Towards a Delay-tolerant Future: Reconsidering some Assumptions in Networking. Reconsidering the Internet Design. Number of layers
|
|
- Doreen Garrison
- 5 years ago
- Views:
Transcription
1 Towards a Delay-tolerant Future: Reconsidering some ssumptions in Networking CHINTI Jörg tt <jo@comnet.tkk.fi> 2 July 2009 tubs.city 2009 Jörg tt 1 Reconsidering the Internet Design Communication paradigms Packets vs. circuits Number of layers Hosts vs. interfaces IP addresses ctive networking QoS Layering principles est Effort Packet size (cell size) Connectionless operation Locators vs. identifiers Routing structure GP End-to-end principle IPv4 vs. IPv6 vs Security ccounting Trust MIddleboxes 2009 Jörg tt 2
2 The Internet ISP ISP ISP ISP ISP ISP ISP 2009 Jörg tt 3 The Mobile Internet is Not Connected What we have: lots of wireless network infrastructure patchwork of UMTS, WiMX, WLN, satellite (Iridium, ) covering significant parts of the planet yet not all and powerful mobile endpoints with many of such radio interfaces To connect to the infrastructure and to talk to each other What we still don t have: sustainable ubiquitous connectivity for technical, practical, and economic reasons lso social and legal Mimicking fixed network characteristics for wireless and mobile nodes is bound to fail 2009 Jörg tt 4
3 Example: Coverage 2009 Jörg tt 5 Performance Example: Throughput 2009 Jörg tt 6
4 Performance Example: Delay and Loss Cellular data (UMTS, GRPS) in a train (2007) Multi-access train system (2009) (WiMX, UMTS, GPRS) 2009 Jörg tt 7 Link/path impairments/loss yield delay Delay Loss Date Rate Repair mechanisms, rate reduction Reduced throughput,increased loss Delay Disruption Data rate=0, loss=1, delay>t outage Short delays inhibit interactivity and performance Long delays prevent service. Delay Timeout Retry Failure Manual repair 2009 Jörg tt 8
5 Mobile pplications Essentially have not changed from the corresponding fixed applications. Rely on (continuous) connectivity to the infrastructure 2009 Jörg tt 9 Some bservations on (Mobile) pplications Many applications are asynchronous in nature Theoretically no need for always on connectivity today Examples: , file transfer, peer-to-peer, even presence and messaging pplications don t communicate most of the time Users read, type, or do other things (e.g., fetch-read cycle for the web) Examples: web, , calendar, chat, presence, pplication semantics do not require permanent or end-to-end connectivity but many application protocols do! This motivates seamless connectivity and wireless QoS Which are often suboptimal goals and sometimes unrealistic 2009 Jörg tt 10
6 Scenario (0) Point Internet Web Content 2009 Jörg tt 11 Scenario (1) Points 2009 Jörg tt 12
7 Scenario (2) Points 2009 Jörg tt 13 Scenario (3) Points DNS Server Campus Network 2009 Jörg tt 14
8 Scenario (4) Points DNS Server DNS Server Campus Network Internet 2009 Jörg tt 15 Scenario (5) Web Server Points DNS Server DNS Server Campus Network Internet 2009 Jörg tt 16
9 Infrastructure Dependencies Infrastructure functions utoconfiguration and access ddress resolution User identification and authorization Security certificate lookup, validation Content retrieval (or other server-based operation) Infrastructure interactions utoconfiguration & access: 2 + timeout spiegel.de 113 objects 590 K ddress resolution: 1 per non-cached DNS name, possibly recursive tubscity 20 objects 343 K Web page: usually couple of external links Not so much applicable for mail servers, etc. pplications Sending mail: ~6+ Retrieving mail: ~6+ Web: highly variable: tagesschau.de 106 objects 484 K amazon.com 88 objects 692 K wetter.de 118 objects 699 K portal.acm.org 17 objects 77 K 2009 Jörg tt 17 Infrastructure Dependencies Communication substrate Information repository for retrieval and storage S S S Communication mediation mechanism 2009 Jörg tt 18
10 Disconnections & Disruptions Delay Intentional disconnections and unexpected disruptions Short- to long-term outage Reconnecting may lead to a change of IP addresses Many short-term incremental fixes available from past research Mobile IP, HIP, VPNs to preserve IP addresses Transport layer mechanisms prevent losing TCP (and other) connections Session layer robustness prevents applications from noticing such (+ some support for selected applications) UT while disconnected, data cannot flow Connectivity loss, temporary path failures (re-routing) Hard to distinguish from congestion, remote node overload or failure Impossible to predict if and when operation will return to normal Delays may have a variety of further origins 2009 Jörg tt 19 Towards a Future Internet Three related issues to support mobile communications: 1. Communication substrate: Delay tolerance 2. Mediation: Enabling infrastructure-less operation 3. Revisiting application protocol design 2009 Jörg tt 20
11 1) Towards Delay Tolerance State-of-the-Internet: deliver or drop End-to-end approaches to resilience aim at suspending/resuming communications and at automating recovery 2009 Jörg tt 21 1) Towards Delay Tolerance Connection splitting: prevent applications from noticing Some issues ffects the end-to-end principle Introduces an additional (single) point of failure Need to identify challenged links Mobile nodes still require (direct) infrastructure access C P P 2009 Jörg tt 22
12 1) Towards Delay Tolerance From dedicated proxies to a routing overlay Example DTN: Message-based communications Large messages instead of small packets Maintain the key packet forwarding of IP packets to preserve robustness 2009 Jörg tt 23 1) Towards Delay Tolerance Eliminate the overlay: Integrate delay-tolerant forwarding with the infrastructure nodes No dedicated nodes for special handling required anymore 2009 Jörg tt 24
13 2) Infrastructure-less peration a) Retrieval and mediation indirection Information-centric / content-based networking Decouple content and services from servers ddress by intention (content, function, role) rather than server name Reducing mapping/lookup indirection Route on contents, by intention Utilize late binding when addressing nodes Provide generic nodes for rendezvous support pportunistic and coordinated cooperation Simplest case: Caching vailable to some limited extent as infrastructure-based overlays Extend this notion into access networks and to mobile devices 2009 Jörg tt 25 2) Infrastructure-less peration b) utoconfiguration and registration Provide persistent self-certifying identifiers for nodes Location-independent No need to dynamically obtain addresses for end-to-end operation (Lower layer addresses may stay for network layer interactions) Litmus test: pplied to mobile (ad-hoc) environments Information exchange around a table Targeted communication and open sharing 2009 Jörg tt 26
14 3) Fix pplication Protocols void chattiness: minimize end-to-end interactions Keep messages self-contained (all-at-once) Indicate context, include credentials Minimizes the impact of delays Untangle application and transport layer state Connections, reliability llows repeated setup, support migration to more delay-tolerant transport Separate protocol operation and content security Decouple content from the node (originally) serving it Keep application security independent of lower layers Enables caching and autonomous operation Consider intermediaries explicitly in the design 2009 Jörg tt 27 3) Fix pplication Protocols Minimize the dependency on infrastructure nodes void third-party lookups and indirections Supports flexible content, service, and peer discovery Design symmetric protocols that can talk directly without servers Realize end-to-end semantics expressly at the application layer Eliminates application layer conversion, e.g., in mail servers uild adaptivity into protocols at all layers llow users to define their own delay tolerance (rather than prescribing it) No fixed timeouts, flexible semantics, Non-delay-tolerant application protocols Can continue working as before (e.g., for real-time traffic) 2009 Jörg tt 28
15 Towards a Future Internet Incremental deployment imperative Don t care about IPv4 vs. IPv6 vs. * No need to touch the infrastructure but may evolve in parallel Need to use TCP and UDP in the short to mid term Realize delay tolerance and content orientation as an overlay Got plenty of real-world evidence for the latter today Start out application-specific (plenty of evidence!) verlay functions, content-aware routing, identifiers, Gradually revise/enrich application protocols and applications ( dual stack ) Strive for generalization, possibly using virtualization Intertwine overlay and underlay functions 2009 Jörg tt 29 Short-term example: The CHINTI pproach 3 rd party provider CHINTI proxies CHINTI proxies ISP CHINTI ISP Internet ISP Servers, peers Mobile ISP Internet Mobile 2009 Jörg tt 30
16 Short-term example: The CHINTI pproach Targets Today s applications: mail, web, Incremental deployment Support for diverse business roles Deployment considerations: NTs and firewalls Portals, authentication Content filtering Mobile device Vehicle Support Network Internet/CSP Server CHINTI overlay connection C P U Plain end-to-end connection C P P 2009 Jörg tt 31 Mid-term example: Delay-tolerant Web Message-based protocol: HTTP encapsulated in DTN Single request yields entire page ggregation on the server side Compound responses in MHTML Native DTN web server Existing web browsers + local gateway Disconnected browsing + blogging Web client Gate R way R/ R/ Challenged, disconnected, or regular network R/ R/ web server HTTP-over-DTN with MHTML responses P C P 2009 Jörg tt 32
17 Some Conclusion Disconnections, disruptions, delays are here to stay Yes, we should advance the infrastructure and improve networks Delay tolerance should become an inherent property of a future Internet Support for wireless nodes, mobility, and robustness in general Need for incremental deployment suggests overlays to start Need to fix (20 years) old application protocols Prototyping and trialing is essential to understand the issues (usability, deployability, incentives) 2009 Jörg tt 33 CHINTI Jörg tt 34
Adaptive Applications
Towards More Adaptive Voice Applications Jörg Ott Md. Tarikul Islam, Cheng Luo Nagasai Panchakarla, Anssi Turkulainen 13 October 2011 ISOLA 2010 2011 Jörg Ott 1 Adaptive Applications
More informationICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe
ICN & 5G Dr.-Ing. Dirk Kutscher Chief Researcher Networking NEC Laboratories Europe Performance and Security Today User Equipment Access Network Core/Service Network Application Servers 2 NEC Corporation
More informationMiddleboxes in Cellular Networks
Middleboxes in Cellular Networks Szilveszter Nádas, Salvatore Loreto Ericsson Research, Szilveszter.Nadas@ericsson.com, Salvatore.Loreto@ericsson.com November 4, 2014 Abstract This is a position paper
More informationGeneral requirements for ID/locator separation in NGN
Draft Recommendation ITU-T Y.2015 (Y.ipsplit) General requirements for ID/locator separation in NGN Summary This Recommendation begins with showing the limitations of the conventional IP architecture,
More informationNever Drop a Call With TecInfo SIP Proxy White Paper
Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video
More informationThe Design Space of Network Mobility
The Design Space of Network Mobility Key ideas Network Mobility Seamless Mobility Overview of implementations and challenges Geomorphic model New abstraction for the network stack Helps us discuss, understand
More informationFederal Agencies and the Transition to IPv6
Federal Agencies and the Transition to IPv6 Introduction Because of the federal mandate to transition from IPv4 to IPv6, IT departments must include IPv6 as a core element of their current and future IT
More informationINF3190 A critical look at the Internet / alternative network architectures. Michael Welzl
INF390 A critical look at the Internet / alternative network architectures Michael Welzl What s the problem? The Internet works! I work, too! Could be faster Could be safer Could be more reliable (Internet):
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationRealtime Multimedia in Presence of Firewalls and Network Address Translation
Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Oct, 2017 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationRealtime Multimedia in Presence of Firewalls and Network Address Translation. Knut Omang Ifi/Oracle 9 Nov, 2015
Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Nov, 2015 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or
More informationCSE 123A Computer Netwrking
CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore
More informationIPv6: An Introduction
Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to
More informationQuick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the
More informationApplicability of IETF Mobility Solutions to the 3GPP All IP Network
Applicability of IETF Mobility Solutions to the 3GPP All IP Patrick Stupar, Krishna Pandit, and Wolfgang Granzow Qualcomm CDMA Technologies GmbH Outline Motivation All-IP paradigm in 3GPP LTE network Survey
More informationForeScout CounterACT. Work with IPv6 Addressable Endpoints. How-to Guide. Version 8.0
ForeScout CounterACT Work with IPv6 Addressable Endpoints How-to Guide Version 8.0 Table of Contents About IPv6 Network Environments... 3 About CounterACT IPv6 Support... 3 Changes to Console Functionality
More informationChapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms
Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer
More informationMigration Technologies. Dual Stack and Tunneling Using GRE, 6to4, and 6in4.
Migration Technologies. Dual Stack and Tunneling Using GRE, 6to4, and 6in4. 1 By Gaza IPv6 Project Team Eng. Mohammed Abu-Jamous Why Not Dual Stack? Dual Stack is very important in our migration plane.
More informationWhy do we really want an ID/locator split anyway?
Why do we really want an ID/locator split anyway? Dave Thaler dthaler@microsoft.com MobiArch 2008 1 Starting from basics Users deal with names, not addresses (esp. in IPv6) Humans need friendly identifiers
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile
More informationQuick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003
CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last
More informationFuture Implications of IPv6 Accessorizing IPv6
Future Implications of IPv6 Accessorizing IPv6 Preston Marshall Defense Advanced Research Projects Agency (DARPA) Advanced Technology Office pmarshall@darpa.mil The Future IPV6 Wireless Problem From Access
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationNetworked Multimedia and Internet Video. Colin Perkins
Networked Multimedia and Internet Video Colin Perkins IP video will represent 80% of all traffic by 2019, up from 67% in 2014 Source: Cisco Visual Networking Index, 2015 2 History MPEG TS YouTube MPEG
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is
More informationNetworking and Internetworking 1
Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements
More informationTechological Advantages of Mobile IPv6
Techological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 / HFl Outline
More informationSentinet for Microsoft Azure SENTINET
Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...
More informationOn the Internet, nobody knows you re a dog.
On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing
More informationOpportunistic Application Flows in Sensor-based Pervasive Environments
Opportunistic Application Flows in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian, and Manish Parashar ICPS 2004 1 Outline Introduction to pervasive sensor-based
More informationIMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES
Daitan White Paper IMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES Highly Reliable Software Development Services http://www.daitangroup.com Daitan Group 2014 IMS, NFV
More informationChapter 7 Mobility Management at Transport Layer
Chapter 7 Mobility Management at Transport Layer This chapter is dedicated to transport-layer mobility support schemes, which follow an end-to-end philosophy, putting the notion of mobility at the end
More informationPatrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015
Oriana Riva, Department of Computer Science ETH Zürich Advanced Computer Networks 263-3501-00 Principles Patrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015 Last time Course introduction Principles
More informationCS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.
CS 268: Internet Architecture & E2E Arguments Scott Shenker and Ion Stoica (Fall, 2010) 1 Today s Agenda Design goals Layering (review) End-to-end arguments (review) 2 1 Internet Design Goals Goals 0 Connect
More informationAdvanced Computer Networks. IP Mobility
Advanced Computer Networks 263 3501 00 IP Mobility Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Tuesday 1 April 2014 Outline Last week: Today: Cellular Networks
More informationOn Host Identity Protocol
On Host Identity Protocol Miika Komu Data Communications Software Group Dep. of Computer Science and Engineering School of Science Aalto University 17.10.2011 Table of Contents Introduction
More informationForeword xxiii Preface xxvii IPv6 Rationale and Features
Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP
More informationUniversity of Southern California EE450: Introduction to Computer Networks
University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal
More information1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology
Review Questions for exam Preparation (22-07-2017) 1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology 2. What is the Internet? "network
More informationFIND Projects 4. Munyoung Lee
FIND Projects 4 Radio Wormholes for Wireless Label Switched Mesh Networks RNA: A Recursive Network Architecture Sensor-Internet Sharing and Search (SISS) Service-Centric End-to-End Abstractions for Network
More informationNSF Future Internet Architecture. Outline. Predicting the Future is Hard! The expressive Internet Architecture: from Architecture to Network
The expressive Internet Architecture: from Architecture to Network Peter Steenkiste Dave Andersen, David Eckhardt, Sara Kiesler, Jon Peha, Adrian Perrig, Srini Seshan, Marvin Sirbu, Hui Zhang Carnegie
More informationInternet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer
Midterm Study Sheet Below is a list of topics that will be covered on the midterm exam. Some topics may have summaries to clarify the coverage of the topic during the lecture. Disclaimer: the list may
More informationMobile Transport Layer
Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-17 Naming Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained from other
More informationIntroduction to Distributed Systems
Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]
More informationHigh Availability Synchronization PAN-OS 5.0.3
High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...
More informationLayering in Networked computing. OSI Model TCP/IP Model Protocols at each layer
Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand
More informationCS 268: Computer Networking
CS 268: Computer Networking L-18 Naming Overview i3 Layered naming DOA SFR 2 Multicast S 1 S 2 R RP R R R R RP: Rendezvous Point C 1 C 2 3 Mobility Sender HA FA Home Network Network 5 5.0.0.1 12.0.0.4
More informationPanel 1 Service Platform and Network Infrastructure for Ubiquitous Services
Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich
More informationSlide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices
Slide 1 Technological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 /
More informationBrowsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments
Browsing the World in the Sensors Continuum Agents and Franco Zambonelli Agents and Motivations Agents and n Computer-based systems and sensors will be soon embedded in everywhere all our everyday objects
More informationIntroduction to Networking
Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block
More informationDaedalus/GloMop Architectural Walkthrough
Daedalus/ Architectural Walkthrough Daedalus Retreat, Lake Tahoe June 18-20th, 1996 Steve Gribble and Todd Hodes {gribble,hodes}@cs.berkeley.edu Outline Motivation and overview Core architecture components
More information416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018
416 Distributed Systems Networks review; Day 1 of 2 Jan 5 + 8, 2018 1 Distributed Systems vs. Networks Low level (c/go) Run forever Support others Adversarial environment Distributed & concurrent Resources
More informationOur Virtual Intelligent Network Overlay (VINO) solutions bring next-generation performance and efficiency to business networks throughout North
Our Virtual Intelligent Network Overlay (VINO) solutions bring next-generation performance and efficiency to business networks throughout North America TELoIP Simplifies Public And Private Cloud Access
More informationDue to the many benefits provided by both the third-generation (3G) mobile networks and the IEEE wireless local area networks (WLANs), it is
Performance of UMTS/WLAN Integration at Hot-Spot Locations Using OPNET Marwan Abu-Amara, Ashraf Mahmoud, Tarek Sheltami, Adel Al-Shahrani, Khalid Al-Otaibi, S.M.Rehman, and Taha Anwar {marwan, ashraf,
More informationSome Lessons Learned from Designing the Resource PKI
Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007 Address and Routing Security The basic security questions that need to be answered are: Is this a valid
More informationAT&T SD-WAN Network Based service quick start guide
AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy
More informationInternet 3.0: The Next Generation Internet
Internet 3.0: The Next Generation Internet Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Boeing Brown Bag Seminar, January 22, 2009 These slides and Audio/Video recordings
More informationA Polymorphic Network Architecture based on Autonomous Domains DIANA. Domain-Insulated Autonomous Network Architecture
A Polymorphic Network Architecture based on Autonomous Domains DIANA Domain-Insulated Autonomous Network Architecture Target of the Work Overall Views Building Blocks Frameworks Components Interactions
More informationDual-Stack lite. Alain Durand. May 28th, 2009
Dual-Stack lite Alain Durand May 28th, 2009 Part I: Dealing with reality A dual-prong strategy IPv4 reality check: completion of allocation is real Today Uncertainty IPv6 reality check: the IPv4 long tail
More informationProtocol for Tetherless Computing
Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous
More informationCMPE150 Midterm Solutions
CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching
More informationOPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS
OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN
More informationDeployments and Network Topologies
TECHNICAL GUIDE Deployments and Network Topologies A technical guide to deploying Family Zone School in different network topologies. Contents Introduction...........................................3 Transparent
More informationMigratory TCP (MTCP) Transport Layer Support for Highly Available Network Services
Migratory TCP (MTCP) Transport Layer Support for Highly Available Network Services DisCo Lab Division of Computer and Information Sciences Rutgers University Nov. 29, 2001 CONS Light seminar 1 The People
More informationMoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005
MoB: A Mobile Bazaar for Wide Area Wireless Services R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005 What is MoB? It is an infrastructure for collaborative wide-area wireless data services.
More informationGoals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks
Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.
More informationAsynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC
Asynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC The Business Objective Automated Business Collaboration Facilitating exchange of information
More informationHow to Configure a Remote Management Tunnel for an F-Series Firewall
How to Configure a Remote Management Tunnel for an F-Series Firewall If the managed NextGen Firewall F-Series cannot directly reach the NextGen Control Center, it must connect via a remote management tunnel.
More informationATP: Autonomous Transport Protocol
ATP: Autonomous Transport Protocol Tamer Elsayed,, Mohamed Hussein, Moustafa Youssef,, Tamer Nadeem, Adel Youssef and Liviu Iftode Department of Computer Science University of Maryland, USA Tracking in
More informationPostellation: an Enhanced Delay-Tolerant Network (DTN) Implementation with Video Streaming and Automated Network Attachment
Postellation: an Enhanced Delay-Tolerant Network (DTN) Implementation with Video Streaming and Automated Network Attachment Marc Blanchet, Simon Perreault and Jean-Philippe Dionne Viagénie, Québec, Québec,
More informationInternet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses
Internet Organization Addresses TCP/IP Protocol stack Forwarding Jörg Liebeherr, 1998-2003 1 What defines the Internet? 1. Use of a globally unique address space based on Internet Addresses 2. Support
More informationAn Overlay Architecture for End-to-End Internet Service Availability
An Overlay Architecture for End-to-End Internet Service Availability Angelos Stavrou Network Security Lab Computer Science Department, Columbia University Overview of the talk Problem Motivation Summary
More informationDefining the Internet
Defining the Internet Daniel Zappala CS 460 Computer Communications and Networking Brigham Young University What is the Internet? 2/23 Internet Map, courtesy Barrett Lyon, 2003 What is the Internet? 3/23
More informationDeployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network
Deployment Guide Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network The Cisco Service Oriented Network Architecture (SONA) framework helps enterprise customers evolve their
More informationSpectrum Management in Cognitive Radio Networks
Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision
More informationICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016)
ICN IDENTIFIER / LOCATOR Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) 1 A brief review of ID/Locators in IETF It s long, and we ll skim over it Then we discuss the CCNx & NDN
More informationETSF10 Internet Protocols Network Layer Protocols
ETSF10 Internet Protocols Network Layer Protocols 2012, Part 2, Lecture 3.1 Kaan Bür, Jens Andersson Network Layer Protocols IPv4, IPv6 [ed.4 ch.20.3+19.2] [ed.5 ch.22.1.1-2+22.2] Transition from IPv4
More informationArchitectural Principles of the Internet
TLEN7000/ECEN7002: Analytical Foundations of Networks Architectural Principles of the Internet Lijun Chen 11/27/2012 The Internet Protocol Stack TCP/IP was first proposed in 1973 The specifications are
More informationImplementation Guide - VPN Network with Static Routing
Implementation Guide - VPN Network with Static Routing This guide contains advanced topics and concepts. Follow the links in each section for step-by-step instructions on how to configure the following
More informationOutline 9.2. TCP for 2.5G/3G wireless
Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,
More informationWiNG 5.x How-To Guide
WiNG 5.x How-To Guide Tunneling Remote Traffic using L2TPv3 Part No. TME-08-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola
More informationIPv6 on Campus. The stuff you need to know
IPv6 on Campus The stuff you need to know Campfire! http://xkcd.com/ 742/ What is IPv6 and Why do I care? Next generation Internet addressing protocol ISPs around the world are handing out IPv6 addresses
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationIPv6: a real opportunity for ISPs
IPv6: a real opportunity for ISPs Patrick COCQUET, 6WIND CEO, IPv6 Forum VP www.6wind.com 04/03/2002 réf. : 6W 01/064 1 6WIND Briefly 6WIND, The IPv6 Company! Starting date: September 2000 Spin-off from
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationLayering and Addressing CS551. Bill Cheng. Layer Encapsulation. OSI Model: 7 Protocol Layers.
Protocols CS551 Layering and Addressing Bill Cheng Set of rules governing communication between network elements (applications, hosts, routers) Protocols define: Format and order of messages Actions taken
More informationIPv6 in Campus Networks
IPv6 in Campus Networks Dave Twinam Manager, Technical Marketing Engineering Internet Systems Business Unit dtwinam@cisco.com Cisco Twinam IPv6 Summit 2003 Cisco Systems, Inc. All rights reserved. 1 IPv6
More informationHost Identity Protocol. Miika Komu Helsinki Institute for Information Technology
Host Identity Protocol Miika Komu Helsinki Institute for Information Technology 16.11.2009 Table of Contents Introduction Naming and Layering Control Plane Data Plane Introduction Motivation
More informationReview for Internet Introduction
Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationHorizon Network Configuration Guidelines
Horizon Network Configuration Guidelines Contents 2.0 Configuration of Non ssured ccess routers... 2 2.1 ccess Control... 2,4,5 2.2 UDP Fragmentation during Horizon communications.... 3 2.3 SIP LG... 4
More informationIEEE C /08
2003-01-10 IEEE C802.20-03/08 Project Title IEEE 802.20 Working Group on Mobile Broadband Wireless Access A Vision of an IP-based Cellular Network Date Submitted
More informationSharkFest'17 US. Experience with the expressive Internet Architecture. Peter Steenkiste Carnegie Mellon University
SharkFest'17 US Experience with the expressive Internet Architecture Peter Steenkiste Carnegie Mellon University Dave Andersen, David Eckhardt, Sara Kiesler, Jon Peha, Adrian Perrig, Srini Seshan, Marvin
More informationRemote Desktop Services Deployment Guide
Deployment Guide VERSION: 10.0 UPDATED: July 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More information