Transcript Powerpoint
Protocol Engineering
Research Center
P. M. Melliar-Smith
M. G. Baker
J. J. Garcia-Luna-Aceves
J. C. Hou
K. N. Levitt
L. E. Moser
D. C. Schmidt
T. Suda
U.C. Santa Barbara
Stanford
U.C. Santa Cruz
Ohio State
U.C. Davis
U.C. Santa Barbara
U.C. Irvine
U.C. Irvine
The Vision
Information and Computation without Boundaries
What Matters to the Users
– Functionality
– Ilities
Real-time Performance
Reliability
Security
What Should Be Hidden Engineering
– Physical Location
– Mobility
– Networks and Protocols
The Vision
Transparency and Ease of Use
Major Applications are the most complex things
ever built by humans
The Network and the Protocols should make
applications easier to design and build
Application designers should express their
requirements for Quality of Service
Automated implementation of QoS requirements
Predictable network performance
Objectives
Application Systems Built from Components
– The Network is the glue that holds components together
Real-Time across Multiple Platforms
Mobile Wireless Networks
– Full Capabilities
– Full Performance
– Disconnected Operation
Security
– Rigorous
– Unobtrusive
– External intruders and internal subversion
Objectives
Methodologies allow application designers
to express their Quality of Service requirements
Networks and Protocols are efficient/predictable
over a wide range of topologies and loads
Tools help application designers to assess and
predict the behaviors of their designs
Analysis and Measurement techniques determine
whether systems are behaving as they should
Synergy in Real Time
Doug Schmidt
– ACE real-time network executive
– Mapping Quality of Service onto the implementation
Jennifer Hou
– Medusa - meeting QoS requirements
Multicasting
Routing
Flow control
and Congestion
Michael Melliar-Smith and Louise Moser
– Probabilistic analysis of real-time delays
J.J. Garcia-Luna-Aceves
– Real-time wireless protocols
Synergy in Fault Tolerance
Louise Moser and Michael Melliar-Smith
– Fault-tolerant multicast protocols
– Fault tolerance for Java and CORBA (Eternal)
– Recovery in real-time
– Network resource allocation for fault tolerance
Jennifer Hou
– Fault-tolerant multicast protocols
– Fault-tolerant routing
J.J. Garcia-Luna-Aceves and Mary Baker
– Fault-tolerant wireless networks
Synergy in Security
Karl Levitt
– Models of attacks
– Intrusion detection strategies
for detecting attacks and subverted nodes
– Response and defense strategies
Mary Baker
– Routing that exploits trust developed over time
– Mechanisms for detecting malicious behavior
Louise Moser
– Reliable operation in networks
that contain subverted nodes
Synergy in Multimedia
Tatsuya Suda
– Scalable multimedia multicasts
– Adaptive layered encoding
– QoS feedback, with aggregation within the network
Jennifer Hou
– Multimedia in medical applications
J.J. Garcia-Luna-Aceves
– Wireless multimedia
Michael Melliar-Smith
– Least-laxity scheduling for jitter management
Synergy in Wireless
J.J. Garcia-Luna-Aceves and Mary Baker
– Quality of Service at the link level
– Quality of Service over multiple paths
– Aggregation of flows
– Distribution of aggregated flows
– Integration of routing and reservations
– Transmission of priority packets over multiple paths
– CAMP mesh routing
Michael Melliar-Smith
– Hierarchical clustering for scalable routing
in large ad-hoc networks
Jennifer Hou
– Mobile IP for multicasting
ARCH Clustered Routing Protocol
Michael Melliar-Smith
Hierarchical Clustered Routing allows
ad-hoc networks to scale to thousands of nodes
while still retaining reasonable overheads
Synergy in BioNetworking
Tatsuya Suda
– Cyber-entities
– Hierarchical aggregation into Super-entities
– Scalability, adaptability, evolution
– Coordination and efficiency
Everybody
– How can our protocols become Cyber-entities?
– How can our strategies be used in BioNetworking?
Tools: NetSim^Q
Jennifer Hou
Java-based network simulation tool
Exploits object-oriented programming
– Instantiate generic network class
– Redefine attributes and methods
Trace-driven simulation models real traffic
Can be used for
– Validation of protocols
– Investigation of tradeoffs
– Fine tuning
Tools: Testing Workbench
Karl Levitt
Protocol specification in Estelle
To reduce the testing burden
– Select a component of the specification
– Slice the implementation to contain only statements
that relate to the specification component
– Test the slice against the specification
Specifications can also be sliced
with respect to a higher level specification
Test data can be generated for the slice
– Identify code that is vulnerable to race conditions
– Generate test cases to explore those vulnerabilities
Tools: Verification Workbench
Karl Levitt
Based on HOL for extensibility and proof checking
and PVS for proof power
Develop HOL theories for
– Refinement
– Composition
– Liveness and Feedom from Deadlock
– Quality of Service
– Faults and Attacks
Will still require substantial human involvement
Tools: Performance Analysis
Michael Melliar-Smith and Louise Moser
Performance Analyses based on mean durations
are not useful for real-time
Analyses based on worst-case durations
are too conservative
We need to estimate
the tail of the distribution of durations
Analysis is based on pdfs for durations
– combined by convolution
– allowance for correlations
Tools: Performance Analysis
Michael Melliar-Smith
and Louise Moser
Working Together
Collaborative research
– By professors
– By students
– Many interesting interactions among our research
Weekly seminar series
– Conducted across the Internet
– Professor or student presents a research project
– Discussion of relationship to other research
Experimental testbed network
based on CALREN-2