ACT: Audio Conference Tool Over Named Data Networking Zhenkai Zhu, Sen Wang, Xu Yang, Van Jacobson, Lixia Zhang ICN ‘11 August 19 Presenter: Junghwan Song.

Slides:



Advertisements
Similar presentations
Panel: ICN Architecture Overview Cedric Westphal Huawei Innovations
Advertisements

Mobile Networking through Mobile IP
Information-Centric Networks09c-1 Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks –V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass,
Introducing Campus Networks
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
1 What's happening in Networking Research Today? Prasad Calyam, OARnet OARTech Presentation, Dec 8 th, 2004.
An Engineering Approach to Computer Networking
Streaming Video over the Internet: Approaches and Directions Dapeng Wu, Yiwei Thomas Hou et al. Presented by: Abhishek Gupta
UNCW UNCW SIGGRAPH 2002 Topic #3: Continuous Media in Wired and Wireless Environments Ronald J. Vetter Department of Computer Science University of North.
An Adaptable Benchmark for MPFS Performance Testing A Master Thesis Presentation Yubing Wang Advisor: Prof. Mark Claypool.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Remote Desktop Connection Techniques Wireless Communication Networks.
Secure Multimedia Multicast: Interface and Multimedia Transmission GROUP 2: Melissa Barker Norman Lo Michael Mullinix server router client router client.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
A Secure Network Access Protocol (SNAP) A. F. Al Shahri, D. G. Smith and J. M. Irvine Proceedings of the Eighth IEEE International Symposium on Computers.
Implementing a Distributed Firewall
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
SIP vs H323 Over Wireless networks Presented by Srikar Reddy Yeruva Instructor Chin Chin Chang.
A a secure peering. RIB table dump by attributes in order to save space. References 1. RouteViews, 2. RIPE,
Real-time Transport Protocol Matt Boutell CS457: Computer Networks November 15, 2001.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
12/9/2002Packet Rewrite Techniques1 Aparna Srikanta Swamy Reena Hans CS526 Semester Project 12/9/02.
NDN NAC Chengyu Fan 1. Motivation Currently, NDN users need manual configuration before they can publish or consume content NDN Auto-configuration (NAC)
Module 13: Network Load Balancing Fundamentals. Server Availability and Scalability Overview Windows Network Load Balancing Configuring Windows Network.
1 mmdump Reference: “mmdump: A Tool for Monitoring Internet Multimedia Traffic” J. van der Merwe, R. Cceres, Y-H. Chu, C. Sreenan. ACM SIGCOMM Computer.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
GNUTELLA PEER-TO-PEER NETWORKING. GNUTELLA n What is Gnutella n Relation to the World Wide Web n How it Works n Sites / Links / Information.
Information-Centric Networking Proposed IRTF RG IRTF Open Meeting at IETF-81 1IRTF Open IETF-81.
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
2012 Yanghee ChoiMMlab1 Computer Networks Class HourMonday 15: :45 (lecture), by Yanghee Choi, Rm Wednesday 15: :45 (practice), by.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
PR SM A Secure Code Deployment Scheme for Active Networks Amdjed Mokhtari Leïla Kloul 22 November 2005.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
1 Data Naming in Vehicle-to-Vehicle Communications HU Yao Goto Lab
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
A Collaborative Framework for Scientific Data Analysis and Visualization Jaliya Ekanayake, Shrideep Pallickara, and Geoffrey Fox Department of Computer.
Multimedia & Mobile Communications Lab.
Outline Introduction Existing solutions for ad hoc
Network Address Translation External/ Internal/. OVERLOADING In Overloading, each computer on the private network is translated to the same IP address;
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Mar del Plata, Argentina, 31 Aug – 1 Sep 2009 ITU-T Kaleidoscope 2009 Innovations for Digital Inclusion Ved P. Kafle, Hideki Otsuki, and Masugi Inoue National.
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
Jabber Technical Overview Presenter: Ming-Wei Lin.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Information-Centric Networks Section # 9.3: Clean Slate Instructor: George Xylomenos Department: Informatics.
Peer to Peer Network Design Discovery and Routing algorithms
Enterprise Computing with Jini Technology Mark Stang and Stephen Whinston Jan / Feb 2001, IT Pro presented by Alex Kotchnev.
Fall 2006CS 395: Computer Security1 Key Management.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Skype.
NDN-Android: NDN Networking Stack for Android Platform
Gijeong Kim ,Junho Kim ,Sungwon Lee Kyunghee University
Zueyong Zhu† and J. William Atwood‡
Content Centric Networking
Peer-to-peer networking
Presentation transcript:

ACT: Audio Conference Tool Over Named Data Networking Zhenkai Zhu, Sen Wang, Xu Yang, Van Jacobson, Lixia Zhang ICN ‘11 August 19 Presenter: Junghwan Song

Outline Motivation ACT design –Conferences discovery –Speakers discovery –Voice data distribution Discussion –Security, scalability, robustness, mobility Conclusion 2/17

Motivation To gain further understanding –Application data naming –Relation with routing scalability –Trust model To serve as a useful tool for the NDN team collaborations To generate real-world traffic on an NDN testbed 3/17

Outline Motivation ACT design –Conferences discovery –Speakers discovery –Voice data distribution Discussion –Security, scalability, robustness, mobility Conclusion 4/17

Difference in communication Central server B B D D A A C C B B D D A A C C Speaker Traditional audio conference ACT 5/17

An overview of ACT design Basic tasks of ACT –Collecting the latest information about all existing conferences List of conferences, speakers Using two different name space –Media data processing and user interface design 6/17

An overview of ACT design Open source audio conference package –To focus on NDN Change server codes –Embedding speakers discovery, voice data distribution Conference discovery module is separated –Flexible to extend ACT with other features 7/17

Conferences discovery Conference announcement –Creating a data object in the Session Description Protocol(SDP) Ex) /ndn/broadcast/conference/conference- list/icn2011 Conference enumeration –Sending interests with broadcast name Ex) /ndn/broadcast/conference/conference-list –To get all conferences, using exclusion filter 8/17

Conference discovery 9/17 /ndn/broadcast/conference/conference-list/icn2011 /ndn/broadcast/conference/conference-list Exclude filter = [icn2011]

Speakers discovery Using similar mechanism with conference discovery –Ex) /ndn/broadcast/conferences/[conference- name]/speaker-list ACT scales well –ACT tracks only speakers, not all participants 10/17

Voice data distribution Each speaker uses a topology-dependent name prefix –Ex) /ucla.edu/cs/zhenkai/[device-id]/[codec- name]/[seg-num] Device-id: 32-bit random string, unique in local network Seg-num: Incremental number stored in a circular buffer Each interest retrieves a data packet –Pipelining can be used 11/17

Outline Motivation ACT design –Conferences discovery –Speakers discovery –Voice data distribution Discussion –Security, scalability, robustness, mobility Conclusion 12/17

Security Two basic security functions –Data authentication –Participants control ACT’s way of supporting security –There’re built-in security primitives in NDN –Using encryption-based access control scheme 13/17

Security Supporting private conference –Data authentication Legitimate participants send Interest for the conference’s public key Conference initiator knows the list of legitimate participants, and responds with conference’s private key Initiator encrypts a session key using public key and publishes it under a name –Participants control Do not respond to unauthorized users 14/17

Other discussions Scalability –Traditional: Central server may be bottleneck –ACT: No repeated packet by pending Robustness –Traditional: Central server may be a single point of failure –ACT: Fully distributed 15/17

Other discussions Mobility –Traditional: Re-register with new IP address and restart joining process –ACT Listener: Nothing needs to be changed Speaker: Appending “#” to moving speaker’s name 16/17

Conclusion Designing ACT, a completely distributed audio conference tool using NDN –Good example on how to design applications over NDN –Useful tool for research collaborations 17/17