6 research outputs found

    A session-based architecture for Internet mobility

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2003.Includes bibliographical references (p. 179-189).The proliferation of mobile computing devices and wireless networking products over the past decade has led to an increasingly nomadic computing lifestyle. A computer is no longer an immobile, gargantuan machine that remains in one place for the lifetime of its operation. Today's personal computing devices are portable, and Internet access is becoming ubiquitous. A well-traveled laptop user might use half a dozen different networks throughout the course of a day: a cable modem from home, wide-area wireless on the commute, wired Ethernet at the office, a Bluetooth network in the car, and a wireless, local-area network at the airport or the neighborhood coffee shop. Mobile hosts are prone to frequent, unexpected disconnections that vary greatly in duration. Despite the prevalence of these multi-homed mobile devices, today's operating systems on both mobile hosts and fixed Internet servers lack fine-grained support for network applications on intermittently connected hosts. We argue that network communication is well-modeled by a session abstraction, and present Migrate, an architecture based on system support for a flexible session primitive. Migrate works with application-selected naming services to enable seamless, mobile "suspend/resume" operation of legacy applications and provide enhanced functionality for mobile-aware, session-based network applications, enabling adaptive operation of mobile clients and allowing Internet servers to support large numbers of intermittently connected sessions. We describe our UNIX-based implementation of Migrate and show that sessions are a flexible, robust, and efficient way to manage mobile end points, even for legacy applications.(cont.) In addition, we demonstrate two popular Internet servers that have been extended to leverage our novel notion of session continuations to enable support for large numbers of suspended clients with only minimal resource impact. Experimental results show that Migrate introduces only minor throughput degradation (less than 2% for moderate block sizes) when used over popular access link technologies, gracefully detects and suspends disconnected sessions, rapidly resumes from suspension, and integrates well with existing applications.by Mark Alexander Connell Snoeren.Ph.D

    Geração de solicitação de serviço para inspeção e manutenção em máquinas industriais utilizando redes sem fio

    Get PDF
    Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-graduação em Ciência da ComputaçãoNesta dissertação apresentamos um estudo de caso de aplicação real de rede sem fio, cujo objetivo é a melhoria nas atividades de inspeção e a identificação da necessidade de manutenção em máquinas e equipamentos na área industrial. Fazendo utilização de redes sem fios e de unidades móveis, que se conectam periodicamente a uma rede estruturada, permitimos acesso aos dados em uma base consolidada de acordo com as permissões de cada usuário. Nossa aplicação foi baseada em uma arquitetura cliente/servidor, na qual uma rede sem fio deverá proporcionar acesso direto e flexível a uma base de dados coorporativa, gerando solicitações de serviço e planilhas de inspeção em equipamentos industriais. Os dados disponíveis na rede estruturada são apresentados nas unidades móveis que circulam pela fábrica, através da aplicação vertical desenvolvida. Inspetores de máquinas e mecânicos terão suas tarefas facilitadas devido à disponibilidade dos dados em tempo real e à mobilidade provida pelos palmtops. As rotinas de inspeção e de manutenção industrial, em conjunto com a comunicação sem fio, provêem inovação e agilidade nos setores que utilizam máquinas e equipamentos industriais de médio e grande porte, otimizando as atividades do dia a dia. Utilizando unidades móveis, os usuários terão à sua disposição as solicitações de serviço e as planilhas de atividades semipreenchidas, tendo apenas que completar os campos solicitados ou assinalar os itens indicados. A reintegração destes dados no sistema consolidado é efetuada de maneira rápida através de um sincronizador de dados, descartando a necessidade da entrada de dados manual por parte dos digitadores do sistema e eliminando as planilhas de papel. Concluímos com sucesso nossos objetivos e os nossos resultados finais indicam que obtivemos ganhos com o desempenho das tarefas, economia de papel, otimização de tempo do usuário, a disponibilidade on-line e a segurança dos dados na base consolidada

    Um estudo das estratégias de replicação e reconciliação de banco de dados móveis em um ambiente wireless

    Get PDF
    Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Ciência da Computação.Neste trabalho é apresentada uma análise de diferentes estratégias de replicação e reconciliação de dados baseando-se em um estudo de caso experimental, considerando dois ambientes operacionais convencionais sob o paradigma da comunicação wireless. Os resultados indicam soluções para o desenvolvimento de sistemas de banco de dados móveis que operam em condições de comunicação descontinuada

    Pro-collaborative mobile systems in next generation IP networks

    Full text link
    Computing system designs of today take on either the interactive or the proactive form. Motivated by the user’s desire to make his/her computing experience more intelligent and personalised, the progression from interactive (human-centred) to proactive (human-supervised) is evident. It can be observed that current research mainly emphasises the user as the dominant focus of a user-system interaction. Consider a model that we called the opponent-process model. It contains two processes, one representing the user and the other the system, where both processes are capable of dominating each other, though working collaboratively towards a predefined task. We argue the necessity to design computing systems which are balanced in this model, such that the system process, at times, becomes the dominant process. We refer to this as the pro-collaborative design form. We dissect mobility into the notion of a nomadic user and the notion of a nomadic system. The examination into the nomadic user problem space reveals the potential for applying the pro-collaborative approach in optimising handoff management. Significant performance advantages can be obtained with our proposed S-MIP framework, based on the pro-collaborative design, when compared with established handoff latency optimisation schemes. The key differentiator lies in its indicative approach in addressing handoff ambiguity. Instead of passively anticipating through prediction as to when a mobile user might cross network boundaries (user-dominant), the system actively indicates to the user when, where and how to handoff (system-dominant). This eliminates the handoff ambiguity. Regarding the notion of a nomadic system, that is, the ability to move services offered by computing systems to arbitrary points in the Internet, we explore the idea of the dynamic extension of network services to a mobile user on-demand. Based on the pro-collaborative form, we develop the METAMORPHOSE architecture which facilitates such a dynamic service extension. By assuming the proliferation of programmable network switches and computational resources within the Internet, we re-examine how ‘loose’ service agreements between network services providers can be, to achieve such borderless moving-service offerings. The viability of the pro-collaborative form is reflected through our design and implementation of protocols and architectures which address the notion of nomadic user and nomadic system

    Improving end-to-end availability using overlay networks

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2005.Includes bibliographical references (p. 139-150).The end-to-end availability of Internet services is between two and three orders of magnitude worse than other important engineered systems, including the US airline system, the 911 emergency response system, and the US public telephone system. This dissertation explores three systems designed to mask Internet failures, and, through a study of three years of data collected on a 31-site testbed, why these failures happen and how effectively they can be masked. A core aspect of many of the failures that interrupt end-to-end communication is that they fall outside the expected domain of well-behaved network failures. Many traditional techniques cope with link and router failures; as a result, the remaining failures are those caused by software and hardware bugs, misconfiguration, malice, or the inability of current routing systems to cope with persistent congestion.The effects of these failures are exacerbated because Internet services depend upon the proper functioning of many components-wide-area routing, access links, the domain name system, and the servers themselves-and a failure in any of them can prove disastrous to the proper functioning of the service. This dissertation describes three complementary systems to increase Internet availability in the face of such failures. Each system builds upon the idea of an overlay network, a network created dynamically between a group of cooperating Internet hosts. The first two systems, Resilient Overlay Networks (RON) and Multi-homed Overlay Networks (MONET) determine whether the Internet path between two hosts is working on an end-to-end basis. Both systems exploit the considerable redundancy available in the underlying Internet to find failure-disjoint paths between nodes, and forward traffic along a working path. RON is able to avoid 50% of the Internet outages that interrupt communication between a small group of communicating nodes.MONET is more aggressive, combining an overlay network of Web proxies with explicitly engineered redundant links to the Internet to also mask client access link failures. Eighteen months of measurements from a six-site deployment of MONET show that it increases a client's ability to access working Web sites by nearly an order of magnitude. Where RON and MONET combat accidental failures, the Mayday system guards against denial- of-service attacks by surrounding a vulnerable Internet server with a ring of filtering routers. Mayday then uses a set of overlay nodes to act as mediators between the service and its clients, permitting only properly authenticated traffic to reach the server.by David Godbe Andersen.Ph.D

    A Session-Based Architecture for Internet Mobility

    No full text
    The proliferation of mobile computing devices and wireless networking products over the past decade has led to an increasingly nomadic computing lifestyle. A computer is no longer an immo-bile, gargantuan machine that remains in one place for the lifetime of its operation. Today's personal computing devices are portable, and Internet access is becoming ubiquitous. A well-traveled laptop user might use half a dozen different networks throughout the course of a day: a cable modem from home, wide-area wireless on the commute, wired Ethernet at the office, a Bluetooth network in the car, and a wireless, local-area network at the airport or the neighborhood coffee shop. Mobile hosts are prone to frequent, unexpected disconnections that vary greatly in duration. De-spite the prevalence of these multi-homed mobile devices, today's operating systems on both mo-bile hosts and fixed Internet servers lack fine-grained support for network applications on inter
    corecore