Protocol design for All-IP Computer Framework Kouji Okada Keio University

Slides:



Advertisements
Similar presentations
TU/e Service Discovery Mechanisms: two case studies / IC2002 Service Discovery Mechanisms: Two case studies Control point Device UPnP Terminal Domain Host.
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
THINC: An Architecture for Thin-Client Computing Ricardo A. Baratto
ConnectionMigration 818L Network Centric Computing Spring 2002 Ishan Banerjee.
Chapter 2: Application Layer
MOBILITY SUPPORT IN IPv6
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
5/8/2006 Nicole SAN Protocols 1 Storage Networking Protocols Nicole Opferman CS 526.
Mobile IP Polytechnic University Anthony Scalera Heine Nzumafo Duminda Wickramasinghe Edited by: Malathi Veeraraghavan 12/05/01.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Process-to-Process Delivery:
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
Module 10 Configuring and Managing Storage Technologies.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Presentation on Osi & TCP/IP MODEL
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Implementing Network Access Protection
KIS – Cvičenie #5 IP konfigurácia v prostredí OS Windows Marián Beszédeš, B506
Slide 1 DESIGN, IMPLEMENTATION, AND PERFORMANCE ANALYSIS OF THE ISCSI PROTOCOL FOR SCSI OVER TCP/IP By Anshul Chadda (Trebia Networks)-Speaker Ashish Palekar.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
The Transport Layer application transport network data link physical application transport network data link physical application transport network data.
A Study of Wireless Virtual Network Computing Kiran Erra.
INDEX oWoWhat is TCP/IP protocol suite ? oDoDifferent layers. oEoEncapsulation. oPoProtocol Interface.
Configuring Network Access Protection
X-WindowsP.K.K.Thambi The X Window System Module 5.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Communication Networks - Overview CSE 3213 – Fall November 2015.
Networking Basics CCNA 1 Chapter 11.
Advanced Roaming & Mobility Scenarios in IPv6 Rafal Lukawiecki Strategic Consultant & Director Project Botticelli Ltd in.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
Internet Protocol Storage Area Networks (IP SAN)
Module 6: Network Policies and Access Protection.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Chapter 6.  Internet and characteristics of Internet.  Various Internet protocols  Static IP addressing and Dynamic IP addressing Prepared by Saher.
Third International Workshop on Networked Appliance 2001 SONA: Applying Mobile Agent to Networked Appliance Control S.Aoki, S.Makino, T.Okoshi J.Nakazawa.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
11 MAINTAINING A NETWORK INFRASTRUCTURE Chapter 9.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Module 8: Networking Services
OSI model vs. TCP/IP MODEL
Implementing Network Access Protection
A Study of Wireless Virtual Network Computing
Network Load Balancing
Data Networking Fundamentals
Introduction to Operating Systems
Client-Server Interaction
2002 IPv6 技術巡迴研討會 IPv6 Mobility
File Transfer Protocol
An introduction to the organization of the Internet Lab
Storage Networks and Storage Devices
Storage Networking Protocols
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
ECEN “Internet Protocols and Modeling”
iSCSI-based Virtual Storage System for Mobile Devices
OPS235 Install and Configure a DHCP Server
Lecture 2: Overview of TCP/IP protocol
An introduction to the organization of the Internet Lab
CS4470 Computer Networking Protocols
Presentation transcript:

Protocol design for All-IP Computer Framework Kouji Okada Keio University

Introduction Unwired networks release the user computer environments from the restriction of the “location” Always-on wireless connection Selectable wireless connectivity according to application characteristics Even with the unwired networks, users’ application environments are still complicated. Application specs are restricted by user terminals Users have to construct several application environment for each user terminals

Research Objectives Human Centric Computer Network Unbundle users from the restriction of “terminals” Independent of both of the “location” and the “terminals”, users continue to use same application environments. According to users’ application usage scenes, computer systems are re-configured dynamically All-IP Computer Architecture Replace the computer buses with IP networks Virtual computers which consists of IP networking computer devices Flexible computer environment re-configuration utilizing computing resources on the global IP network

IP Networks IP Networks CPUMemory DisplayKeyboardMouse Input/Output devices Host OS HDD Home Network Visiting Network Computing Resource Network All-IP Computer Architecture Home Rendezvous Manager (Home RM) Local Rendezvous Manager (Home RM)

Rendezvous Manager (RM) The device management server for each local networks Functionarities Device list management Resource allocation Types of RMs Local RM The RM located on the user’s current network Responsible for All-IP computers construction I/O devices, host computer Home RM The RM located on the user’s home HDD Remote RM The RM located on the user’s previous network (migration)

Host OS Device Device Driver IP Networks Operating System (OS) Device Device Driver Computer device analysis Host Computer Device Control OS Existing Computer ArchitectureAll-IP Computer Architecture Device dependant data/control messages over IP networks

Wire Protocols over IP iSCSI (Internet Small Computer System Interface) RFC 3720, RFC 3783 The protocols to handle SCSI command set on the TCP/IP protocol stack USB/IP Protocol Functionarities Deliver the USB data encapsulated as TCP segments on IP networks USB/IP server  The computer to which USB devices are connected USB/IP client  The computer on which USB devices connected to USB/IP servers are utilized Related internet-draft draft-muda-iusb-ps-00

All-IP computer scenario - Initialization - A user brings a small computer device called “user tag” The user tag contains the authentication information and device configurations When the user arrives at a new network, the user attaches the user tag to the visitinig network to request for a new All-IP computer The local RM search for free computer devices on its device lists and update the device status host computer, I/O devices, HDD The local RM triggers the interconnections between the host OS and computer devices The user tag displays the location of I/O devices of the All-IP computer to the user according to the location information got from the local RM

User Tag Local RMHome RMHost OS RM Discovery RM Discovery Reply Resource Request Authentication Request Authentication Reply Device Request Device Assignment Device List Notification Device List Acknowledgement Device Confirmation (Device Error) Resource Reply The All-IP Computer Initialization

Evaluation Objectives To understand allowable network delay for IP networked computer devices Evaluation Environment 3 nodes on the testbed network USB/IP server, USB/IP client, Dummynet bridge Evaluation overview We Evaluated the time gaps between “pressed” and “released” keyboards events on the USB/IP client PC Dummynet bridge creates network delay arbitrary by 10 milliseconds. USB/IP server (Device) USB/IP client (Host Computer) Dummynet Bridge

Evaluation results The gaps were increased according to the network delay → The network delay is beyond the USB’s assumed latency The Keyboard events began to be lost Dummynet Delay (msec) RTT (msec)

Conclusion All-IP based computer architecture design We defined a new computer architecture called “All-IP computer architecture” Protocol design for dynamic All-IP computer configuration Evaluation of devices interconnection protocols We evaluated a networked IP device requirement utilizing USB/IP keyboard.