Information-Centric Future Mobile and Wireless Access Networks

Size: px
Start display at page:

Download "Information-Centric Future Mobile and Wireless Access Networks"

Transcription

1 Information-Centric Future Mobile and Wireless Access Networks George C. Polyzos Mobile Multimedia Laboratory Department of Informatics School of Information Sciences and Technology Athens University of Economics and Business Athens, Greece Tel.: , Fax: AUEB/MMlab Collaborators Faculty: G. Xylomenos, V. Siris, G. Marias, St. Toumpis PostDocs: N. Fotiou, P. Frangoudis PhD students: I. Thomas, C. Tsilopoulos, X. Vasilakos MSc students: D. Dimopoulos, A. Tsolakou

2 Outline Information-Centric Networking (ICN) Motivation, history, approaches Pub-Sub Internetworking (PSI): unique features About the MMlab: people and other projects φsat: The role of Satellites in the Future Internet SatNEx: Satellite Network of Experts POINT: IP Over ICN - The Better IP? Other/different projects I-CAN: Information-Centric Access Networks Overview/approach Architecture Results and publications [email protected] 2

3 Internet History and Outlook At the beginning cooperation; no competition no commercial traffic! endpoint-centric services/e2e Now Content distribution >50% of traffic today is video Overlays DPI by ISPs Trust? Endpoint trust? E2E? viruses, phishing, DoS attacks NAT, firewalls, middleboxes, CDNs The sender has the power Tussles e.g.: privacy vs. accountability towards Information-Centric Networking Connecting Wires the past Interconnecting Computers the current Internet evolutionary development started decades earlier Interconnecting Information the Future Internet revolutionary research years in the future tussle resolution at or near run-time Trust-to-Trust principle 3

4 Publish-Subscribe Internet Vision information centrism everything is information & information is everything Recursive & and generalized use of publish-subscribe enables dynamic change of roles between actors Network cache publishes info (cached) subscribes to get info to cache Access Points publish ID mobiles subscribe Objectives Specify, implement, & test an internetworked pub/sub architecture follow a clean-slate design approach Perform qualitative and quantitative evaluation Security and socio-economics important! Migration and incentive scenarios important (e.g., overlay)! [email protected] 4

5 ICN timeline papers/talks projects Van Jacobson CCN A Survey of Information-Centric Networking Research, IEEE Communications Surveys and Tutorials, vol. 16, no. 2, [email protected] 5

6 Content Centric Networking (CCN) / Named Data Networking (NDN) PARC NDN /2 NSF UCLA, [email protected] 6

7 MobilityFirst 160 bit Globally Unique Identifier (GUID) for each information object, device, service GUID translated into a network address (IP) through a Global Name Resolution Service (GNRS) publishers register GUIDs to GNRS and subscribers perform requests/queries routing takes place based on the network address [email protected] 7

8 Our ICN-related Research Projects PSIRP: Publish Subscribe Internet Routing Paradigm FP7 ICT STREP, the basis focus on (inter)-networking PURSUIT: Publish Subscribe Internet Technologies FP7 ICT STREP, extending, above & below the Internet layer optical, wireless, mobility, transport Euro-NF: Anticipating the Network of the Future From Theory to Design FP7 ICT Network of Excellence, ASPECTS, GOVPIMIT, E-key-nets EIFFEL: Evolved Internet Future For European Leadership FP7 ICT SSA, ; Think-Tank continued June 2011 MIT: Information-Centric Networking φsat: The Role of Satellites in Future Internet Services European Space Agency funded I-CAN: Information-Centric Future Access Networks NSRF (Greece), POINT: IP Over ICN- The better IP H2020 ICT STREP, [email protected] 8

9 Publish-Subscribe Internetworking (PSI) Key Functions and Components publish subscribe rendezvous Rendezvous ID: hash of content (/name) asynchronous and multicast restores the imbalance of power sender/receiver(s) + Scope ID: aggregation, policies PSI Basic Functions: RTF Rendezvous: Matches publications with subscriptions and initializes forwarding Topology: Monitors the network and creates information delivery paths Forwarding G. Xylomenos et al., Caching and Mobility Support in a Publish-Subscribe Internet Architecture, IEEE Communications Magazine, July [email protected] 9

10 PSI Identifiers 10

11 PSI Unique Features Fast forwarding Bloom filter based forwarding ( forwarding identifiers) simple, stateless, fast forwarding incl. for multicast path ( source ) routing path as compact Bloom filter carried on packets Centralized SDN compatible approach (intra-domain) routing/resource allocation topology discovery/management recursive use of pub/sub object level chunk/packet level pull transport, error control, rcvr flow control = slow & fast rendezvous topology formation: handover = subscribe to network [email protected] 11

12 Secure Forwarding Mechanism (LIPSIN) Forwarding based on Bloom filter (called zfilter) that contains all the link IDs through which a packet has to travel Supports multicast Hashing False positives Limitations in size Hierarchical / inter-networks Link identifiers are unique zfilter creation involves an encryption mechanism DoS attack resistant Almost impossible to redirect an information flow send arbitrary packets to a destination [email protected] 12

13 zfilters Based Forwarding (LIPSIN) P. Jokela, et al., LIPSIN: Line Speed Publish/ Subscribe Inter-networking, Proc. ACM SIGCOMM

14 Prototype Implementations & Testbeds PSIRP 2. PURSUIT Testbed (w/ Blackadder) 25 nodes 5 countries: UK, FI, GR, D, US Tunneled (VPN) over the public Internet PURSUIT 1. PSIRP Testbed (w/ Blackhawk) 6 countries: UK, FI, GR, D, BU, US In addition: Belgium during ICT demos Tunneled over the public Internet +dedicated fiber where available 3. φsat Testbed w/ SAT emulation D. Trossen and G. Parisis, Designing and realizing an information-centric internet, IEEE Communications Magazine, vol. 50, July [email protected] 14

15 An Information-Centric Overlay Network Architecture for Content Distribution and Mobility Support Ph.D. Dissertation by Konstantinos Katsaros Multicast Router Assisted Overlay Multicast (RAOM) Deploying multicast functionality in an overlay fashion Multicast & Caching MultiCache Enabling caching of data delivered by multicast trees Adapting to the inter-network structure H-Pastry Canonical version of Pastry Mobility Support Overlay Multicast Assisted Mobility (OMAM) Revisiting multicast assisted mobility K.V. Katsaros, G. Xylomenos, G.C. Polyzos, MultiCache: an Overlay Architecture for Information-Centric Networking, Computer Networks, vol. 55, no. 4, pp , Special Issue on Architectures and Protocols for the Future Internet, March

16 Outlook & Open Issues Scalability and Performance Issues Scalable global rendezvous Transport protocols Multimedia distribution N. Fotiou, K.V. Katsaros, G. Xylomenos, G.C. Polyzos, H-Pastry: An inter-domain topology aware overlay for the support of name-resolution services in the future Internet, Computer Communications, Elsevier (online 2/15). Y. Thomas, C. Tsilopoulos, G. Xylomenos, G.C. Polyzos, Accelerating File Downloads in Publish Subscribe Internetworking with Multisource and Multipath Transfers, Proc. World Telecommunications Congress, Berlin, Germany, 6/2014. C. Tsilopoulos, G. Xylomenos, G.C. Polyzos, Are Information-Centric Networks Video-Ready? Proc. PV2013, San Jose, CA, December Security and privacy Deployment and Interoperability Issues Cheap ICN? http only? Internet of Things opportunity! 16

17 PSI Security & Privacy in addition to intrinsic ICN security features Publisher and Subscriber do not know each other Scopes: PSI s information firewalls Bloom filter path cannot be replayed rotation of link IDs DoS attacks to publishers/subscribers eradicated Rendezvous (point/network) knows much Privacy wrt: publisher: great (at network & higher layers) rendezvous (broker): bad proposal: use Homomorphic Encryption N. Fotiou, D. Trossen, G.F. Marias, A. Kostopoulos, G.C. Polyzos, Enhancing Information Lookup Privacy through Homomorphic Encryption, Security and Communication Networks (to appear). Access Control Delegation important for fast effective and efficient caching N. Fotiou, G.F. Marias, G.C. Polyzos, Access Control Enforcement Delegation for Information-Centric Networking Architectures, ACM SIGCOMM Computer Communication Review, Vol. 42, No. 4, Oct [email protected] 17

18 ICN Security & Privacy ACM ICN 2014 (Paris) ICN Privacy and Name based Security (Fotiou & Polyzos) Remarks ICN-IP relationship Some of the techniques are adapted for ICN from the existing IP networks More generally, many of techniques are also applicable to the existing IP networks Same for threats and objectives but there are also differences Important open issues Performance trade offs on a concrete system Caching vs. Privacy vs. Confidentiality Governance and authorities On non random identifiers (human readable) e.g., details on naming Shared responsibility for important decisions or actions, departure from single TTP models Bitcoin vs. Certificates/PKI Byzantine agreement, NSA free architectures Global policies Traffic engineering [email protected] 18

19 ICN Research Community workshops with ACM SIGCOMM ICN 2011 (Toronto) ICN 2012 (Helsinki) ICN 2013 (Hong Kong) with IEEE INFOCOM NOMEN 2012, st ACM SIGCOMM ICN Conference Paris Sept nd ACM SIGCOMM ICN Conference San Francisco, end Sept ICNRG@IERTF Journals & Magazines Special Issues [email protected] 19

20 POINT: IP Over ICN - The Better IP? Project Running: 1/1/ /12/2017 Partners: Aalto U (co-ordinator), ELL-i (FI) Intracom Telecom, AUEB (GR) RWTH Aachen (DE) Primetel (CY) CTVC Ltd, Interdigital, U Essex (UK) Concept Premise: IP apps can do better over ICN Need to define what better means Better utilisation in HTTP streaming scenarios Better privacy of personal data and metadata Better management of virtual network paths Better (fairer) content distribution Focus 1 provider UE: no changes (required) ICN used internally ICN could be exposed to UE [email protected] 20

21 Faculty Involved in I-CAN George C. Polyzos, Director Giannis Marias George Xylomenos Vasilios A. Siris Stavros Toumpis Other faculty Iordanis Koutsopoulos Vana Kalogeraki George Papaioannou Andreas Veneris Senior Researchers/PostDocs Merkourios Karaliopoulos, PhD Nikos Fotiou, PhD Vaggelis Douros, PhD Ph.D. students Xenofon Vasilakos Yannis Thomas Charilaos Stais Christos Tsilopoulos MSc students Researchers Undergraduate students 21

22 Information-Centric future mobile and wireless Access Networks Motivation: Mobiles have multiple wireless interfaces Different wireless access technologies have different characteristics Mobility presents new challenges and opportunities 3G/4G Wi-Fi hotspot Objectives are to investigate ICN architecture requirements & features for mobile/wireless access networks multi-source, multi-path, multi-interface in-network and proactive caching privacy support D2D/ Wi-Fi direct 22

23 I-CAN Architecture Features Publication proxies: store and advertise content on behalf of content owners Content remains available even when owner is offline Subscription proxies: send subscriptions on behalf of actual receivers Beneficial if users are mobile and have disconnections Can exploit proactive caching Future content & persistent subscriptions Can reduce signaling overhead in cellular and contention-based access networks 23

24 More I-CAN Architecture Features Content names: need for naming structure supporting both global and local significance Centralized, decentralized, and fast rendezvous Centralized: few nodes perform rendezvous Decentralized: even mobiles perform rendezvous; appropriate for local access networks Multi-source, multi-interface content transfer Exploits multiple network technologies: cellular, Wi-Fi, D2D Content-centric security & privacy 24

25 Mobile Multi-Source Video Streaming Exploit multi-source & multi-interface for lower cost resilience better QoE Mobility-based proactive caching Influence of multi-rate Wi-Fi 25

26 I-CAN Video-Streaming Emulation Experiments (& Demos ) Topology Description Each of the experiments involves a topology and a route described by an xml file An Android device parses this file in order to learn the topology and scenario Scenarios Streaming w/ & w/out Caching Multisource Streaming Fault Tolerance Wi-Fi Direct Data link User s path A 3G B [email protected] 26

27 Secure Publisher Proxy Combines Identity Based Encryption (IBE) Proxy re-encryption The content owner encrypts content using a (different) symmetric encryption key Each symmetric key is encrypted using IBE with the owner s identity To access encrypted content, the subscriber needs to decrypt the symmetric encryption key by having the proxy re-encrypt the symmetric key and derive C Subscriber from C Owner [email protected] 27

28 Q-ICN (I-CAN) Workshop w/ QSHINE 2014 (Aug. 20, Rhodes) Open Call MMlab/I-CAN (++) papers G.C. Polyzos, V.A. Siris, G. Xylomenos, G.F. Marias, S. Toumpis, I- CAN: Information-Centric Future Mobile and Wireless Access Networks. P. Frangoudis G.C. Polyzos, G.Rubino, Content Dissemination in Wireless Networks Exploiting Relaying and Information-Centric Architectures. (+ INRIA) N. Fotiou and G.C. Polyzos, Realizing the Internet of Things using Information-Centric Networking. V. Douros, N. Fotiou, and G.C. Polyzos, Fighting packet storms in mobile networks with information-centrism. X. Vasilakos, V. A. Siris, Adapting Data Popularity in Mobilitybased Proactive Caching Decisions for Heterogeneous Wireless Networks. Y. Thomas, G. Xylomenos, Towards Improving the Efficiency of ICN Packet-Caches. 28

29 Thank you! Information-Centric Future Mobile and Wireless Access Networks George C. Polyzos Mobile Multimedia Laboratory Department of Informatics School of Information Sciences and Technology Athens University of Economics and Business Athens, Greece

30 Selected MMlab ICN Publications G. Xylomenos, et al., A Survey of Information-Centric Networking Research IEEE Communications Surveys and Tutorials, (online since 19 July 2013). G. Xylomenos, X. Vasilakos, C. Tsilopoulos, V.A. Siris, G.C. Polyzos, Caching and Mobility Support in a Publish-Subscribe Internet Architecture, IEEE Communications Magazine, July N. Fotiou, G.F. Marias, G.C. Polyzos, Access Control Enforcement Delegation for Information-Centric Networking Architectures, ACM SIGCOMM Computer Communication Review, Oct N. Fotiou, D. Trossen, G.F. Marias, A. Kostopoulos, G.C. Polyzos, Enhancing Information Lookup Privacy through Homomorphic Encryption, Security and Communication Networks (online since Nov. 15, 2013). N. Fotiou, K. Katsaros, G.C. Polyzos, M. Sarela, D. Trossen, G. Xylomenos, Handling Mobility in Future Publish-Subscribe Information-Centric Networks, Telecommunication Systems, Springer (online since July 2013). K.V. Katsaros, G. Xylomenos, G.C. Polyzos, MultiCache: an Overlay Architecture for Information-Centric Networking, Computer Networks, Elsevier, March [email protected] 30

31 Selected I-CAN Publications D. Dimopoulos, Ch. Boursinos, and V.A. Siris, Multi-Source Mobile Video Streaming: Load Balancing, Fault Tolerance, and Offloading with Prefetching, Proc. 9th Int'l Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), May V.A. Siris, X. Vasilakos, G.C. Polyzos, Efficient Proactive Caching for Supporting Seamless Mobility, Proc. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Sydney, Australia, June Y. Thomas, C. Tsilopoulos, G. Xylomenos, G.C. Polyzos, Accelerating File Downloads in Publish Subscribe Internetworking with Multisource and Multipath Transfers, Proc. World Telecommunications Congress (WTC), Berlin, Germany, June K.V. Katsaros, X. Vasilakos, T. Okwii, G. Xylomenos, G. Pavlou, and G.C. Polyzos, On the Inter-domain Scalability of Route-by-Name Information-Centric Network Architectures, IFIP Networking N. Fotiou, A. Machas, G.C. Polyzos, G. Xylomenos, Access control as a service for the Cloud, Journal of Internet Services and Applications, Springer (in press). G.C. Polyzos and N. Fotiou, Building a reliable Internet of Things using Information- Centric Networking, Journal of Reliable Intelligent Environments, Springer (available online 1 May 2015). [email protected] 31

Curriculum Vitae. George Xylomenos. Multicast and multimedia communication protocols for heterogeneous networks.

Curriculum Vitae. George Xylomenos. Multicast and multimedia communication protocols for heterogeneous networks. Curriculum Vitae George Xylomenos Contact Information Postal address: Patision 76, Athens 104 34, Greece E-mail address: [email protected] Telephone number: +30 2108203115 Research Interests Future Internet

More information

(Mobile) Content Delivery Networks (CDNs) and Information Centric Networks (ICNs)

(Mobile) Content Delivery Networks (CDNs) and Information Centric Networks (ICNs) Technische Universität München Lehrstuhl für Kommunikationsnetze Prof. Dr.-Ing. Wolfgang Kellerer ITG Fachgruppentreffen 5.2.1 und 5.2.4 (Mobile) Content Delivery Networks (CDNs) and Information Centric

More information

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN

More information

Information-Centric Connectivity (ICCON) K.V. Katsaros, V. Sourlas, I. Psaras, S. Reñé and G. Pavlou University College London

Information-Centric Connectivity (ICCON) K.V. Katsaros, V. Sourlas, I. Psaras, S. Reñé and G. Pavlou University College London Information-Centric Connectivity (ICCON) K.V. Katsaros, V. Sourlas, I. Psaras, S. Reñé and G. Pavlou University College London Information-centrism Expressed by users Increasingly through mobile devices

More information

Information-Centric Networking: Introduction and Key Issues

Information-Centric Networking: Introduction and Key Issues UCL DEPARTMENT OF ELECTRONIC AND ELECTRICAL ENGINEERING COMMUNICATIONS AND INFORMATION SYSTEMS GROUP ICN Session FIA Budapest Information-Centric Networking: Introduction and Key Issues Prof. George Pavlou

More information

Exploiting Path Diversity for Networked Music Performance in the Publish Subscribe Internet

Exploiting Path Diversity for Networked Music Performance in the Publish Subscribe Internet PUBLISHED IN: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS 2015 1 Exploiting Path Diversity for Networked Music Performance in the Publish Subscribe

More information

Research Topics on Information-Centric Networking: Caching, Routing and Virtualization

Research Topics on Information-Centric Networking: Caching, Routing and Virtualization Research Topics on Information-Centric Networking: Caching, Routing and Virtualization Thomas Silverston JFLI, Japanese-French Laboratory for Informatics (CNRS UMI3527) The University of Tokyo May, 21

More information

Demo 1. Network Path and Quality Validation in the Evolved Packet Core

Demo 1. Network Path and Quality Validation in the Evolved Packet Core Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer

More information

CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES

CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES Nakjung Choi, Technical Director, Bell Labs Seoul KRnet 2014, June 24 th, 2014 CONTENT Background on CDN/Cloud/SDN/NFV Video Delivery in the Existing Infrastructure

More information

What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it

What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it The internet is a GREAT INVENTION! The Internet is great! But, ehem.. Houston, we have a problem 2012 2

More information

IRATI - Investigating RINA as an Alternative to TCP/IP

IRATI - Investigating RINA as an Alternative to TCP/IP Títol de la presentació de powerpoint IRATI - Investigating RINA as an Alternative to TCP/IP FIRE Engineering Workshop, Ghent, Belgium November 6th, 2012 Sergi Figuerola Project coordinator Director @

More information

ICN-IoT and its Evaluation

ICN-IoT and its Evaluation ICN-IoT and its Evaluation Sugang Li, Yanyong Zhang, Dipankar Raychaudhuri (WINLAB, Rutgers University) Ravishankar Ravindran, GQ Wang (Huawei Research Center) Phase I: ICN-IoT Architecture IoT Architectural

More information

C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids C-DAX Consortium

C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids C-DAX Consortium C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids C-DAX Consortium C- DAX is funded by the European Union's Seventh Framework Programme (FP7- ICT- 2011-8) under grant agreement n 318708 C-DAX

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Fundamentals of Mobile and Pervasive Computing

Fundamentals of Mobile and Pervasive Computing Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information

C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids

C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids Communication Networks C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids Michael Menth http://kn.inf.uni-tuebingen.de C-DAX Project EC FP7-ICT-2011-8 call project C-DAX: Cyber-secure Data And

More information

Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video

Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video Miguel Rio, John Mitchell, David Griffin, Eleni Mykoniati, Raul Landa, Richard Clegg Department of Electronic and

More information

Realtime Multi-party Video Conferencing Service over Information Centric Networks

Realtime Multi-party Video Conferencing Service over Information Centric Networks Realtime Multi-party Video Conferencing Service over Information Centric Networks (Anil Jangam, Ravishankar Ravindran, Asit Chakraborti, Xili Wan, Guoqiang Wang ) University of Maryland, Baltimore County,

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

Supporting Information-Centric Networking in SDN

Supporting Information-Centric Networking in SDN Supporting Information-Centric Networking in SDN Peng Li, Wu Muqing, Wang Ning, and Liu Hongbao Abstract Recently the Software-Defined Networking (SDN) has attracted increasing attention in the research

More information

Networking Research: Trends and Issues

Networking Research: Trends and Issues 1 Networking Research: Trends and Issues Deep Medhi Networking & Telecommunication Research (NeTReL) Computer Science & Electrical Engineering Department School of Computing & Engineering University of

More information

Denial of Service Attacks and Resilient Overlay Networks

Denial of Service Attacks and Resilient Overlay Networks Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University Motivation: Network Service Availability Motivation:

More information

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents WHITE PAPER TrustNet CryptoFlow Group Encryption Table of Contents Executive Summary...1 The Challenges of Securing Any-to- Any Networks with a Point-to-Point Solution...2 A Smarter Approach to Network

More information

Mobile Multimedia Meet Cloud: Challenges and Future Directions

Mobile Multimedia Meet Cloud: Challenges and Future Directions Mobile Multimedia Meet Cloud: Challenges and Future Directions Chang Wen Chen State University of New York at Buffalo 1 Outline Mobile multimedia: Convergence and rapid growth Coming of a new era: Cloud

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

Packet Level Authentication Overview

Packet Level Authentication Overview Packet Level Authentication Overview Dmitrij Lagutin, [email protected] Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction

More information

CS6204 Advanced Topics in Networking

CS6204 Advanced Topics in Networking CS6204 Advanced Topics in Networking Assoc Prof. Chan Mun Choon School of Computing National University of Singapore Aug 14, 2015 CS6204 Lecturer Chan Mun Choon Office: COM2, #04-17 Email: [email protected]

More information

Deliverable D7.1. Project Website and Project Presentation

Deliverable D7.1. Project Website and Project Presentation Enriched Network aware Video Services over Internet Overlay Networks www.envision project.org Deliverable D7.1 Project Website and Project Presentation Public report, Final Version, 29 January 2010 Authors

More information

SANE: A Protection Architecture For Enterprise Networks

SANE: A Protection Architecture For Enterprise Networks Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force [email protected] Acknowledgement Reference:

More information

Boosting mobility performance with Multi-Path TCP

Boosting mobility performance with Multi-Path TCP Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,

More information

Experiment of network services invocation in the Orange testbed The CINA interface

Experiment of network services invocation in the Orange testbed The CINA interface Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs [email protected] Workshop «Optimisation of Network

More information

ATCN 2014: SDN - Mobility and SDN: Mobility Management and Mobile Networks

ATCN 2014: SDN - Mobility and SDN: Mobility Management and Mobile Networks ATCN 2014: SDN - Mobility and SDN: Mobility Management and Mobile Networks Karin Anna Hummel, ETH Zurich (thanks to Vasileios Kotronis for some material) November 10, 2014 1 Locating and Connecting 2 Wireless

More information

Views on Wireless Network Convergence

Views on Wireless Network Convergence Views on Wireless Network Convergence Yan PENG, Bin XIA, Meng LIANG Version 1.0 Agenda Motivations for Wireless Network Convergence Convergence Categories Issues on IP based Convergence A Possible Evolution

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

SpiderCloud E-RAN Security Overview

SpiderCloud E-RAN Security Overview SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5

More information

THE FUTURE OF SMART GRID COMMUNICATIONS

THE FUTURE OF SMART GRID COMMUNICATIONS THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND

More information

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION?

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? Andreas Gladisch, Fritz-Joachim Westphal Deutsche Telekom Innovation Labs COMPLEXITY BY DOZENS OF SPECIALIZED BOXES AND THOUSANDS OF PROTOCOLS.

More information

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer: DSL Access Guide DSL Access Routers ZyXEL is a leading manufacturer and supplier of DSL and Voice over IP routers. ZyXEL offer a complete portfolio of routers suited for Telecoms providers, Internet Service

More information

Network Virtualization: A Tutorial

Network Virtualization: A Tutorial Network Virtualization: A Tutorial George N. Rouskas Department of Computer Science North Carolina State University http://rouskas.csc.ncsu.edu/ Network Virtualization: A Tutorial OFC 2012, March 2012

More information

P2P and IMS Cooperation / Integration

P2P and IMS Cooperation / Integration P2P and IMS Cooperation / Integration Jens Fiedler Fraunhofer FOKUS Group for Next Generation Network Infrastructures 1 P2P vs. IMS Isn t P2P and IMS like Fire and Water? No, more like Fish and Chips.

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Components and Concepts of the Ambient Networks Architecture

Components and Concepts of the Ambient Networks Architecture Components and Concepts of the Ambient Networks Architecture Andreas Schieder, Ericsson Deutschland GmbH, Ericsson Allee 1, 52134 Herzogenrath, Germany Lars Eggert, NEC Europe Ltd., Network Laboratories,

More information

Huawei Agile WAN Solution

Huawei Agile WAN Solution Huawei Agile WAN Solution WAN Development and Challenge As more Enterprise services are deployed on IT systems and transmitted over IP networks, Enterprise networks are expanding to support more service

More information

Chapter 1 Instructor Version

Chapter 1 Instructor Version Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic

More information

Social-Aware Virtual Network Embedding for Wireless Content Delivery SAViNE Chrysa Papagianni, Aris Leivadeas, Symeon Papavassiliou

Social-Aware Virtual Network Embedding for Wireless Content Delivery SAViNE Chrysa Papagianni, Aris Leivadeas, Symeon Papavassiliou Social-Aware Virtual Network Embedding for Wireless Content Delivery SAViNE Chrysa Papagianni, Aris Leivadeas, Symeon Papavassiliou Network Management & Optimal Design Laboratory National Technical University

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Live Streaming with Content Centric Networking

Live Streaming with Content Centric Networking Live Streaming with Content Centric Networking Hongfeng Xu 2,3, Zhen Chen 1,3, Rui Chen 2,3, Junwei Cao 1,3 1 Research Institute of Information Technology 2 Department of Computer Science and Technology

More information

Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast

Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical

More information

Wireless Sensor Networks Chapter 3: Network architecture

Wireless Sensor Networks Chapter 3: Network architecture Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general

More information

The Next Generation Network:

The Next Generation Network: JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite

More information

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16

More information

Mobile Broadband Technology & Services: Sustainability Factors

Mobile Broadband Technology & Services: Sustainability Factors Mobile Broadband Technology & Services: Sustainability Factors Fisseha Mekuria (PhD.) CSIR Modelling and Digital Sciences, Mobile Computing Platforms. Pretoria 0001, South Africa. [email protected] Abstract:

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Final Review Stefan Savage Final Mechanics Will cover entire year of material (but likely with some bias to the material post-midterm) Based on lecture material,

More information

A Review on Zero Day Attack Safety Using Different Scenarios

A Review on Zero Day Attack Safety Using Different Scenarios Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios

More information

NextServe Framework: Supporting Services Over Content-Centric Networking

NextServe Framework: Supporting Services Over Content-Centric Networking NextServe Framework: Supporting Services Over Content-Centric Networking Dima Mansour, Torsten Braun, and Carlos Anastasiades Communication and Distributed Systems, University of Bern Neubruckstrasse 10,

More information

Comparing Alternative Approaches for Networking of Named Objects in the Future Internet

Comparing Alternative Approaches for Networking of Named Objects in the Future Internet Comparing Alternative Approaches for Networking of Named Objects in the Future Internet Akash Baid, Tam Vu, Dipankar Raychaudhuri WINLAB, Rutgers University, {baid, tamvu, ray}@winlab.rutgers.edu Abstract

More information

Extensible Network Configuration and Communication Framework

Extensible Network Configuration and Communication Framework Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis

More information

SDN PARTNER INTEGRATION: SANDVINE

SDN PARTNER INTEGRATION: SANDVINE SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight

More information

SICSA SDN Workshop Event Report

SICSA SDN Workshop Event Report SICSA SDN Workshop Event Report Summary: 1. The workshop was held successfully on 19 September 2013 at the Informatics Forum within the School of Informatics, University of Edinburgh. 2. The event has

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany [email protected] Abstract. Network infrastructures are nowadays

More information