1 Network science (NS): hype or reality? Chuanxiong Guo Microsoft Research Asia September 24, 2009.

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

Nick Feamster Research: Network security and operations Teaching CS 7260 in Spring 2007 CS 7001 Mini-projects: –
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
May 2 nd, 2001, page n° 1 The Invisible Network. May 2 nd, 2001, page n° 2 List of contents Introduction The invisible network: an example Some trends.
IP Traceback in Cloud Computing Through Deterministic Flow Marking Mouiad Abid Hani Presentation figures are from references given on slide 21. By Presented.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
EInfrastructures (Internet and Grids) US Resource Centers Perspective: implementation and execution challenges Alan Blatecky Executive Director SDSC.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Network of Excellence in Internet Science 3 rd EINS Summer School Volos, July 2014 Anna Satsiou (CERTH) FP7-ICT EINS Network of Excellence.
Introduction to Security Computer Networks Computer Networks Term B10.
ToNC workshop Next generation architecture H. Balakrishnan, A. Goel, D. Johnson, S. Muthukrishnan, S.Tekinay, T. Wolf DAY 2, Feb
CPSC 695 Future of GIS Marina L. Gavrilova. The future of GIS.
Is 'Designing' Cyberinfrastructure - or, Even, Defining It - Possible? Peter A. Freeman National Science Foundation January 29, 2007 The views expressed.
IPv6 and Overlays EE122 Introduction to Communication Networks Discussion Section.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
Art and Science of Social Computing London, October 4, 2010 Natasa Milic-Frayling Microsoft Research Vodafone Lecture Series Royal Academy of Engineering.
(Geneva, Switzerland, September 2014)
Introduction to Grid Computing Ann Chervenak Carl Kesselman And the members of the Globus Team.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Barracuda Load Balancer Server Availability and Scalability.
SMUCSE 8344 Term Paper Topics (Always Incomplete).
Charles Tappert Seidenberg School of CSIS, Pace University
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
COLUMBIA UNIVERSITY Department of Electrical Engineering The Fu Foundation School of Engineering and Applied Science IN THE CITY OF NEW YORK Networking.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
NSF Critical Infrastructures Workshop Nov , 2006 Kannan Ramchandran University of California at Berkeley Current research interests related to workshop.
Exploring the Network.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
OpenQuake Infomall ACES Meeting Maui May Geoffrey Fox
Component 6 - Health Management Information Systems Unit 2-2 -Hardware and Software Supporting Health Information Systems.
Grid-based Sensor Network Service on Future Internet By Mohammad Mehedi Hassan Student ID:
CIS 442- Chapter 3 Worms. Biological and computer worms Definition, main characteristics Differences from Viruses Bandwidth consumption and speed of propagation.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
AKARI New Generation Network Architecture SeungHo Lee.
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
Grid-based Future Internet with Wireless sensor network By Mohammad Mehedi Hassan Student ID:
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
What is Network and Security Research? Network and Security Research, or Information Communication Technology (ICT) Research involves: the collection,
Fighting the DDoS Menace!
Cyber Security, Internet, and Wireless Networks Shigang Chen, Associate Professor Dept of Computer & Information Science & Engineering University of Florida.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Collaboratory Life: Support for Science over the Internet Thomas A. Finholt & Joseph B. Hardin School of Information.
Cyberinfrastructure What is it? Russ Hobby Internet2 Joint Techs, 18 July 2007.
Institute for Security Technology Studies Dartmouth College Digital Living 2010: Sensors, Privacy, and Trust David Kotz September 2005.
ESFRI & e-Infrastructure Collaborations, EGEE’09 Krzysztof Wrona September 21 st, 2009 European XFEL.
Breakout # 1 – Data Collecting and Making It Available Data definition “ Any information that [environmental] researchers need to accomplish their tasks”
SALSASALSASALSASALSA Cloud Panel Session CloudCom 2009 Beijing Jiaotong University Beijing December Geoffrey Fox
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
Marv Adams Chief Information Officer November 29, 2001.
Computational Tools for Population Biology Tanya Berger-Wolf, Computer Science, UIC; Daniel Rubenstein, Ecology and Evolutionary Biology, Princeton; Jared.
PRESENTED BY DIOMEDE MISIGARO RICHARD THE SIXTH LINK.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
The Internet Book. 3 The Internet Works Well The Internet is a marvel of technical accomplishment. TCP/IP: – Accommodates growth and change not imagined.
Summer Intern Showcase Hello, I am Utkarsh Goel Division: PDG Department: Foundry Web Experience Title: Research Engineer Hiring Manager: Moritz.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Inspired by Biology From Molecules to Materials to Machines An NSF-supported assessment of the emerging scientific opportunities at the interface between.
Session 1: Technology Development August 15 NSF Workshop.
Cloud Computing: Concepts, Technologies and Business Implications B. Ramamurthy & K. Madurai &
Chuanxiong Guo, et al, Microsoft Research Asia, SIGCOMM 2008
CNT 4704 Analysis of Computer Communication Networks
Smart Learning concepts to enhance SMART Universities in Africa
Emerging Information Technologies I
Presentation transcript:

1 Network science (NS): hype or reality? Chuanxiong Guo Microsoft Research Asia September 24, 2009

2 Definition Science (Wikipedia) – Any systematic knowledge-base or prescriptive practice that is capable of resulting in a prediction or predictable type of outcome Network Science (the “Network Science” book) – The study of network representations of physical, biological, and social phenomena leading to predictive models of these phenomena

3 Predictability Internet collapse in 1980s – TCP congestion control Network expansion – 32-bit IPv4 address and 16-bit AS number – Will IPv6 takeover? Network security – DDos, virus, worm, and spam Network traffic and topology – Self similarity, power law Network applications – Web

4 Networking research: An engineering perspective Classical networking topics – Network architecture/protocol/applications – Multiple access – Packet scheduling/switching/routing – congestion control, traffic engineering/measurement, resource management New technology trends, user requirement, economics of scale – P2p, sensor networks, network security, data center networking, social networking

5 The emerging of network science Inter-disciplinary – Physicist, mathematician, sociologist, information theorist, computer scientist, economist (?) Data-driven discovery

6 Data–driven discovery Spam and botnet detection – Spamming Botnets [Xie08-sigcomm] – Spamalytics [Kanich08-ccs] Network diagnostics, profiling – [Ionut08-sigcomm, Kandula08-sigcomm] Online social networking – [Mislove07-IMC, Nazir08-IMC]

7 Data-driven discovery: system infrastructure Build large scale computing infrastructure for researchers from different disciplines – Scalable data center systems and networks (NSF CLuE program) – Dryad, Hadoop – DryadLinQ, MapReduce Data, data, data! – Accumulation and open access

8 What role can the wireless network and mobile computing community play? Mobile data services – Recent advances in smart-phones – Access bandwidth Mobility patterns – [Gonzalez08-nature, Lee09-infocom] – [Wang09-ScienceExpress] Mobile communication networks – [Palla07-nature, Seshadri08-kdd]

9 Wang-Sciencexpress09Understanding the Spreading Patterns of Mobile Phone Viruses

10 Summary Networking research currently is mainly an engineering field – With research problems generated directly from real world – “We believe in rough consensus and running code“– David Clark Bridging engineering and network science – Data-driven discovery – New models and insights from the broader science community – More predictable designs

11 Network Science Network Engineering tools Data (and problem) Infrastructure