Information-Centric Future Mobile and Wireless Access Networks
|
|
|
- Gwenda Hunt
- 9 years ago
- Views:
Transcription
1 Information-Centric Future Mobile and Wireless Access Networks George C. Polyzos Mobile Multimedia Laboratory Department of Informatics School of Information Sciences and Technology Athens University of Economics and Business Athens, Greece Tel.: , Fax: AUEB/MMlab Collaborators Faculty: G. Xylomenos, V. Siris, G. Marias, St. Toumpis PostDocs: N. Fotiou, P. Frangoudis PhD students: I. Thomas, C. Tsilopoulos, X. Vasilakos MSc students: D. Dimopoulos, A. Tsolakou
2 Outline Information-Centric Networking (ICN) Motivation, history, approaches Pub-Sub Internetworking (PSI): unique features About the MMlab: people and other projects φsat: The role of Satellites in the Future Internet SatNEx: Satellite Network of Experts POINT: IP Over ICN - The Better IP? Other/different projects I-CAN: Information-Centric Access Networks Overview/approach Architecture Results and publications [email protected] 2
3 Internet History and Outlook At the beginning cooperation; no competition no commercial traffic! endpoint-centric services/e2e Now Content distribution >50% of traffic today is video Overlays DPI by ISPs Trust? Endpoint trust? E2E? viruses, phishing, DoS attacks NAT, firewalls, middleboxes, CDNs The sender has the power Tussles e.g.: privacy vs. accountability towards Information-Centric Networking Connecting Wires the past Interconnecting Computers the current Internet evolutionary development started decades earlier Interconnecting Information the Future Internet revolutionary research years in the future tussle resolution at or near run-time Trust-to-Trust principle 3
4 Publish-Subscribe Internet Vision information centrism everything is information & information is everything Recursive & and generalized use of publish-subscribe enables dynamic change of roles between actors Network cache publishes info (cached) subscribes to get info to cache Access Points publish ID mobiles subscribe Objectives Specify, implement, & test an internetworked pub/sub architecture follow a clean-slate design approach Perform qualitative and quantitative evaluation Security and socio-economics important! Migration and incentive scenarios important (e.g., overlay)! [email protected] 4
5 ICN timeline papers/talks projects Van Jacobson CCN A Survey of Information-Centric Networking Research, IEEE Communications Surveys and Tutorials, vol. 16, no. 2, [email protected] 5
6 Content Centric Networking (CCN) / Named Data Networking (NDN) PARC NDN /2 NSF UCLA, [email protected] 6
7 MobilityFirst 160 bit Globally Unique Identifier (GUID) for each information object, device, service GUID translated into a network address (IP) through a Global Name Resolution Service (GNRS) publishers register GUIDs to GNRS and subscribers perform requests/queries routing takes place based on the network address [email protected] 7
8 Our ICN-related Research Projects PSIRP: Publish Subscribe Internet Routing Paradigm FP7 ICT STREP, the basis focus on (inter)-networking PURSUIT: Publish Subscribe Internet Technologies FP7 ICT STREP, extending, above & below the Internet layer optical, wireless, mobility, transport Euro-NF: Anticipating the Network of the Future From Theory to Design FP7 ICT Network of Excellence, ASPECTS, GOVPIMIT, E-key-nets EIFFEL: Evolved Internet Future For European Leadership FP7 ICT SSA, ; Think-Tank continued June 2011 MIT: Information-Centric Networking φsat: The Role of Satellites in Future Internet Services European Space Agency funded I-CAN: Information-Centric Future Access Networks NSRF (Greece), POINT: IP Over ICN- The better IP H2020 ICT STREP, [email protected] 8
9 Publish-Subscribe Internetworking (PSI) Key Functions and Components publish subscribe rendezvous Rendezvous ID: hash of content (/name) asynchronous and multicast restores the imbalance of power sender/receiver(s) + Scope ID: aggregation, policies PSI Basic Functions: RTF Rendezvous: Matches publications with subscriptions and initializes forwarding Topology: Monitors the network and creates information delivery paths Forwarding G. Xylomenos et al., Caching and Mobility Support in a Publish-Subscribe Internet Architecture, IEEE Communications Magazine, July [email protected] 9
10 PSI Identifiers 10
11 PSI Unique Features Fast forwarding Bloom filter based forwarding ( forwarding identifiers) simple, stateless, fast forwarding incl. for multicast path ( source ) routing path as compact Bloom filter carried on packets Centralized SDN compatible approach (intra-domain) routing/resource allocation topology discovery/management recursive use of pub/sub object level chunk/packet level pull transport, error control, rcvr flow control = slow & fast rendezvous topology formation: handover = subscribe to network [email protected] 11
12 Secure Forwarding Mechanism (LIPSIN) Forwarding based on Bloom filter (called zfilter) that contains all the link IDs through which a packet has to travel Supports multicast Hashing False positives Limitations in size Hierarchical / inter-networks Link identifiers are unique zfilter creation involves an encryption mechanism DoS attack resistant Almost impossible to redirect an information flow send arbitrary packets to a destination [email protected] 12
13 zfilters Based Forwarding (LIPSIN) P. Jokela, et al., LIPSIN: Line Speed Publish/ Subscribe Inter-networking, Proc. ACM SIGCOMM
14 Prototype Implementations & Testbeds PSIRP 2. PURSUIT Testbed (w/ Blackadder) 25 nodes 5 countries: UK, FI, GR, D, US Tunneled (VPN) over the public Internet PURSUIT 1. PSIRP Testbed (w/ Blackhawk) 6 countries: UK, FI, GR, D, BU, US In addition: Belgium during ICT demos Tunneled over the public Internet +dedicated fiber where available 3. φsat Testbed w/ SAT emulation D. Trossen and G. Parisis, Designing and realizing an information-centric internet, IEEE Communications Magazine, vol. 50, July [email protected] 14
15 An Information-Centric Overlay Network Architecture for Content Distribution and Mobility Support Ph.D. Dissertation by Konstantinos Katsaros Multicast Router Assisted Overlay Multicast (RAOM) Deploying multicast functionality in an overlay fashion Multicast & Caching MultiCache Enabling caching of data delivered by multicast trees Adapting to the inter-network structure H-Pastry Canonical version of Pastry Mobility Support Overlay Multicast Assisted Mobility (OMAM) Revisiting multicast assisted mobility K.V. Katsaros, G. Xylomenos, G.C. Polyzos, MultiCache: an Overlay Architecture for Information-Centric Networking, Computer Networks, vol. 55, no. 4, pp , Special Issue on Architectures and Protocols for the Future Internet, March
16 Outlook & Open Issues Scalability and Performance Issues Scalable global rendezvous Transport protocols Multimedia distribution N. Fotiou, K.V. Katsaros, G. Xylomenos, G.C. Polyzos, H-Pastry: An inter-domain topology aware overlay for the support of name-resolution services in the future Internet, Computer Communications, Elsevier (online 2/15). Y. Thomas, C. Tsilopoulos, G. Xylomenos, G.C. Polyzos, Accelerating File Downloads in Publish Subscribe Internetworking with Multisource and Multipath Transfers, Proc. World Telecommunications Congress, Berlin, Germany, 6/2014. C. Tsilopoulos, G. Xylomenos, G.C. Polyzos, Are Information-Centric Networks Video-Ready? Proc. PV2013, San Jose, CA, December Security and privacy Deployment and Interoperability Issues Cheap ICN? http only? Internet of Things opportunity! 16
17 PSI Security & Privacy in addition to intrinsic ICN security features Publisher and Subscriber do not know each other Scopes: PSI s information firewalls Bloom filter path cannot be replayed rotation of link IDs DoS attacks to publishers/subscribers eradicated Rendezvous (point/network) knows much Privacy wrt: publisher: great (at network & higher layers) rendezvous (broker): bad proposal: use Homomorphic Encryption N. Fotiou, D. Trossen, G.F. Marias, A. Kostopoulos, G.C. Polyzos, Enhancing Information Lookup Privacy through Homomorphic Encryption, Security and Communication Networks (to appear). Access Control Delegation important for fast effective and efficient caching N. Fotiou, G.F. Marias, G.C. Polyzos, Access Control Enforcement Delegation for Information-Centric Networking Architectures, ACM SIGCOMM Computer Communication Review, Vol. 42, No. 4, Oct [email protected] 17
18 ICN Security & Privacy ACM ICN 2014 (Paris) ICN Privacy and Name based Security (Fotiou & Polyzos) Remarks ICN-IP relationship Some of the techniques are adapted for ICN from the existing IP networks More generally, many of techniques are also applicable to the existing IP networks Same for threats and objectives but there are also differences Important open issues Performance trade offs on a concrete system Caching vs. Privacy vs. Confidentiality Governance and authorities On non random identifiers (human readable) e.g., details on naming Shared responsibility for important decisions or actions, departure from single TTP models Bitcoin vs. Certificates/PKI Byzantine agreement, NSA free architectures Global policies Traffic engineering [email protected] 18
19 ICN Research Community workshops with ACM SIGCOMM ICN 2011 (Toronto) ICN 2012 (Helsinki) ICN 2013 (Hong Kong) with IEEE INFOCOM NOMEN 2012, st ACM SIGCOMM ICN Conference Paris Sept nd ACM SIGCOMM ICN Conference San Francisco, end Sept ICNRG@IERTF Journals & Magazines Special Issues [email protected] 19
20 POINT: IP Over ICN - The Better IP? Project Running: 1/1/ /12/2017 Partners: Aalto U (co-ordinator), ELL-i (FI) Intracom Telecom, AUEB (GR) RWTH Aachen (DE) Primetel (CY) CTVC Ltd, Interdigital, U Essex (UK) Concept Premise: IP apps can do better over ICN Need to define what better means Better utilisation in HTTP streaming scenarios Better privacy of personal data and metadata Better management of virtual network paths Better (fairer) content distribution Focus 1 provider UE: no changes (required) ICN used internally ICN could be exposed to UE [email protected] 20
21 Faculty Involved in I-CAN George C. Polyzos, Director Giannis Marias George Xylomenos Vasilios A. Siris Stavros Toumpis Other faculty Iordanis Koutsopoulos Vana Kalogeraki George Papaioannou Andreas Veneris Senior Researchers/PostDocs Merkourios Karaliopoulos, PhD Nikos Fotiou, PhD Vaggelis Douros, PhD Ph.D. students Xenofon Vasilakos Yannis Thomas Charilaos Stais Christos Tsilopoulos MSc students Researchers Undergraduate students 21
22 Information-Centric future mobile and wireless Access Networks Motivation: Mobiles have multiple wireless interfaces Different wireless access technologies have different characteristics Mobility presents new challenges and opportunities 3G/4G Wi-Fi hotspot Objectives are to investigate ICN architecture requirements & features for mobile/wireless access networks multi-source, multi-path, multi-interface in-network and proactive caching privacy support D2D/ Wi-Fi direct 22
23 I-CAN Architecture Features Publication proxies: store and advertise content on behalf of content owners Content remains available even when owner is offline Subscription proxies: send subscriptions on behalf of actual receivers Beneficial if users are mobile and have disconnections Can exploit proactive caching Future content & persistent subscriptions Can reduce signaling overhead in cellular and contention-based access networks 23
24 More I-CAN Architecture Features Content names: need for naming structure supporting both global and local significance Centralized, decentralized, and fast rendezvous Centralized: few nodes perform rendezvous Decentralized: even mobiles perform rendezvous; appropriate for local access networks Multi-source, multi-interface content transfer Exploits multiple network technologies: cellular, Wi-Fi, D2D Content-centric security & privacy 24
25 Mobile Multi-Source Video Streaming Exploit multi-source & multi-interface for lower cost resilience better QoE Mobility-based proactive caching Influence of multi-rate Wi-Fi 25
26 I-CAN Video-Streaming Emulation Experiments (& Demos ) Topology Description Each of the experiments involves a topology and a route described by an xml file An Android device parses this file in order to learn the topology and scenario Scenarios Streaming w/ & w/out Caching Multisource Streaming Fault Tolerance Wi-Fi Direct Data link User s path A 3G B [email protected] 26
27 Secure Publisher Proxy Combines Identity Based Encryption (IBE) Proxy re-encryption The content owner encrypts content using a (different) symmetric encryption key Each symmetric key is encrypted using IBE with the owner s identity To access encrypted content, the subscriber needs to decrypt the symmetric encryption key by having the proxy re-encrypt the symmetric key and derive C Subscriber from C Owner [email protected] 27
28 Q-ICN (I-CAN) Workshop w/ QSHINE 2014 (Aug. 20, Rhodes) Open Call MMlab/I-CAN (++) papers G.C. Polyzos, V.A. Siris, G. Xylomenos, G.F. Marias, S. Toumpis, I- CAN: Information-Centric Future Mobile and Wireless Access Networks. P. Frangoudis G.C. Polyzos, G.Rubino, Content Dissemination in Wireless Networks Exploiting Relaying and Information-Centric Architectures. (+ INRIA) N. Fotiou and G.C. Polyzos, Realizing the Internet of Things using Information-Centric Networking. V. Douros, N. Fotiou, and G.C. Polyzos, Fighting packet storms in mobile networks with information-centrism. X. Vasilakos, V. A. Siris, Adapting Data Popularity in Mobilitybased Proactive Caching Decisions for Heterogeneous Wireless Networks. Y. Thomas, G. Xylomenos, Towards Improving the Efficiency of ICN Packet-Caches. 28
29 Thank you! Information-Centric Future Mobile and Wireless Access Networks George C. Polyzos Mobile Multimedia Laboratory Department of Informatics School of Information Sciences and Technology Athens University of Economics and Business Athens, Greece
30 Selected MMlab ICN Publications G. Xylomenos, et al., A Survey of Information-Centric Networking Research IEEE Communications Surveys and Tutorials, (online since 19 July 2013). G. Xylomenos, X. Vasilakos, C. Tsilopoulos, V.A. Siris, G.C. Polyzos, Caching and Mobility Support in a Publish-Subscribe Internet Architecture, IEEE Communications Magazine, July N. Fotiou, G.F. Marias, G.C. Polyzos, Access Control Enforcement Delegation for Information-Centric Networking Architectures, ACM SIGCOMM Computer Communication Review, Oct N. Fotiou, D. Trossen, G.F. Marias, A. Kostopoulos, G.C. Polyzos, Enhancing Information Lookup Privacy through Homomorphic Encryption, Security and Communication Networks (online since Nov. 15, 2013). N. Fotiou, K. Katsaros, G.C. Polyzos, M. Sarela, D. Trossen, G. Xylomenos, Handling Mobility in Future Publish-Subscribe Information-Centric Networks, Telecommunication Systems, Springer (online since July 2013). K.V. Katsaros, G. Xylomenos, G.C. Polyzos, MultiCache: an Overlay Architecture for Information-Centric Networking, Computer Networks, Elsevier, March [email protected] 30
31 Selected I-CAN Publications D. Dimopoulos, Ch. Boursinos, and V.A. Siris, Multi-Source Mobile Video Streaming: Load Balancing, Fault Tolerance, and Offloading with Prefetching, Proc. 9th Int'l Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), May V.A. Siris, X. Vasilakos, G.C. Polyzos, Efficient Proactive Caching for Supporting Seamless Mobility, Proc. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Sydney, Australia, June Y. Thomas, C. Tsilopoulos, G. Xylomenos, G.C. Polyzos, Accelerating File Downloads in Publish Subscribe Internetworking with Multisource and Multipath Transfers, Proc. World Telecommunications Congress (WTC), Berlin, Germany, June K.V. Katsaros, X. Vasilakos, T. Okwii, G. Xylomenos, G. Pavlou, and G.C. Polyzos, On the Inter-domain Scalability of Route-by-Name Information-Centric Network Architectures, IFIP Networking N. Fotiou, A. Machas, G.C. Polyzos, G. Xylomenos, Access control as a service for the Cloud, Journal of Internet Services and Applications, Springer (in press). G.C. Polyzos and N. Fotiou, Building a reliable Internet of Things using Information- Centric Networking, Journal of Reliable Intelligent Environments, Springer (available online 1 May 2015). [email protected] 31
Curriculum Vitae. George Xylomenos. Multicast and multimedia communication protocols for heterogeneous networks.
Curriculum Vitae George Xylomenos Contact Information Postal address: Patision 76, Athens 104 34, Greece E-mail address: [email protected] Telephone number: +30 2108203115 Research Interests Future Internet
(Mobile) Content Delivery Networks (CDNs) and Information Centric Networks (ICNs)
Technische Universität München Lehrstuhl für Kommunikationsnetze Prof. Dr.-Ing. Wolfgang Kellerer ITG Fachgruppentreffen 5.2.1 und 5.2.4 (Mobile) Content Delivery Networks (CDNs) and Information Centric
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN
Information-Centric Connectivity (ICCON) K.V. Katsaros, V. Sourlas, I. Psaras, S. Reñé and G. Pavlou University College London
Information-Centric Connectivity (ICCON) K.V. Katsaros, V. Sourlas, I. Psaras, S. Reñé and G. Pavlou University College London Information-centrism Expressed by users Increasingly through mobile devices
Information-Centric Networking: Introduction and Key Issues
UCL DEPARTMENT OF ELECTRONIC AND ELECTRICAL ENGINEERING COMMUNICATIONS AND INFORMATION SYSTEMS GROUP ICN Session FIA Budapest Information-Centric Networking: Introduction and Key Issues Prof. George Pavlou
Exploiting Path Diversity for Networked Music Performance in the Publish Subscribe Internet
PUBLISHED IN: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS 2015 1 Exploiting Path Diversity for Networked Music Performance in the Publish Subscribe
Research Topics on Information-Centric Networking: Caching, Routing and Virtualization
Research Topics on Information-Centric Networking: Caching, Routing and Virtualization Thomas Silverston JFLI, Japanese-French Laboratory for Informatics (CNRS UMI3527) The University of Tokyo May, 21
Demo 1. Network Path and Quality Validation in the Evolved Packet Core
Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer
CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES
CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES Nakjung Choi, Technical Director, Bell Labs Seoul KRnet 2014, June 24 th, 2014 CONTENT Background on CDN/Cloud/SDN/NFV Video Delivery in the Existing Infrastructure
What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it
What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it The internet is a GREAT INVENTION! The Internet is great! But, ehem.. Houston, we have a problem 2012 2
IRATI - Investigating RINA as an Alternative to TCP/IP
Títol de la presentació de powerpoint IRATI - Investigating RINA as an Alternative to TCP/IP FIRE Engineering Workshop, Ghent, Belgium November 6th, 2012 Sergi Figuerola Project coordinator Director @
ICN-IoT and its Evaluation
ICN-IoT and its Evaluation Sugang Li, Yanyong Zhang, Dipankar Raychaudhuri (WINLAB, Rutgers University) Ravishankar Ravindran, GQ Wang (Huawei Research Center) Phase I: ICN-IoT Architecture IoT Architectural
C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids C-DAX Consortium
C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids C-DAX Consortium C- DAX is funded by the European Union's Seventh Framework Programme (FP7- ICT- 2011-8) under grant agreement n 318708 C-DAX
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Fundamentals of Mobile and Pervasive Computing
Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids
Communication Networks C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids Michael Menth http://kn.inf.uni-tuebingen.de C-DAX Project EC FP7-ICT-2011-8 call project C-DAX: Cyber-secure Data And
Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video
Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video Miguel Rio, John Mitchell, David Griffin, Eleni Mykoniati, Raul Landa, Richard Clegg Department of Electronic and
Realtime Multi-party Video Conferencing Service over Information Centric Networks
Realtime Multi-party Video Conferencing Service over Information Centric Networks (Anil Jangam, Ravishankar Ravindran, Asit Chakraborti, Xili Wan, Guoqiang Wang ) University of Maryland, Baltimore County,
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Supporting Information-Centric Networking in SDN
Supporting Information-Centric Networking in SDN Peng Li, Wu Muqing, Wang Ning, and Liu Hongbao Abstract Recently the Software-Defined Networking (SDN) has attracted increasing attention in the research
Networking Research: Trends and Issues
1 Networking Research: Trends and Issues Deep Medhi Networking & Telecommunication Research (NeTReL) Computer Science & Electrical Engineering Department School of Computing & Engineering University of
Denial of Service Attacks and Resilient Overlay Networks
Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University Motivation: Network Service Availability Motivation:
TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents
WHITE PAPER TrustNet CryptoFlow Group Encryption Table of Contents Executive Summary...1 The Challenges of Securing Any-to- Any Networks with a Point-to-Point Solution...2 A Smarter Approach to Network
Mobile Multimedia Meet Cloud: Challenges and Future Directions
Mobile Multimedia Meet Cloud: Challenges and Future Directions Chang Wen Chen State University of New York at Buffalo 1 Outline Mobile multimedia: Convergence and rapid growth Coming of a new era: Cloud
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Packet Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, [email protected] Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
CS6204 Advanced Topics in Networking
CS6204 Advanced Topics in Networking Assoc Prof. Chan Mun Choon School of Computing National University of Singapore Aug 14, 2015 CS6204 Lecturer Chan Mun Choon Office: COM2, #04-17 Email: [email protected]
Deliverable D7.1. Project Website and Project Presentation
Enriched Network aware Video Services over Internet Overlay Networks www.envision project.org Deliverable D7.1 Project Website and Project Presentation Public report, Final Version, 29 January 2010 Authors
SANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
MetroNet6 - Homeland Security IPv6 R&D over Wireless
MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force [email protected] Acknowledgement Reference:
Boosting mobility performance with Multi-Path TCP
Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,
Experiment of network services invocation in the Orange testbed The CINA interface
Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs [email protected] Workshop «Optimisation of Network
ATCN 2014: SDN - Mobility and SDN: Mobility Management and Mobile Networks
ATCN 2014: SDN - Mobility and SDN: Mobility Management and Mobile Networks Karin Anna Hummel, ETH Zurich (thanks to Vasileios Kotronis for some material) November 10, 2014 1 Locating and Connecting 2 Wireless
Views on Wireless Network Convergence
Views on Wireless Network Convergence Yan PENG, Bin XIA, Meng LIANG Version 1.0 Agenda Motivations for Wireless Network Convergence Convergence Categories Issues on IP based Convergence A Possible Evolution
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
SpiderCloud E-RAN Security Overview
SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5
THE FUTURE OF SMART GRID COMMUNICATIONS
THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND
CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION?
CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? Andreas Gladisch, Fritz-Joachim Westphal Deutsche Telekom Innovation Labs COMPLEXITY BY DOZENS OF SPECIALIZED BOXES AND THOUSANDS OF PROTOCOLS.
ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:
DSL Access Guide DSL Access Routers ZyXEL is a leading manufacturer and supplier of DSL and Voice over IP routers. ZyXEL offer a complete portfolio of routers suited for Telecoms providers, Internet Service
Network Virtualization: A Tutorial
Network Virtualization: A Tutorial George N. Rouskas Department of Computer Science North Carolina State University http://rouskas.csc.ncsu.edu/ Network Virtualization: A Tutorial OFC 2012, March 2012
P2P and IMS Cooperation / Integration
P2P and IMS Cooperation / Integration Jens Fiedler Fraunhofer FOKUS Group for Next Generation Network Infrastructures 1 P2P vs. IMS Isn t P2P and IMS like Fire and Water? No, more like Fish and Chips.
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Components and Concepts of the Ambient Networks Architecture
Components and Concepts of the Ambient Networks Architecture Andreas Schieder, Ericsson Deutschland GmbH, Ericsson Allee 1, 52134 Herzogenrath, Germany Lars Eggert, NEC Europe Ltd., Network Laboratories,
Huawei Agile WAN Solution
Huawei Agile WAN Solution WAN Development and Challenge As more Enterprise services are deployed on IT systems and transmitted over IP networks, Enterprise networks are expanding to support more service
Chapter 1 Instructor Version
Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic
Social-Aware Virtual Network Embedding for Wireless Content Delivery SAViNE Chrysa Papagianni, Aris Leivadeas, Symeon Papavassiliou
Social-Aware Virtual Network Embedding for Wireless Content Delivery SAViNE Chrysa Papagianni, Aris Leivadeas, Symeon Papavassiliou Network Management & Optimal Design Laboratory National Technical University
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
Live Streaming with Content Centric Networking
Live Streaming with Content Centric Networking Hongfeng Xu 2,3, Zhen Chen 1,3, Rui Chen 2,3, Junwei Cao 1,3 1 Research Institute of Information Technology 2 Department of Computer Science and Technology
Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast
Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical
Wireless Sensor Networks Chapter 3: Network architecture
Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general
The Next Generation Network:
JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite
METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT
Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16
Mobile Broadband Technology & Services: Sustainability Factors
Mobile Broadband Technology & Services: Sustainability Factors Fisseha Mekuria (PhD.) CSIR Modelling and Digital Sciences, Mobile Computing Platforms. Pretoria 0001, South Africa. [email protected] Abstract:
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
CSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Final Review Stefan Savage Final Mechanics Will cover entire year of material (but likely with some bias to the material post-midterm) Based on lecture material,
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
NextServe Framework: Supporting Services Over Content-Centric Networking
NextServe Framework: Supporting Services Over Content-Centric Networking Dima Mansour, Torsten Braun, and Carlos Anastasiades Communication and Distributed Systems, University of Bern Neubruckstrasse 10,
Comparing Alternative Approaches for Networking of Named Objects in the Future Internet
Comparing Alternative Approaches for Networking of Named Objects in the Future Internet Akash Baid, Tam Vu, Dipankar Raychaudhuri WINLAB, Rutgers University, {baid, tamvu, ray}@winlab.rutgers.edu Abstract
Extensible Network Configuration and Communication Framework
Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis
SDN PARTNER INTEGRATION: SANDVINE
SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
SICSA SDN Workshop Event Report
SICSA SDN Workshop Event Report Summary: 1. The workshop was held successfully on 19 September 2013 at the Informatics Forum within the School of Informatics, University of Edinburgh. 2. The event has
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany [email protected] Abstract. Network infrastructures are nowadays
