Taxonomy of real time applications

Slides:



Advertisements
Similar presentations
Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
Advertisements

Spring 2003CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Spring 2000CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 – QoS.
Xiaowei Yang CS 356: Computer Network Architectures Lecture 19: Integrated Services and Differentiated Services Xiaowei Yang
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
15-441: Computer Networking Lecture 18: QoS Thanks to David Anderson and Srini Seshan.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CSc 461/561 CSc 461/561 Multimedia Systems Part C: 3. QoS.
Spring 2002CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Internet Quality of Service. Quality of Service (QoS) The best-effort model, in which the network tries to deliver data from source to destination but.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
5-Sep-154/598N: Computer Networks Recap UDP: IP with port abstraction TCP: Reliable, in order, at most once semantics –Sliding Windows –Flow control: ensure.
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
1 Integrated and Differentiated Services Multimedia Systems(Module 5 Lesson 4) Summary: r Intserv Architecture RSVP signaling protocol r Diffserv Architecture.
CSE679: QoS Infrastructure to Support Multimedia Communications r Principles r Policing r Scheduling r RSVP r Integrated and Differentiated Services.
© 2006 Cisco Systems, Inc. All rights reserved. 3.3: Selecting an Appropriate QoS Policy Model.
Computer Networking Intserv, Diffserv, RSVP.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
QOS مظفر بگ محمدی دانشگاه ایلام. 2 Why a New Service Model? Best effort clearly insufficient –Some applications need more assurances from the network.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services MPLS.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
© Jörg Liebeherr, Quality-of-Service Architectures for the Internet Integrated Services (IntServ)
Spring 2001CS Multimedia, QoS Multimedia (7.2, 9.3) Compression RTP Realtime Applications Integrated Services Differentiated Services Quality.
4-Jun-164/598N: Computer Networks Differentiated Services Problem with IntServ: scalability Idea: segregate packets into a small number of classes –e.g.,
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
© Jörg Liebeherr, Quality-of-Service Architectures for the Internet.
CS640: Introduction to Computer Networks Aditya Akella Lecture 21 – QoS.
1 Lecture, November 27, 2002 TCP Other Internet Protocols; Internet Traffic Scalability of Virtual Circuit Networks QoS.
CS 6401 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
EE 122: Integrated Services Ion Stoica November 13, 2002.
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
Spring 2002CS 3321 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
Chapter 30 Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10. Mai 20061INF-3190: Multimedia Protocols Quality-of-Service Foreleser: Carsten Griwodz
Internet Quality of Service
Instructor Materials Chapter 6: Quality of Service
Security Outline Encryption Algorithms Authentication Protocols
Security Outline Encryption Algorithms Authentication Protocols
Advanced Computer Networks
CS 268: Computer Networking
RSVP and Integrated Services in the Internet: A Tutorial
EE 122: Lecture 16/17 (Integrated Services)
Chapter 25 Multimedia TCP/IP Protocol Suite
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Quality of Service Connecting Networks.
Taxonomy of network applications
Advanced Computer Networks
Message Digest Cryptographic checksum One-way function Relevance
Security Outline Homework 1, selected solutions Encryption Algorithms
Review: Network link technologies
EE 122: Quality of Service and Resource Allocation
EE 122: Lecture 18 (Differentiated Services)
Chapter 16. Internetwork Operation
EE 122: Differentiated Services
Anup K.Talukdar B.R.Badrinath Arup Acharya
CIS679: Two Planes and Int-Serv Model
Advanced Computer Networks
University of Houston Quality of Service Datacom II Lecture 3
Presentation transcript:

Taxonomy of real time applications Elastic (tcp, udp) Download mp3 Intolerant (remote surgery) Tolerant Nonadaptive Adaptive Rate adaptive (change video b/w) Delay adaptive (add delay)

QoS Approaches Fine grained - individual application or flows Intserv E.g. for my video chat application Coarse grained - aggregated traffic Diffserv E.g. All traffic from CSE (costs $$)

Integrated Services IETF - 1995-97 time frame Service Classes guaranteed controlled-load (tolerant, adaptive applications) Simulates lightly loaded link Mechanisms signaling protocol: signals required service admission control: rejects traffic that cannot be serviced Policing: make sure that senders stick to agreement packet scheduling: manage how packets are queued

Flowspec Rspec: describes service requested from network controlled-load: none guaranteed: delay target Tspec: describes flow’s traffic characteristics average bandwidth + burstiness: token bucket filter token rate r and bucket depth B must have a token to send a byte must have n tokens to send n bytes start with no tokens accumulate tokens at rate of r per second can accumulate no more than B tokens

Per-Router Mechanisms Admission Control decide if a new flow can be supported answer depends on service class not the same as policing Packet Processing classification: associate each packet with the appropriate reservation scheduling: manage queues so each packet receives the requested service

Reservation Protocol Called signaling in ATM Proposed Internet standard: RSVP Consistent with robustness of today’s connectionless model Uses soft state (refresh periodically) Designed to support multicast Receiver-oriented Two messages: PATH and RESV Source transmits PATH messages every 30 seconds Destination responds with RESV message Merge requirements in case of multicast Can specify number of speakers

RSVP Example (multicast) Sender 1 Sender 2 PATH RESV (merged) Receiver B Receiver A R

RSVP versus ATM (Q.2931) RSVP ATM receiver generates reservation soft state (refresh/timeout) separate from route establishment QoS can change dynamically receiver heterogeneity ATM sender generates connection request hard state (explicit delete) concurrent with route establishment QoS is static for life of connection uniform QoS to all receivers

Differentiated Services Problem with IntServ: scalability, IntServ operates in a per-flow basis Idea: segregate packets into a small number of classes e.g., premium vs best-effort Packets marked according to class at edge of network (ND will mark certain packets) Core routers implement some per-hop-behavior (PHB) Example: Expedited Forwarding (EF) rate-limit EF packets at the edges PHB implemented with class-based priority queues or Weighted Fair Queue (WFQ)

DiffServ (cont) Assured Forwarding (AF) customers sign service agreements with ISPs edge routers mark packets as being “in” or “out” of profile core routers run RIO: RED with in/out

Chapter 8: Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Overview Cryptography functions Security services Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy: preventing unauthorized release of information Authentication: verifying identity of the remote participant Integrity: making sure message has not been altered

Secret Key (DES)

Public Key (RSA) Encryption & Decryption c = memod n m = cdmod n

Message Digest Cryptographic checksum One-way function Relevance just as a regular checksum protects the receiver from accidental changes to the message, a cryptographic checksum protects the receiver from malicious changes to the message. One-way function given a cryptographic checksum for a message, it is virtually impossible to figure out what message produced that checksum; it is not computationally feasible to find two messages that hash to the same cryptographic checksum. Relevance if you are given a checksum for a message and you are able to compute exactly the same checksum for that message, then it is highly likely this message produced the checksum you were given.

Authentication Protocols Three-way handshake Client Server ClientId, E ( , CHK) E( y + E(SK, SHK) Y

Trusted third party (Kerberos)

Public key authentication ( x , Public )

Message Integrity Protocols Digital signature using RSA special case of a message integrity where the code can only have been generated by one participant compute signature with private key and verify with public key Keyed MD5 sender: m + MD5(m + k) + E(k, private) receiver recovers random key using the sender’s public key applies MD5 to the concatenation of this random key message MD5 with RSA signature sender: m + E(MD5(m), private) decrypts signature with sender’s public key compares result with MD5 checksum sent with message

Key Distribution Certificate Certified Authority (CA) special type of digitally signed document: “I certify that the public key in this document belongs to the entity named in this document, signed X.” the name of the entity being certified the public key of the entity the name of the certified authority a digital signature Certified Authority (CA) administrative entity that issues certificates useful only to someone that already holds the CA’s public key.

Key Distribution (cont) Chain of Trust if X certifies that a certain public key belongs to Y, and Y certifies that another public key belongs to Z, then there exists a chain of certificates from X to Z someone that wants to verify Z’s public key has to know X’s public key and follow the chain Certificate Revocation List

Firewalls Filter-Based Solution example ( 192.12.13.14, 1234, 128.7.6.5, 80 ) (*,*, 128.7.6.5, 80 ) default: forward or not forward? how dynamic? stateful

Proxy-Based Firewalls Problem: complex policy Example: web server Solution: proxy Design: transparent vs. classical Limitations: attacks from within

Denial of Service Attacks on end hosts Attacks on routers SYN attack Attacks on routers Christmas tree packets pollute route cache Authentication attacks Distributed DoS attacks