An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint...

29
An Architecture for Tetherless Computing S. Keshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh

Transcript of An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint...

Page 1: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

An Architecture for Tetherless Computing

S. KeshavUniversity of Waterloo

October 21, 2004

Joint work with Aaditeshwar Seth and Patrick Darragh

Page 2: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Server

DC

MS

MSDC

DC

DC

DC

DC

What if…

MS

Page 3: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Applications

Healthcaretell a doctor about latest test results

Environmental monitoringfly a plane over a site to collect data

Rural developmentbus on a rural route becomes a data mule

Personal productivityAlmost always in-sync iPod

Image sharing for migrant workers

Page 4: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Tetherless computing

Smart mobile devices that opportunistically communicate with resource-rich data centers over heterogeneously administered wireless and wireline networks

Internet cloud

Server

Data center

Page 5: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

1. Computing costs are plummeting

From www.icknowledge.com

Processor costs have come down by six orders of magnitude in three decades

CMOS allows on-chip logic, memory, imaging and RF components

Devices will merge computing, audio, and video

•Cell phone•Still camera•Video camera•MP3 player•PDA

Page 6: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

2. Batteries are lasting longer

Page 7: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

3. Wireless networks are proliferating

© Intel

Page 8: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

4. Data Centers aggregate resources

Page 9: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Requirements

Must build on existing Internet architectureMobility transparency

Address changes as a mobile host moves from one subnet to anotherHow to locate a mobile?

Disconnection resilienceTCP cannot sustain long duration disconnectionsShould not require both ends of a connection to be simultaneously present

Identity managementMobile should have the same identity no matter where it goesMobile and infrastructure should mutually authenticate

Access sensingIs a mobile in a hot spot in the first place?Important to make the right decision

Need low control overheadTo maximize use of opportunistic communication

Page 10: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Existing solutions have limitations

Network layer solutions: Mobile IP/HMIPv6Provide mobility transparencyBut do not provide disconnection transparency

Transport layer solutions: TCP Migrate/Rocks and RacksProvide both mobility and limited disconnection transparencyBoth endpoints need to be simultaneously present Only support short disconnectionsOnly work with TCP

Session layer solutions: DHARMA, PCMPProvide both mobility and disconnection transparencyBoth endpoints need to be simultaneously present Only work with TCP

Application layer solutions: Message ferrying, GnutellaApplication specificDo not deal with control overheads

Page 11: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Tetherless Computing Architecture

Page 12: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Disconnection tolerance using DTN

Sender

Receiver

DTN OverlayDTN router

Page 13: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

DTN is just like email but…

Built-in support for disconnectionReactive fragmentationBoth ends can move

Better routingDynamic, instead of MX recordsCan be based on opportunistic or scheduled links

General purpose APISend()/Recv() like sockets

Support for multiple classes of service Better identity management

We hope… Avoid spam

Page 14: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Mobility transparency using a DHT

Sender

Internet Region

DHT Overlay

Receiver at R-1

Receiver at R-2

Mobile AP

Page 15: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Overview

Bundles sent to DTN addresses with GUIDsLocation management

DHT stores translations from GUID to DTN regionWithin a region store translation from a GUID to custodian

Late binding from GUID to destination region

Internet Region (R) Custodian (C) Mobile (I)(I, R) (I, C) TCP

Local DTN router (M) TCP

HLR VLRL LR

Fig. 1: Three tiered hierarchy of lookups in TCA

Page 16: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Details

When a bus drives past a mobile, it uses GUID to deliver bundles to the mobile, and picks up late-bound bundles from the mobileDTN routers with an interface on the Internet resolve late-bound addresses to a destination region gateway using DHTDestination region gateway maps from GUID to the custodian and forwards bundles to the custodianMobile picks up bundles from the custodianAfter a move, tables have to be carefully updated

‘Make then break’

Page 17: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Features

Sender can inject all its data into the network, whenever it gets a chanceReceiver can extract all waiting data from the network, whenever it gets a chanceFar notifications not needed in near movementsShort latency stretch

Page 18: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Innovations

Unbound destination address allows disconnected endpoints

Lookup in the forwarding path

GUID is MD5 hash of email addressProvides security without PKI or DNS

DHT for HLRMakes lookup scaleable and robust

Compatible with DTN routingNo extra overhead on headers or routing tables

Page 19: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Ongoing research

Solving underlying point problemsBuilding a prototypeBuilding real-world tetherless applications

Page 20: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

1. Fundamental underlying problems

How to manage identities of mobile disconnected users?How do you know you’re in a hotspot?How to boost priority of communicating processes?

Page 21: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Identity management (Seth)

Use Hierarchical Identity Based EncryptionPublic Key = Hash (identity)Each user must get Private Key from a PK serverAllows disconnected operationCan limit need for revocation using timed keysWorking on a secure architecture for tetherless computing

Page 22: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Hot spot detection (Lifchits and Liang)

Monitor signal/noise strength of incoming beacons

sent out once every 100 ms

Hard to make the right choiceWe are still collecting raw data

sensitivity to positionsensitivity to orientationsensitivity to motion

Is signal strength the right indicator?

Page 23: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 24: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Priority boosting (Liang)

Simple ideaBoost priority of communicating processes when in a hotspot

Complex implementation!We have implemented in Linux 2.4, Linux 2.6 and FreeBSDEach OS has its own quirks and needs a lot of careful kernel hackingCan show some improvement for each OS by using a combination of priority boosting, quantum size boosting, and memory locking

Page 25: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

2. Building a prototype

Have successfully installed DTN on a variety of platforms (Darragh and Thomas)Have successfully integrated DTN with Internet Indirection Infrastructure (Darragh)First app is a ‘mobile blog’ (Fung and Darragh)Working on rewriting DTN bundle daemon (Ahmed)

Page 26: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Hardware platforms

Soekris single board computersx86 compatible, running Pebble Linuxpowered by lead acid cellruns DTN bundle daemon and I3 client

Sensor motesintegrated with DTN mote proxy

Sharp Zaurus 5500 PDAsSomewhat flaky hardware, but works OK most of the time

IPAQ 4150nice platform, but Linux support is missinginvestigating CELib

Page 27: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

3. Applications

Medical applications (Hilliker)working with Guelph General Hospitalearly stages -- still learning context

Plant operations (Hilliker)simplifying workflow

UW Formula SAE racing team (Hilliker and Salmon)

working with on-board DAS to send information to the pit

Page 28: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Course projects

Integration with JabberFormula SAEMobilityVMPod

Page 29: An Architecture for Tetherless Computing S. K eshav University of Waterloo October 21, 2004 Joint work with Aaditeshwar Seth and Patrick Darragh.

Conclusions

Tetherless vision will take years to realizeAttacking on several frontsProgress is encouragingMore at http://mindstream.watsmore.net