Tools for the Analysis and Design of Complex Multi-Scale Networks: Overview
- MURI Annual Review
Berkeley, October 27, 2011
- J. Walrand, PI
SLIDES: http://web.me.com/jeanwalrand/Site_3
Tools for the Analysis and Design of Complex Multi-Scale Networks: - - PowerPoint PPT Presentation
Tools for the Analysis and Design of Complex Multi-Scale Networks: Overview MURI Annual Review Berkeley, October 27, 2011 J. Walrand, PI SLIDES: http://web.me.com/jeanwalrand/Site_3 1. Team Venkat
SLIDES: http://web.me.com/jeanwalrand/Site_3
Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers
Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers
Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Efgect of Bufgers on Stability
Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Efgect of Bufgers on Stability
Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Cost of Network Security
Access Delay in IEEE 802.11 Stability of a P2P Protocol Connection-Level Scheduling Efgect of Bufgers on Stability Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Cost of Network Security
Access Delay in IEEE 802.11 Stability of a P2P Protocol Connection-Level Scheduling Efgect of Bufgers on Stability Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Cost of Network Security
Presentation by Bruno Ribeiro
Access Delay in IEEE 802.11 Stability of a P2P Protocol Connection-Level Scheduling Efgect of Bufgers on Stability Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Cost of Network Security
Presentation by John Doyle
Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Cost of Network Security
Presentation by Avideh Zakhor
Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Efgect of Bufgers on Stability
Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Cost of Network Security
Presentation by Barlas Oguz
Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Efgect of Bufgers on Stability
Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Cost of Network Security
Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Efgect of Bufgers on Stability
Presentation by Wei Wei
Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Cost of Network Security
Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Efgect of Bufgers on Stability
Presentation by Javad Ghaderi
Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Cost of Network Security
Access Delay in IEEE 802.11 Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Efgect of Bufgers on Stability
Presentation by Somayeh Sojoudi
Access Delay and CW Adaptation in IEEE 802.11 Stability of a P2P Protocol Connection-Level Scheduling Efgect of Bufgers on Stability Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Cost of Network Security
Presentation by Assane Gueye
Collaboration UIUC - UCB Delays in Adaptive CSMA Protocol Collaboration UIUC - UMASS Ying – Srikant - Towlsey Collaboration UMASS - CALTECH File Partitioning Algorithms Collaboration UCB – CALTECH Libin Jiang (UCB PhD) joined Caltech (as postdoc) Collaboration across projects UMASS – Shroff: Mutlipath protocols and LRD Jiang – Modiano: HT and Q-CSMA Gueye – Baras: Security and Topologies Continued collaboration across projects Exploration of delay-based protocols Combination of LQF and Adaptive CSMA
1) Analysis of delays and likelihood of delivery in wireless networks; 2) Design of network topologies for reliability and resiliency to attacks; 3) Improvements of WiFi protocols; 4) Study of LRD of functionals of Markov chains; 5) Development of secure wireless communication algorithms; 6) Design of resilient topologies
Control protocols that capture the efgect of bufgers; Analysis of interaction of speed scaling and load balancing; Optimization of consensus algorithm; PCSDE models of heavy tails.
Reduced-delay protocols for wireless networks; Stable distributed peer-to-peer algorithms; Stable multipath rate control algorithms; WiFi protocols with carrier sense and packet length adaptation; Geographical load balancing algorithms for renewables; Design of robust scheduling algorithms for heavy-tails; Algorithms for identifying important nodes in large networks; Algorithms for maintaining secure wireless communications.
9.00 - 9.40 Barlas Oguz (Berkeley) Network Sharing Bound and Stability of a P2P Protocol 9.40 - 10.20 Avideh Zakhor (Berkeley) Access Delay and CW Adaptation in IEEE 802.11 10.20 - 10.40 Break 10.40 - 11.20 Assane Gueye (NIST) Cost of Network Security 11.20 - 12.00 Javed Ghaderi (UIUC) Connection-Level Scheduling 12.00 - 1.00 Lunch Break 1.00 - 1.40 Wei Wei (UMASS) Target Tracking with In-network Aggregation 1.40 - 2.20 Bruno Ribeiro (UMASS) Power Laws in Network Analysis 2.20 - 3.00 Somayeh Sojoudi (Caltech) Efgect of bufgers on stability of Internet congestion control 3.00 - 3.20 Break 3.20 - 4.00 John Doyle (Caltech) Fat tails, hard limits, thin layers 4.00 - 4.20 Feedback and Remarks from Dr. Chang
JOURNALS
Libin Jiang, Venkat Anantharam and Jean Walrand, ``How Bad are Selfish Investments in Network Security?", IEEE/ACM Transactions on Networking, Vol. 19, No. 2,pp. 549 -560, April 2011. Amin Aminzadeh Gohari and Venkat Anantharam, “Evaluation of Marton's Inner Bound for the General Broadcast Channel”. To appear in IEEE Transactions on Information Theory. Venkat Anantharam and Takis Konstantopoulos, ”Integral representation of Skorokhod reflection,” To appear in Proceedings of the American Mathematical Society. Lijun Chen, Na Li, Steven H. Low and John C. Doyle. “Two Market Models for Demand Response in Power Networks,” IEEE SmartGridComm, 2010 .J. J. Jaramillo, R. Srikant and L. Ying, Scheduling for Optimal Rate Allocation in Ad Hoc Networks with Hetergeneous Delay Constraints, IEEE Journal on Selected Areas in Communications, May 2011.
and inelastic traffic, IEEE/ACM Transactions on Networking, 2011.
JOURNALS
Wireless Networks, IEEE/ACM Transactions on Networking, April 2011.
in Wireless Networks, IEEE/ACM Transactions on Networking, June 2011.
Computer Networks, 55(3), 734—747, February 2011.
Control”, to appear in Performance
Networking, to appear. (Collaborative effort.)
submitted to J. Applied Probability.
CONFERENCES Krishnan, E. Haghani, A. Zakhor, “Local Estimation of Collision Probabilities in 802.11 WLANs: An Experimental Study," IEEE WCNC 2011, Cancun. Krishnan, and A. Zakhor, “Adaptive Carrier-Sensing for Throughput Improvement in IEEE 802.11 Networks," IEEE GLOBECOM 2010, Miami, FL.
Networks," accepted for publication at IEEE GLOBECOM 2011, Houston, TX, December 2011.
Varying Channels," accepted for publication at IEEE GLOBECOM 2011, Houston, Texas. Somayeh Sojoudi, Steven H. Low and John C. Doyle, "Effects of Buffers on Stability of Internet Congestion Controllers", IEEE International Conference on Computer Communications (INFOCOM), mini conference, China, 2011. Zhenhua Liu, Minghong Lin, Adam Wierman, Steven H. Low and Lachlan L. H. Andrew, "Greening geographic load balancing", Proc. ACM Sigmetrics, 2011
CONFERENCES
2010 (Invited paper)
Sudeep Kamath and Venkat Anantharam,``A new dual to the Gacs-Korner common information defined via the Gray-Wyner system", Proceedings of the 48th Annual Allerton Conference on Communications, Control and Computing, Urbana, Illinois, September 29 -October 1, 2010. Naryana Santhanam and Venkat Anantharam, ``What risks lead to ruin", Proceedings of the 48th Annual Allerton Conference on Communications, Control and Computing,Urbana, Illinois, September 29 -October 1, 2010. Assane Gueye, Jean C. Walrand and Venkat Anantharam. ``Design of Network Topology in an Adversarial Environment", GameSec2010, Conference on Decision and Game Theory for Security, 22 -23 November 2010, Berlin, Germany. Assane Gueye, Jean C. Walrand, and Venkat Anantharam, “A Network Topology Design Game: How to Choose Communication Links in an Adversarial Environment?”,GameNets2011, 2nd International ICST Conference on Game Theory for Networks, April 16 -18, 2011, Shanghai, China.
CONFERENCES Sudeep U. Kamath, David N. C. Tse, and Venkat Anantharam, “Generalized Network Sharing Bound and the Two-Unicast Problem". NetCod 2011, The 2011 International Symposium on Network Coding, Beijing, China, 25
Delay CSMA Scheduling, Proc. IEEE INFOCOM Mini-Conference 2011. (Collaborative Effort)
S Xiao, W Gong, D Towsley. Secure Wireless Communication with Dynamic Secrets. INFOCOM 2010. (runner- up for best paper award) S Xiao, W Gong. Mobility Can Help: Protect User Identity with Dynamic Credentials. 11th International Conference on Mobile Data Management (MDM 2010)
CONFERENCES
Parallelism on Tail Performance, ITC 2010, September 2010. (collaborative effort)
SIGCOMM Internet Measurement Conference, Nov, 2010. W Zeng, X Chen, A Russell, S Vasudevan, B Wang and W Wei, "Neighbor Discovery in Wireless Networks with Multipacket Reception", Proceedings of MobiHoc, Paris, France, May 2011. Y.-s. Lim, B. Ribeiro, D.S. Menasche, P. Basu, D. Towsley. “Online Estimating The Top k Nodes of a Network”,