19th ICCRTS. Title of Paper Collaboration services: Enabling chat in disadvantaged grids
|
|
|
- Hilda Williams
- 10 years ago
- Views:
Transcription
1 19th ICCRTS Title of Paper Collaboration services: Enabling chat in disadvantaged grids Topic Topic 6: Cyberspace, Communications, and Information Networks Name of Authors F.T. Johnsen, T.H. Bloebaum, Norwegian Defence Research Establishment (FFI) K.M. Kittilsen and team * Norwegian University of Science and Technology (NTNU) Point of Contact Frank T. Johnsen Norwegian Defence Research Establishment (FFI) P.O. Box 25 NO-2027 Kjeller Norway [email protected] ( * the team: Luka Cetusic, Hans Kristian Flaatten, Karsten Kjensmo, Erik Lothe, Ole Johnny Pettersen, Thomas Martin Schmid and Bjørn Tungesvik)
2 This page is intentionally left blank
3 Collaboration services: Enabling chat in disadvantaged grids Abstract Instant messaging is an important aspect of collaboration. There are many different solutions for instant messaging or "chat" as it is often called. One of the most prominent solutions in recent years is the XMPP protocol, which is implemented in several instant messaging products, both servers and clients. This protocol has also been chosen for chat by NATO, as it is mentioned in the SOA baseline as one of the protocols to use when implementing the collaboration core services. NATO's JChat client implements XMPP, and has been used with success in many missions. However, the protocol is not well suited for use in highly dynamic environments. In this paper we present our approach to bringing chat into such environments. We build our chat solution on ACP142, a protocol developed for use in tactical radio networks that can cope with mobility and disruptions. Finally, we discuss how a gateway solution can be used to bridge our experimental chat with the standard XMPP which should be used in networks with infrastructure. 1. Introduction This work has been performed in the context of NATO STO/IST-118 "SOA recommendations for disadvantaged grids in the tactical domain" [2]. The main focus of this group is to identify what we call tactical SOA foundation services. By this we mean which core enterprise services we need support for in the tactical domain. Examples so far include, but are not limited to, the messaging service, publish/subscribe service, collaboration, and service discovery service. In other words, we aim to investigate how services from the SOA baseline [3] can be extended for use in tactical networks. In this paper we focus on the Instant messaging service, which is a subset of Collaboration in the SOA baseline. The baseline recognizes that there are additional collaboration services and states that more services will be addressed in future versions, but currently only instant messaging/chat is identified with a standard to employ. For chat, the SOA baseline points to XMPP. XMPP is the most important chat protocol in use in NATO today, as it is the protocol being used in JChat. JChat is currently being evaluated for use in disadvantaged grids [4]. However, XMPP is intended for use in stable networks with high bit rate (e.g., LAN, Internet) and does not function well in military tactical networks where resources are scarce and disruptions are frequent, as our experiments in [1] have shown. As XMPP is not particularly well suited for use in disadvantaged grids, yet chat is important, it is in the IST-118 group s interest to attempt to extend this aspect of collaboration also to such environments. Chat is becoming increasingly important in military operations, and such services have been used on several occasions (e.g., in Operation Enduring Freedom and Operation Iraqi Freedom [6], where chat was also used in special operations). In this paper we present our approach to enabling chat in disadvantaged grids by leveraging the ACP142 protocol for transporting the instant messages. This protocol has been designed for use in tactical networks, and can function in certain disadvantaged grids. Our contribution is twofold: 1. We have implemented ACP142 according to the specification and released the implementation as open source.
4 2. We have implemented a multiuser chat solution for disadvantaged grids on top of ACP142, also released as open source. The remainder of this paper is organized as follows: In section 2 we discuss our approach in light of related work, and provide a brief introduction to ACP142. Section 3 presents details on our implementations, along with the URLs where the open source code can be obtained. Section 4 summarizes the tests performed, and Section 5 concludes the paper. 2. Background 2.1 Chat solutions for tactical networks [7] presents an application suite built on top of DoDWAN, where one of the applications is a delaytolerant text messaging application with group support: TextWAN. ChatWAN is another chat application built on top of DoDWAN [5]. ChatWAN implements a subset of the IRC protocol [8], enabling clients to connect using standard IRC clients. NATO has chosen to standardize on the extensible Messaging and Presence Protocol (XMPP) [9,10] for instant messaging. XMPP is server-based making it ill-suited for use in disadvantaged grids where a central server constitutes a single point of failure. This has led to an increased research focus on developing chat solutions that are adapted to the tactical domain, as well as a shift from the previous focus on IRC to the current focus on XMPP. Multicast is an efficient means of distributing one message to many recipients. This can be leveraged in order to decentralize a chat application and do away with the central server. For example, a multicast-based solution for secure group chat and XMPP compatibility is discussed in [11, 12]. The authors suggest using a proxy for compatibility with XMPP. Further, in [13, 14], Lass et al. present their design and evaluation of an XMPP overlay protocol for tactical chat based on multicast. By using gateways and proxies, the chat solution is compatible with XMPP clients. When using multicast, the delivery success rate and bandwidth use depend on the efficiency of the protocol. Reliable multicast protocols can be leveraged, such as NACK-Oriented Reliable Multicast (NORM) [15]. Previously we have created a decentralized chat mechanism with its own reliable distribution mechanism that does not rely on underlying routing or multicast mechanisms, and that can achieve interoperability with XMPP through a gateway. Experiments have shown that this solution significantly outperforms XMPP in networks with disruptions due to high node mobility [1]. This solution (called Mist chat) was presented as input to NATO STO/IST-090 "SOA challenges for real-time and disadvantaged grids" and was a part of the group's final demonstration at MCC 2011 in Amsterdam, Netherlands. However, if there is a need for a node to go into radio silence, then that solution will not necessarily work well. Ideally, we want a node to be able to receive messages even if it is currently in EMCON 1 and does not transmit anything. This led us to investigate other possible solutions as well. We have now chosen to focus on the ACP142 protocol for reliable multicast, because it has been designed specifically for use in tactical networks. It is a highly configurable protocol that, unlike other reliable 1 EMCON is short for emission control, also known as radio silence, where a node has entered a state where it may receive but not transmit data.
5 multicast solutions we are aware of, can function under EMCON as well. In this paper we present our current approach to chat in disadvantaged grids, which we have built on top of ACP142. This current solution (called P_MUL Chat), as well as our previous Mist chat, have both been submitted to the NATO STO/IST-ET-070 exploratory team for tactical chat for consideration. Figure 1: Approaches to implementing Chat solutions From the literature overview provided above, we have identified three approaches that are commonly used when attempting to realize chat in tactical networks. Figure 1 illustrates these three approaches, from left to right: 1) Attempting to use XMPP directly, but with certain optimizations, 2) Using a proprietary solution in the dynamic environment, but using gateways to achieve interoperability with COTS XMPP clients and servers, and 3) Proprietary client and optimizations, but using a gateway for interoperability with an XMPP server in the backbone network. 2.2 ACP142 ACP 142 [16] provides a protocol definition for reliable multicast information transfer in bandwidthconstrained and delayed-acknowledgement environments to support efficient allied information transfer. The objective of ACP 142 is to specify and standardize the P_MUL protocol. P_MUL, as a reliable multicast protocol, requires an underlying connectionless network infrastructure with multicast routing functionality. Current P_MUL implementations often use the User Diagram Protocol (UDP) and Internet Protocol (IP) as illustrated in Figure 2. The protocol specification does not limit it to this protocol stack, but due to NATO s current Everything over IP mindset, we anticipate that this combination will be the most viable for interoperability in the coalition.
6 Figure 2: Implementation of P_MUL on an UDP/IP stack (taken from [16]) Although P_MUL is based on a connectionless transport protocol, it provides users with reliable connection-oriented multicast services. It enables the receivers to receive messages while being under EMCON restrictions. It ensures that the transmitter is informed about the timely completeness of the transmission of the messages after the receivers leave the EMCON status and, if required, enables the re-transmission of any messages that were not properly received. P_MUL requires that the router is able to support static multicast routing. P_MUL works for fixed multicast groups and can also work for dynamically formed ad hoc multicast groups. For fixed multicast groups each node has knowledge about the group memberships of one or more multicast groups. Dynamically formed ad hoc multicast groups may be used for transmitting single messages, but implementation of dynamic multicast group formation is an optional capability in the specification. For the complete protocol details, please refer to [16]. 3. Design and implementation For software development, the chosen Integrated Development Environment (IDE) was Eclipse. Eclipse is tightly integrated with Java and has functionalities such as real-time error and warning checking, automated code refactoring and powerful autocomplete capabilities. Both our P_MUL library and our chat solution (called P_MUL chat) were implemented in Java using Eclipse. The solution has been tested in emulated network conditions (see Section 4). As a contribution to the research community we have chosen to release our implementations online as open source at Github, where detailed documentation can also be found. Below we summarize the most important highlights of both implementations. 3.1 P_MUL The complete P_MUL design and functionality is described in [16], so we will not go into those details here. Instead, we focus on where our implementation goes beyond the mandatory functions specified:
7 We implement the optional support for dynamic multicast groups as well as the mandatory static groups. We implement support for IPv6 when using static multicast groups, in addition to IPv4 for both static and dynamic multicast groups. The specification only requires one to implement support for static multicast groups. This implies that when only such groups are used, one must configure all relevant groups at deployment. In context of our intended application of the protocol, as a carrier for chat, it was desirable to also have support for dynamic multicast groups. The reason for this being that one could then map chat topics to multicast groups, and allow new topics to be introduced at run time. When leveraging only static groups, the chat topics to be used must be planned and configured pre-deployment. Thus, we chose to implement this optional functionality as well. Here, only IPv4 is supported, as differences relating to IPv4 and IPv6 addressing meant that this functionality was not easily extended to use IPv6 without going beyond compatibility with the specification. That being said, we still anticipate the most important mode to be the static multicast groups, since that functionality is mandatory and must thus also be present when encountering other implementations of the protocol. So, for complete compatibility with the specification, it is safest to rely on the pre-planned, static multicast group functionality for disseminating messages. In recent years there has been an increasing interest in IPv6 also for defense use (see e.g., the recent CONSiS experiment [17] where IPv6 was employed). Inspired by this, we chose to go beyond the basic IPv4 addressing in the specification and implement support for both IPv4 and IPv6 when using static multicast groups. Our IPv4 implementation is fully compliant with the specification, whereas the IPv6 implementation uses our own interpretation of how the addressing scheme can be extended to function in an IPv6 based network. By using hashing, we are able to obtain the necessary identifiers of appropriate length and computational strength. The implementation is free, released as open source, and can be obtained from (P_MUL including the above mentioned enhancements). The protocol implementation has been subject to performance and specification compliance testing in an emulated network environment, ensuring that it fulfils the specification. 3.2 P_MUL Chat The following explains the creation of the chat application design that is built upon the P_MUL protocol. The code has been released as open source at where it can be downloaded free of charge. Figure 3 illustrates the major functionality of the chat application s graphical user interface (GUI). Here, Chat indicates the window displaying the chat messages, Comment field is the window where you enter your messages, topic contains a list of chat topics that can be subscribed to, and the clear and send buttons do what the names imply. In addition, the actual GUI also has a couple of other functions as well, the most important being a means of configuring the parameters of the underlying P_MUL protocol.
8 Figure 3: Chat application GUI outline The chat application relies on a set of messages to function. All messages are used if dynamic multicast groups are leveraged. If static multicast groups are used, then only a subset of the messages is needed. The complete set of messages is: SEND_MESSAGE: Messages of this type transmit chat messages to all subscribers of the current topic. NODE_LIST: Upon starting the application, it transmits its destination ID over a configurable unreliable UDP Multicast. Any node that sees this will respond with a message of this type, containing the destination IDs of all nodes it knows are online. NODE_LEAVE: When the application is terminated, a message of this type is sent out so other nodes know not to transmit to this user any more. To make the quit action responsive, these messages have a very short time to live. GET_TOPICS: Asks for a list of all topics, triggers a TOPIC_LIST response. NEW_TOPIC: Announces the creation of a new topic. Should a topic with this name already exist, a SUBSCRIBER_LIST response is triggered. DELETE_TOPIC_ QUERY: Queries whether any clients object to the deletion of a topic. Any client, the user of which is currently subscribed to this topic, will respond with a TOPIC_IN_USE message. DELETE_TOPIC_SUCCESS: Follows a DELETE_TOPIC_QUERY message if no TOPIC_IN_USE message was received during the waiting period. Upon receipt, the topic will be deleted.
9 JOIN_TOPIC: Sent when the user selects a new topic to subscribe to. Allows the other clients to know that a new subscriber is now a part of this topic. LEAVE_TOPIC: Sent when the user selects a new topic to subscribe to having previously been in another topic. Ensures the other clients in the old topic know that this subscriber is no longer in the topic. TOPIC_LIST: Sent upon receipt of a GET_TOPIC message. This is used to share a list of all topics the client is aware of. TOPIC_IN_USE: Triggered by a DELETE_TOPIC_QUERY message if the client objects to the deletion of the concerned topic. SUBSCRIBER_LIST: When a user creates a new topic that already exists, or joins a topic, this is sent as a response. It contains destination identifiers and user names for all clients currently subscribed to the topic. INVALID: Only used internally, this marks messages which are found to be invalid when parsed from raw bytes. These messages constitute the chat solution s network behavior in the following manner: Startup When the application first starts, it transmits its unique identifier over unreliable UDP multicast to a predefined group that all clients listen to. This notifies the group members that this client is now online, and they will respond with a NODE_LIST message containing a list of all clients they know are online. The fact that all clients respond generates significant potentially unnecessary network traffic. Due to the unreliable nature of pure UDP multicast, this is however needed to maximize the chances that the identifiers of all online nodes are received. After receiving the first NODE_LIST response, the client sends out a GET_TOPICS message if dynamic topics are supported. If this is the case, then a node will respond with a TOPIC_LIST message containing all existing topics Changing topics If the application is in static multicast mode, changing topics is not possible at runtime. Otherwise, this will first issue a LEAVE_TOPIC message, given that the client was previously in a different topic, to all subscribers of the topic it is leaving. It will then send out a JOIN_TOPIC message to all clients, to which a node currently subscribing to the joined topic will respond with a SUBSCRIBER_LIST message with all current subscribers to that topic. If no one is subscribed to the newly joined topic, no response is seen Sending messages Messages are sent in a SEND_MESSAGE message to all clients subscribing to the topic the client is currently in Creating topics When creating a topic, a NEW_TOPIC message is sent to all clients. This can only be done if no topic with that name already exists in the local topic list. All other clients will then add that topic to their list, unless they already have a topic with that name in their lists. If they do, then they will respond
10 with a SUBSCRIBER_LIST message for that topic. The client creating the topic will immediately join the newly created topic Deleting topics A topic can only be deleted if no other client is subscribing to it. A DELETE_TOPIC_QUERY message is sent to all clients to check this. Any client subscribing to that topic will respond with a TOPIC_IN_USE message to indicate that it may not be deleted. If, after a configurable waiting period, the original client has not received a response, it will send out a DELETE_TOPIC_SUCCESS message to all clients. This message will in turn trigger the deletion of that topic Quitting When the chat client is shut down, it sends a NODE_LEAVE message, with a very short time-to-live, to all clients. This notifies them to delete the destination identifier of this client from their recipients list. The short time to live is used so the client shuts down in a reasonably responsive fashion, while still leaving the maximum reach for this final message (to minimize the count of nodes that try to transmit to it after its disconnection). 4. Testing Testing of the solution was performed in several stages: Code review, unit testing, conformance testing, and validation testing. Figure 4: Test environment For conformance and validation testing we used the setup shown in Figure 4. The router was multicast-enabled since multicast support is a requirement of ACP142. Further, we employed a traffic interceptor for those tests involving unreliable links. This was necessary due to the testbed being wired, so the proxy was used to introduce unreliable network behavior like packet loss. Testing involved the following four approaches (see [19, ch. 7] for complete details):
11 4.1 Code review Reading through the implemented code can help identify a lot of potential problems before they arise. By continuously having code inspections on committed code, as well as a well drafted code convention, many problems were caught early on in the implementation phase. 4.2 Unit testing Unit testing is the task of testing methods individually. This method focuses solely on an expected output given a specific input. It does not test whether the method actually conforms directly with protocol design (this is ensured through conformance testing). Unit testing ensures that the method does what the programmer intended it to do; technically speaking. Unit testing is an excellent way to test whether newly introduced changes break existing functionality from a technical standpoint. We employed such tests as a means to allow developers to instantly test a subset of the system before committing the changes. We used JUnit, which is the most commonly used framework for unit testing in Java. JUnit is fairly simple to use and integrates nicely with the existing developer tools and environment already in place. Please refer to [19, annex D] for the complete unit test plan and [19, annex F] for the complete results. 4.3 Conformance testing Protocol conformance testing aims to test to what degree the implemented protocol conforms to its specification. This stage involves using the implementation and sending real packets over a network while monitoring the connection. This process was performed by systematically selecting each major requirement in the protocol specification and then creating a single function test for it. Depending on the size and complexity of the protocol specification, this type of testing can result in potentially thousands of different tests. It is often infeasible to create that many tests, hence only a subset of them can be selected for implementation after careful consideration. Please refer to [19, annexes E and G] for further details on the conformance test plan and results. 4.4 Validation testing When the software development is completed, tested, and assembled as a package, the final series of tests, Validation Testing, begin. Here testing succeeds when software functions in a manner that can be reasonably expected [18, p. 521]. These expectations were defined as the overall software requirements, that is the functionality described in Section 3. Software validation was achieved through a series of black-box tests that demonstrated conformity with the requirements. Please refer to [19, section 7.3.4], which describes how the functional requirements were validated in further detail. 5. Conclusion In this paper we have presented our twofold contribution: A Java implementation of the tactical multicast protocol ACP142 that we have released as open source, and
12 a solution for chat for use in disadvantaged grids leveraging the above protocol (also released as open source). Chat is an important aspect of the NATO Core Enterprise Service for Collaboration, and the work presented in this paper has been performed in context of the currently active NATO STO/IST-118 SOA recommendations for disadvantaged grids in the tactical domain group. Our chat solution, that we call P_MUL Chat, is a multiuser protocol for mobile ad-hoc networks based on the reliable tactical multicast protocol ACP142. P_MUL chat is fully decentralized, and leverages multicast groups in ACP142 to differentiate between chat rooms. We suggest that it can be used in combination with XMPP through the use of gateways, along the same lines as other experimental solutions (e.g., as described in [1]). The motivation for creating this chat solution was to be able to leverage the key properties of ACP142 [16] for instant messaging in disadvantaged grids: Reliable multicast messaging Designed for bandwidth-constrained networks Delayed acknowledgement for EMCON environments Tests in an emulated networking environment have shown that P_MUL Chat is suitable for typical tactical, disadvantaged environments where disruptions occur: both planned phases where certain nodes enter radio silence, and unplanned disruptions due to node mobility and network partitioning. It should be noted that ACP142 provides several parameters for fine-tuning the protocol s behavior (e.g., MTU size, sending delay between packet fragments, etc.) and it is necessary to configure it to match the capabilities of each network before deployment. Default parameters will not function in all networks. Further, we have adopted NATO s everything over IP mindset, meaning that we have only implemented and tested P_MUL chat on ACP142 s IP stack. This, in turn, puts a requirement on the network where the solution is deployed it must support IP multicast. This implementation has also been contributed to the community as open source. We think it can be of interest to others, since it is, to the best of our knowledge, the only available ACP142 implementation that is open source and supports both IPv4 and IPv6. For future work the IST-118 group plans to experiment with other Core Enterprise Services in disadvantaged grids in the tactical domain as well (such as the Publish/Subscribe service), possibly by extending the solutions to run on ACP142. Acknowledgements We would like to thank Magnus Skjegstad, Norway s representative to NATO STO/IST-ET-070 exploratory team for tactical chat, for fruitful discussions during this work. His valuable insights contributed to section 2.1. Also, we would like to acknowledge Professor Monica Divitini and Ph.D. candidate Meng Zhu at NTNU for their efforts as supervisors for the student team. Thanks to Torleiv Maseng for his constructive criticism, and to Johnny Johnsen for proofreading. Last but not least, thanks to Stig Bjørlykke at Thales Norway for providing valuable insights to the team when developing and testing the solution.
13 References [1] Magnus Skjegstad, Ketil Lund, Espen Skjervold, Frank T. Johnsen, Distributed Chat in Dynamic Networks in Proceedings of IEEE Military Communications Conference (MILCOM) 2011, pp.1651,1657, 7-10 Nov. 2011, Baltimore, MD, USA [2] F.T. Johnsen, T.H. Bloebaum, P.-P. Meiler, I. Owens, C. Barz, and N. Jansen, IST-118 SOA recommendations for Disadvantaged Grids in the Tactical Domain, 18th ICCRTS, Alexandria, VA, USA, June 19-21, 2013 [3] NATO C3 Board, Core Enterprise Services Standards Recommendations: The SOA baseline profile v.1.7, November Enclosure 1 to AC/322-N(2011)0205. [4] NCIA. Joint Tactical Chat (JChat). (access requires a Tidepedia account). [5] ChatWAN. [6] B. A. Eovito, The impact of synchonous text-based chat on military command and control, in 11th ICCRTS Coalition Command and Control in the Networked Era, Cambridge, UK, Sept [7] Y. Mahéo, N. L. Sommer, P. Launay, F. Guidec, and M. Dragone. Beyond Opportunistic Networking Protocols: a Disruption-Tolerant Application Suite for Disconnected MANETs. Extremecom, [8] C. Kalt. Internet Relay Chat: Client Protocol. RFC 2812 (Informational), Apr [9] P. Saint-Andre. Extensible Messaging and Presence Protocol (XMPP): Core. RFC 6120 (Proposed Standard), Mar [10] P. Saint-Andre. Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence. RFC 6121 (Proposed Standard), Mar [11] J. Tölle, T. Ginzler, and P. Steinmetz. Challenges of Instant Messaging in Tactical Environments - Concepts and Practical Implementation. In Proceedings of NATO IST-083 Symposium on Military Communications with a special focus on Tactical Communications for Network Centric Operations, Prague, Czech Republic, April [12] T. Aurisch and P. Steinmetz. Securely connecting instant messaging systems for ad hoc networks to server based systems. The 16th International Command and Control Research and Technology Symposium (ICCRTS), Quebec City, Canada, [13] R. Lass, J. Macker, D. Millar, C. William, and I. Taylor. XO: XMPP overlay service for distributed chat. In Military Communications Conference (MILCOM), IEEE, pages , San Jose, CA, USA, 2010.
14 [14] R. Lass, D. Nguyen, D. Millar, W. Regli, J. Macker, and R. Adamson. An evaluation of serverless group chat. In Military Communications Conference (MILCOM), pages , Baltimore, ML, USA, [15] B. Adamson, C. Bormann, M. Handley, and J. Macker. NACK-Oriented Reliable Multicast (NORM) Transport Protocol. RFC 5740 (Proposed Standard), Nov [16] The Combined Communications-Electronics Board (CCEB), ACP142, P_MUL - A PROTOCOL FOR RELIABLE MULTICAST MESSAGING IN BANDWIDTH CONSTRAINED AND DELAYED ACKNOWLEDGEMENT (EMCON) ENVIRONMENTS, [17] Trude H. Bloebaum and Ketil Lund, CoNSIS: Demonstration of SOA Interoperability in Heterogeneous Tactical Networks, 2012 Military Communications and Information Systems Conference (MCC), Gdansk, Poland, 8-9 Oct 2012 [18] Roger S. Pressman. Software Engineering - A Practitioner s Approach. McGraw-Hill, 4. edition, [19] L. Cetusic, H.K. Flaatten, K.M. Kittilsen, K. Kjensmo, E. Lothe, O.J. Pettersen, T.M. Schmid, B. Tungesvik, Report on acp142 (P_MUL) Java implementation,
Collaboration services: Enabling chat in disadvantaged grids
Collaboration services: Enabling chat in disadvantaged grids Frank T. Johnsen and Trude H. Bloebaum Norwegian Defence Research Establishment (FFI) Luka Cetusic, Hans Kristian Flaatten, Karsten Kjensmo,
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Secure information exchange
www.thales.no Secure information exchange 2 together. Safer. Everywhere. Whenever critical decisions need to be made, Thales has a role to play. In all its markets aerospace, space, ground transportation,
Tactical Service Bus: The flexibility of service oriented architectures in constrained theater environments
Tactical Bus: The flexibility of service oriented architectures in constrained theater environments Tactical Edge in NATO Context Tactical still very much under control of national forces: Zone of Operations
Network Edge Services
ONR BAA 10-018 Industry Day: 2010-May-21 Joseph Macker Brian Adamson Nathan Smith Naval Research Laboratory Information Technology Division, Code 5522 [email protected] [email protected]
Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM
Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM A Dell technical white paper Version 1.1 Victor Teeter Network Solutions Engineer This document is for informational purposes
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
IM and Presence Service Network Setup
Configuration changes and service restart notifications, page 1 DNS Domain Configuration, page 2 IM and Presence Service Default Domain Configuration, page 6 IM Address Configuration, page 7 Domain Management
Performance measurements of STANAG 5066 and Applications Running over STANAG 5066
Performance measurements of STANAG 5066 and Applications Running over STANAG 5066 Steve Kille CEO September 14 th 2009 Why Measure? The End Goal is to run Applications and Services over HF Radio Maximize
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions
How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the NEC SV8100 IP PBX to connect to Integra Telecom SIP trunks.
Assignment 6: Internetworking Due October 17/18, 2012
Assignment 6: Internetworking Due October 17/18, 2012 Our topic this week will be the notion of internetworking in general and IP, the Internet Protocol, in particular. IP is the foundation of the Internet
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
FioranoMQ 9. High Availability Guide
FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
Developers Integration Lab (DIL) System Architecture, Version 1.0
Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2
NETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Local Address Management in IoT environments
Local Address Management in IoT environments Pat Thaler, Senior Technical Director, Broadcom 29 September 2014 3 rd IEEE 802 and IETF Leadership Meeting 1 PROBLEM STATEMENT 2 MAC address consumption ramps
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing
Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
ProSafe Plus Switch Utility
ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Combining Service-Oriented Architecture and Event-Driven Architecture using an Enterprise Service Bus
Combining Service-Oriented Architecture and Event-Driven Architecture using an Enterprise Service Bus Level: Advanced Jean-Louis Maréchaux ([email protected]), IT Architect, IBM 28 Mar 2006 Today's business
LifeSize UVC Access Deployment Guide
LifeSize UVC Access Deployment Guide November 2013 LifeSize UVC Access Deployment Guide 2 LifeSize UVC Access LifeSize UVC Access is a standalone H.323 gatekeeper that provides services such as address
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing
SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: [email protected] ABSTRACT This paper presents a novel solution to
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability
Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080
Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
diversifeye Application Note
diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs
Top-Down Network Design
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric
IM and Presence Service Network Setup
Configuration changes and service restart notifications, page 1 Domain Value Configuration, page 2 Routing Information Configuration on IM and Presence Service, page 3 Configure Proxy Server Settings,
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Functional Specifications Document
Functional Specifications Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:19-10-2007
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
What communication protocols are used to discover Tesira servers on a network?
Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.
The IP Transmission Process. V1.4: Geoff Bennett
The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks
The Journey Inside SM : The Internet Background Information, Part 1
SM : The Internet Background Information, Part 1 Growth of the Internet It is almost impossible to make it through a day without hearing a reference to the Internet. The Internet began in 1969 as the ARPANET
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
Can PowerConnect Switches Be Used in IP Multicast Networks?
PowerConnect Application Note #6 January 2004 Can PowerConnect Switches Be Used in IP Multicast Networks? This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect
3.5. cmsg Developer s Guide. Data Acquisition Group JEFFERSON LAB. Version
Version 3.5 JEFFERSON LAB Data Acquisition Group cmsg Developer s Guide J E F F E R S O N L A B D A T A A C Q U I S I T I O N G R O U P cmsg Developer s Guide Elliott Wolin [email protected] Carl Timmer [email protected]
IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas
IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
SERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
Computer Networks and the Internet
? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431
How to Configure the Toshiba Strata CIX for use with Integra Telecom SIP Solutions
How to Configure the Toshiba Strata CIX for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Toshiba Strata CIX IP PBX to connect to Integra
TABLE OF CONTENTS. Section 5 IPv6... 5-1 5.1 Introduction... 5-1 5.2 Definitions... 5-1 5.3 DoD IPv6 Profile... 5-3 5.3.1 Product Requirements...
, Table of Contents TABLE OF CONTENTS SECTION PAGE IPv6... 5-1 5.1 Introduction... 5-1 5.2 Definitions... 5-1 5.3 DoD IPv6 Profile... 5-3 5.3.1 Product Requirements... 5-4 i , List of Figures LIST OF FIGURES
Extensible Network Configuration and Communication Framework
Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis
Networking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Issues for the performance monitoring of an open source H.323 implementation ported to IPv6-enabled networks with QoS characteristics
Issues for the performance monitoring of an open source H.323 implementation ported to IPv6-enabled networks with QoS characteristics Authors: Ch. Bouras, A. Gkamas, A. Karaliotas, D.Primpas, K. Stamos
DNS Server Operation & Configuration
Introduction The internet has a tree like network of DNS servers, which are responsible for converting a URL (e.g. www.google.com) to an IP address. The root DNS server shares it's database with all of
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail [email protected] Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
TDM services over IP networks
Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
Configuration Guide. DHCP Server. LAN client
DHCP Server Configuration Guide 4.0 DHCP Server LAN client LAN client LAN client Copyright 2007, F/X Communications. All Rights Reserved. The use and copying of this product is subject to a license agreement.
Cisco Collaboration with Microsoft Interoperability
Cisco Collaboration with Microsoft Interoperability Infrastructure Cheatsheet First Published: June 2016 Cisco Expressway X8.8 Cisco Unified Communications Manager 10.x or later Microsoft Lync Server 2010
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
The necessity of multicast for IPTV streaming
The necessity of multicast for IPTV streaming ARIANIT MARAJ, ADRIAN SHEHU Telecommunication Department Faculty of Information Technology, Polytechnic University of Tirana Tirana, Republic of Albania [email protected],
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Requirements & Reference Models for ADSL Access Networks: The SNAG Document
Technical Report TR-010 Requirements & Reference Models for ADSL Access Networks: The SNAG Document June 1998 Abstract: This document outlines architectural requirements and reference models for ADSL services
Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch
Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging
