Networks Research Group Carey Williamson i CORE Chair

  • Slides: 12
Download presentation
Networks Research Group Carey Williamson i. CORE Chair Broadband Wireless Networks, Protocols, Applications, and

Networks Research Group Carey Williamson i. CORE Chair Broadband Wireless Networks, Protocols, Applications, and Performance Department of Computer Science University of Calgary 1

Research Overview n Research area? n n Wireless networks, Internet protocols, computer systems performance

Research Overview n Research area? n n Wireless networks, Internet protocols, computer systems performance evaluation Mission: “Make the Internet go faster” Approach? n Experimental, simulation, analytical Key challenges? n n Citius, Altius, Fortius! Performance, scalability, robustness 2

Experimental Facilities n Experimental Laboratory for Internet Systems and Applications (Uof. C/Uof. S, CFI)

Experimental Facilities n Experimental Laboratory for Internet Systems and Applications (Uof. C/Uof. S, CFI) n n Geographically distributed Internet testbed between Calgary and Saskatoon Clients, servers, notebooks, routers, switches, Web proxies, network analyzers, 802. 11 a/b Fully operational since Spring 2004 Wireless Internet Performance Lab (Uof. C) n n n IEEE 802. 11 b wireless LAN Sniffer. Pro, Airopeek wireless network analyzers PCs, laptops, PDAs, wireless NICs, Web proxy 3

Research Highlights n “Frenemies” Characterization n n Wireless Sensor Network Security n n Martin

Research Highlights n “Frenemies” Characterization n n Wireless Sensor Network Security n n Martin Arlitt, Niklas Carlsson, et al. Tuan Vu, Rei Safavi-Naini, et al. Anonymity Protocol Modeling n Niklas Carlsson, Andreas Hirt, et al. 4

Characterizing “Frenemies” n n n Viewpoint: U of C as an “edge network” Inbound

Characterizing “Frenemies” n n n Viewpoint: U of C as an “edge network” Inbound and outbound network traffic External entities might be interested in information such as number of hosts, IP addresses, OS versions, open ports, and browsers used within the U of C network. n Three categories of external entities: n n n Friends: Trusted organizations and services. Enemies: Untrusted or malicious organizations. Frenemies: Organizations that provide services, but might not be (fully) trusted. 5 5

Measurement Data Set Connection data: Detailed summaries of all inbound and outbound connections (e.

Measurement Data Set Connection data: Detailed summaries of all inbound and outbound connections (e. g. , source and destination IP and port numbers, connection state). Description Duration Connections Value 1 year (Apr/08 – Mar/09) External Host = Source IP IP = Destination et Intern Inbound Outbound Connection 39. 3 billion Campus. Host Campus Destination ==Source IP IP 6 6

Characterization Results Class Organization Friends Google Microsoft Yahoo! Facebook Verisign Foes China. Net Turk.

Characterization Results Class Organization Friends Google Microsoft Yahoo! Facebook Verisign Foes China. Net Turk. Telekom Hinet TPNET. PL Frenemies Amazon Limelight Telus Prefix (/24) Connections In (%) Out (%) 263 398 630 19 29 1. 1 0. 6 0. 9 0. 1 0. 0 8. 5 3. 1 2. 1 1. 2 20, 022 13, 309 15, 197 6, 907 3. 5 2. 8 1. 1 1. 7 1. 2 0. 0 0. 8 0. 1 365 114 7, 844 0. 0 0. 1 7. 7 0. 3 1. 8 1. 9 7 7

Wireless Sensor Networks n Simulation modeling of key distribution policies for secure communication in

Wireless Sensor Networks n Simulation modeling of key distribution policies for secure communication in wireless sensor networks Wireless graph: nodes within range of each other for wireless transmission Trust graph: nodes with a shared key Wireless trust graph: both properties n Demo of simulation software available n n n 8

Anonymity Protocol Modeling n Performance metric: message latency DSR n Five main components n

Anonymity Protocol Modeling n Performance metric: message latency DSR n Five main components n n Sender S must create/encrypt and send message Load-dependent sender-side delay n n Load-independent path delay n n Path length HSR with (Dproc+Dnet) delay on each node Load-dependent transfer delay n n Queueing of (average) duration Ws Queueing at HT transfer nodes, each with duration WT Target receiver R decrypts and receives message 9

Detailed Protocol Analysis n n n Three anonymity protocols analyzed Light load assumption: No

Detailed Protocol Analysis n n n Three anonymity protocols analyzed Light load assumption: No queueing QC 0 Example: Buses protocol n n Dproc ~ N; Dnet ~ N; TC ~ N 2; hence, DSR ~ N 2 Scaling behavior n n n Buses: DSR ~ O(N 2) Taxis: DSR ~ O(N) Motorcycles: DSR ~ O(log 2 N) 10

Model Validation (Buses) 11

Model Validation (Buses) 11

The Year Ahead n Internetworked Systems Security Network n n “Protecting Canada’s Internet” NSERC

The Year Ahead n Internetworked Systems Security Network n n “Protecting Canada’s Internet” NSERC Strategic Network (2008 -2013) Collaborative initiative, led by Paul van Oorschot at Carleton University (+12 others) Pervasive Infrastructure, Services, and Applications (PISA) n n Proposed NSERC NCE, led by Alberto Leon-Garcia at the University of Toronto (+36 others) ICT-enabled “Smart Infrastructure” for cloud computing, power grid, transportation, and more 12