Tools for the Analysis and Design of Complex Multi-Scale Networks: - - PowerPoint PPT Presentation

tools for the analysis and design of complex multi scale
SMART_READER_LITE
LIVE PREVIEW

Tools for the Analysis and Design of Complex Multi-Scale Networks: - - PowerPoint PPT Presentation

Tools for the Analysis and Design of Complex Multi-Scale Networks: Overview MURI Annual Review Berkeley, October 27, 2011 J. Walrand, PI SLIDES: http://web.me.com/jeanwalrand/Site_3 1. Team Venkat


slide-1
SLIDE 1

Tools for 
 the Analysis and Design of Complex Multi-Scale Networks:
 Overview

  • MURI Annual Review


Berkeley, October 27, 2011

  • J. Walrand, PI

SLIDES: http://web.me.com/jeanwalrand/Site_3

slide-2
SLIDE 2
  • 1. Team
  • Venkat Anantharam, UCB
  • John Doyle, Caltech
  • Weibo Gong, UMASS
  • Steven Low, Caltech
  • R. Srikant, UIUC
  • Don Towsley, UMASS
  • Jean Walrand, UCB
  • Avideh Zakhor, UCB
  • 14 PhD Students, 7 Postdocs
  • 12 Journal Papers, 21 Conference papers
slide-3
SLIDE 3
  • 2. Scientific Objectives and Technical Approach
slide-4
SLIDE 4
  • 2. Scientific Objectives and Technical Approach

High Throughput Low Delay Security & Reliability

GOALS of PROPOSED WORK: Improve Understanding of Multi-Scale Features of Networks Use that Understanding to Develop Better Protocols

slide-5
SLIDE 5
  • 2. Scientific Objectives and Technical Approach

High Throughput Low Delay Security Reliability Protocols Methodology for LRD and Performance Evaluation Game: Attack/Defense

slide-6
SLIDE 6
  • 3. Scientific Issues

Local Information - Global Impact Multiple Time Scales Uncertainty Security & Reliability

slide-7
SLIDE 7
  • 4. Scientific Accomplishments

High Throughput Low Delay Security Reliability Protocols Methodology for LRD and Performance Evaluation Game: Attack/Defense

slide-8
SLIDE 8
  • 4. Scientific Accomplishments

High Throughput Low Delay Security Reliability Protocols Methodology for LRD and Performance Evaluation Game: Attack/Defense

Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers

slide-9
SLIDE 9
  • 4. Scientific Accomplishments

High Throughput Low Delay Security Reliability Protocols Methodology for LRD and Performance Evaluation Game: Attack/Defense

Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers

Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation
 Connection-Level Scheduling
 Efgect of Bufgers on Stability

slide-10
SLIDE 10
  • 4. Scientific Accomplishments

High Throughput Low Delay Security Reliability

Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation
 Connection-Level Scheduling
 Efgect of Bufgers on Stability

Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers Cost of Network Security

slide-11
SLIDE 11
  • 4. Scientific Accomplishments

High Throughput Low Delay Security Reliability

Access Delay in IEEE 802.11 Stability of a P2P Protocol
 Connection-Level Scheduling
 Efgect of Bufgers on Stability Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers Cost of Network Security

Goal: Understand Capacity w. Network Coding Approach:

  • Unicast and multicast well-understood
  • What about multiple unicast?

Presentation by Barlas Oguz

slide-12
SLIDE 12
  • 4. Scientific Accomplishments

High Throughput Low Delay Security Reliability

Access Delay in IEEE 802.11 Stability of a P2P Protocol
 Connection-Level Scheduling
 Efgect of Bufgers on Stability Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers Cost of Network Security

Goal: Estimation of Distribution with HT Approach:

  • Study distribution of flow sizes
  • Sampling central notes in large graphs


Presentation by Bruno Ribeiro

slide-13
SLIDE 13
  • 4. Scientific Accomplishments

High Throughput Low Delay Security Reliability

Access Delay in IEEE 802.11 Stability of a P2P Protocol
 Connection-Level Scheduling
 Efgect of Bufgers on Stability Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers Cost of Network Security

Goal: Estimation with HT; Role of Layers Approach:

  • Goodness of fit with HT;
  • Hard limits;
  • Essentials of layered architecture.

Presentation by John Doyle

slide-14
SLIDE 14
  • 4. Scientific Accomplishments

High Throughput/ Low Energy Low Delay Security Reliability

Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers Cost of Network Security

Goals: Access delay distribution; CW adaptation Approach:

  • Distributed estimation of access delays
  • CW adaptation based on collision parameters,


not recent collision history.

Presentation by Avideh Zakhor

Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation
 Connection-Level Scheduling
 Efgect of Bufgers on Stability

slide-15
SLIDE 15
  • 4. Scientific Accomplishments

High Throughput/ Low Energy Low Delay Security Reliability

Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers Cost of Network Security

Goal: Stable distributed P2P protocol Approach:

  • Avoid “rare chunk problem” by sampling.


Presentation by Barlas Oguz

Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation
 Connection-Level Scheduling
 Efgect of Bufgers on Stability

slide-16
SLIDE 16
  • 4. Scientific Accomplishments

High Throughput/ Low Energy Low Delay Security Reliability

Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers Cost of Network Security

Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation
 Connection-Level Scheduling
 Efgect of Bufgers on Stability

Goal: Reduce variance of target location estimate Approach:

  • Aggregate information in network.


Presentation by Wei Wei

slide-17
SLIDE 17
  • 4. Scientific Accomplishments

High Throughput/ Low Energy Low Delay Security Reliability

Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers Cost of Network Security

Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation
 Connection-Level Scheduling
 Efgect of Bufgers on Stability

Goal: Stability when connections come and go. Approach:

  • MWM with suitable f(QMAC).


Presentation by Javad Ghaderi

slide-18
SLIDE 18
  • 4. Scientific Accomplishments

High Throughput/ Low Energy Low Delay Security Reliability

Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers Cost of Network Security

Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation
 Connection-Level Scheduling
 Efgect of Bufgers on Stability

Goal: Understand stability of TCP with large bufgers. Approach:

  • Understand conditions when TCP remains stable


Presentation by Somayeh Sojoudi

slide-19
SLIDE 19
  • 4. Scientific Accomplishments

High Throughput Low Delay Security Reliability

Access Delay and CW Adaptation in IEEE 802.11 Stability of a P2P Protocol
 Connection-Level Scheduling
 Efgect of Bufgers on Stability Network Sharing Bound Power Laws in Network Analysis
 Fat tails, hard limits, thin layers Cost of Network Security

Goal: Impact of connectivity value on network design. Approach:

  • Define value of network and cost of connectivity loss.
  • Study NE of strategic attack vs. proactive defense.


Presentation by Assane Gueye

slide-20
SLIDE 20
  • 5. Group Synergy

Collaboration UIUC - UCB Delays in Adaptive CSMA Protocol Collaboration UIUC - UMASS Ying – Srikant - Towlsey Collaboration UMASS - CALTECH File Partitioning Algorithms Collaboration UCB – CALTECH Libin Jiang (UCB PhD) joined Caltech (as postdoc) Collaboration across projects UMASS – Shroff: Mutlipath protocols and LRD Jiang – Modiano: HT and Q-CSMA Gueye – Baras: Security and Topologies Continued collaboration across projects Exploration of delay-based protocols Combination of LQF and Adaptive CSMA

slide-21
SLIDE 21
  • 6. Future Plans

1) Analysis of delays and likelihood of delivery in wireless networks; 2) Design of network topologies for reliability and resiliency to attacks; 
 3) Improvements of WiFi protocols; 
 4) Study of LRD of functionals of Markov chains; 5) Development of secure wireless communication algorithms; 6) Design of resilient topologies

slide-22
SLIDE 22
  • 7. Original Goals

Improve Understanding of Multi-Scale Features of Networks

Control protocols that capture the efgect of bufgers; Analysis of interaction of speed scaling and load balancing; Optimization of consensus algorithm; PCSDE models of heavy tails.

Using that Understanding to Develop Improved Protocols

Reduced-delay protocols for wireless networks; Stable distributed peer-to-peer algorithms; Stable multipath rate control algorithms; WiFi protocols with carrier sense and packet length adaptation; Geographical load balancing algorithms for renewables; Design of robust scheduling algorithms for heavy-tails; Algorithms for identifying important nodes in large networks; Algorithms for maintaining secure wireless communications.

slide-23
SLIDE 23

Todayʼs Agenda

9.00 - 9.40 Barlas Oguz (Berkeley) Network Sharing Bound and Stability of a P2P Protocol 9.40 - 10.20 Avideh Zakhor (Berkeley) Access Delay and CW Adaptation in IEEE 802.11 10.20 - 10.40 Break 10.40 - 11.20 Assane Gueye (NIST) Cost of Network Security 11.20 - 12.00 Javed Ghaderi (UIUC) Connection-Level Scheduling 12.00 - 1.00 Lunch Break 1.00 - 1.40 Wei Wei (UMASS) Target Tracking with In-network Aggregation 1.40 - 2.20 Bruno Ribeiro (UMASS) Power Laws in Network Analysis 2.20 - 3.00 Somayeh Sojoudi (Caltech) Efgect of bufgers on stability of Internet congestion control 3.00 - 3.20 Break 3.20 - 4.00 John Doyle (Caltech) Fat tails, hard limits, thin layers 4.00 - 4.20 Feedback and Remarks from Dr. Chang

slide-24
SLIDE 24

Publications

JOURNALS

Libin Jiang, Venkat Anantharam and Jean Walrand, ``How Bad are Selfish Investments in Network Security?", IEEE/ACM Transactions on Networking, Vol. 19, No. 2,pp. 549 -560, April 2011. Amin Aminzadeh Gohari and Venkat Anantharam, “Evaluation of Marton's Inner Bound for the General Broadcast Channel”. To appear in IEEE Transactions on Information Theory. Venkat Anantharam and Takis Konstantopoulos, ”Integral representation of Skorokhod reflection,” To appear in Proceedings of the American Mathematical Society. Lijun Chen, Na Li, Steven H. Low and John C. Doyle. “Two Market Models for Demand Response in Power Networks,” IEEE SmartGridComm, 2010 .J. J. Jaramillo, R. Srikant and L. Ying, Scheduling for Optimal Rate Allocation in Ad Hoc Networks with Hetergeneous Delay Constraints, IEEE Journal on Selected Areas in Communications, May 2011.

  • J. J. Jaramillo and R. Srikant, Optimal scheduling for fair resource allocation in ad hoc networks with elastic

and inelastic traffic, IEEE/ACM Transactions on Networking, 2011.

slide-25
SLIDE 25

Publications

JOURNALS


  • J. Ni, R. Srikant and X. Wu. Coloring Spatial Point Processes with Applications to Peer Discovery in Large

Wireless Networks, IEEE/ACM Transactions on Networking, April 2011.

  • M. Leconte, J. Ni and R. Srikant, Improved Bounds on the Throughput Efficiency of Greedy Maximal Scheduling

in Wireless Networks, IEEE/ACM Transactions on Networking, June 2011.

  • Y. Cai, Patrick P. C. Lee, W. Gong, D. Towsley. “Analysis of Traffic Correlation Attacks on Router Queues,” J.

Computer Networks, 55(3), 734—747, February 2011.

  • B. Jiang, Y. Cai, D. Towsley. “On the Resource Utilization and Traffic Distribution of MultipathTransmission

Control”, to appear in Performance

  • L. Ying, R. Srikant D. Towsley, “Cluster-Based Back-Pressure Routing Algorithm,” IEEE/ACM Trans. on

Networking, to appear. (Collaborative effort.)

  • B. Jiang, R. Brockett, W. Gong, D. Towsley. “Stochastic differential equations for power law behaviors”,

submitted to J. Applied Probability.

slide-26
SLIDE 26

Publications

CONFERENCES Krishnan, E. Haghani, A. Zakhor, “Local Estimation of Collision Probabilities in 802.11 WLANs: An Experimental Study," IEEE WCNC 2011, Cancun. Krishnan, and A. Zakhor, “Adaptive Carrier-Sensing for Throughput Improvement in IEEE 802.11 Networks," IEEE GLOBECOM 2010, Miami, FL.

  • E. Haghani, M. Krishnan and A. Zakhor, "A Method for Estimating Access Delay Distribution in IEEE 802.11

Networks," accepted for publication at IEEE GLOBECOM 2011, Houston, TX, December 2011.

  • M. Krishnan, E. Haghani, A. Zakhor, “"Packet Length Adaptation in WLANs with Hidden Nodes and Time-

Varying Channels," accepted for publication at IEEE GLOBECOM 2011, Houston, Texas. Somayeh Sojoudi, Steven H. Low and John C. Doyle, "Effects of Buffers on Stability of Internet Congestion Controllers", IEEE International Conference on Computer Communications (INFOCOM), mini conference, China, 2011. Zhenhua Liu, Minghong Lin, Adam Wierman, Steven H. Low and Lachlan L. H. Andrew, "Greening geographic load balancing", Proc. ACM Sigmetrics, 2011

slide-27
SLIDE 27

Publications

CONFERENCES

  • J. Nair, A. Wierman, B. Zwart. “Scheduling for the tail: robustness versus optimality”, Proceedings of Allerton,

2010 (Invited paper)

  • V. Borkar, J. Nair and N. Sanketh. “Manufacturing consent,” Proceedings of Allerton, 2010 (Invited paper)

Sudeep Kamath and Venkat Anantharam,``A new dual to the Gacs-Korner common information defined via the Gray-Wyner system", Proceedings of the 48th Annual Allerton Conference on Communications, Control and Computing, Urbana, Illinois, September 29 -October 1, 2010. Naryana Santhanam and Venkat Anantharam, ``What risks lead to ruin", Proceedings of the 48th Annual Allerton Conference on Communications, Control and Computing,Urbana, Illinois, September 29 -October 1, 2010. Assane Gueye, Jean C. Walrand and Venkat Anantharam. ``Design of Network Topology in an Adversarial Environment", GameSec2010, Conference on Decision and Game Theory for Security, 22 -23 November 2010, Berlin, Germany. Assane Gueye, Jean C. Walrand, and Venkat Anantharam, “A Network Topology Design Game: How to Choose Communication Links in an Adversarial Environment?”,GameNets2011, 2nd International ICST Conference on Game Theory for Networks, April 16 -18, 2011, Shanghai, China.

slide-28
SLIDE 28

Publications

CONFERENCES Sudeep U. Kamath, David N. C. Tse, and Venkat Anantharam, “Generalized Network Sharing Bound and the Two-Unicast Problem". NetCod 2011, The 2011 International Symposium on Network Coding, Beijing, China, 25

  • 27 July, 2011.
  • T. H. Kim. J. Ni, R. Srikant and N. Vaidya. On the Achievable Throughput of CSMA Under Imperfect Carrier
  • Sensing. Proc. IEEE INFOCOM 2011.
  • L. Jiang, M. Leconte, J. Ni, R. Srikant and J. Walrand. Fast Mixing of Parallel Glauber Dynamics and Low-

Delay CSMA Scheduling, Proc. IEEE INFOCOM Mini-Conference 2011. (Collaborative Effort)

  • T. Ji and R. Srikant. Scheduling in Wireless Networks with Connection Arrivals and Departures. Proc. ITA 2011.

S Xiao, W Gong, D Towsley. Secure Wireless Communication with Dynamic Secrets. INFOCOM 2010. (runner- up for best paper award) S Xiao, W Gong. Mobility Can Help: Protect User Identity with Dynamic Credentials. 11th International Conference on Mobile Data Management (MDM 2010)

slide-29
SLIDE 29

Publications

CONFERENCES

  • J. Tan, W. Wei, B. Jiang, N. Shroff, D. Towsley. “Can Multipath Routing Mitigate Power Law Delays? – Effects of

Parallelism on Tail Performance, ITC 2010, September 2010. (collaborative effort)

  • B. Ribeiro and D. Towsley. "Estimating and Sampling Graphs with Multidimensional Random Walks", ACM

SIGCOMM Internet Measurement Conference, Nov, 2010. W Zeng, X Chen, A Russell, S Vasudevan, B Wang and W Wei, "Neighbor Discovery in Wireless Networks with Multipacket Reception", Proceedings of MobiHoc, Paris, France, May 2011. Y.-s. Lim, B. Ribeiro, D.S. Menasche, P. Basu, D. Towsley. “Online Estimating The Top k Nodes of a Network”,

  • Proc. NSW 2011.