Some Current Research/Challenges 04/23/2008. Admin. r Multimedia applications and QoS slides are linked on the schedule page r Programming assignment.

Slides:



Advertisements
Similar presentations
Network Resource Broker for IPTV in Cloud Computing Lei Liang, Dan He University of Surrey, UK OGF 27, G2C Workshop 15 Oct 2009 Banff,
Advertisements

P4P: ISPs and P2P Laird Popkin, Pando Networks Doug Pasko, Verizon.
P4P Working Group Doug Pasko, Co-Chair, Verizon
Presented by: Eng. Karam Al-sofy
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
6.033: Intro to Computer Networks Layering & Routing Dina Katabi & Sam Madden Some slides are contributed by N. McKewon, J. Rexford, I. Stoica.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
Optical communications & networking - an Overview
Computer Networks and the Internet CMPT 109 Montclair State University.
Resource Pooling A system exhibits complete resource pooling if it behaves as if there was a single pooled resource. The Internet has many mechanisms for.
TECHNOLOGY GUIDE 5 Basics of the Internet and the World Wide Web.
CS 381 Introduction to computer networks Lecture 2 1/29/2015.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Internetworking Fundamentals (Lecture #1) Andres Rengifo Copyright 2008.
Introduction© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science.
Traffic Engineering With Traditional IP Routing Protocols
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Data Transmission Slide 1 Continuous & Discrete Signals.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
BA 471 – Telecommunications and Networking Dr. V.T. Raja Oregon State University
Chapter 3 _2 Making the Connection: The Basics of Networking.
P4P: Proactive Provider Assistance for P2P Haiyong Xie (Yale) *This is a joint work with Arvind Krishnamurthy (UWashington) and Richard.
COMPUTER NETWORKS.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
Recap: Last Class  Introduction to computer networks  Definition of a computer network  Circuit switching versus packet switching  Elements of a computer.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Networks and Telecommunications
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Data Transmission The basics of media, signals, bits, carries, and modems (Part III)
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Module 2: Information Technology Infrastructure
Lector: Aliyev H.U. Lecture №15: Telecommun ication network software design multimedia services. TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES THE DEPARTMENT.
P4P : Provider Portal for (P2P) Applications Laboratory of Networked Systems Yale University.
P4P: Provider Portal for Applications Haiyong Xie, Y. Richard Yang Arvind Krishnamurthy, Yanbin Liu, Avi Silberschatz SIGCOMM ’08 Hoon-gyu Choi
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
Bandwidth and noise. Bandwidth basically means how fast your signal can change or how fast can you send out symbols. – Symbol is something you send out.
1 Link Layer: MAC and Summary 11/30/2009. Admin. r Exam 2 m Covers network and link layers m Format similar to exam 1; see samples of exam 2 from past.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
The Physical Layer Lowest layer in Network Hierarchy. Physical transmission of data. –Various flavors Copper wire, fiber optic, etc... –Physical limits.
P4P : Provider Portal for (P2P) Applications Laird Popkin Pando Networks, Inc Haiyong Xie Laboratory of Networked Systems Yale University.
BA 471 – Telecommunications and Networking Dr. V.T. Raja Oregon State University As presented in Dr. Marshall’s BA471 class, Winter.
Chapter 4 Telecommunications and Networking The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
P4P: Towards Cooperation between P2P and ISPs Haiyong Xie (Yale) Arvind Krishnamurthy (U. Washington) Avi Silberschatz (Yale) Y. Richard Yang (Yale)
COMPUTER NETWORKING 2 LECTURE 3: BROADBAND TECHNOLOGY & DSL.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 2 Omar Meqdadi Department of Computer Science and Software Engineering.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Introduction to Communication Lecture (07) 1. Bandwidth utilization Bandwidth utilization is the wise use of available bandwidth to achieve specific goals.
P4P: Proactive Provider Assistance for P2P Haiyong Xie Yale University.
INTERNET PROTOCOL TELEVISION (IP-TV)
Chapter 2 PHYSICAL LAYER.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
P4P : Provider Portal for (P2P) Applications Haiyong Xie, Y
Local Area Networks Honolulu Community College
Introduction to electronic communication systems
INTERNET PROTOCOL TELEVISION (IP-TV)
P4P: ISPs and P2P Laird Popkin, Pando Networks Doug Pasko, Verizon.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Optical communications & networking - an Overview
Presentation transcript:

Some Current Research/Challenges 04/23/2008

Admin. r Multimedia applications and QoS slides are linked on the schedule page r Programming assignment 3 m Due on May 5 r Office hours during break m please send to Antonis and me for appointments

Objectives r A brief introduction to some computer networking projects we are working on here at Yale m disclaimer: some projects I describe are not Yale projects r More importantly, focus on perspectives that challenge what we have covered in class

Objectives of Networking Research r Faster r More efficient r More reliable r More ubiquitous r Safer

Faster

“ Within five years, all media will be delivered across the Internet.” - Steve Ballmer, CEO Microsoft, D5 Conference, June 2007 The Internet is increasingly being used for content and media delivery Rising Content Distribution Demand Some speculation

Rising Bandwidth Demand r “Desperate Housewives” m 210MB/hour for 320x240 H.264 Video iTunes image m assume 10,000,000 households downloads r How long will that take to download? m 3 64Gbps non-stop ! r HD video is 7~10 times larger than non-HD video r AT&T predicts 50-fold increase in broadband to 2015 (75% per year)

Internet Bandwidth Growth Source: TeleGeograph Research

What Determines Transmission Rate? r Service: transmit a bit stream from a sender to a receiver Encoding channel Decoding output bit stream input bit stream sender receiver Question to be addressed: how much can we send through the channel ?

Basic Theory: Channel Capacity r The maximum number of bits that can be transmitted per second (bps) by a physical media is: where W is the frequency range, S/N is the signal noise ratio. We assume Gaussian noise.

Fourier Transform r Suppose the period of a data unit is f (=1/T), then the data unit can be represented as the sum of many harmonics (sin(), cos()) with frequencies f, 2f, 3f, 4f, … r A reasonably behaved periodic function g(t), with minimal period T, can be constructed as the sum of a series of sines and cosines:

char “b”

Signal Attenuation r The quality of signal will degrade when it travels m loss, frequency passing

Frequency Dependent Attenuation r The received signal will be distorted even when there is no interference and the transmitted signal is “perfect” square waveform Example: Voltage- attenuation magnitude ratios of Category 5 cable. For example, 500 feet of cable attenuates a 10-MHz, 1-V signal to 0.32 V, which corresponds to about –9.90 dB

Example Example: W=3000Hz, S/N  4000 telephone network sender modem Modem Modulation (digit->analog) 3Khz bandwidth (add white noise) ISP demodulation output bit stream input bit stream Analog to Digital quantization for transmitting through the digital telephone backbone ISP modem V.34 (33.6kbps Dialup Modem) channel

Example: ADSL r Spectrum allocation: divided into a total of 256 downstream and 32 upstream tones, where each tone is a standard 4kHz voice channel r During initial negotiation, a tone is used only if the S/N is above 6 db (  4)

The Wire: Fiber r A look at a fiber r How it works? A graded index fiber

The Wire: Fiber r Wide spectrum at low loss: ~0.3db/km (c.f. copper km without repeater m bit error rate (c.f. copper ) r bandwidth of a single fiber m commercial: 1.6Tbps using 169 channels m lab: 10 Tbps m theoretical: Tbps grow_ html r Lightweight: 33 tons of copper to transmit the same amount of information carried by ¼ pound of optical fiber

Advantages of Fibers

How to Do Switching? r Optical-Electrical-Optical r Optical switch: optical micro-electro-mechanical systems (MEMS) Optical path One optical switch

Example: MEMS Optical Switch r Using mirrors, e.g. Lambda Router

Implications  Fine-grained switching may not be feasible  What is the architecture of optical networks: packet switching, circuit switching, or others?

Higher Efficiency

Integrating P2P into Internet Content Distribution r Initially m standalone applications m rogue technology (e.g., copyright issues) r Recent development m becomes part of content delivery infrastructure m integrated P2P + servers solutions m some projects BBC's iPlayer (tremendously popular), Joost, Pando and NBC, MSN video Verizon P2P, Thomson/Telephonica nanoData Center

Edge Network Regional Routers Internet Transit Traditional content distribution P2P, e.g., BT More Viewers = Worse performance Higher cost P2P Efficiency - Network oblivious peering -> scattered traffic - Higher financial cost - Inefficiency

P2P Problem I: Bandwidth Usage Cache Logic Research: Internet Protocol Breakdown

P2P Problem II: Increased Operational Costs Violating Internet economics (bypass BGP): relay traffic between providers m increased network operational costs provider customer provider provider to customer

r An iterative process between two sets of adaptation: m ISP: traffic engineering to change routing to shift traffic away from higher utilized links current traffic pattern  new routing matrix m P2P: direct traffic to better performing peers current routing matrix  new traffic pattern P2P Problem III: Inefficient Interactions

ISP optimizer interacts poorly with P2P. ISP Traffic Engineering+ P2P Latency Optimizer -red: P2P adjust alone; fixed ISP routing -blue: ISP traffic engineering adapt alone; fixed P2P communications

P2P Countermeasures use random ports encrypt traffic... Attempts to Address P2P Efficiency Problems ISPs Address P2P upgrade network infrastructure deploy P2P caching devices terminate user connectivity rate-limit P2P traffic... Network neutrality argument

The Fundamental Problem r Traditional Internet architectural feedback to application efficiency is limited: m routing (hidden) m rate control through coarse-grained TCP congestion feedback r To achieve better efficiency, needs explicit communications between network resource providers and applications m a network resource provider can be a traditional ISP (AT&T, Verizon) or a content distribution ISP such as Akamai, or a caching provider

P4P Objective r Design a framework to enable better providers and applications cooperation r ISP perspective: m guide applications to achieve more efficient resource usage m avoid undesirable (expensive/limited capacity) links to more desirable (inexpensive/available capacity) links r Resource providers such as caching, CDN providers perspective m provide applications with better, on-demand resources/quality r P2P perspective: m better performance for users m decrease incentives for ISPs to “manage” applications

P4P Framework – Design Goals r Performance improvement r Scalability and extensibility: support diverse ISP objectives and applications scenarios in large networks r Privacy preservation r Ease of implementation r Open standard: any ISP, provider, applications can easily implement it

The P4P Framework r Data plane r control plane m iTracker: a portal for each network service provider m iTracker of a provider can be identified in multiple ways e.g., through DNS SRV records m An iTracker provides multiple interfaces so that others can interact each provider decides the interfaces it provides each interface is encoded in Web Service Definition Language (WSDL) for extensibility

Control Path Interfaces r provider capabilities interface: request QoS, CoS, servers participation in content distributions r topology interface: topology and connectivity  ISP policy and guideline interface: e.g., traffic balance ratio for inter-AS peering links, time of day preference r …

P4P Control Path : Request Capability ISP B 1: pTracker [content provider] requests ISP B’s participation in content distribution 2: Provider B allocates servers to accelerate content distribution 3: pTracker includes ISP B’s servers in returned peering sets to peers ISP A pTracker a iTracker B iTracker A b pTracker/content provider requests ISP capabilities to accelerate content distribution.

The Virtual Topology Interface r An interface to guide peer selection r An interface as an optimization decomposition interface m guidance through “virtual costs”

Background: Peer Selection pTracker webserver user “register” ID :6881 ID :5692 ID :4545 … ID :6882 list of peers Peer 40 Peer 2 Peer 1 … BitTorrent as an example HTTP GET MYFILE.torrent MYFILE.torrent

ISP A Control Path: Virtual Topology Interface pTracker iTracker peer Information flow: 1. pe er queries pTracker 2. pTracker asks iTracker for guidance (occasionally) 3. iTracker returns high-level peering suggestions 4. pTracker selects and returns a set of active peers, according to the suggestions iTracker can be run by trusted third parties, P2P network, or ISPs for security/privacy

The Virtual Topology Interface: Network r PID: set of Points of Presence (PoP) r E: set of links connecting PoPs r c e : the link capacity of link e r I e (i, j): indicator if link e is on the route from PoP i to PoP j r b e : amount of background traffic on link e

The Virtual Topology Interface: P2P r Assume K applications running inside the ISP m we call each running P2P application a swarm r Let T k be the set of acceptable demands for swarm k m t k in T k specifies traffic demand t k ij from each pair of source-destination PoPs (i,j)

The Virtual Topology Interface r Consider an example: ISP wants to minimize utilization of the highest utilized link m the utilization of the highest utilized link is called the Maximum Link Utilization (MLU)

ISP MLU: Transformation

ISP MLU: Dual r Introducing p e (≥ 0) for the inequality of each link e r To make the dual finite, need

ISP MLU: Dual r Then the dual is where p ij is the sum of p e along the path from PoP i to PoP j

ISP MLU Dual : Interpretation r Each swarm k chooses t k in T k to minimize weighted sum of t ij r The interface between a swarm and the ISP is the “shadow prices” {p ij }

Topology with Costs (Illustration) PID1PID2 PID3PID6 PID5PID Each PID has: IP “prefix” Each link has “Price” Prices are directional

ISP Update r At update m+1, calculates

P2P Operations r Each swarm optimizes its own performance, then picks ISP-friendly peering r For example, selects where  is tolerance, say 80%.

Example: Multihoming Multihoming m A common way of connecting to Internet Smart routing m Intelligently distribute traffic among multiple external links m Improve performance m Improve reliability  Reduce cost User ISP 1 ISP K Internet ISP 2

Interdomain Topo PID1PID2 PID3PID6 PID5PID Provider1 Provider 2 Provider 3 Cost?

Integrating Cost Min with P4P

Field-Tests r So far integrated with m BitTorrent on PlanetLab m Pando: a P2P software (18 million downloads) m Maze: about 5 million users r Run iTrackers  Verizon at Yale m Telephonica at its own location r Collect data from Feb. 21 to March 2

ISP Perspective: Overall

Traffic within Verizon

Average Hop Each Bit Traverses r Why less than 1: many transfers are in the same metro-area; also same metro-area peers are utilized more by tit-for-tat.

P2P Perspective: Download Rates

Current Status r P4P-WG r Next step m wider integration m IETF standard AT&T Bezeq Intl BitTorrent CacheLogic Cisco Systems Grid Networks Joost LimeWire Manatt Oversi Pando Networks PeerApp Telefonica Group VeriSign Verizon Vuze Univ of Washington Yale University Abacast AHT Intl Akamai Alcatel Lucent CableLabs Cablevision Comcast Cox Comm Juniper Networks Microsoft MPAA NBC Universal Nokia RawFlow Solid State Networks Thomson Time Warner Cable Turner Broadcasting

Higher Reliability

Is the Internet Reliable? r A key design objective of the “Internet” (i.e., packet-switched networks) is robustness r Does the Internet infrastructure achieve the target reliability objective of a highly reliable system (99.999%)?

Perspective r 911 Phone service (1993 NRIC report +) m 29 minutes per year per line m % availability r Std. Phone service (various sources) m 53+ minutes per line per year m % availability r …what about the Internet? m Various studies: about 99.5% m Need to reduce down time by 500 times to achieve five nines; 50 times to match phone service

Threats to Internet Availability: Operator Errors - 80% IT budget spent on maintaining status quo - human configuration errors account for about 60% of all network outages. Zeus Kerravala, Yankee Group

Shadow Configurations as a Network Management Primitive

Threats to Internet Availability: Accidents Stockton Rialto El Paso Oroville - 675,000 excavation accidents Sprint Backbone: Jan. 9, 2006

Reliability as an Interdomain Service r ISPs pool resources to form an “insurance” pool m implications? r Resilient routing reconfiguration

Threats to Internet Availability: Natural Disasters

Unreachable Networks: 10 days

Internet Disaster Recovery Response r Why slow response? m the cable repairing is slow: not until 21 days after quake m BGP is not designed to create business relationship r Objective m a meta-BGP to facilitate discovery and creation of BGP business relationship

More Ubiquitous Connectivity

Goal of Network Access “People and their machines should be able to access information and communicate with each other easily and securely, in any medium or combination of media – voice, data, image, video, or multimedia – any time, anywhere, in a timely, cost-effective way.” Dr. G. H. Heilmeier, Oct 1992

Network Access: Ubiquitous Access r Goals m be connected whenever possible via the “best” available network ubiquitous location-aware, e.g. –what services (e.g., printers) are available “here”? –where is the “nearest” database/cache? –where is the “nearest” ATM? m handle multiple network interfaces may operate at the same time m support the application’s graceful adaptation to the available bandwidth and latency m transparent handoff of user sessions among different devices/networks r Example: wireless overlay m may take off if we can combine cellular and WLAN Motorola CN 620

Access: Build an Access Network Fast: Ad-Hoc Networks

Faster Wireless

Recap: Traditional Routing r So far, all routing protocols in wireless also use the framework of traditional Internet routing we covered in class m a graph representation of underlying network point-to-point graph edges with costs m select a lowest-cost route for a src-dest pair m commit to a specific route before forwarding

A Simple Motivating Scenario r Assumes independent loss r Internet architecture computes routing with one pre- committed route

Implications?

How about Using Multiple Paths? Traditional Routing 3 forwarders 4 links Opportunistic: 7 forwarders 18 links

Opportunistic Coding

Motivating Scenario r A sends 1 packet to B; B sends packet 3 to A r If R has both packets 1 and 3, it can combine them and explore coding and broadcast nature of wireless ABR

Faster Wireless: Summary r Both approaches dispose the point-to-point Internet link abstraction r Both approaches take advantage of opportunities and leverage broadcast nature of wireless medium to its advantage

New Access: Connecting the Physical World r Mark Weiser from Xerox: transparent computing is the ultimate goal m computers should disappear into the background

Network Access: Sensors N S EW 2 Axis Magnetic Sensor 2 Axis Accelerometer Light Intensity Sensor Humidity Sensor Pressure Sensor Temperature Sensor r COTS sensors m embedded microprocessor m RF transceiver 916MHz, ~20m range, 4800 bps m 1 week fully active, 2 m recharge by solar, wind, …

Course Summary r The field is moving fast, broad and not well-defined ! r Driven by Technology, Infrastructure, Applications, and Understanding: m technology e.g., wireless/optical communication technologies and device miniaturization (sensors) m infrastructure e.g., global infrastructure m applications e.g., P2P, content distribution, sensing, grid computing, VoIP, IPTV m understanding e.g., resource sharing principle, routing principles, mechanism design, and randomized access