TML, Espoo1 An Evaluation of Identity-Locator Split with Legacy End-hosts and Applications Master Thesis Tao Wan 22 April 2009 Supervisor: Professor Sasu.

Slides:



Advertisements
Similar presentations
MIF API Extension Discussion MIF IETF 78 Dapeng Liu Yuri Ismailov.
Advertisements

IPv4 Run Out and Transitioning to IPv6 Marco Hogewoning Trainer, RIPE NCC.
Analysis of Tools to Support Remote Access to a K12 Classroom John Bowling.
Reza hooshangi ( ). short history  One of the last major challenges for the web is to enable human communication via voice and video: Real Time.
TDTS21 Advanced Networking
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
How’s My Network (HMN)? A Java approach to Home Network Measurement Alan Ritacco, Craig Wills, and Mark Claypool Computer Science Department Worcester.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
ITINERANT: TCP Socket Migration Titus Winters Dan Berger CS 202: Spring ‘03.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Latest version of Protocol.
Computer Network Architecture and Programming
1 A Comparison of Mechanisms for Improving TCP Performance over Wireless Links Course : CS898T Instructor : Dr.Chang - Swapna Sunkara.
Advanced UDP Sockets© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
ECCP A Formally-Verified Migration Protocol For Mobile, Multi-Homed Hosts Matvey Arye Joint work with: Erik Nordström, Robert Kiefer Jennifer Rexford, Michael.
1 Introduction on the Architecture of End to End Multihoming Masataka Ohta Tokyo Institute of Technology
Host Identity Protocol
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
IETF DMM WG Mobility Exposure and Selection WT Call#2 Nov 6, 2014.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
HIP API issues in base spec Tom Henderson IETF-59, March 3, 2004.
An Agile Vertical Handoff Scheme for Heterogeneous Networks Hsung-Pin Chang Department of Computer Science National Chung Hsing University Taichung, Taiwan,
Throughput: Internet scenario
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Chapter Two Application Layer Prepared by: Dr. Bahjat Qazzaz CS Dept. Sept
Socket Lab Info. Computer Network. Requirement Use TCP socket to implement a pair of programs, containing a server and a client. The server program shall.
CWIC Developers Meeting January 29 th 2014 Calin Duma Service Level Agreements High-Availability, Reliability and Performance.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
POLICY ENGINE Research: Design & Language IRT Lab, Columbia University.
Advanced Network Architecture Research Group 2001/11/74 th Asia-Pacific Symposium on Information and Telecommunication Technologies Design and Implementation.
OPERETTA: An Optimal Energy Efficient Bandwidth Aggregation System Karim Habak†, Khaled A. Harras‡, and Moustafa Youssef† †Egypt-Japan University of Sc.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Dynamic and Persistent Scheduling for Voice over IP Traffic in the Long-Term Evolution Uplink Master’s.
VoIP Signaling Protocols A signaling protocol is a common language spoken by telephones and call-management servers, the PSTN, and legacy PBX systems as.
Flashback: A Peer-to-Peer Web Server for Flash Crowds Presented by Tom Batkiewicz CS 587x Fall ‘07.
TCP Offload Through Connection Handoff Hyong-youb Kim and Scott Rixner Rice University April 20, 2006.
Information Technology Service Availability Metrics Trey Felton IT Account Manager COPS/RMS September 2009.
Intel Research & Development ETA: Experience with an IA processor as a Packet Processing Engine HP Labs Computer Systems Colloquium August 2003 Greg Regnier.
HIP research group 1 HIP-RG meeting, IETF 65 March 24, 2006 Andrei Gurtov and Tom Henderson
Can We Talk Now? Technology Selection for an Intelligent Status Tracking System 5 th June 2009 Sidney Shek ( ) Supervisor:
Measuring and Mitigating Web Performance Bottlenecks in Broadband Access Networks Srikanth Sundaresan, Nick Feamster (Georgia Tech) Renata Teixeira (Inria)
Measuring the Capacity of a Web Server USENIX Sympo. on Internet Tech. and Sys. ‘ Koo-Min Ahn.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
Socket Programming.
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
WebRTC Don McGregor Research Associate MOVES Institute
Trickles :A stateless network stack for improved Scalability, Resilience, and Flexibility Alan Shieh,Andrew C.Myers,Emin Gun Sirer Dept. of Computer Science,Cornell.
Presented by: Xianghan Pei
ID-LOC Proposal Philip Matthews Eric Cooper Alan Johnston Avaya With contributions from Cullen Jennings, David Bryan, and Bruce Lowekamp.
The process of establishing a connection between a client and a server is called as Client – Server communication.
HIP research group 1 HIP-RG meeting, IETF 64 November 11, 2005 Tom Henderson
1 Requirements of Carrier Grade NAT (CGN) draft-nishitani-cgn-00.txt draft-shirasaki-isp-shared-addr-00.txt NTT Communications Corporation Shin Miyakawa.
Agenda Background Project goals Project description –General –Implementation –Algorithms Simulation results –Charts –Conclusions.
NAT Traversal in HIP Xiang LIU TML/HIIT 1.
Introduction to threads
Network Programming 10- SMTP-POP3
Module 8: Securing Network Traffic by Using IPSec and Certificates
Downloading from Multiple Server Sources
Sami Ehoniemi Master’s Thesis: Performance of Multimedia Services in Packet Switched Mobile Networks Sami Ehoniemi
Module 8: Securing Network Traffic by Using IPSec and Certificates
Multiple HTTP Requests from One TCP Connection
Presentation transcript:

TML, Espoo1 An Evaluation of Identity-Locator Split with Legacy End-hosts and Applications Master Thesis Tao Wan 22 April 2009 Supervisor: Professor Sasu Tarkoma Instructor: M.Sc Miika Komu (Tech)‏

TML, Espoo2 Agenda Motivation Motivation TCP user timeout TCP user timeout TCP retransmission trigger TCP retransmission trigger TCP measurements TCP measurements Future work and Conclusion Future work and Conclusion

TML, Espoo3 Motivation  HIP requires changes to the networking stack, challenging to deploy  TCP is the bottleneck for mobility  Referrals problem Applications passing HIT or LSI Applications passing HIT or LSI Client apps already doomed due to NATs Client apps already doomed due to NATs

TML, Espoo4 TCP user timeout option  Allows one end of a connection to advertise its current user timeout value to its peer  Allows hosts to request both specific user timeouts for new connections and request changes to the effecitve user timeouts of established connections.  Allows hosts to exchange per-connection user timeout requests to shutdown the connection

TML, Espoo5 TCP Retransmissons Trigger To signal the retransmission trigger depends on the specifics of a host and its environment To signal the retransmission trigger depends on the specifics of a host and its environment The TCP retransmission trigger does not change the semantics of TCP, just increases performance The TCP retransmission trigger does not change the semantics of TCP, just increases performance

TML, Espoo6 TCP Throughput during Handover

TML, Espoo7 Application Evaluation List of manually tested applications: Pidgin and Ejabberd Pidgin and Ejabberd Subversion and Arch Subversion and Arch IRCd and Irssi IRCd and Irssi VLC VLC Postfix, Courier Mail Server and Mozilla Thunderbird Postfix, Courier Mail Server and Mozilla Thunderbird SIP communicator SIP communicator

TML, Espoo8 Application statistics 112 most popular C-based open source network applications ( 112 most popular C-based open source network applications ( 86 socket based applications 86 socket based applications Calls socket() Calls socket() 26 framework based applications 26 framework based applications Does not call socket()‏ Does not call socket()‏

TML, Espoo9 Referral analysis

TML, Espoo10 Future work and Conclusions Userspace ipsec implemented Userspace ipsec implemented - Efficient, but costs CPU cycles - Efficient, but costs CPU cycles - Measurements in gigabit network - Measurements in gigabit network TCP reconfiguration did change TCP mis-behavior on handovers TCP reconfiguration did change TCP mis-behavior on handovers - Results are not conclusive - Results are not conclusive - Implementation of TCP user timeout option - Implementation of TCP user timeout option - Implementation of IPsec queuing - Implementation of IPsec queuing Evaluation of the impact on the referral problem basd on socket API statistics for applications Evaluation of the impact on the referral problem basd on socket API statistics for applications - Detailed analysis of application source code and larger data set for statistics - Detailed analysis of application source code and larger data set for statistics

TML, Espoo11 Q & A Q & A