Signposts is a framework that aims to simplify device connectivity by automating and managing various technical solutions to bypass issues caused by middleboxes on the internet. It assigns each user's devices their own domain names through a personal Signpost server, allowing devices to find and connect to each other more easily. The Signpost server notifies devices of their locations and enables connections by performing DNS lookups and routing traffic. This abstracts away the complexities of the internet edge and gives users control over their digital footprint through a personal cloud.
Saiful hidayar santri indigo telkom republika pondok pesantren keresek garut ...Saiful Hidayat
Presentasi pada acara Santri Indigo di Pondok Pesantren Keresk Garut Jawa Barat pada tanggal 19 Mei 2010 yang diselenggarakan oleh TELKOM dan Republika dengan Topic Syiar Islam melalui pemanfaatan IT
An article that I co-wrote in 2004 and published in the 'Alcatel Telecom Review', examining the quickly growing opportunity for mobile gaming.
This paper looks at the evolving customer demands and gaming market, the value chains and associated business models. It also highlights the underlying requirements for monetizing the emerging opportunity.
Polyvision Eno is the first multi-surface solution to integrate traditional dry-erase surfaces with Polyvision interactive whiteboard all without wires or cables. Ideal for new construction or school classroom with effective communication.
Saiful hidayar santri indigo telkom republika pondok pesantren keresek garut ...Saiful Hidayat
Presentasi pada acara Santri Indigo di Pondok Pesantren Keresk Garut Jawa Barat pada tanggal 19 Mei 2010 yang diselenggarakan oleh TELKOM dan Republika dengan Topic Syiar Islam melalui pemanfaatan IT
An article that I co-wrote in 2004 and published in the 'Alcatel Telecom Review', examining the quickly growing opportunity for mobile gaming.
This paper looks at the evolving customer demands and gaming market, the value chains and associated business models. It also highlights the underlying requirements for monetizing the emerging opportunity.
Polyvision Eno is the first multi-surface solution to integrate traditional dry-erase surfaces with Polyvision interactive whiteboard all without wires or cables. Ideal for new construction or school classroom with effective communication.
With World IPv6 Launch happening June 6, 2012, production IPv6 network connectivity will be available to many more businesses and individuals. Major web sites and content providers will all enable IPv6 access to their content. Consumer electronics manufacturers are committing to providing IPv6-enabled devices.
What does this mean for SIP-based real-time communications? How well does SIP work with IPv6 today? What are the challenges to deployment and what steps can be taken to overcome those challenges? What should operators and vendors consider with regard to SIP and IPv6? What software, devices and tools are available to assist? And what case studies and other information is available?
In this session at SIPNOC 2012 on June 26, 2012, in Herndon, Virginia, Dan York discussed all of these points and provided concrete suggestions for moving forward with SIP and IPv6.
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
With the advent of IOT, Every 'Thing' is getting Smart, starting from the range of smartwatches, smart refrigerators, smart bulbs to smart car, smart healthcare, smart agriculture, smart retail, smart city and what not, even smart planet. But why is every thing getting smart? People are trying to bridge the gap between Digital World & Physical World by means of ubiquitous connectivity to Internet, and when digital things become physical, digital threats also become physical threats. Security & Privacy issues are rising as never before. What if the microphone in your smart TV can be used to eavesdrop the private communications in your bed room? What if a smart driverless car deliberately crashes itself into an accident? What if you want to be Anonymous over Internet and don't want anybody to track you?
This talk will focus on answering the above questions with a view on 'What are we currently doing to protect ourselves' and 'What we need to do'. What are the new security challenges that are coming up and how privacy & anonymity is taking the lead over security. The talk will also sensitive the audience about the paradigm shift that is happening in IOT DevOps, with help of Docker Containers and how they can be anonymised using TOR.
Flexible Paxos: Reaching agreement without majorities Heidi Howard
The Paxos algorithm is a widely adopted approach to achieving distributed consensus. Over decades it has been extensively researched, optimized and deployed in popular systems such as Raft, Zookeeper and Chubby. At its foundation, Paxos uses two phases, each requiring agreement from a majority of participants (known as quorums) to reliably reach consensus. In this talk, I will share the simple yet powerful result that each of the phases of Paxos may use non-intersecting quorums. This means that majorities are no longer necessary and that Paxos is a single point on a broad spectrum of possibilities for safely reaching consensus. This result therefore opens the door for a new breed of scalable and resilient consensus algorithms for performant production system.
Distributed Consensus: Making Impossible Possible [Revised]Heidi Howard
In this talk, we explore how to construct resilient distributed systems on top of unreliable components. Starting, almost two decades ago, with Leslie Lamport’s work on organising parliament for a Greek island. We will take a journey to today’s datacenters and the systems powering companies like Google, Amazon and Microsoft. Along the way, we will face interesting impossibility results, machines acting maliciously and the complexity of today’s networks. Ultimately, we will discover how to reach agreement between many parties and from this, how to construct new fault-tolerance systems that we can depend upon everyday.
With World IPv6 Launch happening June 6, 2012, production IPv6 network connectivity will be available to many more businesses and individuals. Major web sites and content providers will all enable IPv6 access to their content. Consumer electronics manufacturers are committing to providing IPv6-enabled devices.
What does this mean for SIP-based real-time communications? How well does SIP work with IPv6 today? What are the challenges to deployment and what steps can be taken to overcome those challenges? What should operators and vendors consider with regard to SIP and IPv6? What software, devices and tools are available to assist? And what case studies and other information is available?
In this session at SIPNOC 2012 on June 26, 2012, in Herndon, Virginia, Dan York discussed all of these points and provided concrete suggestions for moving forward with SIP and IPv6.
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
With the advent of IOT, Every 'Thing' is getting Smart, starting from the range of smartwatches, smart refrigerators, smart bulbs to smart car, smart healthcare, smart agriculture, smart retail, smart city and what not, even smart planet. But why is every thing getting smart? People are trying to bridge the gap between Digital World & Physical World by means of ubiquitous connectivity to Internet, and when digital things become physical, digital threats also become physical threats. Security & Privacy issues are rising as never before. What if the microphone in your smart TV can be used to eavesdrop the private communications in your bed room? What if a smart driverless car deliberately crashes itself into an accident? What if you want to be Anonymous over Internet and don't want anybody to track you?
This talk will focus on answering the above questions with a view on 'What are we currently doing to protect ourselves' and 'What we need to do'. What are the new security challenges that are coming up and how privacy & anonymity is taking the lead over security. The talk will also sensitive the audience about the paradigm shift that is happening in IOT DevOps, with help of Docker Containers and how they can be anonymised using TOR.
Flexible Paxos: Reaching agreement without majorities Heidi Howard
The Paxos algorithm is a widely adopted approach to achieving distributed consensus. Over decades it has been extensively researched, optimized and deployed in popular systems such as Raft, Zookeeper and Chubby. At its foundation, Paxos uses two phases, each requiring agreement from a majority of participants (known as quorums) to reliably reach consensus. In this talk, I will share the simple yet powerful result that each of the phases of Paxos may use non-intersecting quorums. This means that majorities are no longer necessary and that Paxos is a single point on a broad spectrum of possibilities for safely reaching consensus. This result therefore opens the door for a new breed of scalable and resilient consensus algorithms for performant production system.
Distributed Consensus: Making Impossible Possible [Revised]Heidi Howard
In this talk, we explore how to construct resilient distributed systems on top of unreliable components. Starting, almost two decades ago, with Leslie Lamport’s work on organising parliament for a Greek island. We will take a journey to today’s datacenters and the systems powering companies like Google, Amazon and Microsoft. Along the way, we will face interesting impossibility results, machines acting maliciously and the complexity of today’s networks. Ultimately, we will discover how to reach agreement between many parties and from this, how to construct new fault-tolerance systems that we can depend upon everyday.
Distributed Consensus: Making Impossible PossibleHeidi Howard
In this talk, we explore how to construct resilient distributed systems on top of unreliable components. Starting, almost two decades ago, with Leslie Lamport’s work on organising parliament for a Greek island. We will take a journey to today’s datacenters and the systems powering companies like Google, Amazon and Microsoft. Along the way, we will face interesting impossibility results, machines acting maliciously and the complexity of today’s networks. Ultimately, we will discover how to reach agreement between many parties and from this, how to construct new fault-tolerance systems that we can depend upon everyday.
Reaching reliable agreement in an unreliable worldHeidi Howard
In this lecture, we explore how to construct resilient distributed systems on top of unreliable components. Starting, almost two decades ago, with Leslie Lamport’s work on organising parliament for a Greek island. We will take a journey to today’s datacenter and the systems powering companies like Google, Amazon and Microsoft. Along the way, we will face interesting impossibility results, machines acting maliciously and the complexity to today’s networks. We will discover how to reach agreement between many parties and from this, how we construct the fault-tolerance systems that we depend upon everyday.
This lecture was given on October 13th 2015 at the University of Cambridge, as part of the Research Students Lecture Series.
Providing Security for Wireless Community Networks (PAWS)Heidi Howard
Slide deck from talk on Providing Security for Wireless Community Networks, focusing on Public Access Wifi Server (PAWS) at Workshop on Participatory Networks and Privacy: New Research Issues
The slides persented by one of junior members of the PAWS team at the University of Cambridge, Computer Labs. For more information on the project, visit publicaccesswifi.org
4. my iPhone
The Problem
Device-device connectivity is
pretty broken right now due to
middleboxes at the edges of
the internet
my machine here at
the lab
5. Existing Solutions
Technical Centralised & 3rd Party
- Dynamic DNS - Skype & Google talk
- Port Forwarding - Dropbox, Google Drive,
- uPnP Ubuntu One
- STUN - iCloud
- VPN - Remote Desktop
- Iodine Software e.g. LogMeIn
- NAT Punching - Email
- Rendezvous - Facebook, Twitter
- HTTP/SMTP proxy
Although you can fix this with a range of tools, it's very fiddly and
complex to do so or the solutions are platform specific
6. ... and the Signpost Solution
Signposts turn these technical
solutions into tactics, it
automates and manages the
range of tactics to bring back
this end-to-end dream
It's a framework to manage the
maze of tactics so it's highly
extensible
Signposts point devices in
the right direction to find
each other
7. Signposts' View of the World
desktop.heidi.signpost.io
Heidi's Signpost Server workmachine.heidi.signpost.io
dark edge of dark edge of
internet internet
Internet
dark edge of
internet
Now my devices all have
their own domain names
which they can use to refer
to each other
iphone.heidi.signpost.io
8. Signposts' View of the World
Heidi's Signpost
Server workmachine.heidi.signpost.io
desktop.heidi.signpost.io Anil's Signpost
Server
tablet.anil.signpost.io
dark edge dark edge
of internet of internet
Internet
mac.anil.signpost.io
dark edge
dark edge
of internet
of internet
iphone.heidi.signpost.io desktop.anil.signpost.io
laptop.heidi.signpost.io
iphone.anil.signpost.io
9. Abstract away the internet edge
laptop
laptop
jon.signpost.io
iphone
heidi.signpost.io
iphone
desktop
anil.signpost.io
mac
Empower individuals to create their
“own personal cloud” and regain
desktop
control of their digital footprint iphone
10. Your Personal Signpost Server
● Each virtual personal cloud has a Signpost server,
this has a public IP address
● It maintains up-to date information on the
whereabouts of all the devices in the user's personal
cloud
● It has a set of policies which control sharing with other
Signposts' users
● There is a persistent connection between the
Signpost server and all devices in the user's cloud
● Whenever a device in the user's cloud moves location
or network, the Signpost server is notified
11. Making connections
Heidi's Signpost Server
desktop.heidi.signpost.io
workmachine.heidi.signpost.io
● The device that wants to initiate the connection
performs an "effectful" DNS lookup of the domain name
of the other device
● This DNS lookup is destined for the Signpost server of
the other device's owner
● When the Signpost server receives this query, it creates
a path between the devices and returns an IP address
● The two devices are now happily connected
12. Goal Of Tactics
To create a satisfactory connection between two end nodes
that meets the user's requirements.
Possible requirements include:
● Authentication
● Encryption
● Bi-directionality
● Anonymity
● Bypassing firewalls
Signposts can also allow for constraints, such as battery
life, and price of network connections
13. Example - Syncing Directories
My work machine
My home machine
Box
NAT
Firewall
16. The Project Home
Signposts is part of the OCaml Labs Project
www.cl.cam.ac.uk/projects/ocamllabs/
Signposts is Open Source & hosted on GitHub
www.github.com/crotsos/signpostd
Some of the Signposts' team that I would like to thank and probably embarrass