Scalable, High Speed Time Synchronization (D012)

Slides:



Advertisements
Similar presentations
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Advertisements

Distributed Systems Topics What is a Distributed System?
Network Time Protocol (NTP) August 9 th 2011, OSG Site Admin Workshop Jason Zurawski – Internet2 Research Liaison.
URSA: Providing Ubiquitous and Robust Security Support for MANET
Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Adaptive Web Caching: Towards a New Caching Architecture Authors and Institutions: Scott Michel, Khoi Nguyen, Adam Rosenstein and Lixia Zhang UCLA Computer.
1IMIC, 8/30/99 Constraint-Based Unicast and Multicast: Practical Issues Bala Rajagopalan NEC C&C Research Labs Princeton, NJ
Application Layer Multicast
OSD Metadata Management
Draft-li-rtgwg-cc-igp-arch-00IETF 88 RTGWG1 An Architecture of Central Controlled Interior Gateway Protocol (IGP) draft-li-rtgwg-cc-igp-arch-00 Zhenbin.
Multicast DNS Draft-aboba-dnsext-mdns-00.txt. Outline Goals and objectives Scope of the multicast DNS DNS server discovery Non-zeroconf behavior Zeroconf.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Resilient P2P Anonymous Routing by Using Redundancy Yingwu Zhu.
World Wide Web Caching: Trends and Technologys Gerg Barish & Katia Obraczka USC Information Sciences Institute, USA,2000.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Resilient Peer-to-Peer Streaming Presented by: Yun Teng.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Using DHCPv6 for DNS Configuration in Hosts draft-ietf-droms-dnsconfig-dhcpv6-00.txt Ralph Droms.
Peer-to-Peer Distributed Shared Memory? Gabriel Antoniu, Luc Bougé, Mathieu Jan IRISA / INRIA & ENS Cachan/Bretagne France Dagstuhl seminar, October 2003.
Web Cache Redirection using a Layer-4 switch: Architecture, issues, tradeoffs, and trends Shirish Sathaye Vice-President of Engineering.
Time-based Updates in Software Defined Networks Tal Mizrahi, Yoram Moses Technion – Israel Institute of Technology SDNRG, IETF Meeting, Berlin, July 2013.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Peer-to-Peer Result Dissemination in High-Volume Data Filtering Shariq Rizvi and Paul Burstein CS 294-4: Peer-to-Peer Systems.
MX Groups. Page 2 Multiple Sites – What Most are Offering Centralized Intelligence Survivable Gateways at remote sites DISASTER AT MAIN SITE ONLY BASIC.
SHADOWSTREAM: PERFORMANCE EVALUATION AS A CAPABILITY IN PRODUCTION INTERNET LIVE STREAM NETWORK ACM SIGCOMM CING-YU CHU.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Computer Network Design EEL 6785 Dr. Janusz Zalewski University of Central Florida.
1 Grid-Based Access Scheduling for Mobile Data Intensive Sensor Networks C.-K. Lin, V. Zadorozhny and P. Krishnamurthy IEEE International Conference on.
MicroGrid Update & A Synthetic Grid Resource Generator Xin Liu, Yang-suk Kee, Andrew Chien Department of Computer Science and Engineering Center for Networked.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Delay Tolerant Network (DTN) Security Key Management Design Alternatives IETF94 DTN Working Group November 3, 2015 Fred L. Templin
Emerging Solutions in Network Time Synchronization Security
Nuno Salta Supervisor: Manuel Ricardo Supervisor: Ricardo Morla
Automatic Subnet Numbering
Module 8: Concepts of a Network Load Balancing Cluster
ECSE-6600: Internet Protocols
Cassandra on epam cloud
Network Time Protocol (NTP) General Overview
Network Time Protocol (NTP) General Overview
Net 435: Wireless sensor network (WSN)
Precision Time Protocol
CAIRN/DARTnet Collaboration
Scalable, Autonomous Network Services Configuration
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
IP Deployment over IEEE Networks
Wrangling a Large Herd of Internet Clocks
Presentation by Wyatt Zacharias
NTP Security Protocol David L. Mills University of Delaware
Ubiquitous Authentication Using Random Keys
Survivable Real-Time Network Services
Distribution Circuit Automation Scheme Design
NTP Cryptographic Authentication (Autokey)
Quad Charts David L. Mills University of Delaware
Survivable Real-Time Network Services (G409/J175)
Issues in Ad Hoc Wireless Networks
Lesson 8: Configuring IP Settings MOAC : Configuring Windows Devices.
Grid Coordination by Using the Grid Coordination Protocol
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Survivable Real-Time Network Services
Autokey Version 2 Protocol Model and Implementation
Subject Name: Adhoc Networks Subject Code: 10CS841
NTP Security Protocol David L. Mills University of Delaware
NTP Research Opportunities
Protocols.
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
An Architecture for Secure Wide-Area Service Discovery
Techniques for Building Long-Lived Wireless Sensor Networks
Protocols.
Presentation transcript:

Scalable, High Speed Time Synchronization (D012) New ideas Dynamic peer discovery using engineered multicast schemes Automatic, authenticated peer selection for ubiquitous distributed protocols Multiple overlapping hierarchical subtree organization for redundancy and diversity Maximize service performance relative to crafted metric and constraints S1 S2 S1 S1 S2 S1 S2 * * S2 S2 S2 Clients Clients S1 S2 S1 S2 S1 S2 * * * S2 S2 S2 Clients * to buddy (S2) Impact Minimize dependence on prior configuration data Avoid intricate case-by-case analysis of failure/fallback/recovery scenarios Provide automatic reconfiguration in case of network reconfiguration or failure Schedule (third year) Test and refine NTP autokey authentication scheme Test and refine NTP autoconfigure scheme Complete NTPv4 beta test and deploy University of Delaware: David L. Mills 17-Jan-19