A Combat Support Agency Defense Information Systems Agency GIG EWSE Application and Service (EE212) 17 August 2011 Tactical Edge Service: Service Adaption.

Slides:



Advertisements
Similar presentations
Communication Topics Jason Hill –
Advertisements

Utilizing Military Message Handling Systems as a Transport Mechanism for SOA in Military Tactical Networks Mr Frank T. Johnsen, Mr Anders Eggen, Ms Trude.
Mobile Application Architectures
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Keeping the War Fighter Informed
Presented by Santhi Priya Eda Vinutha Rumale.  Introduction  Approaches  Video Streaming Traffic Model  QOS in WiMAX  Video Traffic Classification.
CStream: Neighborhood Bandwidth Aggregation For Better Video Streaming Thangam Vedagiri Seenivasan Advisor: Mark Claypool Reader: Robert Kinicki 1 M.S.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
J2ME Web Services Specification.  With the promise to ease interoperability and allow for large scale software collaboration over the Internet by offering.
Layered Range Multicast for Video On Demand Duc A. Tran Kien A. Hua Tai T. Do.
Software Engineering and Middleware: a Roadmap by Wolfgang Emmerich Ebru Dincel Sahitya Gupta.
An Overlay Multicast Infrastructure for Live/Stored Video Streaming Visual Communication Laboratory Department of Computer Science National Tsing Hua University.
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
COS 461: Computer Networks
“On the Integration of MPEG-4 streams Pulled Out of High Performance Mobile Devices and Data Traffic over a Wireless Network” Spyros Psychis, Polychronis.
1 NCOIC MSD Agenda Net-Centric Operations 2.0, Domain-Specific SOA Frameworks, M&S Testbed Demos Bob Marcus
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Client-Server Computing in Mobile Environments
A Combat Support Agency Defense Information Systems Agency GIG EWSE Transport Engineering (EE211) 17 August 2011 UNCLASSIFIED Improving Tactical Networks.
Colombo, Sri Lanka, 7-10 April 2009 Multimedia Service Delivery on Next Generation Networks Pradeep De Almeida, Group Chief Technology Officer Dialog Telekom.
Internet GIS. A vast network connecting computers throughout the world Computers on the Internet are physically connected Computers on the Internet use.
A Combat Support Agency Defense Information Systems Agency UNCLASSIFIED Program Executive Office GIG Enterprise Services (PEO-GES) 101 Briefing As of October.
Optimized Communication For Mobile Multimedia Collaboration Applications Sangyoon Oh Community Grids Laboratory Indiana University
1 Proxy-based Adaptation for Mobile Computing ECET 581 Spring 07 Authors: Markus Endler Hana Rubinsztejn Ricardo C. A. da Rocha Vagner Sacramento ISSN.
A Combat Support Agency Defense Information Systems Agency GIG EWSE Application and Service (EE212) 17 August 2011 Tactical Edge Service: Design Principles.
EE616 Technical Project Video Hosting Architecture By Phillip Sutton.
Hosted by iSCSI: The New Storage Interconnect on the “Block”? Sean P. Derrington Consultant, Enterprise Storage and Servers Appergy, Inc
DMSO Technical Exchange 3 Oct 03 1 Web Services Supporting Simulation to Global Information Grid Mark Pullen George Mason University with support from.
Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
1 Seminar Presentation Multimedia Audio / Video Communication Standards Instructor: Dr. Imran Ahmad By: Ju Wang November 7, 2003.
Enterprise User Enabling Warfighter Capability
An Integration Framework for Sensor Networks and Data Stream Management Systems.
BEUTH Hochschule für Technik BERLIN (BHT Berlin) University of Applied Sciences Reaching the Next Level: From Technical to Business Interoperability Creative.
NCOIC MSD Initiative: Net-Centric Operations 2.0, Domain-Specific SOA Frameworks, and M&S Testbed Demos Bob Marcus
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
1 NCOIC MSD Agenda Net-Centric Operations 2.0, Domain-Specific SOA Frameworks, M&S Testbed Demos Bob Marcus
Exploiting Proxy-Based Transcoding to Increase the User Quality of Experience in Networked Applications Maarten Wijnants Patrick Monsieurs Peter Quax Wim.
Core Enterprise Services to the Tactical Edge (CES2TE) 1 Jennifer Valentine The MITRE Corporation 13 January 2009.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
© 2007 The MITRE Corporation. All rights reserved Exposing Services in a Disadvantaged Environment S. Semy, M. Sabbouh, J. Higginson, F. Dandashi
1 Mobile Networks logica Contents Confidential & Proprietary to Logica © 2001 Application-Level Active Networks Presented at Dublin Breakfast Briefing,
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Physical Layer Network Fundamentals – Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Trans-enterprise Service Grid (TSG) Active Interoperability Across Independent Partners David E. Ellis Information Management Architect (505) ,
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
A Combat Support Agency Defense Information Systems Agency GIG EWSE IA and NetOps (EE213) 17 August 2011 UNCLASSIFIED Tactical Edge Service: NetOps and.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Multiplexing Team Members: Cesar Chavez Arne Solas Steven Fong Vi Duong David Nguyen.
WWW Programming Model. WWW Model The Internet WWW architecture provides a flexible and powerful programming model. Applications and content are presented.
REST By: Vishwanath Vineet.
Approved for Public Release; Distribution Unlimited. Case Number: , © 2006 The MITRE Corporation. All rights reserved Characterization Framework.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
NINJA. Project of UC Berkeley Computer Science Division Paper : The Ninja Architecture for Robust Internet-Scale Systems and Services
/ Fast Web Content Delivery An Introduction to Related Techniques by Paper Survey B Li, Chien-chang R Sung, Chih-kuei.
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
CIIT-Human Computer Interaction-CSC456-Fall-2015-Mr
CORBA Alegria Baquero.
OO Methodology OO Architecture.
Program Executive Office GIG Enterprise Services (PEO-GES)
Distribution and components
Dipanjan Chakraborty Anupam Joshi CSEE University of Maryland Baltimore County Anamika: Distributed Service Discovery and Composition Architecture for.
Be Better: Achieve Customer Service Excellence and Create a Lean RMA and Returns Process with Renewity RMA and the Power of Microsoft Azure MICROSOFT AZURE.
CORBA Alegria Baquero.
Inventory of Distributed Computing Concepts
Unit V Mobile Middleware.
A Component-based Architecture for Mobile Information Access
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Presentation transcript:

A Combat Support Agency Defense Information Systems Agency GIG EWSE Application and Service (EE212) 17 August 2011 Tactical Edge Service: Service Adaption

A Combat Support AgencyOutline Describe Service Adaption Strategies Show Technical Solution Using Example Problems Summarize Relevant EWSE Activities and Findings 2

A Combat Support Agency Tactical Edge Environment Fixed Environment An EWSE Approach to the Tactical Edge Service Problem Service Adaption: Develop service adaption techniques to tailor services based on tactical environment and physical limitations Technical Approach Framework Tactical Services Tactical Networks Enterprise Services Core Networks Network & Service Mgmt Identify management capabilities required to support the developed strategies Design techniques and patterns to overcome the constraints in tactical env. Techniques to improve network performance and robustness to meet the service layer requirements Strategy #2 Strategy #3 Strategy #4 Focus of this briefing Strategy #1 3

A Combat Support Agency Summary of Service Adaption Strategies Mitigating Tactical Edge Constraints Service Adaption Strategy Definition Tiered ServiceTiered service model is the technique to provide a simpler service with reduced functional capabilities to support constraints in the tactical edge environment. Tiered service model considers tactical edge constraints as part of requirements for service design. Service ProxyService proxy is the technique to perform proxy based service adaption at the edge of tactical domain to interoperate with other service domains, thereby improving service delivery to tactical edge users. Service proxy uses techniques such as data compression, store-n-forward and adaptive content delivery to mitigate constraints in the tactical edge environment. Service BrokerService broker is the technique to use broker to reach multiple instances of a service residing on different servers to improve the service availability and quality. By reaching multiple instances of a service, service broker can mitigate the risk of disconnected server(s) at the tactical edge. 4

A Combat Support Agency Mapping Service Adaption Strategies to Tactical Edge Constraints Tactical Edge Constraints Tiered Capabilities Service ProxyService Broker DisconnectedXX Low BandwidthXX Limited Resources (SWaP: Size, Weight, Power) XX 5

A Combat Support Agency Tiered Service Model Package mission capabilities into different services. Each service is composed of selected capabilities. –Service = { Capability 1, Capability 2, …, Capability N} Define one or more levels for a capability depending on the operational needs –Levels for Capability i = {Li1, …, Lim} Tailor service capability feature set and associated functional level to adapt to specific constraints in different tactical environments. 6

A Combat Support Agency Determine Tiered Capabilities for Different Tactical Environments Determine Tiered Capabilities for Different Tactical Environments Determine service granularity for supporting mission capabilities based on both functional requirements and tactical edge constraint requirements. Capabilities meeting the same constraint requirements could be grouped together. Identify levels for a capability based on different levels of tactical edge constraints. Tactical Mobile PlatformDismounted User Tactical Fixed Center Tactical Mobile Center Application Services Infrastructure Services Mission Capabilities Mission Capabilities Mission Capabilities Mission Capabilities Sync Reduced Capabilities and Capability Levels at Further Edge Application Services Infrastructure Services Legend Capability (Full) Capability (Reduced Levels) 7

A Combat Support Agency Example Tiered UC Capabilities for Different Tactical Environments Functional Requirements Tactical Edge Constraint Requirements (Bandwidth) Chat & Presence VoiceVideo >1Mbps <80Kbps 80Kbps – 1Mbps UC Capabilities for Tactical Fixed Center & Tactical Mobile Center UC Capabilities for Mobile Platform UC Capabilities for Dismounted User Reduced Capabilities at Further Edge 8

A Combat Support Agency Proxy for Service Adaption Perform techniques, such as data compression, data caching, store-n-forward, adaptive content delivery, QoS and data/protocol translation on Proxy to adapt services to tactical edge environment –Data compression using technologies such as binary XML can significantly improve the efficiency of using limited network bandwidth by condensing the amount of data delivered over the tactical edge network. –Store-n-forward can mitigate the data loss caused by disconnected network because the data would be stored on the proxy and redelivered once the network connectivity is restored. –Adaptive content delivery can perform functions, such as message filtering, to control content delivered to tactical devices with limited resources and bandwidth. –Data and protocol translation are often required to support interoperability between GIG core services and tactical services since tactical services may use design techniques unique to tactical edge environment to deal with tactical edge constraints (e.g., binary XML at tactical edge vs. standard XML in GIG core). 9

A Combat Support Agency Comparing Messaging Efficiency Among Binary XML, GZipped XML and XML XML = 100% Tens of test cases executed EXI is an example of binary XML technology and can effectively compress XML messages, e.g., up to 10 – 100 times smaller than XML in some best cases. Gzipped XML EXI - Binary XML 10

A Combat Support Agency Service Broker Use service broker to distribute a service request to multiple service instances on multiple tactical nodes. –If one tactical node hosting the service is disconnected, the client can still receive information from other nodes hosting the same service. Service broker may also aggregate and/or adapt results returned from multiple service instances. –Support different approaches of result aggregation, such as sorted by relevance and grouped by sources. –Adapt results to mitigate tactical edge constraints, e.g., message filters can be applied to control the amount of data delivered to a client. 11

A Combat Support Agency Problem Description –Video streaming service is not available to war-fighters in the tactical last mile. What Caused the Problem –Devices in the tactical last mile can only receive and play low bit rate live video and only limited bandwidth is available. Mitigation Techniques –Use Tiered Capability Levels. –Use Tiered Video Streaming Delivery design pattern. Problem 1: Video Streaming To Tactical Last Mile Problem 12

A Combat Support Agency Design Pattern Example 1 – Tiered Video Streaming Delivery 13

A Combat Support Agency Design Pattern Example 1 (Cont’d) – Tiered Video Streaming Delivery 50 Kbps (1 fps) Dismounted User Tactical Fixed Center 1 Mbps (30 frames per sec) 500 Kbps (15 fps) 100 Kbps (5 fps) Tactical Mobile Center Mobile Platform Tiered Capability Level for VDS Video Streaming Service (VDS) Capability Level 1 VDS Capability Level 2 VDS Capability Level 3 VDS Capability Level 4 Highlights of the Design Pattern –Use video encoding technologies (such as Scalable Video Coding from ITU-T) supporting variable frame or bit rates. –Adapt video frame or bit rate delivered to an tactical edge enclave based on the enclave’s available bandwidth. –This design pattern has been implemented by streaming server vendors and used by video streaming service providers. 14

A Combat Support Agency Problem Description –War-fighters in the tactical edge environment may experience poor service performance, such as long response time, when accessing enterprise services in the GIG core. What Caused the Problem –Enterprise services designed for the GIG core environment can not deal with DIL (Disconnected, Intermittent Connectivity and Limited Bandwidth) constraints in the tactical edge environment. Mitigation Techniques –Use Proxy for service adaption. –Use Proxy-based Service Adaption design pattern. Problem 2: Performance Problem for War- fighters Accessing Enterprise Services 15

A Combat Support Agency Design Pattern Example 2 – Proxy-based Service Adaption 16

A Combat Support Agency Design Pattern Example 2 (Cont’d) – Proxy-based Service Adaption Highlights of the Design Pattern –Provide transparence to enterprise services in the GIG core environment since proxy can perform service adaption on behalf of enterprise services. –Improve service performance delivered to users in the tactical edge environment. On behalf of enterprise services, proxy uses adaption techniques tailored to deal with tactical edge constraints, such as data compression and adaptive content delivery. –Rear proxy is used at the boundary between GIG core and tactical edge while Forward proxy can be used at the boundary between two tactical edge enclaves. –This design pattern has been used in DoD PoRs, such as Army SOSCOE. 17

A Combat Support Agency Problem Description –War-fighters in the tactical first mile sometimes encounter the loss of services. What Caused the Problem –Tactical platforms hosting services can often be disconnected due to unstable wireless network connections caused by multipath, obstruction, hostile interference and other impairments in the tactical edge environment. Mitigation Techniques –Use Service Broker to improve the service availability. –Use Service Broker design pattern. Problem 3: Unreliable Service Problem in Tactical First Mile 18

A Combat Support Agency Design Pattern Example 3 – Service Broker 19

A Combat Support Agency Design Pattern Example 3 (Cont’d) – Service Broker Highlights of the Design Pattern –Improve service availability by distributing service requests to multiple instances of the same service. –Enhance information sharing and situation awareness by aggregating responses from multiple service instances. –Filtering, adaptive content delivery and other adaption techniques may also be applied by the service broker to improve service performance. –This design pattern has been used in DoD Content Discovery service. 20

A Combat Support Agency Way Ahead Use adaption strategies, such as tiered services, proxy gateway and service broker, to improve the performance of service delivery to tactical users by mitigating a variety of tactical edge constraints. Next steps: –Summarize new findings from upcoming EWSE IPTs such as SO for DIL. –Introduce adaption strategies for tactical services to GIG software developer communities. 21