Professor OKAMURA Laboratory. Othman Othman M.M. 1.

Slides:



Advertisements
Similar presentations
All Rights Reserved © Alcatel-Lucent 2009 Enhancing Dynamic Cloud-based Services using Network Virtualization F. Hao, T.V. Lakshman, Sarit Mukherjee, H.
Advertisements

IPv6 Mobility Support Henrik Petander
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv6 – IPv4 Network Address, Port & Protocol Translation & Multithreaded DNS Gateway Navpreet Singh, Abhinav Singh, Udit Gupta, Vinay Bajpai, Toshu Malhotra.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
MOBILITY SUPPORT IN IPv6
Application Layer Anycasting: A Server Selection Architecture and Use in a Replicated Web Service Presented in by Jayanthkumar Kannan On 11/26/03.
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
Chapter 13 Mobile IP. Outline  ADDRESSING  AGENTS  THREE PHASES  AGENT DISCOVERY  REGISTRATION  DATA TRANSFER  INEFFICIENCY IN MOBILE IP.
IP Addressing: introduction
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Chapter 26 Client Server Interaction Communication across a computer network requires a pair of application programs to cooperate. One application on one.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
DHCP for Multi-hop Wireless Ad-Hoc Networks Presented by William List.
A Brief Taxonomy of Firewalls
1 Proceeding the Second Exercises on Computer and Systems Engineering Professor OKAMURA Laboratory. Othman Othman M.M.
Internet Control Message Protocol ICMP. ICMP has two major purposes: –To report erroneous conditions –To diagnose network problems ICMP has two major.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
ECE 544 Project3 Kush Patel Siddharth Paradkar Ke Dong.
Midterm Review - Network Layers. Computer 1Computer 2 2.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
National Institute Of Science & Technology Mobile IP Jiten Mishra (EC ) [1] MOBILE IP Under the guidance of Mr. N. Srinivasu By Jiten Mishra EC
Othman Othman M.M. 30/1/ Outline: 1. Advisory Committee Meeting: 1. Content Anycasting. 2. OpenFlow Enhancement. 3. Current Status. 4. Next Research.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Transport Layer Layer #4 (OSI-RM). Transport Layer Main function of OSI Transport layer: Accept data from the Application layer and prepare it for addressing.
Othman Othman M.M., Koji Okamura Kyushu University 1.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
Othman Othman M.M., Koji Okamura Kyushu University 1.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Othman Othman M.M., Koji Okamura Kyushu University Proceedings of the 32 nd Asia-Pacific Advanced Network Meeting India, New Delhi, 2001/8/22.
Akbar Rahman Juan Carlos Zúñiga Guang Lu IETF 78, July P2P Streaming for Mobile Nodes: Scenarios.
Presented by Rebecca Meinhold But How Does the Internet Work?
Networking Basics CCNA 1 Chapter 11.
Introduction to Mobile IPv6
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
ARP ‘n RARP. The Address Resolution Protocol (ARP) is a request sent out by a computer to find another computer’s MAC address. It already knows the IP.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
Fall, 2001CS 6401 Switching and Routing Outline Routing overview Store-and-Forward switches Virtual circuits vs. Datagram switching.
HIP-Based NAT Traversal in P2P-Environments
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Chapter 5 Network and Transport Layers
Chapter 5 Network and Transport Layers
Chapter 5 Network and Transport Layers
An example of peer-to-peer application
A quick intro to networking
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
Net431:advanced net services
Chapter 5 Network and Transport Layers
Packet Sniffing.
CPEG514 Advanced Computer Networkst
CSE 313 Data Communication
Mixed P2P-CDN System for Media Streaming in Mobile Environment
Chapter 24 Mobile IP.
Lecture 4a Mobile IP 1.
Presentation transcript:

Professor OKAMURA Laboratory. Othman Othman M.M. 1

Outline: 1. Goal. 2. Current Technologies. 3. Limitations of Current Technologies. 4. Anycast Scenario 5. BitTorrent (P2P) Scenario. 6. Advantages of Combining Technologies. 7. How to Combine Technologies. 8. Implementation. 9. Conclusion. 10. Q&A. 2

1-Goal: Nowadays many Future Internet researches, technologies going. OpenFlow is one of candidate Future Internet technologies. to create Circuit based like systems. To support mobility, computing centers …… Important to show new ways to use OpenFlow to provide new services or improve current ones. Important to show new ways to use OpenFlow to provide new services or improve current ones. That make use of OpenFlow capabilities other than circuit like. That make use of OpenFlow capabilities other than circuit like. To have contents with high availability. To have contents with high availability. 3

2-Current Technologies: Anycast: Multiple nodes with the same address (Sa). Packet sent to (Sa) will be delivered to the node with nearest location. 4 Peer to Peer: clients to provide service Depends on user clients to provide service. application layer overlay Implements an application layer overlay network. Fig 2. BitTorrent Source : Sa Fig 1. Anycast

3-Limitations of Current Technologies: Anycast: All of the content servers must have identical contents. Lacks the flexibility, and not dynamic. 5 Peer to Peer: Overhead because of overlay nature, protocol, peer discovery, and looking up in index. Service depends on user’s contribution Router 1 Router 2 Router 3 Router 4 Destination Next-Hop Distance Cont 1 Cont 2 Cont 3 Cont n Cont 1 Cont 2 Cont 3 Cont n Fig 2. BitTorrent Source : com/bittorrent2.htm

4-Anycast Scenario: Cont 1 Cont 2 Cont 3 Cont n Cont 1 Cont 2 Cont 3 Cont n Cont 1 Cont 2 Cont 3 Cont n Client will send packet to Network will choose end node based on routing measures

5-BitTorrent (P2P) Scenario: 7 Tracker 100% Seeder 100% Seeder 70% 30% 0%

6-Advantages of Combining Technologies 1/3 : Anycast. Content Centric Networks. Peer to Peer. Combination of those technologies: Users contributing in service: to improve the availability, and improves the overall use of bandwidth in whole network. Regular Client/Server User contribution In Content Anycasting

6-Advantages of Combining Technologies 2/3 : Anycast. Content Centric Networks. Peer to Peer. Combination of those technologies: Choosing destination by network: to remove the burden of finding destination and thus a faster response. Tracker Tracker Role in BitTorrent Choosing Destination By Network In Content Anycasting Content Server OpenFlow Router

6-Advantages of Combining Technologies 3/3 : Anycast. Content Centric Networks. Peer to Peer. Combination of those technologies: Content ID: to have more flexibility down to the level of contents rather than the node level. Using Content ID In Content Anycasting Content Server Decision based on: IP address. Content ID. Decision based on: IP address. Content ID. Regular Content Server Decision based on: IP address. sometimes port# Decision based on: IP address. sometimes port# OpenFlow Router

7-How to Combine Technologies: Content anycasting does its rule by using: OpenFlow for the process of choosing the destination, along with the aid of the content server. A new procedure for requesting content is introduced to enable the clients to get the contents. 11 Content Server Client A Anycast Manager Client B Su Au Bu Get Content ID? Content ID = X To: Su Cont id=X To: Au Cont id=X Redirection Req. Threshold reached Redirection OpenFlow Router

7-How to Combine Technologies: The new procedure for getting the content: Phase 1: getting the content ID. (e.g: from the URL). Phase2: using the content ID in Probe protocol. Phase 3: getting file via TCP. Fig 1: Procedure for getting content New Client OpenFlow router Current Client Destination: serverIP :START Destination: CurrentClientIP :START START/ACK With CurrentClientIP in the probe header ACK / ACK Destination: CurrentClientIP TCP Session Phase 2 Phase 3

7-How to Combine Technologies: Headers of the Propobe protocol 13 Fig2: Probe Protocol Header Fig1: UDP Header

8- Implementation: Currently building redirection system, modified content server, modified clients and using the reference OpenFlow implementation. increase in number of clients getting servedresponse time Aiming to measure: increase in number of clients getting served, response time and others. comparing those values to other solutions like regular client/server model. 14 Content Anycasting Anycast Manager OpenFlow Router Regular Client/ Server Compare

8- Comparison: Number of Clients getting content form the server. 15

9- Conclusion: New mechanism for requesting content is designed to enable content anycasting. Make use of content id. Requesting the content id. Using the content id in the process of getting the content. A Probe protocol is designed (modification to UDP) to be used. Added some fields in the header. Simulation shows 50% decrease of server loads in case of 1 redirection/ clietn. 16

10- Q&A: Thank you for listening. 17