Stroboscope: Declarative Network Monitoring on a Budget
|
|
- Adela Barnett
- 5 years ago
- Views:
Transcription
1 Stroboscope: Declarative Network Monitoring on a Budget Olivier Tilmans Université catholique de Louvain USENIX NSDI 18 April 11, 2018 Joint work with T. Bühler (ETH Zürich), I. Poese (BENOCS), S. Vissicchio (UCL) and L. Vanbever (ETH Zürich) Adapted from original picture Michael Magg, 2007, CC-BY-SA 3.0
2 Consider this example ISP network topology Border router Router E U Link /24 A B C D Customer peering X Y W Z V 2
3 What is the ingress router for this packet arriving at router D? E U /24 A B C D X Y Packet W Z V 2
4 Which paths does the traffic follow? E U /24 A B C D X Y W Z V 2
5 Which paths does the traffic follow? E Tracking flows network-wide requires to /24 match measurements across multiple vantage points A B C D U X Y W Z V 2
6 Which paths does the traffic follow? E Tracking flows network-wide requires to /24 match measurements across multiple vantage points A B C D NetFlow, ProgME [ToN 11], FlowRadar [NSDI 16] X Y U W Z V 2
7 Is traffic load-balanced as expected? E U /24 A B C D X Y W Z V 3
8 Is the latency acceptable? Packets Time(t) E A B C D U /24 Time(t + 25ms) E U /24 A B C D X Y X Y 3 2 W Z V W Z V 1 3
9 Are there losses? Time(t) 3 2 E U /24 A B C D Time(t + 25ms) E U /24 A B C D X Y X Y 3 W Z V W Z V 1 3
10 Are there losses? Time(t) Time(t + 25ms) E U Fine-grained data-plane performance metrics require packet-level visibility /24 over individual flows A B C D A B C D E U /24 X Y X Y 3 W Z V W Z V 1 3
11 Fined-grained network monitoring is widely researched Gigascope [SIGMOD 03] Planck [SIGCOMM 14] Everflow [SIGCOMM 15] Compiling Path Queries [NSDI 16] Trumpet [SIGCOMM 16] Marple [SIGCOMM 17] 4
12 Fined-grained ISP network monitoring poses unique and unmet challenges Gigascope [SIGMOD 03] No control over end hosts Planck [SIGCOMM 14] Everflow [SIGCOMM 15] Compiling Path Queries [NSDI 16] Trumpet [SIGCOMM 16] Marple [SIGCOMM 17] 4
13 Fined-grained ISP network monitoring poses unique and unmet challenges Gigascope [SIGMOD 03] No control over end hosts Limited data-plane flexibility Planck [SIGCOMM 14] Everflow [SIGCOMM 15] Compiling Path Queries [NSDI 16] Trumpet [SIGCOMM 16] Marple [SIGCOMM 17] 4
14 Fined-grained ISP network monitoring poses unique and unmet challenges Gigascope [SIGMOD 03] No control over end hosts Limited data-plane flexibility Limited monitoring bandwidth Planck [SIGCOMM 14] Everflow [SIGCOMM 15] Compiling Path Queries [NSDI 16] Trumpet [SIGCOMM 16] Marple [SIGCOMM 17] 4
15 Stroboscope: Declarative Network Monitoring on a Budget Collecting traffic slices to monitor networks Adhering to a monitoring budget Using Stroboscope today
16 Consider the following flow of packets E U / A B C D X Y W Z V 6
17 Consider the following flow of packets E U / A 1 B C D X Y W Z V 6
18 Stroboscope activates mirroring for the flow Node mirroring rule E U / A 1 B C D Collector X Y W Z V 6
19 Packets are copied and encapsulated towards the collector E U / A 4 3 B 2 1 C D Collector X Y Mirrored packet W Z V 6
20 The mirroring rule is deactivated after a preset delay E U / A 4 3 B 2 1 C D Collector X Y Mirrored packet W Z V 6
21 Stroboscope stores the traffic slice for analysis E U / A 6 5 B 4 3 C 2 1 D Collector X Y Collected traffic slice W Z V 6
22 Stroboscope periodically toggles the mirroring rule E U / A 7 6 B 5 4 C 3 2 D Collector X Y W Z V 6
23 Stroboscope periodically toggles the mirroring rule E U /24 A 10 B 9 8 C 7 6 D Collector X Y W Z V 6
24 Stroboscope periodically toggles the mirroring rule E U /24 A 10 B 9 8 C 7 6 D Collector X Y W Z V 6
25 Stroboscope collects multiples traffic slices over time E U /24 A 11 B 10 C 9 8 D Collector X Y W Z V 6
26 Stroboscope works with currently deployed routers Most vendors provide traffic mirroring and encapsulation primitives The collector activates mirroring for a flow by updating one ACL Routers autonomously deactivate mirroring rules using timers Traffic slices can be as small as 23 ms on our routers (Cisco C7018) 7
27 Consider the following forwarding path E U /24 A B C D X Y W Z V 8
28 Stroboscope activates mirroring rules along a path MIRROR /24 ON [A B C D] E U /24 A B C D X Y W Z V 8
29 Traffic slices are collected 25 ms E U / X 8 A B C D 3 4 X X W X Z Y V 8
30 A CONFINE query mirrors any packet leaving a region MIRROR /24 ON [A B C D] CONFINE /24 ON [A B E C D] E U /24 A B C D W X Z Y V Confinement region 8
31 A CONFINE query mirrors any packet leaving a region MIRROR /24 ON [A B C D] CONFINE /24 ON [A B E C D] E U /24 A B C D W X Z Y V Confinement region 8
32 Counting packets missing in all last hops of a path estimates loss rates E U / X 8 A B C D 3 4 X X W X Z Y V 8
33 Counting packets partially following the path estimates load-balancing ratios E U / X 8 A B C D 3 4 X X W X Z Y V 8
34 Analyzing matching packets across traffic slices enables fine-grained measurements at scale
35 Analyzing matching packets across traffic slices enables fine-grained measurements at scale Forwarding paths discovery, timestamp reconstruction, payload inspection,...
36 Stroboscope: Declarative Network Monitoring on a Budget Collecting traffic slices to monitor networks Adhering to a monitoring budget Using Stroboscope today
37 Stroboscope defines two types of queries MIRROR CONFINE 11
38 Stroboscope defines two types of queries MIRROR CONFINE 11
39 MIRROR queries reconstruct the path taken by packets MIRROR /24 ON [A B C D] E U /24 A B C D X Y W Z V 12
40 Fewer mirroring rules reduces bandwidth usage MIRROR /24 ON [A B C D] E U /24 A B C D X Y W Z V 12
41 Too few mirroring rules creates ambiguity MIRROR /24 ON [A B C D] E U /24 A B C D X Y W Z V 12
42 Too few mirroring rules creates ambiguity MIRROR /24 ON [A B C D] E The Key-Points Sampling algorithm minimizes mirroring rules and guarantees non-ambiguous reconstructed /24 paths A B C D U X Y W Z V 12
43 Stroboscope defines two types of queries MIRROR CONFINE 13
44 CONFINE queries mirror packets leaving a confinement region CONFINE /24 ON [A B E C D] E U /24 A B C D X Y Edge Mirroring rule W Z V 14
45 Fewer mirroring rules minimizes control-plane overhead CONFINE /24 ON [A B E C D] E U /24 A B C D X Y W Z V 14
46 The lower bound is a multi-terminal node cut CONFINE /24 ON [A B E C D] E U /24 A B C D X Y W Z V 14
47 The lower bound is a multi-terminal node cut CONFINE /24 ON [A B E C D] E A B C D U The Surrounding algorithm minimizes mirroring rules and guarantees to mirror any packet leaving /24 the confinement region X Y W Z V 14
48 Query activations must be scheduled to meet the budget Monitoring queries Where? When? Measurement campaign Key-Points Sampling Surrounding 15
49 Stroboscope divides the monitoring budget in timeslots 150 ms 40 Mbps Timeslot ( 30 ms) 16
50 Stroboscope requires traffic demand estimations? Mbps Q1 Q2 Q3? Mbps Q4 Q5? Mbps Q6 40 Mbps 16
51 Stroboscope conservatively estimates traffic demands Prefix measured in prior iterations? 17
52 Stroboscope conservatively estimates traffic demands Prefix measured in prior iterations? yes Peak observed demand 17
53 Stroboscope conservatively estimates traffic demands Prefix measured in prior iterations? no yes Peak observed demand Prefix with enough NetFlow records? 17
54 Stroboscope conservatively estimates traffic demands Prefix measured in prior iterations? yes Peak observed demand no Prefix with enough NetFlow records? yes NetFlow estimation 17
55 Stroboscope conservatively estimates traffic demands Prefix measured in prior iterations? yes Peak observed demand no Prefix with enough NetFlow records? yes NetFlow estimation no Assume the query requires the full budget 17
56 Confine queries are scheduled in all timeslots 10 Mbps Q1 Q2 Q3 15 Mbps Q4 Q5 20 Mbps Q6 40 Mbps 0* Mbps Confine query 18
57 Stroboscope first approximates a minimal sub-schedule Q4 Q6 Q2 Q1 Q5 Q3 Minimal sub-schedule
58 Stroboscope first approximates a minimal sub-schedule, optionally optimizing for the optimal bin-packing solution Q4 Q2 Q1 Minimal sub-schedule Q2 Q1 Q3 Q5 Q6 Q5 Q3 Q6 Q4 Minimal sub-schedule 19
59 Stroboscope replicates the sub-schedule Q2 Q3 Q2 Q3 Q1 Q5 Q1 Q5 Q6 Q4 Q6 Q4 Minimal sub-schedule
60 Stroboscope replicates the sub-schedule, and minimizes budget leftovers Q2 Q3 Q2 Q3 Budget usage maximization Q2 Q3 Q2 Q3 Q3 Q1 Q5 Q1 Q5 Q1 Q5 Q1 Q5 Q1 Q6 Q4 Q6 Q4 Q6 Q4 Q6 Q4 Q6 Minimal sub-schedule 20
61 Stroboscope achieves deterministic sampling
62 Stroboscope: Declarative Network Monitoring on a Budget Collecting traffic slices to monitor networks Adhering to a monitoring budget Using Stroboscope today
63 Selecting mirroring locations in realistic ISP topologies is fast Time [ms] Key-Points Sampling Input path length Time [ms] Minimal surrounding Node surrounding Region size 23
64 Schedules can be quickly approximated Time [s] Input query count Optimized schedule Approximation 24
65 Stroboscope tracks the rate of mirrored traffic in real time Source A B 1 000Kb/s Destination Collector MIRROR ON [A B] Traffic rate [Kb/s] 5000 budget 2000 mirrored 1000 real Time [s] 25
66 Measurement campaigns are stopped early if the estimated demand are exceeded Source A B Destination Kb/s Collector MIRROR ON [A B] Traffic rate [Kb/s] 5000 budget 2000 mirrored 1000 real Time [s] 25
67 Exceeding the total budget schedules the query once per measurement campaign Source A B 1 000Kb/s Destination Collector MIRROR ON [A B] Traffic rate [Kb/s] 5000 budget 2000 mirrored 1000 real Time [s] 25
68 Stable recorded traffic rates are used for future estimations Source A B 1 000Kb/s Destination Collector MIRROR ON [A B] Traffic rate [Kb/s] 5000 budget 2000 mirrored 1000 real Time [s] 25
69 Stroboscope exceeds the monitoring budget for at most one timeslot Source A B Destination Collector MIRROR ON [A B] Traffic rate [Kb/s] budget 2000 mirrored 1000 real Time [s] 25
70 Stroboscope: Declarative Network Monitoring on a Budget Traffic slicing as a first-class data-plane primitive Strong guarantees on budget compliance and measurement accuracy Measurement analysis decoupled from measurement collection
71
72 Backup slides
73 NetFlow brings a poor visibility over traffic in ISP networks Fraction of BGP prefixes Maximal number of observations 29
74 Stroboscope defines a declarative requirement language MIRROR /24 ON [A B C D], [A E C D] MIRROR /24 ON [A -> D] CONFINE /24 ON [A B E C D] CONFINE /24 [A -> D] E U /24 A B C D MIRROR /24 ON [ -> D] CONFINE /24 ON [ -> D] X Y USING 15 Mbps DURING 500 ms EVERY 5 s W Z V 30
75 The placement algorithms minimize the mirroring rules 1.0 Key-Points Sampling Fraction of experiments Fraction of experiments Optimization gain 90 Minimal surrounding Node surrounding Optimization gain 70 31
76 Time [s] 1000 Optimized schedule Approximation Input query count Fraction of experiments Schedules can be computed by two pipelines Optimization gain
Configuring OSPF. Information About OSPF CHAPTER
CHAPTER 22 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Open Shortest Path First (OSPF) routing protocol. The
More informationLink-state protocols and Open Shortest Path First (OSPF)
Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic
More informationEnergy Saving Routing Strategies in IP Networks
Energy Saving Routing Strategies in IP Networks M. Polverini; M. Listanti DIET Department - University of Roma Sapienza, Via Eudossiana 8, 84 Roma, Italy 2 june 24 [scale=.8]figure/logo.eps M. Polverini
More informationIntroduction to OSPF. ISP Workshops. Last updated 11 November 2013
Introduction to OSPF ISP Workshops Last updated 11 November 2013 1 OSPF p Open Shortest Path First p Open: n Meaning an Open Standard n Developed by IETF (OSPF Working Group) for IP RFC1247 n Current standard
More informationConfiguring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging
Contents Configuring OSPF 1 Overview 1 OSPF packets 1 LSA types 1 OSPF areas 2 Router types 4 Route types 5 Route calculation 6 OSPF network types 6 DR and BDR 6 Protocols and standards 8 OSPF configuration
More informationLink State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01
Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic
More informationChapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks
Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional
More informationA Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information
A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu
More informationIntroduction to Local and Wide Area Networks
Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 10 : Link-State Routing Protocols Chapter 11 : OSPF Chapter 1 2
More informationITE PC v4.0. Chapter Cisco Systems, Inc. All rights reserved. Cisco Public
OSPF Routing Protocols and Concepts Chapter 11 1 Objectives Describe the background and basic features of OSPF Identify and apply the basic OSPF configuration commands Describe, modify and calculate l
More informationCognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks
Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference
More informationM U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic
M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic
More informationEnergy-Efficient MANET Routing: Ideal vs. Realistic Performance
Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:
More informationCSE 123: Computer Networks
Total Points = 27 CSE 123: Computer Networks Homework 3 Solutions Out: 5/11, Due: 5/18 Problems 1. Distance Vector Routing [9 points] For the network shown below, give the global distance vector tables
More informationCS 457 Lecture 16 Routing Continued. Spring 2010
CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing
More informationSecure Ad-Hoc Routing Protocols
Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol
More informationOSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda
OSPF Domain / OSPF Area OSPF Advanced Topics Areas,, Backbone, Summary-LSA, ASBR, Stub Area, Route Summarization, Virtual Links, Header Details OSPF domain can be divided in multiple OSPF areas to improve
More informationOSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP
OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area
More informationOSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database
OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation
More informationInternet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours
Internet of Things Prof. M. Cesana Exam June 26, 2011 Family Name Given Name John Doe Student ID 3030 Course of studies 3030 Total Available time: 2 hours E1 E2 E3 Questions Questions OS 1 Exercise (8
More informationThe Case for Optimum Detection Algorithms in MIMO Wireless Systems. Helmut Bölcskei
The Case for Optimum Detection Algorithms in MIMO Wireless Systems Helmut Bölcskei joint work with A. Burg, C. Studer, and M. Borgmann ETH Zurich Data rates in wireless double every 18 months throughput
More informationLink State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.3, 2017/03/09 11:25:31)
Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 16.3, 2017/03/09 11:25:31) Tuesday, March 7, 2017 Karst Koymans (UvA) Link State Routing Tuesday,
More informationClay Codes: Moulding MDS Codes to Yield an MSR Code
Clay Codes: Moulding MDS Codes to Yield an MSR Code Myna Vajha, Vinayak Ramkumar, Bhagyashree Puranik, Ganesh Kini, Elita Lobo, Birenjith Sasidharan Indian Institute of Science (IISc) P. Vijay Kumar (IISc
More informationLink State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008
Link State Routing In particular OSPF dr. C. P. J. Koymans Informatics Institute University of Amsterdam March 4, 2008 dr. C. P. J. Koymans (UvA) Link State Routing March 4, 2008 1 / 70 1 Link State Protocols
More informationTable of Contents. OSPF Configuration 1
Table of Contents OSPF Configuration 1 Introduction to OSPF 1 Basic Concepts 2 Area Based OSPF Network Partition 3 Router Types 7 Classification of OSPF Networks 9 DR and BDR 9 OSPF Packet Formats 11 Supported
More informationA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT
More informationA Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information
A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information Jun Zhou Department of Computer Science Florida State University Tallahassee, FL 326 zhou@cs.fsu.edu Xin Yuan
More informationGateways Placement in Backbone Wireless Mesh Networks
I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract
More informationConfiguring OSPF. The Cisco OSPF Implementation
Configuring OSPF This chapter describes how to configure Open Shortest Path First (OSPF). For a complete description of the OSPF commands in this chapter, refer to the OSPF s chapter of the Cisco IOS IP
More informationData Dissemination in Wireless Sensor Networks
Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks
More informationGrundlagen der Rechnernetze. Introduction
Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724
ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets
More informationGuide to OSPF Application on the CSS 11000
Guide to OSPF Application on the CSS 11000 Document ID: 12638 Contents Introduction Before You Begin Conventions Prerequisites Components Used Description OSPF Configuration Task List Configuration Global
More informationDeadlock-free Routing Scheme for Irregular Mesh Topology NoCs with Oversized Regions
JOURNAL OF COMPUTERS, VOL. 8, NO., JANUARY 7 Deadlock-free Routing Scheme for Irregular Mesh Topology NoCs with Oversized Regions Xinming Duan, Jigang Wu School of Computer Science and Software, Tianjin
More informationJamming Wireless Networks: Attack and Defense Strategies
Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University IAB, Dec. 6 th, 2005 Roadmap Introduction and Motivation Jammer Models
More informationEmpirical Probability Based QoS Routing
Empirical Probability Based QoS Routing Xin Yuan Guang Yang Department of Computer Science, Florida State University, Tallahassee, FL 3230 {xyuan,guanyang}@cs.fsu.edu Abstract We study Quality-of-Service
More informationOSPF for IPv6. ISP Workshops
OSPF for IPv6 ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 17
More informationLink State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.4, 2017/11/30 12:33:57)
Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 17.4, 2017/11/30 12:33:57) Tuesday, November 28, 2017 Karst Koymans (UvA) Link State Routing Tuesday,
More informationVolume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey
More informationProlonging Sensor Network Lifetime with Energy Provisioning and Relay Node Placement by Y. Thomas Hou*, Yi Shi* Hanif D. Sherali^ Scott F.
Prolonging Sensor Network Lifetime with Energy Provisioning and Relay Node Placement by Y. Thomas Hou*, Yi Shi* Hanif D. Sherali^ Scott F. Midkiff* *The Bradley Department of Electrical and Computer Engineering,
More informationEnergy-Efficient Data Management for Sensor Networks
Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell
More informationOSPF. Routing Protocols and Concepts Chapter 11. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved. Cisco Public
OSPF Routing Protocols and Concepts Chapter 11 1 Objectives Describe the background and basic features of OSPF Identify and apply the basic OSPF configuration commands Describe, modify and calculate the
More informationCROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS
CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical
More informationM2M massive wireless access: challenges, research issues, and ways forward
M2M massive wireless access: challenges, research issues, and ways forward Petar Popovski Aalborg University Andrea Zanella, Michele Zorzi André D. F. Santos Uni Padova Alcatel Lucent Nuno Pratas, Cedomir
More informationSurveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan
Surveillance strategies for autonomous mobile robots Nicola Basilico Department of Computer Science University of Milan Intelligence, surveillance, and reconnaissance (ISR) with autonomous UAVs ISR defines
More informationOMESH Networks. OPM15 Application Note: Wireless Location and Tracking
OMESH Networks OPM15 Application Note: Wireless Location and Tracking Version: 0.0.1 Date: November 10, 2011 Email: info@omeshnet.com Web: http://www.omeshnet.com/omesh/ 2 Contents 1.0 Introduction...
More informationTIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering
More informationSurvey of MANET based on Routing Protocols
Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing
More informationJinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li. Heilongjiang University Georgia State University
Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li Heilongjiang University Georgia State University Outline Introduction Protocols Design Theoretical Analysis Performance Evaluation Conclusions
More informationKillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX
KillTest Q&A Exam : JN0-643 Title : Enterprise Routing and Switching, Professional (JNCIP-ENT) Version : Demo 1 / 10 1.Which connection method do OSPF routers use to communicate with each other? A. IP
More informationolsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra
olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work
More informationT. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University
Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer
More informationData Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1
Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made
More informationHow To Summon Up Those Darn Clouds When You Need Them
Mark Lambert Vice President - EMEA How To Summon Up Those Darn Clouds When You Need Them 2013 Advantech Wireless Inc 1 Overview Introduction to Advantech Use of the Cloud in the Oil & Gas sector - What
More informationA Virtual Deadline Scheduler for Window-Constrained Service Guarantees
Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 2004-03-23 A Virtual Deadline Scheduler for Window-Constrained Service Guarantees Zhang, Yuting Boston
More informationAdaptive Multi-task Monitoring System Based on Overhead Prediction
Adaptive Multi-tas Monitoring System Based on Overhead Prediction Imed Lassoued, Chadi Baraat Planete Project-Team, INRIA Sophia-Antipolis, France {Imed.Lassoued, Chadi.Baraat}@sophia.inria.fr ABSTRACT
More informationSensitivity Analysis of EADARP Multicast Protocol
www.ijcsi.org 273 Sensitivity Analysis of EADARP Multicast Protocol Dina Darwish Mutlimedia and Internet Department, International Academy for Engineering and Media Science 6 th October city, Egypt Abstract
More informationDistance-Vector Routing
Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation
More informationPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationBabel A flexible routing protocol
Babel A flexible routing protocol Juliusz Chroboczek PPS Université Paris-Diderot (Paris 7) 11 March 2014 1/33 The story In December 2006, I started on a quest to bring wifi to the Ph.D. students couch:
More informationp-percent Coverage in Wireless Sensor Networks
p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage
More informationCSE/EE 461. Link State Routing. Last Time. This Lecture. Routing Algorithms Introduction Distance Vector routing (RIP)
CSE/EE 46 Link State Routing Last Time Routing Algorithms Introduction Distance Vector routing (RIP) Application Presentation Session Transport Network Data Link Physical This Lecture Routing Algorithms
More informationLink State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013
Link State Routing Brad Karp UCL Computer Science CS 33/GZ 3 rd December 3 Outline Link State Approach to Routing Finding Links: Hello Protocol Building a Map: Flooding Protocol Healing after Partitions:
More information1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program.
Combined Error Correcting and Compressing Codes Extended Summary Thomas Wenisch Peter F. Swaszek Augustus K. Uht 1 University of Rhode Island, Kingston RI Submitted to International Symposium on Information
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer
Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,
More informationMAC SCHEDULING IN INDUSTRIAL WIRELESS CELL-BASED MESH SENSOR NETWORKS
MAC SCHEDULING IN INDUSTRIAL WIRELESS CELL-BASED MESH SENSOR NETWORKS Imran Yousaf Master s Degree Thesis 2011 EMBEDDED SYSTEMS MAC SCHEDULING IN INDUSTRIAL WIRELESS CELL-BASED MESH SENSOR NETWORKS Postadress:
More informationSimulative Comparison of MPLS Protection Switching vs. OSPF Re-routing
C O R P O R A T E T E C H N O L O Y Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing nformation & Sandrine PASQUALINI Antoine FROT Andreas Iselt Andreas Kirstädter C O R P O R A T
More informationThe Blueprint of 5G A Global Standard
The Blueprint of 5G A Global Standard Dr. Wen Tong Huawei Fellow, CTO, Huawei Wireless May 23 rd, 2017 Page 1 5G: One Network Infrastructure Serving All Industry Sectors Automotive HD Video Smart Manufacturing
More informationWireless Networks Do Not Disturb My Circles
Wireless Networks Do Not Disturb My Circles Roger Wattenhofer ETH Zurich Distributed Computing www.disco.ethz.ch Wireless Networks Geometry Zwei Seelen wohnen, ach! in meiner Brust OSDI Multimedia SenSys
More informationNetApp Sizing Guidelines for MEDITECH Environments
Technical Report NetApp Sizing Guidelines for MEDITECH Environments Brahmanna Chowdary Kodavali, NetApp March 2016 TR-4190 TABLE OF CONTENTS 1 Introduction... 4 1.1 Scope...4 1.2 Audience...5 2 MEDITECH
More informationDynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET
Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced
More informationEVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS
EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS 1 ALOK KUMAR JAGADEV, 2 BINOD KUMAR PATTANAYAK *, 3 AJIT KUMAR NAYAK, 4 MANOJRANJAN NAYAK Institute Of Technical Education And Research,
More informationDYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS
DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS Mark Dale Comtech EF Data Tempe, AZ Abstract Dynamic Bandwidth Allocation is used in many current VSAT networks as a means of efficiently allocating
More informationNetwork Layer (Routing)
Network Layer (Routing) Where we are in the ourse Moving on up to the Network Layer! Application Transport Network Link Physical SE 61 University of Washington Topics Network service models Datagrams (packets),
More informationLecture 04 CSE 40547/60547 Computing at the Nanoscale Interconnect
Lecture 04 CSE 40547/60547 Computing at the Nanoscale Interconnect Introduction - So far, have considered transistor-based logic in the face of technology scaling - Interconnect effects are also of concern
More informationENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationWireless Internet Routing. IEEE s
Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:
More informationSelf-Organisation in LTE networks: Soft integration of new base stations
FP7 ICT-SOCRATES Self-Organisation in LTE networks: Soft integration of new base stations Andreas Eisenblätter (atesio) Ulrich Türke (atesio) EURO 2010 Conference, July 2010, Lisbon Overview LTE EU ICT-Project
More informationPAGE 1. Krzysztof Bronk, PhD
PAGE 1 Krzysztof Bronk, PhD Deputy Manager Wireless Systems and Networks Department National Institute of Telecommunications (NIT), Poland e-mail: K.Bronk@itl.waw.pl Presentation outline PAGE 2 Introduction
More informationFrequently Asked Questions ConnexRF Products
ConnexRF Products Version 1.1 PKLR2400S-200A PKLR2400S-10 LX2400S-3A LX2400S-10 13256 W. 98 TH STREET LENEXA, KS 66215 (800) 492-2320 www.aerocomm.com wireless@aerocomm.com DOCUMENT INFORMATION Copyright
More informationSpectrum Collaboration Challenge
Spectrum Collaboration Challenge Frequently Asked Questions (FAQ) November 22, 2017 Defense Advanced Research Projects Agency 675 North Randolph Street Arlington, VA 22203 Revision Summary Section Revision
More informationTransportation Timetabling
Outline DM87 SCHEDULING, TIMETABLING AND ROUTING 1. Sports Timetabling Lecture 16 Transportation Timetabling Marco Chiarandini 2. Transportation Timetabling Tanker Scheduling Air Transport Train Timetabling
More informationA Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks
A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu
More informationContents Introduction...2 Revision Information...3 Terms and definitions...4 Overview...5 Part A. Layout and Topology of Wireless Devices...
Technical Information TI 01W01A51-12EN Guidelines for Layout and Installation of Field Wireless Devices Contents Introduction...2 Revision Information...3 Terms and definitions...4 Overview...5 Part A.
More informationRIPE NCC Routing Information Service (RIS)
RIPE NCC Routing Information Service (RIS) Massimo Candela LACNIC 29 May 2018 What is RIS? What is RIS? Routing Information Service Worldwide network of BGP collectors Deployed at Internet Exchange Points
More informationCisco IOS IP Routing: OSPF Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
More informationPRIME v1.4 White Paper
PRIME v1.4 White Paper PRIME v1.4 White Paper Prepared by the PRIME Alliance Technical Working Group Abstract: Summary of improvements and new features introduced by PRIME specification, version 1.4. This
More informationCoding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.
Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18
More informationQuality-of-Service Provisioning for Multi-Service TDMA Mesh Networks
Quality-of-Service Provisioning for Multi-Service TDMA Mesh Networks Petar Djukic and Shahrokh Valaee 1 The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto
More informationPerformance Comparison of AODV, DSDV and ZRP Routing Protocols
Performance Comparison of AODV, DSDV and ZRP Routing Protocols Ajay Singh 1, Anil yadav 2, Dr. mukesh Sharma 2 1 Research Scholar (M.Tech), Department of Computer Science, T.I.T&S, bhiwani 1 Faculty, Department
More informationAdvanced Modeling and Simulation of Mobile Ad-Hoc Networks
Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494
More informationRevenue Maximization in an Optical Router Node Using Multiple Wavelengths
Revenue Maximization in an Optical Router Node Using Multiple Wavelengths arxiv:1809.07860v1 [cs.ni] 15 Sep 2018 Murtuza Ali Abidini, Onno Boxma, Cor Hurkens, Ton Koonen, and Jacques Resing Department
More informationCOSC 3213: Communication Networks Chapter 5: Handout #6
OS 323: ommunication Networks hapter 5: Handout #6 Instructor: Dr. Marvin Mandelbaum Department o omputer Science York University F8 Section E Topics:. Peer-to-peer and service models 2. RQ and how to
More informationLTE-Advanced and Release 10
LTE-Advanced and Release 10 1. Carrier Aggregation 2. Enhanced Downlink MIMO 3. Enhanced Uplink MIMO 4. Relays 5. Release 11 and Beyond Release 10 enhances the capabilities of LTE, to make the technology
More informationWirelessHART Modeling and Performance Evaluation
WirelessHART Modeling and Performance Evaluation Anne Remke and Xian Wu October 24, 2013 A. Remke and X. Wu (University of Twente) WirelessHART October 24, 2013 1 / 21 WirelessHART [www.hartcomm.org] A.
More informationOperating Systems and Networks. Networks Part 2: Physical Layer. Adrian Perrig Network Security Group ETH Zürich
Operating Systems and Networks Networks Part 2: Physical Layer Adrian Perrig Network Security Group ETH Zürich Overview Important concepts from last lecture Statistical multiplexing, statistical multiplexing
More informationAn Implementation of a Flexible Topology Management System for Aerial High Capacity Directional Networks
An Implementation of a Flexible Topology Management System for Aerial High Capacity Directional Networks Joy Wang, Patricia Deutsch, Andrea Coyle, Thomas Shake, Bow-Nan Cheng MIT Lincoln Laboratory {na.wang,
More informationMultiuser Scheduling and Power Sharing for CDMA Packet Data Systems
Multiuser Scheduling and Power Sharing for CDMA Packet Data Systems Sandeep Vangipuram NVIDIA Graphics Pvt. Ltd. No. 10, M.G. Road, Bangalore 560001. sandeep84@gmail.com Srikrishna Bhashyam Department
More information