Introduction continued
|
|
- Helena Bell
- 5 years ago
- Views:
Transcription
1 Acknowledgments Design and Evaluation of Power Management Support for s Jakob Klamra and Martin Olsson Department of Communication Systems Lund Institute of Technology Lund, SWEDEN Thanks to: Dr. Christensen, USF Dr. Nyberg, LTH Dr. Labrador and Dr. Rundus, USF Bruce Nordman, LBNL Chamara Gunaratne, USF 1 Masters Defense June 7, 2005 (Tampa, Florida) 2 Topics Introduction Analysis Design Implementation Validation Energy Savings Estimate Introduction Problem: increased energy use by IT equipment More devices in US households IT equipment use 280 kwh/year per US household Adds up to $ 2240 million Problem: IT equipment always on, even when idle Required by some protocols Universal Plug and Play (UPnP) has this problem Our work solves the problem for UPnP Investigate the use of a power management proxy Conclusions and Future Work 3 4 1
2 Introduction continued UPnP is for automatic device configuration Network analogy of Microsoft plug-and-play Control points and services Discovery, eventing and control Introduction continued SSDP message exchange Discovery SSDP:discover Answered by Standardized by UPnP Forum More than 700 vendors, Microsoft, Intel, Nokia UPnP uses Simple Discovery Protocol SSDP is the key issue Control Point SSDP:discover SSDP:discover SSDP:discover 5 6 Introduction continued SSDP message exchange (continued) Notification Sent out periodically Introduction continued UPnP foundation, the stack SSDP use UDP UPnP Vendor Specific UPnP Forum Specific Architecture Eventing and control use TCP Our work is done here Control Point HTTP-MU SSDP UDP HTTP-U SSDP HTTP GENA TCP SOAP GENA 7 8 IP 2
3 Analysis Requirements for power management solutions: R1 Enable UPnP devices to enter power sleep R2 - Not interfere with existing UPnP functionality Analysis continued New Low power proxy Acts (answers and speaks) for sleeping devices Wakes up sleeping devices when they are needed R3 - Be robust R4 - Work for wired and wireless R5 - Handle many devices R6 - Be possible for us to implement Control Point 4. powered up 1. in power sleep 2. Request for service 3. Wake up SLEEP 9 10 Analysis continued Possible solutions to UPnP power management Three categories: Centralized proxy, no change to devices Invisible proxy Centralized proxy, minor change to devices Cooperating proxy No proxy, major change to devices ing NICs Design Selection of the solutions All requirements must be fulfilled Desirable properties As much power sleep as possible As little configuration as possible As little changes to UPnP protocol as possible Our design decision Invisible proxy Cooperating proxy
4 Design continued Design of invisible proxy 1. Timeout start proxy 6. Forward TCP SYN 2.SSDP:discover ST = Printer 4.TCP SYN 3. (Spoofed) ST=Printer 5.Wake On Lan ACK 7.TCP SYN SLEEP Control point Design continued Invisible proxy FSM LISTENING P1 P12 Timeout PROXY DEVICE P2 P23 SSDP:discover P32b S in proxy cache Discovery answer P24 TCP from CP WAIT FOR ALIVE P5 P45 S in proxy cache WOL to S P51a from S P55 Timeout Forward packet from CP CHECK PROXY CACHE DISCOVERY P3 CHECK PROXY CACHE TCP P CP = Control point, S =, WOL = Wake On Lan 15 Design continued Design of cooperating proxy 3.SSDP:discover ST = Printer 4. (Spoofed) ST=Printer 5.TCP SYN 1.GENA Powermgmt = SLEEP 2. 6.Wake On Lan 7.GENA Powermgmt = POWER 8.Forward TCP SYN SLEEP Control point 9.TCP SYN ACK 16 Design continued Cooperating proxy FSM LISTENING P1 P12 GENA, Power mgmt=sleep P51a GENA, Power mgmt=power Forward packet from CP PROXY DEVICE P2 P51a GENA Power mgmt=power, Forward packet from CP P23 SSDP:discover CHECK PROXY CACHE DISCOVERY P3 P32a S in proxy cache Discovery answer CHECK PROXY CACHE TCP P4 P24 TCP from CP FORWARD PACKET P5 CP = Control point, S =, WOL = Wake On Lan P45 S in proxy cache WOL to S 4
5 Implementation Development Tools Programming environment Dev-C++ Packet handling routines NETWIB libraries Packet capture and decoding Ethereal UPnP device toolkit Intel software for UPnP technologies Implementation continued Data structure for proxies Device Cache All devices on the network Cache All devices proxy is answering for Implementation continued Implementation continued Name Description Implementation of invisible proxy Main thread ip eth IP address Ethernet address Discover devices and build cache Start threads Notification 19 service server location last_activity All services of the device Server name Location Time for last activity from the device 20 Main loop Sniff packets Process packets Send answer and update caches cache update Check devices in Device Cache Update Cache Check Cache If needed send 5
6 Implementation continued Validation Implementation of cooperating proxy Main Thread Discover power management services and build cache Start threads Main loop Sniff packets Process packets Cache update Check Device cache Notification Check cache Read event socket Read and parse incoming events Update cache Validation design and implementation must meet requirements Known shortcomings TCP forwarding not implemented Cannot detect crashed devices Test cases 7 tests for each solution 3 tests not executed because lack of equipment 21 Answer and update caches Update Device cache Send 22 Validation continued Energy saving estimation Validation of invisible proxy 1 test passed 3 partially failed No unexpected behavior Estimates made for US residential IT equipment Estimates made for: Stock, power consumption, usage patterns Validation of cooperating proxy 2 tests passed 2 partially failed No unexpected behavior Calculations made for: Total energy and economic savings in 2008 Estimates from work by Energy Analysis Program at Lawrence Berkley National Laboratory Bruce Nordman
7 Energy saving estimation continued Background, stocks Energy saving estimation continued Results Device Devices 2001 Devices 2008 Network Connected devices 2008 Savings in GWh/year Savings in million dollars per year Notebooks Low estimation Desktops % Inkjets High estimation Laser printers % (all figures are in million) (8 cents/kwh) Conclusions and future work Conclusions and future work continued Conclusions Power management in UPnP achieved Proved by implementation and validation $71 - $285 million saved in American households using UPnP by 2008 Shortcomings of the design Long response time TCP connection between service and control point not established 27 Contributions First to design and implement power management proxy for UPnP Energy savings estimate motivates our work Member and contributors to UPnP Forum UPnP power management problem solved 28 can crash Lost information about sleeping devices not discoverable Need to support several medium UPnP is media independent 7
8 Conclusion and future work continued Future work UPnP power management standard Smart NIC NIC with proxy capability Distributed solution Extended proxy functionality Automatic configuration of power management Routing of services References In order of importance: [20] M. Jeronimo and J. Weast, UPnP Design by Example, Volume 1, April 2003 [26] B. Nordman and A. Meier, Energy Consumption of Home Information Technology, July 2004 [2] Y. Y. Goland, T. Cai, P. Leach and Y. Gu, Simple Discovery Protocol/1.0 Operating without an Arbiter, draft-cai-ssdp-v1-03.txt, IETF draft, October 1999 [5] UPnP Forum, May 2005 [27] K. Christensen, B. Nordman and A. George, The Next Frontier for Communications Networks: Power Management, Computer Communications, Volume 27, Number 18, pages , December 2004 [3] D. Box, G. Kakivaya, A. Layman, S. Thatte and D. Winer, SOAP: Simple Object Access Protocol, draft-box-http-soap-01.txt, IETF draft, November 1999 [4] J. Cohen, S. Aggarwal and Y. Y. Goland, General Event Notification Architecture Base: Client to Arbiter, draft-cohen-gena-p-base-01.txt, IETF draft, September Jakob Klamra Thank you Martin Olsson Project homepage:
Design and Implementation of a Power Management Proxy for Universal Plug and Play
Design and Implementation of a Power Management Proxy for Universal Plug and Play Jakob Klamra, Martin Olsson Dept. of Communication Systems Lund Institute of Technology Lund, Sweden jakob.klamra@gmail.com,
More informationDesign and Evaluation of Power Management Support for UPnP Devices
Design and Evaluation of Power Management Support for UPnP Devices A Master s Thesis by Jakob Klamra and Martin Olsson Department of Communication Systems Lund Institute of Technology June 10, 2005 Supervisors:
More informationReducing the Energy Consumption of Networked Devices
Reducing the Energy Consumption of Networked Devices Bruce Nordman Energy Analysis Lawrence Berkeley National Laboratory Berkeley, CA 94720 bnordman@lbl.gov Ken Christensen Computer Science and Engineering
More informationRapid PHY Selection (RPS): A Performance Evaluation of Control Policies
Rapid PHY Selection (RPS): A Performance Evaluation of Control Policies Ken Christensen Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 christen@cse.usf.edu (813)
More informationIEEE 802.3az: The Road to Energy Efficient Ethernet
IEEE 802.3az: The Road to Energy Efficient Ethernet K. Christensen, P. Reviriego, B Nordman, M. Bennett, M. Mostowfi, J.A. Maestro Presented by: Jordi Cucurull Linköpings universitet Sweden April 2, 2012
More informationAcknowledgments. Improving the Energy Efficiency of Networks: A Focus on Ethernet and End Devices. We thank Flavio Bonomi for inviting us
Improving the Energy Efficiency of Networks: A Focus on Ethernet and End Devices Ken Christensen Computer Science and Engineering University of South Florida Tampa, FL 33620 christen@cse.usf.edu (813)
More informationPROPOSAL TITLE: Green Networking: Reducing the Energy Use of LAN Switches and Connected Hosts
PROPOSAL TITLE: Green Networking: Reducing the Energy Use of LAN Switches and Connected Hosts PRIMARY INVESTIGATOR Ken Christensen (Professor) Department of Computer Science and Engineering 4202 East Fowler
More informationUPnP: Breaking out of the LAN
UPnP: Breaking out of the LAN Jim Grimmett and Eamonn O Neill Department of Computer Science, University of Bath Bath, United Kingdom Email: {jwg, eamonn}@cs.bath.ac.uk Abstract The use of devices embedded
More informationNetwork Connectivity Proxy: An Optimal Strategy for Reducing Energy Waste in Network Edge Devices
Network Connectivity Proxy: An Optimal Strategy for Reducing Energy Waste in Network Edge Devices Bolla, R., Giribaldi, M., Khan, R., & Repetto, M. (2013). Network Connectivity Proxy: An Optimal Strategy
More informationINTERNATIONAL STANDARD
ISO/IEC 29341-16-1 INTERNATIONAL STANDARD Edition 1.0 2011-08 colour inside Information technology UPnP device architecture Part 16-1: Low Power Device Control Protocol Low Power Architecture INTERNATIONAL
More informationupnp Device Architecture
upnp and DLNA upnp Device Architecture defines an architecture for pervasive peer-to-peer network connectivity of intelligent appliances, wireless devices, and PCs of all form factors easy-to-use, flexible,
More information[MS-SSDP-Diff]: SSDP: Networked Home Entertainment Devices (NHED) Extensions
[MS-SSDP-Diff]: SSDP: Networked Home Entertainment Devices (NHED) Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open
More informationUPNP AV ARCHITECTURE - GENERIC INTERFACE DESIGN AND JAVA IMPLEMENTATION
UPNP AV ARCHITECTURE - GENERIC INTERFACE DESIGN AND JAVA IMPLEMENTATION Andreas Bobek, Hendrik Bohn, Frank Golatowski Institute of Applied Microelectronics and Computer Science University of Rostock Richard-Wagner-Str.
More informationDistributed Systems 26. Mobile Ad Hoc Mesh Networks
Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers
More informationResearch on UPnP Protocol Stack for Applications on a Home Network
Research on UPnP Protocol Stack for Applications on a Home Network Kalaiselvi Arunachalam #1, Gopinath Ganapathy #2 # School of Computer Science, Engineering and Applications, Bharathidasan University,
More informationINTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
INTRODUCTION: DDOS ATTACKS 1 DDOS ATTACKS Though Denial of Service (DoS) and Distributed Denial of Service (DDoS) have been common attack techniques used by malicious actors for some time now, organizations
More informationEthernet Adaptive Link Rate: System Design and Performance Evaluation
Ethernet Adaptive Link Rate: System Design and Performance Evaluation Chamara Gunaratne and Ken Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 3360
More informationJESA Service Discovery Protocol
JESA Service Discovery Protocol Efficient Service Discovery in Ad-Hoc Networks Stephan Preuß University of Rostock; Dept. of Computer Science; Chair for Information and Communication Services mailto:spr@informatik.uni-rostock.de
More informationDynamically Updatable UPnP Service for Device Role Management
10th IEEE International Workshop on Managing Ubiquitous Communications and Services 2013, San Diego (18 March 2013) Dynamically Updatable UPnP Service for Device Role Management Tadanobu Tsunoda, Akira
More informationRedundancy for Routers using Enhanced VRRP
Redundancy for Routers using Enhanced VRRP 1 G.K.Venkatesh, 2 P.V. Rao 1 Asst. Prof, Electronics Engg, Jain University Banglaore, India 2 Prof., Department of Electronics Engg., Rajarajeshwari College
More informationUPnP Design by Example
UPnP Design by Example A Software Developer's Guide to Universal Plug and Play Michael Jeronimo Jack Weast Intel PRESS Contents Foreword Preface xix xv Acknowledgments xxvii Part I Introduction to the
More informationThe Internet of Things. Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group
1 The Internet of Things Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group Important! ٧ DREAM seminar 8 April 2014, UC Berkeley Low-Power Wireless Mesh Networks
More informationDesign and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan
Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan
More informationPower Management for Networked Systems
Power Management for Networked Systems Sylvia Ratnasamy (Intel Research Berkeley) Work in collaboration with UC Berkeley, Univ. of Washington and Lawrence Berkeley National Lab How do networks contribute
More informationAdvanced Network Approaches for Wireless Environment
Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk
More informationAvailable online at ScienceDirect. Procedia Computer Science 83 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 83 (2016 ) 187 194 The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016) Achieving
More informationNAT Traversal for VoIP
NAT Traversal for VoIP Dr. Quincy Wu National Chi Nan University Email: solomon@ipv6.club.tw.tw 1 TAC2000/2000 NAT Traversal Where is NAT What is NAT Types of NAT NAT Problems NAT Solutions Program Download
More informationEnergy-Efficient Ethernet for 100G Backplane and Copper
Energy-Efficient Ethernet for 100G Backplane and Copper IEEE 802.3bj Task Force Michael J. Bennett Lawrence Berkeley National Laboratory IEEE 802.3 Interim Meeting September 2011 Page 1 Contributors Hugh
More informationKen Christensen. University of South Florida Tampa, Florida USA hit
Green Networks: Reducing the Energy Consumption of Networks Ken Christensen Department t of Computer Science and Engineering i University of South Florida Tampa, Florida USA 33620 christen@cse.usf.edu
More informationSIMPLE SERVICE DISCOVERY PROTOCOL BASED DISTRIBUTED REFLECTIVE DENIAL OF SERVICE ATTACK
SIMPLE SERVICE DISCOVERY PROTOCOL BASED DISTRIBUTED REFLECTIVE DENIAL OF SERVICE ATTACK Gursewak Singh 1, Bohar Singh 2 1 Computer Science and Application, Govt College Sri Muktsar sahib 2 Computer Science
More informationOptimisation of ICT Infrastructure and Energy- Efficiency Techniques in Next Generation Internet
Optimisation of ICT Infrastructure and Energy- Efficiency Techniques in Next Generation Internet H. Abaci, G. Parr, S. McClean, A. Moore, F. Saffre (BT Adastral Park) India-UK Advanced Technology Centre
More informationOverview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.
Overview of TCP/IP 3 Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. 4 2 5 6 3 7 8 4 9 10 5 11 12 6 13 14 7 15 16 8 17 18 9 19 20 10 21 Why TCP/IP? Packet based Provides decentralized
More informationBluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002
Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),
More informationRapid PHY Selection (RPS): Emulation and Experiments using PAUSE
Rapid PHY Selection (RPS): Emulation and Experiments using PAUSE Ken Christensen Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 christen@cse.usf.edu (813) 974-4761
More informationRapid PHY Selection (RPS): Emulation and Experiments using PAUSE
Rapid PHY Selection (RPS): Emulation and Experiments using PAUSE Ken Christensen Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 christen@cse.usf.edu (813) 974-4761
More informationPolycom Better Together over Ethernet Connector 3.8.0
RELEASE NOTES 3.8.0 June 2018 3725-69895-009A Polycom Better Together over Ethernet Connector 3.8.0 Applies to Polycom VVX 200 Series, 300 Series, 400 Series, 500 Series, and 600 Series Business Media
More informationIntegrating Custom Hardware into Sensor Web. Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic
Integrating Custom Hardware into Sensor Web Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic OUTLINE 1. Introduction 2. State of the art 3. System architecture - main components 3.1 Hardware
More informationCUWN Release 8.2 mdns Gateway with Chromecast Support Feature Deployment Guide
CUWN Release 8.2 mdns Gateway with Chromecast Support Feature Deployment Guide Chromecast 2 Deployment Considerations 2 Chromecast Deployment using mdns Gateway/ Feature Benefit 3 Components Used 3 Configuring
More informationDevelopment of Massive Data Transferring Method for UPnP based Robot Middleware
Development of Massive Data Transferring Method for UPnP based Robot Middleware Kyung San Kim, Sang Chul Ahn, Yong-Moo Kwon, Heedong Ko, and Hyoung-Gon Kim Imaging Media Research Center Korea Institute
More information65 Deploy Wizard 191 Shipping from 22 December The errors & improvements below have been implemented in NetOp Desktop Firewall v. 3.0.
New features Latest builds Client 191 Policy Server 65 Deploy Wizard 191 Shipping from 22 December 2006 The errors & improvements below have been implemented in NetOp Desktop Firewall v. 3.0. NDF Deploy
More informationUltraMon HSPI User s Guide A HomeSeer HS2 plug-in to monitor network connected devices
UltraMon HSPI User s Guide A HomeSeer HS2 plug-in to monitor network connected devices Copyright 2012 ultrajones@hotmail.com Revised 12/23/2012 This document contains proprietary and copyrighted information
More informationThe CANoe.Ethernet Solution
Use in Praxis V1.0 2016-11-23 Agenda 1. Ethernet the Newcomer in Automotive 2. Why an Automotive Ethernet Option for CANoe? 3. Brief Look to CANoe 4. First Hand Usecase from Field 2/20 Network Topology
More informationITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark
Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark Trúc Anh N. Nguyễn, Egemen K. Çetinkaya, Mohammed Alenazi, and James P.G. Sterbenz Department
More informationDesigning a Resource Pooling Transport Protocol
Designing a Resource Pooling Transport Protocol Michio Honda, Keio University Elena Balandina, Nokia Research Center Pasi Sarolahti, Nokia Research Center Lars Eggert, Nokia Research Center Global Internet
More informationCSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose
CSEN 503 Introduction to Communication Networks Mervat AbuElkheir Hana Medhat Ayman Dayf **Slides are attributed to J. F. Kurose 1-2 Link Layer Link Layer: Introduction Some terminology: hosts and routers
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationRX3041. User's Manual
RX3041 User's Manual Table of Contents 1 Introduction... 2 1.1 Features and Benefits... 3 1.2 Package Contents... 3 1.3 Finding Your Way Around... 4 1.4 System Requirements... 6 1.5 Installation Instruction...
More informationETSI TS V1.1.1 ( )
TS 103 286-3 V1.1.1 (2015-05) TECHNICAL SPECIFICATION Digital Video Broadcasting (DVB); Companion Screens and Streams; Part 3: Discovery 2 TS 103 286-3 V1.1.1 (2015-05) Reference DTS/JTC-DVB-343-3 Keywords
More informationCalifornia Energy Commission Computers Rulemaking
California Energy Commission Computers Rulemaking California Plug Load Research Center May 12, 2015 Kristen Driskell Appliances and Existing Buildings Office Efficiency Division California Energy Commission
More informationProtecting the Platforms. When it comes to the cost of keeping computers in good working order, Chapter10
Chapter10 Protecting the Platforms Painting: The art of protecting flat surfaces from the weather and exposing them to the critic. Ambrose Bierce (1842 1914) When it comes to the cost of keeping computers
More informationMobile SCTP for IP Mobility Support in All-IP Networks
Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming
More informationCOMS3200/7201 Computer Networks 1 (Version 1.0)
COMS3200/7201 Computer Networks 1 (Version 1.0) Assignment 3 Due 8pm Monday 29 th May 2017. V1 draft (hopefully final) Note that the assignment has three parts Part A, B & C, each worth 50 marks. Total
More informationApple computers tend to have the WOL settings in the BIOS already enabled by default.
is also known as WoL. This technology was developed to tell computers to power on from a powered off state by software across the network. By incorporating this technology into computer networks, administrators
More informationENEE 457: Computer Systems Security 11/07/16. Lecture 18 Computer Networking Basics
ENEE 457: Computer Systems Security 11/07/16 Lecture 18 Computer Networking Basics Charalampos (Babis) Papamanthou Department of Electrical and Computer Engineering University of Maryland, College Park
More informationLecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005
Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks
More informationCOMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class
Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B
More informationReducing Energy Waste Due to Idle Network Devices
Reducing Energy Waste Due to Idle Devices Khan, R., & Khan, S. U. (2017). Reducing Energy Waste Due to Idle Devices. IEEE Potentials, 36(5), 37-45. DOI: 10.1109/MPOT.2017.2695298 Published in: IEEE Potentials
More informationmslp - Mesh-enhanced Service Location Protocol Λ
mslp - Mesh-enhanced Service Location Protocol Λ Weibin Zhao and Henning Schulzrinne Department of Computer Science Columbia University, New York, NY 10027 fzwb, hgsg@cs.columbia.edu Abstract The Service
More informationAn ios Static Library for Service Discovery and Dynamic Procedure Calls
An ios Static Library for Service Discovery and Dynamic Procedure Calls Arnav Anshul Department of Engineering. Arizona State University Polytechnic Campus. arnavanshul@gmail.com Abstract - Remote procedure
More informationBetter Approach To Mobile Adhoc Networking
Better Approach To Mobile Adhoc Networking batman-adv - Kernel Space L2 Mesh Routing Martin Hundebøll Aalborg University, Denmark March 28 th, 2014 History of batman-adv The B.A.T.M.A.N. protocol initiated
More informationSummary of Changes between UPnP Device Architecture V1.0 (June 2000) and V1.0.1 (May 2003)
Summary of Changes between UPnP Device Architecture V1.0 (June 2000) and V1.0.1 (May 2003) Change : E = Editorial only C = Technical, but backwardly compatible X = Technical, and may raise backward compatibility
More informationIT 341: Introduction to System
IT 341: Introduction to System Administration Private IP Addresses and the Internet Using IP Addresses to Communicate Over the Internet Network Address Translation Private IP Addresses and the Internet
More informationRelease Note of RMCARD 202/203 Ver (Release Date: 06/09/2017):
Release Note of RMCARD 202/203 Ver. 2.29 (Release Date: 06/09/2017): Unexpected reboot when E-mail notification was executed via Office365 SMTP Server. Fixed the system not sending the login fail event
More informationIrDA INTEROPERABILITY
Part F:2 IrDA INTEROPERABILITY The IrOBEX protocol is utilized by the Bluetooth technology. In Bluetooth, OBEX offers same features for applications as within the IrDA protocol hierarchy and enabling the
More informationDenial of Service. Serguei A. Mokhov SOEN321 - Fall 2004
Denial of Service Serguei A. Mokhov SOEN321 - Fall 2004 Contents DOS overview Distributed DOS Defending against DDOS egress filtering References Goal of an Attacker Reduce of an availability of a system
More informationDoing Nothing Well * Aka: Wake-up Receivers to the Rescue. Jan M. Rabaey, University of California at Berkeley VLSI Symposium June 17, 2009
Doing Nothing Well * Aka: Wake-up Receivers to the Rescue [* Original quote by David Culler, UCB] Jan M. Rabaey, University of California at Berkeley VLSI Symposium June 17, 2009 Outline Major Focus on
More informationSJTU 2018 Fall Computer Networking. Wireless Communication
SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP
More informationTowards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings
Towards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings By Lars Schor, Philipp Sommer, Roger Wattenhofer Computer Engineering and Networks Laboratory ETH Zurich, Switzerland
More informationAdvanced Computer Networks. Wireless TCP
Advanced Computer Networks 263 3501 00 Wireless TCP Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Outline Last week: Today: Cellular Networks Mobile IP Wireless
More informationLocal Area Networks and the Network Protocol Stack
Local Area Networks and the CSC362, Information Security Introduction problems inherent in transmitting packets network topologies network protocol stack Packet Switching Problems packet switching can
More informationIIOP: Internet Inter-ORB Protocol Make your code accessible even in future, with the next universal protocol
IIOP: Internet Inter-ORB Protocol Make your code accessible even in future, with the next universal protocol My Articles: Home Networking Wearable Computing IIOP Meet My Friend Intelligent Agents We are
More informationUbiquitous Mobile Host Internetworking
Ubiquitous Mobile Host Internetworking David B. Johnson School of Computer Science Carnegie Mellon University Pittsburgh, PA 152 13-389 1 dbj Qcs. cmu. edu 1. Introduction With the increasing popularity
More informationNetworks. Distributed Systems. Philipp Kupferschmied. Universität Karlsruhe, System Architecture Group. May 6th, 2009
Networks Distributed Systems Philipp Kupferschmied Universität Karlsruhe, System Architecture Group May 6th, 2009 Philipp Kupferschmied Networks 1/ 41 1 Communication Basics Introduction Layered Communication
More informationIosif Legrand. California Institute of Technology
California Institute of Technology Distributed Dynamic s Architecture Hierarchical structure of loosely coupled services which are independent & autonomous entities able to cooperate using a dynamic set
More informationDesign and Implementation of a Service Discovery Architecture in Pervasive Systems
Design and Implementation of a Service Discovery Architecture in Pervasive Systems Vincenzo Suraci 1, Tiziano Inzerilli 2, Silvano Mignanti 3, University of Rome La Sapienza, D.I.S. 1 vincenzo.suraci@dis.uniroma1.it
More informationFirewalls and NAT. Firewalls. firewall isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others.
Firews and NAT 1 Firews By conventional definition, a firew is a partition made of fireproof material designed to prevent the spread of fire from one part of a building to another. firew isolates organization
More informationTLDK Overview. Transport Layer Development Kit Keith Wiles April Contributions from Ray Kinsella & Konstantin Ananyev
TLDK Overview Transport Layer Development Kit Keith Wiles April 2017 Contributions from Ray Kinsella & Konstantin Ananyev Notices and Disclaimers Intel technologies features and benefits depend on system
More informationCIT 380: Securing Computer Systems. Network Security Concepts
CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines
More informationRemote Health Monitoring for an Embedded System
July 20, 2012 Remote Health Monitoring for an Embedded System Authors: Puneet Gupta, Kundan Kumar, Vishnu H Prasad 1/22/2014 2 Outline Background Background & Scope Requirements Key Challenges Introduction
More informationOpenScape DeskPhone CP HFA
OpenScape DeskPhone CP HFA Service Information - Trace Guide Unify SaS UCC PH DE DEV 2 Version: 1.2 Date: 18.06.2018 Unify Software and Solutions GmbH & Co. KG reserves the right to make changes and improvements
More informationComputers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources
Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall 1 All rights reserved. No part of this
More informationDaedalus/GloMop Architectural Walkthrough
Daedalus/ Architectural Walkthrough Daedalus Retreat, Lake Tahoe June 18-20th, 1996 Steve Gribble and Todd Hodes {gribble,hodes}@cs.berkeley.edu Outline Motivation and overview Core architecture components
More informationITTC Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark
Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark Trúc Anh N. Nguyễn, Egemen K. Çetinkaya, Mohammed Alenazi, and James P.G. Sterbenz Department
More informationROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX
ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ABSTRACT The base Mobile Internet Protocol (Mobile IP) provides a means for portable computers to roam freely, changing its point
More informationCS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal
CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal Tasks: Time: 2:00 hrs (Task 1-6 should take 45 min; the rest of the time is for Ethereal) 1 - Verify that TCP/IP is installed on
More information>>> SOLUTIONS <<< Answer the following questions regarding the basics principles and concepts of networks.
Midterm Exam for Computer Networks (CNT 625) Fall 24 >>> SOLUTIONS
More informationBIOS Update Release Notes
BIOS Update Release Notes PRODUCTS: D525MW, D525MWV, D425KT, D425KTW (Standard BIOS) BIOS Version 0132 - MWPNT10N.86A.0132.2013.0726.1534 Date: July 26, 2013 Fixed issue where system hangs when plugging
More informationNMS300 Network Management System Application
NMS300 Network Management System Application Quick Start Guide October 2013 202-11288-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing
More informationECE 435 Network Engineering Lecture 17
ECE 435 Network Engineering Lecture 17 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 7 November 2016 Announcements HW#6 graded, HW#8 on Wednesday Plumbers wrapup Not much network
More informationUltraMon3 HSPI User s Guide A HomeSeer HS3 plug-in to monitor network connected devices
UltraMon3 HSPI User s Guide A HomeSeer HS3 plug-in to monitor network connected devices Copyright 2016 ultrajones@hotmail.com Revised 04/12/2016 This document contains proprietary and copyrighted information
More informationBroadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol
Broadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol G. Perera and K. Christensen Department of Computer Science and Engineering University of South Florida Tampa, FL 33620
More informationDEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
More informationFinal Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou
Final Exam Computer Networks Fall 2015 Prof. Cheng-Fu Chou Question 1: CIDR (10%) You are given a pool of 220.23.16.0/24 IP addresses to assign to hosts and routers in the system drawn below: a) (3%) How
More informationDomotz PRO Training Series Device Management
Domotz PRO Training Series Device Management Device Details Screen Detailed Information Device Management Features Monitoring and Alerts Device Monitoring Device Details Device Details Tabs Status Name,
More informationCable Modem Termination System Network Side Interface Specification
Cable Modem Termination System Network Side Interface Specification CLOSED Notice This DOCSIS specification is the result of a cooperative effort undertaken at the direction of Cable Television Laboratories,
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationEnergy Efficient Ethernet, Wake Signals and Deep Sleep for Automotive Ethernet
Energy Efficient Ethernet, Wake Signals and Deep Sleep for Automotive Ethernet IEEE P802.3ch Multigig Automotive Ethernet PHY Task Force George Zimmerman/CME Consulting, Inc IEEE P802.3ch MultiGigabit
More informationPerformance Evaluation of NEMO Basic Support Implementations
Performance Evaluation of NEMO Basic Support Implementations Romain Kuntz, Koshiro Mitsuya, Ryuji Wakikawa Keio University, Japan E-mail: {kuntz,mitsuya,ryuji}@sfc.wide.ad.jp Abstract. The NEMO Basic Support
More informationCIT 480: Securing Computer Systems
CIT 480: Securing Computer Systems Scanning CIT 480: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting CIT 480: Securing Computer
More informationFundamentals of Telecommunication Networks (ECP 602)
Fundamentals of Telecommunication Networks (ECP 602) c Samy S. Soliman EECE Department - Cairo University, Egypt Zewail City - University of Science and Technology ECNG Department - American University
More information