Active Jitter Control Stephen F. Bush General Electric Corporate R & D DARPA ITO F30602-98-C-0230 supported by the Air.

Slides:



Advertisements
Similar presentations
P.G. Madhavan, Ph.D. CEO & Corp CTO Zaplah Corporation Redmond & Singapore.
Advertisements

IT Asset Management Status Update 02/15/ Agenda What is Asset Management and What It Is Not Scope of Asset Management Status of Key Efforts Associated.
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Source: IEEE Pervasive Computing, Vol. 8, Issue.4, Oct.2009, pp. 14 – 23 Author: Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N. Adviser: Chia-Nian.
Dynamic Topology Optimization for Supercomputer Interconnection Networks Layer-1 (L1) switch –Dumb switch, Electronic “patch panel” –Establishes hard links.
VSE Corporation Proprietary Information
1 Scalability is King. 2 Internet: Scalability Rules Scalability is : a critical factor in every decision Ease of deployment and interconnection The intelligence.
Copyright © sFlow.org All Rights Reserved sFlow & Benefits Complete Network Visibility and Control You cannot control what you cannot see.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Chapter 19: Network Management Business Data Communications, 4e.
Mobile Online Intelligent Decision Support System Rick Smith, Dr. Stacey Lyle and Dr. Patrick Michaud-Division of Nearshore Research Conrad Blucher Institute.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Introduction. Contents  Network Management Overview Sample Scenario where NM is Applied 5 Management Functions Importance to Business Processes  Network.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Efficient Transmission of Rendering-Related Data Using the NIProxy Maarten Wijnants Tom Jehaes Peter Quax Wim Lamotte Hasselt University - Expertise Centre.
Run-Time Support for Adaptive Communication Services By: SeyedMasoud Sadjadi Advisor: Dr. Philip K. McKinley Computer Science and Engineering Michigan.
VoIP Packets In the Air and Over the Wire J. Scott Haugdahl CTO
High Performance, Easy to Deploy Wireless. Agenda Foundry Key Differentiators Business Value Product Overview Questions.
SensIT PI Meeting, January 15-17, Self-Organizing Sensor Networks: Efficient Distributed Mechanisms Alvin S. Lim Computer Science and Software Engineering.
End-to-end QoE Optimization Through Overlay Network Deployment Bart De Vleeschauwer, Filip De Turck, Bart Dhoedt and Piet Demeester Ghent University -
IT Terminology Quiz VSB 1002: Business Dynamics II Spring 2009.
Data/Analysis Challenges in the Electronic Business Environment Dr. Howard Frank Dean Robert H. Smith School of Business University of Maryland College.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Is the Internet ready for multimedia? (in production networks) Ed Perry, HP Labs MMNS 2002.
Putting Intelligence in Internetworking: an Architecture of Two Level Overlay EE228 Project Anshi Liang Ye Zhou.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Issues in Distributed Multimedia Systems Joseph C. (JC) Montminy, III and James MacGlashan CMSC 621, Advanced Operating Systems Dr. Deepinder Sidhu October.
Subtask 1.8 WWW Networked Knowledge Bases August 19, 2003 AcademicsAir force Arvind BansalScott Pollock Cheng Chang Lu (away)Hyatt Rick ParentMark (SAIC)
B3AS Joseph Lewthwaite 1 Dec, 2005 ARL Knowledge Fusion COE Program.
What is a Sensor Web ? Abhinav Roongta Wireless Information Networking Group University of Florida March 3, 2004.
October 7, 1999Reactive Sensor Network1 Workshop - RSN Update Richard R. Brooks Head Distributed Intelligent Systems Dept. Applied Research Laboratory.
Chris Pannozzo September 20,2007 CSC 101 Asssignment 2 Web Resources.
Codes, Peers and Mates Media processing meets future networks EU Workshop on thematic priorities in Networked Media Brussels January 19 th 2010 Ebroul.
P.C. Rossin College of Engineering and Applied Science RESEARCH C O M P U T E R S C I E N C E & E N G I N E E R I N G C O M P U T E R S C I E N C E & E.
App. TypeApp. Name Distributed or Parallel A parallel version of the Gaussian elimination application SAGE (SAIC's Adaptive Grid Eulerian hydrocode) Adaptive.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
Introduction to Active Network Technology Bernhard Plattner Computer Engineering and Networks Laboratory ETH Zurich, Switzerland.
PROTEUS: Network Performance Forecast for Real- Time, Interactive Mobile Applications Qiang Xu* Sanjeev Mehrotra# Z. Morley Mao* Jin Li# *University of.
Real-time Content Filtering for Mobile Devices Philip West Greg Foster and Peter Clayton Department of Computer Science Rhodes University.
Co-Simulation of Computer Networks and Power Grid Prof. Vincenzo Liberatore Research supported in part by NSF CCR , Department of Commerce TOP.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
CHANNEL ALLOCATION FOR SMOOTH VIDEO DELIVERY OVER COGNITIVE RADIO NETWORKS Globecom 2010, FL, USA 1 Sanying Li, Tom H. Luan, Xuemin (Sherman) Shen Department.
ARP ‘n RARP. The Address Resolution Protocol (ARP) is a request sent out by a computer to find another computer’s MAC address. It already knows the IP.
9/29/04 GGF Random Thoughts on Application Performance and Network Characteristics Distributed Systems Department Lawrence Berkeley National Laboratory.
Configuration Management By Abokor and Alireza. The Overview of Configuration Management  Network Configuration is a process of organising and maintaining.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Copyright 2002 Stephen F. Bush1 Three Points to Remember Active Networks Are Cool Active Networks Are Cool Active Networks Can Be At Least As Secure As.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Learn how the cloud is accelerating network transformation
Md Baitul Al Sadi, Isaac J. Cushman, Lei Chen, Rami J. Haddad
Virtual Private Networks
A brief introduction to IoT gateway
Discovering Computers 2010: Living in a Digital World Chapter 14
Different Traffic Management Techniques for Mobile Broadband Networks
SENSOR FUSION LAB RESEARCH ACTIVITIES PART I : DATA FUSION AND DISTRIBUTED SIGNAL PROCESSING IN SENSOR NETWORKS Sensor Fusion Lab, Department of Electrical.
Impact of IT Consumerisation on Enterprise Security
A Network Virtual Machine for Real-Time Coordination Services
Achieving, Monitoring and Maintaining A High Quality of Experience
Data Communication Networks
Design Of Low-Power Wireless Communication System Based On MSP430
Pervasive Computing Happening?
Satellite Based IP Broadband – Business Opportunities
In Distributed Systems
EE 122: Lecture 22 (Overlay Networks)
QoS based pricing in IP Networks
Presentation transcript:

Active Jitter Control Stephen F. Bush General Electric Corporate R & D DARPA ITO F C-0230 supported by the Air Force Research Laboratory/IF

DataHeader Traditional Packet Network HeaderCodeData Active Network Network-Aware Devices Custom code injected by applications/devices makes network intelligent Reduces protocol deployment time from years to months Adaptive monitoring, and predictive control Active Networking

Active Network Devices NodeOS/EE Network executes data packets. Network becomes computationally active.

Impacts Secure Virtual Private Networks Custom services for wireless users Fusion of media inside network Active Network E-Commerce Active negotiation Dynamic Coalitions Asset Management Remote Upgrades Self-management Remote fault diagnosis and repair Innovative Security Models

Without Network Jitter Control receiving node packets destination BUFFER Packets bunch together and must be evened out at receiving node. For packets i and j: D(i,j) = (R j -S j ) - (R i - S i ) S R i: j:

With Active Jitter Control NODE Buffer destination Packets delay themselves within the network to reduce jitter.

Per Packet/Node Delay Delay history is maintained in smallstate to determine distribution. Packet delays itself to exactly Q d time units.

Per Packet Decisions n Packets know their content. n Packets know their network environment. n Packets make the optimal decision concerning how long to delay to minimize variance.

Finer Resolution In-Stream Control NODE Buffer destination Portions of image or other jitter sensitive data can receive different levels of jitter control within the same network stream.

Conclusion n Active networks allow generic packet level processing within the network. n Active networks can be used to benefit real-time applications.