Analytical Foundations of Networked Computing Kirstie Bellman, Luiz DaSilva, Robert Kleinberg, Michael Mahoney, Amin Saberi, Ion Stoica, Eva Tardos, Shanghua.

Slides:



Advertisements
Similar presentations
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
1 Routing Techniques in Wireless Sensor networks: A Survey.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Developing an Approach to the Analytic Gap: Advanced Mathematics for Scale and Complexity Dr. Kirstie Bellman, Co-PI (Partner Shankar Sastry, UCB) Aerospace.
Modeling Human Reasoning About Meta-Information Presented By: Scott Langevin Jingsong Wang.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Summary and Further Reading Part I of 13th.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Understanding Radio Irregularity in Wireless Networks Joint work with Patrick Stüdi, Fabian Kuhn and Gustavo Alonso.
1 Introduction to Wireless Networks Michalis Faloutsos.
Cognitive Radio Networks Breakout GENI Wireless Workshop 28 March 2007.
Internet Research Needs a Critical Perspective Towards Models –Sally Floyd –IMA Workshop, January 2004.
1 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.
SING* and ToNC * Scientific Foundations for Internet’s Next Generation Sirin Tekinay Program Director Theoretical Foundations Communication Research National.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Ad Hoc Networking Course Instructor: Carlos Pomalaza-Ráez Geographical Routing Using Partial Information for Wireless Ad Hoc Networks Rahul Jain, Anuj.
1 Challenging the Modeling Assumptions of Mobile Networks Seminar 266 Michalis Faloutsos.
Communication Networks A Second Course Jean Walrand Department of EECS University of California at Berkeley.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Algorithms for Self-Organization and Adaptive Service Placement in Dynamic Distributed Systems Artur Andrzejak, Sven Graupner,Vadim Kotov, Holger Trinks.
Delay Analysis of Large-scale Wireless Sensor Networks Jun Yin, Dominican University, River Forest, IL, USA, Yun Wang, Southern Illinois University Edwardsville,
CMPE 252A: Computer Networks Review Set:
Lin Yingpei (Huawei Technologies) doc.: IEEE /1438r0 Submission November 2013 Slide 1 Traffic Observation and Study on Virtual Desktop Infrastructure.
CECS 474 Computer Network Interoperability WAN Technologies & Routing
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
1 Chalermek Intanagonwiwat (USC/ISI) Ramesh Govindan (USC/ISI) Deborah Estrin (USC/ISI and UCLA) DARPA Sponsored SCADDS project Directed Diffusion
Fluid Limits for Gossip Processes Vahideh Manshadi and Ramesh Johari DARPA ITMANET Meeting March 5-6, 2009 TexPoint fonts used in EMF. Read the TexPoint.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Tufts University. EE194-WIR Wireless Sensor Networks. March 3, 2005 Increased QoS through a Degraded Channel using a Cross-Layered HARQ Protocol Elliot.
Cooperative Wireless Networks Hamid Jafarkhani Director Center for Pervasive Communications and Computing
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Cross-layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks IEEE INFOCOM 2008 Mehmet C. Vuran and Ian F.
FAR: Face-Aware Routing for Mobicast in Large-Scale Sensor Networks QINGFENG HUANG Palo Alto Research Center (PARC) Inc. and SANGEETA BHATTACHARYA, CHENYANG.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Overview: Layerless Dynamic Networks Lizhong Zheng.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
High-integrity Sensor Networks Mani Srivastava UCLA.
A Power Assignment Method for Multi-Sink WSN with Outage Probability Constraints Marcelo E. Pellenz*, Edgard Jamhour*, Manoel C. Penna*, Richard D. Souza.
Computer Science Division
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
SOCIAL HOUSEKEEPING THROUGH INTERCOMMUNICATING APPLIANCES AND SHARED RECIPES MERGING IN A PERVASIVE WEB-SERVICES INFRASTRUCTURE WP8 – Tests Ghent CREW.
Scatternet Formation of Bluetooth Ad Hoc Networks Bin Zhen, Jonghun Park, Yongsuk Kim HICSS 2003.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
M ulti m edia c omputing laboratory Biologically Inspired Cooperative Routing for Wireless Mobile Sensor Networks S. S. Iyengar, Hsiao-Chun Wu, N. Balakrishnan,
MotivationKinetic Data StructuresExampleKDS Properties Networks play a central role in numerous applications, and the design of good networks is therefore.
Smart Sleeping Policies for Wireless Sensor Networks Venu Veeravalli ECE Department & Coordinated Science Lab University of Illinois at Urbana-Champaign.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Asynchronous Control for Coupled Markov Decision Systems Michael J. Neely University of Southern California Information Theory Workshop (ITW) Lausanne,
Evolution of Cooperation in Mobile Ad Hoc Networks Jeff Hudack (working with some Italian guy)
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Wireless LANs Wireless proliferating rapidly.
Understanding Radio Irregularity in Wireless Networks
Routing in Ad Hoc Networks: A Case for Long Hops
Overview: Chapter 4 Infrastructure Establishment
Presentation transcript:

Analytical Foundations of Networked Computing Kirstie Bellman, Luiz DaSilva, Robert Kleinberg, Michael Mahoney, Amin Saberi, Ion Stoica, Eva Tardos, Shanghua Teng

Overview of this presentation 1.Define the problem –Taxonomy, scope, dichotomies in ToNC. 2.Mathematical modeling of networks and networked computation. 3.Analytical paradigms for ToNC. 4.ToNC problem domains not covered elsewhere.

Understand and Model Different Kinds of Networks Examples of networks we should mean –Internet, Sensor networks, DoD network: GIG, mobile networks, P2P, pervasive computing –Biological networks, Social Network?? Same basic network model with few key parameters? –develop a taxonomy –what are the key parameters to consider? –Do many basic properties depend on a few parameter? Properties and Issues: –open and evolving versus closed and stable –mobile versus stable –designed versus observed –Controllability of the evolution –impact and type of heterogeneity –small word versus structured or mesh-like

Analytical Paradigms for ToNC We need a holistic view of modeling all aspects: –network, traffic, interface. –No need for perfection if network drops packets with small probability due to other reasons. –Some applications need high reliability and precision other do not Analytical Paradigm like Smoothed Analysis –Small randomness that captures some aspect of the uncertainty in the input. –between worst-case and avg-case analysis –uncertainty can come from numbers (traffic) network structure (small amount of randomness, such as neighbor selection in P2P can be added by the system (in timing) ordering arriving packets bit of noise can help avoid oscillation and other worst-case effects Other paradigms between average and worst case. –GENI is an opportunity to test which of modes of analysis provides best results

Challenges in Modeling Networks and Networked Processes Model network self similarities: –maybe as a hierarchical network? –some networks are only defined at this fuzzy level. social or geometric networks Rare events with catastrophic consequences need also be considered – can be cumulative effect of "sub-threshold" events –need a better "scenario generator" to reason about such events. Need to understand network diffusion effects to know what has catastrophic consequences.

Networks controlled in a decentralized way Networks are no longer centralized –Range of applications: sensors, P2P, mobile networks, self-organizing system –lack of knowledge –modes of cooperation between nodes –also related to selfishness and price –Algorithmic theory of trust and reputation: without assumptions about priors Additional issues for mobile networks: –How do solutions above solutions change with mobility of nodes

Other Topics Geometry of Networked computing –Develop theory of geometric random graphs –small world routing –taking advantage of low dimensionality of geometry –effect of geometry not represented via the edges of the graph (like interference in wireless networks) Theory of random processes in networks –graphs properties (such as power-low graphs) –defense again cascading effects

Theory of Information Networks Design communication paradigm for information networks in which you send modified or coded information. –aggregating information in sensor networks –Coding for multicast well understood, how about non- multicast applications –How does coding effect needs to replicate files –Error correcting codes in networks –Information theory of networks of erasure channels

What else should be included Molecular networks, biological networks, neural networks –Research on network aspect such as propagation of information in these networks, structure network, and how effects functionality Characterizing expected quality depending on structural or other properties of network Other groups: what else is missing?