IEEE GLOBECOM FutureNet, Miami, FL, Dec 2010 1 Meta-Headers: Top-Down Networking Architecture with Application-Specific Constraints Murat Yuksel University.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

June 27, 2007 FIND Meeting, From Packet-Switching to Contract- Switching Aparna Gupta Shivkumar Kalyanaraman Rensselaer Polytechnic Institute Troy,
Cross-layer Design in Wireless Mesh Networks Hu Wenjie Computer Network and Protocol Testing Laboratory, Dept. of Computer Science & Technology, Tsinghua.
1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
Geneva, 27 May 2010 Types and Characteristics of Packet Transport Network (PTN) Equipment (Draft Recommendation - G.ptneq) Jia He and Hilmar Hofmann G.ptneq.
MPLS VPN.
FIND PI Meeting, November Value Flows and Risk Management Architecture for Future Internet Murat Yuksel University of Nevada.
Overlay Transport Virtualization (OTV)
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
FIND PI Meeting, April Contract-Switching: Value Flows in Inter-Domain Routing Murat Yuksel University of Nevada – Reno Reno, NV Aparna Gupta, Koushik.
IEEE Globecom OWC, Miami, FL, December D Optical Wireless Localization Mehmet Bilgi, Murat Yuksel, and Nezih Pala
1 Data Link Issues Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 ETHERNET Derived From CCNA Network Fundamentals – Chapter 9 EN0129 PC AND NETWORK TECHNOLOGY.
Doc.: IEEE /243r0 Submission March 2002 James Kempf, DoCoMo LabsSlide and IP James Kempf Seamoby WG Co-chair DoCoMo Labs USA
Data Communications System By Ajarn Preecha Pangsuban.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
Review of Important Networking Concepts
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Chapter 1 Read (again) chapter 1.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
Data Communications I & II Project Sequence Tom Costello.
P2P Over MANET An Introduction to Mobile Resource Sharing.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Network Technology CSE Network Technology CSE3020 Week 1.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
CS 356 Systems Security Spring Dr. Indrajit Ray
Fundamentals of Computer Networks ECE 478/578 Lecture #2 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona.
CSE Department, University of Nevada - Reno 1 User’s View of Switched Network S S The network is generally operated by a service provider company like.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Local Area Networks Chapter 17, Exploring the Digital Domain.
Protocols and the TCP/IP Suite
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
Cross Layer Design (CLD) for Wireless Networks. Future Wireless Systems Nth Generation Cellular Wireless Internet Access Wireless Video/Music Wireless.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 3.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
William Stallings Data and Computer Communications
TCP/IP Protocol Architecture CSE 3213 – Fall
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Building A Network: Cost Effective Resource Sharing
- 1 - DPNM Review of Important Networking Concepts J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH Tel:
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Introduction and Overview of Network and Telecommunications.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
CIS 700-5: The Design and Implementation of Cloud Networks
Computer Networks.
OSI Protocol Stack Given the post man exemple.
Network Architecture Introductory material
CPE 401 / 601 Computer Network Systems
Data and Computer Communications by William Stallings Eighth Edition
Review of Important Networking Concepts
Review of Important Networking Concepts
Network Architecture for Cyberspace
Building A Network: Cost Effective Resource Sharing
Review of Important Networking Concepts
Presentation transcript:

IEEE GLOBECOM FutureNet, Miami, FL, Dec Meta-Headers: Top-Down Networking Architecture with Application-Specific Constraints Murat Yuksel University of Nevada, Reno Reno, NV

IEEE GLOBECOM FutureNet, Miami, FL, Dec Motivation: The trends The variety of applications possible is increasing, especially in wireless wireless peer-to-peer, mobile data, community wireless The size is increasing: million-to-billion nodes The dynamism is increasing: vehicular networks, sensor networks, MANETs What is unavoidable?: More dynamism, more disruption tolerance, more entities, and more varieties

IEEE GLOBECOM FutureNet, Miami, FL, Dec Motivation: The big picture (a) OSI Transport Network Data Link Physical Session Presentation Application (b) Wireline Transport (TCP, UDP) Network (IP) Data Link (Ethernet 802.3) Physical (Fiber, Cable) Application (c) Wireless Transport (TCP, UDP) Network & MAC (IP, Mobile IP, 802.1x) Physical (RF, Fiber, Cable) Application (d) MANET, peer-to-peer ? Network & Routing ? Application Physical (RF, FSO, Fiber, Cable) Application-Specific Hardware-Specific Network-Specific Static Structured Layered invariants Mobile, ad-hoc, dynamic Unstructured Cross-layer & layered invariants We need a systematic way of implementing vertical components to avoid an unhealthy monolithic stack architecture. Economics always has the bigger force: economically attractive applications will keep forcing more vertical components into the stack!

IEEE GLOBECOM FutureNet, Miami, FL, Dec Motivation: Response to the trends Wireless research has been responding with optimizing via cross-layer designs adding custom-designed vertical components to the stack Old hat: layered vs. cross-layer tradeoff Bottom-up cross-layer has been the main approach Scarcity of wireless resources dominated the economics

IEEE GLOBECOM FutureNet, Miami, FL, Dec Motivation: Response to the trends A paradigm shift: wireless resources are becoming massively available Community wireless WiFi hotspots Google WiFi, AT&T Metro WiFi Spectrum resources may still be scarce but connectivity is already ubiquitous The key metric to optimize is becoming application utility rather than the wireless resources App-specific vertical designs are needed.. We need top-down cross-layer designs in addition to the traditional bottom-up ones.

IEEE GLOBECOM FutureNet, Miami, FL, Dec Why not continue merging layers? Merging layers: A greedy approach Makes it hard to standardize – bad for sw engineering Which layers must be absolutely isolated? Application, Network, Physical? Integrating lower level functions with a higher layer function will prevent them becoming a substrate for other higher layer protocols Cellular provisioning in the US – jailbreaks

IEEE GLOBECOM FutureNet, Miami, FL, Dec Motivation: Application Layer Framing (ALF) Layering was a main component of the e2e architecture.. a major architectural benefit of such isolation is that it facilitates the implementation of subsystems whose scope is restricted to a small subset of the suites layers. Clark and Tennenhouse, SIGCOMM90 But, Integrated Layer Processing (ILP) was there too! To achieve better e2e efficiency and resource optimization ILP never become a reality due to the lack of a systematic way of doing it. An ALF-based approach is needed: network protocol services at lower layers can best be useful when applications characteristics and intents are conveyed to the lower layers.

IEEE GLOBECOM FutureNet, Miami, FL, Dec Meta-Headers: A vertical design tool A packet meta-header: vertically travels across the network stack establishes a vertical communication channel among the traditional layers co-exist with the traditional per-layer packet headers Applications can communicate their intent across all the protocol layers by attaching the meta-headers to data.

IEEE GLOBECOM FutureNet, Miami, FL, Dec Headers vs. Meta-Headers Application Layer 4 Layer 3 Layer 2 Layer 1 message H4 message MH1MH2MH3MH4 H3H4 message MH1MH2MH3MH4 H3H2H1H4 message MH1MH2MH3MH4 H3H2H4 message MH1MH2MH3MH4 Traditional packet headers Application-specific packet meta-headers Application Layer 4 Layer 3 Layer 2 Layer 1 Traditional packet headers Application-specific packet meta-headers Explicit Meta-Headers message MH4MH3MH2MH1 message H4MH3MH2H2MH1H3 message H4MH1MH2 message H4H3 H2H1H4 message Implicit Meta-Headers

IEEE GLOBECOM FutureNet, Miami, FL, Dec Meta-Headers: Demultiplexing H3H4 message MH1MH2MH3MH4 Layer 3 Layer 4 Protocol 1Protocol 2 Demultiplexing with traditional headers H4 message MH1MH2MH3MH4 H4 message MH1MH2MH3MH4 Layer 3 Layer 4 Service 1Service 2 Demultiplexing with meta-headers H3H4 message MH1MH2MH3MH4

IEEE GLOBECOM FutureNet, Miami, FL, Dec Informing Applications about Lower Layer Services How will upper layers know about the service primitives of the layers lower than the one below? Reactive – Meta-Headers in Reverse Direction detect lower layer services in an on-demand manner as connections arise meta-headers rewritten by lower layers in reverse direction Requires a closed-loop – connectionless or multi- receiver services may not work

IEEE GLOBECOM FutureNet, Miami, FL, Dec Informing Applications about Lower Layer Services (contd) Proactive – Pre-informed Designer inform layer k designers about services of layers k-2 and below apriori too much complexity as the number of lower layer services increases – rank ordering might help May not be desirable by ISPs Regional service discovery via broadcasting – connectionless

IEEE GLOBECOM FutureNet, Miami, FL, Dec End-to-End Coordination Application Layer 4 Layer 3 Layer 2 Layer 1 message MH4MH3MH2MH1 message H4MH3MH2H2MH1H3 message H4MH1MH2 message H4H3 Traditional packet headers Application- specific packet meta-headers H3H2H1H4 message Application Layer 4 Layer 3 Layer 2 Layer 1 Layer 3 Layer 2 Layer 1 H2MH1H3 message H4MH1MH2 message H4H3 H2H1H4 message Optional feedback loop for conveying available L1-L3 services 1 Application at source prepares meta-headers with default options and sets flags to probe for available services 2 Meta-headers may or may not get converted to traditional headers. 3 Meta-headers are filled with available L1-L3 services, and optionally fed back to the source application. 4 Meta-headers are filled with summary of available end-to-end L1- L4 services, and fed back to the source application. 5 Application at source readjusts meta-headers for joint vertical optimization of end-to-end performance. H3H2H1H4 message MH1MH2 message H4MH3H2MH1H3 message H4MH1MH2 message H4H3MH1MH2 message H4MH3MH1MH2 message MH4MH3 Feedback loop for conveying end-to-end multi-hop L1-L4 services, possibly as a sequence of options over multiple hops. Optional feedback loop for local optimization of last hop(s) of the end-to-end path. SOURCE ROUTER DESTINATION A dynamic end-to-end negotiation..

IEEE GLOBECOM FutureNet, Miami, FL, Dec An optimization perspective Application Top-Down Value Choice Optimization Framework Application-Specific View of the Network Application-Specific Constraints Value Choices E (application-based cost) Q 3 (per-layer state) B (quality constraints) Meta-header probes questing lower layer services Meta-headers filled with available services Q 2 (per-layer state) W 2 (implicit) (per-layer constraints) Network Network State Information Network Resource Constraints Links Link State Information Link Resource Constraints W 3 (implicit) (per-layer constraints) Lagrange multipliers (pieces of E) Lagrange multipliers (pieces of Q 2 and Q 3 ) Vertical optimizations are possible More dynamic Meta-headers as Lagrange multipliers

IEEE GLOBECOM FutureNet, Miami, FL, Dec Summary A top-down networking architecture with meta- headers Vertical optimizations at finer temporal and spatial granularity A variety of top-down optimizations: Top-down routing (layers 5, 3) Top-down QoS/value management (layers 5, 3, 2) Top-down dynamic transport (layers 4, 3, 2) A new class of optimization problems aiming to improve joint performance of multiple layers while respecting the isolation among them.

IEEE GLOBECOM FutureNet, Miami, FL, Dec Thank you! THE END This work is supported in part by the U.S. National Science Foundation awards and