An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

Encrypting Wireless Data with VPN Techniques
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Why do current IP semantics cause scaling issues? −Today, “addressing follows topology,” which limits route aggregation compactness −Overloaded IP address.
Mobility Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Rev A8/8/021 ABC Networks
Design Principles for Robust Opportunistic Communication S. Keshav Tetherless Computing Lab David R. Cheriton School of Computer Science University of.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Middle Boxes Lixia Zhang UCLA Computer Science Dept Sprint Research Symposium March 8-9, 2000.
Rensselaer Polytechnic Institute CSCI-4220 – Network Programming David Goldschmidt, Ph.D.
Mobility in the Internet Part II CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.
Delay Tolerant Networking Gareth Ferneyhough UNR CSE Department
Optimize tomorrow today. TM 1 Optimize tomorrow today. Arlene Minkiewicz, Chief Scientist PRICE Systems, LLC Software.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
COS 461: Computer Networks
DAKNET Presented By: rreema.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
A Guide to major network components
UMass DieselNet: A Disruption-Tolerant Network Testbed John Burgess Department of Computer Science UMass Amherst John Burgess Department of Computer Science.
Router Architectures An overview of router architectures.
Fundamentals of Computer Networks ECE 478/578 Lecture #2 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Host Identity Protocol
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
CP476 Internet ComputingCh.1 # 1 Lecture 2. A Brief Introduction to the Internet The objective is to understand The history of Internet What the Internet.
2002 년 2 학기이동인터넷프로토콜 1 Mobile IP:Overview 년 2 학기이동인터넷프로토콜 2 Mobile IP overview Is Mobile IP an official standard? What problems does Mobile IP solve?
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
An Agile Vertical Handoff Scheme for Heterogeneous Networks Hsung-Pin Chang Department of Computer Science National Chung Hsing University Taichung, Taiwan,
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Common Devices Used In Computer Networks
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Data and Computer Communications Circuit Switching and Packet Switching.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 6 Delivery and Routing of IP Packets.
Delivery, Forwarding, and Routing of IP Packets
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Reconsidering Internet Mobility Alex C. Snoeren, Hari Balakrishnan, M. Frans Kaashoek MIT Laboratory for Computer Science.
Multimedia & Mobile Communications Lab.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
1 Network Address Translation. 2 Network Address Translation (NAT) Extension of original addressing scheme Motivated by exhaustion of IP address space.
Introduction Contain two or more CPU share common memory and peripherals. Provide greater system throughput. Multiple processor executing simultaneous.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Computer Networks 0110-IP Gergely Windisch
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Network Processing Systems Design
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
CIS 700-5: The Design and Implementation of Cloud Networks
Working at a Small-to-Medium Business or ISP – Chapter 7
Lecture 2 Overview.
2002 IPv6 技術巡迴研討會 IPv6 Mobility
Working at a Small-to-Medium Business or ISP – Chapter 7
CPE 401 / 601 Computer Network Systems
Software Defined Networking (SDN)
Working at a Small-to-Medium Business or ISP – Chapter 7
Presentation transcript:

An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh

Server DC MS DC What if… MS

Applications Healthcare tell a doctor about latest test results Environmental monitoring fly a plane over a site to collect data Rural development bus on a rural route becomes a data mule Personal productivity Almost always in-sync iPod Image sharing for migrant workers

Tetherless computing Smart mobile devices that opportunistically communicate with resource-rich data centers over heterogeneously administered wireless and wireline networks Internet cloud Server Data center

1. Computing costs are plummeting From Processor costs have come down by six orders of magnitude in three decades CMOS allows on-chip logic, memory, imaging and RF components Devices will merge computing, audio, and video Cell phone Still camera Video camera MP3 player PDA

2. Batteries are lasting longer

3. Wireless networks are proliferating © Intel

4. Data Centers aggregate resources

Requirements Must build on existing Internet architecture Mobility transparency Address changes as a mobile host moves from one subnet to another How to locate a mobile? Disconnection resilience TCP cannot sustain long duration disconnections Should not require both ends of a connection to be simultaneously present Identity management Mobile should have the same identity no matter where it goes Mobile and infrastructure should mutually authenticate Access sensing Is a mobile in a hot spot in the first place? Important to make the right decision Need low control overhead To maximize use of opportunistic communication

Existing solutions have limitations Network layer solutions: Mobile IP/HMIPv6 Provide mobility transparency But do not provide disconnection transparency Transport layer solutions: TCP Migrate/Rocks and Racks Provide both mobility and limited disconnection transparency Both endpoints need to be simultaneously present Only support short disconnections Only work with TCP Session layer solutions: DHARMA, PCMP Provide both mobility and disconnection transparency Both endpoints need to be simultaneously present Only work with TCP Application layer solutions: Message ferrying, Gnutella Application specific Do not deal with control overheads

Tetherless Computing Architecture

Disconnection tolerance using DTN Sender Receiver DTN Overlay DTN router

DTN is just like but… Built-in support for disconnection Reactive fragmentation Both ends can move Better routing Dynamic, instead of MX records Can be based on opportunistic or scheduled links General purpose API Send()/Recv() like sockets Support for multiple classes of service Better identity management We hope… Avoid spam

Mobility transparency using a DHT Sender Internet Region DHT Overlay Receiver at R-1 Receiver at R-2 Mobile AP

Overview Bundles sent to DTN addresses with GUIDs Location management DHT stores translations from GUID to DTN region Within a region store translation from a GUID to custodian Late binding from GUID to destination region InternetRegion (R)Custodian (C)Mobile (I) (I, R)(I, C)TCP Local DTN router (M) TCP HLRVLR L LR Fig. 1: Three tiered hierarchy of lookups in TCA

Details When a bus drives past a mobile, it uses GUID to deliver bundles to the mobile, and picks up late- bound bundles from the mobile DTN routers with an interface on the Internet resolve late-bound addresses to a destination region gateway using DHT Destination region gateway maps from GUID to the custodian and forwards bundles to the custodian Mobile picks up bundles from the custodian After a move, tables have to be carefully updated ‘Make then break’

Features Sender can inject all its data into the network, whenever it gets a chance Receiver can extract all waiting data from the network, whenever it gets a chance Far notifications not needed in near movements Short latency stretch

Innovations Unbound destination address allows disconnected endpoints Lookup in the forwarding path GUID is MD5 hash of address Provides security without PKI or DNS DHT for HLR Makes lookup scaleable and robust Compatible with DTN routing No extra overhead on headers or routing tables

Ongoing research Solving underlying point problems Building a prototype Building real-world tetherless applications

1. Fundamental underlying problems How to manage identities of mobile disconnected users? How do you know you’re in a hotspot? How to boost priority of communicating processes?

Identity management (Seth) Use Hierarchical Identity Based Encryption Public Key = Hash (identity) Each user must get Private Key from a PK server Allows disconnected operation Can limit need for revocation using timed keys Working on a secure architecture for tetherless computing

Hot spot detection (Lifchits and Liang) Monitor signal/noise strength of incoming beacons sent out once every 100 ms Hard to make the right choice We are still collecting raw data sensitivity to position sensitivity to orientation sensitivity to motion Is signal strength the right indicator?

Priority boosting (Liang) Simple idea Boost priority of communicating processes when in a hotspot Complex implementation! We have implemented in Linux 2.4, Linux 2.6 and FreeBSD Each OS has its own quirks and needs a lot of careful kernel hacking Can show some improvement for each OS by using a combination of priority boosting, quantum size boosting, and memory locking

2. Building a prototype Have successfully installed DTN on a variety of platforms (Darragh and Thomas) Have successfully integrated DTN with Internet Indirection Infrastructure (Darragh) First app is a ‘mobile blog’ (Fung and Darragh) Working on rewriting DTN bundle daemon (Ahmed)

Hardware platforms Soekris single board computers x86 compatible, running Pebble Linux powered by lead acid cell runs DTN bundle daemon and I3 client Sensor motes integrated with DTN mote proxy Sharp Zaurus 5500 PDAs Somewhat flaky hardware, but works OK most of the time IPAQ 4150 nice platform, but Linux support is missing investigating CELib

3. Applications Medical applications (Hilliker) working with Guelph General Hospital early stages -- still learning context Plant operations (Hilliker) simplifying workflow UW Formula SAE racing team (Hilliker and Salmon) working with on-board DAS to send information to the pit

Course projects Integration with Jabber Formula SAE Mobility VMPod

Conclusions Tetherless vision will take years to realize Attacking on several fronts Progress is encouraging More at