Protocol Engineering Research Center P. M. Melliar-Smith U.C. Santa Barbara M. G. Baker Stanford J. J. Garcia-Luna-Aceves U.C. Santa Cruz J. C. Hou Ohio.

Slides:



Advertisements
Similar presentations
Information Society Technologies programme 1 IST Programme - 8th Call Area IV.2 : Computing Communications and Networks Area.
Advertisements

1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Performance Testing - Kanwalpreet Singh.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
CROWN “Thales” project Optimal ContRol of self-Organized Wireless Networks WP1 Understanding and influencing uncoordinated interactions of autonomic wireless.
DARPA ITS PI Meeting – Honolulu – July 17-21, 2000Slide 1 Aegis Research Corporation Intrusion Tolerance Using Masking, Redundancy and Dispersion DARPA.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Randomized Failover Intrusion Tolerant Systems (RFITS) Ranga Ramanujan Noel Schmidt Architecture Technology Corporation Odyssey Research Associates DARPA.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Streaming Video over the Internet: Approaches and Directions Dapeng Wu, Yiwei Thomas Hou et al. Presented by: Abhishek Gupta
Networks and Distributed Systems: Project Ideas
Matching Patterns Servers assemble sequences of notifications from smaller subsequences or from single notifications.This technique requires an advertisement.
Software Engineering and Middleware: a Roadmap by Wolfgang Emmerich Ebru Dincel Sahitya Gupta.
Cross Layer Design in Wireless Networks Andrea Goldsmith Stanford University Crosslayer Design Panel ICC May 14, 2003.
Special Session PDCS’2000 Interworking of Diffserv, RSVP and MPLS for achieving QoS in the Internet Junaid Ahmed Zubairi Department of Mathematics and.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
Architecture and Real Time Systems Lab University of Massachusetts, Amherst An Application Driven Reliability Measures and Evaluation Tool for Fault Tolerant.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
FTMP: A Fault-Tolerant Multicast Protocol Louise E. Moser Department of Electrical and Computer Engineering University of California, Santa Barbara.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
August 18-19, 2002 UCSC Baskin School of Engineering1 UCSC PERC COMPONENT: Protocols for Wireless Internetworks J.J. Garcia-Luna-Aceves Computer Communication.
SUMMARY COMMENTS ON SENSOR NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute.
Computer Science 1 Characterizing Link Properties Using “Loss-pairs” Jun Liu (joint work with Prof. Mark Crovella)
System Integration Management (SIM)
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Univ. Notre Dame, September 25, 2003 Support for Run-Time Adaptation in RAPIDware Philip K. McKinley Software Engineering and Networking Systems Laboratory.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
Composing Adaptive Software Authors Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H.C. Cheng Presented by Ana Rodriguez June 21, 2006.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
TESTBED FOR FUTURE INTERNET SERVICES TEFIS at the EU-Canada Future Internet Workshop, March Annika Sällström – Botnia Living Lab at Centre for.
UNIT 6 SEMINAR Unit 6 Chapter 7 and 8, plus Lab 12 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours:
Class 5 Architecture-Based Self-Healing Systems David Garlan Carnegie Mellon University.
Covilhã, 30 June Atílio Gameiro Page 1 The information in this document is provided as is and no guarantee or warranty is given that the information is.
Issues Autonomic operation (fault tolerance) Minimize interference to applications Hardware support for new operating systems Resource management (global.
Multicast ad hoc networks Multicast in ad hoc nets Multicast in ad hoc nets Review of Multicasting in wired networks Review of Multicasting in wired networks.
報告人:林祐沁 學生 指導教授:童曉儒 老師 March 2, Wireless Video Surveillance Server Based on CDMA1x and H.264.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Codes, Peers and Mates Media processing meets future networks EU Workshop on thematic priorities in Networked Media Brussels January 19 th 2010 Ebroul.
ICN Baseline Scenarios draft-pentikousis-icn-scenarios-04 K. Pentikousis (Ed.), B. Ohlman, D. Corujo, G. Boggia, G. Tyson, E. Davies, P. Mahadevan, S.
Video Multicast over the Internet Presented by: Liang-Yuh Wu Lung-Yuan Wu Hao-Hsiang Ku 12 / 6 / 2001 Bell Lab. And Georgia Institute of Technologies IEEE.
NetQoPE: A Middleware-based Netowork QoS Provisioning Engine for Distributed Real-time and Embedded Systems Jaiganesh Balasubramanian
Illinois Center for Wireless Systems Wireless Networks: Algorithms and Optimization R. Srikant ECE/CSL.
1 Wide Area Network Emulation on the Millennium Bhaskaran Raman Yan Chen Weidong Cui Randy Katz {bhaskar, yanchen, wdc, Millennium.
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
Transversal Issues in Real-Time Sense-and-Respond Systems Ahmad T. Al-Hammouri Vincenzo Liberatore Huthaifa A. Al-Omari Case Western Reserve University.
December 4, 2002 CDS&N Lab., ICU Dukyun Nam The implementation of video distribution application using mobile group communication ICE 798 Wireless Mobile.
Troubleshooting Mesh Networks Lili Qiu Joint Work with Victor Bahl, Ananth Rao, Lidong Zhou Microsoft Research Mesh Networking Summit 2004.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Sharp Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
Indian Institute of Technology Bombay 1 Communication Networks Prof. D. Manjunath
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
Session 1: Technology Development August 15 NSF Workshop.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
In the name of God.
Potential Areas of Research Activity – March 2000
High Performance Computing Lab.
Algorithms for Big Data Delivery over the Internet of Things
Faloutsos: My Areas of Research
Towards Next Generation Panel at SAINT 2002
Presentation transcript:

Protocol Engineering Research Center P. M. Melliar-Smith U.C. Santa Barbara M. G. Baker Stanford J. J. Garcia-Luna-Aceves U.C. Santa Cruz J. C. Hou Ohio State K. N. Levitt U.C. Davis L. E. Moser U.C. Santa Barbara D. C. Schmidt U.C. Irvine T. Suda U.C. Irvine

The Vision Information and Computation without Boundaries What Matters to the Users – Functionality – Ilities Real-time Performance Reliability Security What Should Be Hidden Engineering – Physical Location – Mobility – Networks and Protocols

The Vision Transparency and Ease of Use Major Applications are the most complex things ever built by humans The Network and the Protocols should make applications easier to design and build Application designers should express their requirements for Quality of Service Automated implementation of QoS requirements Predictable network performance

Objectives Application Systems Built from Components – The Network is the glue that holds components together Real-Time across Multiple Platforms Mobile Wireless Networks – Full Capabilities – Full Performance – Disconnected Operation Security – Rigorous – Unobtrusive – External intruders and internal subversion

Objectives Methodologies allow application designers to express their Quality of Service requirements Networks and Protocols are efficient/predictable over a wide range of topologies and loads Tools help application designers to assess and predict the behaviors of their designs Analysis and Measurement techniques determine whether systems are behaving as they should

Synergy in Real Time Doug Schmidt – ACE real-time network executive – Mapping Quality of Service onto the implementation Jennifer Hou – Medusa - meeting QoS requirements Multicasting Routing Flow control and Congestion Michael Melliar-Smith and Louise Moser – Probabilistic analysis of real-time delays J.J. Garcia-Luna-Aceves – Real-time wireless protocols

Synergy in Fault Tolerance Louise Moser and Michael Melliar-Smith – Fault-tolerant multicast protocols – Fault tolerance for Java and CORBA (Eternal) – Recovery in real-time – Network resource allocation for fault tolerance Jennifer Hou – Fault-tolerant multicast protocols – Fault-tolerant routing J.J. Garcia-Luna-Aceves and Mary Baker – Fault-tolerant wireless networks

Synergy in Security Karl Levitt – Models of attacks – Intrusion detection strategies for detecting attacks and subverted nodes – Response and defense strategies Mary Baker – Routing that exploits trust developed over time – Mechanisms for detecting malicious behavior Louise Moser – Reliable operation in networks that contain subverted nodes

Synergy in Multimedia Tatsuya Suda – Scalable multimedia multicasts – Adaptive layered encoding – QoS feedback, with aggregation within the network Jennifer Hou – Multimedia in medical applications J.J. Garcia-Luna-Aceves – Wireless multimedia Michael Melliar-Smith – Least-laxity scheduling for jitter management

Synergy in Wireless J.J. Garcia-Luna-Aceves and Mary Baker – Quality of Service at the link level – Quality of Service over multiple paths – Aggregation of flows – Distribution of aggregated flows – Integration of routing and reservations – Transmission of priority packets over multiple paths – CAMP mesh routing Michael Melliar-Smith – Hierarchical clustering for scalable routing in large ad-hoc networks Jennifer Hou – Mobile IP for multicasting

ARCH Clustered Routing Protocol Michael Melliar-Smith Hierarchical Clustered Routing allows ad-hoc networks to scale to thousands of nodes while still retaining reasonable overheads

Synergy in BioNetworking Tatsuya Suda – Cyber-entities – Hierarchical aggregation into Super-entities – Scalability, adaptability, evolution – Coordination and efficiency Everybody – How can our protocols become Cyber-entities? – How can our strategies be used in BioNetworking?

Tools: NetSim^Q Jennifer Hou Java-based network simulation tool Exploits object-oriented programming – Instantiate generic network class – Redefine attributes and methods Trace-driven simulation models real traffic Can be used for – Validation of protocols – Investigation of tradeoffs – Fine tuning

Tools: Testing Workbench Karl Levitt Protocol specification in Estelle To reduce the testing burden – Select a component of the specification – Slice the implementation to contain only statements that relate to the specification component – Test the slice against the specification Specifications can also be sliced with respect to a higher level specification Test data can be generated for the slice – Identify code that is vulnerable to race conditions – Generate test cases to explore those vulnerabilities

Tools: Verification Workbench Karl Levitt Based on HOL for extensibility and proof checking and PVS for proof power Develop HOL theories for – Refinement – Composition – Liveness and Feedom from Deadlock – Quality of Service – Faults and Attacks Will still require substantial human involvement

Tools: Performance Analysis Michael Melliar-Smith and Louise Moser Performance Analyses based on mean durations are not useful for real-time Analyses based on worst-case durations are too conservative We need to estimate the tail of the distribution of durations Analysis is based on pdfs for durations – combined by convolution – allowance for correlations

Tools: Performance Analysis Michael Melliar-Smith and Louise Moser

Working Together Collaborative research – By professors – By students – Many interesting interactions among our research Weekly seminar series – Conducted across the Internet – Professor or student presents a research project – Discussion of relationship to other research Experimental testbed network based on CALREN-2