Named Data Networking Enabled WiFi in Challenged Communication Environments

Size: px
Start display at page:

Download "Named Data Networking Enabled WiFi in Challenged Communication Environments"

Transcription

1 Named Data Networking Enabled WiFi in Challenged Communication Environments 1 Anthony Guardado, 1 Zilong Ye, 1 Huiping Guo 2 Lei Liu, 2 Liguang Xie, 2 Akira Ito 1 California State University, Los Angeles 2 Fujitsu Laboratories of America

2 National Park

3 Internet Service?

4 Use case A US National Park (No Internet, No Cellular, Limited GPS ) Hotel Data cached here Interest ( ) Only this NDN router has Internet access Interest ( ) Interest ( ) Entrance Data ( reply) Interest ( reply) Camping Area Data cached here In Repo: has some general information like Map (in every router), popular movies (in the routers in hotel and camping area), etc. Service agreement: via a mobile APP: every user who wants to use Internet services in the national park has to open some space to cache some data

5 Why IP cannot work in this scenario From the security point of view, in this scenario, users Data have to be cached in other users mobile phone o o IP s channel-based security is not attractive; NDN s packet-based security looks better; From the mobility point of view, NDN can better handle consumer mobility when the Data is returned o IP may need name resolution server Fixed IP needs a centralized server for IP management; Dynamic IP may introduce triangular routing; o NDN use name-based routing; From the network point of view, in this scenario, routers (i.e., links) are connected via vehicles (mobile apps). The connection is not stable and delays might be quite long o o Due to TCP Chatiness (e.g., 3 hours handshake and 1 min transmission time for 1MB photo), IP cannot work in this scenario because it is based on end-to-end communication; On the other hand, NDN/DTN can work well because NDN is based on hop-by-hop communication;

6 Advantages of NDN for this use case Easy to provide Internet access in the area without cellular, Internet and limited GPS (very common in sightseeing places like a US national park) It is a easy deployment as these NDN routers do NOT need to be connected via wired links: only need to place some NDN routers in the popular area, only the router at the entrance has to have the Internet access (it is quite natural as the entrance area is usually covered by Internet) Combine the advantages of NDN and DTN Outside the national park, the communication can still be based on IP (protocol translation via a gateway) Can be implemented as a mobile APP

7 System Architecture Consumer: The client that requests data by sending Interest via an Android App; Producer: The server that provides the Consumer Android App requested data on Internet; Relay: The App user that conveys both Interest and Data to NDN router, using NDN Router cache; NDN Router: An NDN router that installs NFD and can perform caching Producer Internet Relay Android App functionality;

8 Sequence Flow between Consumer and NDN Router Consumer NDN Router If data is available in CS, return data; otherwise check PIT Interest Data Check CS If there are same request, then aggregate; otherwise create new PIT entry Check PIT Aggregate or create new entry

9 Sequence Flow between NDN Router and Relay NDN Router Relay Update Neighbor Hello ACK NDN Router periodically check if there are new Relay nearby NDN Router fetch data from Relay Forward Pending Interest Data Check CS Update PIT Forward Updated Pending Interest ACK Update PIT Check CS Cache Interests not matched Notification Forward Caching Interest Data Update PIT Relay fetch data from NDN Router

10 Sequence Flow between Entrance NDN Router and Internet NDN Router (Entrance) Internet If Internet use NDN, just send Interest to get Data; otherwise Gateway is needed Interest Data

11 Consumer NDN Router Relay Internet Interest Data Check CS Consumer <--> NDN Router Check PIT Aggregate or create new entry NDN Router <--> Relay Hello Update Neighbor ACK Sequence Flow Check CS and cache Interest not matched Send Pending Interest Data Update PIT ACK Notification Interest Data Check CS Update PIT Update PIT Interest NDN Router <--> Internet Data

12 Forwarding Strategies First-Fit Flooding Hit-Aware-Multicast

13 First-Fit Strategy

14 1 First-Fit Strategy

15 First-Fit Strategy 2 1

16 First-Fit Strategy 2 1 3

17 First-Fit Strategy

18 Flooding Strategy

19 1 Flooding Strategy

20 Flooding Strategy 2 1

21 Hit-Aware-Multicast Strategy User 1 Hit Count: 6 User 2 Hit Count: 2 User 3 Hit Count: 4

22 Hit-Aware-Multicast Strategy User 1 Hit Count: 6 1 User 2 Hit Count: 2 User 3 Hit Count: 4

23 Hit-Aware-Multicast Strategy User 1 2 Hit Count: 6 1 User 2 Hit Count: 2 User 3 Hit Count: 4

24 Android Application

25 Experiment M1 M4 M0 M2 M3

26 EXPERIMENTAL RESULTS

27 EXPERIMENTAL RESULTS

28 EXPERIMENTAL RESULTS

29 Thank you!

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Named Data Networking (NDN) CLASS WEB SITE: NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing

Named Data Networking (NDN) CLASS WEB SITE:   NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing CLASS WEB SITE: http://upmcsms.weebly.com/ Updated with Lecture Notes Named Data Networking (NDN) Introduction to NDN Named Data Networking (NDN) IP NDN Host-centric addressing Data-centric addressing

More information

NFD Development Progress. Beichuan Zhang The University Of Arizona

NFD Development Progress. Beichuan Zhang The University Of Arizona NFD Development Progress Beichuan Zhang The University Of Arizona NFD: NDN Forwarding Daemon A year ago, we made the first public release Open source (GPL3+) New flexible packet format based on TLV Modular

More information

Outline. CS5984 Mobile Computing. Wireless Access Networks model 1/3. Wireless Access Network and Mobile IP. Dr. Ayman Abdel-Hamid

Outline. CS5984 Mobile Computing. Wireless Access Networks model 1/3. Wireless Access Network and Mobile IP. Dr. Ayman Abdel-Hamid CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 Micro-mobility Outline MIPv4 Micro-mobility solutions Protocols Cellular IP HAWAII (Handoff-Aware Wireless

More information

Application aware access and distribution of digital objects using Named Data Networking (NDN)

Application aware access and distribution of digital objects using Named Data Networking (NDN) Application aware access and distribution of digital objects using Named Data Networking (NDN) July 4, 2017 Rahaf Mousa Supervisor: dr.zhiming Zhao University of Amsterdam System and Network Engineering

More information

Named Data Networking for 5G Wireless

Named Data Networking for 5G Wireless Named Data Networking for 5G Wireless Edmund Yeh Electrical and Computer Engineering Northeastern University New York University January 27, 2017 Overview NDN: a major information-centric networking architecture

More information

More wireless: Sensor networks and TCP on mobile hosts

More wireless: Sensor networks and TCP on mobile hosts More wireless: Sensor networks and TCP on mobile hosts CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) Outline Routing in sensor networks

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Quiz 7 May 14, 2015 Computer Engineering 80N

Quiz 7 May 14, 2015 Computer Engineering 80N Quiz 7 May 14, 2015 Computer Engineering 80N Left Neighbor: Right Neighbor: Keep this side up on your desk until you are told to turn the page over. This is a closed book quiz. No calculators. First Name

More information

ICAN: Information-Centric Context-Aware Ad-Hoc Network

ICAN: Information-Centric Context-Aware Ad-Hoc Network ICAN: Information-Centric Context-Aware Ad-Hoc Network Yu-Ting Yu, Chris Tandiono, Xiao Li, You Lu, M.Y. Sanadidi, and Mario Gerla University of California Los Angeles, CA 90095, USA {yutingyu, cbtandiono,

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

An overview of how packets are routed in the Internet

An overview of how packets are routed in the Internet An overview of how packets are routed in the Internet 1 Dijkstra s shortest path first algorithm (example of a Link State Algorithm ) 1. Exchange link state: A router floods to every other router the state

More information

ICN for Cloud Networking. Lotfi Benmohamed Advanced Network Technologies Division NIST Information Technology Laboratory

ICN for Cloud Networking. Lotfi Benmohamed Advanced Network Technologies Division NIST Information Technology Laboratory ICN for Cloud Networking Lotfi Benmohamed Advanced Network Technologies Division NIST Information Technology Laboratory Information-Access Dominates Today s Internet is focused on point-to-point communication

More information

CS 268: Wireless Transport Protocols. Kevin Lai Feb 13, 2002

CS 268: Wireless Transport Protocols. Kevin Lai Feb 13, 2002 CS 268: Wireless Transport Protocols Kevin Lai Feb 13, 2002 Motivation! Wireless connectivity proliferating - Satellite, line-of-sight microwave, line-of-sight laser, cellular data (CDMA, GPRS, 3G), wireless

More information

Cache and Forward Architecture

Cache and Forward Architecture Cache and Forward Architecture Shweta Jain Research Associate Motivation Conversation between computers connected by wires Wired Network Large content retrieval using wireless and mobile devices Wireless

More information

Homework 3 Discussion

Homework 3 Discussion Homework 3 Discussion Address Resolution Protocol (ARP) Data Link Layer Network Layer Data Link Layer Network Layer Protocol Data Unit(PDU) Frames Packets Typical Device Switch/Bridge Router Range Local

More information

TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks

TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks Jaebeom Kim, Daewook Shin, and Young-Bae Ko Department of Computer Engineering, Graduate School of Ajou University Suwon, Republic

More information

Routing Protocols. Autonomous System (AS)

Routing Protocols. Autonomous System (AS) Routing Protocols Two classes of protocols: 1. Interior Routing Information Protocol (RIP) Open Shortest Path First (OSPF) 2. Exterior Border Gateway Protocol (BGP) Autonomous System (AS) What is an AS?

More information

Page 1. EEC173B/ECS152C, Spring Wireless Mesh Networks. Wireless LAN or Cellular Networks. Introduction Flow Control Issues Rate Adaptation

Page 1. EEC173B/ECS152C, Spring Wireless Mesh Networks. Wireless LAN or Cellular Networks. Introduction Flow Control Issues Rate Adaptation EEC173B/ECS152C, Spring 2009 Wireless LAN or Cellular Networks Wireless Mesh Networks Introduction Flow Control Issues Rate Adaptation Access point Infrastructure Network (Internet) PSTN Network Base station

More information

Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation

Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Aytac Azgin, Ravishankar Ravindran, Guo-Qiang Wang aytac.azgin, ravi.ravindran, gq.wang@huawei.com Huawei Research Center, Santa

More information

Design of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri

Design of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Design of Link and Routing Protocols for Cache-and- Forward Networks Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Introduction Future Internet usage is expected to involve

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology Review Questions for exam Preparation (22-07-2017) 1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology 2. What is the Internet? "network

More information

Performance Evaluation of CCN

Performance Evaluation of CCN Performance Evaluation of CCN September 13, 2012 Donghyun Jang, Munyoung Lee, Eunsang Cho, Ted Taekyoung Kwon (Seoul National University), Byoung-Joon Lee, Myeong-Wuk Jang, Sang-Jun Moon (Samsung Electronics),

More information

MobilityFirst GSTAR: Generalized Storage Aware Routing

MobilityFirst GSTAR: Generalized Storage Aware Routing MobilityFirst GSTAR: Generalized Storage Aware Routing Samuel Nelson MobilityFirst Design Goals Design a future internet architecture that supports: Host and network mobility Diverse communication devices/entities/paradigms

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Routing in the Internet

Routing in the Internet Routing in the Internet Daniel Zappala CS 460 Computer Networking Brigham Young University Scaling Routing for the Internet 2/29 scale 200 million destinations - can t store all destinations or all prefixes

More information

UMOBILE ACM ICN 2017 Tutorial Opportunistic wireless aspects in NDN

UMOBILE ACM ICN 2017 Tutorial Opportunistic wireless aspects in NDN UMOBILE ACM ICN 2017 Tutorial Opportunistic wireless aspects in NDN ACM ICN 2017 Berlin 26.09.2017 Paulo Mendes, COPELABS / University Lusofona (paulo.mendes@ulusofona.pt) Omar Aponte, COPELABS / University

More information

NDN-NIC: Name-based Filtering on Network Interface Card

NDN-NIC: Name-based Filtering on Network Interface Card NDN-NIC: Name-based Filtering on Network Interface Card Junxiao Shi, Teng Liang, Beichuan Zhang (University of Arizona) Hao Wu, Bin Liu (Tsinghua University) Communication over shared media Each device

More information

Named Data Networking

Named Data Networking Named Data Networking Ronald van der Pol Outline! Goal of this project! Shortcomings of current internet! NDN basics! NDN forwarding! Naming example! Security! Personal opinion Goal of this

More information

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University Daniel Zappala CS 460 Computer Networking Brigham Young University 2/20 Scaling Routing for the Internet scale 200 million destinations - can t store all destinations or all prefixes in routing tables

More information

Optimal Cache Allocation for Content-Centric Networking

Optimal Cache Allocation for Content-Centric Networking Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,

More information

Table of Contents. Cisco Introduction to EIGRP

Table of Contents. Cisco Introduction to EIGRP Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Oi! Short Messaging in Opportunistic Wireless Named-Data Networks (Version 1.0)

Oi! Short Messaging in Opportunistic Wireless Named-Data Networks (Version 1.0) Oi! Short Messaging in Opportunistic Wireless Named-Data Networks (Version 1.0) Technical Report COPE-SITI-TR-18-03 January 31 st, 2018 Editor Omar Aponte (COPELABS/ULHT) Authors Omar Aponte (COPELABS/ULHT)

More information

VANET via Named Data Networking

VANET via Named Data Networking VANET via Named Data Networking Giulio Grassi, Davide Pesavento, Giovanni Pau, Rama Vuyyuru, Ryuji Wakikawa, Lixia Zhang LIP6 Université Pierre et Marie Curie, Sorbonne Universités Paris, France Computer

More information

Performance Study of CCNx

Performance Study of CCNx Performance Study of CCNx Haowei Yuan Networking Research Seminar 3/18/2013 My Topic for Today Industry participation in content centric networking Emerging networks consortium Our performance study of

More information

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. CS118 Discussion 1A, Week 9 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Wireless: 802.11 Mobile IP Cellular Networks: LTE Sample final 2 Wireless and Mobile Network Wireless access: WIFI

More information

Running IoT Applications over ICN: A Guided Journey to NDN, RIOT, CCN-lite and NFN

Running IoT Applications over ICN: A Guided Journey to NDN, RIOT, CCN-lite and NFN ACM ICN-2017 Tutorial 1 Running IoT Applications over ICN: A Guided Journey to NDN, RIOT, CCN-lite and NFN at the Freie Universität Berlin, Sep 26, 2017 Welcome and a gentle introduction to ICN Alex Afanasyev,

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Set-up for Use of Environics Mobility Suite

Set-up for Use of Environics Mobility Suite Set-up for Use of Environics Mobility Suite The Mobility Suite can be downloaded for free from the Android Marketplace. Note that the initial release of the App, 1.0, is for use on any Android device and

More information

Community Aware Content Retrieval in Disruption-Tolerant Networks

Community Aware Content Retrieval in Disruption-Tolerant Networks Community Aware Content Retrieval in Disruption-Tolerant Networks You Lu, Mario Gerla Department of Computer Science University of California, Los Angeles Los Angeles, USA {youlu, gerla}@cs.ucla.edu Abstract

More information

A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms

A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms Ngo Quang Minh, Ryo Yamamoto, Satoshi Ohzahata, and Toshihiko Kato University of Electro-Communications

More information

Network Protocols and Architectures

Network Protocols and Architectures Network Protocols and Architectures Introduction 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

Principles behind data link layer services:

Principles behind data link layer services: Data Link Layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

A Light-Weight Forwarding Plane for Content-Centric Networks

A Light-Weight Forwarding Plane for Content-Centric Networks A Light-Weight Forwarding Plane for Content-Centric Networks J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering,

More information

How does a router know where to send a packet next?

How does a router know where to send a packet next? How does a router know where to send a packet next? The Problem Which path should packets take from A to B? A B R2 R R4 R3 C D 2 The Internet forwards packets hop-by-hop Data IP Address Next-hop A R B

More information

Networks and Distributed Systems. Sarah Diesburg Operating Systems CS 3430

Networks and Distributed Systems. Sarah Diesburg Operating Systems CS 3430 Networks and Distributed Systems Sarah Diesburg Operating Systems CS 3430 Technology Trends Decade Technology $ per machine Sales volume Users per machine 50s $10M 100 1000s 60s Mainframe $1M 10K 100s

More information

Supporting Mobility in MobilityFirst

Supporting Mobility in MobilityFirst Supporting Mobility in MobilityFirst F. Zhang, K. Nagaraja, T. Nguyen, D. Raychaudhuri, Y. Zhang WINLAB, Rutgers University Technology Centre of NJ 671 Route 1, North Brunswick, NJ 08902, USA Mobile Data

More information

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Prof. D. Raychaudhuri ray@winlab.rutgers.edu www.winlab.rutgers.edu 1 Introduction: The Promise of Wireless Everywhere

More information

Opportunistic Web Access via WLAN Hotspots

Opportunistic Web Access via WLAN Hotspots Opportunistic Web Access via WLAN Hotspots Mikko Pitkänen, Teemu Kärkkäinen, and Jörg Ott DTNRG, 2010-07-30 Agenda Introduction: Urban Pedestrians and Hotspot Access Opportunistic Web Access DTN-based

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer Dmitri Loguinov Texas A&M University March 29, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Homework #3

More information

Named Data Networking and Service Migration in the IoT

Named Data Networking and Service Migration in the IoT 1 d Data Networking and Service Migration in the IoT ADISORN LERTSINSRUBTAVEE, UNIVERSITY OF CAMBRIDGE ARJUNA SATHIASEELAN, UNIVERSITY OF CAMBRIDGE UPEKA DA SILVA, ASIAN INSTITUTE OF TECHNOLOGY (AIT) KANCHANA

More information

PiCasso: Information-Centric Edge Computing Platform for Community Mesh Networks

PiCasso: Information-Centric Edge Computing Platform for Community Mesh Networks PiCasso: Information-Centric Edge Computing Platform for Community Mesh Networks Adisorn Lertsinsrubtavee University of Cambridge IRTF GAIA Meeting, IETF 101, London 22 March 2018 1 Environment: Data centers

More information

CS3516 B10 Computer Networks Final Exam December 14, 2010

CS3516 B10 Computer Networks Final Exam December 14, 2010 Name CS3516 B10 Computer Networks Final Exam December 14, 2010 Question Points Score 0 1 1 27 2 8 3 12 4 7 5 2 6 6 7 3 8 6 9 3 10 9 11 3 12 2 13 8 14 2 15 2 Total 100 Trivia Question (1 extra credit point)

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.15 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

Lab Configuring Advanced EIGRP for IPv4 Features Topology

Lab Configuring Advanced EIGRP for IPv4 Features Topology Topology 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9 Addressing Table Device Interface IP Address Subnet Mask Default Gateway G0/0 192.168.1.1 255.255.255.0

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

Routing with a distance vector protocol - EIGRP

Routing with a distance vector protocol - EIGRP Routing with a distance vector protocol - EIGRP Introducing Routing and Switching in the Enterprise Chapter 5.2 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License

More information

Design and development of the reactive BGP peering in softwaredefined routing exchanges

Design and development of the reactive BGP peering in softwaredefined routing exchanges Design and development of the reactive BGP peering in softwaredefined routing exchanges LECTURER: HAO-PING LIU ADVISOR: CHU-SING YANG (Email: alen6516@gmail.com) 1 Introduction Traditional network devices

More information

Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN

Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN Takahiro YONEDA, Ryota OHNISHI, Eiichi MURAMOTO(Presenter),, Panasonic Corporation Jeff Burke, UCLA Contact: muramoto.eiichi@jp.panasonic.com

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 Micro-mobility 1 Outline solutions 2 Local-area Mobility Solutions Within the Mobile IP framework Regional

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks 1896 1920 1987 2006 Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks Ying Cui Shanghai Jiao Tong University, Shanghai, China Joint work with Fan Lai, Feng Qiu, Wenjie

More information

Introduction to Information Centric Networking

Introduction to Information Centric Networking Introduction to Information Centric Networking... with a Dash of Security Claudio Marxer Computer Networks Group University of Basel Switzerland Open Source IoT & Blockchain

More information

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Oxford University Press 2007. All rights reserved. 1 Temporally ordered routing algorithm (TORA) A reactive

More information

Ch. 5 Maintaining and Troubleshooting Routing Solutions. Net412- Network troubleshooting

Ch. 5 Maintaining and Troubleshooting Routing Solutions. Net412- Network troubleshooting Ch. 5 Maintaining and Troubleshooting Routing Solutions Net412- Network troubleshooting Troubleshooting Routing Network Layer Connectivity EIGRP OSPF 2 Network Connectivity Just like we did when we looked

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

On the Analysis of Caches with Pending Interest Tables

On the Analysis of Caches with Pending Interest Tables On the Analysis of Caches with Pending Interest Tables Mostafa Dehghan 1, Bo Jiang 1 Ali Dabirmoghaddam 2, Don Towsley 1 1 University of Massachusetts Amherst 2 University of California Santa Cruz ICN,

More information

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 ECE374: Homework 4 1 Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can

More information

Advanced Networking: Routing & Switching 2 Chapter 7

Advanced Networking: Routing & Switching 2 Chapter 7 EIGRP Advanced Networking: Routing & Switching 2 Chapter 7 Copyleft 2014 Hacklab Cosenza (http://hlcs.it) Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright

More information

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani (in collaboration with Ming Li, Devesh Agrawal, Deepak Ganesan, Aruna Balasubramanian, Brian Levine, Xiaozheng Tie at UMass

More information

MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours

MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours Jean-Yves Le Boudec 2005 December 8 Do not forget to put your names on all sheets of your solution. If you need to make assumptions in order to solve some

More information

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand

More information

Location Oriented Networking

Location Oriented Networking Location Oriented Networking Daniel Alves University of California Santa Cruz dalves@ucsc.edu Suppose you want to send a message to everyone in this room Use location information on the network Message

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK

CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK Le Van Minh a,b, Yang MingChuan a, and Guo Qing a a Communication research center, Harbin Institute of Technology,

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

Configuring PIM snooping

Configuring PIM snooping Contents Configuring snooping 1 snooping overview 1 Configuring snooping 2 Displaying and maintaining snooping 2 snooping configuration example 3 Troubleshooting snooping 6 snooping does not work 6 Some

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

Transport Layer Review

Transport Layer Review Transport Layer Review Mahalingam Mississippi State University, MS October 1, 2014 Transport Layer Functions Distinguish between different application instances through port numbers Make it easy for applications

More information

EXAM TCP/IP NETWORKING Duration: 3 hours

EXAM TCP/IP NETWORKING Duration: 3 hours SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to

More information

Understanding Networking Fundamentals

Understanding Networking Fundamentals Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation

More information

Problem Set 10 Due: Start of class December 11

Problem Set 10 Due: Start of class December 11 CS242 Computer Networks Handout # 20 Randy Shull December 4, 2017 Wellesley College Problem Set 10 Due: Start of class December 11 Reading: Kurose & Ross, Sections 7.1 7.3, 8.1 8.4 Wireshark Lab [16] Recall

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

Configuring STP and RSTP

Configuring STP and RSTP 7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains

More information

UMOBILE in a nutshell. Christos-Alexandros Sarros Research assistant, Athena Research and Innovation Center

UMOBILE in a nutshell. Christos-Alexandros Sarros Research assistant, Athena Research and Innovation Center UMOBILE in a nutshell Christos-Alexandros Sarros Research assistant, Athena Research and Innovation Center Tutorial Overview - UMOBILE in a nutshell - ATHENA, Christos-Alexandros Sarros - The UMOBILE Lab

More information

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction

More information

End-to-End Transport Layer Services in the MobilityFirst Network

End-to-End Transport Layer Services in the MobilityFirst Network End-to-End Transport Layer Services in the MobilityFirst Network Kai Su, Francesco Bronzino, Dipankar Raychaudhuri, K.K. Ramakrishnan WINLAB Research Review Winter 2014 Transport Services From TCP/IP to

More information

CUWN Release 8.2 mdns Gateway with Chromecast Support Feature Deployment Guide

CUWN Release 8.2 mdns Gateway with Chromecast Support Feature Deployment Guide CUWN Release 8.2 mdns Gateway with Chromecast Support Feature Deployment Guide Chromecast 2 Deployment Considerations 2 Chromecast Deployment using mdns Gateway/ Feature Benefit 3 Components Used 3 Configuring

More information