Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Assignment

Topic: Two page Summary

Submitted to:
Dr. Akmal
Submitted by:
Muqaddas Fatima
MS CS (1st semester)
Session (2020-22)
Summary
Topics Name
1. XRD: Scalable Messaging System with Cryptographic Privacy
2. TCP ≈ RDMA: CPU-efficient Remote Storage Access with i10
3. tpprof: A Network Traffic Pattern Profiler
4. Frequency Configuration for Low-Power Wide-Area Networks in a Heartbeat
5. Plankton: Scalable network configuration verification through model checking

Problem Statement
1. Many of Internet users turned to end-to-end encrypted communication like Transport
Layer security and Signal to protect the content of their communication. Problem is
leakage of metadata.
2. Academic and industrial communities have been taking a fresh look at the problem of
designing CPU-efficient remote storage stacks.
3. Extracting a traffic pattern from a network is a difficult and highly manual process.
4. When we transfer data packets through network the problem is the frequency or
battery usage optimization.
5. Network verification is a big problem itself. Ensuring correctness of networks is a
difficult and critical task.

Motivation
1. I get motivation from the hacking system that data can be hacked from servers I want
that type of system in which no one can steal the private data and transfer data end-
to-end system.
2. “are infrastructure changes really necessary for efficient remote storage access”?
After exploring this question we led to the design and implementation of i10, a new
remote storage stack within the kernel.
3. We take inspiration from traditional sampling profilers like gprof , Oprofile , and
Valgrind. I always wanted to know how to control the traffic over the network.
4. When data sends through nodes then the battery life of nodes will be effected to
enhance the battery life we move on the this technology where the battery life will
increase the life.
5. Motivation is getting from a growing number of network verification tools are targeted
towards automating this process as much as possible, thereby reducing the burden on
the network operator.

State of Art
1. As such, many recent messaging systems have been targeting scalability as well as
formal security guarantees. Systems like Stadium and Karaoke for instance use
differential privacy to bound the information leakage on the metadata.
2. The previous system requires modification but i10 does not requires modification.
3. To find out the traffic load over a huge network is more difficult with switching and
linking utilization.
4. Recent years have seen the emergence of Low-Power Wide Area Networks (LP-
WANs) as a promising technology to connect the Internet of Things.
5. Verification platforms have improved steadily in the recent years, both in terms of
scope and scale. Starting from offline data plane verification tools like Anteater and
HSA , the state of the art has evolved to support real-time data plane verification ,
and more recently, analysis of configurations.

Methodology
1. This paper presents a point-to-point metadata private messaging system called XRD
that aims to marry the best aspects of prior systems.
2. i10 runs on commodity hardware, allows not modified applications to operate
directly on kernel's TCP/IP network stack, and yet, saturates a 100Gbps
link for remote accesses using CPU utilization similar to state-of-the-art user-
space and RDMA-based solutions.
3. To develop this system a methodology name is tpprof is used.
4. This paper presents Chime, a solution that explores the feasibility of offloading the
LP- WAN client frequency configuration problem.
5. Plankton is a configuration verifier that uses equivalence partitioning to manage the
large header space, and explicit-state model checking to explore protocol execution.

Contributions
1. Design and analyses XRD
2. Design and implementation of a new remote storage access with i10 kernel protocol.
3. A contribution of this paper is the decomposition of traffic patterns ( Network
Sample and Network Sample Sequence).
4. A contribution of this paper is the increasing the battery life into a more convenient
way. A wide-area deployment across a university campus showing 1.4-5.7 years of
increased battery-life for LP-WAN clients.
5. We define a configuration verification paradigm that combines packet equivalence
computation and explicit-state model checking.

You might also like