Improved connectivity for passengers on commuter trains. Börje Ohlman Anders Eriksson Karl-Åke Persson Ericsson
|
|
- Roberta Higgins
- 6 years ago
- Views:
Transcription
1 Improved connectivity for passengers on commuter trains Börje Ohlman Anders Eriksson Karl-Åke Persson Ericsson
2 Content ICN background, short introduction Improved connectivity for passengers on commuter trains problem description Project proposal outline
3 Evolution of networking Today s Internet Focuses on Conversations between osts ost-centric abstraction Who to communicate with Information-centric network Focuses on Dissemination of Information objects Information-centric abstraction What to communicate Connect nodes Web Evolution CD N P2P Access information 09/23/11 3
4 ost-centric networking Connect to Server X and get object B Trusted Server Server X Secure Connection 09/23/11 4
5 Information-centric networking Untrusted host Trustable copy of object B Get object B Untrusted connection 09/23/11 5
6 Key elements in ICN Object Naming Object Caching ow to find Objects
7 Object naming ow to make objects trustable? Object name = type/ hash of object content An object containing nothing (empty string) will get the name Sha-256/e3b0c44298fc1c149afbf4c8996fb92427a e41e4649b934ca495991b7852b855
8 Caching Storage capacity in nodes will continue to increase. New Seagate technology promises hard drive storage capacities of up to 60 terabytes in the next decade Assumption: In the not to far future nodes should be able to store most of the content that they are forwarding or downloading. This will decrease network traffic. A copy of the content you are looking for is probably available close to you in a cache.
9 ow to find Objects NRS Broadcast Add hook routing Name based routing Name resolution servers ierarchical Distributed ash table
10 Network characteristics Node-centric network Information-centric network
11 ICN vs current networks P2P P2P P2P P2P Overlay Network P2P P2P API DNN API DNN DNN DNN Dissemination DNN Network DNN API P2P P2P P2P P2P API API DNN DNN Caches integrated in the network infrastructure Combines today's CDNs and user caching (p2p) in the basic network service Network service in terms of named data objects No direct host addressing
12 Object Lock-in per Application sensor sensor application application content contentcentric distribution application application person-toperson person-toperson application application sensor sensor sensor person person content person person content = object naming naming reachability reachability naming naming reachability reachability naming naming reachability DNS global IP network Today s Internet Object lock-in per application Comparable to host lock-in per network before Internet 09/23/11 12
13 Application Development on a Common Naming and Reachability Infrastructure App X App Y NRS & RVS sensor person content person naming reachability caching global IP network person any type = object NetInf API Information centric network Seamless communication between objects of all types NRS Name Resolution System RVS Rendezvous System 09/23/11 13
14 Improved connectivity for passengers on commuter trains problem description (1) Today mobile networks have difficulties to provide adequate service in some challenging situations, e.g. when a commuter train with large numbers of active users are moving relative the network infrastructure.
15 Improved connectivity for passengers on commuter trains problem description (2) Implement solutions for this problem using ICN technology p2p communication and caching Local cache with WiFi access Real world trial NetInf cache.. IO 3G NetInf cache IO WLAN
16 Project proposal outline Develop an NetInf node in Erlang with WLAN and caching Deploy SAIL NetInf Androids together with WLAN caching node in a train environment Perform extensive testing and evaluation of how connectivity is changed using this technology Develop new NetInf functionality, e.g. caching strategies, multihop vs. infrastructure communication,. The train scenario is an example. Alternative NetInf scenarios can be considered.
17
18 Improved connectivity for passengers on commuter trains problem description (2) We would like to investigate in some type of real-world trial how ICN, by p2p communication and caching could improve the situation by offloading traffic from the mobile infrastructure. Local cache with WiFi access in train can be managed by: train operator interested in improving the travel experience cellular operator offloading the cellular network by offering a cellular access via the cache if none of the above is at hand, caching can be distributed on the mobile end user devices on the train NetInf cache IO WLAN NetInf cache IO 3G
19 Improved connectivity for passengers on commuter trains problem description Today mobile networks have difficulties to provide adequate service in some challenging situations, e.g. when a commuter train with large numbers of active users are moving relative the network infrastructure. We would like to investigate in some type of real-world trial how ICN, by p2p communication and caching could improve the situation by offloading traffic from the mobile infrastructure. Local cache with WiFi access in train can be managed by: train operator interested in improving the travel experience cellular operator offloading the cellular network by offering a cellular access via the cache if none of the above is at hand, caching can be distributed on the mobile end user devices on the train
20 Improved connectivity for passengers on commuter trains NetInf cache IO 3G Local cached copies are found and used WLAN NetInf cache IO
21 4WARD NetInf Naming Scheme Information Object (IO) = (ID, Data, Metadata) ID = (Type tag, Authenticator, Label) Each IO has an owner All equivalent copies have the same ID ID Type A=ash(PK IO ) L={attributes} Security Data Metadata SK IO Slide 21
22 Identifier and Information Modelling 1. Step: Persistently identify information via identifier/locator split Location-independent identifiers Represent multiple copies 2. Step: Representation of information via Information Objects (IOs) Another level of indirection Represent information independent of specific copy and encoding E.g. a text, a song Contains information-specific metadata E.g. access rights, attributes Aggregation All About Information Objects can do more: Representation of: Streams Services Real-world objects (e.g., a book, person) IOs can be used to organize information Data IO Files IOs Encoding IO Song1.mp3 Song1.mp3 Song1.mp3 Song1 Song1 Song1.wav Song1.wav Song1.wav Virtual Entity IO Lyrics.txt Lyrics.txt Lyrics.txt Lyrics.txt Eiffel Eiffel.jpg Eiffel.jpg Eiffel.jpg Paris Service IO Service1 Service1 Service1 Enables efficient information dissemination System can automatically choose encoding and copy (e.g. based on metadata) User can navigate information (e.g. choose encoding) 13/09/2012 Slide 22
23 ICN is more than CDN Augmented Internet Real-world objects Linking real world objects in the virtual information world Clicking on and bookmarking real world objects Semantic information model Support for DTN The ICN pub/sub API naturally support asynchronous communication Sensor networking ICN handle sensor data just like any other type of information object Eiffel Tower istorical Info Wikipedia Buy Ticket 09/23/11 23
Employing Attribute-Based Encryption in Systems with Resource Constrained Devices in an Information-Centric Networking Context
Employing Attribute-Based Encryption in Systems with Resource Constrained Devices in an Information-Centric Networking Context Global IoT Summit (GIoTS) Geneva, June 6-9, 2017 Börje Ohlman Ericsson Research
More informationHost Identity Indirection Infrastructure Hi 3. Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research
Host Identity Indirection Infrastructure Hi 3 Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research Presentation outline Motivation Background Secure i 3 Hi 3 Summary 2 Hi 3 motivation Question:
More informationExpires: February 21, Huawei & USTC G. Wang. Huawei Technologies. August 20, 2013
ICN Research Group Internet-Draft Intended status: Informational Expires: February 21, 2014 X. Zhang R. Ravindran Huawei Technologies H. Xie Huawei & USTC G. Wang Huawei Technologies August 20, 2013 Abstract
More informationSecure Naming for a Network of Information
Secure Naming for a Network of Information Christian Dannewitz cdannewitz@upb.de Jovan Golić jovan.golic@telecomitalia.it Börje Ohlman borje.ohlman@ericsson.com Bengt Ahlgren bengta@sics.se Abstract Several
More informationMobility Support in ICNs: Research Directions and Challenges
Mobility Support in ICNs: Research Directions and Challenges Gareth Tyson Queen Mary, University of London gareth.tyson@eecs.qmul.ac.uk Introduction What is Mobility? Why is it hard? ICN: The Solution?
More informationWhen ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G
When ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G Motivation Mobile Internet and explosion of its applications,
More informationAlma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering
Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains
More informationConverged Infotainment Delivery Platform for Smart Vehicles Dr. Hui Liu, Chief Scientist New York Broadband (NYBB)/Silkwave Holdings
Converged Infotainment Delivery Platform for Smart Vehicles Dr. Hui Liu, Chief Scientist New York Broadband (NYBB)/Silkwave Holdings ITU SG16 July 2018 A page from history 1973 Smartphones revolutionized
More informationB U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved.
B U I L D I N G O N T H E G A T E W A Y Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationios BYOD Wireless Instructions
ios BYOD Wireless Instructions The following is an outline of the process required to connect your personally-owned ios device to the BYOD Wireless. First open the settings App Select the BYOD wireless
More informationCOURSE OUTLINE MOC : PLANNING AND ADMINISTERING SHAREPOINT 2016
COURSE OUTLINE MOC 20339-1: PLANNING AND ADMINISTERING SHAREPOINT 2016 Module 1: Introducing SharePoint 2016 This module describes the structure and capabilities of a SharePoint environment, and the major
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile
More informationQuick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003
CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last
More informationOverlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example
Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization
More informationNTG Wifi-Calling Client. Proudly Canadian
Proudly Canadian Content NTG Overview Wifi-Calling Service Why Wifi-Calling Challenges for Wifi-Calling NTG VoWifi Client 2 Company Overview Telecom and IT infrastructure solutions provider, established
More informationA Survey of Information-Centric Networking
INFORMATION-CENTRIC NETWORKING A Survey of Information-Centric Networking Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, and Börje Ohlman, ABSTRACT The information-centric networking
More informationZumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents
Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents Introduction... 2 High-Level Platform Architecture Diagram... 3 Zbi Production Environment... 4 Zbi Publishing Engine...
More informationCryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption
More informationAKAMAI WHITE PAPER. Security and Mutual SSL Identity Authentication for IoT. Author: Sonia Burney Solutions Architect, Akamai Technologies
AKAMAI WHITE PAPER Security and Mutual SSL Identity Authentication for IoT Author: Sonia Burney Solutions Architect, Akamai Technologies Security and Mutual SSL Identity Authentication for IoT 1 Introduction:
More informationMobile Security Fall 2011
Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy HW #3 is due today Announcements Exam is in-class on Nov 9 Agenda Location security Location privacy Location, Location,
More informationChapter 2 Information-Centric Networks (ICN)
Chapter 2 Information-Centric Networks (ICN) Muhammad Azfar Yaqub, Syed Hassan Ahmed, Safdar Hussain Bouk and Dongkyun Kim Abstract During the past decades, serious efforts have been made to propose various
More informationGSM-R: expanding the applications
GSM-R: expanding the applications Giovanni Guidotti, Philippe Branly 1 GSM-R evolution GSM-R initially designed for voice and signalling traffic GSM-R: not a substitute for some products, but a powerful
More informationLecture 13: P2P Distributed Systems
Lecture 13: P2P Distributed Systems Behzad Bordbar School of Computer Science, University of Birmingham, UK Lecture 13 1 Outline Characteristics of P2P How Napster works? Limitation of Napster and P2P
More informationICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe
ICN & 5G Dr.-Ing. Dirk Kutscher Chief Researcher Networking NEC Laboratories Europe Performance and Security Today User Equipment Access Network Core/Service Network Application Servers 2 NEC Corporation
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl, Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks," Wiley 2005 Goals of this chapter Having looked at the
More informationTowards a Delay-tolerant Future: Reconsidering some Assumptions in Networking. Reconsidering the Internet Design. Number of layers
Towards a Delay-tolerant Future: Reconsidering some ssumptions in Networking CHINTI Jörg tt 2 July 2009 tubs.city 2009 Jörg tt 1 Reconsidering the Internet Design Communication paradigms
More informationIntroduction to Information Centric Networking
Introduction to Information Centric Networking... with a Dash of Security Claudio Marxer Computer Networks Group University of Basel Switzerland Open Source IoT & Blockchain
More informationHosted Azure for your business. Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution.
Hosted Azure for your business Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution. Azure is approximately 50 percent cheaper than other cloud services
More informationDEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1
More informationUnified Access and Aggregation Network Allowing Fixed and Mobile Networks to Converge: The COMBO project
Unified Access and Aggregation Network Allowing Fixed and Mobile Networks to Converge: The COMBO project P. Chanclou, S. Gosselin, T. Mamouni, D. Breuer, E. Weis, J. Torrijos 1 Agenda 2 COMBO project Key
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Having looked at the individual nodes in the previous chapter,
More informationICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016)
ICN IDENTIFIER / LOCATOR Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) 1 A brief review of ID/Locators in IETF It s long, and we ll skim over it Then we discuss the CCNx & NDN
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to
More informationQuick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the
More informationHIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson
HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features
More informationEnabling Network Identifier (NI) in Information Centric Networks to Support Optimized Forwarding
Enabling Network Identifier (NI) in Information Centric Networks to Support Optimized Forwarding IETF/IRTF/ICNRG, 97 (draft-azgin-icnrg-ni-00.txt) Authors: Aytac Azgin, Ravi Ravindran (aytac.azgin@huawei.com,
More informationArchitectural Support for Internet Evolution and Innovation
Architectural Support for Internet Evolution and Innovation George N. Rouskas Department of Computer Science North Carolina State University http://net-silos.net/ Joint work with: Ilia Baldine (RENCI),
More informationCCNx: Content Centric Networking
CCNx: Content Centric Networking Palo Alto Research Center (PARC) Akmal Khan Topics in Internet SNU CSE Spring 2011 2011-03-28 1/31 Agenda Project CCNx Package contents Supported platforms and development
More informationOpen Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010
Open Mobile Platforms EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms The Android Initiative T-Mobile s ongoing focus on Android based devices in US and EU markets In Nov 2007, Google announced
More information9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis
More informationMobilityFirst Future Internet Architecture. Samuel Nelson
MobilityFirst Future Internet Architecture Samuel Nelson snelson@winlab.rutgers.edu MobilityFirst Project: Collaborating Institutions (LEA) A. Venkataramani, J. Kurose,. Towsley M. Reiter S. Bannerjee
More informationThe Design Space of Network Mobility
The Design Space of Network Mobility Key ideas Network Mobility Seamless Mobility Overview of implementations and challenges Geomorphic model New abstraction for the network stack Helps us discuss, understand
More informationCLIENT AGENTS. Finally see exactly what each Wi-Fi client is experiencing without costly sensor overlays or cumbersome RF diagnostics
CLIENT AGENTS Finally see exactly what each Wi-Fi client is experiencing without costly sensor overlays or cumbersome RF diagnostics INTRODUCING VOYANCE CLIENT AGENTS Secure, configurable and deployed
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the
More informationGeneral System Requirements MCS Apps
General System Requirements MCS Apps Document status Document owner LIVE Thomas Verdyck Goals Get insight on the minimal hardware & software requirements needed for running an app of the MCS Software suite.
More informationVMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources
VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback
More informationCourse Outline: Course : Core Solutions Microsoft SharePoint Server 2013
Course Outline: Course 20339-1: Core Solutions Microsoft SharePoint Server 2013 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This five-day course will provide
More informationPlatform Architecture Overview
Platform Architecture Overview Platform overview How-to example Platform components detailed Mediation infrastructure VAS USER container Architecture: overall Backend platform Container Persistence External
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationCloud FastPath: Highly Secure Data Transfer
Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance
More informationConverged fixed and mobile broadband networks based on Next Generation Point of Presence
Converged fixed and mobile broadband networks based on Next Generation Point of Presence Stéphane GOSSELIN, Tahar MAMOUNI, Philippe BERTIN, Jose TORRIJOS, Dirk BREUER, Erik WEIS, Jean-Charles POINT Orange,
More informationWiFi Integration in Evolution to 5G networks. Satish Kanugovi WiFi Knowledge Summit, Bangalore March 9, Nokia 2018
WiFi Integration in Evolution to 5G networks Satish Kanugovi (satish.k@nokia.com) WiFi Knowledge Summit, Bangalore March 9, 2018 1 Nokia 2018 Outline Integrating WiFi Access into the 5G Core Multi-Access
More informationHPC in Cloud. Presenter: Naresh K. Sehgal Contributors: Billy Cox, John M. Acken, Sohum Sohoni
HPC in Cloud Presenter: Naresh K. Sehgal Contributors: Billy Cox, John M. Acken, Sohum Sohoni 2 Agenda What is HPC? Problem Statement(s) Cloud Workload Characterization Translation from High Level Issues
More informationFirmware Updates for Internet of Things Devices
Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware
More informationInformation-Centric Networking: Overview, Current State and Key Challenges
UCL DEPARTMENT OF ELECTRONIC AND ELECTRICAL ENGINEERING COMMUNICATIONS AND INFORMATION SYSTEMS GROUP IEEE ISCC 2011 Keynote Information-Centric Networking: Overview, Current State and Key Challenges Prof.
More informationCSE 123A Computer Netwrking
CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 20339-1; 5 Days; Instructor-led Course Description This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft SharePoint
More informationICN Research Challenges draft-kutscher-icnrg-challenges-00
ICN Research Challenges draft-kutscher-icnrg-challenges-00 Dirk Kutscher, Suyong Eum, Kostas Pentikousis, Ioannis Psaras, Daniel Corujo, Damien Saucez Document Purpose WHY Problems and pain points in today's
More informationCloud Secure Integration with ADFS. Deployment Guide
Cloud Secure Integration with ADFS Deployment Guide Product Release 8.3R3 Document Revisions 1.0 Published Date October 2017 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose CA 95134 http://www.pulsesecure.net
More informationTowards Multitechnology
Towards Multitechnology seamless access for 5G: a first approach with very tight coupling IMT 5G Workshop, 7 sep 2015 X. Lagrange, Y. Khadraoui, A. Gravey Outline Introduction : Fixed Mobile Convergence
More informationInformation-Centric Networking and Software Defined Networking
Information-Centric Networking and Software Defined Networking Mays AL-Naday Martin Reed Jan 15, 2015 Introduction 1 Introduction 2 3 4 Information-Centric Networking and Media streaming Introduction Traditional
More informationEnterprise Knowledge Map: Toward Subject Centric Computing. March 21st, 2007 Dmitry Bogachev
Enterprise Knowledge Map: Toward Subject Centric Computing March 21st, 2007 Dmitry Bogachev Are we ready?...the idea of an application is an artificial one, convenient to the programmer but not to the
More informationAn extensible DDS-based monitoring and intrusion detection system
Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems. March 22-24, 2011, Washington, DC, USA. An extensible DDS-based monitoring and intrusion detection system Fernando Garcia-Aranda
More informationICN-WEN Information Centric-Networking in Wireless Edge Networks
ICN-WEN Information Centric-Networking in Wireless Edge Networks Srikathyayani Srikanteswara Jeff Foerster Intel Labs (IL) Eve Schooler Internet of Things Group (IoTG) March 30, 2017 Outline Backstory
More informationPerformance Evaluation of CCN
Performance Evaluation of CCN September 13, 2012 Donghyun Jang, Munyoung Lee, Eunsang Cho, Ted Taekyoung Kwon (Seoul National University), Byoung-Joon Lee, Myeong-Wuk Jang, Sang-Jun Moon (Samsung Electronics),
More informationInternet Indirection Infrastructure (i3)
Internet Indirection Infrastructure (i3) Ion Stoica UC Berkeley March 20, 2003 The Problem Indirection: a key technique in implementing many network services, e.g., Mobility Multicast, anycast Web caching,
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationGlobal Data Plane. The Cloud is not enough: Saving IoT from the Cloud & Toward a Global Data Infrastructure PRESENTED BY MEGHNA BAIJAL
Global Data Plane The Cloud is not enough: Saving IoT from the Cloud & Toward a Global Data Infrastructure PRESENTED BY MEGHNA BAIJAL Why is the Cloud Not Enough? Currently, peripherals communicate directly
More informationCCN/NDN implementation by network softwarization. September 21 st, 2015 Toshitaka Tsuda Waseda University
CCN/NDN implementation by network softwarization September 21 st, 2015 Toshitaka Tsuda Waseda University Background consideration of our approach The 5G core network will be the foundation of the future
More informationCOSC Redis. Paul Moore, Stephen Smithbower, William Lee. March 11, 2013
March 11, 2013 What is Redis? - Redis is an in-memory key-value data store. - Can be a middle-ware solution between your expensive persistent data-store (Oracle), and your application. - Provides PubSub,
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?
DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing Slide 1 Slide 3 ➀ What is Cloud Computing? ➁ X as a Service ➂ Key Challenges ➃ Developing for the Cloud Why is it called Cloud? services provided
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general principles and architectures how to put
More information5G in Reality. Mikael Höök, Director Radio Research Ericsson Research
5G in Reality Mikael Höök, Director Radio Research Ericsson Research FORECAST ~29 billion connected devices, 18 billion related to IoT 2018 2019 2020 2022 2021 ~550 million 5G subscriptions IoT devices
More informationWHITE PAPER Cloud Technology for TV Broadcasters Baskar Subramanian Co-founder Amagi Media Labs Pvt. Ltd.
www.amagi.com WHITE PAPER Cloud Technology for TV Broadcasters Baskar Subramanian Co-founder Amagi Media Labs Pvt. Ltd. Introduction Cloud technology is disrupting economies and business models across
More informationNew Generation Open Content Delivery Networks
Open ContEnt Aware Networks New Generation Open Content Delivery Networks Yannick Le Louédec Orange Labs Workshop Future Media Distribution. November 10 th, 2011 www.ict-ocean.eu The research leading to
More information(h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages
(h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages Mauro Sardara, Luca Muscariello, Alberto Compagno Software Engineer ICNRG Interim Meeting, London, 18 th of March
More informationMobile AR Hardware Futures
Copyright Khronos Group, 2010 - Page 1 Mobile AR Hardware Futures Neil Trevett Vice President Mobile Content, NVIDIA President, The Khronos Group Two Perspectives NVIDIA - Tegra 2 mobile processor Khronos
More informationA Scalable Named Information Network Architecture (NINA)
A Scalable Named Information Network Architecture (NINA) Ruidong Li, Hiroaki Harai Network Architecture Laboratory, National Institute of Information and Communications Technology (NICT) Contact Email:
More informationIntermediary Systems: A Survey
Intermediary Systems: A Survey Marios Dikaiakos Dept. of Computer Science University of Cyprus 3 rd Anwire Workshop on Adaptable Service Provision 18 th November 2003, Paris Outline Introduction. Classifying
More information20489: Developing Microsoft SharePoint Server 2013 Advanced Solutions
20489: Developing Microsoft SharePoint Server 2013 Advanced Solutions Length: 5 days Audience: Developers Level: 300 OVERVIEW This course provides SharePoint developers the information needed to implement
More informationOpportunistic Web Access via WLAN Hotspots
Opportunistic Web Access via WLAN Hotspots Mikko Pitkänen, Teemu Kärkkäinen, and Jörg Ott DTNRG, 2010-07-30 Agenda Introduction: Urban Pedestrians and Hotspot Access Opportunistic Web Access DTN-based
More informationCloud Security Best Practices
Cloud Security Best Practices Cohesive Networks - your applications secured Our family of security and connectivity solutions, VNS3, protects cloud-based applications from exploitation by hackers, criminal
More informationLecture 21 11/27/2017 Next Lecture: Quiz review & project meetings Streaming & Apache Kafka
Lecture 21 11/27/2017 Next Lecture: Quiz review & project meetings Streaming & Apache Kafka What problem does Kafka solve? Provides a way to deliver updates about changes in state from one service to another
More informationTOPLink for WebLogic. Whitepaper. The Challenge: The Solution:
Whitepaper The Challenge: Enterprise JavaBeans (EJB) represents a new standard in enterprise computing: a component-based architecture for developing and deploying distributed object-oriented applications
More informationTowards Future Internet
Towards Future Internet Reijo Juvonen Head of Operations, Research and Technology Nokia Siemens Networks ICT SHOK Future Internet Focus Area Director Telecom Forum '2008, TKK, 4.11.2008 1 Nokia Siemens
More informationMulti-RATs Convergence: A New Spin Through the Edge
Multi-RATs Convergence: A New Spin Through the Edge Ping-Heng (Wallace) Kuo and Alain Mourad InterDigital, London, UK Cambridge Wireless, 14 December 2017 2016 InterDigital, Inc. All Rights Reserved. Outline
More informationAddressing Unique M2M Challenges with Converged Gateways
October 19-20, 2010 Addressing Unique M2M Challenges with Converged Gateways Paul L. Russell, Jr. Paul.Russell@InterDigital.com ETSI TC M2M Workshop 19-20 October 2010, Sophia Antipolis, France Where are
More informationComputer Networks. General Course Information. Addressing and Routing. Computer Networks 9/8/2009. Basic Building Blocks for Computer Networks
Outline: Computer Networks Introduction General course information. Some basic concepts for computer s. Network programming. General Course Information Course Web page http://www.cs.rochester.edu/~kshen/csc257-fall2009
More informationOpenADN: A Case for Open Application Delivery Networking
OpenADN: A Case for Open Application Delivery Networking Subharthi Paul, Raj Jain, Jianli Pan Washington University in Saint Louis {Pauls, jain, jp10}@cse.wustl.edu International Conference on Computer
More informationAT&T Global Network Client for Android
Version 4.1.0 AT&T Global Network Client for Android 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual
More informationBUILDING LARGE VOD LIBRARIES WITH NEXT GENERATION ON DEMAND ARCHITECTURE. Weidong Mao Comcast Fellow Office of the CTO Comcast Cable
BUILDING LARGE VOD LIBRARIES WITH NEXT GENERATION ON DEMAND ARCHITECTURE Weidong Mao Comcast Fellow Office of the CTO Comcast Cable Abstract The paper presents an integrated Video On Demand (VOD) content
More informationFocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention
FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention Brian Amento, Bharath Balasubramanian, Robert J. Hall, Kaustubh Joshi, Gueyoung Jung, K. Hal Purdy AT&T Labs Research, Bedminster,
More informationCryptographic Checksums
Cryptographic Checksums Mathematical function to generate a set of k bits from a set of n bits (where k n). k is smaller then n except in unusual circumstances Example: ASCII parity bit ASCII has 7 bits;
More informationCourse Outline. Introduction to Azure for Developers Course 10978A: 5 days Instructor Led
Introduction to Azure for Developers Course 10978A: 5 days Instructor Led About this course This course offers students the opportunity to take an existing ASP.NET MVC application and expand its functionality
More informationCS 268: Computer Networking
CS 268: Computer Networking L-24 Course Wrap-up Goals and Objectives Understand state-of-the-art in network protocols, architectures, and applications Process of networking research Constraints and thought
More informationModular End-to-End IPTV Solution
Modular End-to-End IPTV Solution PackeTV is Visionary Solutions modular end-to-end IP video management solution that enables secure scheduled and on-demand delivery of live and recorded video to any screen
More informationMore wireless: Sensor networks and TCP on mobile hosts
More wireless: Sensor networks and TCP on mobile hosts CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) Outline Routing in sensor networks
More informationSmartSantander. Dr srđan KrČo
SmartSantander a Smart City example Dr srđan KrČo Why Smart Cities now? 50% of the world population lives in a city 2010-2050: Urban population will almost double Cities occupy 2% of the world s geography
More informationA Survey of Peer-to-Peer Content Distribution Technologies
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview
More informationCourse : Planning and Administering SharePoint 2016
Course Outline Course 20339-1: Planning and Administering SharePoint 2016 Duration: 5 days About this course This five-day course will provide you with the knowledge and skills to plan and administer a
More information