MITATE: Mobile Internet Testbed for Application Traffic Experimentation

Size: px
Start display at page:

Download "MITATE: Mobile Internet Testbed for Application Traffic Experimentation"

Transcription

1 MITATE: Mobile Internet Testbed for Application Traffic Experimentation Utkarsh Goel, Ajay Miyyapuram, Mike P. Wittie, Qing Yang Montana State University - Bozeman November 25 th, 2013 Computer Science Monday Seminar 1

2 Societal problem In many ways the causes of end-to-end network delay are not technological, but economic in nature. Reductions to end-to-end delays are unlikely to come from improvements of network mechanisms alone. Application communication protocols must be smart enough to adapt to changing network performance to keep communication delay low. To design and validate adaptive communication protocols, developers need to prototype their implementations in production networks. 2

3 Contd. Measure end-to-end delays Evaluate new network mechanisms USER APP SERVER DEVELOPER RESEARCHER 3

4 MITATE A new platform for mobile application prototyping in live mobile networks. Allows experimentation with custom mobile application traffic between mobile devices and cloud infrastructure endpoints. A collaborative framework, in which participants contribute their mobile network resources and are allowed, in turn, to run their traffic experiments on others devices. Open to the public and being deployed on Google s Measurement Lab (M-Lab). 4

5 Developers without MITATE Application Implementation Mobile Devices Back-end Servers Want to measure traffic delays. Have to deploy code to do so. //app code int main() App Traffic //srvr code int main() //app code int main() App Traffic //srvr code int main() Small number of volunteered devices Downsides of code deployment Security concerns over mobile code Restrictive APIs 5

6 How does MITATE help developers? MITATE separates traffic generation from application logic Application Implementation Mobile Devices Back-end Servers XML: App Traffic //app code int main() App Traffic //srvr code int main() MITATE App Traffic MITATE 6

7 MITATE s traffic definition Generate traffic definitions in a form of well structured XML by defining what the traffic looks like? where the traffic is going? when the traffic is to be sent? which mobile device should execute the experiment? 7

8 Defining a transfer <transfer> <id>transfer1</id> <src>client</src> <dst> </dst> <protocol>udp</protocol> <dstport>5060</dstport> <bytes>32</bytes> <response>0</response> </transfer> other parameters include: Transmission delay No. of packets Explicit content 8

9 Defining a packet content <content> <contentid>content1</contentid> <protocol>skype</protocol> <data> <![CDATA[0x0100be07de55...]]> </data> <contenttype>hex</contenttype> </content> 9

10 Defining a criteria <criteria> <id>criteria1</id> <latlong>" "</latlong> <radius>5000</radius> <networktype>cellular</networktype> <starttime>12:00</starttime> <endtime>13:30</endtime> </criteria> other parameters include: Network carrier Minimum battery power Minimum signal strength Device model name 10

11 Summing up all the definitions <transaction count= 10 > <criteria> <criteriaid>criteria1</criteriaid> </criteria> <transfers> <transferid delay= 10 repeat= 1 >transfer1</transferid> <transferid delay= 20 repeat= 2 >transfer2</transferid> <transferid delay= 10 repeat= 1 >transfer1</transferid> </transfers> </transaction> 11

12 How does MITATE help developers? MITATE separates traffic generation from application logic Application Implementation Mobile Devices Back-end Servers XML: App Traffic //app code int main() App Traffic //srvr code int main() MITATE App Traffic MITATE where performance of intermediate solutions are the reported metrics in each experiment round Large number of volunteered devices Upsides of using MITATE No mobile code only traffic description shipped to mobiles Flexibility in traffic generation logic 12

13 Researchers without MITATE Call your friends Measure network performance Latency Loss Bandwidth line up a few volunteered devices configure network simulators Low device and setting diversity Configured simulations do not reflect traffic shaping mechanisms 13

14 Challenges in deploying large scale testbed Assure sufficient resource capacity for scheduled experiments. (Limiting resource is mobile data, subject to monthly caps) Entice users to contribute resources Protect contributed resources from abuse. MITATE jointly addresses both problems using a data credit exchange system inspired by BitTorrent tit-for-tat mechanisms 14

15 Security & privacy concerns Personal mobile devices have the potential for violations of privacy if a device owner s activity and personally identifiable information were to become public. MITATE s security design protects user privacy, the volunteered devices, and non-mitate Internet resources. That was a very interesting cell phone conversation. Thanks for sharing it with me 15

16 Protecting user privacy & user device Only active traffic experiments and cannot monitor non-mitate traffic. User can set usage limits for mobile data, Wi-Fi data, and battery level on their devices. We separate all data collected on devices from personally identifiable user account information 16

17 Protecting Non-MITATE resources Avoid DDoS attacks configured as MITATE experiments. Limit traffic by placing a credit limit. A MITATE user may request that multiple devices send data simultaneously, the user s credit will be rapidly depleted. So even if the transmissions are malicious, they will be short-lived. 17

18 Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 18

19 Message delay vs. message size at 10AM on CSP 1 to a CA datacenter Asymmetric network provisioning 19

20 Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 20

21 Downlink message delay vs. transmission interval on CSP1 and CSP2 Network allocation timeouts causes delay 21

22 Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 22

23 Effect of payload on CSP1 MITATE can detect content based traffic shaping 23

24 Effect of choice of transport protocols Packet loss due to traffic policing, rather than traffic shaping 24

25 Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 25

26 Measurement based CDN selection CDN2 provides the best combination of performance 26

27 Conclusions MITATE is the first public testbed that supports prototyping of application communications between mobiles and cloud datacenters. MITATE separates application logic from traffic generation, which simplifies security and resource sharing mechanisms. We have presented data collected with MITATE experiments that affects mobile application message delay. 27

28 Where can you find MITATE Our preliminary design and limited validation of MITATE s measurement techniques will be published at Mobiquitous 13 in December of this year. (NEW) MITATE s approach has been announced through a - poster at USENIX NSDI 13 - presentation at ACM IMC

29 Learn more Web URL: Code Repo: Utkarsh Goel 29

MITATE: Mobile Internet Testbed for Application Traffic Experimentation

MITATE: Mobile Internet Testbed for Application Traffic Experimentation MITATE: Mobile Internet Testbed for Application Traffic Experimentation A new platform for mobile application prototyping in live mobile networks. Open to the public and being deployed on M-Lab. 1 Why

More information

Quality Assurance of a Mobile Network Measurement Testbed Through Systematic Software Testing

Quality Assurance of a Mobile Network Measurement Testbed Through Systematic Software Testing Quality Assurance of a Mobile Network Measurement Testbed Through Systematic Software Testing Utkarsh Goel, James Espeland, Upulee Kanewala, and Mike P. Wittie SEDE 2016 Motivation Application developers

More information

MOBILE (cellular) network applications deliver interactive

MOBILE (cellular) network applications deliver interactive IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 18, NO. 1, FIRST QUARTER 2016 105 Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services Utkarsh Goel, Mike P. Wittie, Kimberly C. Claffy,

More information

NaaS Network-as-a-Service in the Cloud

NaaS Network-as-a-Service in the Cloud NaaS Network-as-a-Service in the Cloud joint work with Matteo Migliavacca, Peter Pietzuch, and Alexander L. Wolf costa@imperial.ac.uk Motivation Mismatch between app. abstractions & network How the programmers

More information

Part I: Future Internet Foundations: Architectural Issues

Part I: Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues 3 Introduction The Internet has evolved from a slow, person-to-machine, communication

More information

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) APPLICATION DEPLOYMENT IN FUTURE GLOBAL MULTI-CLOUD ENVIRONMENT Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) GITMA 2015 Conference, St. Louis, June 23, 2015 These

More information

Active Measurement of Data-Path Quality in a Non-cooperative Internet

Active Measurement of Data-Path Quality in a Non-cooperative Internet Active Measurement of Data-Path Quality in a Non-cooperative Internet Rocky K. C. Chang Internet Infrastructure and Security Group 7 Oct. 2010 Active Measurement of Data-Path Quality in a Non-cooperative

More information

CE Advanced Network Security Anonymity II

CE Advanced Network Security Anonymity II CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

Understanding the Evolving Internet

Understanding the Evolving Internet Understanding the Evolving Internet Ram Durairajan Assistant Professor, Computer and Information Science Co-director, Oregon Networking Research Group University of Oregon 0 Internet is a complex system

More information

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things Tilman Wolf 1 and Anna Nagurney 2 1 Department of Electrical and Computer

More information

Broadband Internet Access Disclosure

Broadband Internet Access Disclosure Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided

More information

Connectivity to Cloud-First Applications

Connectivity to Cloud-First Applications Aruba and Riverbed Partner to Accelerate and Optimize Mobile-First Connectivity to Cloud-First Applications Today s workforce is more distributed, more mobile, and more demanding. Constant availability

More information

SEVONE END USER EXPERIENCE

SEVONE END USER EXPERIENCE Insight for the Connected World End User Experience [ DataSheet ] SEVONE END USER EXPERIENCE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure

More information

In-Band Flow Establishment for End-to-End QoS in RDRN. Saravanan Radhakrishnan

In-Band Flow Establishment for End-to-End QoS in RDRN. Saravanan Radhakrishnan In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan Organization Introduction Motivation QoS architecture Flow Establishment Protocol QoS Layer Experiments and Results Conclusion

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Presented by: Fabián E. Bustamante

Presented by: Fabián E. Bustamante Presented by: Fabián E. Bustamante A. Nikravesh, H. Yao, S. Xu, D. Choffnes*, Z. Morley Mao Mobisys 2015 *Based on the authors slides Mobile apps are increasingly popular Mobile platforms is the dominant

More information

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.

More information

xpeeriences in the World of Online Gaming

xpeeriences in the World of Online Gaming xpeeriences in the World of Online Gaming DE-CIX Customer Summit 2016 Jens Osterloh 1 What we do: Providing infrastructure and services for companies in the online gaming industry - Game Publishing: Low

More information

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA   White Paper Nomadix Service Engine Access in Large Public Venues Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agoura Road Suite 102 Agoura Hills CA 91301 USA www.nomadix.com 230-1026-001 Sheet 2 of 9 Introduction

More information

Naresh Soni CTO, InterDigital

Naresh Soni CTO, InterDigital March 5, 2012 WTC 2012 Challenges and Innovations in LTE Deployment Naresh Soni CTO, InterDigital Agenda InterDigital Overview Key Trends Key Challenges in LTE Innovative Solutions for LTE Deployment Summary

More information

Running A Highly Scaled Registry DNS Platform. ICANN 55 Tech Day Anycast Panel Chris Griffiths -

Running A Highly Scaled Registry DNS Platform. ICANN 55 Tech Day Anycast Panel Chris Griffiths - ICANN 55 Tech Day Anycast Panel Chris Griffiths - chris.griffiths@nominet.uk 1 About Nominet WE ARE AN INTERNATIONAL INTERNET COMPANY DELIVERING PUBLIC BENEFIT As an operator of one of the largest Registries

More information

Internet Inter-Domain Traffic. C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010

Internet Inter-Domain Traffic. C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010 Internet Inter-Domain Traffic C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010 Motivation! Measuring the Internet is hard! Significant previous work on Router

More information

Wireless 20/20. Business Case for MulteFire Technology. February 27, 2018

Wireless 20/20. Business Case for MulteFire Technology. February 27, 2018 Wireless 20/20 Business Case for MulteFire Technology February 27, 2018 1 Key Trends in Future Wireless Market MNOs challenged keep up with continuous increase in CapEx to meet growing demand Need for

More information

Network infrastructure, routing and traffic. q Internet inter-domain traffic q Traffic estimation for the outsider

Network infrastructure, routing and traffic. q Internet inter-domain traffic q Traffic estimation for the outsider Network infrastructure, routing and traffic q Internet inter-domain traffic q Traffic estimation for the outsider Internet Inter-Domain Traffic C. Labovitz, S. Lekel-Johnson, D. McPherson, J. Oberheide,

More information

Developing Enterprise Cloud Solutions with Azure

Developing Enterprise Cloud Solutions with Azure Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

Carrier SDN for Multilayer Control

Carrier SDN for Multilayer Control Carrier SDN for Multilayer Control Savings and Services Víctor López Technology Specialist, I+D Chris Liou Vice President, Network Strategy Dirk van den Borne Solution Architect, Packet-Optical Integration

More information

Pulseway Security White Paper

Pulseway Security White Paper Pulseway Security White Paper Table of Contents 1. Introduction 2. Encryption 2.1 Transport Encryption 2.2 Message Encryption 3. Brute-Force Protection 4. DigiCert Code Signing Certificate 5. Datacenter

More information

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 Bring Your Own???? 2 Bring Your Own Device cannot be ignored About 50% Workers

More information

Mobile Edge Computing:

Mobile Edge Computing: Mobile Edge Computing: Accelerating to 5G Era Hannu Flinck January 2016 1 Nokia 2015 Current megatrends Mobile computing, 5G and cloud computing Mobile computing Cloud computing 2 Nokia 2015 Architecture

More information

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Solution Brief Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Evolving Needs for WAN Network Architecture Enterprise networks have historically been architected to provide users access

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

Practical Guide to Platform as a Service.

Practical Guide to Platform as a Service. Practical Guide to Platform as a Service http://cloud-council.org/resource-hub.htm#practical-guide-to-paas December 3, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards!

More information

SDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged

SDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged SDN Use-Cases internet exchange, home networks TELE4642: Week8 Materials from Prof. Nick Feamster is gratefully acknowledged Overview n SDX: A Software-Defined Internet Exchange n SDN-enabled Home Networks

More information

Automated Assessment of Security Risks for Mobile Applications

Automated Assessment of Security Risks for Mobile Applications Automated Assessment of Security Risks for Mobile Applications Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie Department of Computer Science North Carolina State University Lookout Mobile

More information

The UCSD Network Telescope

The UCSD Network Telescope The UCSD Network Telescope Colleen Shannon cshannon @ caida.org NSF CIED Site Visit November 22, 2004 UCSD CSE Motivation Blocking technologies for automated exploits is nascent and not widely deployed

More information

ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis - Tunisia, Feb. 2017

ITU Arab Forum on Future Networks: Broadband Networks in the Era of App Economy, Tunis - Tunisia, Feb. 2017 On the ROAD to 5G Ines Jedidi Network Products, Ericsson Maghreb ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis - Tunisia, 21-22 Feb. 2017 agenda Why 5G? What

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS677 Guest Lecture Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Data Centers and Cloud Computing. Slides courtesy of Tim Wood

Data Centers and Cloud Computing. Slides courtesy of Tim Wood Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Reliable Stream Analysis on the Internet of Things

Reliable Stream Analysis on the Internet of Things Reliable Stream Analysis on the Internet of Things ECE6102 Course Project Team IoT Submitted April 30, 2014 1 1. Introduction Team IoT is interested in developing a distributed system that supports live

More information

Cisco Borderless Networks Value Proposition

Cisco Borderless Networks Value Proposition Cisco Borderless Networks Value Proposition Enabling the Borderless Organization 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Why Borderless Networks? Cisco s Architectural Approach

More information

NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet.

NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet. A NEW KIND OF NETWORK NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet. W H Y Shortcomings of today s Internet The Missing

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Radon: Network QoS. Andrew Shewmaker Carlos Maltzahn Katia Obraczka Scott Brandt Ivo Jimenez. UC Santa Cruz Graduate Studies in Computer Science

Radon: Network QoS. Andrew Shewmaker Carlos Maltzahn Katia Obraczka Scott Brandt Ivo Jimenez. UC Santa Cruz Graduate Studies in Computer Science Radon: Network QoS Andrew Shewmaker Carlos Maltzahn Katia Obraczka Scott Brandt Ivo Jimenez UC Santa Cruz Graduate Studies in Computer Science Oct 22nd, 2013 This research was made possible by LANL, Cisco,

More information

Towards Pervasive and Mobile Gaming with Distributed Cloud Infrastructure. Teemu Kämäräinen, Matti Siekkinen, Yu Xiao, Antti Ylä-Jääski

Towards Pervasive and Mobile Gaming with Distributed Cloud Infrastructure. Teemu Kämäräinen, Matti Siekkinen, Yu Xiao, Antti Ylä-Jääski Towards Pervasive and Mobile Gaming with Distributed Cloud Infrastructure Teemu Kämäräinen, Matti Siekkinen, Yu Xiao, Antti Ylä-Jääski Introduction Background In Mobile Cloud Gaming the game is rendered

More information

Joint Server Selection and Routing for Geo-Replicated Services

Joint Server Selection and Routing for Geo-Replicated Services Joint Server Selection and Routing for Geo-Replicated Services Srinivas Narayana Joe Wenjie Jiang, Jennifer Rexford and Mung Chiang Princeton University 1 Large-scale online services Search, shopping,

More information

SOMETIME1 SOftware defined network-based Available Bandwidth MEasuremenT In MONROE

SOMETIME1 SOftware defined network-based Available Bandwidth MEasuremenT In MONROE SOMETIME1 SOftware defined network-based Available Bandwidth MEasuremenT In MONROE Network Traffic Measurement and Analysis conference (TMA) Dublin, Ireland, June 21-23, 2017 Giuseppe Aceto, Valerio Persico,

More information

CS268: Beyond TCP Congestion Control

CS268: Beyond TCP Congestion Control TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s

More information

NSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015

NSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 NSF Transition to Practice Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 Networking and IT Research and Development (NITRD) FY16 Supplement

More information

PRISM: Platform for Remote Sensing using Smartphones

PRISM: Platform for Remote Sensing using Smartphones PRISM: Platform for Remote Sensing using Smartphones Tathagata Das Microsoft Research India Bangalore 560080, India tathadas@microsoft.com Prashanth Mohan University of California, Berkeley Berkeley, CA

More information

Creating the Future on the Shoulders of a Giant ZTE Flagship Tbit Optical Platform

Creating the Future on the Shoulders of a Giant ZTE Flagship Tbit Optical Platform Creating the Future on the Shoulders of a Giant ------ZTE Flagship Tbit Optical Platform Led by the rapid development of emerging services including HD (high definition) video, VR (virtual reality) and

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Quality of Services 1. Terminology 2. Technologies 2 Terminology Quality of service Ability to control network performance in order to meet application and/or end-user requirements Examples of parameters

More information

Overview. CPS Architecture Overview. Operations, Administration and Management (OAM) CPS Architecture Overview, page 1 Geographic Redundancy, page 5

Overview. CPS Architecture Overview. Operations, Administration and Management (OAM) CPS Architecture Overview, page 1 Geographic Redundancy, page 5 CPS Architecture, page 1 Geographic Redundancy, page 5 CPS Architecture The Cisco Policy Suite (CPS) solution utilizes a three-tier virtual architecture for scalability, system resilience, and robustness

More information

SEVONE DATA APPLIANCE FOR EUE

SEVONE DATA APPLIANCE FOR EUE Insight for the Connected World Data Appliance for EUE [ DataSheet ] SEVONE DATA APPLIANCE FOR EUE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure

More information

IXP economic aspect and benefits

IXP economic aspect and benefits IXP economic aspect and benefits M. Sall modou.sall@orange-sonatel.com Slide 1 ITU IXP Workshop September 28 th, 2015 Copyright Sonatel. All rights reserved Outline Context Content Distribution and Hosting

More information

Distributed Sensing for Spectrum Agility: Incentives and Security Considerations

Distributed Sensing for Spectrum Agility: Incentives and Security Considerations Distributed Sensing for Spectrum Agility: Incentives and Security Considerations S. Arkoulis, P. Frangoudis, G. Marias, G. Polyzos Athens University of Economics and Business {arkoulistam,pfrag,marias,polyzos}@aueb.gr

More information

Transport Protocols for Data Center Communication. Evisa Tsolakou Supervisor: Prof. Jörg Ott Advisor: Lect. Pasi Sarolahti

Transport Protocols for Data Center Communication. Evisa Tsolakou Supervisor: Prof. Jörg Ott Advisor: Lect. Pasi Sarolahti Transport Protocols for Data Center Communication Evisa Tsolakou Supervisor: Prof. Jörg Ott Advisor: Lect. Pasi Sarolahti Contents Motivation and Objectives Methodology Data Centers and Data Center Networks

More information

Credit based Flow Control PAR, 5 Criteria & Objectives

Credit based Flow Control PAR, 5 Criteria & Objectives Credit based Flow Control PAR, 5 Criteria & Objectives Results of 2/20/14 DCB TG CC discussion new dcb lynch cb flow control par 5c obj 0214 v02 1 PROJECT AUTHORIZATION REQUEST Based on IEEE 802 LMSC Operations

More information

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT

More information

Odin: Microsoft s Scalable Fault-

Odin: Microsoft s Scalable Fault- Odin: Microsoft s Scalable Fault- Tolerant CDN Measurement System Matt Calder Manuel Schröder, Ryan Gao, Ryan Stewart, Jitendra Padhye, Ratul Mahajan, Ganesh Ananthanarayanan, Ethan Katz-Bassett NSDI,

More information

Over-The-Top (OTT) Aggregation Solutions

Over-The-Top (OTT) Aggregation Solutions Over-The-Top (OTT) Aggregation Solutions Omkar Dharmadhikari, Wireless Architect odharmadhikari@cablelabscom CableLabs February 12, 2019 Agenda Introduction Why aggregation is important? Traditional Aggregation

More information

Beyond Blind Defense: Gaining Insights from Proactive App Sec

Beyond Blind Defense: Gaining Insights from Proactive App Sec Beyond Blind Defense: Gaining Insights from Proactive App Sec Speaker Rami Essaid CEO Distil Networks Blind Defense Means Trusting Half Your Web Traffic 46% of Web Traffic is Bots Source: Distil Networks

More information

Mobile QoE and Service Composition

Mobile QoE and Service Composition Mobile QoE and Service Composition Vasilios A. Siris Mobile Multimedia Laboratory Department of Informatics Athens University of Economics and Business vsiris@aueb.gr http://www.aueb.gr/users/vsiris/ COST

More information

Azure Certification BootCamp for Exam (Developer)

Azure Certification BootCamp for Exam (Developer) Azure Certification BootCamp for Exam 70-532 (Developer) Course Duration: 5 Days Course Authored by CloudThat Description Microsoft Azure is a cloud computing platform and infrastructure created for building,

More information

Connected Mobile Experiences (CMX) Aligning Use Cases and Technology

Connected Mobile Experiences (CMX) Aligning Use Cases and Technology Connected Mobile Experiences (CMX) Aligning Use Cases and Technology Jagdish Girimaji, Manager, Product Marketing Daryl Coon, Product Manager, Product and Solutions Marketing PSOEWN-3246 Agenda Introduction

More information

AT&T SD-WAN Network Based service quick start guide

AT&T SD-WAN Network Based service quick start guide AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy

More information

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant Smart and Secured Infrastructure Rajesh Kumar Technical Consultant IoT Use Cases Smart Cities Connected Vehicles / V2X / ITS Industrial Internet / IIoT / Industry 4.0 Enterprise IoT / Smart Buildings Technical

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

A Global Operating System «from the Things to the Clouds»

A Global Operating System «from the Things to the Clouds» GRUPPO TELECOM ITALIA EAI International Conference on Software Defined Wireless Networks and Cognitive Technologies for IoT Rome, 26th October 2015 A Global Operating System «from the Things to the Clouds»

More information

Citrix Tech Zone Citrix Product Documentation docs.citrix.com November 13, 2018

Citrix Tech Zone Citrix Product Documentation docs.citrix.com November 13, 2018 Citrix Product Documentation docs.citrix.com November 13, 2018 Contents Citrix Tech Zone - Learn 3 Tech Insights 3 Tech Briefs 3 Diagrams and Posters 4 Citrix Tech Zone - Design 4 Design Decisions 4 Citrix

More information

The Growing Problem of Mobile Adware

The Growing Problem of Mobile Adware A MONTHLY MOBILE REVIEW The Growing Problem of Mobile Adware SEPTEMBER 2012 This monthly report reviews the mobile landscape including the findings of Trend Micro engineers and researchers. In this report

More information

A Software Defined Approach to Unified IPv6 Transition

A Software Defined Approach to Unified IPv6 Transition A Software Defined Approach to Unified IPv6 Transition Collaborators China Telecom Qiong Sun Chongfeng Xie Telefonica I+D Diego Lopez (Presenter) University Huawei Felix Lu Tina Tsou Haiyong Xie Spencer

More information

Like it or not: Stefan Schmid (TU Berlin & T-Labs)

Like it or not: Stefan Schmid (TU Berlin & T-Labs) Like it or not: Stefan Schmid (TU Berlin & T-Labs) 1 Like it or not: The world becomes virtualized, software-defined, and distributed Stefan Schmid (TU Berlin & T-Labs) 2 Internet Trends: Virtualized 3

More information

UC Assessor A cloud-based UC network assessment solution. Getting Started Guide

UC Assessor A cloud-based UC network assessment solution. Getting Started Guide UC Assessor A cloud-based UC network assessment solution Getting Started Guide December 2018 Copyright Copyright 2000-2018 Integrated Research Limited (ABN 76 003 588 449). All rights reserved. This guide

More information

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway? HOW WORKS And Who Needs a Content Distribution Network Anyway? Efficient and Inefficient Networks If all networks were fast, efficient, and never suffered from congestion there wouldn t be any need for

More information

A Flexible Model for Resource Management in Virtual Private Networks. Presenter: Huang, Rigao Kang, Yuefang

A Flexible Model for Resource Management in Virtual Private Networks. Presenter: Huang, Rigao Kang, Yuefang A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang Overview Introduction of VPN Hose model Implementation scenarios Simulation experiments Simulation

More information

Datacenter Wide- area Enterprise

Datacenter Wide- area Enterprise Datacenter Wide- area Enterprise Client LOAD- BALANCER Can t choose path : ( Servers Outline and goals A new architecture for distributed load-balancing joint (server, path) selection Demonstrate a nation-wide

More information

Table of Contents HOL-1703-SDC-4

Table of Contents HOL-1703-SDC-4 Table of Contents Lab Overview - - VMware NSX: Installation and Configuration...2 Lab Guidance... 3 Module 1 - NSX Manager Installation and Configuration (15 Minutes)... 6 Introduction... 7 Hands-on Labs

More information

SEEM3450 Engineering Innovation and Entrepreneurship

SEEM3450 Engineering Innovation and Entrepreneurship SEEM3450 Engineering Innovation and Entrepreneurship Cloud Computing Guest Lecture Gabriel Fung, Ph.D. 2017-10-26 What is Cloud Computing? According to NIST (National Institute of Standards and Technology)

More information

China Unicom SDN Practice in WAN. Lv Chengjin/Ma Jichun, China Unicom

China Unicom SDN Practice in WAN. Lv Chengjin/Ma Jichun, China Unicom China Unicom SDN Practice in WAN Lv Chengjin/Ma Jichun, China Unicom What Will Operator SDN Do? Two development directions Operator Softwaredefined networking (SDN) 1. Cloudify traditional services 2.

More information

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking

More information

Security Guide Zoom Video Communications Inc.

Security Guide Zoom Video Communications Inc. Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the best video, audio, and wireless

More information

WarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects -

WarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects - WarpTCP WHITE PAPER Technology Overview -Improving the way the world connects - WarpTCP - Attacking the Root Cause TCP throughput reduction is often the bottleneck that causes data to move at slow speed.

More information

E-companion. Quiz for IT-knowledge

E-companion. Quiz for IT-knowledge E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place

More information

ONAP 5G Blueprint Overview. ONAP Promises to Automate 5G Deployments. ONAP 5G Blueprint Overview 1

ONAP 5G Blueprint Overview. ONAP Promises to Automate 5G Deployments. ONAP 5G Blueprint Overview 1 ONAP 5G Blueprint Overview ONAP Promises to Automate 5G Deployments ONAP 5G Blueprint Overview 1 OVERVIEW: 5G poised to transform the global economy ABI Research predicts 5G economic output to be $10T

More information

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity

More information

A software defined approach To Unified IPv6 Transition

A software defined approach To Unified IPv6 Transition ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? A software defined approach To Unified IPv6 Transition Kevin Hu Huawei kevinkai.hu@huawei.com Saint Petersburg, Russian

More information

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology APPLICATION NOTE XCellAir s Wi-Fi Radio Resource Optimization Solution Features, Test Results & Methodology Introduction Multi Service Operators (MSOs) and Internet service providers have been aggressively

More information

Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point

Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point Yimin Song, Chao Yang, and Guofei Gu Texas A&M University Success Lab, Texas A&M University July 1th, 2010 Pre-question

More information

Introduction to Distributed Computing Systems

Introduction to Distributed Computing Systems Introduction to Distributed Computing Systems Alexandru Iosup Parallel and Distributed Systems Group Delft University of Technology Some material kindly provided by the PDS group. 1 What is a Distributed

More information

VITP: An Information Transfer Protocol for Vehicular Computing

VITP: An Information Transfer Protocol for Vehicular Computing VITP: An Information Transfer Protocol for Vehicular Computing Marios D. Dikaiakos, Saif Iqbal,Tamer Nadeem, Liviu Iftode Adapted from the work of Marios D. Dikaiakos 2nd ACM International Symposium on

More information

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites The recommended knowledge and skills that a learner must have before attending this course are as follows: Knowledge

More information

NetCarrier Telecom, Inc. NetCarrier ncloud PBX. Channel Driven, Customer Focused

NetCarrier Telecom, Inc. NetCarrier ncloud PBX. Channel Driven, Customer Focused NetCarrier ncloud PBX NetCarrier Telecom, Inc. Channel Driven, Customer Focused 24.7.365 Customer Support Phone: 888.575.4754 Email: sales@corp.netcarrier.com CONTENTS Why NetCarrier? NetCarrier is a US

More information

Introduction to IoT. Jianwei Liu Clemson University

Introduction to IoT. Jianwei Liu Clemson University Introduction to IoT Jianwei Liu Clemson University What are IoT & M2M The Internet of Things (IoT), also called Internet of Everything, is the network of physical objects or "things" embedded with electronics,

More information

Pioneer Communications Internet Services Disclosure

Pioneer Communications Internet Services Disclosure Pioneer Communications Internet Services Disclosure Pioneer Communications ( Pioneer ) is the leading Internet service provider for Southwest Kansas communities with a reputation for excellence that goes

More information

Mobile Network Congestion Management

Mobile Network Congestion Management SOLUTIONS BRIEF SOLUTIONS CASE STUDY BRIEF Mobile Network Congestion Management INTRODUCTION This document summarises the Procera strategy towards congestion management methods for mobile networks. The

More information

Maintaining a competitive advantage in the era of Network Neutrality

Maintaining a competitive advantage in the era of Network Neutrality WHITEPAPER Maintaining a competitive advantage in the era of Network Neutrality How Procera s Subscriber Intelligence Solutions can help broadband operators The wireless industry is mature now, and has

More information

A Holistic View of Telco Clouds

A Holistic View of Telco Clouds A Holistic View of Telco Clouds Cloud Computing in the Telecom environment, bridging the gap Miyazaki, 4 March 2012 (A workshop in conjunction with World Telecom Congress 2012) Authors: Lóránt Németh,

More information

Scott Jordan University of California, Irvine. Intersections between Information Technology Research and Public Policy

Scott Jordan University of California, Irvine. Intersections between Information Technology Research and Public Policy Scott Jordan University of California, Irvine Intersections between Information Technology Research and Public Policy Researcher view Research idea Research Deployment University view Research Patent Prototype

More information