Marie Curie Chairs (EXC) IP FLows over Optical and Wireless ( - PowerPoint PPT Presentation

About This Presentation
Title:

Marie Curie Chairs (EXC) IP FLows over Optical and Wireless (

Description:

Title: Remote SW authentication Author: Yoram Ofek Last modified by: Yoram Ofek Created Date: 4/15/1999 7:24:19 PM Document presentation format: On-screen Show – PowerPoint PPT presentation

Number of Views:79
Avg rating:3.0/5.0
Slides: 37
Provided by: Yoram
Category:

less

Transcript and Presenter's Notes

Title: Marie Curie Chairs (EXC) IP FLows over Optical and Wireless (


1
Marie Curie Chairs (EXC)IP FLows over Optical
and Wireless (IP-FLOW)Kick-off Meeting
Monday 28 June, 2004
  • Yoram Ofek
  • Department of Information and Communications
    TechnologyUniversity of Trento, Italy

2
Agenda
  • 1030 Opening
  • Prof. Fausto Giunchiglia Vice Rector
    University of Trento
  • Prof. Roberto Battiti University of Trento
  • Mr. Philippe Froissard European Union
  • 1045 Prof. Yoram Ofek (University of Trento)
    IP-FLOW Overview and Planning
  • Discussion/planning Research Area 1
  • 1130 Prof. Mario Baldi (Politecnico di Torino)
    and Prof. Achille Pattavina (Politecnico di
    Milano) Minimum Complexity Non-blocking
    Switching
  • 1150 Prof. Mario Baldi and Ing. Guido Marchetto
    (Politecnico di Torino) "Time-based Router
  • 1140 Prof. Yoram Ofek 40 Tb/s Time-based
    Non-blocking Switch Design
  • Lunch 1200 1300
  • Discussion/planning Research Area 2
  • 1300 Prof. Moti Yung (Columbia University - USA)
    Trusted Flow Why, How, and Where?
  • 1315 Prof. Fabio Massacci (University of Trento)
    Malware Protection
  • 1330 Prof. Roberto Battiti (University of
    Trento) Trust and Location
  • 1345 Dr. Paolo Falcarin and Dr. Maurizio Morisio
    (Politecnico di Torino) A proposed
    TrustedFlow System Architecture with
    Aspect-oriented Implementation
  • 1415 Dott. Davide D'Aprile Dr. Daniele Mazzocchi
    (Istituto Superiore Mario Boella - Torino) A
    TrustedFlow Enabled Run-time Environment and
    Trusted Flow Formal Specification
  • 1430 Dr. Luca Tagliaferri and Prof. Paolo
    Prinetto (Politecnico di Torino) Code
    Self-checking Techniques for TrustedFlow
    ImplementationDiscussion/planning Research Area
    3
  • 1500 Prof. Bezalel Gavish (SMU - USA)
    Placement of multidirectional antennas
  • 1515 Prof. Andrea Massa / Prof. Renato Lo Cigno
    (University of Trento) the inter-relationship
    APs placement, antenna design, Radio wave
    propagation properties

3
IP-FLOW Overview
  • Focus on
  • 1. Flow (switching/forwarding) of data over the
    Internet optical and wireless
  • Rather than on routing
  • 2. Internet/telecom business and security

4
IP-FLOW Overview
  • Research Area 1 UTC-based pipeline forwarding
    for solving switch and link bottlenecks delivery
    of very high capacity streaming data
  • Research Area 2 TrustedFlow for run-time
    software authentication trusted delivery and
    processing of data
  • Research Area 3 B-GLOW - Broadband services via
    GLobal Optical and Wireless integration -
    delivering streaming data to Wi-Fi clients

5
Research Area 1 - MotivationThe Telecom
(Unfinished) Story
  • Why the telecom industry vendors and providers
    are more or less in bankruptcy (? two trillions
    debts)
  • They ignored cash flow
  • 1. spending money wisely
  • 2. earn more money from new services

6
Research Area 1 UTC-based Pipeline
Forwarding/Switching
  • Pipelines are deployed to increase efficiency in
  • Factory (automotive), Computers (CPU),
  • NOW (deterministic) pipeline over the
    Internet!Thanks to GPS/GALILEO/... that provides
    UTC Coordinated Universal Time everywhere

7
Research Area 1 UTC-based for Streaming Media
  • Deterministic performance
  • No loss,
  • Minimum delay and
  • Constant jitter
  • end-to-end delay lt 100 ms - interactive
    voice/video
  • Minimum buffers for all-optical realization
  • Enables huge capacity increase for streaming
  • 1000 capacity increase may create major
    switching bottlenecks

8
Research Area 1 UTC-based Switching Complexity
  • Minimum complexity non-blocking switching thus
    very high scalability
  • Analytically proven
  • UTC-based switch Banyan
  • Minimum complexity
  • Crossbar
  • Clos

9
Research Area 1UTC-based 40 Tera-bit/s Switch
Crosspoint Switches Vitesse VSC3140VC, or
MindSpeed M21150
1
1
1
1
32-by-32 320 Gbps
32-by-32 320 Gbps
32
32
Electrical Interconnection
32
32
1
1
32-by-32 320 Gbps
32-by-32 320 Gbps
32
32
32x320 10 Tbps Switching Module
10
Research Area 1UTC-based 40 Tera-bit/s Switch
UTC
Pipeline Forwarding Switch Controller
1
1
1
1
1
1
32-by-32
32-by-32
32-by-32
32-by-32
32
32
10 Tbps Switching Module
32
32
32
32
1
1
32-by-32
32-by-32
32-by-32
32-by-32
Interconnection Electrical or Optical
32
32
Only off-the-shelf components Thus, simple to
prototype
50 times less complexity than HFR (Cisco newest
switch)
11
Research Area 1 Optical to Wireless Challenge
  • Optical/wireless bandwidth mismatch factor of
    1000 or more
  • UTC-based forwarding ensures
  • Minimum delay buffering and delay
  • Deterministic no loss

Bandwidth Mismatch Animation
12
Ph.D. Thesis Opportunities in Research Area 1
  • The research activities in this area will be open
    for students to propose and define their
    activities since there are still many open issues
    with regard to performance and realization.
  • Blocking probability analysis of global IP
    network with time-driven switching and
    time-driven priority
  • Optics vs. electronics qualitative and
    quantitative comparison of UTC-based pipeline
    forwarding
  • Bandwidth mismatch streaming from optical to
    wireless
  • Network architecture design and performance
    evaluation of multi terabit/second IP packet
    switches
  • Performance study of time-driven best-effort
    traffic over IP networks

13
Research Area 2 Computing and Networking
  • Fundamental inventions in the past 50 years
  • Transistor
  • Laser optical fiber
  • Lead to exponential growth in
  • Computing
  • Networking
  • Doubling performance every 18-24 mo. - a.k.a.
    Moore's "Law
  • Led to the convergence of
  • Computing and Networking

14
Research Area 2 Computing and Networking
  • Today,
  • Internet computing/networking are ONE
  • Thus, trusted operation is a major challenge
  • Critical to business
  • Temporal (and spatial) manipulation of protocols
  • On-line bidding / stocks trading
  • DoS, DDoS loss of revenues
  • Stealing content, SW and information

15
Is it possible to use the networkto alleviate
networkingtrust problem?
16
Research Area 2 The Context of TrustedFlow
  • A method that combines
  • Computing and networking
  • For distribution of trust or entrusting
  • Stand-alone computer can be trusted, by
    definition!

17
Research Area 2 What Do We Want to Achieve?
Remote authentication of code during execution
Trusted 1st computer ensure that SW executed
on Untrusted 2nd computer was not
modified Thereby, entrusting the 2nd computer
18
Research Area 2 The Trust Problem Definition
  • How to ensure run-time SW authenticity
  • Focusing on two generic protocols
  • 1. Sending packets
  • To avoid unfair usage/attacks on networks/servers
  • TCP, SLA, 802.11,
  • 2. Receiving packets (e.g., content)
  • To ensure digital right management (DRM)
  • Audio, video

19
Research Area 2 How Entrusting
  • (Stream of) Tags are EMANATED from a
    programcodesoftware at run-time
  • ENTRUSTING by verifying the Tags

20
Research Area 2 How Entrusting
Entrusting SW by Verifying
Trusted Computer
Entrusted SW on UNtrusted Computer
TrustedComputing Environment Tag
Checker (TC) HARDENEDwith Special Hardware/So
ftware (e.g., TCPA)
Untrusted Computing Environment
SW with Tag Generator (TG)
21
Research Area 2 Quality of Remote SW
Authenticationwith TrustedFlow
Better Remote Authentication Operations
SPACE interlocking and Hiding Of Tag Generation
TIME periodic replacement of SW components and
parameters
22
Ph.D. Thesis Opportunities in Research Area 2
  • TrustedFlow for streaming media content
    protection and management
  • TrustedFlow for 802.11 MAC protocol
  • Reverse TrustedFlow for securing mobile users
  • TrustedFlow for Grid computing
  • TrustedFlow for Internet voting software
  • TrustedFlow for TCP (transport control protocol)
  • Design of the hiding function of the tag
    generator
  • Design of the interlocking function of the tag
    generator
  • TrustedFlow for SLA (service level agreement)

23
Research Area 3 B-GLOW Overview
Revenue Generating Services
Secure Data and Content Flows
ResearchArea 3
Security
B-GLOW High Fidelity Data Flows Over Wireless
Optical Backbone
Ubiquitous Computing, Storage, Position Time
Wireless Wi-Fi 802.11
Mismatch Bandwidth / Availability / Reliability
Optical Backbone
24
Research Area 3 B-GLOW Overview
Mobile Users with Handheld Devices Who Desired to
Receive (and Pay for) Quality Content
Predictable High Quality Content Delivery via
IP-based Wireless IEEE 802.11 Wi-Fi
Optical Backbone Interfaces GE/10GE/IP-MPLS/SDH/

Scalable and adaptable Audio/Video
Content Desired by Mobile Users
25
Research Area 3 B-GLOW Overview
Predictable Payments for quality content
protected that can be protected by DRM With
scalable flat rate/mini/micro payments With
multilingual user interfaces
Objective n. 4
Predictable delivery of scalable content To
provide scalable audio and video content with
coding and representation with run-time SLA
protocol and interfaces with UMTS
Objective n. 3
Objective n. 2
Efficient and timely packet flow and
monitoring End-to-end Measurements with Feedback
to Apps and Users Packet Transmission/Scheduling
Protocol for Overcoming Optical/Wireless
Bandwidth Mismatch
To provide capacity to user to satisfy their need
for content while minimizing infrastructure cost
Optimized access point location with/without
directional Antenna
Objective n. 1
IP-FLOW FOCUS
26
Research Area 3 Focus on Wi-Fi Physical/Network
Layer
802.11 with External Antenna Omni/Directional
802.11 Access Point with/out SDMA
Streaming Media to Mobile Users
USB
Multimedia Server
Mobile Device PC/PDA/Phone
802.11 with External Antenna Omni/Directional
  • Experimental Study
  • Hot-spot and open-space
  • Utilizing both
  • Network/protocol analyzer
  • RF spectrum analyzer

USB
Mobile Device PC/PDA/Phone
27
Research Area 3 Focus on Directional Antennas
Antenna Gain G(db) 10 log10(gmax) 10 log10
4pA / Lambda 2 gmax ? 4(3.14)(L1L2)/(L
ambda 2) Lambda speed-of-light/Frequency A
L1L2 is the rectangular area of antenna
aperture in cm 2
6 cm ? 60?
6 cm ? 60?
6cm ? 60?
6 cm ? 60?
5GHz
5GHz
5GHz
5GHz
6 cm ? 60?
12 cm ? 30?
24 cm ? 15?
48 cm ? 7.5?
L1
802.11
L2
L2
G(db) ? 11
G(db) ? 14
G(db) ? 17
G(db) ? 20
28
Research Area 3 Challenge
  • Small angle-high gain continuously changing best
    receiving direction, due to
  • 1. environment factors
  • 2. motion - mobility
  • 3. interference (unlicensed band)
  • Possible solution
  • multiple sectors

29
Research Area 3 1st Experimental Prototype Only
software
Mobile Device
Antenna Sector 1
USB 802.11 Access Control Adapter
Antenna Control Software
USB HUB
USB Connection
Antenna Sector 6
USB 802.11 Access Control Adapter
30
Research Area 3 2nd Experimental Prototype with
RF Switch
Mobile Device
Antenna Sector 1
USB 802.11 Access Control Adapter
Antenna Control Software
RF Switch
USB Connection
Antenna Sector 6
31
Ph.D. Thesis Opportunities in Research Area 3
  • In-depth experimentation and measurement of
    content delivery capacity in hot-spot as
    function of the number of active mobile user
    using high-end spectrum and network analyzers
  • Studying the inter-relationship between
    directional antenna and access point placement
    both analytically and experimentally
  • Design and analysis of the potential benefits of
    directional antennas for mobile users
  • Studying and analysing how to provide scalable
    and adaptive audio and video content with
    necessary coding and representation, including a
    run-time and adaptive service level agreement
    protocol for matching capabilities for (paid)
    quality content delivery to mobile devices
  • Studying and analysing how to provide scalable
    content with protection using DRM (digital right
    management) with capability for differentiated
    payments and micro-payments, that are dependent
    on the quality of content delivered and on prior
    classification of users

32
IP-FLOW Summary
Services
Secure Data and Content Flows
Security
Ubiquitous Computing, Storage, Position Time
Wireless Wi-Fi 802.11
Mismatch Bandwidth / Availability / Reliability
Optical Backbone
33
IP-FLOW Overview
  • Milestones

1ST YEAR 2ND YEAR 3RD YEAR
Research Area 1 PCB electronic/heat dissipation design Success ? Implementation and testing Success ? Integration and demonstration switch and interfaces
Research Area 2 Implementation of TrustedFlow protocol Success ? Integration for trusted content delivery Success ? Integration and demonstration with trusted computing
Research Area 3 Understanding mobile w/directional antenna Success ? Evaluating content delivery quality Success ? Integration and demonstration with micro-payment / DRM
34
IP-FLOW Overview
  • PROJECT GANTT

35
IP-FLOW Overview
  • Lecture series Three graduate courses
  • Course 1 Satisfying QoS Requirements over a
    Single Networks
  • Course 2 Optical Networking
  • Course 3 The Inter-relationship of QoS, Mobility
    and Security
  • Seminar Series to Broad Audience
  • Seminar 1 Users satisfaction and flow of packet
    over the Internet
  • Seminar 2 The use of time in future packet
    networks
  • Seminar 3 Trusted computing and run-time
    authentication of protocols
  • Seminar 4 Moores Law and the evolution of
    optical networking
  • Seminar 5 The inter-relationship of QoS,
    mobility and security

36
IP-FLOW Overview
  • teaching, training, dissemination and Workshops

1ST YEAR 2ND YEAR 3RD YEAR
Graduate courses Course 1 / Course 2 Course 3 / Course 2 Course 1 / Course 3
Dissémination Seminars 1, 2, 3 Seminars 3, 4, 5 Seminars 1, 2, 3, 4, 5
Dissemination Short tutorials Based on Course 1 / Course 2 Based on Course 3 / Course 2 Based on Course 1 / Course 3
Workshops organized by the Chair holder on Streaming media over optical and wireless - 5/1/06 Trusted computing and content protection - 11/1/06
Possible technology transfers Directional antennas for mobile users TrustedFlow applications Pipeline forwarding Switch
Write a Comment
User Comments (0)
About PowerShow.com