Survivable Real-Time Network Services (G409/J175)

Slides:



Advertisements
Similar presentations
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts – Chapter.
Resilient Peer-to-Peer Streaming Paper by: Venkata N. Padmanabhan Helen J. Wang Philip A. Chou Discussion Leader: Manfred Georg Presented by: Christoph.
Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
Applying Genetic Algorithms to Decision Making in Autonomic Computing Systems Authors: Andres J. Ramirez, David B. Knoester, Betty H.C. Cheng, Philip K.
The Maryland Optics Group Multi-Hop View: Interfaces not available between (s, d): Try to create multi-hop path. Link Selection: Local Optimization: Select.
Adaptive Web Caching: Towards a New Caching Architecture Authors and Institutions: Scott Michel, Khoi Nguyen, Adam Rosenstein and Lixia Zhang UCLA Computer.
Dynamically Reconfiguring Hierarchies Walter Hsueh CS446 Software Engineering with.
COS 420 Day 13. Agenda Assignment 3 Posted Covers chapters Due March 23 2 Days till Daytona Beach Bike Week Midterm Exam is Due Today Today we will.
March 13, 2003 Routing Functional Components Steven D. Jones (JHU/APL) Chunyue Liu (CCNY) Tarek Saadawi (CCNY) I-Jeng Wang (JHU/APL)
Draft-li-rtgwg-cc-igp-arch-00IETF 88 RTGWG1 An Architecture of Central Controlled Interior Gateway Protocol (IGP) draft-li-rtgwg-cc-igp-arch-00 Zhenbin.
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
C OLUMBIA U NIVERSITY Lightwave Research Laboratory Embedding Real-Time Substrate Measurements for Cross-Layer Communications Caroline Lai, Franz Fidler,
Introduction to Routing and Routing Protocols By Ashar Anwar.
Introduction to Dynamic Routing Protocol
1 Robot Networking Greg McChesney Texas Tech University Apr 21, 2009 CS5331: Autonomous Mobile Robots.
ESubnet Enterprises Inc. Richard Danielli, eSubnet Higher sales volumes through high network availability INTIX 2010.
Message Brokers and B2B Application Integration Chap 13 B2B Application Integration Sungchul Hong.
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
Using DHCPv6 for DNS Configuration in Hosts draft-ietf-droms-dnsconfig-dhcpv6-00.txt Ralph Droms.
Impact of Topology on Overlay Multicast Suat Mercan.
Teaching Assistant Demonstrator - Contribution - Jan Beutel, Michael Eisenring, Marco Platzner, Christian Plessl, Lothar Thiele Computer Engineering and.
Vishal Jain, AntNet Agent Based Strategy for CMDR “Agent Based Multiple Destination Routing ”
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
OSI Model Topology Patch cable Flow control Common layer 2 device Best path Purpose of Layer 2 devices.
Routing and Routing Protocols PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
SHADOWSTREAM: PERFORMANCE EVALUATION AS A CAPABILITY IN PRODUCTION INTERNET LIVE STREAM NETWORK ACM SIGCOMM CING-YU CHU.
Self-stabilizing energy-efficient multicast for MANETs.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
11 ROUTING IP Chapter 3. Chapter 3: ROUTING IP2 CHAPTER INTRODUCTION  Understand the function of a router.  Understand the structure of a routing table.
March 2014 doc.: IEEE Submission Jaehwan Kim (ETRI) Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
ARTEMIS SRA 2016 Trust, Security, Robustness, and Dependability Dr. Daniel Watzenig ARTEMIS Spring Event, Vienna April 13, 2016.
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
VCN510-16PD Video Cloud Node Technical Specifications Product Features
Presented by Edith Ngai MPhil Term 3 Presentation
VCN510-16P Video Cloud Node Technical Specifications Product Features
Lec4: Introduction to Dynamic Routing Protocol
Introduction to Dynamic Routing Protocol
Self Healing and Dynamic Construction Framework:
NETW 208 RANK The power of possibility/netw208rank.com
Author: Daniel Guija Alcaraz
Peer-to-peer networking
Managing the performance of multiple radio Multihop ESS Mesh Networks.
CAPWAP BOF IETF-57, Vienna Inderpreet Singh
Introduction to Internet Routing
Introduction to Dynamic Routing Protocol
Scalable, Autonomous Network Services Configuration
ESS Mesh Deployment Usage Model
Introduction to Dynamic Routing Protocol
Network Survivability
Survivable Real-Time Network Services
A Cognitive Approach for Cross-Layer Performance Management
Quad Charts David L. Mills University of Delaware
Topological Ordering Algorithm: Example
Security for Distributed Computer Systems
Languages and Software Engineering
ESS Mesh Deployment Usage Model
Scalable, High Speed Time Synchronization (D012)
An Original Model of Infrastructure System Resilience
Survivable Real-Time Network Services
Topological Ordering Algorithm: Example
Topological Ordering Algorithm: Example
Local configuration global effect
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
Suggested Major Functional Components for s
© 2006 ITT Educational Services Inc.
Topological Ordering Algorithm: Example
ECE 671 – Lecture 8 Network Adapters.
Presentation transcript:

Survivable Real-Time Network Services (G409/J175) New ideas Dynamic peer discovery using intelligent multicast algorithms Self-organizing, multiple server topology for redundancy and diversity Automatic repair and restoral using adaptive, constrained-metric heuristics Automatic stratum assignment Redundant Primary Servers S1 S1 S1 S1 S2 S2 S2 S2 S2 S2 Diversity, repairable links S3 S3 S3 Autonomous topology organization S4 Constrained-metric heuristic Automatic stratum assignment with dynamic security associations Impact Minimize dependence on engineered network configuration data Avoid intricate case-by-case analysis of failure/fallback/recovery scenarios Provide automatic reconfiguration in case of network reconfiguration or failure Schedule (third year) Implement and test asynchronous certificate retrieval for dynamic re-keying Implement expanding-ring, hop-limited, manycast algorithms Enhance and add new protocols to the network simulator for very large networks University of Delaware: David L. Mills 3-Dec-18