Network Coding Architecture - Building Blocks - Victor Firoiu, Brian Adamson with inputs from Cedric Adjih, Jonathan Detchart, Marie-Jose Monpetit, Morten.

Slides:



Advertisements
Similar presentations
IPv4 - The Internet Protocol Version 4
Advertisements

NORM PI Update draft-ietf-rmt-pi-norm-revised-04 68th IETF - Prague Brian Adamson NRL.
Group #1: Protocols for Wireless Mobile Environments.
Flow Space Virtualization on Shared Physical OpenFlow Networks Hiroaki Yamanaka, Shuji Ishii, Eiji Kawai (NICT), Masayoshi Shimamura, Katsuyoshi Iida (TITECH),
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
IP Protocol - Introduction Dr. Farid Farahmand. Introduction TDM transport networks are not sufficient for data communications Low utilization TDM networks.
School of Information Technologies Revision NETS3303/3603 Week 13.
1 6/14/ :27 CS575Internetworking & Routers1 Rivier College CS575: Advanced LANs Chapter 13: Internetworking & Routers.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
Overlay Network and Data Transmission Over Wireless For EE290T Minghua Chen Berkeley.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.5 Routing algorithms m Link state m Distance.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Network Architecture for Cyberspace
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Gursharan Singh Tatla Transport Layer 16-May
Network Layer Goals: understand principles behind network layer services: –routing (path selection) –dealing with scale –how a router works –advanced topics:
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Introduction to Network Layer. Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using bridges? –No!
End-to-end resource management in DiffServ Networks –DiffServ focuses on singal domain –Users want end-to-end services –No consensus at this time –Two.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Computer Networks: Multimedia Applications Ivan Marsic Rutgers University Chapter 3 – Multimedia & Real-time Applications.
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Network Layer introduction.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
Bjorn Landfeldt, The University of Sydney 1 NETS 3303 Networked Systems Revision.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
4: Network Layer4-1 Schedule Today: r Finish Ch3 r Collect 1 st Project r See projects run r Start Ch4 Soon: r HW5 due Monday r Last chance for Qs r First.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 7 Internet Protocol (IP) Routing.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
Draft-kellil-sam-mtocp-01.txt – CEA, LIST - 78th IETF Meeting, 29July Multiparty Transport Overlay Control Protocol (MTOCP) draft-kellil-sam-mtocp-01.txt.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
4.1.4 multi-homing.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
MPLS-TP INTER-OP: WHAT, WHY, AND HOW? General Objectives for MPLS-TP Inter-Op Test Program at UNH-IOL.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Key insight.  With drop-when-decoded, the busy period of the virtual queue contributes to the physical queue size calculation  Responding to ACK of the.
Congestion Notification Process for Real-Time Traffic draft-babiarz-tsvwg-rtecn-01.txt Jozef Babiarz Kwok Ho Chan Victor Firoiu 60 th IETF, Aug. 5 th,
IETF 55 Nov A Two-Level Architecture for Internet Signaling draft-braden-2level-signal-arch-01.txt Bob Braden, Bob Lindell USC Information.
Building A Network: Cost Effective Resource Sharing
ECE 544 Protocol Design Project 2016 Chengyao Wen Hua Deng Xiaoyu Duan.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
U Innsbruck Informatik - 1 Specification of a Network Adaptation Layer for the Grid GGF7 presentation Michael Welzl University.
ECE 544 Protocol Design Project 2016 Michael Sherman Murtadha Aldeer Leonard T. Park.
4: Network Layer4a-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m routing (path selection) m dealing.
Introduction to Networks
INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723
Networking Using the OSI Model.
The OSI Model Prof. Choong Seon HONG.
Network Coding Architecture Framework
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CPSC 335 Data Communication.
Lecture (2).
IETF#67 – 5-10 November 2006 FECFRAME requirements (draft-ietf-fecframe-req-01) Mark Watson.
Network Layer Goals: Overview:
Lec 5 Layers Computer Networks Al-Mustansiryah University
Chapter 3: Open Systems Interconnection (OSI) Model
OSI Model The Seven Layers
Network Architecture for Cyberspace
Chapter 2. Protocols and Architecture
Building A Network: Cost Effective Resource Sharing
Presentation transcript:

Network Coding Architecture - Building Blocks - Victor Firoiu, Brian Adamson with inputs from Cedric Adjih, Jonathan Detchart, Marie-Jose Monpetit, Morten Pedersen, Vincent Roca Draft

Use Case 1: NC Shim Layer – under TCP, UDP, SSH 2 Unicast Routing TCP App NC Coding NC Cong Ctrl NC shim NC Reliability IP TCP App NC Coding NC Cong Ctrl NC shim NC Reliability Coding vectors, coded pkts Feedback (rank, null space) Cong signal, backpressure Congestion signal, Recv window App data Rate control Coded symbols, Rank test Coding: end-end. Passes CC signaling. Optional: in-network re-coding. Coding nodes determined by: static configuration, routing or control signaling. Usage: reliability, similar to source coding. Security is a key building block factor – impacts all other BBs NC Forwarding Security NC Forwarding

Use Case 2: NC Transport, In-Network Coding 3 App NC CodingNC Cong Ctrl NC Transport NC Reliability IP App NC Coding NC Cong Ctrl NC Transport IP NC Reliability Cong. signals App data Rate control Coded symb, Rank test NC CodNC CC NC Transport NC Rel IP Usage: reliability, resilience to link and node outage. Supports both Unicast and Multicast Assisted by multi-path (subgraph) routing Security is a key building block factor – impacts all other BBs (Multi-path) Routing NC Forwarding (Multi-path) Routing NC Forwarding Pkts containing coded symbols FlowID, blockID Coding vectors, Feedback Security

4 NC Coding NC Cong Ctrl NC Transport NC Reliability Flow ID, block ID, Coding vectors, Feedback Cong. signals Source (app) data pkts Rate control Coded symb, Rank test (Multi-path) Routing NC Forwarding Network Coding Architecture: Building Block View Coding – all coding operations –Encoding, decoding, test for “innovative”, rank, null space –Uses operations such as finite field and linear transformations Reliability – algo & control for rel. transp. –Rel. logic: block, window, end-to-end, hop- by-hop –Ctrl: coding info (vectors, ID), feedback. Forwarding – Tx/Rx coded pkts –Pkt Tx logic: next hop, when to Tx –Ctrl: SG topo, splitting ratios/ fwd factors Cong Control – control of Tx rates –Ucast, mcast, subgraph –May use existing CC BB: TFRC [5348] for unicast, TFMCC [4654] for mcast. Routes, mcast/SG topo, neighbors, link quality Coded pkts, Splitting ratios Considerations - Research Security: how to add encr, vulnerability Complexity, energy Heterogeneity Security

NC Coding Building Block Function: coding operations  Code/decode, test for block/gen rank, null space, window oper.  Test for innovative/ linear indep. Interfaces with Reliability BB  Request/provide coded/decoded symbols, block/window rank, No outside control 5 NC Coding NC Reliability Code/decode symbols Rank test, null/range space, test for innovative

NC Reliability Building Block Function: Reliable transport  Rel. logic: block, window, end-end/hop-hop  Manages flow of data/symbols between App, Coding, Fwd BBs Control: to Rel BB in peer nodes  Session: Flow ID, encoding type/ID, symbol size  Coding info: vectors, ID  Feedback: Block: rank/deg freedom/Null Space Sample; Window: high/low index Interface w Forwarding BB  Gets Tx opportunity  Provides coded symbols for Tx Interface w Coding BB  Requests coded/decoded symbols, req tests for rank, innovative 6 NC Coding NC Reliability NC Forwarding Tx opportunity, Coded symbols Code/ decode symbols Rank test, null/range space, test for innovative QoS/Reliability level Source (app) data pkts App Flow ID, block ID, Coding info, feedback

NC Forwarding Building Block Function: Tx/Rx coded pkts  Pkt Tx logic: next hop: neighbor nodes, when to Tx from what flow  Allocates flow slices to paths  Measures netw conditions: loss, delay Control: w Fwding BB in peer nodes  Coordinate info flow allocation in multi- path/tree/subgraph: splitting ratios/ fwd factors Data plane: Tx/Rx pkts w coded symbols Interface w Congestion Control  Provides cong indications (loss, delay), gets Tx rate limit Interface w routing  Gets ucast/mcast/SG topology 7 NC Cong Ctrl NC Reliability Rate control (Multi-path) Routing NC Forwarding Coded pkts, Splitting ratios Routes, mcast/SG topo, neighbors, link quality Tx opportunity, Coded symbols

NC Congestion Control Building Block Function: control of Tx rates to avoid congestion and follow TCP-friendly recommendations  Ucast, mcast, subgraph  May use existing CC BB: TFRC [5348] for unicast, TFMCC [4654] for mcast Control: w CC BB in peer nodes  Congestion signals: backpressure, ECN, sliding window size Interface w Fwding BB  Gets cong measurements  Gives Tx rate limit 8 NC Cong Ctrl Cong. signals: backpressure, ECN Rate control NC Forwarding Cong measurements

NC Security Building Block Factor Security Considerations:  How to add encryption: independent of coding or inter-changeable (e.g., homomorphic)  How to identify vulnerabilities  Different security mechanisms may apply to different BBs  Needs to be applied consistently across this complex system 9 NC Coding NC Cong Ctrl NC Transport NC Reliability Coding vectors, Feedback Cong. signals Rate control Coded symb, Rank test NC Forwarding Coded pkts Splitting ratios Security

Next Steps Draft on NC Architecture and Building Blocks Later, may need to split into separate BB drafts Try to reuse as much as possible: e.g., CC BB: TFRC [5348] for unicast, TFMCC [4654] for mcast Show how a simple protocol can be built with these building blocks 10