1 Bayani Carbone, Miguel Naranjo, Uloaku Ojiaku, Zhi Qu, Zhichao Wu.

Slides:



Advertisements
Similar presentations
Multi-Access Services in Heterogeneous Wireless Networks Kameswari Chebrolu, Ramesh R. Rao Abstract Today's wireless world is characterized by heterogeneity.
Advertisements

Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Software Engineering CSE470: Process 15 Software Engineering Phases Definition: What? Development: How? Maintenance: Managing change Umbrella Activities:
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
Red Hat Linux Network. Red Hat Network Red Hat Network is the environment for system- level support and management of Red Hat Linux networks. Red Hat.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
Web Server Administration
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Creator: ACSession No: 10 Slide No: 1Reviewer: SS CSE300Advanced Software EngineeringDecember 2005 Project Management CSE300 Advanced Software Engineering.
DAKNET Presented By: rreema.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Computer Networks IGCSE ICT Section 4.
 Network Management  Network Administrators Jobs  Reasons for using Network Management Systems  Analysing Network Data  Points that must be taken.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Jani Pousi Supervisor: Jukka Manner Espoo,
A measurement study of vehicular internet access using in situ Wi-Fi networks Vladimir Bychkovsky, Bret Hull, Allen Miu, Hari Balakrishnan, and Samuel.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
STRATEGIES INVOLVED IN REMOTE COMPUTATION
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Dillon: CSE470: SE, Process1 Software Engineering Phases l Definition: What? l Development: How? l Maintenance: Managing change l Umbrella Activities:
Redes Inalámbricas Máster Ingeniería de Computadores 2008/2009 Tema 7.- CASTADIVA PROJECT Performance Evaluation of a MANET architecture.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Networking Basics Lesson 1 Introduction to Networks.
Resources Performance time. resources Performance time 2.
CS 360 Lecture 3.  The software process is a structured set of activities required to develop a software system.  Fundamental Assumption:  Good software.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
National Chi Nan University Performance Evaluation of Transport Protocols in Smart Meter Networks Speaker: Chia-Wen Lu Advisor: Dr. Quincy Wu Date: 2012/07/23.
Next Doc Project Team: xxxxx Spring TitlePage Scope Statement Mission Statement3 Business Need4 Project Description5-6 Project Lifecycle Approach7.
Event Management & ITIL V3
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
DBAS: A Deployable Bandwidth Aggregation System Karim Habak†, Moustafa Youssef†, and Khaled A. Harras‡ †Egypt-Japan University of Sc. and Tech. (E-JUST)
CSEM01 - wk8 - Software Planning1 Software Planning CSEM01 SE Evolution & Management Anne Comer Helen Edwards.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
OPERETTA: An Optimal Energy Efficient Bandwidth Aggregation System Karim Habak†, Khaled A. Harras‡, and Moustafa Youssef† †Egypt-Japan University of Sc.
CS 5150 Software Engineering Lecture 3 Software Processes 2.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
MultiPath TCP Proxy Presented by: Yongzhi Zhuang, Wei Zeng, Jianlei Zhang.
T Iteration demo T Iteration Demo Team Balboa I1 - Iteration
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
"Using Simulation with Scheduling Visualization to evaluate Change Initiatives in a Bio-Pharma Environment”
Network design Topic 6 Testing and documentation.
1 Software Design Lecture What’s Design It’s a representation of something that is to be built. i.e. design  implementation.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Planning Extreme programming
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
NEM201 Week 4 Project Plan Create and complete outstanding items. 01. Front Cover 02. Document details 03. Scope Document 04. Technical Design 05. Creative.
Part 2.  Transmission methods used  Bandwidth:  The speed at which Data can be carried.
IEEE C /87. Status of Evaluation Criteria IEEE Evaluation Criteria CG IEEE Interim Meeting September 15-19, 2003.
For more course tutorials visit NTC 406 Entire Course NTC 406 Week 1 Individual Assignment Network Requirements Analysis Paper NTC 406.
ISS Team Group Member ◦ Nguy ễ n Nh ậ t Minh ◦ Nguy ễ n Kh ắ c Khu ◦ Ph ạ m Ng ọ c Hi ế u ◦ Nguy ễ n Ng ọ c Khánh ◦ Nguy.
GridOS: Operating System Services for Grid Architectures
Confluent vs. Splittable Flows
Network Management Functions
Firewalls.
PRESENTATION ON Sky X TECH. SUBMETTED TO:- SUBMETTED BY:-
Unit 27: Network Operating Systems
Defining Usage Models for ESS Mesh
Self Organized Networks
Agenda The current Windows XP and Windows XP Desktop situation
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

1 Bayani Carbone, Miguel Naranjo, Uloaku Ojiaku, Zhi Qu, Zhichao Wu

2 Present situation Software available for single connection sharing Is it possible to do better on the 3G link? YES

3 What we want to do… Internet access similar to residential broadband using bandwidth aggregation.

4 Project scope Bandwidth aggregation No special configuration required on the client, the service provider’s network infrastructure or the Internet based server. Normal function should not be interrupted when a mobile device newly joins or leaves the setup. Study of the effect of mobility on the system’s operation. (e.g. on a moving train). Taking battery level of mobile device into account in the management of the system. Avoiding poor TCP performance in system due to wireless 3G link.

5 Out of Scope Multi-platform support Slave mobile devices acting as sub-managers to other slaves. System security issues (protecting system components against possible malicious attack). Maintaining fairness in shared TCP congested links. Performance optimization when mobile components of the system are in motion. Billing and charging.

6 Goals Simulate and implement: – detection of arrival and departure of routers (mobile devices) – Intelligent striping mechanism – Manager and proxy software Achieve higher throughput using multiple links. No modifications to the client, 3G network and Internet based server. Study effects of mobility on entire system. Take battery level into account in the system management. Highest Priority Lowest Priority

7 Benefits CategoryCashableNon-cashable Research ▪ Providing a working solution for aggregating bandwidth over 3G mobile networks. ▪ Characterisation of the performance of TCP over 3G. Business ▪ Resulting software could be sold to 3G mobile users to enable them enjoy this facility. ▪ Network operators, using this software, could offer this value-added functionality to customers as a loyalty incentive or as an additional paid service.

8 Constraints / Technical Challenges Need to modify the TCP/IP stack only in BAM routers and proxy  Use of Linux Availability of 3G/ enabled mobile devices  Use Linux boxes with and 3G USB interfaces Short time frame for project completion

9 Architecture

10 Architecture

11 Architecture

12 Discovery/ Monitoring protocol Detect arrivals/departures of BAM routers Collect information for striping mechanism

13 Want to transfer a file of size B Throughput link 1 Throughput link 2 Theoretical minimal transfer time 13 Striping Mechanism

14 B = s 1 + s 2 Want to choose s i to minimize: → When all the are equal Therefore,,is the optimal allocation of packets on link k. Striping Mechanism (contd.)

15 Uplink / Downlink processing Uplink with striping Packet 1 Packet 2 Ack 1 Ack 2

16 Uplink with striping Packet 1 Packet 2 Ack 1 Ack 2 Uplink / Downlink processing

17 Uplink with striping Packet 1 Packet 2 Ack 1 Ack 2 Uplink / Downlink processing

18 Downlink with striping Packet 1 Packet 2 Ack 1 Ack 2 Uplink / Downlink processing

19 Downlink with striping Packet 1 Packet 2 Ack 1 Ack 2 Uplink / Downlink processing

20 Downlink with striping Packet 1 Packet 2 Ack 1 Ack 2 Uplink / Downlink processing

21 Technologies Simulator : – NS-2 Modular router – Click Wireless technologies: – 3G (UMTS) – Programming Languages – C++ – OTCL – Click language

22 Methodology-XP XP in the practical part of development Copyright J. Donovan Wells

23 Iteration Iteration Planning Develop – Stand up meeting – Programming Create unit test Pair programming Unit test – Bug fixed / Run Acceptance test

24 How will we monitor progress? Use wiki for task backlog Measure number of past acceptance tests Monitor rate of work (velocity) Derive XmR charts for project control G. Collins, Agile Metrics 2007, slide 16, GZ07

25 Evaluation Metrics Throughput for file download / upload – Compared to single highest throughput link – Compared to idealized single aggregated link Throughput under mobility Battery level of routers

26 Proposed Phases Phase 1: Research Phase 2: - Research papers -Familiarize with NS-2 /Click Overall design Selection of protocols TCP over 3G experiments -Mobile devices *Discovery protocol *Manager protocol -Striping protocol *Slaves protocol - Proxy *Mgt protocol *Striping protocol Implementation (NS2/Click), Testing and Optimization Architecture Phase 4: -Experiments (Real life/ NS-2) *Compare to highest throughput link *Compare to aggregate link - Mobility - Battery consumption Performance Evaluation Phase 5: - Individual report - Overall report -Presentation Documentation Phase 3:

27 Timeline

28 Project Team  Documentations monitoring and control  Software (Ns-2 ) developer  Technical co- ordination / management  Software developer  NS-2/Click specialist  System design architect  Software developer  Click specialist  Project manager  Software (Ns-2) developer  Internal and external communications co-ordination.  Administrative Support  Software developer/ Click specialist  Logistics ZhichaoBayaniMiguelUloakuZhi

29 Team Communication Regular meetings (three times a week on average) Internet-based Wiki – Meeting summaries – Task assignment – Suggestions – Review of the different concepts, protocols, components – Risk / Issues identification and monitoring Instant messaging and

30 Risk management

31 Risk matrix Undesirable Serious Critical Negligible Serious UndesirableNegligible Undesirable Likelihood Impact High Low Medium

32 What has been done so far... Problem description Scope definition Research on relevant past papers Wiki setup NS-2/CLICK installation Architectural design drafts Preliminary protocols definitions

33 What to do next TCP over 3G (UMTS) experiment – Finalise architecture – Finalise protocol definition Begin implementation phase

34 Related Work MARS: Bandwidth aggregation for multi-homed mobile router device mTCP: Bandwidth aggregation over modified TCP GPRSWeb: improving TCP performance over GPRS (proxy functionalities) TCP performance over 3G