Title: Marie Curie Chairs (EXC) IP FLows over Optical and Wireless (
1Marie Curie Chairs (EXC)IP FLows over Optical
and Wireless (IP-FLOW)Kick-off Meeting
Monday 28 June, 2004
- Yoram Ofek
- Department of Information and Communications
TechnologyUniversity of Trento, Italy
2Agenda
- 1030 Opening
- Prof. Fausto Giunchiglia Vice Rector
University of Trento - Prof. Roberto Battiti University of Trento
- Mr. Philippe Froissard European Union
- 1045 Prof. Yoram Ofek (University of Trento)
IP-FLOW Overview and Planning - Discussion/planning Research Area 1
- 1130 Prof. Mario Baldi (Politecnico di Torino)
and Prof. Achille Pattavina (Politecnico di
Milano) Minimum Complexity Non-blocking
Switching - 1150 Prof. Mario Baldi and Ing. Guido Marchetto
(Politecnico di Torino) "Time-based Router - 1140 Prof. Yoram Ofek 40 Tb/s Time-based
Non-blocking Switch Design - Lunch 1200 1300
- Discussion/planning Research Area 2
- 1300 Prof. Moti Yung (Columbia University - USA)
Trusted Flow Why, How, and Where? - 1315 Prof. Fabio Massacci (University of Trento)
Malware Protection - 1330 Prof. Roberto Battiti (University of
Trento) Trust and Location - 1345 Dr. Paolo Falcarin and Dr. Maurizio Morisio
(Politecnico di Torino) A proposed
TrustedFlow System Architecture with
Aspect-oriented Implementation - 1415 Dott. Davide D'Aprile Dr. Daniele Mazzocchi
(Istituto Superiore Mario Boella - Torino) A
TrustedFlow Enabled Run-time Environment and
Trusted Flow Formal Specification - 1430 Dr. Luca Tagliaferri and Prof. Paolo
Prinetto (Politecnico di Torino) Code
Self-checking Techniques for TrustedFlow
ImplementationDiscussion/planning Research Area
3 - 1500 Prof. Bezalel Gavish (SMU - USA)
Placement of multidirectional antennas - 1515 Prof. Andrea Massa / Prof. Renato Lo Cigno
(University of Trento) the inter-relationship
APs placement, antenna design, Radio wave
propagation properties
3IP-FLOW Overview
- Focus on
- 1. Flow (switching/forwarding) of data over the
Internet optical and wireless - Rather than on routing
- 2. Internet/telecom business and security
4IP-FLOW Overview
- Research Area 1 UTC-based pipeline forwarding
for solving switch and link bottlenecks delivery
of very high capacity streaming data - Research Area 2 TrustedFlow for run-time
software authentication trusted delivery and
processing of data - Research Area 3 B-GLOW - Broadband services via
GLobal Optical and Wireless integration -
delivering streaming data to Wi-Fi clients
5Research Area 1 - MotivationThe Telecom
(Unfinished) Story
- Why the telecom industry vendors and providers
are more or less in bankruptcy (? two trillions
debts) - They ignored cash flow
- 1. spending money wisely
- 2. earn more money from new services
6Research Area 1 UTC-based Pipeline
Forwarding/Switching
- Pipelines are deployed to increase efficiency in
- Factory (automotive), Computers (CPU),
- NOW (deterministic) pipeline over the
Internet!Thanks to GPS/GALILEO/... that provides
UTC Coordinated Universal Time everywhere
7Research Area 1 UTC-based for Streaming Media
- Deterministic performance
- No loss,
- Minimum delay and
- Constant jitter
- end-to-end delay lt 100 ms - interactive
voice/video - Minimum buffers for all-optical realization
- Enables huge capacity increase for streaming
- 1000 capacity increase may create major
switching bottlenecks
8Research Area 1 UTC-based Switching Complexity
- Minimum complexity non-blocking switching thus
very high scalability - Analytically proven
- UTC-based switch Banyan
- Minimum complexity
- Crossbar
- Clos
9Research Area 1UTC-based 40 Tera-bit/s Switch
Crosspoint Switches Vitesse VSC3140VC, or
MindSpeed M21150
1
1
1
1
32-by-32 320 Gbps
32-by-32 320 Gbps
32
32
Electrical Interconnection
32
32
1
1
32-by-32 320 Gbps
32-by-32 320 Gbps
32
32
32x320 10 Tbps Switching Module
10Research Area 1UTC-based 40 Tera-bit/s Switch
UTC
Pipeline Forwarding Switch Controller
1
1
1
1
1
1
32-by-32
32-by-32
32-by-32
32-by-32
32
32
10 Tbps Switching Module
32
32
32
32
1
1
32-by-32
32-by-32
32-by-32
32-by-32
Interconnection Electrical or Optical
32
32
Only off-the-shelf components Thus, simple to
prototype
50 times less complexity than HFR (Cisco newest
switch)
11Research Area 1 Optical to Wireless Challenge
- Optical/wireless bandwidth mismatch factor of
1000 or more - UTC-based forwarding ensures
- Minimum delay buffering and delay
- Deterministic no loss
Bandwidth Mismatch Animation
12Ph.D. Thesis Opportunities in Research Area 1
- The research activities in this area will be open
for students to propose and define their
activities since there are still many open issues
with regard to performance and realization. - Blocking probability analysis of global IP
network with time-driven switching and
time-driven priority - Optics vs. electronics qualitative and
quantitative comparison of UTC-based pipeline
forwarding - Bandwidth mismatch streaming from optical to
wireless - Network architecture design and performance
evaluation of multi terabit/second IP packet
switches - Performance study of time-driven best-effort
traffic over IP networks
13Research Area 2 Computing and Networking
- Fundamental inventions in the past 50 years
- Transistor
- Laser optical fiber
- Lead to exponential growth in
- Computing
- Networking
- Doubling performance every 18-24 mo. - a.k.a.
Moore's "Law - Led to the convergence of
- Computing and Networking
14Research Area 2 Computing and Networking
- Today,
- Internet computing/networking are ONE
- Thus, trusted operation is a major challenge
- Critical to business
- Temporal (and spatial) manipulation of protocols
- On-line bidding / stocks trading
- DoS, DDoS loss of revenues
- Stealing content, SW and information
15Is it possible to use the networkto alleviate
networkingtrust problem?
16Research Area 2 The Context of TrustedFlow
- A method that combines
- Computing and networking
- For distribution of trust or entrusting
- Stand-alone computer can be trusted, by
definition!
17Research Area 2 What Do We Want to Achieve?
Remote authentication of code during execution
Trusted 1st computer ensure that SW executed
on Untrusted 2nd computer was not
modified Thereby, entrusting the 2nd computer
18Research Area 2 The Trust Problem Definition
- How to ensure run-time SW authenticity
- Focusing on two generic protocols
- 1. Sending packets
- To avoid unfair usage/attacks on networks/servers
- TCP, SLA, 802.11,
- 2. Receiving packets (e.g., content)
- To ensure digital right management (DRM)
- Audio, video
19Research Area 2 How Entrusting
- (Stream of) Tags are EMANATED from a
programcodesoftware at run-time - ENTRUSTING by verifying the Tags
20Research Area 2 How Entrusting
Entrusting SW by Verifying
Trusted Computer
Entrusted SW on UNtrusted Computer
TrustedComputing Environment Tag
Checker (TC) HARDENEDwith Special Hardware/So
ftware (e.g., TCPA)
Untrusted Computing Environment
SW with Tag Generator (TG)
21Research Area 2 Quality of Remote SW
Authenticationwith TrustedFlow
Better Remote Authentication Operations
SPACE interlocking and Hiding Of Tag Generation
TIME periodic replacement of SW components and
parameters
22Ph.D. Thesis Opportunities in Research Area 2
- TrustedFlow for streaming media content
protection and management - TrustedFlow for 802.11 MAC protocol
- Reverse TrustedFlow for securing mobile users
- TrustedFlow for Grid computing
- TrustedFlow for Internet voting software
- TrustedFlow for TCP (transport control protocol)
- Design of the hiding function of the tag
generator - Design of the interlocking function of the tag
generator - TrustedFlow for SLA (service level agreement)
23Research Area 3 B-GLOW Overview
Revenue Generating Services
Secure Data and Content Flows
ResearchArea 3
Security
B-GLOW High Fidelity Data Flows Over Wireless
Optical Backbone
Ubiquitous Computing, Storage, Position Time
Wireless Wi-Fi 802.11
Mismatch Bandwidth / Availability / Reliability
Optical Backbone
24Research Area 3 B-GLOW Overview
Mobile Users with Handheld Devices Who Desired to
Receive (and Pay for) Quality Content
Predictable High Quality Content Delivery via
IP-based Wireless IEEE 802.11 Wi-Fi
Optical Backbone Interfaces GE/10GE/IP-MPLS/SDH/
Scalable and adaptable Audio/Video
Content Desired by Mobile Users
25Research Area 3 B-GLOW Overview
Predictable Payments for quality content
protected that can be protected by DRM With
scalable flat rate/mini/micro payments With
multilingual user interfaces
Objective n. 4
Predictable delivery of scalable content To
provide scalable audio and video content with
coding and representation with run-time SLA
protocol and interfaces with UMTS
Objective n. 3
Objective n. 2
Efficient and timely packet flow and
monitoring End-to-end Measurements with Feedback
to Apps and Users Packet Transmission/Scheduling
Protocol for Overcoming Optical/Wireless
Bandwidth Mismatch
To provide capacity to user to satisfy their need
for content while minimizing infrastructure cost
Optimized access point location with/without
directional Antenna
Objective n. 1
IP-FLOW FOCUS
26Research Area 3 Focus on Wi-Fi Physical/Network
Layer
802.11 with External Antenna Omni/Directional
802.11 Access Point with/out SDMA
Streaming Media to Mobile Users
USB
Multimedia Server
Mobile Device PC/PDA/Phone
802.11 with External Antenna Omni/Directional
- Experimental Study
- Hot-spot and open-space
- Utilizing both
- Network/protocol analyzer
- RF spectrum analyzer
USB
Mobile Device PC/PDA/Phone
27Research Area 3 Focus on Directional Antennas
Antenna Gain G(db) 10 log10(gmax) 10 log10
4pA / Lambda 2 gmax ? 4(3.14)(L1L2)/(L
ambda 2) Lambda speed-of-light/Frequency A
L1L2 is the rectangular area of antenna
aperture in cm 2
6 cm ? 60?
6 cm ? 60?
6cm ? 60?
6 cm ? 60?
5GHz
5GHz
5GHz
5GHz
6 cm ? 60?
12 cm ? 30?
24 cm ? 15?
48 cm ? 7.5?
L1
802.11
L2
L2
G(db) ? 11
G(db) ? 14
G(db) ? 17
G(db) ? 20
28Research Area 3 Challenge
- Small angle-high gain continuously changing best
receiving direction, due to - 1. environment factors
- 2. motion - mobility
- 3. interference (unlicensed band)
- Possible solution
- multiple sectors
29Research Area 3 1st Experimental Prototype Only
software
Mobile Device
Antenna Sector 1
USB 802.11 Access Control Adapter
Antenna Control Software
USB HUB
USB Connection
Antenna Sector 6
USB 802.11 Access Control Adapter
30Research Area 3 2nd Experimental Prototype with
RF Switch
Mobile Device
Antenna Sector 1
USB 802.11 Access Control Adapter
Antenna Control Software
RF Switch
USB Connection
Antenna Sector 6
31Ph.D. Thesis Opportunities in Research Area 3
- In-depth experimentation and measurement of
content delivery capacity in hot-spot as
function of the number of active mobile user
using high-end spectrum and network analyzers - Studying the inter-relationship between
directional antenna and access point placement
both analytically and experimentally - Design and analysis of the potential benefits of
directional antennas for mobile users - Studying and analysing how to provide scalable
and adaptive audio and video content with
necessary coding and representation, including a
run-time and adaptive service level agreement
protocol for matching capabilities for (paid)
quality content delivery to mobile devices - Studying and analysing how to provide scalable
content with protection using DRM (digital right
management) with capability for differentiated
payments and micro-payments, that are dependent
on the quality of content delivered and on prior
classification of users
32IP-FLOW Summary
Services
Secure Data and Content Flows
Security
Ubiquitous Computing, Storage, Position Time
Wireless Wi-Fi 802.11
Mismatch Bandwidth / Availability / Reliability
Optical Backbone
33IP-FLOW Overview
1ST YEAR 2ND YEAR 3RD YEAR
Research Area 1 PCB electronic/heat dissipation design Success ? Implementation and testing Success ? Integration and demonstration switch and interfaces
Research Area 2 Implementation of TrustedFlow protocol Success ? Integration for trusted content delivery Success ? Integration and demonstration with trusted computing
Research Area 3 Understanding mobile w/directional antenna Success ? Evaluating content delivery quality Success ? Integration and demonstration with micro-payment / DRM
34IP-FLOW Overview
35IP-FLOW Overview
- Lecture series Three graduate courses
- Course 1 Satisfying QoS Requirements over a
Single Networks - Course 2 Optical Networking
- Course 3 The Inter-relationship of QoS, Mobility
and Security - Seminar Series to Broad Audience
- Seminar 1 Users satisfaction and flow of packet
over the Internet - Seminar 2 The use of time in future packet
networks - Seminar 3 Trusted computing and run-time
authentication of protocols - Seminar 4 Moores Law and the evolution of
optical networking - Seminar 5 The inter-relationship of QoS,
mobility and security
36IP-FLOW Overview
- teaching, training, dissemination and Workshops
1ST YEAR 2ND YEAR 3RD YEAR
Graduate courses Course 1 / Course 2 Course 3 / Course 2 Course 1 / Course 3
Dissémination Seminars 1, 2, 3 Seminars 3, 4, 5 Seminars 1, 2, 3, 4, 5
Dissemination Short tutorials Based on Course 1 / Course 2 Based on Course 3 / Course 2 Based on Course 1 / Course 3
Workshops organized by the Chair holder on Streaming media over optical and wireless - 5/1/06 Trusted computing and content protection - 11/1/06
Possible technology transfers Directional antennas for mobile users TrustedFlow applications Pipeline forwarding Switch