Social Network Analysis for Communication Networks
|
|
- Garey Carson
- 7 years ago
- Views:
Transcription
1 Social Network Analysis for Communication Networks Instructor: Suzan Bayhan Collaborative Networking (CoNe) Research Group Spring 2015, Seminar
2 Let s consider these questions How does a virus propagate in a group of people? How to tackle with the virus? Which people to vaccinate? For the new product, how can a company speed up its advertising or do viral marketing? Is an ISP s network robust to failures or attacks? Who is a popular person in a group of people? All questions seem to be from different domains but are related in a sense! 2
3 Outline About the seminar Practical Information: Requirements Seminar topics Next weeks schedule 3
4 The common abstraction Network: A simplified representation of a system to an abstract structure [Newman 2010] q Actors q Interactions (Ties) q Phenomena Social network: A network of people or group of people with some social interactions (e.g., friendship, business relations). 4
5 Social Network Analysis (SNA) SNA is a key technique used in many diverse areas from sociology, information science, economics to biological systems. SNA analyzes the relationships among actors of a system, e.g., human beings, corporations, countries, proteins. Structure for a complex system SNA helps understanding Diffusion of a phenomena (e.g., disease, idea, rumor) in a network Key actors in a network ( terrorist networks) Network robustness Capacity of networks (shortest paths, temporal shortest paths) 5
6 This seminar is about q Social network analysis (SNA) q Their application to communication networks: design and analysis Communication networks q Vertex: Routers, ISPs, mobile devices, computers q Edge: data transmission, communication link 6
7 At the end of the seminar You should be able to tell what these terms stand for! And more. 7
8 After the course Students are expected to q have a decent understanding of social network analysis q conduct research on SNA application to communication networks q become familiar with some software for SNA q know how to read/write/review a technical paper 8
9 The instructor expects from you And meet the seminar s successful completion criteria! 9
10 More quantitatively and formally q Pick a topic from the offered topics q Read papers on the topic q Write a report on the topic q Present your paper q Review two other reports written by your classmates q Lead the discussion on the reviewed paper q Attend the lectures (at least 80%) q An assignment to get familiar with the software 10
11 Deadlines for each task (Sharp) Topic selection Report on the topic Review peers Present the paper Jan. 17 Jan. 19 Feb. 13 March 14 Apr. 3 Apr Pick some network data Analyze it with Software Present All can be found on the course web page. Apr. 29 Start researching your topic immediately after topic assignment 11
12 Topic assignment q Submit your list the preferred 5 topics in decreasing order of preference: q If you have something in mind which is not listed in the topics list, please send an to the instructor with a description of what your proposed topic is. q Unfortunately, due to multiple students wishing to take the same topic, you may not be able to get your first preference. q Some topics will be assigned to more than one person. 12
13 Before starting q Pick a tex editor for your report q Pick a drawing software (remember a picture is worth 10K words) q Pick a plotting software (matlab, R, gnuplot etc.) 13
14 Report A report must include the following: 1. Clear explanation of the research domain network model, operation principles 2. Why is the tackled question important? 3. Why is it non-trivial? 4. The main approaches in the literature 5. The main idea/argument of the paper(s) 6. Possible directions (student s perspective) Expected report length is 6-7 pages in the following IEEE trans format. 14
15 For your report 1. Discover interesting papers via scientific search tools (Google Scholar, IEEExplore) 2. Choose high quality publications (IEEE/ACM Transactions on, SIGCOMM, Mobicom, Infocom etc.) 3. Read critically 4. Think what you liked about the paper, their assumptions, approach 5. Summarize the papers using your understanding and present them via attractive figures, tables etc. 6. Think about what would make the paper a better one, possible directions 15
16 Presentation q Introduce the basics of the topic q Make sure the audience can understand your presentation without reading the full papers (still you should read the reports!) q Keep your slides simple and vivid q Be prepared to answer questions from the audience q Before preparing slides, read how to give a good talk document and practice your talk a few times! q Before presenting, meet/communicate with the instructor. q Takeaways: Highlight some main points that you want the audience to get from your talk. 16
17 Reviewing reports q This aims to improve your reviewing skills as well as improving the quality of the reviewed report. q Get familiar with the topic of the reports by reading the related papers. q Before reviewing, read how to make a good review document in the seminar page. 17
18 Revising reports q Each student will receive two reviews q Consider the comments on the review reports seriously q Try to revise accordingly 18
19 Resources for reading/writing/ reviewing papers q Writing is an art, but can be learned/improved. q Your aim is to convey your ideas, not to make complicated, artistic sentences (sometimes can be). q Keep sentences simple and easy-to-understand. q Rules to write a good research paper by D.Lemire q How to read a paper? by S. Keshav q How to give a good talk by Simon Peyton-Jones q Notes on Reviewing Papers q Mendeley for organizing your soft-library 19
20 Assignment for SNA using a software q Application of what you learnt about SNA q Find some network data o Your own data or o Publicly available data such as and o Not very large or small network q Derive graph metrics using software q Short presentation on these metrics 20
21 q Paper report 40% q Presentation: 30% q Reviews: 5% Grading policy q Class participation: 10% q Project assignment: 15% q Missed deadlines: not accepted. q Plagiarism is unethical. Don t copy, be a good writer : Read the following on plagiarism 21
22 Topics All related research that: q Analyze a network using SNA q Design a network protocol/scheme using SNA 22
23 Topics 1. Information-centric networking (ICN, CCN) 2. Delay tolerant networks (DTNs), mobile ad hoc networks (MANETs) 3. Peer-to-peer Networks (P2P) 4. Temporal Networks and Temporal Metrics 5. Network Robustness and Criticality 6. Internet (ISPs, ASs, BGP) 7. Heterogeneous networks (HetNets) and Small Cells 8. Data Center Networks and Cloud Computing 9. Device-to-Device Communications (D2D) 10. Your own proposal (have to be discussed with the instructor) 23
24 Information-centric networking q Host-to-host communication to content centric approach q We are more interested in the content not who provides it! q YouTube, FaceBook q How to serve the customers with high efficiency (e.g., fast and with low cost) and securely? q Popular contents caching q Naming of the contents 24
25 Delay tolerant networks (DTNs), mobile ad hoc networks (MANETs) q No stable infrastructure or endto-end connectivity q Exploit the mobility q Nodes store-carry-forward the packets q Difficult to ensure delayguarantees à delay-tolerant q Wild-life tracking, inter-space, under-water communications q Mobility modeling q Opportunistic communication 25
26 Peer-to-peer networks (P2P) q Each computing device can act as both a client and a server q Distributed architecture (no single-point-of-failure) q Self-organizing network q File sharing systems q Understanding of the evolution of networks q Understanding the network structure q Designing fast and reliable architectures 26
27 Temporal networks & temporal metrics q Networks are not always static but time-evolving. q For these graphs, temporal networks are better representation q Static graph metrics vs. temporal graph metrics q Use of these temporal metrics in real world networks Network topology at time t Time (second, minute, day) 27
28 Network robustness and criticality Is a network robust to q Malfunctioning q Attacks q Local failures q Global failures q How to measure? q Which parts/edges/links of the network are more critical? 28
29 Internet (ISPs, ASs, BGP) Very broad term but this topic is more about the large scale Internet, such as ASs, ISPs, BGP 29
30 Heterogeneous networks (HetNets) q A mix of radio technologies (macro cells, small cells) q Each radio technology has its own advantages for specific scenarios q Macrocell à wide coverage, high power consumption q Small cells à small coverage, spectrum re-use, lower power consumption q How to decide on the best operation mode and optimize resource allocation? q Co-existence of different technologies 30
31 Data center networks &cloud computing q Dumb end-devices became smart (smart phones) q Computation moving from edge to the cloud q Cloud computing q Data centers: any large, dedicated cluster of computers that is owned and operated by a single organization.* q Energy consumption, resource scheduling, robustness *Network Traffic Characteristics of Data Centers in the Wild, Theophilus Benson, Aditya Akella, and David A. Maltz, ACM IMC
32 Device-to-device communications (D2D) Rather than following the cellular core network, communicate directly, i.e., device-to-device. Increased q spectrum efficiency q energy efficiency q cellular coverage Fig. 1. Representative use-cases of D2D communications in cellular networks. Image from: Arash Asadi et al. A Survey on Device-to-Device Communication in Cellular Networks, IEEE Communication Surveys and Tutorials,
33 Course page Seminar dates and meeting place: Wed 12:15-14 C Wed 12:15-14 C q We do NOT have meetings every week. Please check the schedule to see the meeting dates. q Please check regularly for the announcements: q My contact details: q Office hours: Friday Exactum q mysurname at hiit.fi 33
34 Important dates 34
35 Questions? Comments? 35
Peer-to-Peer Networks
Peer-to-Peer Networks Chapter 1: Introduction Jussi Kangasharju Chapter Outline Course outline and practical matters Peer-to-peer (P2P) overview Definition of P2P What is P2P and how it is different from
More informationIC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>
IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration
More informationStudy And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationThe Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public
The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationAnalysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor
More informationMINFS544: Business Network Data Analytics and Applications
MINFS544: Business Network Data Analytics and Applications March 30 th, 2015 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in
More informationSecurity Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network
Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network Bondu Raja PG Scholar, Vignana Bharathi Institute of Technology, Hyderabad, Telngana, India. Ch.Suneetha AssociateProfessor, Vignana
More informationGiving life to today s media distribution services
Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of
More informationAdapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationMultihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
More informationConference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING
Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future
More informationDD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
More informationOutline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationHow To Understand The Power Of Icdn
MobiArch 2014 R-iCDN: an Approach Supporting Flexible Content Routing for ISP-operated CDN Song Ci High Performance Network Lab, Institute of Acoustics, Chinese Academy of Sciences Outline I. Background
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationLocation Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
More informationEE627 Lecture 22. Multihoming Route Control Devices
EE627 Lecture 22 Multihoming Route Control Devices 1 Multihoming Connect to multiple ISPs Provide reliability from access link/isp failures Potential for load balancing Intelligent Route Control Devices
More informationLecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage
Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationCollapse by Cascading Failures in Hybrid Attacked Regional Internet
Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract
More informationfor guaranteed IP datagram routing
Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation
More informationDoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech
More informationSeminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area
Seminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area Kari Smolander kari.smolander@aalto.fi Course details Topic area Objectives
More informationA Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations Suresh Babu Panatula Department of Computer Science and Engineering Sri Sai Aditya Institute of Science and Technology,
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationOn Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks
On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University
More informationIntroduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February
More informationExperimental 3D Animation Spring 2013 ASTU 3460
Experimental 3D Animation Spring 2013 ASTU 3460 Professor: Morehshin Allahyari Email: ma0349@unt.edu Class Times: Tuesdays and Thursdays, 11 AM - 2 PM Class Location: Curry Hall, Room #306 Office Hours:
More informationInternational Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 8 Issue 1 APRIL 2014.
IMPROVING LINK UTILIZATION IN DATA CENTER NETWORK USING NEAR OPTIMAL TRAFFIC ENGINEERING TECHNIQUES L. Priyadharshini 1, S. Rajanarayanan, M.E (Ph.D) 2 1 Final Year M.E-CSE, 2 Assistant Professor 1&2 Selvam
More informationSocial Network Analysis using Graph Metrics of Web-based Social Networks
Social Network Analysis using Graph Metrics of Web-based Social Networks Robert Hilbrich Department of Computer Science Humboldt Universität Berlin November 27, 2007 1 / 25 ... taken from http://mynetworkvalue.com/
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationResearch Topics on Information-Centric Networking: Caching, Routing and Virtualization
Research Topics on Information-Centric Networking: Caching, Routing and Virtualization Thomas Silverston JFLI, Japanese-French Laboratory for Informatics (CNRS UMI3527) The University of Tokyo May, 21
More informationInter-domain Routing. Outline. Border Gateway Protocol
Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small
More informationGraph Mining Techniques for Social Media Analysis
Graph Mining Techniques for Social Media Analysis Mary McGlohon Christos Faloutsos 1 1-1 What is graph mining? Extracting useful knowledge (patterns, outliers, etc.) from structured data that can be represented
More informationPERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
More informationOutline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More information1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
More informationKeywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5
Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study
More informationModeling of Corporate Network Performance and Smoothing Spline Interpolation
American Journal of Signal Processing 2014, 4(2): 60-64 DOI: 10.5923/j.ajsp.20140402.03 Modeling of Corporate Network Performance and Smoothing Spline Interpolation Ali Danladi 1,*, Silas N. Edwin 2 1
More informationActive ISP Involvement in Content-Centric Future Internet. 2013.01.23 Eugene Kim
Active ISP Involvement in Content-Centric Future Internet 2013.01.23 Eugene Kim 1 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 Paris, France, February 7-10, 2011.
More informationHow To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)
Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationHadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
More informationStudent Writing Guide. Fall 2009. Lab Reports
Student Writing Guide Fall 2009 Lab Reports The manuscript has been written three times, and each rewriting has discovered errors. Many must still remain; the improvement of the part is sacrificed to the
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationLesson Plan. Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media. Performance Objective:
Lesson Plan Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media Performance Objective: After completing this lesson, the student will understand that Advertising
More informationSocial-Sensed Multimedia Computing
Social-Sensed Multimedia Computing Wenwu Zhu Tsinghua University Multimedia Computing Search Recommend Multimedia Summarize Social Distribution... Sense from Social Preference Influence User behaviors
More information6306 Advanced Operating Systems
6306 Advanced Operating Systems Instructor : Dr. Mohan Kumar Room : 315 NH kumar@cse.uta.edu Class : TTh 7-8:20PM Office Hours : TTh1-3 PM GTA : Byung Sung sung@cse.uta.edu Kumar CSE@UTA 1 All email messages
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationOPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
More informationTraffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012
Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 January 29th, 2008 Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. way-back machine Web 1998 way-back
More informationA survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
More informationPerformance and Scalability of Self-Organizing Hierarchical Ad Hoc Wireless Networks
Performance and Scalability of Self-Organizing archical Ad Hoc Wireless Networks Suli Zhao, Ivan Seskar and Dipankar Raychaudhuri WINLAB, Rutgers University 7 Brett Road, Piscataway, NJ 8854 {sulizhao,
More informationHow To Make A Route Map On Bpg More Efficient
NIRA: A New Inter-Domain Routing Architecture Xiaowei Yang, David Clark, Arthur W. Berger Rachit Agarwal (Results are by others, any errors are by me) ( Animated slides shamelessly stolen from Prasad s
More informationEvolution of Peer-to-Peer Systems
EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor
More informationMobile broadband. Trends and future evolution. LUIS MUCHACHO MBB Customer Solutions
Mobile broadband Trends and future evolution LUIS MUCHACHO MBB Customer Solutions Mobile Broadband - Trends and Future Evolution Commercial in confidence 2014-05-29 Page 1 Working with customers in >180
More informationStability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
More informationReliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems
Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems Debessay Fesehaye, Shameem Ahmed,Thadpong Pongthawornkamol, Klara Nahrstedt and Guijun Wang Dept. of Computer Science, University
More informationDisaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationAd hoc and Sensor Networks Chapter 1: Motivation & Applications
Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Give an understanding what ad hoc & sensor networks are good
More informationBusiness Management MKT 829 International Sport Marketing
Business Management MKT 829 International Sport Marketing INSTRUCTOR INFORMATION Name: Fernando E. Pardo Office Telephone Number: 416-979-5000, ext.7504 E-mail Address: fpardo@ryerson.ca Office Location:
More informationPerformance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
More informationTowards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationSocial Influence Analysis in Social Networking Big Data: Opportunities and Challenges. Presenter: Sancheng Peng Zhaoqing University
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges Presenter: Sancheng Peng Zhaoqing University 1 2 3 4 35 46 7 Contents Introduction Relationship between SIA and BD
More informationThe Effect of Caches for Mobile Broadband Internet Access
The Effect of s for Mobile Jochen Eisl, Nokia Siemens Networks, Munich, Germany Haßlinger, Deutsche Telekom Technik,, Darmstadt, Germany IP-based content delivery: CDN & cache architecture Impact of access
More informationSoftware Development and Evolution
Software Development and Evolution Seminar in Advanced Software Engineering, FS 2016 Thomas Fritz & André Meyer Organizational Announcements 3 rd year and up (prerequisite: Software Engineering) Language
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationChapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks
Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing
More informationSocial Network Mining
Social Network Mining Data Mining November 11, 2013 Frank Takes (ftakes@liacs.nl) LIACS, Universiteit Leiden Overview Social Network Analysis Graph Mining Online Social Networks Friendship Graph Semantics
More informationExperimental research on communication networks at CTTC The ADRENALINE and EXTREME testbeds
Experimental research on communication networks at CTTC The ADRENALINE and EXTREME testbeds Josep Mangues-Bafalluy and Raül Muñoz Communication Networks Division Centre Tecnològic de Telecomunicacions
More informationA Study of YouTube recommendation graph based on measurements and stochastic tools
A Study of YouTube recommendation graph based on measurements and stochastic tools Yonathan Portilla, Alexandre Reiffers, Eitan Altman, Rachid El-Azouzi ABSTRACT The Youtube recommendation is one the most
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationNetwork Edge Services
ONR BAA 10-018 Industry Day: 2010-May-21 Joseph Macker Brian Adamson Nathan Smith Naval Research Laboratory Information Technology Division, Code 5522 Joseph.Macker@nrl.navy.mil Brian.Adamson@nrl.navy.mil
More informationNetwork Security. Mobin Javed. October 5, 2011
Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways
More informationAdministrative Distance
RIP is a distance vector routing protocol. It shares routing information through the local broadcast in every 30 seconds. In this tutorial we will explain RIP routing fundamentals with examples such as
More informationMPLS Architecture for evaluating end-to-end delivery
International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-
More informationDesigning Delay-Tolerant Data Services for the. Network of Things
Designing Delay-Tolerant Data Services for the Daniel Austin Interstellar Travel, Inc. daniel@thestarsmydestination.com Network of Things 1st Annual Big Data Innovation Summit Big Ideas for Today s Talk
More informationThe HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: 2013 2020 With an Evaluation of DAS & Cloud
The HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: 2013 2020 Revision Date: 10 May 2013 2.1.3 HetNets: An Evolution of Network Topology Driven by both
More informationA Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
More informationData Center Network Structure using Hybrid Optoelectronic Routers
Data Center Network Structure using Hybrid Optoelectronic Routers Yuichi Ohsita, and Masayuki Murata Graduate School of Information Science and Technology, Osaka University Osaka, Japan {y-ohsita, murata}@ist.osaka-u.ac.jp
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationCS6204 Advanced Topics in Networking
CS6204 Advanced Topics in Networking Assoc Prof. Chan Mun Choon School of Computing National University of Singapore Aug 14, 2015 CS6204 Lecturer Chan Mun Choon Office: COM2, #04-17 Email: chanmc@comp.nus.edu.sg
More informationUNIVERSITY OF MICHIGAN SCHOOL OF INFORMATION SI301: Models of Social Information Processing Syllabus
UNIVERSITY OF MICHIGAN SCHOOL OF INFORMATION SI301: Models of Social Information Processing Syllabus Instructor: Office: Office hours: GSI: Office Hours: Course Email: WebSite: Tanya Rosenblat < trosenbl@umich.edu>
More informationEnergy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
More informationThe Internet of the future: What could it be and what are the challenges
The Internet of the future: What could it be and what are the challenges Daniel Kofman Prof. at Telecom ParisTech CTO RAD Data Communications 1st Japan EU Symposium on the "New Generation Network" and
More informationBloom Filter based Inter-domain Name Resolution: A Feasibility Study
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN
More informationPolitecnico di Milano Advanced Network Technologies Laboratory
Politecnico di Milano Advanced Network Technologies Laboratory Energy and Mobility: Scalable Solutions for the Mobile Data Explosion Antonio Capone TIA 2012 GreenTouch Open Forum June 6, 2012 Energy consumption
More informationOutline. 15-744: Computer Networking. Narrow Waist of the Internet Key to its Success. NSF Future Internet Architecture
Outline 15-744: Computer Networking L-15 Future Internet Architecture 2 Motivation and discussion Some proposals: CCN Nebula Mobility First XIA XIA overview AIP Scion 2 NSF Future Internet Architecture
More informationNetwork analysis for context and content oriented wireless networking
Network analysis for context and content oriented wireless networking Katia Jaffrès-Runser University of Toulouse, INPT-ENSEEIHT, IRIT lab, IRT Team Ecole des sciences avancées de Luchon Network analysis
More informationEvolution to 5G: An operator's perspective
Evolution to 5G: An operator's perspective Dr. Ivo Maljevic TELUS team IEEE 5G Summit Nov 2015 Cellular Standards Evolution 2? 1980 1G 1990 2G 2000 3G 2010-4G 2020 5G Analog systems Large terminals Several
More informationIntelligent connectivity enablers for converged heterogeneous 5G-IoT ecosystem
Intelligent connectivity enablers for converged heterogeneous 5G-IoT ecosystem Dr. Sergey Andreev W.I.N.T.E.R. Group, Tampere University of Technology, Finland http://winter-group.net/ [sergey.andreev@tut.fi]
More information