P2P Applications and MobileMAN Jon Crowcroft, Ziran Sun, (UCAM) Elgan Huang&Wenjun Hu (UCAM) Marcel Dischinger&Jan Hoeft (Karlsruhe)

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
MMT (Multi Meshed Tree) Protocols for Cognitive Airborne Networks Nirmala Shenoy Lab for Wireless Networking and Security Rochester Institute of Technology.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Group #1: Protocols for Wireless Mobile Environments.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Summary and Further Reading Part I of 13th.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Rev A8/8/021 ABC Networks
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Some contributions to the management of data in grids Lionel Brunie National Institute of Applied Science (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Arsitektur Jaringan Terkini
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
15-441: Computer Networking Lecture 26: Networking Future.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
© 2009 Research In Motion Limited Methods of application development for mobile devices.
Opportunistic Networking (aka Pocket Switched Networking)
Computer Network Architecture and Programming
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
COS 461: Computer Networks
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
CHINACOM 2006, Beijing, China26 Oct 2006 Osmosis in Pocket Switched Network Pan (Ben) Hui University of Cambridge Computer Laboratory
1 29 September 2010 NATO IST-092 Symposium New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2 Christopher Dearlove
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
P2P File Sharing Systems
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Lecture 1 Wireless Networks CPE 401/601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross All material copyright J.F.
Pocket Switched Networks: Real-world Mobility and its Consequences for Opportunistic Forwarding Jon Crowcroft,Pan Hui (Ben) Augustin Chaintreau, James.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
1 National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN Architecture and Protocols 2nd MobileMAN.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
IT 351 Mobile &Wireless Computing Semester 2, Dr. Hala Mokhtar Room 79- 2nd floor.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Slide 1 Jose Costa-Requena, Raimo Kantola, Nicklas Beijar / MobileMAN Kick-off/ CNR,Pisa MobileMAN kick-off Jose Costa-Requena, Raimo Kantola,
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 Evolving a Manageable Internet Tom Anderson University of Washington.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
MobileMAN Internal meetingHelsinki, June 8 th 2004 NETikos activity in MobileMAN project Veronica Vanni NETikos S.p.A.
MobileMAN Integration and Experimentation of Legacy Mobile Multihop Ad Hoc Networks Eleonora Borgia, Marco Conti, and Franca Delmastro Institute for Informatics.
Routing Protocols in Ad-hoc Networks, OLSR Self configuring systems (SCS) TTM3 – Høst 2004 Jørn Andre Berntzen 22/10/2004.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Outline Introduction Existing solutions for ad hoc
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Advanced Technology Centre © BAE SYSTEMS All rights reserved. Slide 1 OLSR Simulation and Implementation Christopher Dearlove
National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN MobileMAN: II year expected results.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Presented by Edith Ngai MPhil Term 3 Presentation
Ad-hoc Networks.
MobileMAN Workshop 2 Cambridge 2 –
Mobile Computing.
Using Collaborative Agents to Enrich Service Environments
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Other Routing Protocols
Presentation transcript:

P2P Applications and MobileMAN Jon Crowcroft, Ziran Sun, (UCAM) Elgan Huang&Wenjun Hu (UCAM) Marcel Dischinger&Jan Hoeft (Karlsruhe)

2 Application & Cross Layer - outlook for review 2 First step will build on experience with bamboo (java p2p middleware - tutorial) and multicast  Multicast is reverse path of forward p2p route - if p2p route is hash of node location from wifi layer, should work well! (by Dischinger).  problem for OLSR/HSLS using reverse path  Distance (coord triangle) service (Hoeft) Possible use of fuzzy logic controllers  to avoid interference between nested control laws acting on NeST data (worked in past) - e.g.  MAC->HSLS/OLSR cong indication -> TCP->App Could also look at synch/many-to-many Fileshare based on Dischinger Wb

3 Economics & Mobility - outlook for review 2 Have simulation results for taxi  Using realistic mobility model But: for Different routing layer (not HSLS)  takes advantage of restricted waypoint and knowledge of velocity distribution of taxis and intersections (road topology and traffic matrix) No integration of incentive or cross layer yet in simulation… Future: move to more radical cross layer:

Ad-Hoc google - Haggle Opportunistic networking in a disconnected age. Currently internal Cambridge project only Christophe Diot, Gianluca Iannaconne, Marc Liberatore, James Scott, Eben Upton Intel Research Cambridge Jon Crowcroft, Ziran Sun, Wenjun Hu Cambridge University

5 Collaborating institutions and Pis for possible EU proj. Intel Research, UK (Christophe Diot) Cambridge University, UK (Jon Crowcroft) EPFL, Switzerland (Jean-Yves LeBoudec) University of Uppsala, Sweden (Per Gunningberg) University of Massachusetts, USA (Brian Levine)

6 The world is not connected! Users move between heterogeneous connectivity islands End-to-end is not always possible  One or both ends or middle may be disconnected Device should make network decisions  Shall I send by Bluetooth, WiFi, GPRS, later:)? => No IP route => No TCP => New Stack  Not MobileMAN!

7 Challenges with periodic and local connectivity Distributed subject-based naming Nodes need to locate themselves Neighbours discovery Security, trust and reputation Exploit massive aggregate bandwidth  Identify devices with local connectivity  Make use of MBs of local storage

8 Haggle goals Ad Hoc google Cross platform Cross network technologies Provide a useful set of services in the absence of a fixed infrastructure and e2e connectivity  opportunistic connection  “smart” message forwarding  distributed naming  authentication and trust information

9 Haggle goals (cont.) Exploit features of the problem space  node mobility for message delivery  Build communities  distributed, intuitive authentication Integration with legacy systems  delivery  web requests

10 Some Haggle Applications Asynchronous messaging Automatic address book or calendar updates File sharing Commercial transactions Tracking or finding users

11 Haggle Assumptions Users carry devices with connectivity  Bluetooth, , Ethernet, cradle, etc. Storage is not a problem  storage density doubling every year Battery is more of a problem  heuristics to determine how scarce battery is  scale Haggle operations appropriately  allow user control

12 Illustration: Ad-hoc messaging 1. Forwarding within communities

13 Illustration: Ad-hoc messaging 2. Taking advantage of mobility

14 AP Illustration: Ad-hoc messaging 3. Use the Internet if (and only if) its sensible

15 Haggle is VERY ad-hoc Ad-hoc life is often disconnected Dynamic communities, dynamic trust Mobility and opportunistic networking Heterogeneous network types with different bandwidth/cost/coverage/naming Internet is a technology of the past

16 Principle components of Haggle Communities instead of ASs “Small world” forwarding  the Internet is a networking technology  among others Localization for networking and for apps Trust and security built-in Attention: paid to user acceptance, usability, and privacy

17 Community networks Recently, many applications have relied on communities sharing a common interest/goal:  Overlay networks, VPNs, etc.  File sharing P2P networks  Ad-hoc networks Communities may be transient (concert attendees) or long-lived (interest groups) Users may be in multiple communities at any time, and change communities over time Issues with naming, trustability, security, incentive to cooperate

18 Small world forwarding Bootstrap State information are flooded  tau-persistent multicast (tau dynamic)  Used to populate initial “forwarding” tables, No routes, no routing, yes congestion control  Find the next hop that has the highest probability to deliver based on google-style “relevant” to content- query  Dual control algorithm for resource management Application forwarding based on neighbourhood status and history+interest  by including in proactive crawl/index  Avoid flooding -I.e. interest directed OLSR  Data aging - but very large “forwarding” “cache”

19 Localization Node localization is important  Neighbourhood discovery/community creation  Location-aware applications  Trust and security Various options  Relative to other nodes  Absolute (e.g. GPS)  Based on some external service (c.f. PlaceLab use of base stations)

20 Trust and Security Human in the loop for bootstrapping trust  User 1 + PDA 1 PDA 2 + User 2  User recognize each other and auth PDAs simultaneously - PDAs use localization and biometric to check each other and their humans Trust is partially transitive (c.f. PGP)  Encryption and signing can then provide secure, authenticated transmissions  Reputation systems may be used to provide incentives to play nice How do we preserve privacy? Community based

21 Usability and User Involvement Usability will require informing the user about network state issues – but how?  Spinning globe, signal strength bars, greyed-out names, instant messaging presence indications When is user involvement required?  Most decisions must be made by devices  Some decisions may have to be left to user What incentive to cooperate? Kazaa…?

22 Research Plan Proof-of-concept demo  runs on Bluetooth capable Java mobile phones  address book + other small file synchronization Implement base Haggle modules  link layer interface, neighbor discovery, message forwarding, local store, monitoring  Asynchronous messaging, people localization Build other simple applications

23 Research Plan (Cont.) Small-scale deployment  measure usage patterns, bug test prototype Model large deployment in simulation  examine system performance under simple models, find bottlenecks  iterate with less forgiving models Improve performance  e.g., forward on the basis of likelihood of meeting, trust, community membership

24 Research Plan (Cont.) Implement additional modules  Community, trust, localization, legacy system interaction, filesystem interaction Implement additional applications  file sharing, web queries, , ims Deploy at large meeting (e.g. 500 users at INFOCOM), measure usage patterns

25 Suggestions & Questions If you had haggle, you would have these slides If you had haggle, you could contribute new application patterns and code to us now We would trust that it came from you, and you that our slides or code were from us You could pass it on to colleagues and collaborators without even knowing it, safely! You could even throw away your USB dongle (note painful latency, and poor security even with biometric e.g. usb fingerprint) Wouldn’t Haggle be useful?