Metrics for Evaluating ICEBERG ICEBERG Retreat Breakout Session Jan 11, 2000 Coordinators: Chen-Nee Chuah & Jimmy Shih.

Slides:



Advertisements
Similar presentations
ITCR Success through Innovation iTCR Success through Innovation CiTRs DECADE Strategy ä DECADE vision integrated electronic customer access.
Advertisements

Trust Management of Services in Cloud Environments:
D SEA Group Software Engineering and Architecture Group i On Exploiting DIVERSITY e-professionals scenario Paola Inverardi Dipartimento di Informatica.
Business Plug-In B4 MIS Infrastructures.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Objektorienteret Middleware Presentation 2: Distributed Systems – A brush up, and relations to Middleware, Heterogeneity & Transparency.
Touring ICEBERG -- An Overview and Tutorial Helen J. Wang January 10, 2000.
Using Digital Credentials On The World-Wide Web M. Winslett.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
The Case for ICEBERG Integrated services from diverse networks-- “PANS” (Potentially Any Network Services) Service infrastructure that allows user level.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 PLuSH – Mesh Tree Fast and Robust Wide-Area Remote Execution Mikhail Afanasyev ‧ Jose Garcia ‧ Brian Lum.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Introspective Replica Management Yan Chen, Hakim Weatherspoon, and Dennis Geels Our project developed and evaluated a replica management algorithm suitable.
Design of a Scalable Clearing House Architecture Lakshminarayanan Subramanian Chen-Nee Chuah Ramakrishna Gummadi ICEBERG Design Review Jan 12, 2000.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Cloud Usability Framework
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
MOBILE CLOUD COMPUTING
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
Informatics 43 – May 21, A quote from Piazza “This course is trying to teach you how to be a PM (product manager).”
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Chapter 1 Characterization of Distributed Systems Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, © Pearson Education.
Server is ‘host’ Clients do not communicate with each other.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Design Decisions / Lessons Learned Monday 21 August : :35 Top-level design decisions Rationale for IP-based approach Why an infrastructure.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
By: Ashish Gohel 8 th sem ISE.. Why Cloud Computing ? Cloud Computing platforms provides easy access to a company’s high-performance computing and storage.
Design Decisions / Lessons Learned Monday 21 August : :35 Top-level design decisions Rationale for IP-based approach Why an infrastructure.
1 Multimedia Services Service provider Service client Service registry Publish Find/discovery Bind Multimedia Services Framework and architecture.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
INTERNET AND ADHOC SERVICE DISCOVERY BY: NEHA CHAUDHARY.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Wide-Area Service Composition: Performance, Availability and Scalability Bhaskaran Raman SAHARA, EECS, U.C.Berkeley Presentation at Ericsson, Jan 2002.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Architecture Models. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Problem Scope Objective To demonstrate/determine clearly the need for an edge protocol that allows a user to interact with an agent in the network for.
Jini Architectural Overview Li Ping
Looking at the challenges that face a large heterogeneous IT infrastructure, in terms of security, scale, communication, IT literacy / competence, autonomy.
1 G52IWS: Web Services Chris Greenhalgh. 2 Contents The World Wide Web Web Services example scenario Motivations Basic Operational Model Supporting standards.
Managing and Monitoring the Microsoft Application Platform Damir Bersinic Ruth Morton IT Pro Advisor Microsoft Canada
Integrating Active Directory with eDirectory ™ Using Novell Account Manager Reid Oakes Technical Team Manager Novell, Inc.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
System Design for Home Automaton. Design Goals Performance Criteria – Server prioritizes client requests to provide quick response time to critical requests.
Introduction to Networking
Enterprise Computing with Jini Technology Mark Stang and Stephen Whinston Jan / Feb 2001, IT Pro presented by Alex Kotchnev.
E-COMMERCE & MOBILE COMPUTING. On Technicals… Considerations for evaluating platform Ecommerce Applications Development Process Integration Options Middlewares.
TRUST Self-Organizing Systems Emin G ü n Sirer, Cornell University.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
M IND Q S YSTEMS Leaders in Training /7, 2nd Floor, Srinivasa Nagar Colony (W) Above HDFC Bank, S.R.Nagar Hyderabad
Chapter 1 Characterization of Distributed Systems
Design Decisions / Lessons Learned
Security Engineering.
ICEBERG: An Internet-Based, Integrated Communication System
Azure-Powered Solution Ensures Great Precision and Clinical Accuracy for Health Monitoring Kit “Security and privacy are at the core of how we develop.
Mobile Agents.
Unit V Mobile Middleware.
Web Application Server 2001/3/27 Kang, Seungwoo. Web Application Server A class of middleware Speeding application development Strategic platform for.
ICEBERG Release Version 0
PLANNING A SECURE BASELINE INSTALLATION
Introduction To Distributed Systems
Presentation transcript:

Metrics for Evaluating ICEBERG ICEBERG Retreat Breakout Session Jan 11, 2000 Coordinators: Chen-Nee Chuah & Jimmy Shih

Goal of This Breakout Session We claim in ICEBERG that an IP-based core network can be better than the traditional telephony-based core network in terms of: Usability. Performance. Scalability. Robust Execution at a Reduced Cost. Our challenge for this breakout session is to come up with a set of metrics for evaluating ICEBERG against these claims.

Usability Preference Registry. How easy to setup and update preferences? Personal Activity Coordinator. How easy to interact with it? Personal Mobility. How easy to achieve this goal? Potentially Any Network Service (PANS). How easy to provide PANS given the limitations of different devices and networks? Service Creation. How easy to create new services? How much infrastructure needs to be there to allow new service creation?

Performance Operation in the Wide-area. End to end performance. Call set up time. Service Discovery Service/ Personal Activity Coordinator/ Preference Registry lookup time. Resource reservation set up time. Performance when services span multiple administrative domains. Performance when services span different types of networks and devices. Service Mobility. Performance during service handoffs.

Scalability Does ICEBERG scale to a large user base? How does the signaling complexity/overhead grow with the number of users? The number of service providers? Amount of state information needed to be stored at the ICEBERG point of presence(IPOP)? At the subsequent routers? Diversity and size of access networks that ICEBERG can provide services to? How many simultaneous calls per second can be handled?

Robust Execution at a Reduced Cost Fault Tolerance. Component failures. If a Call Agent breaks down, how long does it take to regenerate another Call Agent? Time to discover faults, time to recover from faults, loss of information due to faults. Availability. Network partitions. Percentage of time IPOP is available/accessible. Dependencies between components. Operation and Maintenance. Add, update and delete software agents or cached data (e.g. user preference). Security, Authentication and Privacy. Trusted computing base, time to discover attacks, damage due to attacks.

Deployment Issues How many people would use the ICEBERG communication services? How easy to develop new communication services? How easy to setup the system? How much does the system cost? How difficult to administer the system? How easy to extend an existing system?

Testing Platforms What is the reasonable analytical and simulation framework to study scalability performance? Experience learnt from web server studies: emulating multiple clients What about RMI based server? IPOP?