1 / 18

Tools for the Analysis and Design of Complex Multi-Scale Networks: Overview

MURI Annual Review Berkeley, October 27, 2011 J. Walrand, PI. Tools for the Analysis and Design of Complex Multi-Scale Networks: Overview. SLIDES: http://robotics.eecs.berkeley.edu/~wlr/ADCN.htm. Venkat Anantharam , UCB John Doyle , Caltech Weibo Gong , UMASS Steven Low , Caltech

brownaaron
Download Presentation

Tools for the Analysis and Design of Complex Multi-Scale Networks: Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MURI Annual ReviewBerkeley, October 27, 2011 J. Walrand, PI Tools for the Analysis and Design of Complex Multi-Scale Networks:Overview SLIDES: http://robotics.eecs.berkeley.edu/~wlr/ADCN.htm

  2. Venkat Anantharam, UCB John Doyle,Caltech Weibo Gong, UMASS Steven Low, Caltech R. Srikant, UIUC Don Towsley, UMASS Jean Walrand, UCB Avideh Zakhor, UCB 14 PhD Students, 7 Postdocs 12 Journal Papers, 21 Conference papers 1. Team

  3. 2. Scientific Objectives and Technical Approach

  4. 2. Scientific Objectives and Technical Approach High Throughput Low Energy Low Delay Security Reliability GOALS of PROPOSED WORK: Improve Understanding of Multi-Scale Features of Networks Use that Understanding to Develop Better Protocols

  5. 2. Scientific Objectives and Technical Approach High Throughput/ Low Energy Low Delay Methodology for LRD Protocols Security Reliability Game: Attack/Defense

  6. 3. Scientific Issues Local Information - Global Impact Multiple Time Scales: LRD traffic Link Fading MAC Adjustment Routing Congestion Control Uncertainty Security Concerns

  7. 4. Scientific Accomplishments High Throughput/ Low Energy Low Delay Methodology for LRD Protocols Security Reliability Game: Attack/Defense

  8. 4. Scientific Accomplishments High Throughput/ Low Energy Low Delay Network Sharing Bound Power Laws in Network AnalysisFat tails, hard limits, thin layers Access Delay in IEEE 802.11 Stability of a P2P ProtocolConnection-Level SchedulingEffect of Buffers on Stability Security Reliability Cost of Network Security

  9. Collaboration UIUC - UCB Delays in Adaptive CSMA Protocol Collaboration UMASS - CALTECH File Partitioning Algorithms Collaboration UCB – CALTECH Libin Jiang (UCB PhD) joined Caltech (as postdoc) Collaboration across projects UMASS – Shroff: Mutlipath protocols and LRD Continued collaboration across projects Exploration of delay-based protocols Combination of LQF and Adaptive CSMA 5. Group Synergy

  10. Analysis of delays and likelihood of delivery in wireless networks; Design of network topologies for reliability and resiliency to attacks; Improvements of WiFi protocols; Study of LRD of functionals of Markov chains; Development of secure wireless communication algorithms. 6. Future Plans

  11. 7. Original Goals • Improve Understanding of Multi-Scale Features of Networks • Control protocols that capture the effect of buffers; • Analysis of interaction of speed scaling and load balancing; • Optimization of consensus algorithm; • PCSDE models of heavy tails. • Using that Understanding to Develop Improved Protocols • Reduced-delay protocols for wireless networks; • Stable distributed peer-to-peer algorithms; • Stable multipath rate control algorithms; • WiFi protocols with carriers sense and packet length adaptation; Geographical load balancing algorithms for renewables; • Design of robust scheduling algorithms for heavy-tails; • Algorithms for identifying important nodes in large networks; • Algorithms for maintaining secure wireless communications.

  12. 9.00 - 9.40        Barlas Oguz (Berkeley) Network Sharing Bound and Stability of a P2P Protocol 9.40 - 10.20        Avideh Zakhor (Berkeley) Access Delay in IEEE 802.11 10.20 - 10.40        Break 10.40 - 11.20       Assane Gueye (NIST) Cost of Network Security 11.20 - 12.00       Javed Ghaderi (UIUC) Connection-Level Scheduling 12.00 - 1.00        Lunch Break 1.00 - 1.40        Wei Wei (UMASS) Target Tracking with In-network Aggregation 1.40 - 2.20        Bruno Ribeiro (UMASS) Power Laws in Network Analysis 2.20 - 3.00        Somayeh Sojoudi (Caltech) Effect of buffers on stability of Internet congestion control 3.00 - 3.20        Break 3.20 - 4.00        John Doyle (Caltech) Fat tails, hard limits, thin layers 4.00 - 4.20        Feedback and Remarks fromDr. Chang Today’s Agenda

  13. Publications JOURNALS Libin Jiang, Venkat Anantharam and Jean Walrand, ``How Bad are Selfish Investments in Network Security?", IEEE/ACM Transactions on Networking, Vol. 19, No. 2,pp. 549 -560, April 2011. Amin Aminzadeh Gohari and Venkat Anantharam, “Evaluation of Marton's Inner Bound for the General Broadcast Channel”. To appear in IEEE Transactions on Information Theory. Venkat Anantharam and Takis Konstantopoulos, ”Integral representation of Skorokhod reflection,” To appear in Proceedings of the American Mathematical Society. Lijun Chen, Na Li, Steven H. Low and John C. Doyle. “Two Market Models for Demand Response in Power Networks,”IEEE SmartGridComm, 2010 .J. J. Jaramillo, R. Srikant and L. Ying, Scheduling for Optimal Rate Allocation in Ad Hoc Networks with Hetergeneous Delay Constraints, IEEE Journal on Selected Areas in Communications, May 2011. J. J. Jaramillo and R. Srikant, Optimal scheduling for fair resource allocation in ad hoc networks with elastic and inelastic traffic, IEEE/ACM Transactions on Networking, 2011.

  14. Publications JOURNALS J. Ni, R. Srikant and X. Wu. Coloring Spatial Point Processes with Applications to Peer Discovery in Large Wireless Networks, IEEE/ACM Transactions on Networking, April 2011. M. Leconte, J. Ni and R. Srikant, Improved Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks, IEEE/ACM Transactions on Networking, June 2011. Y. Cai, Patrick P. C. Lee, W. Gong, D. Towsley. “Analysis of Traffic Correlation Attacks on Router Queues,” J. Computer Networks, 55(3), 734—747, February 2011. B. Jiang, Y. Cai, D. Towsley. “On the Resource Utilization and Traffic Distribution of MultipathTransmission Control”, to appear in Performance L. Ying, R. Srikant D. Towsley, “Cluster-Based Back-Pressure Routing Algorithm,” IEEE/ACM Trans. on Networking, to appear. (Collaborative effort.) B. Jiang, R. Brockett, W. Gong, D. Towsley. “Stochastic differential equations for power law behaviors”, submitted to J. Applied Probability.

  15. Publications CONFERENCES Krishnan, E. Haghani, A. Zakhor, “Local Estimation of Collision Probabilities in 802.11 WLANs: An Experimental Study," IEEE WCNC 2011, Cancun. Krishnan, and A. Zakhor, “Adaptive Carrier-Sensing for Throughput Improvement in IEEE 802.11 Networks," IEEE GLOBECOM 2010, Miami, FL. A. Zakhor, "A Method for Estimating Access Delay Distribution in IEEE 802.11 Networks," accepted for publication at IEEE GLOBECOM 2011, Houston, TX, December 2011. M. Krishnan, E. Haghani, A. Zakhor, “"Packet Length Adaptation in WLANs with Hidden Nodes and Time-Varying Channels," accepted for publication at IEEE GLOBECOM 2011, Houston, Texas. Somayeh Sojoudi, Steven H. Low and John C. Doyle, "Effects of Buffers on Stability of Internet Congestion Controllers", IEEE International Conference on Computer Communications (INFOCOM), mini conference, China, 2011. Zhenhua Liu, Minghong Lin, Adam Wierman, Steven H. Low and Lachlan L. H. Andrew, "Greening geographic load balancing", Proc. ACM Sigmetrics, 2011

  16. Publications • CONFERENCES • J. Nair, A. Wierman, B. Zwart. “Scheduling for the tail: robustness versus optimality”, Proceedings of Allerton, 2010 (Invited paper) • V. Borkar, J. Nair and N. Sanketh. “Manufacturing consent,” Proceedings of Allerton, 2010 (Invited paper) • Sudeep Kamath and Venkat Anantharam,``A new dual to the Gacs-Korner common information defined via the Gray-Wyner system", Proceedings of the 48th Annual Allerton Conference on Communications, Control and Computing, Urbana, Illinois, September 29 -October 1, 2010. • Naryana Santhanam and Venkat Anantharam, ``What risks lead to ruin", Proceedings of the 48th Annual Allerton Conference on Communications, Control and Computing,Urbana, Illinois, September 29 -October 1, 2010. • Assane Gueye, Jean C. Walrand and Venkat Anantharam. ``Design of Network Topology in an Adversarial Environment", GameSec2010, Conference on Decision and Game Theory for Security, 22 -23 November 2010, Berlin, Germany. • Assane Gueye, Jean C. Walrand, and Venkat Anantharam, “A Network Topology Design Game: How to Choose Communication Links in an Adversarial Environment?”,GameNets2011, 2nd International ICST Conference on Game Theory for Networks, April 16 -18, 2011, Shanghai, China.

  17. Publications CONFERENCES Sudeep U. Kamath, David N. C. Tse, and Venkat Anantharam, “Generalized Network Sharing Bound and the Two-Unicast Problem". NetCod 2011, The 2011 International Symposium on Network Coding, Beijing, China, 25 - 27 July, 2011. T. H. Kim. J. Ni, R. Srikant and N. Vaidya. On the Achievable Throughput of CSMA Under Imperfect Carrier Sensing. Proc. IEEE INFOCOM 2011. L. Jiang, M. Leconte, J. Ni, R. Srikant and J. Walrand. Fast Mixing of Parallel Glauber Dynamics and Low-Delay CSMA Scheduling, Proc. IEEE INFOCOM Mini-Conference 2011. (Collaborative Effort) T. Ji and R. Srikant. Scheduling in Wireless Networks with Connection Arrivals and Departures. Proc. ITA 2011. S Xiao, W Gong, D Towsley. Secure Wireless Communication with Dynamic Secrets. INFOCOM 2010. (runner-up for best paper award) S Xiao, W Gong. Mobility Can Help: Protect User Identity with Dynamic Credentials. 11th International Conference on Mobile Data Management (MDM 2010)

  18. Publications CONFERENCES J. Tan, W. Wei, B. Jiang, N. Shroff, D. Towsley. “Can Multipath Routing Mitigate Power Law Delays? – Effects of Parallelism on Tail Performance, ITC 2010, September 2010. (collaborative effort) B. Ribeiro and D. Towsley. "Estimating and Sampling Graphs with Multidimensional Random Walks", ACM SIGCOMM Internet Measurement Conference, Nov, 2010. W Zeng, X Chen, A Russell, S Vasudevan, B Wang and W Wei, "Neighbor Discovery in Wireless Networks with Multipacket Reception", Proceedings of MobiHoc, Paris, France, May 2011. Y.-s. Lim, B. Ribeiro, D.S. Menasche, P. Basu, D. Towsley. “Online Estimating The Top k Nodes of a Network”, Proc. NSW 2011.

More Related