Social Network Analysis for Communication Networks

Size: px
Start display at page:

Download "Social Network Analysis for Communication Networks"

Transcription

1 Social Network Analysis for Communication Networks Instructor: Suzan Bayhan Collaborative Networking (CoNe) Research Group Spring 2015, Seminar

2 Let s consider these questions How does a virus propagate in a group of people? How to tackle with the virus? Which people to vaccinate? For the new product, how can a company speed up its advertising or do viral marketing? Is an ISP s network robust to failures or attacks? Who is a popular person in a group of people? All questions seem to be from different domains but are related in a sense! 2

3 Outline About the seminar Practical Information: Requirements Seminar topics Next weeks schedule 3

4 The common abstraction Network: A simplified representation of a system to an abstract structure [Newman 2010] q Actors q Interactions (Ties) q Phenomena Social network: A network of people or group of people with some social interactions (e.g., friendship, business relations). 4

5 Social Network Analysis (SNA) SNA is a key technique used in many diverse areas from sociology, information science, economics to biological systems. SNA analyzes the relationships among actors of a system, e.g., human beings, corporations, countries, proteins. Structure for a complex system SNA helps understanding Diffusion of a phenomena (e.g., disease, idea, rumor) in a network Key actors in a network ( terrorist networks) Network robustness Capacity of networks (shortest paths, temporal shortest paths) 5

6 This seminar is about q Social network analysis (SNA) q Their application to communication networks: design and analysis Communication networks q Vertex: Routers, ISPs, mobile devices, computers q Edge: data transmission, communication link 6

7 At the end of the seminar You should be able to tell what these terms stand for! And more. 7

8 After the course Students are expected to q have a decent understanding of social network analysis q conduct research on SNA application to communication networks q become familiar with some software for SNA q know how to read/write/review a technical paper 8

9 The instructor expects from you And meet the seminar s successful completion criteria! 9

10 More quantitatively and formally q Pick a topic from the offered topics q Read papers on the topic q Write a report on the topic q Present your paper q Review two other reports written by your classmates q Lead the discussion on the reviewed paper q Attend the lectures (at least 80%) q An assignment to get familiar with the software 10

11 Deadlines for each task (Sharp) Topic selection Report on the topic Review peers Present the paper Jan. 17 Jan. 19 Feb. 13 March 14 Apr. 3 Apr Pick some network data Analyze it with Software Present All can be found on the course web page. Apr. 29 Start researching your topic immediately after topic assignment 11

12 Topic assignment q Submit your list the preferred 5 topics in decreasing order of preference: q If you have something in mind which is not listed in the topics list, please send an to the instructor with a description of what your proposed topic is. q Unfortunately, due to multiple students wishing to take the same topic, you may not be able to get your first preference. q Some topics will be assigned to more than one person. 12

13 Before starting q Pick a tex editor for your report q Pick a drawing software (remember a picture is worth 10K words) q Pick a plotting software (matlab, R, gnuplot etc.) 13

14 Report A report must include the following: 1. Clear explanation of the research domain network model, operation principles 2. Why is the tackled question important? 3. Why is it non-trivial? 4. The main approaches in the literature 5. The main idea/argument of the paper(s) 6. Possible directions (student s perspective) Expected report length is 6-7 pages in the following IEEE trans format. 14

15 For your report 1. Discover interesting papers via scientific search tools (Google Scholar, IEEExplore) 2. Choose high quality publications (IEEE/ACM Transactions on, SIGCOMM, Mobicom, Infocom etc.) 3. Read critically 4. Think what you liked about the paper, their assumptions, approach 5. Summarize the papers using your understanding and present them via attractive figures, tables etc. 6. Think about what would make the paper a better one, possible directions 15

16 Presentation q Introduce the basics of the topic q Make sure the audience can understand your presentation without reading the full papers (still you should read the reports!) q Keep your slides simple and vivid q Be prepared to answer questions from the audience q Before preparing slides, read how to give a good talk document and practice your talk a few times! q Before presenting, meet/communicate with the instructor. q Takeaways: Highlight some main points that you want the audience to get from your talk. 16

17 Reviewing reports q This aims to improve your reviewing skills as well as improving the quality of the reviewed report. q Get familiar with the topic of the reports by reading the related papers. q Before reviewing, read how to make a good review document in the seminar page. 17

18 Revising reports q Each student will receive two reviews q Consider the comments on the review reports seriously q Try to revise accordingly 18

19 Resources for reading/writing/ reviewing papers q Writing is an art, but can be learned/improved. q Your aim is to convey your ideas, not to make complicated, artistic sentences (sometimes can be). q Keep sentences simple and easy-to-understand. q Rules to write a good research paper by D.Lemire q How to read a paper? by S. Keshav q How to give a good talk by Simon Peyton-Jones q Notes on Reviewing Papers q Mendeley for organizing your soft-library 19

20 Assignment for SNA using a software q Application of what you learnt about SNA q Find some network data o Your own data or o Publicly available data such as and o Not very large or small network q Derive graph metrics using software q Short presentation on these metrics 20

21 q Paper report 40% q Presentation: 30% q Reviews: 5% Grading policy q Class participation: 10% q Project assignment: 15% q Missed deadlines: not accepted. q Plagiarism is unethical. Don t copy, be a good writer : Read the following on plagiarism 21

22 Topics All related research that: q Analyze a network using SNA q Design a network protocol/scheme using SNA 22

23 Topics 1. Information-centric networking (ICN, CCN) 2. Delay tolerant networks (DTNs), mobile ad hoc networks (MANETs) 3. Peer-to-peer Networks (P2P) 4. Temporal Networks and Temporal Metrics 5. Network Robustness and Criticality 6. Internet (ISPs, ASs, BGP) 7. Heterogeneous networks (HetNets) and Small Cells 8. Data Center Networks and Cloud Computing 9. Device-to-Device Communications (D2D) 10. Your own proposal (have to be discussed with the instructor) 23

24 Information-centric networking q Host-to-host communication to content centric approach q We are more interested in the content not who provides it! q YouTube, FaceBook q How to serve the customers with high efficiency (e.g., fast and with low cost) and securely? q Popular contents caching q Naming of the contents 24

25 Delay tolerant networks (DTNs), mobile ad hoc networks (MANETs) q No stable infrastructure or endto-end connectivity q Exploit the mobility q Nodes store-carry-forward the packets q Difficult to ensure delayguarantees à delay-tolerant q Wild-life tracking, inter-space, under-water communications q Mobility modeling q Opportunistic communication 25

26 Peer-to-peer networks (P2P) q Each computing device can act as both a client and a server q Distributed architecture (no single-point-of-failure) q Self-organizing network q File sharing systems q Understanding of the evolution of networks q Understanding the network structure q Designing fast and reliable architectures 26

27 Temporal networks & temporal metrics q Networks are not always static but time-evolving. q For these graphs, temporal networks are better representation q Static graph metrics vs. temporal graph metrics q Use of these temporal metrics in real world networks Network topology at time t Time (second, minute, day) 27

28 Network robustness and criticality Is a network robust to q Malfunctioning q Attacks q Local failures q Global failures q How to measure? q Which parts/edges/links of the network are more critical? 28

29 Internet (ISPs, ASs, BGP) Very broad term but this topic is more about the large scale Internet, such as ASs, ISPs, BGP 29

30 Heterogeneous networks (HetNets) q A mix of radio technologies (macro cells, small cells) q Each radio technology has its own advantages for specific scenarios q Macrocell à wide coverage, high power consumption q Small cells à small coverage, spectrum re-use, lower power consumption q How to decide on the best operation mode and optimize resource allocation? q Co-existence of different technologies 30

31 Data center networks &cloud computing q Dumb end-devices became smart (smart phones) q Computation moving from edge to the cloud q Cloud computing q Data centers: any large, dedicated cluster of computers that is owned and operated by a single organization.* q Energy consumption, resource scheduling, robustness *Network Traffic Characteristics of Data Centers in the Wild, Theophilus Benson, Aditya Akella, and David A. Maltz, ACM IMC

32 Device-to-device communications (D2D) Rather than following the cellular core network, communicate directly, i.e., device-to-device. Increased q spectrum efficiency q energy efficiency q cellular coverage Fig. 1. Representative use-cases of D2D communications in cellular networks. Image from: Arash Asadi et al. A Survey on Device-to-Device Communication in Cellular Networks, IEEE Communication Surveys and Tutorials,

33 Course page Seminar dates and meeting place: Wed 12:15-14 C Wed 12:15-14 C q We do NOT have meetings every week. Please check the schedule to see the meeting dates. q Please check regularly for the announcements: q My contact details: q Office hours: Friday Exactum q mysurname at hiit.fi 33

34 Important dates 34

35 Questions? Comments? 35

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks Chapter 1: Introduction Jussi Kangasharju Chapter Outline Course outline and practical matters Peer-to-peer (P2P) overview Definition of P2P What is P2P and how it is different from

More information

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com> IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

MINFS544: Business Network Data Analytics and Applications

MINFS544: Business Network Data Analytics and Applications MINFS544: Business Network Data Analytics and Applications March 30 th, 2015 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in

More information

Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network

Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network Bondu Raja PG Scholar, Vignana Bharathi Institute of Technology, Hyderabad, Telngana, India. Ch.Suneetha AssociateProfessor, Vignana

More information

Giving life to today s media distribution services

Giving life to today s media distribution services Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future

More information

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in

More information

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

How To Understand The Power Of Icdn

How To Understand The Power Of Icdn MobiArch 2014 R-iCDN: an Approach Supporting Flexible Content Routing for ISP-operated CDN Song Ci High Performance Network Lab, Institute of Acoustics, Chinese Academy of Sciences Outline I. Background

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

EE627 Lecture 22. Multihoming Route Control Devices

EE627 Lecture 22. Multihoming Route Control Devices EE627 Lecture 22 Multihoming Route Control Devices 1 Multihoming Connect to multiple ISPs Provide reliability from access link/isp failures Potential for load balancing Intelligent Route Control Devices

More information

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

Collapse by Cascading Failures in Hybrid Attacked Regional Internet Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract

More information

for guaranteed IP datagram routing

for guaranteed IP datagram routing Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation

More information

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech

More information

Seminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area

Seminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area Seminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area Kari Smolander kari.smolander@aalto.fi Course details Topic area Objectives

More information

A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations

A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations Suresh Babu Panatula Department of Computer Science and Engineering Sri Sai Aditya Institute of Science and Technology,

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

Experimental 3D Animation Spring 2013 ASTU 3460

Experimental 3D Animation Spring 2013 ASTU 3460 Experimental 3D Animation Spring 2013 ASTU 3460 Professor: Morehshin Allahyari Email: ma0349@unt.edu Class Times: Tuesdays and Thursdays, 11 AM - 2 PM Class Location: Curry Hall, Room #306 Office Hours:

More information

International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 8 Issue 1 APRIL 2014.

International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 8 Issue 1 APRIL 2014. IMPROVING LINK UTILIZATION IN DATA CENTER NETWORK USING NEAR OPTIMAL TRAFFIC ENGINEERING TECHNIQUES L. Priyadharshini 1, S. Rajanarayanan, M.E (Ph.D) 2 1 Final Year M.E-CSE, 2 Assistant Professor 1&2 Selvam

More information

Social Network Analysis using Graph Metrics of Web-based Social Networks

Social Network Analysis using Graph Metrics of Web-based Social Networks Social Network Analysis using Graph Metrics of Web-based Social Networks Robert Hilbrich Department of Computer Science Humboldt Universität Berlin November 27, 2007 1 / 25 ... taken from http://mynetworkvalue.com/

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Research Topics on Information-Centric Networking: Caching, Routing and Virtualization

Research Topics on Information-Centric Networking: Caching, Routing and Virtualization Research Topics on Information-Centric Networking: Caching, Routing and Virtualization Thomas Silverston JFLI, Japanese-French Laboratory for Informatics (CNRS UMI3527) The University of Tokyo May, 21

More information

Inter-domain Routing. Outline. Border Gateway Protocol

Inter-domain Routing. Outline. Border Gateway Protocol Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small

More information

Graph Mining Techniques for Social Media Analysis

Graph Mining Techniques for Social Media Analysis Graph Mining Techniques for Social Media Analysis Mary McGlohon Christos Faloutsos 1 1-1 What is graph mining? Extracting useful knowledge (patterns, outliers, etc.) from structured data that can be represented

More information

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET

More information

Outline. Outline. Outline

Outline. Outline. Outline Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance

More information

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5 Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study

More information

Modeling of Corporate Network Performance and Smoothing Spline Interpolation

Modeling of Corporate Network Performance and Smoothing Spline Interpolation American Journal of Signal Processing 2014, 4(2): 60-64 DOI: 10.5923/j.ajsp.20140402.03 Modeling of Corporate Network Performance and Smoothing Spline Interpolation Ali Danladi 1,*, Silas N. Edwin 2 1

More information

Active ISP Involvement in Content-Centric Future Internet. 2013.01.23 Eugene Kim

Active ISP Involvement in Content-Centric Future Internet. 2013.01.23 Eugene Kim Active ISP Involvement in Content-Centric Future Internet 2013.01.23 Eugene Kim 1 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 Paris, France, February 7-10, 2011.

More information

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As) Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Hadoop Technology for Flow Analysis of the Internet Traffic

Hadoop Technology for Flow Analysis of the Internet Traffic Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet

More information

Student Writing Guide. Fall 2009. Lab Reports

Student Writing Guide. Fall 2009. Lab Reports Student Writing Guide Fall 2009 Lab Reports The manuscript has been written three times, and each rewriting has discovered errors. Many must still remain; the improvement of the part is sacrificed to the

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Lesson Plan. Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media. Performance Objective:

Lesson Plan. Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media. Performance Objective: Lesson Plan Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media Performance Objective: After completing this lesson, the student will understand that Advertising

More information

Social-Sensed Multimedia Computing

Social-Sensed Multimedia Computing Social-Sensed Multimedia Computing Wenwu Zhu Tsinghua University Multimedia Computing Search Recommend Multimedia Summarize Social Distribution... Sense from Social Preference Influence User behaviors

More information

6306 Advanced Operating Systems

6306 Advanced Operating Systems 6306 Advanced Operating Systems Instructor : Dr. Mohan Kumar Room : 315 NH kumar@cse.uta.edu Class : TTh 7-8:20PM Office Hours : TTh1-3 PM GTA : Byung Sung sung@cse.uta.edu Kumar CSE@UTA 1 All email messages

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 January 29th, 2008 Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. way-back machine Web 1998 way-back

More information

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

Performance and Scalability of Self-Organizing Hierarchical Ad Hoc Wireless Networks

Performance and Scalability of Self-Organizing Hierarchical Ad Hoc Wireless Networks Performance and Scalability of Self-Organizing archical Ad Hoc Wireless Networks Suli Zhao, Ivan Seskar and Dipankar Raychaudhuri WINLAB, Rutgers University 7 Brett Road, Piscataway, NJ 8854 {sulizhao,

More information

How To Make A Route Map On Bpg More Efficient

How To Make A Route Map On Bpg More Efficient NIRA: A New Inter-Domain Routing Architecture Xiaowei Yang, David Clark, Arthur W. Berger Rachit Agarwal (Results are by others, any errors are by me) ( Animated slides shamelessly stolen from Prasad s

More information

Evolution of Peer-to-Peer Systems

Evolution of Peer-to-Peer Systems EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor

More information

Mobile broadband. Trends and future evolution. LUIS MUCHACHO MBB Customer Solutions

Mobile broadband. Trends and future evolution. LUIS MUCHACHO MBB Customer Solutions Mobile broadband Trends and future evolution LUIS MUCHACHO MBB Customer Solutions Mobile Broadband - Trends and Future Evolution Commercial in confidence 2014-05-29 Page 1 Working with customers in >180

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems

Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems Debessay Fesehaye, Shameem Ahmed,Thadpong Pongthawornkamol, Klara Nahrstedt and Guijun Wang Dept. of Computer Science, University

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Give an understanding what ad hoc & sensor networks are good

More information

Business Management MKT 829 International Sport Marketing

Business Management MKT 829 International Sport Marketing Business Management MKT 829 International Sport Marketing INSTRUCTOR INFORMATION Name: Fernando E. Pardo Office Telephone Number: 416-979-5000, ext.7504 E-mail Address: fpardo@ryerson.ca Office Location:

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

Towards Modelling The Internet Topology The Interactive Growth Model

Towards Modelling The Internet Topology The Interactive Growth Model Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. Presenter: Sancheng Peng Zhaoqing University

Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. Presenter: Sancheng Peng Zhaoqing University Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges Presenter: Sancheng Peng Zhaoqing University 1 2 3 4 35 46 7 Contents Introduction Relationship between SIA and BD

More information

The Effect of Caches for Mobile Broadband Internet Access

The Effect of Caches for Mobile Broadband Internet Access The Effect of s for Mobile Jochen Eisl, Nokia Siemens Networks, Munich, Germany Haßlinger, Deutsche Telekom Technik,, Darmstadt, Germany IP-based content delivery: CDN & cache architecture Impact of access

More information

Software Development and Evolution

Software Development and Evolution Software Development and Evolution Seminar in Advanced Software Engineering, FS 2016 Thomas Fritz & André Meyer Organizational Announcements 3 rd year and up (prerequisite: Software Engineering) Language

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing

More information

Social Network Mining

Social Network Mining Social Network Mining Data Mining November 11, 2013 Frank Takes (ftakes@liacs.nl) LIACS, Universiteit Leiden Overview Social Network Analysis Graph Mining Online Social Networks Friendship Graph Semantics

More information

Experimental research on communication networks at CTTC The ADRENALINE and EXTREME testbeds

Experimental research on communication networks at CTTC The ADRENALINE and EXTREME testbeds Experimental research on communication networks at CTTC The ADRENALINE and EXTREME testbeds Josep Mangues-Bafalluy and Raül Muñoz Communication Networks Division Centre Tecnològic de Telecomunicacions

More information

A Study of YouTube recommendation graph based on measurements and stochastic tools

A Study of YouTube recommendation graph based on measurements and stochastic tools A Study of YouTube recommendation graph based on measurements and stochastic tools Yonathan Portilla, Alexandre Reiffers, Eitan Altman, Rachid El-Azouzi ABSTRACT The Youtube recommendation is one the most

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Network Edge Services

Network Edge Services ONR BAA 10-018 Industry Day: 2010-May-21 Joseph Macker Brian Adamson Nathan Smith Naval Research Laboratory Information Technology Division, Code 5522 Joseph.Macker@nrl.navy.mil Brian.Adamson@nrl.navy.mil

More information

Network Security. Mobin Javed. October 5, 2011

Network Security. Mobin Javed. October 5, 2011 Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways

More information

Administrative Distance

Administrative Distance RIP is a distance vector routing protocol. It shares routing information through the local broadcast in every 30 seconds. In this tutorial we will explain RIP routing fundamentals with examples such as

More information

MPLS Architecture for evaluating end-to-end delivery

MPLS Architecture for evaluating end-to-end delivery International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-

More information

Designing Delay-Tolerant Data Services for the. Network of Things

Designing Delay-Tolerant Data Services for the. Network of Things Designing Delay-Tolerant Data Services for the Daniel Austin Interstellar Travel, Inc. daniel@thestarsmydestination.com Network of Things 1st Annual Big Data Innovation Summit Big Ideas for Today s Talk

More information

The HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: 2013 2020 With an Evaluation of DAS & Cloud

The HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: 2013 2020 With an Evaluation of DAS & Cloud The HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: 2013 2020 Revision Date: 10 May 2013 2.1.3 HetNets: An Evolution of Network Topology Driven by both

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

Data Center Network Structure using Hybrid Optoelectronic Routers

Data Center Network Structure using Hybrid Optoelectronic Routers Data Center Network Structure using Hybrid Optoelectronic Routers Yuichi Ohsita, and Masayuki Murata Graduate School of Information Science and Technology, Osaka University Osaka, Japan {y-ohsita, murata}@ist.osaka-u.ac.jp

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

CS6204 Advanced Topics in Networking

CS6204 Advanced Topics in Networking CS6204 Advanced Topics in Networking Assoc Prof. Chan Mun Choon School of Computing National University of Singapore Aug 14, 2015 CS6204 Lecturer Chan Mun Choon Office: COM2, #04-17 Email: chanmc@comp.nus.edu.sg

More information

UNIVERSITY OF MICHIGAN SCHOOL OF INFORMATION SI301: Models of Social Information Processing Syllabus

UNIVERSITY OF MICHIGAN SCHOOL OF INFORMATION SI301: Models of Social Information Processing Syllabus UNIVERSITY OF MICHIGAN SCHOOL OF INFORMATION SI301: Models of Social Information Processing Syllabus Instructor: Office: Office hours: GSI: Office Hours: Course Email: WebSite: Tanya Rosenblat < trosenbl@umich.edu>

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

The Internet of the future: What could it be and what are the challenges

The Internet of the future: What could it be and what are the challenges The Internet of the future: What could it be and what are the challenges Daniel Kofman Prof. at Telecom ParisTech CTO RAD Data Communications 1st Japan EU Symposium on the "New Generation Network" and

More information

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN

More information

Politecnico di Milano Advanced Network Technologies Laboratory

Politecnico di Milano Advanced Network Technologies Laboratory Politecnico di Milano Advanced Network Technologies Laboratory Energy and Mobility: Scalable Solutions for the Mobile Data Explosion Antonio Capone TIA 2012 GreenTouch Open Forum June 6, 2012 Energy consumption

More information

Outline. 15-744: Computer Networking. Narrow Waist of the Internet Key to its Success. NSF Future Internet Architecture

Outline. 15-744: Computer Networking. Narrow Waist of the Internet Key to its Success. NSF Future Internet Architecture Outline 15-744: Computer Networking L-15 Future Internet Architecture 2 Motivation and discussion Some proposals: CCN Nebula Mobility First XIA XIA overview AIP Scion 2 NSF Future Internet Architecture

More information

Network analysis for context and content oriented wireless networking

Network analysis for context and content oriented wireless networking Network analysis for context and content oriented wireless networking Katia Jaffrès-Runser University of Toulouse, INPT-ENSEEIHT, IRIT lab, IRT Team Ecole des sciences avancées de Luchon Network analysis

More information

Evolution to 5G: An operator's perspective

Evolution to 5G: An operator's perspective Evolution to 5G: An operator's perspective Dr. Ivo Maljevic TELUS team IEEE 5G Summit Nov 2015 Cellular Standards Evolution 2? 1980 1G 1990 2G 2000 3G 2010-4G 2020 5G Analog systems Large terminals Several

More information

Intelligent connectivity enablers for converged heterogeneous 5G-IoT ecosystem

Intelligent connectivity enablers for converged heterogeneous 5G-IoT ecosystem Intelligent connectivity enablers for converged heterogeneous 5G-IoT ecosystem Dr. Sergey Andreev W.I.N.T.E.R. Group, Tampere University of Technology, Finland http://winter-group.net/ [sergey.andreev@tut.fi]

More information