Introduction continued

Size: px
Start display at page:

Download "Introduction continued"

Transcription

1 Acknowledgments Design and Evaluation of Power Management Support for s Jakob Klamra and Martin Olsson Department of Communication Systems Lund Institute of Technology Lund, SWEDEN Thanks to: Dr. Christensen, USF Dr. Nyberg, LTH Dr. Labrador and Dr. Rundus, USF Bruce Nordman, LBNL Chamara Gunaratne, USF 1 Masters Defense June 7, 2005 (Tampa, Florida) 2 Topics Introduction Analysis Design Implementation Validation Energy Savings Estimate Introduction Problem: increased energy use by IT equipment More devices in US households IT equipment use 280 kwh/year per US household Adds up to $ 2240 million Problem: IT equipment always on, even when idle Required by some protocols Universal Plug and Play (UPnP) has this problem Our work solves the problem for UPnP Investigate the use of a power management proxy Conclusions and Future Work 3 4 1

2 Introduction continued UPnP is for automatic device configuration Network analogy of Microsoft plug-and-play Control points and services Discovery, eventing and control Introduction continued SSDP message exchange Discovery SSDP:discover Answered by Standardized by UPnP Forum More than 700 vendors, Microsoft, Intel, Nokia UPnP uses Simple Discovery Protocol SSDP is the key issue Control Point SSDP:discover SSDP:discover SSDP:discover 5 6 Introduction continued SSDP message exchange (continued) Notification Sent out periodically Introduction continued UPnP foundation, the stack SSDP use UDP UPnP Vendor Specific UPnP Forum Specific Architecture Eventing and control use TCP Our work is done here Control Point HTTP-MU SSDP UDP HTTP-U SSDP HTTP GENA TCP SOAP GENA 7 8 IP 2

3 Analysis Requirements for power management solutions: R1 Enable UPnP devices to enter power sleep R2 - Not interfere with existing UPnP functionality Analysis continued New Low power proxy Acts (answers and speaks) for sleeping devices Wakes up sleeping devices when they are needed R3 - Be robust R4 - Work for wired and wireless R5 - Handle many devices R6 - Be possible for us to implement Control Point 4. powered up 1. in power sleep 2. Request for service 3. Wake up SLEEP 9 10 Analysis continued Possible solutions to UPnP power management Three categories: Centralized proxy, no change to devices Invisible proxy Centralized proxy, minor change to devices Cooperating proxy No proxy, major change to devices ing NICs Design Selection of the solutions All requirements must be fulfilled Desirable properties As much power sleep as possible As little configuration as possible As little changes to UPnP protocol as possible Our design decision Invisible proxy Cooperating proxy

4 Design continued Design of invisible proxy 1. Timeout start proxy 6. Forward TCP SYN 2.SSDP:discover ST = Printer 4.TCP SYN 3. (Spoofed) ST=Printer 5.Wake On Lan ACK 7.TCP SYN SLEEP Control point Design continued Invisible proxy FSM LISTENING P1 P12 Timeout PROXY DEVICE P2 P23 SSDP:discover P32b S in proxy cache Discovery answer P24 TCP from CP WAIT FOR ALIVE P5 P45 S in proxy cache WOL to S P51a from S P55 Timeout Forward packet from CP CHECK PROXY CACHE DISCOVERY P3 CHECK PROXY CACHE TCP P CP = Control point, S =, WOL = Wake On Lan 15 Design continued Design of cooperating proxy 3.SSDP:discover ST = Printer 4. (Spoofed) ST=Printer 5.TCP SYN 1.GENA Powermgmt = SLEEP 2. 6.Wake On Lan 7.GENA Powermgmt = POWER 8.Forward TCP SYN SLEEP Control point 9.TCP SYN ACK 16 Design continued Cooperating proxy FSM LISTENING P1 P12 GENA, Power mgmt=sleep P51a GENA, Power mgmt=power Forward packet from CP PROXY DEVICE P2 P51a GENA Power mgmt=power, Forward packet from CP P23 SSDP:discover CHECK PROXY CACHE DISCOVERY P3 P32a S in proxy cache Discovery answer CHECK PROXY CACHE TCP P4 P24 TCP from CP FORWARD PACKET P5 CP = Control point, S =, WOL = Wake On Lan P45 S in proxy cache WOL to S 4

5 Implementation Development Tools Programming environment Dev-C++ Packet handling routines NETWIB libraries Packet capture and decoding Ethereal UPnP device toolkit Intel software for UPnP technologies Implementation continued Data structure for proxies Device Cache All devices on the network Cache All devices proxy is answering for Implementation continued Implementation continued Name Description Implementation of invisible proxy Main thread ip eth IP address Ethernet address Discover devices and build cache Start threads Notification 19 service server location last_activity All services of the device Server name Location Time for last activity from the device 20 Main loop Sniff packets Process packets Send answer and update caches cache update Check devices in Device Cache Update Cache Check Cache If needed send 5

6 Implementation continued Validation Implementation of cooperating proxy Main Thread Discover power management services and build cache Start threads Main loop Sniff packets Process packets Cache update Check Device cache Notification Check cache Read event socket Read and parse incoming events Update cache Validation design and implementation must meet requirements Known shortcomings TCP forwarding not implemented Cannot detect crashed devices Test cases 7 tests for each solution 3 tests not executed because lack of equipment 21 Answer and update caches Update Device cache Send 22 Validation continued Energy saving estimation Validation of invisible proxy 1 test passed 3 partially failed No unexpected behavior Estimates made for US residential IT equipment Estimates made for: Stock, power consumption, usage patterns Validation of cooperating proxy 2 tests passed 2 partially failed No unexpected behavior Calculations made for: Total energy and economic savings in 2008 Estimates from work by Energy Analysis Program at Lawrence Berkley National Laboratory Bruce Nordman

7 Energy saving estimation continued Background, stocks Energy saving estimation continued Results Device Devices 2001 Devices 2008 Network Connected devices 2008 Savings in GWh/year Savings in million dollars per year Notebooks Low estimation Desktops % Inkjets High estimation Laser printers % (all figures are in million) (8 cents/kwh) Conclusions and future work Conclusions and future work continued Conclusions Power management in UPnP achieved Proved by implementation and validation $71 - $285 million saved in American households using UPnP by 2008 Shortcomings of the design Long response time TCP connection between service and control point not established 27 Contributions First to design and implement power management proxy for UPnP Energy savings estimate motivates our work Member and contributors to UPnP Forum UPnP power management problem solved 28 can crash Lost information about sleeping devices not discoverable Need to support several medium UPnP is media independent 7

8 Conclusion and future work continued Future work UPnP power management standard Smart NIC NIC with proxy capability Distributed solution Extended proxy functionality Automatic configuration of power management Routing of services References In order of importance: [20] M. Jeronimo and J. Weast, UPnP Design by Example, Volume 1, April 2003 [26] B. Nordman and A. Meier, Energy Consumption of Home Information Technology, July 2004 [2] Y. Y. Goland, T. Cai, P. Leach and Y. Gu, Simple Discovery Protocol/1.0 Operating without an Arbiter, draft-cai-ssdp-v1-03.txt, IETF draft, October 1999 [5] UPnP Forum, May 2005 [27] K. Christensen, B. Nordman and A. George, The Next Frontier for Communications Networks: Power Management, Computer Communications, Volume 27, Number 18, pages , December 2004 [3] D. Box, G. Kakivaya, A. Layman, S. Thatte and D. Winer, SOAP: Simple Object Access Protocol, draft-box-http-soap-01.txt, IETF draft, November 1999 [4] J. Cohen, S. Aggarwal and Y. Y. Goland, General Event Notification Architecture Base: Client to Arbiter, draft-cohen-gena-p-base-01.txt, IETF draft, September Jakob Klamra Thank you Martin Olsson Project homepage:

Design and Implementation of a Power Management Proxy for Universal Plug and Play

Design and Implementation of a Power Management Proxy for Universal Plug and Play Design and Implementation of a Power Management Proxy for Universal Plug and Play Jakob Klamra, Martin Olsson Dept. of Communication Systems Lund Institute of Technology Lund, Sweden jakob.klamra@gmail.com,

More information

Design and Evaluation of Power Management Support for UPnP Devices

Design and Evaluation of Power Management Support for UPnP Devices Design and Evaluation of Power Management Support for UPnP Devices A Master s Thesis by Jakob Klamra and Martin Olsson Department of Communication Systems Lund Institute of Technology June 10, 2005 Supervisors:

More information

Reducing the Energy Consumption of Networked Devices

Reducing the Energy Consumption of Networked Devices Reducing the Energy Consumption of Networked Devices Bruce Nordman Energy Analysis Lawrence Berkeley National Laboratory Berkeley, CA 94720 bnordman@lbl.gov Ken Christensen Computer Science and Engineering

More information

Rapid PHY Selection (RPS): A Performance Evaluation of Control Policies

Rapid PHY Selection (RPS): A Performance Evaluation of Control Policies Rapid PHY Selection (RPS): A Performance Evaluation of Control Policies Ken Christensen Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 christen@cse.usf.edu (813)

More information

IEEE 802.3az: The Road to Energy Efficient Ethernet

IEEE 802.3az: The Road to Energy Efficient Ethernet IEEE 802.3az: The Road to Energy Efficient Ethernet K. Christensen, P. Reviriego, B Nordman, M. Bennett, M. Mostowfi, J.A. Maestro Presented by: Jordi Cucurull Linköpings universitet Sweden April 2, 2012

More information

Acknowledgments. Improving the Energy Efficiency of Networks: A Focus on Ethernet and End Devices. We thank Flavio Bonomi for inviting us

Acknowledgments. Improving the Energy Efficiency of Networks: A Focus on Ethernet and End Devices. We thank Flavio Bonomi for inviting us Improving the Energy Efficiency of Networks: A Focus on Ethernet and End Devices Ken Christensen Computer Science and Engineering University of South Florida Tampa, FL 33620 christen@cse.usf.edu (813)

More information

PROPOSAL TITLE: Green Networking: Reducing the Energy Use of LAN Switches and Connected Hosts

PROPOSAL TITLE: Green Networking: Reducing the Energy Use of LAN Switches and Connected Hosts PROPOSAL TITLE: Green Networking: Reducing the Energy Use of LAN Switches and Connected Hosts PRIMARY INVESTIGATOR Ken Christensen (Professor) Department of Computer Science and Engineering 4202 East Fowler

More information

UPnP: Breaking out of the LAN

UPnP: Breaking out of the LAN UPnP: Breaking out of the LAN Jim Grimmett and Eamonn O Neill Department of Computer Science, University of Bath Bath, United Kingdom Email: {jwg, eamonn}@cs.bath.ac.uk Abstract The use of devices embedded

More information

Network Connectivity Proxy: An Optimal Strategy for Reducing Energy Waste in Network Edge Devices

Network Connectivity Proxy: An Optimal Strategy for Reducing Energy Waste in Network Edge Devices Network Connectivity Proxy: An Optimal Strategy for Reducing Energy Waste in Network Edge Devices Bolla, R., Giribaldi, M., Khan, R., & Repetto, M. (2013). Network Connectivity Proxy: An Optimal Strategy

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD ISO/IEC 29341-16-1 INTERNATIONAL STANDARD Edition 1.0 2011-08 colour inside Information technology UPnP device architecture Part 16-1: Low Power Device Control Protocol Low Power Architecture INTERNATIONAL

More information

upnp Device Architecture

upnp Device Architecture upnp and DLNA upnp Device Architecture defines an architecture for pervasive peer-to-peer network connectivity of intelligent appliances, wireless devices, and PCs of all form factors easy-to-use, flexible,

More information

[MS-SSDP-Diff]: SSDP: Networked Home Entertainment Devices (NHED) Extensions

[MS-SSDP-Diff]: SSDP: Networked Home Entertainment Devices (NHED) Extensions [MS-SSDP-Diff]: SSDP: Networked Home Entertainment Devices (NHED) Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open

More information

UPNP AV ARCHITECTURE - GENERIC INTERFACE DESIGN AND JAVA IMPLEMENTATION

UPNP AV ARCHITECTURE - GENERIC INTERFACE DESIGN AND JAVA IMPLEMENTATION UPNP AV ARCHITECTURE - GENERIC INTERFACE DESIGN AND JAVA IMPLEMENTATION Andreas Bobek, Hendrik Bohn, Frank Golatowski Institute of Applied Microelectronics and Computer Science University of Rostock Richard-Wagner-Str.

More information

Distributed Systems 26. Mobile Ad Hoc Mesh Networks

Distributed Systems 26. Mobile Ad Hoc Mesh Networks Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers

More information

Research on UPnP Protocol Stack for Applications on a Home Network

Research on UPnP Protocol Stack for Applications on a Home Network Research on UPnP Protocol Stack for Applications on a Home Network Kalaiselvi Arunachalam #1, Gopinath Ganapathy #2 # School of Computer Science, Engineering and Applications, Bharathidasan University,

More information

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC INTRODUCTION: DDOS ATTACKS 1 DDOS ATTACKS Though Denial of Service (DoS) and Distributed Denial of Service (DDoS) have been common attack techniques used by malicious actors for some time now, organizations

More information

Ethernet Adaptive Link Rate: System Design and Performance Evaluation

Ethernet Adaptive Link Rate: System Design and Performance Evaluation Ethernet Adaptive Link Rate: System Design and Performance Evaluation Chamara Gunaratne and Ken Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 3360

More information

JESA Service Discovery Protocol

JESA Service Discovery Protocol JESA Service Discovery Protocol Efficient Service Discovery in Ad-Hoc Networks Stephan Preuß University of Rostock; Dept. of Computer Science; Chair for Information and Communication Services mailto:spr@informatik.uni-rostock.de

More information

Dynamically Updatable UPnP Service for Device Role Management

Dynamically Updatable UPnP Service for Device Role Management 10th IEEE International Workshop on Managing Ubiquitous Communications and Services 2013, San Diego (18 March 2013) Dynamically Updatable UPnP Service for Device Role Management Tadanobu Tsunoda, Akira

More information

Redundancy for Routers using Enhanced VRRP

Redundancy for Routers using Enhanced VRRP Redundancy for Routers using Enhanced VRRP 1 G.K.Venkatesh, 2 P.V. Rao 1 Asst. Prof, Electronics Engg, Jain University Banglaore, India 2 Prof., Department of Electronics Engg., Rajarajeshwari College

More information

UPnP Design by Example

UPnP Design by Example UPnP Design by Example A Software Developer's Guide to Universal Plug and Play Michael Jeronimo Jack Weast Intel PRESS Contents Foreword Preface xix xv Acknowledgments xxvii Part I Introduction to the

More information

The Internet of Things. Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group

The Internet of Things. Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group 1 The Internet of Things Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group Important! ٧ DREAM seminar 8 April 2014, UC Berkeley Low-Power Wireless Mesh Networks

More information

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan

More information

Power Management for Networked Systems

Power Management for Networked Systems Power Management for Networked Systems Sylvia Ratnasamy (Intel Research Berkeley) Work in collaboration with UC Berkeley, Univ. of Washington and Lawrence Berkeley National Lab How do networks contribute

More information

Advanced Network Approaches for Wireless Environment

Advanced Network Approaches for Wireless Environment Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk

More information

Available online at ScienceDirect. Procedia Computer Science 83 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 83 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 83 (2016 ) 187 194 The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016) Achieving

More information

NAT Traversal for VoIP

NAT Traversal for VoIP NAT Traversal for VoIP Dr. Quincy Wu National Chi Nan University Email: solomon@ipv6.club.tw.tw 1 TAC2000/2000 NAT Traversal Where is NAT What is NAT Types of NAT NAT Problems NAT Solutions Program Download

More information

Energy-Efficient Ethernet for 100G Backplane and Copper

Energy-Efficient Ethernet for 100G Backplane and Copper Energy-Efficient Ethernet for 100G Backplane and Copper IEEE 802.3bj Task Force Michael J. Bennett Lawrence Berkeley National Laboratory IEEE 802.3 Interim Meeting September 2011 Page 1 Contributors Hugh

More information

Ken Christensen. University of South Florida Tampa, Florida USA hit

Ken Christensen. University of South Florida Tampa, Florida USA hit Green Networks: Reducing the Energy Consumption of Networks Ken Christensen Department t of Computer Science and Engineering i University of South Florida Tampa, Florida USA 33620 christen@cse.usf.edu

More information

SIMPLE SERVICE DISCOVERY PROTOCOL BASED DISTRIBUTED REFLECTIVE DENIAL OF SERVICE ATTACK

SIMPLE SERVICE DISCOVERY PROTOCOL BASED DISTRIBUTED REFLECTIVE DENIAL OF SERVICE ATTACK SIMPLE SERVICE DISCOVERY PROTOCOL BASED DISTRIBUTED REFLECTIVE DENIAL OF SERVICE ATTACK Gursewak Singh 1, Bohar Singh 2 1 Computer Science and Application, Govt College Sri Muktsar sahib 2 Computer Science

More information

Optimisation of ICT Infrastructure and Energy- Efficiency Techniques in Next Generation Internet

Optimisation of ICT Infrastructure and Energy- Efficiency Techniques in Next Generation Internet Optimisation of ICT Infrastructure and Energy- Efficiency Techniques in Next Generation Internet H. Abaci, G. Parr, S. McClean, A. Moore, F. Saffre (BT Adastral Park) India-UK Advanced Technology Centre

More information

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. Overview of TCP/IP 3 Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. 4 2 5 6 3 7 8 4 9 10 5 11 12 6 13 14 7 15 16 8 17 18 9 19 20 10 21 Why TCP/IP? Packet based Provides decentralized

More information

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

Bluetooth. Quote of the Day. I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002 Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),

More information

Rapid PHY Selection (RPS): Emulation and Experiments using PAUSE

Rapid PHY Selection (RPS): Emulation and Experiments using PAUSE Rapid PHY Selection (RPS): Emulation and Experiments using PAUSE Ken Christensen Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 christen@cse.usf.edu (813) 974-4761

More information

Rapid PHY Selection (RPS): Emulation and Experiments using PAUSE

Rapid PHY Selection (RPS): Emulation and Experiments using PAUSE Rapid PHY Selection (RPS): Emulation and Experiments using PAUSE Ken Christensen Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 christen@cse.usf.edu (813) 974-4761

More information

Polycom Better Together over Ethernet Connector 3.8.0

Polycom Better Together over Ethernet Connector 3.8.0 RELEASE NOTES 3.8.0 June 2018 3725-69895-009A Polycom Better Together over Ethernet Connector 3.8.0 Applies to Polycom VVX 200 Series, 300 Series, 400 Series, 500 Series, and 600 Series Business Media

More information

Integrating Custom Hardware into Sensor Web. Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic

Integrating Custom Hardware into Sensor Web. Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic Integrating Custom Hardware into Sensor Web Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic OUTLINE 1. Introduction 2. State of the art 3. System architecture - main components 3.1 Hardware

More information

CUWN Release 8.2 mdns Gateway with Chromecast Support Feature Deployment Guide

CUWN Release 8.2 mdns Gateway with Chromecast Support Feature Deployment Guide CUWN Release 8.2 mdns Gateway with Chromecast Support Feature Deployment Guide Chromecast 2 Deployment Considerations 2 Chromecast Deployment using mdns Gateway/ Feature Benefit 3 Components Used 3 Configuring

More information

Development of Massive Data Transferring Method for UPnP based Robot Middleware

Development of Massive Data Transferring Method for UPnP based Robot Middleware Development of Massive Data Transferring Method for UPnP based Robot Middleware Kyung San Kim, Sang Chul Ahn, Yong-Moo Kwon, Heedong Ko, and Hyoung-Gon Kim Imaging Media Research Center Korea Institute

More information

65 Deploy Wizard 191 Shipping from 22 December The errors & improvements below have been implemented in NetOp Desktop Firewall v. 3.0.

65 Deploy Wizard 191 Shipping from 22 December The errors & improvements below have been implemented in NetOp Desktop Firewall v. 3.0. New features Latest builds Client 191 Policy Server 65 Deploy Wizard 191 Shipping from 22 December 2006 The errors & improvements below have been implemented in NetOp Desktop Firewall v. 3.0. NDF Deploy

More information

UltraMon HSPI User s Guide A HomeSeer HS2 plug-in to monitor network connected devices

UltraMon HSPI User s Guide A HomeSeer HS2 plug-in to monitor network connected devices UltraMon HSPI User s Guide A HomeSeer HS2 plug-in to monitor network connected devices Copyright 2012 ultrajones@hotmail.com Revised 12/23/2012 This document contains proprietary and copyrighted information

More information

The CANoe.Ethernet Solution

The CANoe.Ethernet Solution Use in Praxis V1.0 2016-11-23 Agenda 1. Ethernet the Newcomer in Automotive 2. Why an Automotive Ethernet Option for CANoe? 3. Brief Look to CANoe 4. First Hand Usecase from Field 2/20 Network Topology

More information

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark Trúc Anh N. Nguyễn, Egemen K. Çetinkaya, Mohammed Alenazi, and James P.G. Sterbenz Department

More information

Designing a Resource Pooling Transport Protocol

Designing a Resource Pooling Transport Protocol Designing a Resource Pooling Transport Protocol Michio Honda, Keio University Elena Balandina, Nokia Research Center Pasi Sarolahti, Nokia Research Center Lars Eggert, Nokia Research Center Global Internet

More information

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose CSEN 503 Introduction to Communication Networks Mervat AbuElkheir Hana Medhat Ayman Dayf **Slides are attributed to J. F. Kurose 1-2 Link Layer Link Layer: Introduction Some terminology: hosts and routers

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

RX3041. User's Manual

RX3041. User's Manual RX3041 User's Manual Table of Contents 1 Introduction... 2 1.1 Features and Benefits... 3 1.2 Package Contents... 3 1.3 Finding Your Way Around... 4 1.4 System Requirements... 6 1.5 Installation Instruction...

More information

ETSI TS V1.1.1 ( )

ETSI TS V1.1.1 ( ) TS 103 286-3 V1.1.1 (2015-05) TECHNICAL SPECIFICATION Digital Video Broadcasting (DVB); Companion Screens and Streams; Part 3: Discovery 2 TS 103 286-3 V1.1.1 (2015-05) Reference DTS/JTC-DVB-343-3 Keywords

More information

California Energy Commission Computers Rulemaking

California Energy Commission Computers Rulemaking California Energy Commission Computers Rulemaking California Plug Load Research Center May 12, 2015 Kristen Driskell Appliances and Existing Buildings Office Efficiency Division California Energy Commission

More information

Protecting the Platforms. When it comes to the cost of keeping computers in good working order, Chapter10

Protecting the Platforms. When it comes to the cost of keeping computers in good working order, Chapter10 Chapter10 Protecting the Platforms Painting: The art of protecting flat surfaces from the weather and exposing them to the critic. Ambrose Bierce (1842 1914) When it comes to the cost of keeping computers

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

COMS3200/7201 Computer Networks 1 (Version 1.0)

COMS3200/7201 Computer Networks 1 (Version 1.0) COMS3200/7201 Computer Networks 1 (Version 1.0) Assignment 3 Due 8pm Monday 29 th May 2017. V1 draft (hopefully final) Note that the assignment has three parts Part A, B & C, each worth 50 marks. Total

More information

Apple computers tend to have the WOL settings in the BIOS already enabled by default.

Apple computers tend to have the WOL settings in the BIOS already enabled by default. is also known as WoL. This technology was developed to tell computers to power on from a powered off state by software across the network. By incorporating this technology into computer networks, administrators

More information

ENEE 457: Computer Systems Security 11/07/16. Lecture 18 Computer Networking Basics

ENEE 457: Computer Systems Security 11/07/16. Lecture 18 Computer Networking Basics ENEE 457: Computer Systems Security 11/07/16 Lecture 18 Computer Networking Basics Charalampos (Babis) Papamanthou Department of Electrical and Computer Engineering University of Maryland, College Park

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B

More information

Reducing Energy Waste Due to Idle Network Devices

Reducing Energy Waste Due to Idle Network Devices Reducing Energy Waste Due to Idle Devices Khan, R., & Khan, S. U. (2017). Reducing Energy Waste Due to Idle Devices. IEEE Potentials, 36(5), 37-45. DOI: 10.1109/MPOT.2017.2695298 Published in: IEEE Potentials

More information

mslp - Mesh-enhanced Service Location Protocol Λ

mslp - Mesh-enhanced Service Location Protocol Λ mslp - Mesh-enhanced Service Location Protocol Λ Weibin Zhao and Henning Schulzrinne Department of Computer Science Columbia University, New York, NY 10027 fzwb, hgsg@cs.columbia.edu Abstract The Service

More information

An ios Static Library for Service Discovery and Dynamic Procedure Calls

An ios Static Library for Service Discovery and Dynamic Procedure Calls An ios Static Library for Service Discovery and Dynamic Procedure Calls Arnav Anshul Department of Engineering. Arizona State University Polytechnic Campus. arnavanshul@gmail.com Abstract - Remote procedure

More information

Better Approach To Mobile Adhoc Networking

Better Approach To Mobile Adhoc Networking Better Approach To Mobile Adhoc Networking batman-adv - Kernel Space L2 Mesh Routing Martin Hundebøll Aalborg University, Denmark March 28 th, 2014 History of batman-adv The B.A.T.M.A.N. protocol initiated

More information

Summary of Changes between UPnP Device Architecture V1.0 (June 2000) and V1.0.1 (May 2003)

Summary of Changes between UPnP Device Architecture V1.0 (June 2000) and V1.0.1 (May 2003) Summary of Changes between UPnP Device Architecture V1.0 (June 2000) and V1.0.1 (May 2003) Change : E = Editorial only C = Technical, but backwardly compatible X = Technical, and may raise backward compatibility

More information

IT 341: Introduction to System

IT 341: Introduction to System IT 341: Introduction to System Administration Private IP Addresses and the Internet Using IP Addresses to Communicate Over the Internet Network Address Translation Private IP Addresses and the Internet

More information

Release Note of RMCARD 202/203 Ver (Release Date: 06/09/2017):

Release Note of RMCARD 202/203 Ver (Release Date: 06/09/2017): Release Note of RMCARD 202/203 Ver. 2.29 (Release Date: 06/09/2017): Unexpected reboot when E-mail notification was executed via Office365 SMTP Server. Fixed the system not sending the login fail event

More information

IrDA INTEROPERABILITY

IrDA INTEROPERABILITY Part F:2 IrDA INTEROPERABILITY The IrOBEX protocol is utilized by the Bluetooth technology. In Bluetooth, OBEX offers same features for applications as within the IrDA protocol hierarchy and enabling the

More information

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004 Denial of Service Serguei A. Mokhov SOEN321 - Fall 2004 Contents DOS overview Distributed DOS Defending against DDOS egress filtering References Goal of an Attacker Reduce of an availability of a system

More information

Doing Nothing Well * Aka: Wake-up Receivers to the Rescue. Jan M. Rabaey, University of California at Berkeley VLSI Symposium June 17, 2009

Doing Nothing Well * Aka: Wake-up Receivers to the Rescue. Jan M. Rabaey, University of California at Berkeley VLSI Symposium June 17, 2009 Doing Nothing Well * Aka: Wake-up Receivers to the Rescue [* Original quote by David Culler, UCB] Jan M. Rabaey, University of California at Berkeley VLSI Symposium June 17, 2009 Outline Major Focus on

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

Towards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings

Towards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings Towards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings By Lars Schor, Philipp Sommer, Roger Wattenhofer Computer Engineering and Networks Laboratory ETH Zurich, Switzerland

More information

Advanced Computer Networks. Wireless TCP

Advanced Computer Networks. Wireless TCP Advanced Computer Networks 263 3501 00 Wireless TCP Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Outline Last week: Today: Cellular Networks Mobile IP Wireless

More information

Local Area Networks and the Network Protocol Stack

Local Area Networks and the Network Protocol Stack Local Area Networks and the CSC362, Information Security Introduction problems inherent in transmitting packets network topologies network protocol stack Packet Switching Problems packet switching can

More information

IIOP: Internet Inter-ORB Protocol Make your code accessible even in future, with the next universal protocol

IIOP: Internet Inter-ORB Protocol Make your code accessible even in future, with the next universal protocol IIOP: Internet Inter-ORB Protocol Make your code accessible even in future, with the next universal protocol My Articles: Home Networking Wearable Computing IIOP Meet My Friend Intelligent Agents We are

More information

Ubiquitous Mobile Host Internetworking

Ubiquitous Mobile Host Internetworking Ubiquitous Mobile Host Internetworking David B. Johnson School of Computer Science Carnegie Mellon University Pittsburgh, PA 152 13-389 1 dbj Qcs. cmu. edu 1. Introduction With the increasing popularity

More information

Networks. Distributed Systems. Philipp Kupferschmied. Universität Karlsruhe, System Architecture Group. May 6th, 2009

Networks. Distributed Systems. Philipp Kupferschmied. Universität Karlsruhe, System Architecture Group. May 6th, 2009 Networks Distributed Systems Philipp Kupferschmied Universität Karlsruhe, System Architecture Group May 6th, 2009 Philipp Kupferschmied Networks 1/ 41 1 Communication Basics Introduction Layered Communication

More information

Iosif Legrand. California Institute of Technology

Iosif Legrand. California Institute of Technology California Institute of Technology Distributed Dynamic s Architecture Hierarchical structure of loosely coupled services which are independent & autonomous entities able to cooperate using a dynamic set

More information

Design and Implementation of a Service Discovery Architecture in Pervasive Systems

Design and Implementation of a Service Discovery Architecture in Pervasive Systems Design and Implementation of a Service Discovery Architecture in Pervasive Systems Vincenzo Suraci 1, Tiziano Inzerilli 2, Silvano Mignanti 3, University of Rome La Sapienza, D.I.S. 1 vincenzo.suraci@dis.uniroma1.it

More information

Firewalls and NAT. Firewalls. firewall isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others.

Firewalls and NAT. Firewalls. firewall isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others. Firews and NAT 1 Firews By conventional definition, a firew is a partition made of fireproof material designed to prevent the spread of fire from one part of a building to another. firew isolates organization

More information

TLDK Overview. Transport Layer Development Kit Keith Wiles April Contributions from Ray Kinsella & Konstantin Ananyev

TLDK Overview. Transport Layer Development Kit Keith Wiles April Contributions from Ray Kinsella & Konstantin Ananyev TLDK Overview Transport Layer Development Kit Keith Wiles April 2017 Contributions from Ray Kinsella & Konstantin Ananyev Notices and Disclaimers Intel technologies features and benefits depend on system

More information

CIT 380: Securing Computer Systems. Network Security Concepts

CIT 380: Securing Computer Systems. Network Security Concepts CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines

More information

Remote Health Monitoring for an Embedded System

Remote Health Monitoring for an Embedded System July 20, 2012 Remote Health Monitoring for an Embedded System Authors: Puneet Gupta, Kundan Kumar, Vishnu H Prasad 1/22/2014 2 Outline Background Background & Scope Requirements Key Challenges Introduction

More information

OpenScape DeskPhone CP HFA

OpenScape DeskPhone CP HFA OpenScape DeskPhone CP HFA Service Information - Trace Guide Unify SaS UCC PH DE DEV 2 Version: 1.2 Date: 18.06.2018 Unify Software and Solutions GmbH & Co. KG reserves the right to make changes and improvements

More information

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall 1 All rights reserved. No part of this

More information

Daedalus/GloMop Architectural Walkthrough

Daedalus/GloMop Architectural Walkthrough Daedalus/ Architectural Walkthrough Daedalus Retreat, Lake Tahoe June 18-20th, 1996 Steve Gribble and Todd Hodes {gribble,hodes}@cs.berkeley.edu Outline Motivation and overview Core architecture components

More information

ITTC Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark

ITTC Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark Trúc Anh N. Nguyễn, Egemen K. Çetinkaya, Mohammed Alenazi, and James P.G. Sterbenz Department

More information

ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX

ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ABSTRACT The base Mobile Internet Protocol (Mobile IP) provides a means for portable computers to roam freely, changing its point

More information

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal Tasks: Time: 2:00 hrs (Task 1-6 should take 45 min; the rest of the time is for Ethereal) 1 - Verify that TCP/IP is installed on

More information

BIOS Update Release Notes

BIOS Update Release Notes BIOS Update Release Notes PRODUCTS: D525MW, D525MWV, D425KT, D425KTW (Standard BIOS) BIOS Version 0132 - MWPNT10N.86A.0132.2013.0726.1534 Date: July 26, 2013 Fixed issue where system hangs when plugging

More information

NMS300 Network Management System Application

NMS300 Network Management System Application NMS300 Network Management System Application Quick Start Guide October 2013 202-11288-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing

More information

ECE 435 Network Engineering Lecture 17

ECE 435 Network Engineering Lecture 17 ECE 435 Network Engineering Lecture 17 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 7 November 2016 Announcements HW#6 graded, HW#8 on Wednesday Plumbers wrapup Not much network

More information

UltraMon3 HSPI User s Guide A HomeSeer HS3 plug-in to monitor network connected devices

UltraMon3 HSPI User s Guide A HomeSeer HS3 plug-in to monitor network connected devices UltraMon3 HSPI User s Guide A HomeSeer HS3 plug-in to monitor network connected devices Copyright 2016 ultrajones@hotmail.com Revised 04/12/2016 This document contains proprietary and copyrighted information

More information

Broadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol

Broadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol Broadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol G. Perera and K. Christensen Department of Computer Science and Engineering University of South Florida Tampa, FL 33620

More information

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites

More information

Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou

Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou Question 1: CIDR (10%) You are given a pool of 220.23.16.0/24 IP addresses to assign to hosts and routers in the system drawn below: a) (3%) How

More information

Domotz PRO Training Series Device Management

Domotz PRO Training Series Device Management Domotz PRO Training Series Device Management Device Details Screen Detailed Information Device Management Features Monitoring and Alerts Device Monitoring Device Details Device Details Tabs Status Name,

More information

Cable Modem Termination System Network Side Interface Specification

Cable Modem Termination System Network Side Interface Specification Cable Modem Termination System Network Side Interface Specification CLOSED Notice This DOCSIS specification is the result of a cooperative effort undertaken at the direction of Cable Television Laboratories,

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

Energy Efficient Ethernet, Wake Signals and Deep Sleep for Automotive Ethernet

Energy Efficient Ethernet, Wake Signals and Deep Sleep for Automotive Ethernet Energy Efficient Ethernet, Wake Signals and Deep Sleep for Automotive Ethernet IEEE P802.3ch Multigig Automotive Ethernet PHY Task Force George Zimmerman/CME Consulting, Inc IEEE P802.3ch MultiGigabit

More information

Performance Evaluation of NEMO Basic Support Implementations

Performance Evaluation of NEMO Basic Support Implementations Performance Evaluation of NEMO Basic Support Implementations Romain Kuntz, Koshiro Mitsuya, Ryuji Wakikawa Keio University, Japan E-mail: {kuntz,mitsuya,ryuji}@sfc.wide.ad.jp Abstract. The NEMO Basic Support

More information

CIT 480: Securing Computer Systems

CIT 480: Securing Computer Systems CIT 480: Securing Computer Systems Scanning CIT 480: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting CIT 480: Securing Computer

More information

Fundamentals of Telecommunication Networks (ECP 602)

Fundamentals of Telecommunication Networks (ECP 602) Fundamentals of Telecommunication Networks (ECP 602) c Samy S. Soliman EECE Department - Cairo University, Egypt Zewail City - University of Science and Technology ECNG Department - American University

More information