Research direction Bob Briscoe Chief Researcher, BT Group Nov 2006.

Slides:



Advertisements
Similar presentations
SDN Controller Challenges
Advertisements

MMT (Multi Meshed Tree) Protocols for Cognitive Airborne Networks Nirmala Shenoy Lab for Wireless Networking and Security Rochester Institute of Technology.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Some Open Problems in Publish/Subscribe Networking David S. Rosenblum Chief Technology Officer PreCache Inc.
Peer-to-Peer is Not Always Decentralized …when Centralization is Good Nelson Minar
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Lecture 6 Overlay Networks CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
Why are all architectural problems from 2000 still unsolved? How would we know we had solved socio-economic problems anyway? Bob Briscoe Chief Researcher,
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
15-441: Computer Networking Lecture 26: Networking Future.
Criticisms of I3 Jack Lange. General Issues ► Design ► Performance ► Practicality.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
ToNC workshop Next generation architecture H. Balakrishnan, A. Goel, D. Johnson, S. Muthukrishnan, S.Tekinay, T. Wolf DAY 2, Feb
Staying focused on the big unsolved problems e.g. resource accountability Bob Briscoe Chief Researcher, BT Group Sep 2008.
Internet Research Needs a Critical Perspective Towards Models –Sally Floyd –IMA Workshop, January 2004.
IPv6 and Overlays EE122 Introduction to Communication Networks Discussion Section.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
Wireless TCP Performance Issues Carey Williamson Department of Computer Science University of Calgary.
SING* and ToNC * Scientific Foundations for Internet’s Next Generation Sirin Tekinay Program Director Theoretical Foundations Communication Research National.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Centralized vs. Decentralized Design for Internet Applications Adriana Iamnitchi Department of Computer Science The University of Chicago I.
The Future of Internet Research Scott Shenker (on behalf of many networking collaborators)
Theories and Frameworks for Ubiquitous Computing Alan Dearle School of Computer Science University of St Andrews.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
A Scalable, Commodity Data Center Network Architecture.
Controlling Internet Quality with Price Market Managed Multi-service Internet Bob Briscoe BTexact Research, Edge Lab, University College London & M3I Technical.
CS 268: Project Suggestions Scott Shenker and Ion Stoica (Fall, 2010) 1.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Item 2005 L A Rønningen. Reservation Model Pessimistic or Optimistic Approach 1-N Senders and 1-M Receivers Sender-oriented or Receiver-oriented Immediate.
NAB 2012 Cloud Computing Conference New Levels of Media Performance Data Enabled by Cloud Computing -- and Impact on Other Sectors Scott Brown, GM US and.
“Design for Tussle” - beyond technology issues Bob Briscoe Chief Researcher, BT Group Networks Research Centre Mar 2006.
1 High-Level Carrier Requirements for Cross Layer Optimization Dave McDysan Verizon.
1 AutoconfBOF2.PPT / Aug / Singh,Perkins,Clausen IETF Not Confidential Ad hoc network autoconfiguration: definition and problem statement (draft-singh-autoconf-adp-00.txt)
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
Tussle in cyberspace: Defining tomorrow’s internet D.Clark, J.Wroclawski, K.Sollins, R.Braden Presenter: Baoning Wu.
1 Evolving a Manageable Internet Tom Anderson University of Washington.
Computer-Based Communications Systems and Networks IS250 Spring 2010 John Chuang
Internet Architecture Board; Report Back IAB Stack Evolution Programme: interaction with NFV Doc: TBA Source: Bob Briscoe, BT Agenda item: Liaisons For:
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
1. Process Gather Input – Today Form Coherent Consensus – Next two months.
Controlling Internet Quality with Price Market Managed Multiservice Internet Bob Briscoe BT Research, Edge Lab, University College London & M3I Technical.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
DoS-resistant Internet Grand Strategy Bob Briscoe Jan 2006.
Social & Economic Control of Networks Bob Briscoe Chief Researcher BT Networks Research Centre Jul 2007.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
KSE631: Content Networking Uichin Lee Feb. 07, 2011.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Advanced Networks: The Past and the Future – The Internet2 Perspective APAN 7 July 2004, Cairns, Australia Douglas Van Houweling, President & CEO Internet2.
Networking Grand Challenges NSF Future Directions Workshop April 2003.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Improving TCP Performance over Wireless Networks
Developing a Next-Generation Internet Architecture Robert Braden, David Clark,Scott Shenker, and John Wrokclawski Presented By Ding Lizhao.
How wireless networks scale: the illusion of spectrum scarcity David P. Reed [ Presented at International Symposium on Advanced.
Information-Centric Networks02c-1 Week 2 / Paper 3 Future Internet architecture: clean-slate versus evolutionary research –Jennifer Rexford, Constantine.
Information-Centric Networks Section # 2.3: Internet Evolution Instructor: George Xylomenos Department: Informatics.
Motivating Scenario 1: Networking 1M interacting people for 1,000 hours using at least 1 Gb/s for each user “Tele*, collaborative spaces, and reality TV.
Cooperative Response Strategies for Large Scale Attack Mitigation D. Nojiri, J. Rowe, K. Levitt Univ of California Davis DARPA Info Survivability Conference.
1 Data Overhead Impact of Multipath Routing for Multicast in Wireless Mesh Networks Yi Zheng, Uyen Trang Nguyen and Hoang Lan Nguyen Department of Computer.
TRUST Self-Organizing Systems Emin G ü n Sirer, Cornell University.
Our Place in the Cloud DCIA P2P & Cloud Market Conference March 9, 2010.
CSE 5810 Biomedical Informatics and Cloud Computing Zhitong Fei Computer Science & Engineering Department The University of Connecticut CSE5810: Introduction.
Advanced Computer Networks
Viewing Data-Driven Success Through a Capability Lens
Presented by Muhammad Abu Saqer
Social Studies Themes.
NSF CSR PI Meeting Breakout Session: Integrated Networked Systems and Internet of Things Saurabh Bagchi Purdue University.
Robot Intelligence Kevin Warwick.
EEL 6935 Wireless Ad Hoc Networks
Agenda Need of Cloud Computing What is Cloud Computing
Presentation transcript:

research direction Bob Briscoe Chief Researcher, BT Group Nov 2006

research style? getting your research taken seriously must focus on big problems that still haven’t been fixed question everything find the enduring problem beneath the fashionable problems a useful discipline: use experienced people’s research agendas –DARPA NewArch requirements for new Internet architecture –a Clean-Slate Design for the Next-Generation Secure Internet –Future Directions in Network Architecture (FDNA) workshop papers we’re not interested unless you get back to first principles we want science, not a loaded business case that wouldn’t pass due diligence even if you start from intuition, back it up with principles must be multidisciplinary society & the economy: shaping the Internet and shaped by the Internet work with someone from economics, or public policy if it’s easy, it’s probably not worthwhile research not facing the big problems need huge culture change need research towards consensus sideline the market in papers

top research themes? global scale asynchronous event messaging short co-ordination /control messages (discovery, notification, synch, config) control/co-ordination for lower layers (config, routing, failures) as well as apps connecting the physical world to the information world – the Internet of things overlay multicast not panacea for state scaling & many other problems [1] resilience & availability DoS resistance making reliable systems out of unreliable parts (multilayer) detecting, locating and fixing incipient errors & failures higher layers coping with dynamic mobility & re-routing policy-driven auto-configuration resource allocation / congestion control / fairness longest lasting architectural vacuum – becoming acute –solution obscured by a dogma [2] hi b/w-delay: no point provisioning capacity if ‘slow-start’ limits load [1] Briscoe “The Implications of Pervasive Computing on Network Design” (2006) [2] Briscoe “Flow rate fairness: Dismantling a religion” (Oct 2006)

networks research – enduring tensions design for tussle between outcomes in this space not just self-supply (p2p, ad hoc) –but co-existence of ad hoc and managed services not just endpoint control –but co-existence of end control and edge (middlebox) control not just individual security / privacy –but co-existence of individual freedom and social/corporate control balance between approaches determined by natural selection imposing your political values through your design just means your design will get distorted (if it’s ever deployed) fine in theory, but where’s the practice? [3] viability responsibility freedom scalability commercial simple secure evolvable [3] Briscoe “Designing for tussle; case studies in control over control ” (2004)

find practical homomorphic cryptosystems ‘computing in cipherspace’ existing solutions –searching in encrypted data –voting –second price auction –trace anonymisation one more research theme building blocks for resolving tussles? tailored decryption input ciphered input output tailored encryption constrained to single operation ciphered result desired operation

in summary eat your vegetables then you can have your dessert have as much spice as you want on your vegetables classic distributed computing problems to solve avoid sexy research fashions active networks, multihop wireless, p2p overlays unless treated as exemplars of the classic problems instead sex up the classic problems with some tussle