IRT Research Overview Fall 2009. Overview PI + 12 PhD students + ~4 visitors + 1 staff researcher Network infrastructure ◦ PBS: Permission-Based Sending.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

SIP, Presence and Instant Messaging
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
NetServ Dynamic in-network service deployment Henning Schulzrinne (Columbia University) Srinivasan Seetharaman (Georgia Tech) Volker Hilt (Bell Labs)
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
March 2009IETF 74 - NSIS1 Implementation of Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-02 Se Gi Hong*,
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Multicasting in Mobile Ad-Hoc Networks (MANET)
Firewalls and Intrusion Detection Systems
Application layer (continued) Week 4 – Lecture 2.
15-441: Computer Networking Lecture 26: Networking Future.
School of Information Technologies Revision NETS3303/3603 Week 13.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
July 2008IETF 72 - NSIS1 Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-01 Se Gi Hong & Henning Schulzrinne.
Current IRT Projects Fall Big picture Systems network research –systems with real applications –components, algorithm, architectures Goal: Make.
KYUNG HWA KIM HENNING SCHULZRINNE Internet Real-Time Lab Columbia University June 2011 Distributed Network Fault Diagnosis System DYSWIS (Do You See What.
Internet Real Time Laboratory Department of Computer Science Columbia University.
7DS: Node Cooperation in Mostly Disconnected Networks Henning Schulzrinne (joint work with Arezu Moghadan, Maria Papadopouli, Suman Srinivasan and Andy.
Internet Real Time (IRT) Lab at Columbia University Professor: Henning Schulzrinne Columbia University Presenter: Suman Srinivasan, PhD student
7DS Seven Degrees of Separation Suman Srinivasan IRT Lab Columbia University.
1 Permission-Based Sending (PBS) Signaling Architecture for network traffic authorization Se Gi Hong*, Henning Schulzrinne*, Swen Weiland** *Columbia University,
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
Service Oriented VoIP (SOVoIP): True Convergence of Data and Voice Networks Presented By Mohammed Jubaer Arif Supervisors Dr Shanika Karunasekera and Dr.
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Omer Boyaci, Andrea Forte and Henning Schulzrinne December 16,
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
The Network of Information: Architecture and Applications SAIL – Scalable and Adaptable Internet Solutions Bengt Ahlgren et. al Presented by wshin.
Sockets process sends/receives messages to/from its socket
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Project Objectives A multi-function programmable SIP user agent for multimedia communications, such as audio, video, white board, desktop sharing, shared.
7DS - Node Cooperation and Information Exchange in Mostly Disconnected Networks Suman Srinivasan, Arezu Moghadam, Se Gi Hong, Henning Schulzrinne IRT Lab,
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
October 10, 2006Gregory DENIS the Future of e-Collaboration intelligent, autonomous and massively distributed Welcome.
3G wireless system  Speeds from 125kbps-2Mbps  Performance in computer networking (WCDMA, WLAN Bluetooth) & mobile devices area (cell.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Role Of Network IDS in Network Perimeter Defense.
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
AMSA TO 4 Advanced Technology for Sensor Clouds 09 May 2012 Anabas Inc. Indiana University.
SIPc, a Multi-function SIP User Agent Xiaotao Wu and Henning Schulzrinne.
INTERNET PROTOCOL TELEVISION (IP-TV)
Introduction Wireless devices offering IP connectivity
Klara Nahrstedt Spring 2009
CHAPTER 3 Architectures for Distributed Systems
INTERNET PROTOCOL TELEVISION (IP-TV)
Applications written using BonAHA
New Tools In Education Minjun Wang
Presentation transcript:

IRT Research Overview Fall 2009

Overview PI + 12 PhD students + ~4 visitors + 1 staff researcher Network infrastructure ◦ PBS: Permission-Based Sending ◦ NetServ for programmable networks Mobile networks ◦ 7DS ◦ PetriNet for modeling mobility protocols ◦ Location-based services ◦ Modeling human mobility Network management & measurement ◦ DYSWIS: distributed fault diagnosis & correction ◦ Vdelay: Video delay measurement tool Applications & middleware ◦ RELOAD: P2P infrastructure ◦ SIP overload control ◦ SPIT prevention ◦ NG911

Selected other recent projects Mobile networks ◦ fast hand-off ◦ MAC layers for VoIP ◦ measurement-based admission control ◦ cooperative wireless nodes ◦ LoST: location + service  URL + area Transport layer ◦ TCP for multimedia applications Applications & middleware ◦ DNS performance ◦ DotSlash: self-scaling LAMP infrastructure

Network infrastructure

Permission-based sending (PBS) Objective ◦ Preventing DoS attacks and other forms of unauthorized traffic. Network traffic authorization ◦ Permission is granted by the intended receiver. ◦ Permission represents the authority to send data. Deny-by-default ◦ Unauthorized traffic without permission is dropped at the first router by default. Hybrid approach ◦ Proactive approach  Explicit permission by on-path signaling  NSIS protocol suites (GIST and PBS NSLP) ◦ Reactive approach  Monitoring traffics using periodic signaling  PBS detection algorithm (PDA) Secure mechanism ◦ Secure permission state setup using public key cryptography ◦ Protect the authentication of data packets using IPsec SeGi Hong

Permission-based sending (PBS) Q (FID,PKey,Auth) SenderR1 R2 Receiver Data flow (size = 1MB) / IPsec Attack flow (w/o IPsec) IPsec verification failed P (10MB, FID, Pkey, Skey, Auth) IPsec verification success Q ( FID,Pkey,Auth) P (10MB, FID,Pkey, Skey, Auth) Auth verification success Install permission state FID: 5-tuple based flow identification TTL: permission state time limit for the flow T: Soft-state period V: total volume of data that the sender has sent P (10MB, FID, Pkey, Skey, Auth) Q (FID,PKey,Auth, V=1MB) T Pkey: public key Auth: authentication field for the signaling message Skey: shared key for IPsec Data flow (size = 1MB) / IPsec RV = Total 1MB Q (FID,PKey,Auth, V=1MB) Monitoring traffic (RV=V=1 MB)

NetServ: programming network elements Problem: ◦ Ossification in the Internet Approach: ◦ Extensible architecture for core network services  Modularity: Building Blocks, Service Modules  Virtual services framework: security, portability Current results: ◦ Prototype using Click router & Java OSGi framework ◦ Measurements indicating overhead from Java is acceptable Future Work: ◦ Content Distribution Network (CDN) application ◦ Security and resource control (AAA) ◦ Implementation on a real router Jae Woo Lee & Suman Srinivasan

NetServ - prototype Prototype Java OSGi on top of Click Click: Modular router platform OSGi: dynamic loading and unloading of modules Measurement 1) Bare Linux vs. Plain Click ◦ Penalty for kernel-user transition 2) Plain Click vs. NetServ ◦ Java overhead 2) is small compared to 1)

AAA on virtualized environment Problem ◦ Traditional  user access to one service  theory model consider access to centralized resource only ◦ Now and future  Application integration: mashup  Cloud computing  NetServ: may need many building blocks to build a service Approach and result ◦ Establish theory model ◦ Special problems to be solved  performance  authoritative model ◦ Secure AAA protocol userresource Traditional user resource Now and future

Mobile networks & applications

Mobility systems modeling using Timed Petri net Problem Mechanisms and design principles for optimized handover are poorly understood Lack of formal methodology to systematically discover or evaluate mobility optimizations Approach Identification of the fundamental properties that are rebound during a handover operation Systematic analysis of the primitive operations during handover Modeling of the handover processes that allows performance predictions to be made for both an un-optimized handover and for specific optimization techniques under systems resource constraints Results Timed Petri net-based mobility models for handoff processes using MATLAB and Time Net tools Ability to predict systems behavior such as deadlocks Verification of optimization techniques Prediction of handover performance under specific resource constraints (e.g., battery, CPU and network bandwidth) Ashutosh Dutta

Petri net modeling results Figure 1: Timed Petri net modeling for handoff Figure 3: Concurrent handoff operations Figure 2: Sequential handoff operations Figure 4: Coverability tree a) sequential, b) concurrent (a) (b)

7DS – Disruption-tolerant networks In the absence of the Internet: nodes can exchange information amongst themselves Concept 7DS application suite Internet Local P2P wireless networks to exchange information Get information they do not have from another peer Uses Getting web pages from peers Sending s Query self for results Searches the cache index using: Swish-e library Presents results in three formats: HTML, XML and plain text Similar concept to Google Desktop Exchange information among peers Requesting peer broadcasts query to network Responding peers reply if they have information Send encoded string with list of matching items Requesting peer retrieves suitable information Search engine Query multicast engine Interesting problem: Service discovery protocols don’t work well in opportunistic networks We looked at different ways of solving this problem Suman Srinivasan

BonAHA framework for opportunistic networks Mobile nodes; highly mobile networks No infrastructure OLPC; mesh networks “Ad-hoc applications”/ “Mobile P2P applications” Applications need to Be aware of network transitions State/metadata of nodes in the network Opportunistic Networks Really localized applications Work in “cloud” or “opportunistic” networks Examples File synchronization Bulletin Board system We have a framework for this: BonAHA And applications built using it BonAHA framework For registration service = new BService(“loc", "tcp"); service.set("Latitude", lat); service.register(); service.setListener(this); For network transitions nodeUpdated() nodeExited() BonAHA API Runs on iPod/iPhone Allows users to upload “posts” Other users can pick up “posts” and share their own Information on events, etc that they are interested in sharing BBS application Allows users to discover peers in local network and chat Rooms can be set up for private chats Group Chat Users can share files with each other by dragging and dropping files onto peers’ computers Handles peers entering and leaving network File Sharing Applications written using BonAHA Papers published: CCNC 2009, NGMAST 2008, CoNEXT student workshop 2007

Mobility behavior What are mobility models good for? ◦ Disruption-tolerant (store-move-forward) networks ◦ QoS in cellular networks Problem: Current synthetic and trace- based mobility models inadequate We are using Sense Network’s traces ◦ GPS traces of a wide-spectrum of mobile users ◦ Citysense application Arezu Moghadam

Periodic Model to Predict User’s next Location Learning probability distribution of a user’s movement from the training set up to time T Learning user’s pattern by mapping timestamps to hourly timeslots of the week For example timestamp t > T maps to timeslot j User k Week timestamp i jj+1 t

Network management & measurement

DYSWIS: What’s wrong with the network? Traditional Diagnostics Tools ◦ End-user diagnostics: Difficult to obtain information about what is happening beyond the local network ◦ Centralized management: Hard to determine failure causes because it does not know end-user’s personal environment such as network device, wireless router, and firewall. ◦ New Approach  DYSWIS : Distributed, End-to-end, and Intelligent Why I cannot send an ? ? ? ZZZzzz.... Traditional tools: Neither end-users nor central tools can detect misbehavior of a router. Kyung Hwa Kim

DYSWIS DYSWIS = automatic network fault diagnosis system ◦ Distributed: ask other nodes what they see & remote probing. ◦ End-to-end: end-user knows his situation best. ◦ Users collaborate with others to collect information ◦ Security: Continuously monitor network packets. ◦ Auto-detection: Detect faults automatically and start to diagnose. Current implementation status ◦ DYSWIS framework and protocol developed ◦ Several probing modules (NAT, Firewall, SIP, RTP, and DNS) DYSWIS DHT Network What happened to the web server? Probe Request

vDelay: Measuring capture-to- display latency and frame rate ◦ Measures capture-to-display latency and frame rate of a video chat session ◦ Does not require access to source code or network stream ◦ Java-based  platform independent

vDelay

Performance of video chat applications under congestion

Performance of video chat under congestion Performance of video chat applications under congestion ◦ Residential area networks (DSL and cable)  Limited uplink speeds (around 1Mbit/s)  Big queues in the cable/DSL modem(600ms to 6sec)  Shared more than one user/application Investigate applications’ behavior under congestion ◦ Whether they are increasing the overall congestion ◦ Or trying to maintain a fair share of bandwidth among flows

Experimental Setup

Results: X-Lite X-Lite with 10kb-10sec step function

Video chat Analyzed Skype, Live Messenger, X-Lite and Eyebeam ◦ Skype behaved the best by adapting its codec parameters based not only on packet loss but also on RTT and jitter. This allowed Skype to closely follow the changes in bandwidth without causing any packet loss. ◦ Eyebeam performed the worst with high fluctuations in the transmission speed of its video traffic and with poor adaptation to bandwidth fluctuations. Due to limited upstream bandwidth, video clients must have bandwidth adaptation mechanisms and must be able to differentiate between wireless losses and congestion losses.

Applications & middleware

28 Peer-to-peer communication systems P2P-SIP / PSTN gateway NAT Firewall network address of node E? Call media What is distributed? directory service call signaling media session and conferencing presence node C node B media relay (or relay) node A node D node E Salman Baset

Peer-to-peer communication systems 29 ReliabilitySession quality Protocol and system design Measurement Approach –Analytical modeling –Simulations –Building system –Measurement Challenges Video conferencing

CURESPIT: Controlling Unsolicited Requests against SPIT Black/white-list SPIT filtering incurs false positives The more convenient communications we have, the more vulnerable to unsolicited bulk communications we are. It is crucial to differentiate incoming requests from those with “weak social ties” from SPIT. Callee Address book: List of caller IDs of those with strong ties - family - friends - colleagues etc. Strong social ties INVITE From: Accept Callers INVITE From: ? Weak social ties INVITE From: No social ties ? Kumiko Ono

CURESPIT: Controlling Unsolicited Requests against SPIT  Label incoming requests using cross- media relations from earlier communications 2. Store cross-media relations as references to prior comm. Cross-media relations: - Message-ID of s - Call-ID of dialogs - on web page Callers with weak social ties 3. INVITE From: with reference to prior comm. 1. An outgoing message via HTTP, or SIP Callee 4. Labeling by referencing prior comm.

SIP Server Overload Control (I) 10/05/ RE SE Special connection for INVITE requests Normal connection for non-INVITE requests UAC UAS Smart INVITE request forwarding Problem statement:  SIP server overload during emergency, call-in TV programs, etc.  Default TCP configurations cause performance collapse Approach:  Virtually split the TCP connection into two  Upstream server conducts smart forwarding to release pressure

SIP Server Overload Control (II) 10/05/ Results:  Under our mechanism, the throughput under heavy overload remains close to the capacity

NG911: Emergency calling using IP Problem ◦ Is it possible to offer emergency calling services on an all-IP network? Benefits of an all-IP network ◦ Multimedia ◦ Data integration ◦ Flexible routing during massive disasters Challenges ◦ How to determine the location of the calling device? ◦ How to route calls based on location information? ◦ How to use multimedia and add data to call? * Figure: NYC PSAP in Brooklyn

NG911 A SIP-based emergency calling infrastructure Location determination at the call source Location-based routing using LoST IP-based PSAPs for multimedia and data

Location-based services Location-based services: services bound to a user physical location (gas stations, restaurants, indoor directions, …) Location determination ◦ GPS, cellular triangulation Location delivery ◦ HELD, PIDF-LO Service type representation ◦ Service URNs (draft-forte-ecrit-service-classification-02) Service discovery ◦ LoST, LoST extensions (draft-forte-ecrit-lost-extensions- 02)

LoST Extensions LoST: particular attention given to emergency service requirements We define two new queries ◦ Within distance X  New use of circular shape used in queries ◦ N closest  New attribute ‘limit’ to element

Service URNs How to describe services? ◦ List of service URNs  (draft-forte-ecrit-service- classification-02) ◦ How to define new top- level service labels?  Non standard action (draft-forte-ecrit-service- urn-policy-00) EXAMPLE: urn:service:cultural – cultural.art-gallery – cultural.library – cultural.monument – cultural.museum – cultural.theater urn:service:education – education.classroom – education.day-care-center – education.nursery – education.school

Presence-enabled rule language The future Fixed Mobile Convergence will provide ubiquitous always-on communication services User personalization is a key factor in the success of FMC services  Presence information: preferences on communications, device capabilities, privacy rules, calendar information, location information IETF SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE ) framework: ◦ Users publish their presence documents to a Presence Server (PS) ◦ The PS notifies the proper presence information to the users’ watchers Our objective: The design of a rule-based language enhanced with presence information and the implementation of a prototype.

Presence-enabled rule language The language allows users to set rules based on their presence information  just some examples…. ◦ “Accept only calls from my boss when I am working” ◦ “Send me an instant message when my son get home” ◦ “Reject any call from a friend when I am in a meeting, and send him or her the message ‘I am busy, I will call you back later’” The language allows to save memory and processing resources on the client devices and bandwidth ◦ “If I am connected to my self phone, send me any presence notification as an but don’t notify me” ◦ “If my memory resources are scarce, save only the most important presence information about my work mates” ◦ “If the bandwidth is limited, publish only my activity and status information” Other functions are also possible: filtering information, privacy filtering, remote control of applications….

Backup slides

DoS attacks 42 From 40,000 sensors monitoring networks in over 180 countries through Symantec products and services and third-party sources.  The largest DDoS attack size: 40 Gb/sec, 2007  Cyberweapons  Political and military conflicts  Political fight between Estonia and Russia, 2007  Georgian-Russian war, 2008  “Internet Attacks Grow More Potent”, NY Times, Nov 9, 2008

43 PBS implementation structure 43 User level Kernel level On-path signaling PBS NSLP Processing (OpenSSL) NTLP (GIST) Processing Linux kernel routing table (route) Netfilter IP packet filtering (iptables) Control and configurationData flowSignal flow State table: permission state, IPsec state (Hashtable) Userspace IPsec module (netfilter queue module, libiptc, OpenSSL) Network device Network device Authorization Traffic management

Testbed AMD Opteron 2.2GHz CPU and 2GB RAM Linux kernel version

DoS attack Internet ◦ Any one can inject any IP packets into the network ◦ Resource are shared by all users ◦ Denial-of-Service (DoS) attacks are possible DoS attacks ◦ Aim to disrupt the service provided by a network or server ◦ Attacker might spoof the source address ◦ Botnets: The attacker controls the compromised computer by IRC channel Botnet ◦ The attacker controls the compromised computer by IRC (Internet Relay Chat) channel ◦ SYN flood, ICMP flood and HTTP flood 45 Attack DATA Attack DATA

CPU usage for signaling 46 Number of concurrent sessions that can be handled  600 (Q, P) messages /sec  36,000 concurrent flows with 60 sec refresh period with fair queue