Toward Intrusion Tolerant Cloud Infrastructure

Size: px
Start display at page:

Download "Toward Intrusion Tolerant Cloud Infrastructure"

Transcription

1 Toward Intrusion Tolerant Cloud Infrastructure Daniel Obenshain, Tom Tantillo, Yair Amir Department of Computer Science Johns Hopkins University Andrew Newell, Cristina Nita-Rotaru Department of Computer Science Purdue University 1

2 DSN03: The Overlay Paradigm Overlay paradigm: In contrast to keep it simple in the middle and smart at the edge Move intelligence and resources to the middle Software-based overlay routers working on top of the internet Overlay links translated to Internet paths Smaller overlay scale (# nodes) è smarter algorithms, better performance, and new services. 2

3 DSN03: Hop-by-Hop Reliability 50 millisecond network, five hops 10 milliseconds to tell node DAL about the loss 10 milliseconds to get the packet back from DAL Only 20 milliseconds to recover a lost packet Lost packet sent twice only on link DAL ATL In contrast to at least 100 milliseconds on the Internet 56 5 LAX PHX DAL ATL DCA BWI 5 3

4 DSN03: Average Latency and Jitter Simulation Spines on Emulab TCP End-to-end Hop-by-hop Linux TCP End-to-end Spines Hop-by-hop Latency Simulation Average delay (ms) Emulab Average delay (ms) Loss rate (%) Loss rate (%) TCP End-to-end Hop-by-hop Linux TCP End-to-end Spines Hop-by-hop Jitter Simulation Jitter (ms) Loss rate (%) Emulab Jitter (ms) Loss rate (%) 4

5 The Spines Platform [DSN03, NOSSDAV05, TOM06, Mobisys06, TOCS10] Daemons create an overlay network on the fly Clients are identified by the IP address of their daemon and a port ID Clients feel they are working with UDP and TCP using their IP and port identifiers Protocols designed to support up to 1000 daemons (locations), each daemon can handle up to about 1000 clients 5

6 Outline From overlay networks to clouds Going back in time it all started with a DSN03 paper From research to practice lessons learned Toward intrusion-tolerant cloud infrastructure Intrusion-tolerant cloud monitoring and control Monitoring: Priority-based flooding with source fairness Control: Reliable flooding with source destination fairness Intelligent use of diversity to increase resiliency The Diversity Assignment Problem (DAP) Optimal assignments on a cloud Naïve assignments can hurt Application patterns matter Summary 6

7 : The Siemens VoIP Challenge Can we maintain a good enough phone call quality over the Internet? High quality calls demand predictable performance VoIP is interactive. Humans perceive delays at 100ms The best-effort service offered by the Internet was not designed to offer any quality guarantees Communication subject to dynamic loss, delay, jitter, path failures PESQ - Average Normal 25% burst 50% burst 75% burst PSTN PESQ - 5 percentile Normal 25% burst 50% burst 75% burst Loss rate (%) Loss rate (%) 50ms network delay 7

8 VoIP Quality Improvement PESQ - Average Spines Normal Spines 25% Spines 50% Spines 75% UDP Normal UDP 75% PESQ - 5 percentile Spines Normal Spines 25% Spines 50% Spines 75% UDP Normal UDP 75% Loss rate (%) Loss rate (%) Spines overlay 5 links of 10ms each 10 VoIP streams sending in parallel Loss on middle link C-D 10ms 10ms 10ms 10ms 10ms A 10Mbps B 10Mbps C 10Mbps D 10Mbps E 10Mbps F 50ms network delay 8

9 The Spines Architecture (2006) Reliable Session Daemon-Client Interface Session Application Client API Library Routing Overlay Node Simple Routing Forwarder Link State Hello Protocol Group State State Flood Best Effort Data Link Real-time Data Link Control Link Reliable Data Link Overlay Link Datalink (UDP/IP unicast) 9

10 2008-Present: The LiveTimeNet Cloud 10

11 Almost Reliable, Real-time Protocol for Live TV Network packet loss on one link (assuming 66% burstiness) Loss experienced by flows on the LTN Network 2% < % 5% < 0.003% 10% < 0.03% 11

12 Zooming on a Single Channel 12

13 From Research to Practice 13

14 Toward Intrusion Tolerant Clouds Main premise: The large gap in constructing resilient clouds is the vulnerability to intrusions No good algorithms to construct distributed messaging systems and consistent global state at cloud scale, guaranteeing their integrity and performance even under intrusion attacks Main goal: Invent, develop and transition the overlay messaging and replication tools necessary to make public and private clouds resilient to sophisticated intrusion attacks 14

15 Outline From overlay networks to clouds Going back in time it all started with a DSN03 paper From research to practice lessons learned Toward intrusion-tolerant cloud infrastructure Intrusion-tolerant cloud monitoring and control Monitoring: Priority-based flooding with source fairness Control: Reliable flooding with source destination fairness Intelligent use of diversity to increase resiliency The Diversity Assignment Problem (DAP) Optimal assignments on a cloud Naïve assignments can hurt Application patterns matter Summary 15

16 Intrusion-Tolerant Cloud Monitoring and Control Cloud infrastructure is remote to its administrators Cloud management must be done through monitoring and control messaging The chicken and the egg at least part of the cloud software has to work to allow its administrators to make it work (e.g. react to attacks) Result: Monitoring and control messaging has to be intrusion-tolerant Instances of the messaging service may reside on compromised nodes But: no practical intrusion-tolerant messaging that can perform well in cloud environments 16

17 Controlled Authenticated Flooding Uses overlay topology and authentication to limit the power of incorrect (compromised) nodes Floods messages at most twice on each overlay link Optimal intrusion tolerance Optimal latency High cost up to times higher than secure link-state overlay routing on relevant topologies Two protocols with differing properties and guarantees: Monitoring: priority-based flooding with source fairness Control: reliable flooding with source-destination fairness 17

18 Priority-based Flooding with Source Fairness The Need: Motivated by the demands of a monitoring system in a cloud infrastructure Distributing continuous streams of messages across a network that may contain compromised nodes Any node in the network can be a source Some messages are more critical than others Delivery should be timely If resources are constrained, critical information must pass 18

19 Priority-based Flooding with Source Fairness Main ideas: Each overlay link schedules the next outgoing message by selecting a source with messages contending for this link based on a fair round-robin scheme The highest priority message from the selected source is sent first Memory buffer space and outgoing bandwidth is allocated on each overlay link based on a source-fair scheme When memory is exhausted, the lowest priority message of the source with the most messages in the overlay link buffers is dropped first 19

20 Source Fairness for Malicious Environments Example Source A is sending at 10 Mbps, Source B at 50 Mbps, Source C at 60 Mbps, and link s capacity is 100 Mbps Source A gets all 10 Mbps Source B gets 45 out of the 50 Mbps it wants Source C gets 45 out of the 60 Mbps it wants + + = + 20

21 Priority-based Flooding with Source Fairness Flag Ptr 5 source ngbr 1 NEED 12 seq_num ngbr 2 ACK 11:59 am orig_time One at each Node ngbr D SEND 12:00 pm 2:15 pm... arrival expire *neighbor status packet *msg 2 need_count Storage for Sources Messages Source ID Selection Queue Message Priority Queue head tail tail head MAX PRIORITY Source ID One for each Neighboring Link urgent queue head tail normal queue Priority Level

22 Priority-based Flooding with Source Fairness Intrusion-Tolerant Point-to-Point Reliable Link Protocol Compromised nodes can lie to cause good nodes to run fast Use up good system resources (processing, bandwidth) Intrusion-Tolerant Link Protocol ensures nodes can t ACK packets they never received We include a nonce on each packet that must be included in the corresponding ACK A ACK dishonestly Data B 22

23 Priority-based Flooding Validation on a Cloud U.S.-Wide Cloud Topology NYC DEN CHI LAX JHU DAL ATL 23

24 Reliable Flooding with Source-Destination Fairness The Need: Motivated by the demands of a control system in a cloud infrastructure Any node in the network can be a source All messages are critical because they change the state of the cloud Messages must be delivered reliably Delivery should be timely 24

25 The Problem of Source-based Fairness in Reliable Communication If we used source based fairness, a malicious destination could block a good source C A B A sends to C and D, via B D is malicious and refuses to acknowledge packets A cannot make progress with either C or D (because it s a reliable protocol) D 25

26 Source-Destination Fairness Instead, treat each source-destination flow separately. C A B D The A-D flow becomes blocked The A-C flow does not 26

27 Reliable Flooding with Source-Destination Fairness Main ideas: A correct node maintains a message until either of the following conditions is met: 1) All of its direct neighbors have it 2) An end-to-end acknowledgement is received Memory buffer space and outgoing bandwidth are allocated on each overlay link based on a sourcedestination pair fair scheme, so that bad destinations cannot block other flows by not acknowledging messages Back pressure is employed all the way to the source if a source-destination pair exhausts its memory buffer 27

28 Reliable Flooding with Source-Destination Fairness Per-Flow Buffers One at each Node for each Destination Up-to-Date End-to-End ACK 1 N Flow ID Selection Queue head tail Flow ARU Matrix Destination ID Flow Start of Window Matrix Destination ID One for each Neighboring Link urgent queue Source ID Source ID head tail normal queue 28

29 The Spines Architecture Reliable Session Daemon-Client Interface Session Application Client API Library Routing Overlay Node Simple Routing Forwarder Link State Hello Protocol Group State State Flood Best Effort Data Link Real-time Data Link Control Link Reliable Data Link Overlay Link Datalink (UDP/IP unicast) 29

30 The New Spines Architecture Reliable Session Daemon-Client Interface Session Application Client API Library Routing Overlay Node Simple Routing Forwarder Link State Hello Protocol Group State State Flood Intrusion- Tolerant Priority Flooding Intrusion- Tolerant Reliable Flooding Best Effort Data Link Real-time Data Link Control Link Reliable Data Link Intrusion Tolerant Data Link Overlay Link Datalink (UDP/IP unicast) 30

31 Outline From overlay networks to clouds Going back in time it all started with a DSN03 paper From research to practice lessons learned Toward intrusion-tolerant cloud infrastructure Intrusion-tolerant cloud monitoring and control Monitoring: Priority-based flooding with source fairness Control: Reliable flooding with source destination fairness Intelligent use of diversity to increase resiliency The Diversity Assignment Problem (DAP) Optimal assignments on a cloud Naïve assignments can hurt Application patterns matter Summary 31

32 The Diversity Assignment Problem (DAP) l l l l l Undirected graph of client and network nodes Variants are compromised independently with a certain probability over a period of time If a variant is compromised, all nodes of that variant are assumed compromised Goodness is generally measured by overall client-to-client expected connectivity Find the diversity assignment that maximizes goodness NP-Hard problem" 32

33 Diversity Assignment Example Red: 90% resilience Blue: 85% resilience l Expected connectivity: 83.8% l Expected connectivity: 95.7% How one places variants in the network matters" 33

34 Diversity Assignment on a Cloud Topology l l Topology based on how the LiveTimeNet guys build their global cloud - 20 overlay nodes (datacenters) - 10 clients randomly placed - Up to 4 variants with differing resilient properties Model - (Red 90%) (Blue 85%) (Green 80%) (Yellow 75%) - Variants are compromised independently with a certain probability over a period of time - If a variant is compromised, all nodes of that variant are assumed compromised - Goodness is generally measured by overall client-to-client expected connectivity 34

35 Baseline: No Diversity l Without diversity just pick the most resilient variant l Variant resilience: (Red 90%) l Expected connectivity: 90% 35

36 Diversity with Two Variants l Variant resilience: (Red 90%) (Blue 85%) l Expected connectivity: 98.5% Inclusion of a more vulnerable variant results in higher resilience 36

37 Diversity with Three Variants l Variant resilience: (Red 90%) (Blue 85%) (Green 80%) l Expected connectivity: 99.7% l Even higher expected connectivity with another, even weaker variant 37

38 Naïve Assignments can Hurt l 100,000 random assignments with 3 variants - Many random assignments have less than 90% expected connectivity (worse than without diversity) - Best value: 98.8% - Expected dis-connectivity = (1 expected connectivity) - Best random is 4x worse in terms of expected dis-connectivity: - 1.2% vs 0.3% 38

39 Diversity with Four Variants l Resilience: (Red 90%) (Blue 85%) (Green 80%) (Yellow 75%) l Expected client connectivity: 99.75% 39

40 Application-Specific Diversity A BFT Test Case l l Run BFT on top of this diversified network - The state machine replicas are the clients from the point of view of the network - Rather than maximize any-to-any connectivity, we maximize the chance that BFT can make progress - BFT needs a connected component of at least 2f+1 good replicas out of a total of 3f+1 replicas Maximize the probability that a connected component of correct replicas exists 40

41 Diversity with Four Variants Fault model: 1 Byzantine replica 2 partitioned replicas l Resilience: (Red 90%) (Blue 85%) (Green 80%) (Yellow 75%) l Expected client connectivity: 99.75% l Probability of BFT progress: 99.7% 41

42 BFT-Specific Diversity Fault model: 1 Byzantine replica 2 partitioned replicas l Resilience: (Red 90%) (Blue 85%) (Green 80%) (Yellow 75%) l Expected client connectivity: 98.06% l Probability of BFT progress: % 42

43 Outline From overlay networks to clouds Going back in time it all started with a DSN03 paper From research to practice lessons learned Toward intrusion-tolerant cloud infrastructure Intrusion-tolerant cloud monitoring and control Monitoring: Priority-based flooding with source fairness Control: Reliable flooding with source destination fairness Intelligent use of diversity to increase resiliency The Diversity Assignment Problem (DAP) Optimal assignments on a cloud Naïve assignments can hurt Application patterns matter Summary 43

Toward Intrusion Tolerant Clouds

Toward Intrusion Tolerant Clouds Toward Intrusion Tolerant Clouds Prof. Yair Amir, Prof. Vladimir Braverman Daniel Obenshain, Tom Tantillo Department of Computer Science Johns Hopkins University Prof. Cristina Nita-Rotaru, Prof. Jennifer

More information

1-800-OVERLAYS: Using Overlay Networks to Improve VoIP Quality. Yair Amir, Claudiu Danilov, Stuart Goose, David Hedqvist, Andreas Terzis

1-800-OVERLAYS: Using Overlay Networks to Improve VoIP Quality. Yair Amir, Claudiu Danilov, Stuart Goose, David Hedqvist, Andreas Terzis 1-800-OVERLAYS: Using Overlay Networks to Improve VoIP Quality Yair Amir, Claudiu Danilov, Stuart Goose, David Hedqvist, Andreas Terzis Voice over IP To call or not to call The Internet started as an overlay

More information

Distributed Systems Intrusion-Tolerant Networks. First, Some Context

Distributed Systems Intrusion-Tolerant Networks. First, Some Context Distributed Systems 600.437 Intrusion-Tolerant Networks Department of Computer Science The Johns Hopkins University 1 First, Some Context You ve just heard about Intrusion-Tolerant State Machine Replication

More information

M&Ms: CS Freshmen Experience Networks. Department of Computer Science The Johns Hopkins University. Yair Amir Spring 2017 / Week 3 1.

M&Ms: CS Freshmen Experience Networks. Department of Computer Science The Johns Hopkins University. Yair Amir Spring 2017 / Week 3 1. M&Ms: CS Freshmen Experience 600.105 Networks Department of Computer Science The Johns Hopkins University 1 Networks Reading: https://en.wikipedia.org/wiki/history_of_the_internet https://en.wikipedia.org/wiki/routing

More information

Yair Amir. Don P. Giddens Lecture. Distributed Systems and Networks lab Department of Computer Science, Johns Hopkins University

Yair Amir. Don P. Giddens Lecture. Distributed Systems and Networks lab Department of Computer Science, Johns Hopkins University Yair Amir Don P. Giddens Lecture Distributed Systems and Networks lab Department of Computer Science, Johns Hopkins University www.dsn.jhu.edu The one and only Michal Miskin Amir The advisor Danny Dolev

More information

Network-Attack-Resilient Intrusion- Tolerant SCADA for the Power Grid

Network-Attack-Resilient Intrusion- Tolerant SCADA for the Power Grid Network-Attack-Resilient Intrusion- Tolerant SCADA for the Power Grid Amy Babay, Thomas Tantillo, Trevor Aron, Marco Platania, and Yair Amir Johns Hopkins University, AT&T Labs, Spread Concepts LLC Distributed

More information

Seamless Overlays for Application Use

Seamless Overlays for Application Use 1. Overview Seamless Overlays for Application Use Graduate Independent Study, 600.810.12 Edmund Duhaime Advisors: Dr. Yair Amir, Amy Babay May 18, 2017 This project focuses on methods for allowing unmodified

More information

Research Statement. Amy Babay December 2018

Research Statement. Amy Babay December 2018 Research Statement Amy Babay December 2018 My research focuses on distributed systems and networks, with core goals spanning two domains: enabling new Internet services and building dependable infrastructure.

More information

Technical Report: Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes

Technical Report: Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes Purdue University Purdue e-pubs Department of Computer Science Technical Reports Department of Computer Science 2013 Technical Report: Increasing Network Resiliency by Optimally Assigning Diverse Variants

More information

Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes

Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes Andrew Newell 1, Daniel Obenshain 2, Thomas Tantillo 2, Cristina Nita-Rotaru 1, and Yair Amir 2 1 Department of Computer

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

Wireless Mesh Networks

Wireless Mesh Networks Distributed Systems 600.437 Wireless Mesh Networks Department of Computer Science The Johns Hopkins University 1 Wireless Mesh Networks Lecture 10 Further reading: www.dsn.jhu.edu/publications/ 2 The Wireless

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1 Chapter 6 Queuing Disciplines Networking CS 3470, Section 1 Flow control vs Congestion control Flow control involves preventing senders from overrunning the capacity of the receivers Congestion control

More information

Amy Babay April 2018

Amy Babay April 2018 Amy Babay www.dsn.jhu.edu/~babay 814-528-4205 babay@cs.jhu.edu Education PhD in Computer Science April 2018 PhD Research: Structured overlay networks for a new generation of Internet services, dependable

More information

Fast Handoff for Seamless Wireless Mesh Networks

Fast Handoff for Seamless Wireless Mesh Networks Fast Handoff for Seamless Wireless Mesh Networks Yair Amir, Claudiu Danilov, Michael Hilsdale, Raluca Musaloiu-Elefteri, Nilo Rivera Distributed Systems and Networks Lab Johns Hopkins University MobiSys

More information

Plan for This Week and Next. Making Communication Reliable A few Algorithms. A bit about me. Send & Wait ARQ (cont.

Plan for This Week and Next. Making Communication Reliable A few Algorithms. A bit about me. Send & Wait ARQ (cont. M & M: Freshman Experience Distributed Systems and Networks lab Department of Computer Science Johns Hopkins University www.dsn.jhu.edu Plan for This Week and Next Tangible: provide a pick into a decade

More information

Distributed Systems Multicast & Group Communication Services

Distributed Systems Multicast & Group Communication Services Distributed Systems 600.437 Multicast & Group Communication Services Department of Computer Science The Johns Hopkins University 1 Multicast & Group Communication Services Lecture 3 Guide to Reliable Distributed

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol Transport Layer Transport Layer The transport layer is responsible for the delivery of a message from one process to another Types of Data Deliveries Client/Server Paradigm An application program on the

More information

Evaluating BFT Protocols for Spire

Evaluating BFT Protocols for Spire Evaluating BFT Protocols for Spire Henry Schuh & Sam Beckley 600.667 Advanced Distributed Systems & Networks SCADA & Spire Overview High-Performance, Scalable Spire Trusted Platform Module Known Network

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

Recommended Readings

Recommended Readings Lecture 11: Media Adaptation Scalable Coding, Dealing with Errors Some slides, images were from http://ip.hhi.de/imagecom_g1/savce/index.htm and John G. Apostolopoulos http://www.mit.edu/~6.344/spring2004

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new

More information

Amy Babay November Doctor of Philosophy in Computer Science September 2018

Amy Babay November Doctor of Philosophy in Computer Science September 2018 Amy Babay www.dsn.jhu.edu/~babay 814-528-4205 babay@cs.jhu.edu Education November 2018 Doctor of Philosophy in Computer Science September 2018 Thesis: Timely, Reliable, and Cost-Effective Internet Transport

More information

IT 352 : Lecture 1. Network Basics Review. Najwa AlGhamdi, MSc 2012 /1433

IT 352 : Lecture 1. Network Basics Review. Najwa AlGhamdi, MSc 2012 /1433 IT 352 : Lecture 1 Network Basics Review Najwa AlGhamdi, MSc 2012 /1433 Outline 1. OSI Reference Model. 2. IP, UDP, TCP. 3. Directory Service. 4. Replicated Service. 5. Packet Switches. 6. Destination

More information

Lecture 6: Multicast

Lecture 6: Multicast Lecture 6: Multicast Challenge: how do we efficiently send messages to a group of machines? Need to revisit all aspects of networking Last time outing This time eliable delivery Ordered delivery Congestion

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination By Shelley Zhuang,Ben Zhao,Anthony Joseph, Randy Katz,John Kubiatowicz Introduction Multimedia Streaming typically involves

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Router s Queue Management

Router s Queue Management Router s Queue Management Manages sharing of (i) buffer space (ii) bandwidth Q1: Which packet to drop when queue is full? Q2: Which packet to send next? FIFO + Drop Tail Keep a single queue Answer to Q1:

More information

An Overlay Architecture for High Quality VoIP Streams

An Overlay Architecture for High Quality VoIP Streams An Overlay Architecture for High Quality VoIP Streams Yair Amir, Claudiu Danilov, Stuart Goose, David Hedqvist, Andreas Terzis Technical Report CNDS-25-1 - October 25 http://www.cnds.jhu.edu Abstract The

More information

TCP/IP Protocol Suite 1

TCP/IP Protocol Suite 1 TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Resource Control and Reservation

Resource Control and Reservation 1 Resource Control and Reservation Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows 2 Usage parameter

More information

RSVP 1. Resource Control and Reservation

RSVP 1. Resource Control and Reservation RSVP 1 Resource Control and Reservation RSVP 2 Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows

More information

Lecture 24: Scheduling and QoS

Lecture 24: Scheduling and QoS Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated

More information

of-service Support on the Internet

of-service Support on the Internet Quality-of of-service Support on the Internet Dept. of Computer Science, University of Rochester 2008-11-24 CSC 257/457 - Fall 2008 1 Quality of Service Support Some Internet applications (i.e. multimedia)

More information

Scaling Byzantine Fault-tolerant Replication to Wide Area Networks

Scaling Byzantine Fault-tolerant Replication to Wide Area Networks Scaling Byzantine Fault-tolerant Replication to Wide Area Networks Cristina Nita-Rotaru Dependable and Secure Distributed Systems Lab Department of Computer Science and CERIAS Purdue University Department

More information

Multicast and Quality of Service. Internet Technologies and Applications

Multicast and Quality of Service. Internet Technologies and Applications Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Spire: Intrusion-Tolerant SCADA for the Power Grid

Spire: Intrusion-Tolerant SCADA for the Power Grid Distributed Systems and Networks Lab Spire: Intrusion-Tolerant for the Power Grid Amy Babay*, Thomas Tantillo*, Trevor Aron, Yair Amir June 25, 2017 Distributed Systems and Networks Lab Department of Computer

More information

Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002

Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002 Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Motivations Today s Internet is built around a unicast pointto-point

More information

Spire: Intrusion-Tolerant SCADA for the Power Grid

Spire: Intrusion-Tolerant SCADA for the Power Grid Distributed Systems and Networks Lab Spire: Intrusion-Tolerant for the Power Grid Amy Babay*, Thomas Tantillo*, Trevor Aron, Yair Amir June 25, 2017 Distributed Systems and Networks Lab Department of Computer

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Wide-area Dissemina-on under Strict Timeliness, Reliability, and Cost Constraints

Wide-area Dissemina-on under Strict Timeliness, Reliability, and Cost Constraints Wide-area Dissemina-on under Strict Timeliness, Reliability, and Cost Constraints Amy Babay, Emily Wagner, Yasamin Nazari, Michael Dinitz, and Yair Amir Distributed Systems and Networks Lab www.dsn.jhu.edu

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Optical Packet Switching

Optical Packet Switching Optical Packet Switching DEISNet Gruppo Reti di Telecomunicazioni http://deisnet.deis.unibo.it WDM Optical Network Legacy Networks Edge Systems WDM Links λ 1 λ 2 λ 3 λ 4 Core Nodes 2 1 Wavelength Routing

More information

Timely, Reliable, and Cost-Effective Internet Transport. Service using Structured Overlay Networks. Amy Babay

Timely, Reliable, and Cost-Effective Internet Transport. Service using Structured Overlay Networks. Amy Babay Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks by Amy Babay A dissertation submitted to The Johns Hopkins University in conformity with the requirements

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing

More information

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler Advanced Lab in Computer Communications Meeting 6 QoS Instructor: Tom Mahler Motivation Internet provides only single class of best-effort service. Some applications can be elastic. Tolerate delays and

More information

Towards Recoverable Hybrid Byzantine Consensus

Towards Recoverable Hybrid Byzantine Consensus Towards Recoverable Hybrid Byzantine Consensus Hans P. Reiser 1, Rüdiger Kapitza 2 1 University of Lisboa, Portugal 2 University of Erlangen-Nürnberg, Germany September 22, 2009 Overview 1 Background Why?

More information

ALTHOUGH subscribers are accustomed to the consistent

ALTHOUGH subscribers are accustomed to the consistent 1250 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 6, DECEMBER 2006 An Overlay Architecture for High-Quality VoIP Streams Yair Amir, Member, IEEE, Claudiu Danilov, Stuart Goose, David Hedqvist, and Andreas

More information

Shared, Multi-Hop Networks and End-to-End Arguments

Shared, Multi-Hop Networks and End-to-End Arguments Shared, Multi-Hop Networks and End-to-End Arguments Stefano Vissicchio UCL Computer Science COMP0023 Outline Shared, Multi-hop Networks Sharing model Forwarding model Service model: Best-effort delivery

More information

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service TDDD82 Secure Mobile Systems Lecture 6: Quality of Service Mikael Asplund Real-time Systems Laboratory Department of Computer and Information Science Linköping University Based on slides by Simin Nadjm-Tehrani

More information

Reliable Communication in Overlay Networks

Reliable Communication in Overlay Networks Reliable Communication in Overlay Networks Yair Amir and Claudiu Danilov Johns Hopkins University Email: yairamir, claudiu @cs.jhu.edu Technical Report CNDS-23-1 http://www.cnds.jhu.edu February 19, 23

More information

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior Table of Contents QoS Configuration 1 Overview 1 Introduction to QoS 1 QoS Policy 1 Traffic Policing 2 Congestion Management 3 Line Rate 9 Configuring a QoS Policy 9 Configuration Task List 9 Configuring

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren

Lecture 21: Congestion Control CSE 123: Computer Networks Alex C. Snoeren Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than

More information

An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities

An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities An On-demand Secure Routing Protocol Resilient to Byzantine Failures Baruch Awerbuch Johns Hopkins University On-Demand vs. Proactive Routing Security Concerns On-Demand Source Authentication Caching presents

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

An On-demand Secure Routing Protocol Resilient to Byzantine Failures

An On-demand Secure Routing Protocol Resilient to Byzantine Failures An On-demand Secure Routing Protocol Resilient to Byzantine Failures Baruch Awerbuch Johns Hopkins University Joint work with David Holmer, Cristina Nita-Rotaru, and Herbert Rubens Based on paper at WiSe2002

More information

Fairness, Queue Management, and QoS

Fairness, Queue Management, and QoS Fairness, Queue Management, and QoS 15-441 Fall 2017 Profs Peter Steenkiste & Justine Sherry Slides borrowed from folks at CMU, Berkeley, and elsewhere. YINZ I AM GETTING T-SHIRTS If you TA for me next

More information

Queuing Mechanisms. Overview. Objectives

Queuing Mechanisms. Overview. Objectives Queuing Mechanisms Overview Objectives This module describes the queuing mechanisms that can be used on output interfaces. It includes the following topics: Queuing Overview FIFO Queuing Priority Queuing

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

General comments on candidates' performance

General comments on candidates' performance BCS THE CHARTERED INSTITUTE FOR IT BCS Higher Education Qualifications BCS Level 5 Diploma in IT April 2018 Sitting EXAMINERS' REPORT Computer Networks General comments on candidates' performance For the

More information

Distributed Denial of Service

Distributed Denial of Service Distributed Denial of Service Vimercate 17 Maggio 2005 anegroni@cisco.com DDoS 1 Agenda PREFACE EXAMPLE: TCP EXAMPLE: DDoS CISCO S DDoS SOLUTION COMPONENTS MODES OF PROTECTION DETAILS 2 Distributed Denial

More information

The Spanning Tree Protocol

The Spanning Tree Protocol Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description

More information

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [NETWORKING] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Why not spawn processes

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

CSCI-1680 Link Layer Reliability Rodrigo Fonseca CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting

More information

Stream Control Transmission Protocol

Stream Control Transmission Protocol Chapter 13 Stream Control Transmission Protocol Objectives Upon completion you will be able to: Be able to name and understand the services offered by SCTP Understand SCTP s flow and error control and

More information

An Implementation of the Homa Transport Protocol in RAMCloud. Yilong Li, Behnam Montazeri, John Ousterhout

An Implementation of the Homa Transport Protocol in RAMCloud. Yilong Li, Behnam Montazeri, John Ousterhout An Implementation of the Homa Transport Protocol in RAMCloud Yilong Li, Behnam Montazeri, John Ousterhout Introduction Homa: receiver-driven low-latency transport protocol using network priorities HomaTransport

More information

William Stallings Data and Computer Communications. Chapter 10 Packet Switching

William Stallings Data and Computer Communications. Chapter 10 Packet Switching William Stallings Data and Computer Communications Chapter 10 Packet Switching Principles Circuit switching designed for voice Resources dedicated to a particular call Much of the time a data connection

More information

image 3.8 KB Figure 1.6: Example Web Page

image 3.8 KB Figure 1.6: Example Web Page image. KB image 1 KB Figure 1.: Example Web Page and is buffered at a router, it must wait for all previously queued packets to be transmitted first. The longer the queue (i.e., the more packets in the

More information

UDP Traffic Management

UDP Traffic Management Packeteer Technical White Paper Series UDP Traffic Management May 2002 Packeteer, Inc. 10495 N. De Anza Blvd. Cupertino, CA 95014 408.873.4400 info@packeteer.com www.packeteer.com Company and product names

More information

Cisco Optimizing Converged Cisco Networks. Practice Test. Version 2.6. https://certkill.com

Cisco Optimizing Converged Cisco Networks. Practice Test. Version 2.6. https://certkill.com Cisco 642-845 642-845 Optimizing Converged Cisco Networks Practice Test Version 2.6 QUESTION NO: 1 Cisco 642-845: Practice Exam Refer to the exhibit. NBAR is to be configured on router R1 to limit outgoing

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

Computer Networks. Sándor Laki ELTE-Ericsson Communication Networks Laboratory

Computer Networks. Sándor Laki ELTE-Ericsson Communication Networks Laboratory Computer Networks Sándor Laki ELTE-Ericsson Communication Networks Laboratory ELTE FI Department Of Information Systems lakis@elte.hu http://lakis.web.elte.hu Based on the slides of Laurent Vanbever. Further

More information

Adaptive Video Multicasting

Adaptive Video Multicasting Adaptive Video Multicasting Presenters: Roman Glistvain, Bahman Eksiri, and Lan Nguyen 1 Outline Approaches to Adaptive Video Multicasting Single rate multicast Simulcast Active Agents Layered multicasting

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 1 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Randomization. Randomization used in many protocols We ll study examples:

Randomization. Randomization used in many protocols We ll study examples: Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Towards a Practical Survivable Intrusion Tolerant Replication System

Towards a Practical Survivable Intrusion Tolerant Replication System Towards a Practical Survivable Intrusion Tolerant Replication System Marco Platania, Daniel Obenshain, Thomas Tantillo, Ricky Sharma, Yair Amir Department of Computer Science at Johns Hopkins University

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

P2P and the Future Internet. Pablo Rodriguez Telefonica Research, Barcelona

P2P and the Future Internet. Pablo Rodriguez Telefonica Research, Barcelona P2P and the Future Internet Pablo Rodriguez Telefonica Research, Barcelona The Future Internet Social Networks that mimic personal relationships Personalized TV, Video Mash-Ups Recommendation and Aggregation

More information

CS 514: Transport Protocols for Datacenters

CS 514: Transport Protocols for Datacenters Department of Computer Science Cornell University Outline Motivation 1 Motivation 2 3 Commodity Datacenters Blade-servers, Fast Interconnects Different Apps: Google -> Search Amazon -> Etailing Computational

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Homework 1 50 points. Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below:

Homework 1 50 points. Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below: Homework 1 50 points Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below: A circuit-switching scenario in which Ncs users, each requiring a bandwidth

More information

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration [ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a

More information

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems Lecture 22 Queue Management and Quality of Service (QoS) Overview Queue management & RED Fair queuing Khaled Harras School of Computer Science niversity 15 441 Computer Networks Based on slides from previous

More information

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer V Dmitri Loguinov Texas A&M University April 17, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross Chapter 4:

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master

More information