Networking Research1 Thoughts on Networking Research Bob Kinicki PEDS Presentation October 6, 2003.

Slides:



Advertisements
Similar presentations
The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
Advertisements

Mobile IPv6. Why study Mobility in IPv6? What is so different about Mobile IPv6 ?
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
On Impact of Non-Conformant Flows on a Network of Drop-Tail Gateways Kartikeya Chandrayana Shivkumar Kalyanaraman ECSE Dept., R.P.I. (
Resilient Peer-to-Peer Streaming Paper by: Venkata N. Padmanabhan Helen J. Wang Philip A. Chou Discussion Leader: Manfred Georg Presented by: Christoph.
XCP: Congestion Control for High Bandwidth-Delay Product Network Dina Katabi, Mark Handley and Charlie Rohrs Presented by Ao-Jan Su.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Summary and Further Reading Part I of 13th.
CS 268: Project Ideas Kevin Lai Feb 6, Announcements  Summary submission method -cp laik.jac88.html ~cs268/reviews -chmod.
Application, Network and Link Layer Measurements of Streaming Video over a Wireless Campus Network Passive & Active Measurement Workshop 05 Boston, MA,
Streaming Video over the Internet: Approaches and Directions Dapeng Wu, Yiwei Thomas Hou et al. Presented by: Abhishek Gupta
The Power of Explicit Congestion Notification Aleksandar Kuzmanovic Northwestern University
UNCW UNCW SIGGRAPH 2002 Topic #3: Continuous Media in Wired and Wireless Environments Ronald J. Vetter Department of Computer Science University of North.
Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions Wireless Multimedia Networking and Performance Modeling.
CPSC 4411 Wireless TCP Performance Issues CPSC 441.
15-441: Computer Networking Lecture 26: Networking Future.
”Distributed Corks” A Research Byte Bob Kinicki. Research Byte October 22, Peer-to-Peer Web Server Host B Host.
School of Information Technologies Revision NETS3303/3603 Week 13.
EECS 122 Communications Networks Department of Electrical Engineering and Computer Sciences University of California Berkeley Slides: K. Fall, K. Lai,
1 Controlling High Bandwidth Aggregates in the Network.
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
CS525z Multimedia Networking Review. Analog to Digital What is the relationship between –Fidelity and Sample Size –Fidelity and Sample Rate.
Overlay Network and Data Transmission Over Wireless For EE290T Minghua Chen Berkeley.
Internet Research Needs a Critical Perspective Towards Models –Sally Floyd –IMA Workshop, January 2004.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
Proxy-based TCP over mobile nets1 Proxy-based TCP-friendly streaming over mobile networks Frank Hartung Uwe Horn Markus Kampmann Presented by Rob Elkind.
Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions Wireless Multimedia Networking and Performance Modeling.
Streaming Video over a Wireless Network So what is the problem!! WPI CS Research Rugby Bob Kinicki November 30, 2004.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Internet Traffic Management Prafull Suryawanshi Roll No - 04IT6008.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
CS 268: Project Suggestions Scott Shenker and Ion Stoica (Fall, 2010) 1.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
Item 2005 L A Rønningen. Reservation Model Pessimistic or Optimistic Approach 1-N Senders and 1-M Receivers Sender-oriented or Receiver-oriented Immediate.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
TFRC: TCP Friendly Rate Control using TCP Equation Based Congestion Model CS 218 W 2003 Oct 29, 2003.
U Innsbruck Informatik - 1 CADPC/PTP in a nutshell Michael Welzl
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005.
報告人:林祐沁 學生 指導教授:童曉儒 老師 March 2, Wireless Video Surveillance Server Based on CDMA1x and H.264.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Multimedia & Mobile Communications Lab.
Open-Eye Georgios Androulidakis National Technical University of Athens.
1 1 July 28, Goal of this session is too have a discussion where we learn about the relevant data to help us understand the problem and design.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Whats hot in networking? S. Keshav. Internet architecture Access Enterprise/campus/local ISP Wide area/backbone ISP.
Indian Institute of Technology Bombay 1 Abhay Karandikar Associate Professor Department of Electrical Engineering
Wireless Mesh Networks Myungchul Kim
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
DigiComm II-1 TAPAS EB/IAB Meeting Newcastle, 5/9/02 Real inter-domain paths are unlikely to offer explicit SLA although limited local SLAs are avail.
Network Processing Systems Design
CNT 4704 Computer Communication Networking (not “analysis”)
Wireless TCP Performance Issues
CS 268: Computer Networking
Congestion Control, Internet transport protocols: udp
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
11/23/2018 Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions Jon Gretarsson, Feng Li, Mingzhe Li, Ashish.
Wireless and TCP: Performance Issues
Congestion Control for Streaming Media
Wireless and TCP: Performance Issues
Presentation transcript:

Networking Research1 Thoughts on Networking Research Bob Kinicki PEDS Presentation October 6, 2003

Networking Research2 Major Internet Issues Growth Applications and Quality of Service Open versus Security {in conflict!!} Wireless Mobile Future Architectures

Networking Research3 Growth What will cause Internet growth? How will wired and wireless integrate? How much congestion will this produce within the Internet? Where will the bottleneck be? Can we predict the growth? Requires measurement!

Networking Research Host B Host C Host L Host D Host E Host G Host A Host H Host F Host K Host M W TX Y Z nodes AP W1 W2 W3 W4 Video Web Server Peer –to-Peer

Networking Research5 Congestion Control Research Modifying TCP Making non-TCP traffic TCP-Friendly New congestion control algorithms at the router –ECN (Explicit Congestion Notification) –Jae Chung: new congestion control algorithm –Min Kim: TCP source hint for fairness to Web traffic –XCP, PI, AVQ,SFC, REM, …

Networking Research6 Congestion Control Research Will over-provisioning remain viable? Will pricing force class-based traffic routing?

Networking Research7 Quality of Service Balance needs of different applications –Abhishek Kumar: delay versus throughput balancing Aggregating flows at the ingress router

Networking Research8 Applications Streaming Media –Using FEC (Forward Error Correction) Huahui: Using FEC with temporal and quality scaling –TFRC (TCP Friendly Rate Control) Mingzhe’s current project –Using Partial Retransmissions Yubing’: retransmissions related to RTTs –Measurement Available Video - Mingzhe paper Media Server - Jim Nichol’s masters

Networking Research Host B Host C Host L Host D Host E Host G Host A Host H Host F Host K Host M W TX Y Z nodes AP W1 W2 W3 W4 Video Web Server Peer –to-Peer

Networking Research10 Applications Web Traffic –Many possibilities here, e.g. Prof. Wills, Mikhail, and Hao –What is the future of flash crowds? Peer to Peer Traffic –Impact ? –New research area for PEDS Overlays to handle multicast –Overlays to combat denial of service attacks

Networking Research11 Open Networks and Security Networks in Conflict Acceptable security depends on context and circumstances Where should the security be positioned? –Ingress versus egress? –Outside the perimeter  Not at the firewall! –Upstream within core routers Wireless changes everything

Networking Research12 Security Problems DOS and DDOS (Distributed Denial of Service. Wormholes Flash crowds versus DDOS Intrusion Detection schemes

Networking Research Host B Host C Host L Host D Host E Host G Host A Host H Host F Host K Host M W TX Y Z nodes AP W1 W2 W3 W4 Video Web Server Peer –to-Peer

Networking Research14 Wireless Hot Area!!! Handling packet loss due to errors in communication –“Fu Fighter” research Hidden terminal problems Streaming over Wireless

Networking Research15 Mobile When wireless nodes move around they become routers Need new MANETs with special algorithms that included router communicaitons –No students currently working here!! –Military need secure MANET technology  this will happen

Networking Research16 Future Architectures Mobile Wireless addressing issues IPv6 –Other countries moving ahead here Internet2 –WPI is part of Internet2 –Unheard of capacity

Networking Research17 Final Remarks Plenty of research opportunity for new PEDS students Master Students need to begin to focus in fall so that you can pick a topic by the end of the first year At least six choices from PEDS faculty for research advisor