2005-2006 Projects Overview Andrea Forte Fast L3 handoff Passive DAD (pDAD) Cooperative Roaming (CR) Highly congested IEEE 802.11 networks – Measurements.

Slides:



Advertisements
Similar presentations
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Fast L3 Handoff in Wireless LANs Andrea G. Forte Sangho Shin Henning Schulzrinne.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Comparison between Skype and SIP- based Peer-to-Peer Voice-Over-IP Overlay Network Johnson Lee EECE 565 Data Communications.
Inter-Subnet Mobile IP Handoffs in b Wireless LANs Albert Hasson.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Cooperation Between Stations in Wireless Networks Andrea G. Forte and Henning Schulzrinne Department of Computer Science Columbia University, New York.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Overview CUTE (Columbia University Telecommunication service Editor) GUI-based service creation tool to help inexperienced users to create services Service.
IEEE in the Large: Observations at the IETF Meeting Henning Schulzrinne, Andrea G. Forte, Sangho Shin Department of Computer Science Columbia University.
Cooperation in Wireless Networks Andrea G. Forte Henning Schulzrinne November 14, 2005.
Tesseract A 4D Network Control Plane
SIMPLEStone – A presence server performance benchmarking standard SIMPLEStone – A presence server performance benchmarking standard Presented by Vishal.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Handoff Delay for b Wireless LANs Masters Project defense Anshul Jain Committee: Dr. Henning Schulzrinne, Columbia University Dr. Zongming Fei, University.
Peer-to-peer approaches for SIP Henning Schulzrinne Dept. of Computer Science Columbia University.
Presence Vishal Kumar Singh and Henning Schulzrinne Feb 10, 2006.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Chapter 6: Packet Filtering
IP telephony overview and demonstration
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Handoff in IEEE Andrea G. Forte Sangho Shin Prof. Henning Schulzrinne.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Deployment Guidelines for Highly Congested IEEE b/g Networks Andrea G. Forte and Henning Schulzrinne Columbia University.
Passive DAD Henning Schulzrinne Columbia University.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.
VoIP in Wireless Networks Henning Schulzrinne with Andrea G. Forte, Sangho Shin Department of Computer Science Columbia University ComSoc DLT June.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
An analysis of Skype protocol Presented by: Abdul Haleem.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Distributing Mobility Agents Hierarchically under Frequent Location Updates D. Forsberg, J.T. Malinen, J.K. Malinen, T. Weckström, M. Tiusanen TSE-Institute.
Project Objectives A multi-function programmable SIP user agent for multimedia communications, such as audio, video, white board, desktop sharing, shared.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Interactive Connectivity Establishment : ICE
Cooperation between stations in wireless networks Andrea G. Forte, Henning Schulzrinne Department of Computer Science, Columbia University Presented by:
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
Scalability == Capacity * Density.
October 17, 2007 Cooperation Between Stations in Wireless Networks Andrea G. Forte Henning Schulzrinne Department of Computer Science Columbia University.
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
Passive Duplicate Address Detection (DAD) Sangho Shin Andrea Forte Henning Schulzrinne Columbia University.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Network Processing Systems Design
Andrea G. Forte Sangho Shin Henning Schulzrinne
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
Peer to peer Internet telephony challenges, status and trend
IEEE in the Large: Observations at the IETF Meeting
P2P-SIP Using an External P2P network (DHT)
VoIP in IEEE Networks Henning Schulzrinne
Application Layer Mobility Management Scheme for Wireless Internet
Kundan Singh [please remove this page after merging]
Cooperation Between Stations in Wireless Networks
Computer Networks Protocols
Presentation transcript:

Projects Overview Andrea Forte Fast L3 handoff Passive DAD (pDAD) Cooperative Roaming (CR) Highly congested IEEE networks – Measurements and Analysis

Fast L3 Handoff We optimize the IP address acquisition time as follows: Subnet Discovery Checking Cache for a valid IP Temp_IP (Cache miss)  The client “picks” a candidate IP using particular heuristics. SIP re-invite  The CN will update its session with the TEMP_IP. Normal DHCP procedure to acquire the final IP SIP re-invite  The CN will update its session with the final IP.

Fast L3 Handoff - Results

Passive DAD - Architecture Address Usage Collector (AUC)DHCP server Router/Relay Agent SUBNET AUC builds DUID:MAC pair table (DHCP traffic only). AUC builds IP:MAC pair table (broadcast and ARP traffic). The AUC sends a packet to the DHCP server when: a new pair IP:MAC is added to the table a potential duplicate address has been detected a potential unauthorized IP has been detected DHCP server checks if the pair is correct or not and it records the IP address as in use. (DHCP has the final decision!) IPMACExpire IP1MAC1570 IP2MAC2580 IP3MAC3590 Broadcast-ARP-DHCP Client IDMAC DUID1MAC1 DUID2MAC2 DUID3MAC3 TCP Connection IPClient IDFlag

Cooperative Roaming (CR) Stations can cooperate and share information about the network (topology, services). Stations can cooperate and help each other in common tasks such as IP address acquisition. Stations can help each other during the authentication process without sharing sensitive information, maintaining privacy and security. Stations can also cooperate for application- layer mobility and load balancing.

CR – Results (1/2)

CR – Results (2/2)

Wireless measurements in highly congested networks IETF meeting in Dallas (IETF-65) Three days of measurements (~8GB of data). 400~500 people in one room (plenary). IEEE a/b Multiple APs on same channel. Congestion analysis (throughput, retries, ARF), handoff analysis (Apple vs. others), unusual behaviors (broadcast feedback), load balancing (num. of clients vs. bandwidth).

Projects Overview Kundan Singh P2P-SIP using external DHT Thread and event models Conference server scalability

SIP-using-P2P P2P-SIP using an external distributed hash table (DHT) Data vs service modes Data: treat DHT as data storage using put/get/remove Service: join DHT to provide registrar/presence service using join/leave/lookup Logical operations Contact management put (user id, signed contact) Cryptographic key storage User certificates and private configurations Presence put (subscribee id, signed encrypted subscriber id) Composition needs service model Offline message put (recipient, signed encrypted message) NAT and firewall traversal STUN and TURN server discovery needs service model Proposed an XML-based data format

SIP-using-P2P Implementation in SIPc with the help of Xiaotao Wu OpenDHT Trusted nodes Robust Fast enough (<1s) Identity protection Certificate-based SIP id == P2P for Calls, IM, presence, offline message, STUN server discovery and name search P2P clients better than proxies: Less DHT calls OpenDHT quota for fairness imposes limit on proxies Should this be made open source?

SIP proxy performance Effect of software architecture and multi-processor hardware Calls/s for stateless proxy, UDP, no DNS, 6 msg/call Architecture /Hardware 1 PentiumIV 3GHz, 1GB, Linux (1xP) 4 pentium, 450MHz, 512 MB, Linux (4xP) 1 ultraSparc-IIi, 300 MHz, 64MB, Solaris (1xS) 2 ultraSparc-II, 300 MHz, 256MB, Solaris (2xS) Event-based Thread per msg Pool-thread per msg (sipd) Thread-pool Process-pool Calls/s for stateful proxy, UDP, no DNS, 8 msg/call Architecture /Hardware 1 PentiumIV 3GHz, 1GB, Linux (1xP) 4 pentium, 450MHz, 512 MB, Linux (4xP) 1 ultraSparc-IIi, 360MHz, 256 MB, Solaris5.9 (1xS) 2 ultraSparc-II, 300 MHz, 256 MB, Solaris5.8 (2xS) Event-based Thread per msg Thread-pool (sipd) stage thread-pool Better performance as this includes mempool changes Software architecture further improves performance: S3P3 can support 16 million BHCA Both Pentium and Sparc took approx 2 MHz CPU cycles per call/s on single-processor

Not much concurrency in stateful mode: needs more investigation Should sipd use 2-stage thread pool architecture?

SIP conference server Performance For G.711 audio mixing on a 3 GHz Pentium 4 with 1 GB memory About 480 participants in a single conference with one active speaker (CPU is bottleneck) About 40 four-party conferences, each with one active speaker (CPU is bottleneck) Memory usage: 20 kB/participant Mixer delay: less than 20 ms Increasing the packetization interval to 40 ms improves performance to 700 participants, but also increases mixer delay Both Pentium and Sparc take about 6 MHz/participant

Cascaded conference server     I measured the CPU usage for two cascaded servers: supports about 1000 participants in a single conference. The cascaded architecture scales to tens of thousands of participants. SIP REFER message is used to create cascading

Projects Overview Xiaotao Wu CUTE (Columbia University Telecommunication service Editor) GUI-based service creation tool to help inexperienced users to create services Service learning and service management Service learning Service risk management Handling feature interactions

CUTE (Columbia University Telecommunication service Editor)

Survey on CUTE Evaluating how likely an end user can create telecommunication services by himself and how useful and friendly CUTE is 365

Service learning and service risks Service learning and service risks Causal relationship between call information and call decisions Decision tree induction Incremental Tree Induction algorithm Service risk management Identify: Lose connection, privacy, money, attention Analyze: Possibility, impact, overall risk Resolve: Change communication methods, transfer, reduce overall risk Contingency plan

Feature interaction handling Feature interaction handling accept Tree merging + = If time is between 10:00AM and 11:00AM If address is hgs Forward to conf Incoming call If time is between 10:00AM and 11:00AM If address is hgs reject Forward to conf reject accept Take actions from both scripts. Simply setting precedence rules cannot work.

Service management Service management