MITATE: Mobile Internet Testbed for Application Traffic Experimentation
|
|
- Sydney Carson
- 6 years ago
- Views:
Transcription
1 MITATE: Mobile Internet Testbed for Application Traffic Experimentation Utkarsh Goel, Ajay Miyyapuram, Mike P. Wittie, Qing Yang Montana State University - Bozeman November 25 th, 2013 Computer Science Monday Seminar 1
2 Societal problem In many ways the causes of end-to-end network delay are not technological, but economic in nature. Reductions to end-to-end delays are unlikely to come from improvements of network mechanisms alone. Application communication protocols must be smart enough to adapt to changing network performance to keep communication delay low. To design and validate adaptive communication protocols, developers need to prototype their implementations in production networks. 2
3 Contd. Measure end-to-end delays Evaluate new network mechanisms USER APP SERVER DEVELOPER RESEARCHER 3
4 MITATE A new platform for mobile application prototyping in live mobile networks. Allows experimentation with custom mobile application traffic between mobile devices and cloud infrastructure endpoints. A collaborative framework, in which participants contribute their mobile network resources and are allowed, in turn, to run their traffic experiments on others devices. Open to the public and being deployed on Google s Measurement Lab (M-Lab). 4
5 Developers without MITATE Application Implementation Mobile Devices Back-end Servers Want to measure traffic delays. Have to deploy code to do so. //app code int main() App Traffic //srvr code int main() //app code int main() App Traffic //srvr code int main() Small number of volunteered devices Downsides of code deployment Security concerns over mobile code Restrictive APIs 5
6 How does MITATE help developers? MITATE separates traffic generation from application logic Application Implementation Mobile Devices Back-end Servers XML: App Traffic //app code int main() App Traffic //srvr code int main() MITATE App Traffic MITATE 6
7 MITATE s traffic definition Generate traffic definitions in a form of well structured XML by defining what the traffic looks like? where the traffic is going? when the traffic is to be sent? which mobile device should execute the experiment? 7
8 Defining a transfer <transfer> <id>transfer1</id> <src>client</src> <dst> </dst> <protocol>udp</protocol> <dstport>5060</dstport> <bytes>32</bytes> <response>0</response> </transfer> other parameters include: Transmission delay No. of packets Explicit content 8
9 Defining a packet content <content> <contentid>content1</contentid> <protocol>skype</protocol> <data> <![CDATA[0x0100be07de55...]]> </data> <contenttype>hex</contenttype> </content> 9
10 Defining a criteria <criteria> <id>criteria1</id> <latlong>" "</latlong> <radius>5000</radius> <networktype>cellular</networktype> <starttime>12:00</starttime> <endtime>13:30</endtime> </criteria> other parameters include: Network carrier Minimum battery power Minimum signal strength Device model name 10
11 Summing up all the definitions <transaction count= 10 > <criteria> <criteriaid>criteria1</criteriaid> </criteria> <transfers> <transferid delay= 10 repeat= 1 >transfer1</transferid> <transferid delay= 20 repeat= 2 >transfer2</transferid> <transferid delay= 10 repeat= 1 >transfer1</transferid> </transfers> </transaction> 11
12 How does MITATE help developers? MITATE separates traffic generation from application logic Application Implementation Mobile Devices Back-end Servers XML: App Traffic //app code int main() App Traffic //srvr code int main() MITATE App Traffic MITATE where performance of intermediate solutions are the reported metrics in each experiment round Large number of volunteered devices Upsides of using MITATE No mobile code only traffic description shipped to mobiles Flexibility in traffic generation logic 12
13 Researchers without MITATE Call your friends Measure network performance Latency Loss Bandwidth line up a few volunteered devices configure network simulators Low device and setting diversity Configured simulations do not reflect traffic shaping mechanisms 13
14 Challenges in deploying large scale testbed Assure sufficient resource capacity for scheduled experiments. (Limiting resource is mobile data, subject to monthly caps) Entice users to contribute resources Protect contributed resources from abuse. MITATE jointly addresses both problems using a data credit exchange system inspired by BitTorrent tit-for-tat mechanisms 14
15 Security & privacy concerns Personal mobile devices have the potential for violations of privacy if a device owner s activity and personally identifiable information were to become public. MITATE s security design protects user privacy, the volunteered devices, and non-mitate Internet resources. That was a very interesting cell phone conversation. Thanks for sharing it with me 15
16 Protecting user privacy & user device Only active traffic experiments and cannot monitor non-mitate traffic. User can set usage limits for mobile data, Wi-Fi data, and battery level on their devices. We separate all data collected on devices from personally identifiable user account information 16
17 Protecting Non-MITATE resources Avoid DDoS attacks configured as MITATE experiments. Limit traffic by placing a credit limit. A MITATE user may request that multiple devices send data simultaneously, the user s credit will be rapidly depleted. So even if the transmissions are malicious, they will be short-lived. 17
18 Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 18
19 Message delay vs. message size at 10AM on CSP 1 to a CA datacenter Asymmetric network provisioning 19
20 Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 20
21 Downlink message delay vs. transmission interval on CSP1 and CSP2 Network allocation timeouts causes delay 21
22 Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 22
23 Effect of payload on CSP1 MITATE can detect content based traffic shaping 23
24 Effect of choice of transport protocols Packet loss due to traffic policing, rather than traffic shaping 24
25 Measure of application performance What is the largest game state update message that can be reliably delivered under 100 ms? Whether the delays are due to network allocation timeouts or due to the device entering power save mode? Does my application traffic need to contend with traffic shaping mechanisms? Which CDN provides fastest downloads through a particular mobile service provider's peering points? 25
26 Measurement based CDN selection CDN2 provides the best combination of performance 26
27 Conclusions MITATE is the first public testbed that supports prototyping of application communications between mobiles and cloud datacenters. MITATE separates application logic from traffic generation, which simplifies security and resource sharing mechanisms. We have presented data collected with MITATE experiments that affects mobile application message delay. 27
28 Where can you find MITATE Our preliminary design and limited validation of MITATE s measurement techniques will be published at Mobiquitous 13 in December of this year. (NEW) MITATE s approach has been announced through a - poster at USENIX NSDI 13 - presentation at ACM IMC
29 Learn more Web URL: Code Repo: Utkarsh Goel 29
MITATE: Mobile Internet Testbed for Application Traffic Experimentation
MITATE: Mobile Internet Testbed for Application Traffic Experimentation A new platform for mobile application prototyping in live mobile networks. Open to the public and being deployed on M-Lab. 1 Why
More informationQuality Assurance of a Mobile Network Measurement Testbed Through Systematic Software Testing
Quality Assurance of a Mobile Network Measurement Testbed Through Systematic Software Testing Utkarsh Goel, James Espeland, Upulee Kanewala, and Mike P. Wittie SEDE 2016 Motivation Application developers
More informationMOBILE (cellular) network applications deliver interactive
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 18, NO. 1, FIRST QUARTER 2016 105 Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services Utkarsh Goel, Mike P. Wittie, Kimberly C. Claffy,
More informationNaaS Network-as-a-Service in the Cloud
NaaS Network-as-a-Service in the Cloud joint work with Matteo Migliavacca, Peter Pietzuch, and Alexander L. Wolf costa@imperial.ac.uk Motivation Mismatch between app. abstractions & network How the programmers
More informationPart I: Future Internet Foundations: Architectural Issues
Part I: Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues 3 Introduction The Internet has evolved from a slow, person-to-machine, communication
More informationRaj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)
APPLICATION DEPLOYMENT IN FUTURE GLOBAL MULTI-CLOUD ENVIRONMENT Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) GITMA 2015 Conference, St. Louis, June 23, 2015 These
More informationActive Measurement of Data-Path Quality in a Non-cooperative Internet
Active Measurement of Data-Path Quality in a Non-cooperative Internet Rocky K. C. Chang Internet Infrastructure and Security Group 7 Oct. 2010 Active Measurement of Data-Path Quality in a Non-cooperative
More informationCE Advanced Network Security Anonymity II
CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained
More informationUnderstanding the Evolving Internet
Understanding the Evolving Internet Ram Durairajan Assistant Professor, Computer and Information Science Co-director, Oregon Networking Research Group University of Oregon 0 Internet is a complex system
More informationA Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things
A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things Tilman Wolf 1 and Anna Nagurney 2 1 Department of Electrical and Computer
More informationBroadband Internet Access Disclosure
Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided
More informationConnectivity to Cloud-First Applications
Aruba and Riverbed Partner to Accelerate and Optimize Mobile-First Connectivity to Cloud-First Applications Today s workforce is more distributed, more mobile, and more demanding. Constant availability
More informationSEVONE END USER EXPERIENCE
Insight for the Connected World End User Experience [ DataSheet ] SEVONE END USER EXPERIENCE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationIn-Band Flow Establishment for End-to-End QoS in RDRN. Saravanan Radhakrishnan
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan Organization Introduction Motivation QoS architecture Flow Establishment Protocol QoS Layer Experiments and Results Conclusion
More informationAbstract of the Book
Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the
More informationPresented by: Fabián E. Bustamante
Presented by: Fabián E. Bustamante A. Nikravesh, H. Yao, S. Xu, D. Choffnes*, Z. Morley Mao Mobisys 2015 *Based on the authors slides Mobile apps are increasingly popular Mobile platforms is the dominant
More informationVideo-Aware Networking: Automating Networks and Applications to Simplify the Future of Video
Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.
More informationxpeeriences in the World of Online Gaming
xpeeriences in the World of Online Gaming DE-CIX Customer Summit 2016 Jens Osterloh 1 What we do: Providing infrastructure and services for companies in the online gaming industry - Game Publishing: Low
More informationCopyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper
Nomadix Service Engine Access in Large Public Venues Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agoura Road Suite 102 Agoura Hills CA 91301 USA www.nomadix.com 230-1026-001 Sheet 2 of 9 Introduction
More informationNaresh Soni CTO, InterDigital
March 5, 2012 WTC 2012 Challenges and Innovations in LTE Deployment Naresh Soni CTO, InterDigital Agenda InterDigital Overview Key Trends Key Challenges in LTE Innovative Solutions for LTE Deployment Summary
More informationRunning A Highly Scaled Registry DNS Platform. ICANN 55 Tech Day Anycast Panel Chris Griffiths -
ICANN 55 Tech Day Anycast Panel Chris Griffiths - chris.griffiths@nominet.uk 1 About Nominet WE ARE AN INTERNATIONAL INTERNET COMPANY DELIVERING PUBLIC BENEFIT As an operator of one of the largest Registries
More informationInternet Inter-Domain Traffic. C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010
Internet Inter-Domain Traffic C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010 Motivation! Measuring the Internet is hard! Significant previous work on Router
More informationWireless 20/20. Business Case for MulteFire Technology. February 27, 2018
Wireless 20/20 Business Case for MulteFire Technology February 27, 2018 1 Key Trends in Future Wireless Market MNOs challenged keep up with continuous increase in CapEx to meet growing demand Need for
More informationNetwork infrastructure, routing and traffic. q Internet inter-domain traffic q Traffic estimation for the outsider
Network infrastructure, routing and traffic q Internet inter-domain traffic q Traffic estimation for the outsider Internet Inter-Domain Traffic C. Labovitz, S. Lekel-Johnson, D. McPherson, J. Oberheide,
More informationDeveloping Enterprise Cloud Solutions with Azure
Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationCarrier SDN for Multilayer Control
Carrier SDN for Multilayer Control Savings and Services Víctor López Technology Specialist, I+D Chris Liou Vice President, Network Strategy Dirk van den Borne Solution Architect, Packet-Optical Integration
More informationPulseway Security White Paper
Pulseway Security White Paper Table of Contents 1. Introduction 2. Encryption 2.1 Transport Encryption 2.2 Message Encryption 3. Brute-Force Protection 4. DigiCert Code Signing Certificate 5. Datacenter
More informationBYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013
BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 Bring Your Own???? 2 Bring Your Own Device cannot be ignored About 50% Workers
More informationMobile Edge Computing:
Mobile Edge Computing: Accelerating to 5G Era Hannu Flinck January 2016 1 Nokia 2015 Current megatrends Mobile computing, 5G and cloud computing Mobile computing Cloud computing 2 Nokia 2015 Architecture
More informationCitrix SD-WAN for Optimal Office 365 Connectivity and Performance
Solution Brief Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Evolving Needs for WAN Network Architecture Enterprise networks have historically been architected to provide users access
More informationSECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6
More informationPractical Guide to Platform as a Service.
Practical Guide to Platform as a Service http://cloud-council.org/resource-hub.htm#practical-guide-to-paas December 3, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards!
More informationSDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged
SDN Use-Cases internet exchange, home networks TELE4642: Week8 Materials from Prof. Nick Feamster is gratefully acknowledged Overview n SDX: A Software-Defined Internet Exchange n SDN-enabled Home Networks
More informationAutomated Assessment of Security Risks for Mobile Applications
Automated Assessment of Security Risks for Mobile Applications Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie Department of Computer Science North Carolina State University Lookout Mobile
More informationThe UCSD Network Telescope
The UCSD Network Telescope Colleen Shannon cshannon @ caida.org NSF CIED Site Visit November 22, 2004 UCSD CSE Motivation Blocking technologies for automated exploits is nascent and not widely deployed
More informationITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis - Tunisia, Feb. 2017
On the ROAD to 5G Ines Jedidi Network Products, Ericsson Maghreb ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis - Tunisia, 21-22 Feb. 2017 agenda Why 5G? What
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationData Centers and Cloud Computing
Data Centers and Cloud Computing CS677 Guest Lecture Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationData Centers and Cloud Computing. Slides courtesy of Tim Wood
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationReliable Stream Analysis on the Internet of Things
Reliable Stream Analysis on the Internet of Things ECE6102 Course Project Team IoT Submitted April 30, 2014 1 1. Introduction Team IoT is interested in developing a distributed system that supports live
More informationCisco Borderless Networks Value Proposition
Cisco Borderless Networks Value Proposition Enabling the Borderless Organization 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Why Borderless Networks? Cisco s Architectural Approach
More informationNKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet.
A NEW KIND OF NETWORK NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet. W H Y Shortcomings of today s Internet The Missing
More informationData Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationRadon: Network QoS. Andrew Shewmaker Carlos Maltzahn Katia Obraczka Scott Brandt Ivo Jimenez. UC Santa Cruz Graduate Studies in Computer Science
Radon: Network QoS Andrew Shewmaker Carlos Maltzahn Katia Obraczka Scott Brandt Ivo Jimenez UC Santa Cruz Graduate Studies in Computer Science Oct 22nd, 2013 This research was made possible by LANL, Cisco,
More informationTowards Pervasive and Mobile Gaming with Distributed Cloud Infrastructure. Teemu Kämäräinen, Matti Siekkinen, Yu Xiao, Antti Ylä-Jääski
Towards Pervasive and Mobile Gaming with Distributed Cloud Infrastructure Teemu Kämäräinen, Matti Siekkinen, Yu Xiao, Antti Ylä-Jääski Introduction Background In Mobile Cloud Gaming the game is rendered
More informationJoint Server Selection and Routing for Geo-Replicated Services
Joint Server Selection and Routing for Geo-Replicated Services Srinivas Narayana Joe Wenjie Jiang, Jennifer Rexford and Mung Chiang Princeton University 1 Large-scale online services Search, shopping,
More informationSOMETIME1 SOftware defined network-based Available Bandwidth MEasuremenT In MONROE
SOMETIME1 SOftware defined network-based Available Bandwidth MEasuremenT In MONROE Network Traffic Measurement and Analysis conference (TMA) Dublin, Ireland, June 21-23, 2017 Giuseppe Aceto, Valerio Persico,
More informationCS268: Beyond TCP Congestion Control
TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s
More informationNSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015
NSF Transition to Practice Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 Networking and IT Research and Development (NITRD) FY16 Supplement
More informationPRISM: Platform for Remote Sensing using Smartphones
PRISM: Platform for Remote Sensing using Smartphones Tathagata Das Microsoft Research India Bangalore 560080, India tathadas@microsoft.com Prashanth Mohan University of California, Berkeley Berkeley, CA
More informationCreating the Future on the Shoulders of a Giant ZTE Flagship Tbit Optical Platform
Creating the Future on the Shoulders of a Giant ------ZTE Flagship Tbit Optical Platform Led by the rapid development of emerging services including HD (high definition) video, VR (virtual reality) and
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Quality of Services 1. Terminology 2. Technologies 2 Terminology Quality of service Ability to control network performance in order to meet application and/or end-user requirements Examples of parameters
More informationOverview. CPS Architecture Overview. Operations, Administration and Management (OAM) CPS Architecture Overview, page 1 Geographic Redundancy, page 5
CPS Architecture, page 1 Geographic Redundancy, page 5 CPS Architecture The Cisco Policy Suite (CPS) solution utilizes a three-tier virtual architecture for scalability, system resilience, and robustness
More informationSEVONE DATA APPLIANCE FOR EUE
Insight for the Connected World Data Appliance for EUE [ DataSheet ] SEVONE DATA APPLIANCE FOR EUE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationIXP economic aspect and benefits
IXP economic aspect and benefits M. Sall modou.sall@orange-sonatel.com Slide 1 ITU IXP Workshop September 28 th, 2015 Copyright Sonatel. All rights reserved Outline Context Content Distribution and Hosting
More informationDistributed Sensing for Spectrum Agility: Incentives and Security Considerations
Distributed Sensing for Spectrum Agility: Incentives and Security Considerations S. Arkoulis, P. Frangoudis, G. Marias, G. Polyzos Athens University of Economics and Business {arkoulistam,pfrag,marias,polyzos}@aueb.gr
More informationTransport Protocols for Data Center Communication. Evisa Tsolakou Supervisor: Prof. Jörg Ott Advisor: Lect. Pasi Sarolahti
Transport Protocols for Data Center Communication Evisa Tsolakou Supervisor: Prof. Jörg Ott Advisor: Lect. Pasi Sarolahti Contents Motivation and Objectives Methodology Data Centers and Data Center Networks
More informationCredit based Flow Control PAR, 5 Criteria & Objectives
Credit based Flow Control PAR, 5 Criteria & Objectives Results of 2/20/14 DCB TG CC discussion new dcb lynch cb flow control par 5c obj 0214 v02 1 PROJECT AUTHORIZATION REQUEST Based on IEEE 802 LMSC Operations
More informationInternet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski
Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT
More informationOdin: Microsoft s Scalable Fault-
Odin: Microsoft s Scalable Fault- Tolerant CDN Measurement System Matt Calder Manuel Schröder, Ryan Gao, Ryan Stewart, Jitendra Padhye, Ratul Mahajan, Ganesh Ananthanarayanan, Ethan Katz-Bassett NSDI,
More informationOver-The-Top (OTT) Aggregation Solutions
Over-The-Top (OTT) Aggregation Solutions Omkar Dharmadhikari, Wireless Architect odharmadhikari@cablelabscom CableLabs February 12, 2019 Agenda Introduction Why aggregation is important? Traditional Aggregation
More informationBeyond Blind Defense: Gaining Insights from Proactive App Sec
Beyond Blind Defense: Gaining Insights from Proactive App Sec Speaker Rami Essaid CEO Distil Networks Blind Defense Means Trusting Half Your Web Traffic 46% of Web Traffic is Bots Source: Distil Networks
More informationMobile QoE and Service Composition
Mobile QoE and Service Composition Vasilios A. Siris Mobile Multimedia Laboratory Department of Informatics Athens University of Economics and Business vsiris@aueb.gr http://www.aueb.gr/users/vsiris/ COST
More informationAzure Certification BootCamp for Exam (Developer)
Azure Certification BootCamp for Exam 70-532 (Developer) Course Duration: 5 Days Course Authored by CloudThat Description Microsoft Azure is a cloud computing platform and infrastructure created for building,
More informationConnected Mobile Experiences (CMX) Aligning Use Cases and Technology
Connected Mobile Experiences (CMX) Aligning Use Cases and Technology Jagdish Girimaji, Manager, Product Marketing Daryl Coon, Product Manager, Product and Solutions Marketing PSOEWN-3246 Agenda Introduction
More informationAT&T SD-WAN Network Based service quick start guide
AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy
More informationSmart and Secured Infrastructure. Rajesh Kumar Technical Consultant
Smart and Secured Infrastructure Rajesh Kumar Technical Consultant IoT Use Cases Smart Cities Connected Vehicles / V2X / ITS Industrial Internet / IIoT / Industry 4.0 Enterprise IoT / Smart Buildings Technical
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling
More informationA Global Operating System «from the Things to the Clouds»
GRUPPO TELECOM ITALIA EAI International Conference on Software Defined Wireless Networks and Cognitive Technologies for IoT Rome, 26th October 2015 A Global Operating System «from the Things to the Clouds»
More informationCitrix Tech Zone Citrix Product Documentation docs.citrix.com November 13, 2018
Citrix Product Documentation docs.citrix.com November 13, 2018 Contents Citrix Tech Zone - Learn 3 Tech Insights 3 Tech Briefs 3 Diagrams and Posters 4 Citrix Tech Zone - Design 4 Design Decisions 4 Citrix
More informationThe Growing Problem of Mobile Adware
A MONTHLY MOBILE REVIEW The Growing Problem of Mobile Adware SEPTEMBER 2012 This monthly report reviews the mobile landscape including the findings of Trend Micro engineers and researchers. In this report
More informationA Software Defined Approach to Unified IPv6 Transition
A Software Defined Approach to Unified IPv6 Transition Collaborators China Telecom Qiong Sun Chongfeng Xie Telefonica I+D Diego Lopez (Presenter) University Huawei Felix Lu Tina Tsou Haiyong Xie Spencer
More informationLike it or not: Stefan Schmid (TU Berlin & T-Labs)
Like it or not: Stefan Schmid (TU Berlin & T-Labs) 1 Like it or not: The world becomes virtualized, software-defined, and distributed Stefan Schmid (TU Berlin & T-Labs) 2 Internet Trends: Virtualized 3
More informationUC Assessor A cloud-based UC network assessment solution. Getting Started Guide
UC Assessor A cloud-based UC network assessment solution Getting Started Guide December 2018 Copyright Copyright 2000-2018 Integrated Research Limited (ABN 76 003 588 449). All rights reserved. This guide
More informationHOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?
HOW WORKS And Who Needs a Content Distribution Network Anyway? Efficient and Inefficient Networks If all networks were fast, efficient, and never suffered from congestion there wouldn t be any need for
More informationA Flexible Model for Resource Management in Virtual Private Networks. Presenter: Huang, Rigao Kang, Yuefang
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang Overview Introduction of VPN Hose model Implementation scenarios Simulation experiments Simulation
More informationDatacenter Wide- area Enterprise
Datacenter Wide- area Enterprise Client LOAD- BALANCER Can t choose path : ( Servers Outline and goals A new architecture for distributed load-balancing joint (server, path) selection Demonstrate a nation-wide
More informationTable of Contents HOL-1703-SDC-4
Table of Contents Lab Overview - - VMware NSX: Installation and Configuration...2 Lab Guidance... 3 Module 1 - NSX Manager Installation and Configuration (15 Minutes)... 6 Introduction... 7 Hands-on Labs
More informationSEEM3450 Engineering Innovation and Entrepreneurship
SEEM3450 Engineering Innovation and Entrepreneurship Cloud Computing Guest Lecture Gabriel Fung, Ph.D. 2017-10-26 What is Cloud Computing? According to NIST (National Institute of Standards and Technology)
More informationChina Unicom SDN Practice in WAN. Lv Chengjin/Ma Jichun, China Unicom
China Unicom SDN Practice in WAN Lv Chengjin/Ma Jichun, China Unicom What Will Operator SDN Do? Two development directions Operator Softwaredefined networking (SDN) 1. Cloudify traditional services 2.
More informationLast Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1
Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking
More informationSecurity Guide Zoom Video Communications Inc.
Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the best video, audio, and wireless
More informationWarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects -
WarpTCP WHITE PAPER Technology Overview -Improving the way the world connects - WarpTCP - Attacking the Root Cause TCP throughput reduction is often the bottleneck that causes data to move at slow speed.
More informationE-companion. Quiz for IT-knowledge
E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place
More informationONAP 5G Blueprint Overview. ONAP Promises to Automate 5G Deployments. ONAP 5G Blueprint Overview 1
ONAP 5G Blueprint Overview ONAP Promises to Automate 5G Deployments ONAP 5G Blueprint Overview 1 OVERVIEW: 5G poised to transform the global economy ABI Research predicts 5G economic output to be $10T
More informationAQU Information Systems Fundamentals Spring 2012 Pg. 9.1
AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity
More informationA software defined approach To Unified IPv6 Transition
ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? A software defined approach To Unified IPv6 Transition Kevin Hu Huawei kevinkai.hu@huawei.com Saint Petersburg, Russian
More informationAPPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology
APPLICATION NOTE XCellAir s Wi-Fi Radio Resource Optimization Solution Features, Test Results & Methodology Introduction Multi Service Operators (MSOs) and Internet service providers have been aggressively
More informationWho Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point
Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point Yimin Song, Chao Yang, and Guofei Gu Texas A&M University Success Lab, Texas A&M University July 1th, 2010 Pre-question
More informationIntroduction to Distributed Computing Systems
Introduction to Distributed Computing Systems Alexandru Iosup Parallel and Distributed Systems Group Delft University of Technology Some material kindly provided by the PDS group. 1 What is a Distributed
More informationVITP: An Information Transfer Protocol for Vehicular Computing
VITP: An Information Transfer Protocol for Vehicular Computing Marios D. Dikaiakos, Saif Iqbal,Tamer Nadeem, Liviu Iftode Adapted from the work of Marios D. Dikaiakos 2nd ACM International Symposium on
More informationFundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites
Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites The recommended knowledge and skills that a learner must have before attending this course are as follows: Knowledge
More informationNetCarrier Telecom, Inc. NetCarrier ncloud PBX. Channel Driven, Customer Focused
NetCarrier ncloud PBX NetCarrier Telecom, Inc. Channel Driven, Customer Focused 24.7.365 Customer Support Phone: 888.575.4754 Email: sales@corp.netcarrier.com CONTENTS Why NetCarrier? NetCarrier is a US
More informationIntroduction to IoT. Jianwei Liu Clemson University
Introduction to IoT Jianwei Liu Clemson University What are IoT & M2M The Internet of Things (IoT), also called Internet of Everything, is the network of physical objects or "things" embedded with electronics,
More informationPioneer Communications Internet Services Disclosure
Pioneer Communications Internet Services Disclosure Pioneer Communications ( Pioneer ) is the leading Internet service provider for Southwest Kansas communities with a reputation for excellence that goes
More informationMobile Network Congestion Management
SOLUTIONS BRIEF SOLUTIONS CASE STUDY BRIEF Mobile Network Congestion Management INTRODUCTION This document summarises the Procera strategy towards congestion management methods for mobile networks. The
More informationMaintaining a competitive advantage in the era of Network Neutrality
WHITEPAPER Maintaining a competitive advantage in the era of Network Neutrality How Procera s Subscriber Intelligence Solutions can help broadband operators The wireless industry is mature now, and has
More informationA Holistic View of Telco Clouds
A Holistic View of Telco Clouds Cloud Computing in the Telecom environment, bridging the gap Miyazaki, 4 March 2012 (A workshop in conjunction with World Telecom Congress 2012) Authors: Lóránt Németh,
More informationScott Jordan University of California, Irvine. Intersections between Information Technology Research and Public Policy
Scott Jordan University of California, Irvine Intersections between Information Technology Research and Public Policy Researcher view Research idea Research Deployment University view Research Patent Prototype
More information