Introduction to Research on Networks Nelson Fonseca State University of Campinas.

Slides:



Advertisements
Similar presentations
Cross-layer Design in Wireless Mesh Networks Hu Wenjie Computer Network and Protocol Testing Laboratory, Dept. of Computer Science & Technology, Tsinghua.
Advertisements

Adaptive Resource Allocation: Self-Sizing for Next Generation Networks Michael Devetsikiotis Electrical & Computer Engineering North Carolina State University.
Traffic Control and the Problem of Congestion within the Internet By Liz Brown and Nadine Sur.
1 EL736 Communications Networks II: Design and Algorithms Class1: Introduction Yong Liu 09/05/2007.
Traffic and routing. Network Queueing Model Packets are buffered in egress queues waiting for serialization on line Link capacity is C bps Average packet.
Florin Dinu T. S. Eugene Ng Rice University Inferring a Network Congestion Map with Traffic Overhead 0 zero.
CROWN “Thales” project Optimal ContRol of self-Organized Wireless Networks WP1 Understanding and influencing uncoordinated interactions of autonomic wireless.
Architectures for Congestion-Sensitive Pricing of Network Services Thesis Defense by Murat Yuksel CS Department, RPI July 3 rd, 2002.
XCP: Congestion Control for High Bandwidth-Delay Product Network Dina Katabi, Mark Handley and Charlie Rohrs Presented by Ao-Jan Su.
TCP Stability and Resource Allocation: Part II. Issues with TCP Round-trip bias Instability under large bandwidth-delay product Transient performance.
On Modeling Feedback Congestion Control Mechanism of TCP using Fluid Flow Approximation and Queuing Theory  Hisamatu Hiroyuki Department of Infomatics.
An Implementation and Experimental Study of the eXplicit Control Protocol (XCP) Yongguang Zhang and Tom Henderson INFOCOMM 2005 Presenter - Bob Kinicki.
Introduction 1-1 Chapter 1 Introduction These additional slides are adapted from the slides of the textbook. Computer Networking: A Top Down Approach,5th.
Traffic Engineering With Traditional IP Routing Protocols
Introduction1-1 Chapter 1: Introduction Our goal:  get context, overview, “feel” of networking  more depth, detail later in course  approach: m descriptive.
TRANSPORT MODELLING Lecture 4 TRANSPORT MODELLING Lecture 4 26-Sep-08 Transport Modelling Microsimulation Software.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Chapter 1 Introduction to Simulation Modeling T. Altiok and B. Melamed.
Introduction1-1 Data Communication and Networks Lecture 2 Overview (Part 2) September 16, 2004 Joseph Conron Computer Science Department New York University.
Capacity Constrained Routing Algorithms for Evacuation Planning: A Summary of Results Speaker: Chen-Nien Tsai.
Introduction 1 Lecture 3 Networking Concepts slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering Department.
COMPUTER NETWORK: MODELING AND SIMULATION -Abhaykumar Kumbhar Computer Science Department.
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
Ch 1. Computer Networks and the Internet Myungchul Kim
Operations Research Models
Quantitative Methods of Management
2-1 Last time  Course mechanics  What is the Internet?  hosts, routers, communication links  communications services, protocols  Network Edge  client-server,
Ness Shroff Dept. of ECE and CSE The Ohio State University Grand Challenges in Methodologies for Complex Networks.
Design of an optimal AQM controller for the Diffserv architecture Leonardo Rangel / Nelson Fonseca Institute of Computing - IC Unicamp, Campinas, ,
1 Enabling Large Scale Network Simulation with 100 Million Nodes using Grid Infrastructure Hiroyuki Ohsaki Graduate School of Information Sci. & Tech.
A Fair and Dynamic Load Balancing Mechanism F. Larroca and J.L. Rougier International Workshop on Traffic Management and Traffic Engineering for the Future.
How do loss and delay occur?
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
World-wide-web o Tim Berners-Lee implements his childhood Enquire “2.0” o It took off because it could do hypertext on the internet! o 3 crucial components:
Introduction 1-1 “Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from.
Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor.
Introduction Chapter 1: roadmap 1.1 what is the Internet? 1.2 network edge  end systems, access networks, links 1.3 network core  packet switching, circuit.
Protocols and HTTP o Tim Berners-Lee implements his childhood Enquire “2.0” o It took off because it could do hypertext on the internet! o 3 crucial components:
Computer Networks Performance Metrics
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Network access and physical media 1.5 Internet structure.
CE3710 Tutorial FAROOQUI NK. What’s the Internet: “nuts and bolts” view  millions of connected computing devices: hosts = end systems  running network.
1 Modeling and Performance Evaluation of DRED (Dynamic Random Early Detection) using Fluid-Flow Approximation Hideyuki Yamamoto, Hiroyuki Ohsaki Graduate.
Four sources of packet delay
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005.
1 Network Emulation Mihai Ivanovici Dr. Razvan Beuran Dr. Neil Davies.
1 Optical Packet Switching Techniques Walter Picco MS Thesis Defense December 2001 Fabio Neri, Marco Ajmone Marsan Telecommunication Networks Group
1 On Scalable Edge-based Flow Control Mechanism for VPN Tunnels --- Part 2: Scalability and Implementation Issues Hiroyuki Ohsaki Graduate School of Information.
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
1: Introduction1 Introduction 3. 1: Introduction2 Delay in packet-switched networks packets experience delay on end-to-end path r four sources of delay.
Introduction 1-1 Chapter 1 Part 3 Delay, loss and throughput These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose,
DELAYS, LAYERED NETWORK MODEL AND NETWORK SECURITY.
Operations Research The OR Process. What is OR? It is a Process It assists Decision Makers It has a set of Tools It is applicable in many Situations.
Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Chapter 1: roadmap 1.1 what is the Internet? 1.2 network edge  end systems, access networks, links 1.3 network core  packet switching, circuit switching,
PRACTICAL INTRODUCTION TO INTERNET TECHNOLOGY. Practical one PACKET DELAY AND LOSS IN INTERNET In this experiment, you will observe real delays and loss.
PCP: Efficient Endpoint Congestion Control NSDI, 2006 Thomas Anderson, Andrew Collins, Arvind Krishnamurthy and John Zahorjan University of Washington.
QoS Routing and Scheduling in TDMA based Wireless Mesh Backhaul Networks Chi-Yao Hong, Ai-Chun Pang,and Jean-Lien C. Wu IEEE Wireless Communications and.
Internet research Needs Better Models Sally Floyd, Eddie Kohler ISCI Center for Internet Research, Berkeley, California Presented by Max Podlesny.
Network Behaviour & Impairments
SOME HIGHLIGHTS FROM CHAPTER ONE Introduction 1-1.
Indian Institute of Technology Bombay 1 Communication Networks Prof. D. Manjunath
Operations Research Models and Methods Advanced Operations Research Reference: Operations Research Models and Methods, Operations Research Models and Methods,
Computer Networks Performance Metrics Computer Networks Spring 2013.
September 2008What’s coming in Aimsun: New features and model developments 1 Hybrid Mesoscopic-Microscopic Traffic Simulation Framework Alex Torday, Jordi.
What’s the Internet: “nuts and bolts” view
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
Chapter 30 Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP, XCP and Fair Queueing
Resource Pooling A system exhibits complete resource pooling if it behaves as if there was a single pooled resource. I propose ‘extent of resource pooling’
Presentation transcript:

Introduction to Research on Networks Nelson Fonseca State University of Campinas

Communication Networks

Transport of bits generated by the applications under the requirement of supportin the Quality of Service demanded by the applications Quality of Services – quality of transport needed by the application/service so that users can have a perception of good quality

Communication Networks

Traffic Control To support the Quality of Service requirements of the applications the bits generated by them should flow though appropriate paths and the flows should have expected patterns Traffic control Congestion control Flow control Routing

Traffic Control

Traffic Control Mechanisms Policing Selective Discard Active queue management Scheduling Classification Admission control Routing

Performance Evaluation Aim to assess how efective objectives are achieved –Exemple: to evaluate the behavior of TCP variants developed to high speed networks Does the mechanism behaves in the same way conceived during its design? What are the operational limits of the proposed mechanism?

Performance Evaluation

The aims is the analysis of the system and not numerical statements The tool (theory) used depends on the nature of the problem under study, including the time scale of interest

Common Approaches Analytical Models Simulation Measurement Emulation

Analytical Models Queueing Theory Stochastic Processes Optimization Control Theory Graph Theory Reproductable and verifiable results Limited capacity of representation Complexity growth with the level of detail

Analytical Models

Queueing Theory Queues Everywhere Delay, loss probabilty, utilization, accessbility… Language of networks…

Queueing Theory

Stochastic Process How is the network traffic What is important to characterize the traffic?

Stochastic Process

Neural Networks

Optimization Resource allocation Topological design Scheduling of tasks Linear, non-liear, integer, mixed, heuristics..

Optimization S1S1 S 21 S 22 S 31 S 41 S 42 S 43 S 44 S 32 S 33 Exibição b b b/2 b/3

Optimization

Game Theory

Control Theory Traffic fluid model System stability Active queue management, ABR, policing, Internet stability Linear, non-linear, optimum, adaptative

Control Theory

Graph Theory Network flow, coloring Routing Channel allocation in wireless and optical networks

Coloring

Graph Theory

Complex Networks

Simulation Reproduces the dynamics of the system Statistic techniques Easy to program High computational demand Not always well accepted

Simulation

Simuation

Measurement ingress router egress router To measure the real system Laborous Difficulty to replicate

Measurement

Maesurement 1 cs-gw ( ) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu ( ) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu ( ) 6 ms 5 ms 5 ms 4 jn1-at wor.vbns.net ( ) 16 ms 11 ms 13 ms 5 jn1-so wae.vbns.net ( ) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu ( ) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu ( ) 22 ms 22 ms 22 ms ( ) 104 ms 109 ms 106 ms 9 de2-1.de1.de.geant.net ( ) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net ( ) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net ( ) 112 ms 114 ms 112 ms 12 nio-n2.cssi.renater.fr ( ) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr ( ) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr ( ) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net ( ) 135 ms 128 ms 133 ms ( ) 126 ms 128 ms 126 ms 17 * * * 18 * * * 19 fantasia.eurecom.fr ( ) 132 ms 128 ms 136 ms traceroute: routers, rt retardo em rota origem-destino also: pingplotter, diverso programas basedo em janelas

Measurement

Emulation Uses Small scale network Not simulation

Tips Your study needs to have an objective and the design and verification should be in accordance to the proposed objectives The level of detail should be sufficient to answer the questions posed Analysis of the system Comparison with other proposals Sensitivity analysis

System Analysis

Analysis of Sensitivity

Outcome of your Study