years World-Wide Web. 30 years Usenet Three Internet Anniversaries in 2009? 20 years World-Wide Web 30 years Usenet The Future Internet Motivation, Bachground, and Basics 40 years ARPANET Thomas Plagemann University of Oslo, Department of

More information

2/21/2012. Three Internet Anniversaries in 2009? Acknowledgement. Outline. Motivation (cont.) Motivation. 20 years World-Wide Web.

2/21/2012. Three Internet Anniversaries in 2009? Acknowledgement. Outline. Motivation (cont.) Motivation. 20 years World-Wide Web. Three Internet Anniversaries in 2009? 20 years World-Wide Web 30 years Usenet The Future Internet Motivation, Bachground, and Basics 40 years ARPANET Thomas Plagemann University of Oslo, Department of

More information

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018 416 Distributed Systems Networks review; Day 1 of 2 Jan 5 + 8, 2018 1 Distributed Systems vs. Networks Low level (c/go) Run forever Support others Adversarial environment Distributed & concurrent Resources

More information

Page 1. Goals for Today" What Is A Protocol?" CS162 Operating Systems and Systems Programming Lecture 10. Protocols, Layering and e2e Argument"

Page 1. Goals for Today What Is A Protocol? CS162 Operating Systems and Systems Programming Lecture 10. Protocols, Layering and e2e Argument Goals for Today" CS162 Operating Systems and Systems Programming Lecture 10 Protocols, Layering and e2e Argument" What is a protocol?! Layering! End-to-end arguments!! October 3, 2011! Anthony D. Joseph

More information

Lecture 3 Protocol Stacks and Layering

Lecture 3 Protocol Stacks and Layering Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction

Distributed Systems Principles and Paradigms. Chapter 01: Introduction Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Introduction Version: October 25, 2009 2 / 26 Contents Chapter

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition. Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Version: February 21, 2011 1 / 26 Contents Chapter 01: 02: Architectures

More information

A Polymorphic Network Architecture based on Autonomous Domains DIANA. Domain-Insulated Autonomous Network Architecture

A Polymorphic Network Architecture based on Autonomous Domains DIANA. Domain-Insulated Autonomous Network Architecture A Polymorphic Network Architecture based on Autonomous Domains DIANA Domain-Insulated Autonomous Network Architecture Target of the Work Overall Views Building Blocks Frameworks Components Interactions

More information

Internet Design: Big Picture

Internet Design: Big Picture Internet Design: Big Picture Internet architectural, design and implementation principles not scriptures, but guidelines understand pros and cons, trade-offs involves Original Internet Design Goals what

More information

Why do we really want an ID/locator split anyway?

Why do we really want an ID/locator split anyway? Why do we really want an ID/locator split anyway? Dave Thaler dthaler@microsoft.com MobiArch 2008 1 Starting from basics Users deal with names, not addresses (esp. in IPv6) Humans need friendly identifiers

More information

416 Distributed Systems. Networks review; Day 2 of 2 And start of RPC Jan 13, 2016

416 Distributed Systems. Networks review; Day 2 of 2 And start of RPC Jan 13, 2016 416 Distributed Systems Networks review; Day 2 of 2 And start of RPC Jan 13, 2016 1 Last Time Modularity, Layering, and Decomposition Example: UDP layered on top of IP to provide application demux ( ports

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is

More information

CA464 Distributed Programming

CA464 Distributed Programming 1 / 25 CA464 Distributed Programming Lecturer: Martin Crane Office: L2.51 Phone: 8974 Email: martin.crane@computing.dcu.ie WWW: http://www.computing.dcu.ie/ mcrane Course Page: "/CA464NewUpdate Textbook

More information

Architectural Styles. Software Architecture Lecture 5. Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved.

Architectural Styles. Software Architecture Lecture 5. Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. Architectural Styles Software Architecture Lecture 5 Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. Object-Oriented Style Components are objects Data and associated

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 01 (version September 5, 2007) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

The ANA Project Development of the ANA-Core Software

The ANA Project Development of the ANA-Core Software Institut für Technische Informatik und Kommunikationsnetze Masters Thesis The ANA Project Development of the ANA-Core Software September 21, 2007 Ariane Keller Supervisor: Prof. Dr. B. Plattner Advisor:

More information

Part I: Future Internet Foundations: Architectural Issues

Part I: Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues 3 Introduction The Internet has evolved from a slow, person-to-machine, communication

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is

More information

The Future Internet Motivation, Background, and Basics

The Future Internet Motivation, Background, and Basics The Future Internet Motivation, Background, and Basics Thomas Plagemann University of Oslo, Department of Informatics To create the future, we must understand the past Tim Kastelle October 2, 2015 2 1

More information

Exploring Alternative Routes Using Multipath TCP

Exploring Alternative Routes Using Multipath TCP Exploring Alternative Routes Using Multipath TCP 1/51 Exploring Alternative Routes Using Multipath TCP Stephen Brennan Case Western Reserve University June 5, 2017 Exploring Alternative Routes Using Multipath

More information

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Lecture Slides 1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Additional Topics 1.1. Basic Operations

More information

416 Distributed Systems. Networks review; Day 2 of 2 Fate sharing, e2e principle And start of RPC Jan 10, 2018

416 Distributed Systems. Networks review; Day 2 of 2 Fate sharing, e2e principle And start of RPC Jan 10, 2018 416 Distributed Systems Networks review; Day 2 of 2 Fate sharing, e2e principle And start of RPC Jan 10, 2018 1 Last Time Modularity, Layering, and Decomposition Example: UDP layered on top of IP to provide

More information

Remote Procedure Calls

Remote Procedure Calls CS 5450 Remote Procedure Calls Vitaly Shmatikov Abstractions Abstractions for communication TCP masks some of the pain of communicating over unreliable IP Abstractions for computation Goal: programming

More information

CS 640: Introduction to Computer Networks. Today s Lecture. Page 1

CS 640: Introduction to Computer Networks. Today s Lecture. Page 1 CS 640: Introduction to Computer Networks Aditya Akella Lecture 2 Layering, Protocol Stacks, and Standards 1 Today s Lecture Layers and Protocols A bit about s 2 Network Communication: Lots of Functions

More information

Memory Management Strategies for Data Serving with RDMA

Memory Management Strategies for Data Serving with RDMA Memory Management Strategies for Data Serving with RDMA Dennis Dalessandro and Pete Wyckoff (presenting) Ohio Supercomputer Center {dennis,pw}@osc.edu HotI'07 23 August 2007 Motivation Increasing demands

More information

Software Architecture

Software Architecture Software Architecture Does software architecture global design?, architect designer? Overview What is it, why bother? Architecture Design Viewpoints and view models Architectural styles Architecture asssessment

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Describing the architecture: Creating and Using Architectural Description Languages (ADLs): What are the attributes and R-forms?

Describing the architecture: Creating and Using Architectural Description Languages (ADLs): What are the attributes and R-forms? Describing the architecture: Creating and Using Architectural Description Languages (ADLs): What are the attributes and R-forms? CIS 8690 Enterprise Architectures Duane Truex, 2013 Cognitive Map of 8090

More information

Kernel Internals. Course Duration: 5 days. Pre-Requisites : Course Objective: Course Outline

Kernel Internals. Course Duration: 5 days. Pre-Requisites : Course Objective: Course Outline Course Duration: 5 days Pre-Requisites : Good C programming skills. Required knowledge Linux as a User Course Objective: To get Kernel and User Space of Linux and related programming Linux Advance Programming

More information

Virtualization of networks

Virtualization of networks Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960

More information

Global Data Plane. The Cloud is not enough: Saving IoT from the Cloud & Toward a Global Data Infrastructure PRESENTED BY MEGHNA BAIJAL

Global Data Plane. The Cloud is not enough: Saving IoT from the Cloud & Toward a Global Data Infrastructure PRESENTED BY MEGHNA BAIJAL Global Data Plane The Cloud is not enough: Saving IoT from the Cloud & Toward a Global Data Infrastructure PRESENTED BY MEGHNA BAIJAL Why is the Cloud Not Enough? Currently, peripherals communicate directly

More information

Theory of Network Communication

Theory of Network Communication Theory of Network Communication Dr. Christian Scheideler Johns Hopkins University, Sept. 8 2004 1 Introduction The goal of this lecture is to give an introduction to the state of the art in the theory

More information

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture Announcements 15-441 15-441 Computer ing 15-641 Lecture 2 Protocol Stacks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Sign up for piazza: https://piazza.com/cmu/fall2016/15441641 P1 will

More information

Distributed Systems Multicast & Group Communication Services

Distributed Systems Multicast & Group Communication Services Distributed Systems 600.437 Multicast & Group Communication Services Department of Computer Science The Johns Hopkins University 1 Multicast & Group Communication Services Lecture 3 Guide to Reliable Distributed

More information

Lecture 2: Internet Architecture

Lecture 2: Internet Architecture CS 3700 Networks and Distributed Systems Lecture 2: Internet Architecture Revised 1/6/14 Organizing Network Functionality 2 Organizing Network Functionality 2 Networks are built from many components! Networking

More information

COMS Introduction to Computers. Networking

COMS Introduction to Computers. Networking COMS 1001 Introduction to Computers Networking What's Ahead Networking layers Network Speeds Protocols, sockets, client/server Routing, DNS, Ethernet, LANs, wireless What is a Network? Loose definition:

More information

Data Model Considerations for Radar Systems

Data Model Considerations for Radar Systems WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,

More information

Kernel Korner AEM: A Scalable and Native Event Mechanism for Linux

Kernel Korner AEM: A Scalable and Native Event Mechanism for Linux Kernel Korner AEM: A Scalable and Native Event Mechanism for Linux Give your application the ability to register callbacks with the kernel. by Frédéric Rossi In a previous article [ An Event Mechanism

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Named Data Networking (NDN) CLASS WEB SITE: NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing

Named Data Networking (NDN) CLASS WEB SITE:   NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing CLASS WEB SITE: http://upmcsms.weebly.com/ Updated with Lecture Notes Named Data Networking (NDN) Introduction to NDN Named Data Networking (NDN) IP NDN Host-centric addressing Data-centric addressing

More information

Extensible Kernel Security through the TrustedBSD MAC Framework

Extensible Kernel Security through the TrustedBSD MAC Framework 03/13/2004 Extensible Kernel Security through the TrustedBSD MAC Framework Robert Watson, Research Scientist HIP Group, 03/13/2004 Page 2 Introduction Rationale for Security Extensions TrustedBSD MAC Framework

More information

CS 428/528 Computer Networks Lecture 01. Yan Wang

CS 428/528 Computer Networks Lecture 01. Yan Wang 1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed

More information

OS Extensibility: SPIN and Exokernels. Robert Grimm New York University

OS Extensibility: SPIN and Exokernels. Robert Grimm New York University OS Extensibility: SPIN and Exokernels Robert Grimm New York University The Three Questions What is the problem? What is new or different? What are the contributions and limitations? OS Abstraction Barrier

More information

Multimedia Networking

Multimedia Networking Multimedia Networking Victor Gau Information Processing Lab. 2008/03/07 Outline Introduction Network Basics Quality of Service Applications VoIP IPTV Telematics Multimedia Multimedia (Lat. Multum + Medium)

More information

A unified multicore programming model

A unified multicore programming model A unified multicore programming model Simplifying multicore migration By Sven Brehmer Abstract There are a number of different multicore architectures and programming models available, making it challenging

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Mobile Network Architecture & Protocols WINLAB IAB Meeting October 29-30, 2001

Mobile Network Architecture & Protocols WINLAB IAB Meeting October 29-30, 2001 Mobile Network Architecture & Protocols WINLAB IAB Meeting October 29-30, 2001 I. Seskar, D. Raychaudhuri MobNets: Introduction This project aims to explore the fundamentals of nextgeneration mobile network

More information

Remote Health Monitoring for an Embedded System

Remote Health Monitoring for an Embedded System July 20, 2012 Remote Health Monitoring for an Embedded System Authors: Puneet Gupta, Kundan Kumar, Vishnu H Prasad 1/22/2014 2 Outline Background Background & Scope Requirements Key Challenges Introduction

More information

Title. EMANE Developer Training 0.7.1

Title. EMANE Developer Training 0.7.1 Title EMANE Developer Training 0.7.1 1 Extendable Mobile Ad-hoc Emulator Supports emulation of simple as well as complex network architectures Supports emulation of multichannel gateways Supports model

More information

Using Industry Standards to Exploit the Advantages and Resolve the Challenges of Multicore Technology

Using Industry Standards to Exploit the Advantages and Resolve the Challenges of Multicore Technology Using Industry Standards to Exploit the Advantages and Resolve the Challenges of Multicore Technology September 19, 2007 Markus Levy, EEMBC and Multicore Association Enabling the Multicore Ecosystem Multicore

More information

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals. CS 268: Internet Architecture & E2E Arguments Scott Shenker and Ion Stoica (Fall, 2010) 1 Today s Agenda Design goals Layering (review) End-to-end arguments (review) 2 1 Internet Design Goals Goals 0 Connect

More information

Communication Networks

Communication Networks Communication Networks A Concise Introduction Jean Walrand University of California, Berkeley Shyam Parekh Bell Labs, Alcatel-Lucent SYNTHESIS LECTURES ON COMMUNICATIONNETWORKS #4 vii entsi * s? m :W.

More information

IP Multicast. Overview. Casts. Tarik Čičić University of Oslo December 2001

IP Multicast. Overview. Casts. Tarik Čičić University of Oslo December 2001 IP Multicast Tarik Čičić University of Oslo December 00 Overview One-to-many communication, why and how Algorithmic approach (IP) multicast protocols: host-router intra-domain (router-router) inter-domain

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Multicast Communications. Tarik Čičić, 4. March. 2016

Multicast Communications. Tarik Čičić, 4. March. 2016 Multicast Communications Tarik Čičić, 4. March. 06 Overview One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic concepts in multicast

More information

Distributed Systems Question Bank UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems?

Distributed Systems Question Bank UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems? UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems? 2. What are different application domains of distributed systems? Explain. 3. Discuss the different

More information

JXTA TM Technology for XML Messaging

JXTA TM Technology for XML Messaging JXTA TM Technology for XML Messaging OASIS Symposium New Orleans, LA 27-April-2004 Richard Manning Senior Software Architect Advanced Technology & Edge Computing Center Sun Microsystems Inc. www.jxta.org

More information

Introduction to Networks

Introduction to Networks Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Computer Networking. Introduction. Quintin jean-noël Grenoble university

Computer Networking. Introduction. Quintin jean-noël Grenoble university Computer Networking Introduction Quintin jean-noël Jean-noel.quintin@imag.fr Grenoble university Based on the presentation of Duda http://duda.imag.fr 1 Course organization Introduction Network and architecture

More information

Communication Paradigms

Communication Paradigms Communication Paradigms Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Interprocess Communication Direct Communication: Sockets Indirect Communication: IP Multicast 2. High Level Communication

More information

Lecture 8: February 19

Lecture 8: February 19 CMPSCI 677 Operating Systems Spring 2013 Lecture 8: February 19 Lecturer: Prashant Shenoy Scribe: Siddharth Gupta 8.1 Server Architecture Design of the server architecture is important for efficient and

More information

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017 CSC 401 Data and Computer Communications Networks Protocol Layers, Security Sec:1.5-1.6 Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017 Outline Computer Networks and the Internet (Ch 1) 1.1

More information

EC EMBEDDED AND REAL TIME SYSTEMS

EC EMBEDDED AND REAL TIME SYSTEMS EC6703 - EMBEDDED AND REAL TIME SYSTEMS Unit I -I INTRODUCTION TO EMBEDDED COMPUTING Part-A (2 Marks) 1. What is an embedded system? An embedded system employs a combination of hardware & software (a computational

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

Project Zygote. Rapid prototyping for the Internet of Things

Project Zygote. Rapid prototyping for the Internet of Things Project Zygote Rapid prototyping for the Internet of Things The Problem we set out to solve How to make interconnecting things easier? What IoT means to us Seamless interconnection between any IoT enabled

More information

Working with Contracts

Working with Contracts Contracts, page 1 Filters, page 9 Taboo Contracts, page 12 Inter-Tenant Contracts, page 15 Contracts Contracts provide a way for the Cisco Application Centric Infrastructure (ACI) administrator to control

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

6/20/2018 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES. Outline for Today. Architecture views C&C Views

6/20/2018 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES. Outline for Today. Architecture views C&C Views 1 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES Outline for Today 2 Architecture views C&C Views 1 Components and Connectors (C&C) Styles 3 Elements Relations Properties

More information

OPERETTA: An Optimal Energy Efficient Bandwidth Aggregation System

OPERETTA: An Optimal Energy Efficient Bandwidth Aggregation System OPERETTA: An Optimal Energy Efficient Bandwidth Aggregation System Karim Habak, Khaled A. Harras, and Moustafa Youssef Egypt-Japan University of Sc. and Tech. (E-JUST) Carnegie Mellon University in Qatar

More information

CS4700/5700: Network fundamentals

CS4700/5700: Network fundamentals Cristina Nita-Rotaru CS4700/5700: Network fundamentals. 1: Organizing network functionality } Networks are built from many components } Networking technologies } Ethernet, Wifi, Bluetooth, Fiber Optic,

More information

Secure Sharing of an ICT Infrastructure Through Vinci

Secure Sharing of an ICT Infrastructure Through Vinci Secure Sharing of an ICT Infrastructure Through Vinci Fabrizio Baiardi 1 Daniele Sgandurra 2 1 Polo G. Marconi - La Spezia, University of Pisa, Italy 2 Department of Computer Science, University of Pisa,

More information

Opal. Robert Grimm New York University

Opal. Robert Grimm New York University Opal Robert Grimm New York University The Three Questions What is the problem? What is new or different? What are the contributions and limitations? The Three Questions What is the problem? Applications

More information

Software Driven Verification at SoC Level. Perspec System Verifier Overview

Software Driven Verification at SoC Level. Perspec System Verifier Overview Software Driven Verification at SoC Level Perspec System Verifier Overview June 2015 IP to SoC hardware/software integration and verification flows Cadence methodology and focus Applications (Basic to

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo.

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo. QoS in IPv6 Madrid Global IPv6 Summit 2002 March 2002 Alberto López Toledo alberto@dit.upm.es, alberto@dif.um.es Madrid Global IPv6 Summit What is Quality of Service? Quality: reliable delivery of data

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Chen Avin (avin) Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Administrivia Sign and hand in Collaboration

More information

Management of Future Internet with Autonomic Network Architecture and Model

Management of Future Internet with Autonomic Network Architecture and Model IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 10 (October 2012), PP 63-70 Management of Future Internet with Autonomic Network Architecture and Model Prof.P.P.Rewagad

More information

Software Design Patterns. Background 1. Background 2. Jonathan I. Maletic, Ph.D.

Software Design Patterns. Background 1. Background 2. Jonathan I. Maletic, Ph.D. Software Design Patterns Jonathan I. Maletic, Ph.D. Department of Computer Science Kent State University J. Maletic 1 Background 1 Search for recurring successful designs emergent designs from practice

More information

Resource Containers. A new facility for resource management in server systems. Presented by Uday Ananth. G. Banga, P. Druschel, J. C.

Resource Containers. A new facility for resource management in server systems. Presented by Uday Ananth. G. Banga, P. Druschel, J. C. Resource Containers A new facility for resource management in server systems G. Banga, P. Druschel, J. C. Mogul OSDI 1999 Presented by Uday Ananth Lessons in history.. Web servers have become predominantly

More information

Jump-Start Software-Driven Hardware Verification with a Verification Framework

Jump-Start Software-Driven Hardware Verification with a Verification Framework Jump-Start Software-Driven Hardware Verification with a Verification Framework Matthew Ballance Mentor Graphics 8005 SW Boeckman Rd Wilsonville, OR 97070 Abstract- Software-driven hardware verification

More information

Software-Defined Multicast Network Overlay Framework draft-qi-bitar-intarea-sdn-multicast-overlay-00

Software-Defined Multicast Network Overlay Framework draft-qi-bitar-intarea-sdn-multicast-overlay-00 Software-Defined Multicast Network Overlay Framework draft-qi-bitar-intarea-sdn-multicast-overlay-00 David Qi, Bloomberg Nabil Bitar, Nuage Networks/Nokia Truman Boyes, Bloomberg Senad Palislamovic, Nuage

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Interrupts and System Calls

Interrupts and System Calls Interrupts and System Calls Open file hw1.txt App First lecture Ok, here s handle 4 App App Don Porter Libraries Libraries Libraries System Call Table (350 1200) Kernel User Supervisor Hardware 1 2-2 Today

More information

ETSF10 Internet Protocols Routing on the Internet

ETSF10 Internet Protocols Routing on the Internet ETSF10 Internet Protocols Routing on the Internet 2012, Part 2, Lecture 1.2 Kaan Bür, Jens Andersson Routing on the Internet Unicast routing protocols (part 2) [ed.4 ch.22.4] [ed.5 ch.20.3] Forwarding

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

ADVANCED SOFTWARE DESIGN LECTURE 4 SOFTWARE ARCHITECTURE

ADVANCED SOFTWARE DESIGN LECTURE 4 SOFTWARE ARCHITECTURE ADVANCED SOFTWARE DESIGN LECTURE 4 SOFTWARE ARCHITECTURE Dave Clarke 1 THIS LECTURE At the end of this lecture you will know notations for expressing software architecture the design principles of cohesion

More information

Square Pegs in a Round Pipe: Wire-Compatible Unordered Delivery In TCP and TLS

Square Pegs in a Round Pipe: Wire-Compatible Unordered Delivery In TCP and TLS Square Pegs in a Round Pipe: Wire-Compatible Unordered Delivery In TCP and TLS Jana Iyengar*, Bryan Ford + Syed Obaid Amin* +, Michael F. Nowlan +, Nabin Tiwari* *Franklin & Marshall College + Yale University

More information

Internet of Things 2018/2019

Internet of Things 2018/2019 Internet of Things 2018/2019 Resource Management for Dependable IoT Tanir Ozcelebi John Carpenter, 1982 1 What does resource management entail? Guiding questions What are the components of dependability?

More information

Embedding Identity in Mobile Environments

Embedding Identity in Mobile Environments Mobiarch 2007 - Kyoto, August 27 th, 2007 Embedding Identity in Mobile Environments Alfredo Matos Susana Sargento Rui L. Aguiar 2005, it -

More information

Forwarding on Gates - a Clean-Slate Replacement for IP

Forwarding on Gates - a Clean-Slate Replacement for IP Forwarding on Gates - a Clean-Slate Replacement for IP Florian Liers, Thomas Volkert Research seminar KIT Karlsruhe (February 2011) Main fields Electrical engineering Engineering Computer science Media

More information

Opportunistic Application Flows in Sensor-based Pervasive Environments

Opportunistic Application Flows in Sensor-based Pervasive Environments Opportunistic Application Flows in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian, and Manish Parashar ICPS 2004 1 Outline Introduction to pervasive sensor-based

More information

Module 1 - Distributed System Architectures & Models

Module 1 - Distributed System Architectures & Models Module 1 - Distributed System Architectures & Models System Architecture Defines the structure of the system components identified functions of each component defined interrelationships and interactions

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information