Networks Research Group Prof. Mark Handley Department of Computer Science.

Slides:



Advertisements
Similar presentations
The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
Advertisements

Introduction 2 1: Introduction.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Restless bandits and congestion control Mark Handley, Costin Raiciu, Damon Wischik UCL.
TDTS21 Advanced Networking
Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
The Internet and Java Sockets ICW Lecture 5 Tom Chothia.
Resource Pooling A system exhibits complete resource pooling if it behaves as if there was a single pooled resource. The Internet has many mechanisms for.
FIT3105 Smart card based authentication and identity management Lecture 4.
Networks and Distributed Systems: Project Ideas
15-441: Computer Networking Lecture 26: Networking Future.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Computer Networks IGCSE ICT Section 4.
Second year review Resource Pooling Damon Wischik, UCL.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
Communications & Networks
6-1 Extranet Uses. 6-2 Case 2: Maryland and Colorado Serving their customers without using wires Earth Alert Emergency Management System in Maryland provides.
A measurement study of vehicular internet access using in situ Wi-Fi networks Vladimir Bychkovsky, Bret Hull, Allen Miu, Hari Balakrishnan, and Samuel.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Advanced Network Architecture Research Group 2001/11/149 th International Conference on Network Protocols Scalable Socket Buffer Tuning for High-Performance.
CS448 Computer Networking Chapter 1 Introduction to Computer Networks Instructor: Li Ma Office: NBC 126 Phone: (713)
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 3.
Least-Privilege Isolation: The OKWS Web Server Brad Karp UCL Computer Science CS GZ03 / M th December, 2008.
1 Web Development & Design Foundations with XHTML Chapter 1 Key Concepts.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 2: Overview of Computer Network.
Performance of HTTP Application in Mobile Ad Hoc Networks Asifuddin Mohammad.
Congestion control for Multipath TCP (MPTCP) Damon Wischik Costin Raiciu Adam Greenhalgh Mark Handley THE ROYAL SOCIETY.
Advanced Network Architecture Research Group 2001/11/74 th Asia-Pacific Symposium on Information and Telecommunication Technologies Design and Implementation.
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
HELSINKI UNIVERSITY OF TECHNOLOGY Visa Holopainen 1/18.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 2 Omar Meqdadi Department of Computer Science and Software Engineering.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
ANDREA BITTAUMARK HANDLEY PETR MARCHENKOBRAD KARP COMPUTER SCIENCE DEPARTMENT UCL Fine-Grained Isolation for the Apache Web Server.
QM/BUPT Joint Programme Final Year Projects Dr Jonathan Loo
1 Three ways to (ab)use Multipath Congestion Control Costin Raiciu University Politehnica of Bucharest.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Networking Revision. Advantages:  Communication (remotely)  Sharing hardware (saves on cost, eg. Printers)  Sharing of data and info (eg. Databases.
Network Processing Systems Design
CMPS Operating Systems Prof. Scott Brandt Computer Science Department University of California, Santa Cruz.
Voice Over Internet Protocol Nelson Kattula Computer Science, Masters.
COMPSCI 110 Operating Systems
Computer Data Security & Privacy
COMPSCI 110 Operating Systems
Software Defined Networking (SDN)
ECE 4450:427/527 - Computer Networks Spring 2017
DIFFERENT TYPES OF INTERNET CONNECTIONS.
Congestion control and the P2P value chain
Least-Privilege Isolation: The OKWS Web Server
Presentation transcript:

Networks Research Group Prof. Mark Handley Department of Computer Science

Nets Faculty: Interests & Accomplishments  PhDs from Cambridge, Harvard, MIT, Queen Mary, UCL  Internet standards activity (30+ standards including SIP)  Brought the first Internet link to Europe  Research contributions in: congestion control, distributed systems, mobility, multimedia, routing, scheduling, security, wireless networks.

Wedge: Making Networked Applications more Resilient to Attack Andrea Bittau, Petr Marchenko Mark Handley, and Brad Karp

Software vulnerability reports per year  As one-off defenses are released, new vulnerability categories emerge Source: Open source vulnerability database (osvdb.org)

Two systems security principles  Compartmentalization: Divide system into subsystems that fail independently  Least privilege: Each subsystem should only have access to read/modify data needed for its job

Problem: Lack of compartmentalization  Monolithic process must invoke SSL, so must hold RSA private key in memory  Single, monolithic address space: any code can access all memory Apache web server Internet request parser HACKED! private key

Wedge: Compartments improve security  Crowbar, a run-time instrumentation tool:  Measures memory access behavior of code running on real, non-malicious workloads  Informs programmer of memory permissions code requires on these workloads  OS primitives for Linux:  Fine-grained tagging of memory  Explicit assignment of per-tag permissions to threads request parser gen_session_key (~200 LoC ) memory protection Internet HACKED! private key

Cone of Silence: Nulling Interference for Higher-Throughput Wireless Networks Yiorgos Nikolaidis, Astrit Zhushi, Kyle Jamieson, and Brad Karp

The (WiFi) “success disaster”

Limits of omnidirectional antennas  Interference from other senders is typically the limiting factor  Receiver can only decode Sender’s packet when Sender is sufficiently stronger than Interferer Interferer Receiver Sende r

The promise of directional antennas Interferer Receiver Sender OK!

Our approach: Cone of Silence (CoS)  Phased arrays: Long used in radar systems; newly available for  Receiver shapes beam to maximize SIR  Receiver balances between nulling toward interferer, directing gain toward sender  Explicitly measure S and I to account for multi-path propagation

Multipath TCP: Utilizing the natural resilience of the Internet Mark Handley, Damon Wischik, Costin Raiciu, Christoper Plunkte

Multipath traffic control, or, why peer-to-peer will balance the Internet Why does my phone have to choose between connections? What if it could use several connections at the same time?

Mb/s on wifi alone Mb/s on 3G alone Mb/s with multipath At my desk. Good wifi reception, poor 3G. Go downstairs to make coffee. Wifi fails. 3G is good. In the kitchen. Wifi is OK, 3G is good. We’ve implemented multipath extensions for TCP.

But is it safe?  If everyone greedily takes all the bandwidth they want, the Internet will collapse, like it did in  If everyone is restrained in the total bandwidth they use, but everyone greedily shifts all his/her traffic onto the best path, the Internet will “flap”.  Need to guarantee it is safe to deploy.

Not only is it safe, it’s the natural evolution of the Internet. Before the Internet, networks used to split links into “circuits”, e.g. one circuit per telephone call. One of the big ideas of the Internet was to use packets, not circuits, to carry data. This lets users take more bandwidth on a link as they need it — but relies on them to share fairly. Our algorithm extends the idea of “fair sharing as needed” from links to networks.

Build your own Internet  Trend: Opening the network up to innovation  Software routers, software-defined radios, peer-to-peer networks  Result: New ways of communicating