Internet Signal Processing: Next Steps Dr. Craig Partridge BBN Technologies.

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

1 Internet Protocol: Routing IP Datagrams D. E. Comer, “Internetworking with TCP/IP: Principles, Protocols and Architectures”, Ch. 8, Prentice Hall, 2000.
The Communication Toolbox: Practical strategies for facilitating communication Susan Howey Speech-Language Pathologist Stan Cassidy Centre for Rehabilitation.
Using the Crosscutting Concepts As conceptual tools when meeting an unfamiliar problem or phenomenon.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
2014 Examples of Traffic. Video Video Traffic (High Definition) –30 frames per second –Frame format: 1920x1080 pixels –24 bits per pixel  Required rate:
© 2009 Carnegie Mellon University Is there any value in bulk network traces? Sid Faber Member of the Technical Staff CERT/SEI.
Would You Rather Statements
1. Never walk without a document in your hands People with documents in their hands look like hardworking employees heading for important meetings. People.
Some things to think about. Assignment 1 is at the end, but read the whole thing. Please!
CMPT 855Module Network Traffic Self-Similarity Carey Williamson Department of Computer Science University of Saskatchewan.
OS Fall ’ 02 Performance Evaluation Operating Systems Fall 2002.
Performance Evaluation
Measurement and Monitoring Nick Feamster Georgia Tech.
OS Fall ’ 02 Performance Evaluation Operating Systems Fall 2002.
Managing Large Classes with Group Work
What are drills and why are they important? Brainstorm and discuss N-ys
Reflective practice Session 4 – Working together.
What is Poetry?  A poem can be a brief, shining moment in which you capture a kernel of something beautiful for the first time.
Writing Personal Statements. What is a personal statement? Varies from college to college Usually changes every few years Essay or series of short responses.
Data Communications and Networks
PDF accessibility Susannah Pike
Digital Media Lecture 2.1: SemesterOverview Georgia Gwinnett College School of Science and Technology Dr. Jim Rowan.
Q and A for Chapter 7, 13 CS-332 Victor Norman. Coaxial Cable Q: What exactly is at the center of a coaxial cable? Is it just one wire in the middle?
1 9/8/2015 MATH 224 – Discrete Mathematics Basic finite probability is given by the formula, where |E| is the number of events and |S| is the total number.
SKILLS AND TECHNIQUES HOMEWORK DUE IN TODAY Higher/Intermediate 2 Physical Education.
Characteristics of Communication Systems
The content of these slides by John Galeotti, © Carnegie Mellon University (CMU), was made possible in part by NIH NLM contract# HHSN P,
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Blogging Transforming Writing for the 21 st Century.
Understand About Essays What exactly is an essay? Why do we write them? What is the basic essay structure?
Chapter 22 Q and A Victor Norman CS 332 Spring 2014.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
HNC COMPUTING - Network Concepts 1 Network Concepts Devices Introduction into Network Devices.
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
©Brooks/Cole, 2003 Model and protocol  A model is the specification set by a standards organization as a guideline for designing networks.  A protocol.
Chapter 7 Probability and Samples: The Distribution of Sample Means.
Unit 1 – Improving Productivity
Carrying out a statistics investigation. A process.
What is the HSPA???. HSPA - Overview The HSPA is the High School Proficiency Assessment that is given to juniors in New Jersey’s public schools. States.
Clustering Prof. Ramin Zabih
Secret Fortress Construction Challenge You should have two identical LEGO block kits. Set the extra kit aside, and use one kit to build a LEGO fortress:
Frequency Analysis of Protocols Dr. Craig Partridge BBN Technologies.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Collective Memory Task 1: WHOLE GROUP Are you up for the challenge?  From your group each member will have ten seconds to look at a picture. To begin.
Ms. Dolen’s 7 th Grade Language Arts.  Indent! Indent! INDENT!  Start with an attention catcher (we’ll get to these in a moment…)  Include your thesis.
Proposal for a Global Network for Beam Instrumentation [BIGNET] BI Group Meeting – 08/06/2012 J-J Gras CERN-BE-BI.
User Mobility Modeling and Characterization of Mobility Patterns Mahmood M. Zonoozi and Prem Dassanayake IEEE Journal on Selected Areas in Communications.
Chapter 3 By Samantha Thomsit. DIVERGENT THINKING A type of creative thinking that starts from a common point and moves outward to a variety of perspectives.
By: WenHao Wu. A current situation that I have is that I cannot decide if a computer career is for me. I am considering any career in computers, but I.
Warm Up What types of evidence might historians have used to prove the theory of natural selection?
Digital Media Lecture 2: SemesterOverview Georgia Gwinnett College School of Science and Technology Dr. Jim Rowan.
King Faisal University جامعة الملك فيصل Deanship of E-Learning and Distance Education عمادة التعلم الإلكتروني والتعليم عن بعد [ ] 1 جامعة الملك فيصل عمادة.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Neural Networks Lecture 4 out of 4. Practical Considerations Input Architecture Output.
Taking a Closer Look: Incorporating Research into Your Paper.
1. 2 What is Digital Image Processing? The term image refers to a two-dimensional light intensity function f(x,y), where x and y denote spatial(plane)
1.5 Wired and Wireless Networks
Due: a start of class Oct 26
CS 457 – Lecture 10 Internetworking and IP
IEEE P Working Group for Wireless Personal Area NetworksTM
CS 3700 Networks and Distributed Systems
Wavelet Based Real-time Smoke Detection In Video
Microsoft Word - Formatting Pages
Computer communications
CS 4700 / CS 5700 Network Fundamentals
How would you reinvent a school blazer
DT001A, Simulation of communication systems, 7.5 ECTS
Presentation transcript:

Internet Signal Processing: Next Steps Dr. Craig Partridge BBN Technologies

Defining Signal Processing Processing—such as shaping, converting, enhancing, and time positioning—of signals (such as packet traces), to transform the signals into other forms — such as shapes, power levels, or images — and thereby extract features from the original signal.

Internet Signal Processing While there have been brief uses in the past –E.g. Jacobson on timing We’re only now seeing an emerging community of people doing signal processing on Internet traffic –And most of that community is in this room Where should we, as a community, be headed? –This is not a question we’ve had a chance to consider as a group (thus this workshop)

Whither? In Three Questions Is there more to signal processing than pretty pictures? What can signal processing illuminate? –What are the limits of different algorithms? What should our input signals be?

Pretty Pictures Why do we create pretty pictures? –Initial experiments with an algorithm –Try it on things and see what pops out The danger comes when we publish those pictures without understanding them –“This traffic pattern causes this picture” is something we should aim not to do Unless you’re asking for help –Seek rather “This traffic pattern causes this picture because….”

Some Not-Yet-Ready Pictures Delta-time analysis Inter-transmission time vs. transmission time Bands represent observed acceptable transmission times Low part of chart may reveal MAC layer in use…

What Can We Illuminate? What can signal processing tell us about the network? We need to find out. Can: –Seek out algorithms and try them –Seek out problems and find algorithms that might answer them –Seek out inputs to feed to algorithms we understand –At this point, we probably need to try all three approaches

Some Thought Questions How much does cross traffic “imprint”? What are wavelets good for? When are wavelets the wrong approach? What role for match-and-latch?

Imprinting Propagation of self-similarity work… An intriguing result from signal processing… Characteristics from all three flows observed But only two visible to sensor!

Pros and Cons of Wavelets Pro: –we’ve used them a lot and we understand a few things –how to compute Hurst parameter –how their details tend to vary Con: –they’re bad at identifying particular frequencies –often hard to say exactly why details vary BTW: these are questions we should ask ourselves about any technique going forward

Match-and-Latch A technique for extracting signals from noisy input Requires: – signals to have a structure that enables the extraction –that we be sure the signals are present One useful structure: signals expressable in max- plus algebra –TCP is max-plus (SIGCOMM 2000)

What Should Input Signals Be? Typical practice: –take a packet trace –post process it into a signal sample it in some fashion (method usually not described in paper…) usually only use arrival time and length usually resulting in either bins of event counts or a (-1,0,1) uniformly sampled signal

Why Can’t an Input …. Be something other than a packet trace –up-down times for BGP peers? –byte counts per unit time? Use more information from the trace –encoding source and destination prefixes? –power levels on wireless? –multi-dimensional signals? Be properly documented in the paper…

Final Thoughts Having put a lot of challenges on the table, let me say we’ve also come a long way in a short time –Lots of interesting work, which you’ll hear over the next few days –I encourage you to view it all (no matter how impressive) as a starting point…. A final challenge: –Why are we using signal processing only for analysis? –Are there applications we could transform with signal processing? (Beyond covert channels)