Enabling an Energy- Efficient Future Internet Through Selectively Connected End Systems Jim Spadaro and Ted Brockly.

Slides:



Advertisements
Similar presentations
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Advertisements

Somniloquy*: Augmenting Network Interfaces to Reduce PC Energy Usage Ranveer Chandra (Microsoft Research) Yuvraj Agarwal, Rajesh Gupta (UCSD), Victor Bahl,
Database Administration and Security Transparencies 1.
1 SEDA: An Architecture for Well- Conditioned, Scalable Internet Services Matt Welsh, David Culler, and Eric Brewer Computer Science Division University.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Chapter 9: Troubleshooting and Repairing Networking.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Enabling an Energy-Efficient Future Internet Through Selectively Connected End System Mark Allman Ken Christensen Bruce Nordman Vern Paxson.
Portland: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric Offense Kai Chen Shih-Chi Chen.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1 LECTURE 1 INTRODUCTION AND BASIC CONCEPTS DATA COMMUNICATIONS LECTURER : FERDINAND KATSRIKU (PhD)
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Packetizer ® Copyright © 2009 H.325: An Application Platform A Closer Look at the “Container” Paul E. Jones Rapporteur Q12/16 April 7,
Web Application Architecture: multi-tier (2-tier, 3-tier) & mvc
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 17 Slide 1 Extreme Programming.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
Mapping Internet Addresses to Physical Addresses (ARP)
MOBILE CLOUD COMPUTING
Guide to MCSE , Second Edition, Enhanced1 Windows XP Network Overview Most versatile Windows operating system Supports local area network (LAN) connections.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
SIGNALING. To establish a telephone call, a series of signaling messages must be exchanged. There are two basic types of signal exchanges: (1) between.
Advanced Web Forms with Databases Programming Right from the Start with Visual Basic.NET 1/e 13.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Network Layer4-1 DHCP: Dynamic Host Configuration Protocol Goal: allow host to dynamically obtain its IP address from network server when it joins network.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Extreme/Agile Programming Prabhaker Mateti. ACK These slides are collected from many authors along with a few of mine. Many thanks to all these authors.
Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems.
Connecting The Network Layer to Data Link Layer. ARP in the IP Layer The Address Resolution Protocol (ARP) The Address Resolution Protocol (ARP) Part.
1 ENERGY STAR ® Context ENERGY STAR program is voluntary; co-managed by EPA & DOE Specifications initially target the most energy efficient 25% of available.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
Reconsidering Internet Mobility Alex C. Snoeren, Hari Balakrishnan, M. Frans Kaashoek MIT Laboratory for Computer Science.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
SDN Management Layer DESIGN REQUIREMENTS AND FUTURE DIRECTION NO OF SLIDES : 26 1.
Jini Architectural Overview Li Ping
Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems Sergiu Nedevschi, Jaideep Chandrashekar, Junda Liu, Bruce Nordman, Sylvia.
Use Cases for High Bandwidth Query and Control of Core Networks Greg Bernstein, Grotto Networking Young Lee, Huawei draft-bernstein-alto-large-bandwidth-cases-00.txt.
1 of 20 Low Power and Dynamic Optimization Techniques for Power-Constrained Domains Ann Gordon-Ross Department of Electrical and Computer Engineering University.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
COMP1321 Digital Infrastructure Richard Henson March 2016.
DECADE Requirements draft-gu-decade-reqs-05 Yingjie Gu, David A. Bryan, Y. Richard Yang, Richard Alimi IETF-78 Maastricht, DECADE Session.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Networking Revision. Advantages:  Communication (remotely)  Sharing hardware (saves on cost, eg. Printers)  Sharing of data and info (eg. Databases.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Partner logo (optional)
Module 8: Networking Services
100% REAL EXAM QUESTIONS ANSWERS
Functions and Top-Down Design
1st Draft for Defining IoT (1)
Reliable Sockets: A Foundation for Mobile Communications
Design Unit 26 Design a small or home office network
Component-Based Software Engineering: Technologies, Development Frameworks, and Quality Assurance Schemes X. Cai, M. R. Lyu, K.F. Wong, R. Ko.
Network Hardware – LO’s
Network Models, Hardware, Protocols and number systems
Extreme Programming.
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

Enabling an Energy- Efficient Future Internet Through Selectively Connected End Systems Jim Spadaro and Ted Brockly

Motivation Studies have found… Studies have found… 67% of office desktop computers fully powered after work hours 67% of office desktop computers fully powered after work hours Average residential computer is on 34% of the time Average residential computer is on 34% of the time Half the time no one is actively using the machine Half the time no one is actively using the machine Potential energy savings estimated $0.8 - $2.7 billion in the US per year Potential energy savings estimated $0.8 - $2.7 billion in the US per year

Motivation (cont.) Why are these machines fully powered? Why are these machines fully powered? Sporadic, occasional access: Sporadic, occasional access: User remote access User remote access Administrative access (backups, patches, etc.) Administrative access (backups, patches, etc.) Service provider access (set-top boxes, VoIP systems, etc) Service provider access (set-top boxes, VoIP systems, etc) Preservation of network state Preservation of network state

Motivation (cont.) Underlying reason: our networking principles Underlying reason: our networking principles Our architecture assumes connected hosts Our architecture assumes connected hosts Disconnectedness is dealt with as a problem Disconnectedness is dealt with as a problem

Related Work More limited solutions to power management exist More limited solutions to power management exist TCP keep-alive response proxies TCP keep-alive response proxies Dynamic Power Management and Energy Star Dynamic Power Management and Energy Star Wireless power-level tiers Wireless power-level tiers Wake-on-LAN Wake-on-LAN

Related Work (cont.) Traditional Internet Traditional Internet Assumes constant connectivity Assumes constant connectivity Lack of connectivity signals failure Lack of connectivity signals failure Delay/Disruption Tolerant Networks Delay/Disruption Tolerant Networks Emphasize connectivity in low-reliability environments Emphasize connectivity in low-reliability environments Store-and-forward architecture Store-and-forward architecture More suited to extreme environments More suited to extreme environments

Proposed Architecture Selective Connectivity Selective Connectivity Allow 3 states: Allow 3 states: On – Full connectivity On – Full connectivity Off – No connectivity Off – No connectivity Asleep – Grey area between the two Asleep – Grey area between the two Allow a host to be asleep and still have presence on the network Allow a host to be asleep and still have presence on the network Limit powering up host to “important” tasks Limit powering up host to “important” tasks

Proposed Architecture (cont.) Selective Connectivity is between the traditional Internet and DTN Selective Connectivity is between the traditional Internet and DTN Takes full advantage of reliable connectivity for high-priority tasks Takes full advantage of reliable connectivity for high-priority tasks Don’t assume that lack of connectivity implies failure Don’t assume that lack of connectivity implies failure

Chatter All incoming data is not necessarily important All incoming data is not necessarily important Computer not previously engaged on network received 6 pps over a 12-hour period Computer not previously engaged on network received 6 pps over a 12-hour period Ignore or have low-power handling of unimportant data Ignore or have low-power handling of unimportant data

Assistants Allow hosts to handle low power tasks while sleeping: Allow hosts to handle low power tasks while sleeping: Keep-alive requests Keep-alive requests Renewing DHCP leases Renewing DHCP leases Responding to ARP queries Responding to ARP queries Soft error: tell remote hosts to retry Soft error: tell remote hosts to retry High-power tasks wake host High-power tasks wake host

Assistants (cont.) Location is unimportant: Location is unimportant: Powered-on NIC Powered-on NIC Independent system Independent system Built into switches Built into switches Introduces a new point of failure Introduces a new point of failure Degree dependent on amount of responsibility Degree dependent on amount of responsibility

Exposing State Tussle between efficiency and security Tussle between efficiency and security Allows more efficient and reliable operation Allows more efficient and reliable operation Also could result in too much information being released Also could result in too much information being released

Evolving Soft State Soft state is one of the architectural successes of the Internet Soft state is one of the architectural successes of the Internet Maintaining soft state across selectively connected hosts poses a problem Maintaining soft state across selectively connected hosts poses a problem Two possible approaches: Two possible approaches: Proxyable State: maintenance of the state by assistant Proxyable State: maintenance of the state by assistant Limbo State: Recognition of distinction between “inexplicably gone” and “asleep” Limbo State: Recognition of distinction between “inexplicably gone” and “asleep”

Host-based Control How selectively connected hosts are seen by others should be a policy decision How selectively connected hosts are seen by others should be a policy decision Examples: Examples: What is exposed to which peers What is exposed to which peers What tasks are delegated What tasks are delegated What events should wake the host What events should wake the host

Application Primitives Could we design general application primitives to aid selective connectivity? Could we design general application primitives to aid selective connectivity? E.g., a generalized keep-alive that goes beyond a binary answer E.g., a generalized keep-alive that goes beyond a binary answer E.g., a way to share a list of files the host makes available on a p2p network E.g., a way to share a list of files the host makes available on a p2p network Perhaps there are not a set of primitives, but we would need to provide a program that encodes our needed functionality to an assistant Perhaps there are not a set of primitives, but we would need to provide a program that encodes our needed functionality to an assistant

Security Security issues cut across our thinking Security issues cut across our thinking Many questions: Many questions: How can tasks be securely delegated? How can tasks be securely delegated? How does a peer know an assistant has authority to act on behalf of a host or app? How does a peer know an assistant has authority to act on behalf of a host or app? How do we layer our use of cryptography to expose information needed by an assistant without exposing sensitive data How do we layer our use of cryptography to expose information needed by an assistant without exposing sensitive data

Final Thoughts Our thinking of the issues is in early stages Our thinking of the issues is in early stages We likely don’t have all models We likely don’t have all models While energy savings has been the focus, the resulting components could be useful in other contexts While energy savings has been the focus, the resulting components could be useful in other contexts E.g., mobile hosts E.g., mobile hosts