Networking Research1 Thoughts on Networking Research Bob Kinicki PEDS Presentation October 6, 2003
Networking Research2 Major Internet Issues Growth Applications and Quality of Service Open versus Security {in conflict!!} Wireless Mobile Future Architectures
Networking Research3 Growth What will cause Internet growth? How will wired and wireless integrate? How much congestion will this produce within the Internet? Where will the bottleneck be? Can we predict the growth? Requires measurement!
Networking Research Host B Host C Host L Host D Host E Host G Host A Host H Host F Host K Host M W TX Y Z nodes AP W1 W2 W3 W4 Video Web Server Peer –to-Peer
Networking Research5 Congestion Control Research Modifying TCP Making non-TCP traffic TCP-Friendly New congestion control algorithms at the router –ECN (Explicit Congestion Notification) –Jae Chung: new congestion control algorithm –Min Kim: TCP source hint for fairness to Web traffic –XCP, PI, AVQ,SFC, REM, …
Networking Research6 Congestion Control Research Will over-provisioning remain viable? Will pricing force class-based traffic routing?
Networking Research7 Quality of Service Balance needs of different applications –Abhishek Kumar: delay versus throughput balancing Aggregating flows at the ingress router
Networking Research8 Applications Streaming Media –Using FEC (Forward Error Correction) Huahui: Using FEC with temporal and quality scaling –TFRC (TCP Friendly Rate Control) Mingzhe’s current project –Using Partial Retransmissions Yubing’: retransmissions related to RTTs –Measurement Available Video - Mingzhe paper Media Server - Jim Nichol’s masters
Networking Research Host B Host C Host L Host D Host E Host G Host A Host H Host F Host K Host M W TX Y Z nodes AP W1 W2 W3 W4 Video Web Server Peer –to-Peer
Networking Research10 Applications Web Traffic –Many possibilities here, e.g. Prof. Wills, Mikhail, and Hao –What is the future of flash crowds? Peer to Peer Traffic –Impact ? –New research area for PEDS Overlays to handle multicast –Overlays to combat denial of service attacks
Networking Research11 Open Networks and Security Networks in Conflict Acceptable security depends on context and circumstances Where should the security be positioned? –Ingress versus egress? –Outside the perimeter Not at the firewall! –Upstream within core routers Wireless changes everything
Networking Research12 Security Problems DOS and DDOS (Distributed Denial of Service. Wormholes Flash crowds versus DDOS Intrusion Detection schemes
Networking Research Host B Host C Host L Host D Host E Host G Host A Host H Host F Host K Host M W TX Y Z nodes AP W1 W2 W3 W4 Video Web Server Peer –to-Peer
Networking Research14 Wireless Hot Area!!! Handling packet loss due to errors in communication –“Fu Fighter” research Hidden terminal problems Streaming over Wireless
Networking Research15 Mobile When wireless nodes move around they become routers Need new MANETs with special algorithms that included router communicaitons –No students currently working here!! –Military need secure MANET technology this will happen
Networking Research16 Future Architectures Mobile Wireless addressing issues IPv6 –Other countries moving ahead here Internet2 –WPI is part of Internet2 –Unheard of capacity
Networking Research17 Final Remarks Plenty of research opportunity for new PEDS students Master Students need to begin to focus in fall so that you can pick a topic by the end of the first year At least six choices from PEDS faculty for research advisor