Professional Documents
Culture Documents
Unit-5 Notes
Unit-5 Notes
© www.skedocs.blogspot.com
Overview
• Short introduction
• Example of a basic routing algorithm
• Routing protocols
• IP configuring
• Security
© www.skedocs.blogspot.com
Short introduction to wireless
multihop networks
© www.skedocs.blogspot.com
Challenges
• Dynamic topologies
• Bandwidth-constrained, variable capacity
links
• Energy-constrained
• Limited physical security
• Scalability
© www.skedocs.blogspot.com
Simple routing protocol
example
• Propagation of routing table
• Routing and transmitting
© www.skedocs.blogspot.com
Routing table
• Each terminal has its own routing table
(in proactive routing algorithms)
Destination Next
terminal node
A A
B A
C E
D D
… …
© www.skedocs.blogspot.com
Position notification packet
• Used to make and update the Routing Table
• Broadcasted in a limited area
© www.skedocs.blogspot.com
Basic transmitting procedure
© www.skedocs.blogspot.com
© www.skedocs.blogspot.com
INTRODUCTION TO OPTICAL NETWORKS
11
TELECOMMUNICATIONS NETWORK
ARCHITECTURE
© www.skedocs.blogspot.com
12
TELECOMMUNICATIONS NETWORK
ARCHITECTURE
Metro network: lie within a city or a region
Access network: extend from a central office to businesses and
© www.skedocs.blogspot.com
homes
Interoffice network: connect central offices within a city or a region
13
DESIRED FEATURES OF
TELECOMMUNICATIONS NETWORKS
High capacity
Efficiently support data traffic
© www.skedocs.blogspot.com
Use packet switching
Deliver new and flexible types of services
Bandwidth on demand
Restorable connections with different restoration guarantees
14
OPTICAL NETWORKS
Optical fibers as transmission media
High bandwidth: tens of Tbps
© www.skedocs.blogspot.com
Low loss and low bit error rate
Two ways to increase the transmission capacity on a
fiber:
Increase the bit rate with time division multiplexing (TDM):
many lower speed data streams are multiplexed into a higher-
speed stream
Wavelength division multiplexing (WDM): transmit data
simultaneously at multiple wavelengths
TDM and WDM combined: tens of Tbps
15
OPTICAL NETWORKS
Two generations
First generation: switching and processing done by electronics
© www.skedocs.blogspot.com
SONET
Second generation: routing and switching done in optical domain
Wavelength routing networks
16
SYNCHRONOUS OPTICAL NETWORK
(SONET)
The ANSI standard for synchronous data transmission on
optical media.
Provide end-to-end circuit-switched connections
© www.skedocs.blogspot.com
Provide efficient mechanism for multiplexing low-speed
connections into higher-speed connections
Define a base rate of 51.84 Mbps and a set of multiples of the base rate
known as "Optical Carrier levels (OCx)"
Provide efficient way to extract low-speed streams from a
high-speed stream at intermediate nodes
High availability (99.99% to 99.999%)
Rapid service restoration in the event of failures
17
SONET TRANSMISSION RATES
OC-1 = 51.84 Mbps
OC-3 = 155.52 Mbps
© www.skedocs.blogspot.com
OC-12 = 622.08 Mbps
OC-24 = 1.244 Gbps
OC-48 = 2.488 Gbps
OC-192 = 9.953 Gbps
OC-768 = 39.814 Gbps
18
SONET ELEMENTS
Terminal multiplexers (TMs): nodes at the ends of
point-to-point links, multiplex and demultiplex traffic
streams
© www.skedocs.blogspot.com
Add/drop multiplexers (ADMs):drop/add one or more
low-speed streams from/to a high-speed stream, allow
the remaining traffic to pass through
Deployed in linear and ring networks
Digitalcrossconnects (DCSs): large number of ports,
extract and switch lower-speed streams (44.736Mbps
and 1.544Mbps), interconnect SONET rings
19
WAVELENGTH ROUTING NETWORKS
Optical layer provides lightpath services to client
layers (e.g. IP, ATM, SONET)
© www.skedocs.blogspot.com
Lightpath: a circuit switched connection between two
nodes set up by assigning a dedicated wavelength on
each link in its path
All links in the path must be assigned the same wavelength
if network nodes are not capable of wavelength conversion
Wavelength conversion can reduce connection blocking
20
LIGHTPATH SERVICE
Transparent to bit rate and protocol format
Advantages
© www.skedocs.blogspot.com
Service transparency: can provide different services using a single
infrastructure
Future-proof: allow new services to be deployed rapidly
21
NETWORK ELEMENTS
Optical line terminals (OLTs):
multiplex multiple wavelengths into a single fiber
© www.skedocs.blogspot.com
demultiplex wavelengths on a single fiber into separate
wavelengths
Optical add/drop multiplexers (OADMs):
drop/add one or more wavelengths from/to a composite
WDM signal, allow the remaining wavelengths to pass
through
two line ports and a number of local ports
Optical crossconnects (OXCs):
switch wavelengths from one port to another
large number of ports
22
© www.skedocs.blogspot.com
23
ADVANTAGES OF
WAVELENGTH ROUTING
Reduce costs (switch ports, electronic processing) at the client
layer by routing pass-through traffic in the optical layer
© www.skedocs.blogspot.com
Support different traffic patterns
24
OPTICAL PACKET SWITCHING
Not feasible at present due to
Lack of optical buffers
© www.skedocs.blogspot.com
Limited processing capabilities in the optical domain
Primitive stage of fast optical-switching technology
25
© www.skedocs.blogspot.com
INTRODUCTION TO
STORAGE AREA NETWORK
(SAN)
WHAT IS SAN ABOUT
Data is Asset
How to Store Data?
© www.skedocs.blogspot.com
How to Access Data?
© www.skedocs.blogspot.com
PROBLEM WE ARE FACING
Scalability --Rapidly growing data volume
Connectivity --Distributed data sharing
© www.skedocs.blogspot.com
24/7 availability, no single point failure
High performance
Easy management
SERVER-ATTACHED STORAGE (SAS)
© www.skedocs.blogspot.com
SAS -- HOW TO SHARE DATA
Each has own copy One copy, share
scalability:Poor OK
© www.skedocs.blogspot.com
availability: OK single point failure
performance: OK not that good
management: how to keep how to make back up without
data sync? affecting service?
Connectivity: NA System dependent
NETWORK-ATTACHED STORAGE(NAS)
© www.skedocs.blogspot.com
NAS
Scalability: good
Availability: as long as the LAN and NAS device work,
© www.skedocs.blogspot.com
generally good
Performance: limited by speed of LAN, traffic conflicts,
inefficient protocol
Management: OK
© www.skedocs.blogspot.com
STORAGE AREA NETWORK (SAN)
SAN is created by using
the Fibre Channel to link
peripheral devices such
as disk storage and tape
libraries
© www.skedocs.blogspot.com
SAN VS. NAS
Dedicated Fibre Channel Network for Storage
More efficient protocol
© www.skedocs.blogspot.com
==> higher availability
© www.skedocs.blogspot.com
server to storage
storage to storage
© www.skedocs.blogspot.com
capacity grows. The limitations on the number of
attached devices typical of channel interconnection
disappears.
BENEFITS OF SAN
High Performance ==> Fibre Channel fabrics provide a
switched 100Mbytes/second full duplex interconnect.
© www.skedocs.blogspot.com
Storage Management ==> SAN-attached storage allows
the entire investment in storage to be managed in a
uniform way.
BENEFITS OF SAN
Decoupling Servers and Storage
the servers can be upgraded while leaving storage in place.
© www.skedocs.blogspot.com
Storage can be added at will and dynamically allocated to
servers without downtime.
EASY MIGRATION TO SAN
Host Bus Adapters (HBAs) -- connect servers to the
SAN
© www.skedocs.blogspot.com
Fibre Channel storage -- connects directly to the SAN
© www.skedocs.blogspot.com
supported by the distance of Fibre Channel.
© www.skedocs.blogspot.com
STORAGE AREA NETWORK
© www.skedocs.blogspot.com
INTRODUCTION TO WIRELESS
SENSOR NETWORKS
Presented by
Sushanth Sivaram Vallath
WIRELESS SENSORS Telos 4/04
Robust
Low Power
Tiny sensing devices capable of wireless communication 250kbps
Easy to use
© www.skedocs.blogspot.com
WeC 99
“Smart Rock” Rene 11/00
Mica 1/02
Dot 9/01
© www.skedocs.blogspot.com
PLATFORMS
Berkeley Motes
Tiny OS
© www.skedocs.blogspot.com
nesC
Ns-2
TOSSIM
APPLICATIONS OF WSN
Temperature
Humidity
© www.skedocs.blogspot.com
Vehicular movement
Pressure
Noise levels
Mechanical stress levels on attached objects
Speed, direction
Etc…
FACTORS INFLUENCING SENSOR
NETWORK DESIGN
Fault tolerance
Scalability
© www.skedocs.blogspot.com
Operating environment
Transmission media
Power consumption
SENSORS REPRESENTATION
Communication Graph
Sensors are nodes
© www.skedocs.blogspot.com
Link between the sensors are the edges
ROUTING PROTOCOLS
LEACH
Directed Diffusion
© www.skedocs.blogspot.com
PEGASIS
TEEN
APTEEN
Etc…
SENSOR ISSUES
Energy Constraint
High Communication cost
© www.skedocs.blogspot.com
& Lot of other issues
MANAGEMENT ISSUES
Conversion of data to Information
Data access control
© www.skedocs.blogspot.com
ACTIVE AREAS IN WSN
Routing
Topology control
© www.skedocs.blogspot.com
Data management, aggregation and query
MAC protocols
Target tracking, resource discovery
Monitoring and maintenance
Sensor validation
Power issues
Coverage and Connectivity
© www.skedocs.blogspot.com
PEER-TO-PEER OVERLAY NETWORKS
OUTLINE
Overview of P2P overlay networks
Applications of overlay networks
© www.skedocs.blogspot.com
Classification of overlay networks
Structured overlay networks
Unstructured overlay networks
Overlay multicast networks
OVERVIEW OF P2P OVERLAY
NETWORKS
What is P2P systems?
P2P refers to applications that take advantage of resources
(storage, cycles, content, human presence) available at the
© www.skedocs.blogspot.com
end systems of the internet.
What is overlay networks?
Overlay networks refer to networks that are constructed on
top of another network (e.g. IP).
What is P2P overlay network?
Any overlay network that is constructed by the Internet
peers in the application layer on top of the IP network.
OVERVIEW OF P2P OVERLAY
NETWORKS
P2P overlay network properties
Efficient use of resources
Self-organizing
© www.skedocs.blogspot.com
All peers organize themselves into an application layer network on top of IP.
Scalability
Consumers of resources also donate resources
Aggregate resources grow naturally with utilization
Reliability
No single point of failure
Redundant overlay links between the peers
Redundant data source
Ease of deployment and administration
The nodes are self-organized
No need to deploy servers to satisfy demand.
Built-in fault tolerance, replication, and load balancing
No need any change in underlay IP networks
APPLICATIONS OF P2P OVERLAY
NETWORKS
P2P file sharing
Napster, Gnutella, Kaza, Emule, Edonkey, Bittorent, etc.
© www.skedocs.blogspot.com
Application layer multicasting
P2P media streaming
Content distribution
Distributed caching
Distributed storage
Distributed backup systems
Grid computing
CLASSIFICATION OF OVERLAY
NETWORKS
Structured overlay networks
Are based on Distributed Hash Tables (DHT)
the overlay network assigns keys to data items and
© www.skedocs.blogspot.com
organizes its peers into a graph that maps each data key to a
peer.
Unstructured overlay networks
The overlay networks organize peers in a random graph in
flat or hierarchical manners.
Overlay multicast networks
The peers organize themselves into an overlay tree for
multicasting.
STRUCTURED OVERLAY NETWORKS
Overlay topology construction is based on NodeID’s that are
generated by using Distributed Hash Tables (DHT).
In this category, the overlay network assigns keys to data items
© www.skedocs.blogspot.com
and organizes its peers into a graph that maps each data key to
a peer.
This structured graph enables efficient discovery of data items
using the given keys.
Storing the objects in the networks is based on
It Guarantees object detection in O(log n) hops.
Examples: Content Addressable Network (CAN), Chord,
Pastry.
UNSTRUCTURED P2P OVERLAY
NETWORKS
An Unstructured system composed of peers joining the
network with some loose rules, without any prior
knowledge of the topology.
© www.skedocs.blogspot.com
Network uses flooding or random walks as the
mechanism to send queries across the overlay with a
limited scope.
When a peer receives the flood query, it sends a list of
all content matching the query to the originating peer.
Examples: FreeNet, Gnutella,KaZaA, BitTorrent
UNSTRUCTURED P2P FILE SHARING
NETWORKS
CentralizedDirectory based P2P systems
Pure P2P systems
© www.skedocs.blogspot.com
Hybrid P2P systems
UNSTRUCTURED P2P FILE SHARING
NETWORKS
Centralized Directory based P2P systems
All peers are connected to central entity
Peers establish connections between each other on
© www.skedocs.blogspot.com
demand to exchange user data (e.g. mp3
compressed data)
Central entity is necessary to provide the service
Central entity is some kind of index/group
database
Central entity is lookup/routing table
Examples: Napster, Bittorent
UNSTRUCTURED P2P FILE SHARING
NETWORKS
Pure P2P systems
Any terminal entity can be removed without
loss of functionality
© www.skedocs.blogspot.com
No central entities employed in the overlay
Peers establish connections between each other
randomly
To route request and response messages
To insert request messages into the overlay
© www.skedocs.blogspot.com
another dynamic hierarchical
layer
Election process to select an
assign Superpeers
Superpeers: high degree
(degree>>20, depending on Superpeer
network size)
Leafnodes: connected to one or
more Superpeers (degree<7)
Example: KaZaA leafnode
P2P: CENTRALIZED DIRECTORY
Bob
original “Napster” design
centralized
1) when peer connects, it informs directory server
1
central server:
© www.skedocs.blogspot.com
peers
IP address
1
content
Alice
P2P: PROBLEMS WITH CENTRALIZED
DIRECTORY
Singlepoint of failure file transfer is
Performance bottleneck
decentralized, but locating
content is highly
© www.skedocs.blogspot.com
Copyright infringement
decentralized
QUERY FLOODING: GNUTELLA
fully distributed overlay network: graph
no edge between peer X and Y
central server
© www.skedocs.blogspot.com
public
if there’s a TCP connection
domain protocol
all active peers and edges is
many Gnutella clients
overlay net
implementing protocol Edge is not a physical link
© www.skedocs.blogspot.com
QueryHit
Query message
e ry Qu
QueryHit ery
Qu Hit
sent over ery
Qu
reverse
Query
path
QueryHit
Scalability:
Qu
limited scope er
y
flooding
GNUTELLA: PEER JOINING
1. Joining peer X must find some other peer in
Gnutella network: use list of candidate peers
2. X sequentially attempts to make TCP with peers on
© www.skedocs.blogspot.com
list until connection setup with Y
3. X sends Ping message to Y; Y forwards Ping
message.
4. All peers receiving Ping message respond with Pong
message
5. X receives many Pong messages. It can then setup
additional TCP connections
Peer leaving: see homework problem!
EXPLOITING HETEROGENEITY:
KAZAA
Each peer is either a group
leader or assigned to a group
leader.
© www.skedocs.blogspot.com
TCP connection between peer
and its group leader.
TCP connections between some
pairs of group leaders.
Group leader tracks the
content in all its children.
o rdinary pe er
© www.skedocs.blogspot.com
Group leader responds with matches:
For each match: metadata, hash, IP address
Ifgroup leader forwards query to other group leaders,
they respond with matches
Client then selects files for downloading
HTTP requests using hash as identifier sent to peers holding
desired file
KAZAA TRICKS
Limitations on simultaneous uploads
Request queuing
© www.skedocs.blogspot.com
Incentive priorities
Parallel downloading
INTERNET P2P TRAFFIC STATISTICS
Between 50 and 65 percent of all download traffic is P2P
related.
Between 75 and 90 percent of all upload traffic is P2P related.
© www.skedocs.blogspot.com
And it seems that more people are using p2p today
© www.skedocs.blogspot.com
control, security, group management and etc.
For the new emerging applications such as multimedia
streaming, internet multicast service is required.
Solution: Overlay Multicasting
Overlay multicasting (or Application layer multicasting) is
increasingly being used to overcome the problem of non-ubiquitous
deployment of IP multicast across heterogeneous networks.
OVERLAY MULTICASTING
Main idea
Internet peers organize themselves into an overlay tree on top of the
© www.skedocs.blogspot.com
Internet.
Packet replication and forwarding are performed by peers in the
application layer by using IP unicast service.
OVERLAY MULTICASTING
Overlay multicasting benefits
Easy deployment
It is self-organized
© www.skedocs.blogspot.com
Scalability
It is scalable with multicast groups and the number of members in
each group.
Efficient resource usage
Uplink resources of the Internet peers is used for multicast data
distribution.
It is not necessary to use dedicated infrastructure and bandwidths for
massive data distribution in the Internet.
OVERLAY MULTICASTING
Classification of overlay multicast approaches
DHT based
© www.skedocs.blogspot.com
Treebased
Mesh-tree based
OVERLAY MULTICASTING
DHT based
Overlay tree is constructed on top of the DHT based P2P
© www.skedocs.blogspot.com
routing infrastructure such as pastry, CAN, Chord, etc.
Example: Scribe in which the overlay tree is constructed on
a Pastry networks by using a multicast routing algorithm
(similar to core based tree (CBT)).
OVERLAY MULTICASTING
Tree based
Group members self-organize themselves into a tree by explicitly
picking a parent for each new group.
© www.skedocs.blogspot.com
Nodes on the tree may establish and maintain control links to one
another in addition to the links provided by the data tree. As such,the
tree, with these additional control links constitutes the control topology
in a tree structure.
This approach is simple and is capable of building efficient data
delivery trees.
The tree building algorithm must prevent loops and handle tree partition
as the failure of a single node may cause a partition of the overlay
topology.
Examples: ALMA, ALMI, OMNI, NICE, ZIGZAG, BTP, Overcast, …
OVERLAY MULTICASTING
Mesh-tree based
The mesh-tree approach is a two-step design to the overlay topology.
It is common for group members to first distributedly organize themselves into
© www.skedocs.blogspot.com
an overlay control topology called the mesh. A routing protocol runs across this
control topology and defines a unique overlay path to each and every member.
Data distribution trees rooted at any member is then built across this mesh based
on some multicast routing protocols, e.g. DVMRP.
Compared to tree only design, mesh-tree approach is more complex.
it has the advantages of avoiding replicating group management functions
across multiple (per-source) trees, providing more resilience to failure of
members, leveraging on standard routing algorithms thus simplifying overlay
construction and maintenance as loop avoidance and detection are built-in
mechanisms in routing algorithms.
Examples: Narada, Kudos, Scattercast, Yoid