New Models and Algorithms for Active Networks. 2 The Active Bell-Labs Engine An adjunct active engine to any COTS router Only some packets are diverted.

Slides:



Advertisements
Similar presentations
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Advertisements

Computer Networking A Top-Down Approach Chapter 4.7.
Introduction 1 Lecture 22 Network Layer (Broadcast and Multicast) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
1 Complexity of Network Synchronization Raeda Naamnieh.
Computer Science 6390 – Advanced Computer Networks Dr. Jorge A. Cobb How to provide Inter-domain multicast routing? PIM-SM MSDP MBGP.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
1 Internet Networking Spring 2006 Tutorial 7 DVMRP.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
CSE 461: Distance Vector Routing. Next Topic  Focus  How do we calculate routes for packets?  Routing is a network layer function  Routing Algorithms.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
New Models and Algorithms for Active Networks Danny Raz and Yuval Shavitt Bell Labs, Lucent Technology ~shavitt/actnet.html.
© J. Liebeherr, All rights reserved 1 IP Multicasting.
NETWORK LAYER (2) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
The Zone Routing Protocol (ZRP)
Computer Networks 2 Lecture 1 Multicast.
Routing Algorithms (Ch5 of Computer Network by A. Tanenbaum)
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Distributed Asynchronous Bellman-Ford Algorithm
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Network Layer4-1 R1 R2 R3R4 source duplication R1 R2 R3R4 in-network duplication duplicate creation/transmission duplicate Broadcast Routing r Deliver.
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
By Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker Presented by Fei Jia Revisiting IP Multicast.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
CS 5565 Network Architecture and Protocols Godmar Back Lecture 22.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Speccast 1 Leon Poutievski Dr. Ken Calvert Dr. Jim Griffioen {leon, calvert, University of Kentucky Laboratory for Advanced Networking.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Computer Science and Engineering Parallel and Distributed Processing CSE 8380 February 10, 2005 Session 9.
Communication and Computation on Arrays with Reconfigurable Optical Buses Yi Pan, Ph.D. IEEE Computer Society Distinguished Visitors Program Speaker Department.
Routing and Routing Protocols
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #7 DVMRP.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Internet Routing r Routing algorithms m Link state m Distance Vector m Hierarchical routing r Routing protocols m RIP m OSPF m BGP.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
Ad Hoc Multicast Routing
4: Network Layer4-1 Chapter 4: Network Layer Last time: r Internet routing protocols m RIP m OSPF m IGRP m BGP r Router architectures r IPv6 Today: r IPv6.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
EE 122: Integrated Services Ion Stoica November 13, 2002.
ECE 544 Protocol Design Project 2016 Chengyao Wen Hua Deng Xiaoyu Duan.
6/12/2016© 2010 Raymond P. Jefferis IIILect The Network Layer.
PATH DIVERSITY WITH FORWARD ERROR CORRECTION SYSTEM FOR PACKET SWITCHED NETWORKS Thinh Nguyen and Avideh Zakhor IEEE INFOCOM 2003.
WAN Technologies. 2 Large Spans and Wide Area Networks MAN networks: Have not been commercially successful.
ECE 544 Protocol Design Project 2016 Michael Sherman Murtadha Aldeer Leonard T. Park.
IP tutorial - #2 Routing KAIST Dept. of CS NC Lab.
ECE 544 Protocol Design Project 2016 Kiran Jatty Lasya Nandamuri Varun Vinnakota.
MAC Addresses and ARP 32-bit IP address:
Network Layer Introduction Datagram networks IP: Internet Protocol
Intra-Domain Routing Jacob Strauss September 14, 2006.
ECE 544 Protocol Design Project 2016
ECE 544 Protocol Design Project 2016
Road Map I. Introduction II. IP Protocols III. Transport Layer
CS 640: Introduction to Computer Networks
ECE453 – Introduction to Computer Networks
Computer Networking Lecture 10: Intra-Domain Routing
ECE 544 Project3 Team member.
EE 122: Lecture 13 (IP Multicast Routing)
Optional Read Slides: Network Multicast
EE 122: Intra-domain routing: Link State
Presentation transcript:

New Models and Algorithms for Active Networks

2 The Active Bell-Labs Engine An adjunct active engine to any COTS router Only some packets are diverted to the AE Packet Delay depends on whether it passes thru the AE. Processing time in the AE may depend on –data in the packet. –soft state in the AE. MIB router filter Active Engine (AE) manager session 1session 2

3 Addressing Modes Explicit - sent directly to a known AE. –efficient Oblivious - sent along a path, and intercepted by the first AE en-route. –topology learning –robust

4 What is the right model to analyze algorithmic solutions? How to compare the strength of AN architectures? Are active networks efficient?

5 Standard Asynchronous Model Communication is between neighbors A message arrivals triggers computation at a node A single bound on the delay of a communication + computation cycle –What does O(n log n) mean?

6 The RS Model Two bounds on the delay: –C thru the FF. –P(k) thru the EE. Forwarding is done according to the destination addr. No assumptions on the routing. We use P(k) = P ·k FF Execution Environment (EE) FilterFilter oracle forwarding

7 DARPA Model vs. The RS Model NodeOS EE 1 classclass FF Execution Environment (EE) FilterFilter oracle forwarding EE 2 EE 3 IP

8 Performance Measures Communication (Message) complexity - hops traveled by messages Time complexity - time to mission completion. processing complexity - CPU time used.

9 An Application Example: Route Exploration In the model - a node is only aware of its local neighbors. A node wishes to learn the route to some destination. Abstraction of the traceroute program. 45

10 A naïve Solution The source query nodes sequentially. O(n 2 ) messages. O(n 2 C+nP) time.

11 A naïve Solution The source query nodes sequentially. O(n 2 ) messages. O(n 2 C+nP) time.

12 report-en-route A query process advances sequentially. Reports are sent to the source for each query. O(n 2 ) messages. O(nC+nP) time. send Report(id, c+1) to s if i  d send MSG * (s,d, c+1) to d

13 collect-en-route A query process advances sequentially. Information is collected in the forward direction, and sent by the destination to the source. O(n) messages. O(nC+n 2 P) time.

14 collect-en-route if i==d send Report(list|i) to s else send MSG * (s,d, list|i) to d

15 Route Exploration Can we do better?

16 Report-every- l Obtain the route length. Initiate collect-en-route in n/l segments of length l.

17 Report-every- l Complexities: –message O(n 2 /l) –time O(nC+ ( n+l 2 ) P) alg. at the ith segment starts after (i-1)(C+P)l segment time cmplx: For l=n 2/3 : –message O(n 4/3 ); time O(nC+ n 4/3 P)

18 Collect-rec Optimal up to a log factor ! Obtain the route length. Partition the route to two segments. Send results from the second segment using the FF. Perform recursively. Complexities: –message O(n log n); time O(nC+nP)

19 Collect-rec (2) Time: O(nP+nC) Message: O(nlogn)

20 Collect-rec (2) Time: O(nP+nC) Message: O(nlogn)

21 Collect-rec complexity We can count messages/time per iteration. Alternative approach: –TC(n)  TC(n/2) + 4n(P+C) –MC(n)  2MC(n/2) + 4n

22 Route Exploration (5)

23 A message for a large number of receivers. No notion of group. Ad-hoc. Processing time is linear in the recipient size. Example: a full binary tree Message Dissemination

24 Naïve solution send a message to each recipient Complexity for a full binary tree –time: nP+log n C –message: n log n

25 send a message to each recipient Complexity for a full binary tree –time: nP+log n C –message: n log n Naïve solution Active 2nP+log n C 2n2n Distribute along the tree

26 Mail Distribution (2) receivers sender 5,6,7,8,m 7,8,m 8,m 7,m 5,6,m 1,2,3,4,m

27 Multicast We assume a multicast group exist Aim: build the best tree In general: NP -hard We will look at the line case

28 Previous Solutions Unicast: –time complexity: O(nP+C) –message complexity: O(n 2 ) message dissemination: –time complexity: O(n(P+C)) –message complexity: O(n)

29 Better solution Embed a tree in the line What should be its arrity?

30 Complexity of a tree scheme

31 Optimum x / log x achieves optimum at 3 when restricted to integers C=1, P=20 n=32

32 Other Basic Problems Bottleneck detection - computation along a route. Message dissemination to an ad-hoc group. Topology discovery. Computation of a global function.

33 Summary A new model to analyze active network applications. Can be used for Other domains –Peer2Peer –application layer multicast Can be used to compare strength of architectures by comparing lower bounds.