Agenda 1. Quiz 2. CMIS 3. BI 4. MANET. Management In The OSI Stack ACSE ROSE Presentation Session Transport Network Data Link Physical Mgt Appl Process.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Bandwidth Management Framework for IP based Mobile Ad Hoc Networks Khalid Iqbal ( ) Supervisor: Dr. Rajan Shankaran ITEC810 June 05, 2009.
MPAC 2004Rae Harbird 1 RUBI Adaptive Resource Discovery for Ubiquitous Computing Rae Harbird Stephen Hailes
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Multicasting in Mobile Ad-Hoc Networks (MANET)
Real Time Flow Handoff in Ad Hoc Wireless Networks using Mobility Prediction William Su Mario Gerla Comp Science Dept, UCLA.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
CS2032 DATA WAREHOUSING AND DATA MINING
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Distributed Systems Architecture Presentation II Presenters Rose Kit & Turgut Tezir.
How Business Intelligence Software Works and a Brief Overview of Leading Products Jai Windsor MIS 5973 December 8, 2005.
Ad Hoc Wireless Routing COS 461: Computer Networks
HARP-Hybrid Ad Hoc Routing Protocol Navid NIKAEIN Christian BONNET Neda NIKAEIN © 2001 Navid Nikaein Eurecom Institute.
The Zone Routing Protocol (ZRP)
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Routing in mobile ad-hoc networks (MANETs). 1. WHAT IS A MANET ? A MANET can be defined as a system of autonomous mobile nodes A MANET can be defined.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Mobile Adhoc Network: Routing Protocol:AODV
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Introduction to CMIS/P (Common Management Information Services / Protocol) 陳彥錚 (Yen-Cheng Chen)
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
DDR-based Multicast routing Protocol with Dynamic Core (DMPDC) Shiyi WU, Navid Nikaein, Christian BONNET Mobile Communications Department EURECOM Institute,
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Computer Networks Dr. Jorge A. Cobb The Performance of Query Control Schemes for the Zone Routing Protocol.
The Performance of Query Control Schemes for the Zone Routing Protocol Zygmunt J. Haas Marc R. Pearlman.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
William Stallings Data and Computer Communications
1 CMIS/CMIP. 2 Network Management Table of Contents CMIS CMIP CMIP vs. SNMP Summary.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Ad Hoc Multicast Routing
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Wireless Sensor Networks 5. Routing
Web Server Administration
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Zone Routing Protocol (ZRP)
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Routing design goals, challenges,
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Outline Introduction Routing in Mobile Ad Hoc Networks
Sensor Network Routing
Mobile Ad-Hoc Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad-hoc On-demand Distance Vector
by Saltanat Mashirova & Afshin Mahini
ECE453 – Introduction to Computer Networks
Proactive vs. Reactive Routing
Chapter 15 – Part 2 Networks The Internal Operating System
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
10th International Conference on Telecommunication, ICT’2003,
Routing protocols in Mobile Ad Hoc Network
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

Agenda 1. Quiz 2. CMIS 3. BI 4. MANET

Management In The OSI Stack ACSE ROSE Presentation Session Transport Network Data Link Physical Mgt Appl Process CMISE

Common Management Information Services (CMIS) Foundation: Each CMIS service is a single operation that a network management operation can perform. Any application that performs systems manage- ment is a CMISE-service-user. The existence of defined services between peer open systems is an important difference between CMIS and SNMP. CMIS has defined three classes of service Management Association Management Notification Management Operation

Common Management Information Services (CMIS) Management Association: M-INITIALIZE institutes an association M-TERMINATE terminates an association M-ABORT is used for abnormal termination Management Notification: M-EVENT-REPORT services are CMIS traps (although less structured)

Common Management Information Services (CMIS) Management Operation: M-GET is like Get-Request M-CANCEL-GET cancels M-GET M-SET is like Set-Request allowing modification of info M-ACTION is like Set-Request invoking new action, like delegating fault management M-CREATE creates another instance of a managed object M-DELETE deletes an instance of a managed object

CMIS/Common Management Information Protocol (CMIP) Foundation: Is the protocol that accepts operations and initiates instructions Uses ROSE to send messages across the network Problems (because it’s so powerful): Requires large amounts of overhead Is difficult to implement

Common Mgt. Information Services over TCP/IP (CMOT) ACSE ROSE Lightweight Presentation Protocol (LPP) Session TCP UDP IP Data Link Physical Mgt Appl Process CMISE Tough, really tough! ACSE (Association Control Service Element) handles association establishment & release. ROSE (Remote Operations Service Element) is the application protocol used to access remote systems. LPP is effectively an abbreviated Presentation Layer.

New Network Management Tools: Business Intelligence

The Problem (An e.g., of Net Mgt morphing into Knowledge Mgt): What is the “truth”? o Every department has reports, alerts, scores, etc., for IT to automate o Increasingly R&D, Marketing, Maintenance are operating from vastly different baselines & assumptions (e.g., Verizon Wireless) o Companies need a standardized platform to analyze business data o Organizations need to integrate conventional data sources, such as relational databases & on-line analytical processing (OLAP) with flat files, XML & Web services. o What drives standardization? o Architecture o Integration

New Network Management Tools: Business Intelligence One increasingly popular solution: Architecturally consistent data integration with BI software: o Ways of cleaning up data Fix the data source (depending on number of inputs) Construct cubes & data sources that filter out bad data Ignore the data and let end users filter it out manually (How you do this is dependent on the BI architecture) o Presenting a single version of the “truth” Integrate this intermediate layer with other data sources Web services XML files Spread sheets Develop calculated fields to ensure consistency Develop translation systems that bring in consistent information

New Network Management Tools: Business Intelligence BI By the numbers: 5 to 15 BI tools are used by Global 2000 companies & large government organizations 38% of IT execs have increasing budgets 48% of IT execs plan to maintain budgets $7.3 billion in projected software sales by % of report producers selected Excel CIOs surveyed by the Gartner Group identified BI as their # 2 Technology priority this year.

Business Intelligence Tools: General Qualities Tool Good ThingBad ThingStarting Price Cognos Ad hoc queries Linking reports $12,500 Enterprise BI Series 7 Actuate 8 Integrating disparate Ad hoc queries $500 per user with Service data sources Pack 1 Information Linking reports Dealing with $400 per seat Builders reserved words WebFocus 7 e.g., TOTAL Microsoft SQL Server Supports all OLAP Report $3,899 per 2000 Rpt & models (HOLAP, generation processor Analysis Svcs MOLAP & ROLAP)

Business Intelligence Tools: Functionality Tool Database Operating System Reports Cognos XML, DB2, Sybase, Windows, Easy Enterprise BI Oracle, SQL Server, Linux/AIX/HP-UX Series 7 Ingres Solaris Actuate 8 XML, DB2, Sybase, Windows, Easy with Service Oracle, SQL Server, Linux/AIX/HP-UX Pack 1 Engress, MySQL Solaris Information XML, DB2, Sybase, Windows, Easy Builders Oracle, SQL Server, Linux/AIX/HP-UX WebFocus 7 Engress, MySQL Solaris Microsoft XML, DB2, Sybase, Windows Harder SQL Server Oracle, SQL Server, 2000 Rpt & Engress, MySQL Analysis Svcs

New Network Management Tools: Net Comp Evaluation Services Wt. Congnos Actuate InfoBuild Microsoft Reporting 35% OLAP 30% Integration 20% Administration 10% Price 5% Total Score B+ B B C Note: Scores weighted 0-5

New Network Management Tools: Mobile Ad hoc Networks (MANETs)

New Network Management Tools: MANET Three types of protocols: o Proactive Protocols: Any node in the network has oneor more routes to any possible location in its routing table at any given time. o Reactive Protocols: Every node in a network obtains a routed to a destination on a demand fashion o Hybrid Routing Protocols: Every node acts reactively in the region close to its proximity and proactively outside of that region or zone

New Network Management Tools: Proactive MANET Optomized Link State Roputing (OLSR): o Based on the basic link state algorithm o Adapts to changes of the network without creating control messages overhead due to protocol flooding nature o Only multi-point relays are designated for link state updates

New Network Management Tools: Proactive MANET Optomized Link State Roputing (OLSR): o Principal Advantages (because each node maintains up-to-date routing table): o Low latency o High delivery ratio o Main disadvantage: Because of proactive nature and flooding mechanism, it may introduce a high routing overhead consuming a large portion of the available bandwidth.

New Network Management Tools: Reactive MANET Ad hoc On-demand Distance Vector (AODV): o Based on the Bellman-Ford algorithm o Uses originator and destination sequence numbers to avoid loops and the count-to-infinity problem o Routing table does not maintain a route for every possible destination—just destinations recently used (purpose is to reduce overhead) o Supports unicast and multicast routing

New Network Management Tools: Reactive MANET Ad hoc On-demand Distance Vector (AODV): o Principal Advantages o Reactive nature reduces the routing overhead o Destination sequence numbers address routing loops and the count-to- infinity problem o Principal Disadvantages o Replies to route discovery messages can introduce storming conditions o Periodic HELLO messages to maintain connectivity can overuse bandwidth

New Network Management Tools: Hybrid Routing Protocols Zone Routing Protocol (ZRP): o A distributed routing protocol that combines both a proactive and a reactive scheme for route discovery and maintenance o Creates zones where every node maintains one or more routes to every other node o Reactively maintains routing information for every node outside the zone o Maintains Intrazone Routing Protocol for routes in the zone and Intrazone Routing Protocol for finding available routes outside the zone

New Network Management Tools: Hybrid Routing Protocols Zone Routing Protocol (ZRP): o Principal Advantage: o Avoids flooding the network with route-request messages (as do reactive nets) o Principal Disadvantage: o Performance can vary greatly, depending on zone radius

Definitions Link State algorithm Definition: The basic concept is that every node receives a map of the connectivity of the network, in the form of a graph showing which nodes are connected to which other nodes. Each node then independently calculates the best next hop from it for every possible destination in the network. Bellman-Ford algorithm Definition: An efficient algorithm to solve the single-source shortest-path problem. Weights may be negative. The algorithm initializes the distance to the source vertex to 0 and all other vertices to ∞. It then does V-1 passes (V is the number of vertices) over all edges relaxing, or updating, the distance to the destination of each edge. Finally it checks each edge again to detect negative weight cycles, in which case it returns false. The time complexity is O(VE), where E is the number of edges.