Postcards from the Edge – Offense Presented by: Sam McIngvale Rob Kotz.

Slides:



Advertisements
Similar presentations
The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Switching Technology presented by Hussain Ahmad BA-Abdullah. Fawaz abdullah AL-Amri. prof : Adel Ali.
Computer Networking A Top-Down Approach Chapter 4.7.
L. Alchaal & al. Page Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment Lina ALCHAAL Netcelo S.A., Echirolles INRIA.
IP datagrams Service paradigm, IP datagrams, routing, encapsulation, fragmentation and reassembly.
6.033: Intro to Computer Networks Layering & Routing Dina Katabi & Sam Madden Some slides are contributed by N. McKewon, J. Rexford, I. Stoica.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
CCNA – Network Fundamentals
Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California,
Group #1: Protocols for Wireless Mobile Environments.
T.Sharon-A.Frank 1 Multimedia Quality of Service (QoS)
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
End-to-End Arguments in System Design J.H. Saltzer, D.P. Reed and D.D Clark M.I.T. Laboratory for Computer Science Presented by Jimmy Pierce.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
Jang, Donghyun 2011/4/4 1/21.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
Wireless Audio Conferencing System (WACS) Mehmet Ali Abbasoğlu Furkan Çimen Aylin Deveci Kübra Gümüş.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 13 Introduction to Networks and the Internet.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
7DS Seven Degrees of Separation Suman Srinivasan IRT Lab Columbia University.
World Wide Web Caching: Trends and Technology Greg Barish and Katia Obraczka USC Information Science Institute IEEE Communications Magazine, May 2000 Presented.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Inter-domain AMT Multicast Use Case Discussion Proposal for AMT Multicast Source-AMT Connectivity Model For Inter-connected Networks (AS’s) 1.
Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
Chapter 9.
© 2006 Cisco Systems, Inc. All rights reserved. 3.3: Selecting an Appropriate QoS Policy Model.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Paper Presentation – CAP Page 2 Outline Review - DNS Proposed Solution Simulation Results / Evaluation Discussion.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
Data Comm. & Networks Instructor: Ibrahim Tariq Lecture 3.
TCP/IP Transport and Application (Topic 6)
Final Review!. So how’s it all work? I boot my machine I open my browser and type The page loads What all just happened?
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Bob Knowledge Plane -- Scaling of the WHY App Bob Braden, ISI 24 Sept 03.
A Fuzzy Content Centric Network Architecture for Real-time Communications in MANETs Niaz Morshed Chowdhury Dr. Lewis M. Mackenzie School of Computing Science.
Outline Introduction Existing solutions for ad hoc
DCCP: Issues From the Mailing List Sally Floyd, Eddie Kohler, Mark Handley, et al. DCCP WG March 4, 2004.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
Connectionless
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Improving TCP Performance over Wireless Networks
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
Ασύρματες και Κινητές Επικοινωνίες
QoS in Mobile IP by Preethi Tiwari Chaitanya Deshpande.
CJK 7 th Plenary: NGN-WG (IPv6 based NGN) IPv6 based NGN (NGNv6)
1 Project Status Update “Postcards from the Edge”: The Cache-and-Forward Architecture FIND Wireless BBN Sept 27, 2007 Dipankar Raychaudhuri,
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
WHAT'S THE DIFFERENCE BETWEEN A WEB APPLICATION STREAMING NETWORK AND A CDN? INSTART LOGIC.
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
For more course tutorials visit NTC 406 Entire Course NTC 406 Week 1 Individual Assignment Network Requirements Analysis Paper NTC 406.
COM594: Mobile Technologies Location-Identifier Separation.
System Architecture for C2C Communications Based on Mobile WiMAX Michiyo ASHIDA VTT Technical Research Centre of Finland
Scaling the Network: The Internet Protocol
Internet Networking recitation #12
Data and Computer Communications by William Stallings Eighth Edition
TRANSMISSION CONTROL PROTOCOL
Scaling the Network: The Internet Protocol
Presentation transcript:

Postcards from the Edge – Offense Presented by: Sam McIngvale Rob Kotz

General Premise  Why Cache-N-Forward?  The authors argue that advances in wireless technology will render the current Internet architecture useless.  How?  What makes new mobile devices ‘unstable’?  TCP has been effective thus far…why change?

General Premise v2.0  What are the benefits of Cache-N- Forward?  How will changing the current architecture fix the ‘unstability’?  Will there be an increase in speed?  Will there be an increase in throughput?  What will be different?  Why should I want to change?

General Premise v3.0  Paper argues the need to ‘push complexity into the network and make the end-to-end transport protocol simpler.’  This conjecture contradicts the fundamental principle the original Internet was built-on.  Keeping the network simple has gotten us this far…why change?  The authors offer no reasoning to support where this conjecture comes from.

General Premise v4.0  Is Cache-N-Forward a new architecture?  All that is happening is the file is getting moved somewhere closer to the requesting end-user.  Then the end-user receives the file via a ‘TCP-like’ protocol.  Should we implement a new architecture that only improves large file-transfer?  Real-time applications are increasing and user- experience (QoS) is a major concern.

Overhead  How much overhead will Cache-n- Forwarding introduce into the Internet?  We don’t know because the authors don’t tell us.  Reading/Writing files to disk at each hop will dramatically slow-down the rate of transmission.  Disk I/O is already the limiting factor for many operations.

Overhead v2.0  For a single mobile-device (end-user) to request a file, the following steps must take place:  The receiver contacts a file name resolution service to resolve the location of the requested file.  The receiver looks-up the host in DNS.  The receiver sends a query to the sender.  The sender contacts a name resolution service that resolves the name of the mobile host to a set of PO nodes.  The sender forwards the file to one or more PO’s.  PO’s hold the file until contacted by end-user to arrange delivery.  Finally, there is delivery of the file via direct-transmission (TCP?).  I would much rather just take my file directly.

Overhead v3.0  This architecture is not appropriate for real-time applications.  Definitely does not solve any issues with QoS – a major concern for future architectures.  All we get is a guarantee of delivery (already present with TCP) but we sacrifice extreme transfer times.

Current State of Proposal  The authors recognize several key questions that still remain with their architecture.  How should routing be integrated with caching?  How do we implement congestion control?  What are the storage needs of a CNF node?  What are the necessary post office descriptors?  How do we specify routing tables?  How should cache-based multicast be implemented?  Why I am I writing this paper?  What is the Internet?

Current State of Proposal v2.0  This is an Internet Architecture proposal.  You CANNOT leave important issues such as routing tables and congestion control up in the air.  We would like to argue specific (low- level) design and implementation issues, but the design is so high-level there is nothing to argue about.

Current State of Proposal v3.0  The Wireless Revolution the authors are hoping to address is happening right now.  By the time their architecture is anywhere near a state that can be deployed, this issue will have been solved or addressed (if it needs to be).

Evaluation?  Instead of offering concrete results to support their conjectures we are presented with the difficulties of testing such an architecture  There are no concrete results to support the validation of this new architecture  It’s ok though…we have an Impact Statement and Intellectual Merit…

Deployment?  The authors offer no plan for deployment.  They are proposing a major ($$$$) overhaul of the Internet – for this to ever happen there must be:  1) Concrete results to justify the change.  2) Some plan to completely change the current infrastructure.  Neither of these issues are addresses.

Conclusion  Does not feel like a science paper.  The authors make wild claims with absolutely no backing evidence.  There is no evaluation of their proposed architecture.  Seems this paper is more of a preliminary outline of a project yet to be completed.