Trustworthy Conferencing via Domain-specific Modeling and Low Latency Reliable Protocols Joe Hoffert, Douglas Schmidt (Vanderbilt University); Mahesh Balakrishnan,

Slides:



Advertisements
Similar presentations
Reliable Multicast for Time-Critical Systems Mahesh Balakrishnan Ken Birman Cornell University.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
CCNA – Network Fundamentals
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking Assist. Prof.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
Reliable Group Communication Quanzeng You & Haoliang Wang.
22 May 2015Joe Hoffert Quality of Service Configuration DSML for the Data Distribution Service Joe Hoffert
Yi Liang Department of Electrical Engineering Stanford University April 19, 2000 Loss Recovery and Adaptive Playout Control for Packet Voice Communications.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Enterprise development reference architecture (EDRA) -Deepti Seelamsetti.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
CS 582 / CMPE 481 Distributed Systems Communications.
Software Engineering and Middleware: a Roadmap by Wolfgang Emmerich Ebru Dincel Sahitya Gupta.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
The Shared Channel Model for DoS Carl A. Gunter With Sanjeev Khanna, Kaijun Tan, and Santosh Venkatesh.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
Introduction GOALS:  To improve the Quality of Service (QoS) for the JBI platform and endpoints  E.g., latency, fault tolerance, scalability, graceful.
Transport Layer and UDP Tahir Azim Ref:
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Networked & Distributed Systems TCP/IP Transport Layer Protocols UDP and TCP University of Glamorgan.
Towards Low Overhead Provenance Tracking in Near Real-Time Stream Filtering Nithya N. Vijayakumar, Beth Plale DDE Lab, Indiana University {nvijayak,
(Business) Process Centric Exchanges
MESSAGE ORIENTED MODEL (MOM). Slide 2CITE 4420 Message Oriented Model Message-Oriented Model (MOM)
7/26/ Design and Implementation of a Simple Totally-Ordered Reliable Multicast Protocol in Java.
Next Steps in Fuego Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
CCSDS Security WG meeting October 2008, hosted by DLR at DIN premises (Berlin) 1 Data Link Security BOF An ESA contribution on Lessons Learned and Issues/Questions.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
DataReader 2 Enhancing Security in Ultra-Large Scale (ULS) Systems using Domain- specific Modeling Joe Hoffert, Akshay Dabholkar, Aniruddha Gokhale, and.
Investigating Survivability Strategies for Ultra-Large Scale (ULS) Systems Vanderbilt University Nashville, Tennessee Institute for Software Integrated.
Object-Oriented Software Engineering using Java, Patterns &UML. Presented by: E.S. Mbokane Department of System Development Faculty of ICT Tshwane University.
Resolving QoS Policy Configuration Challenges for Publish/Subscribe Middleware Platforms AFRL JBI PI Meeting.
Aniruddha Gokhale and Jeff Gray Institute for Software Integrated Systems (ISIS) Vanderbilt University Software Composition and Modeling Laboratory University.
Page 1 The department of Information & Communications Engineering Dong-uk, kim A Survey of Packet Loss Recovery Techniques for Streaming.
CS603 Fault Tolerance - Communication April 17, 2002.
1 Object Oriented Logic Programming as an Agent Building Infrastructure Oct 12, 2002 Copyright © 2002, Paul Tarau Paul Tarau University of North Texas.
18 December 2015Joe Hoffert, Aniruddha Gokhale, Doug Schmidt Enabling Trustworthy Systems with the DDS Quality of Service Modeling Language Joe Hoffert,
A QoS Policy Modeling Language for Publish/Subscribe Middleware Platforms A QoS Policy Modeling Language for Publish/Subscribe Middleware Platforms Joe.
Service Oriented Architecture + SOAP -Robin John.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
Slingshot: Time-Critical Multicast for Clustered Applications Mahesh Balakrishnan Stefan Pleisch Ken Birman Cornell University.
Topic 2: The Role of Open Standards, Open-Source Development, & Different Development Models & Processes (on Industrializing Software) ARO Workshop Outbrief,
Enhancing Security in Enterprise Distributed Real-time and Embedded Systems using Domain-specific Modeling Akshay Dabholkar, Joe Hoffert, Aniruddha Gokale,
Integration Patterns in BizTalk Server 2004 Integration Patterns Explained What are integration patterns? What patterns does BizTalk Server 2004 provide.
Motivation FACE architecture encourages modularity of components on data boundaries Transport Services Segment interface is centered on sending and receiving.
20 February 2016Joe Hoffert Quality of Service Configuration DSML for the Data Distribution Service Joe Hoffert
CS533 - Concepts of Operating Systems End-to-End Arguments in System Design Presentation by David Florey.
Networks, Part 2 March 7, Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data.
Application Communities Phase 2 (AC2) Project Overview Nov. 20, 2008 Greg Sullivan BAE Systems Advanced Information Technologies (AIT)
Tempest: An Architecture for Scalable Time-Critical Services Mahesh Balakrishnan Amar Phanishayee Tudor Marian Professor Ken Birman.
Reliable Adaptive Lightweight Multicast Protocol Ken Tang, Scalable Network Technologies Katia Obraczka, UC Santa Cruz Sung-Ju Lee, Hewlett-Packard Laboratories.
Software Connectors. What is a Software Connector? 2 What is Connector? – Architectural element that models Interactions among components Rules that govern.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
Chapter 7: Transport Layer
Replication & Fault Tolerance CONARD JAMES B. FARAON
Software Connectors.
Internet Protocol: Connectionless Datagram Delivery
Joe Hoffert, Doug Schmidt Vanderbilt University
Computer Networks Protocols
Presentation transcript:

Trustworthy Conferencing via Domain-specific Modeling and Low Latency Reliable Protocols Joe Hoffert, Douglas Schmidt (Vanderbilt University); Mahesh Balakrishnan, Ken Birman (Cornell University) April 2, 2008 Ricochet uses a bi-modal multicast protocol & lateral error-correction (LEC) to provide QoS & scalability guarantees Ricochet supports time-critical multicast for high data rates with strong probabilistic delivery guarantees low latency error detection low latency error recovery Addressing Conferencing Timeliness via the Ricochet Transport Protocol Addressing Trustworthiness via the Data Distribution Service (DDS) Quality of Service (QoS) Modeling Language (DQML) Enhances trust by supporting intended QoS configurations at design time Automates complex, tedious, and error-prone QoS compatibility and consistency checking Provides separation of concerns to facilitate configuration analysis better Generates application artifacts (e.g., OpenDDS source code, Ricochet configuration code) Supports pub/sub middleware research by providing a base for higher level DDS abstractions DDS Configuration Patterns Basis for DDS application-specific profiles Ongoing Research Develop conferencing application taxonomy Categorize conferencing application types based on timeliness and reliability needs Develop DDS QoS patterns and Ricochet settings profiles Enhance DQML to include the developed patterns and profiles Trustworthiness Challenges for Conferencing Systems Example Applications: a)Video/infrared coordination (e.g., search and rescue) b)Stock update correlation c)Medical telemetry (e.g., wireless ER) d)Science monitoring (e.g., weather tracking) Challenges: a)Provide the right amount of reliability and timeliness Enough data is reliably delivered to be useful Latency is low enough to meet timeliness requirements b)Abstract away error-prone low- level implementation details Summary of Solution Approach: Use Model Driven Engineering (MDE) with Low Latency Reliable Protocols to 1.Modularize trustworthiness concerns, 2.Reason about the system, and 3.Synthesize “correct-by-construction” transport protocol configurations Ricochet provides low-latency high-reliability transport of data DQML uses constraint-checking for analysis, generates intended QoS metadata, and configures the Ricochet transport protocol appropriately Researching: 1.QoS conferencing profiles for pub-sub middleware 2.Ricochet settings to enhance security against various threats 3.Inclusion of authentication in Ricochet to determine overhead Context: a)Continuous data streams have timeliness requirements b)Conferencing requires synchronization of multiple continuous data streams c)Conferencing implies multiple senders & receivers App COI GW App COI GW App COI GW Ricochet protocol Control Center Metamodel Application model App COI GW App COI GW App COI GW Ricochet protocol Control Center Ricochet Config Ricochet Config Ricochet Config Overhead Latency Burstiness Tolerance sender receiver r = 5, c = 1 Ricochet provides tunable settings # of packets sent for error correction (r) # of correction packets (c) Amount of interleaving (i) NAK inclusion/timeout sender’s sliding window size Key: = error correction info = data message i = 2 Ricochet taxonomy/profiles for security threats e.g., DDOS, reliable senders/corrupt FECs contain/limit propagation of security threat (gossip susceptibility) authentication (acceptable overhead?)