Social Network Analysis for Communication Networks

Similar documents
Peer-to-Peer Networks

IC05 Introduction on Networks &Visualization Nov

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

The Value of Content Distribution Networks Mike Axelrod, Google Google Public

TOPOLOGIES NETWORK SECURITY SERVICES

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

MINFS544: Business Network Data Analytics and Applications

Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network

Giving life to today s media distribution services

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

International Journal of Advanced Research in Computer Science and Software Engineering

How To Understand The Power Of Icdn

Security in Ad Hoc Network

Location Information Services in Mobile Ad Hoc Networks

EE627 Lecture 22. Multihoming Route Control Devices

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

A Catechistic Method for Traffic Pattern Discovery in MANET

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

for guaranteed IP datagram routing

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

Seminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area

A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks

Introduction: Why do we need computer networks?

Experimental 3D Animation Spring 2013 ASTU 3460

International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: Volume 8 Issue 1 APRIL 2014.

Social Network Analysis using Graph Metrics of Web-based Social Networks

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Research Topics on Information-Centric Networking: Caching, Routing and Virtualization

Inter-domain Routing. Outline. Border Gateway Protocol

Graph Mining Techniques for Social Media Analysis

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

Outline. Outline. Outline

LIST OF FIGURES. Figure No. Caption Page No.

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5

Modeling of Corporate Network Performance and Smoothing Spline Interpolation

Active ISP Involvement in Content-Centric Future Internet Eugene Kim

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Hadoop Technology for Flow Analysis of the Internet Traffic

Student Writing Guide. Fall Lab Reports

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Lesson Plan. Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media. Performance Objective:

Social-Sensed Multimedia Computing

6306 Advanced Operating Systems

Multicast vs. P2P for content distribution

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012

A survey on Spectrum Management in Cognitive Radio Networks

Performance and Scalability of Self-Organizing Hierarchical Ad Hoc Wireless Networks

How To Make A Route Map On Bpg More Efficient

Evolution of Peer-to-Peer Systems

Mobile broadband. Trends and future evolution. LUIS MUCHACHO MBB Customer Solutions

Stability of QOS. Avinash Varadarajan, Subhransu Maji

Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

Business Management MKT 829 International Sport Marketing

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Towards Modelling The Internet Topology The Interactive Growth Model

IT 3202 Internet Working (New)

Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. Presenter: Sancheng Peng Zhaoqing University

The Effect of Caches for Mobile Broadband Internet Access

Software Development and Evolution

Computer Networks CS321

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Social Network Mining

Experimental research on communication networks at CTTC The ADRENALINE and EXTREME testbeds

A Study of YouTube recommendation graph based on measurements and stochastic tools

Introduction Chapter 1. Uses of Computer Networks

Network Edge Services

Network Security. Mobin Javed. October 5, 2011

Administrative Distance

MPLS Architecture for evaluating end-to-end delivery

Designing Delay-Tolerant Data Services for the. Network of Things

The HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: With an Evaluation of DAS & Cloud

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

Data Center Network Structure using Hybrid Optoelectronic Routers

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

CS6204 Advanced Topics in Networking

UNIVERSITY OF MICHIGAN SCHOOL OF INFORMATION SI301: Models of Social Information Processing Syllabus

Energy Consumption analysis under Random Mobility Model

The Internet of the future: What could it be and what are the challenges

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study

Politecnico di Milano Advanced Network Technologies Laboratory

Outline : Computer Networking. Narrow Waist of the Internet Key to its Success. NSF Future Internet Architecture

Network analysis for context and content oriented wireless networking

Evolution to 5G: An operator's perspective

Intelligent connectivity enablers for converged heterogeneous 5G-IoT ecosystem

Transcription:

Social Network Analysis for Communication Networks Instructor: Suzan Bayhan Collaborative Networking (CoNe) Research Group Spring 2015, Seminar 58315104 www.cs.helsinki.fi

Let s consider these questions How does a virus propagate in a group of people? How to tackle with the virus? Which people to vaccinate? For the new product, how can a company speed up its advertising or do viral marketing? Is an ISP s network robust to failures or attacks? Who is a popular person in a group of people? All questions seem to be from different domains but are related in a sense! 2

Outline About the seminar Practical Information: Requirements Seminar topics Next weeks schedule 3

The common abstraction Network: A simplified representation of a system to an abstract structure [Newman 2010] q Actors q Interactions (Ties) q Phenomena Social network: A network of people or group of people with some social interactions (e.g., friendship, business relations). 4

Social Network Analysis (SNA) SNA is a key technique used in many diverse areas from sociology, information science, economics to biological systems. SNA analyzes the relationships among actors of a system, e.g., human beings, corporations, countries, proteins. Structure for a complex system SNA helps understanding Diffusion of a phenomena (e.g., disease, idea, rumor) in a network Key actors in a network ( terrorist networks) Network robustness Capacity of networks (shortest paths, temporal shortest paths) 5

This seminar is about q Social network analysis (SNA) q Their application to communication networks: design and analysis Communication networks q Vertex: Routers, ISPs, mobile devices, computers q Edge: data transmission, communication link 6

At the end of the seminar You should be able to tell what these terms stand for! And more. 7

After the course Students are expected to q have a decent understanding of social network analysis q conduct research on SNA application to communication networks q become familiar with some software for SNA q know how to read/write/review a technical paper 8

The instructor expects from you And meet the seminar s successful completion criteria! 9

More quantitatively and formally q Pick a topic from the offered topics q Read papers on the topic q Write a report on the topic q Present your paper q Review two other reports written by your classmates q Lead the discussion on the reviewed paper q Attend the lectures (at least 80%) q An assignment to get familiar with the software 10

Deadlines for each task (Sharp) Topic selection Report on the topic Review peers Present the paper Jan. 17 Jan. 19 Feb. 13 March 14 Apr. 3 Apr. 8-22 Pick some network data Analyze it with Software Present All can be found on the course web page. http://www.hiit.fi/u/bayhan/sna/ Apr. 29 Start researching your topic immediately after topic assignment 11

Topic assignment q Submit your list the preferred 5 topics in decreasing order of preference: 5 11 2 4 6 q If you have something in mind which is not listed in the topics list, please send an email to the instructor with a description of what your proposed topic is. q Unfortunately, due to multiple students wishing to take the same topic, you may not be able to get your first preference. q Some topics will be assigned to more than one person. 12

Before starting q Pick a tex editor for your report q Pick a drawing software (remember a picture is worth 10K words) q Pick a plotting software (matlab, R, gnuplot etc.) 13

Report A report must include the following: 1. Clear explanation of the research domain network model, operation principles 2. Why is the tackled question important? 3. Why is it non-trivial? 4. The main approaches in the literature 5. The main idea/argument of the paper(s) 6. Possible directions (student s perspective) Expected report length is 6-7 pages in the following IEEE trans format. 14

For your report 1. Discover interesting papers via scientific search tools (Google Scholar, IEEExplore) 2. Choose high quality publications (IEEE/ACM Transactions on, SIGCOMM, Mobicom, Infocom etc.) 3. Read critically 4. Think what you liked about the paper, their assumptions, approach 5. Summarize the papers using your understanding and present them via attractive figures, tables etc. 6. Think about what would make the paper a better one, possible directions 15

Presentation q Introduce the basics of the topic q Make sure the audience can understand your presentation without reading the full papers (still you should read the reports!) q Keep your slides simple and vivid q Be prepared to answer questions from the audience q Before preparing slides, read how to give a good talk document and practice your talk a few times! q Before presenting, meet/communicate with the instructor. q Takeaways: Highlight some main points that you want the audience to get from your talk. 16

Reviewing reports q This aims to improve your reviewing skills as well as improving the quality of the reviewed report. q Get familiar with the topic of the reports by reading the related papers. q Before reviewing, read how to make a good review document in the seminar page. 17

Revising reports q Each student will receive two reviews q Consider the comments on the review reports seriously q Try to revise accordingly 18

Resources for reading/writing/ reviewing papers q Writing is an art, but can be learned/improved. q Your aim is to convey your ideas, not to make complicated, artistic sentences (sometimes can be). q Keep sentences simple and easy-to-understand. q Rules to write a good research paper by D.Lemire q How to read a paper? by S. Keshav q How to give a good talk by Simon Peyton-Jones q Notes on Reviewing Papers q Mendeley for organizing your soft-library 19

Assignment for SNA using a software q Application of what you learnt about SNA q Find some network data o Your own data or o Publicly available data such as http://snap.stanford.edu/data/ and https://networkdata.ics.uci.edu/resources.php o Not very large or small network q Derive graph metrics using software q Short presentation on these metrics 20

q Paper report 40% q Presentation: 30% q Reviews: 5% Grading policy q Class participation: 10% q Project assignment: 15% q Missed deadlines: not accepted. q Plagiarism is unethical. Don t copy, be a good writer : Read the following on plagiarism http://blogs.helsinki.fi/alakopsaa/for-student/?lang=en 21

Topics All related research that: q Analyze a network using SNA q Design a network protocol/scheme using SNA 22

Topics 1. Information-centric networking (ICN, CCN) 2. Delay tolerant networks (DTNs), mobile ad hoc networks (MANETs) 3. Peer-to-peer Networks (P2P) 4. Temporal Networks and Temporal Metrics 5. Network Robustness and Criticality 6. Internet (ISPs, ASs, BGP) 7. Heterogeneous networks (HetNets) and Small Cells 8. Data Center Networks and Cloud Computing 9. Device-to-Device Communications (D2D) 10. Your own proposal (have to be discussed with the instructor) 23

Information-centric networking q Host-to-host communication to content centric approach q We are more interested in the content not who provides it! q YouTube, FaceBook q How to serve the customers with high efficiency (e.g., fast and with low cost) and securely? q Popular contents caching q Naming of the contents 24

Delay tolerant networks (DTNs), mobile ad hoc networks (MANETs) q No stable infrastructure or endto-end connectivity q Exploit the mobility q Nodes store-carry-forward the packets q Difficult to ensure delayguarantees à delay-tolerant q Wild-life tracking, inter-space, under-water communications q Mobility modeling q Opportunistic communication 25

Peer-to-peer networks (P2P) q Each computing device can act as both a client and a server q Distributed architecture (no single-point-of-failure) q Self-organizing network q File sharing systems q Understanding of the evolution of networks q Understanding the network structure q Designing fast and reliable architectures 26

Temporal networks & temporal metrics q Networks are not always static but time-evolving. q For these graphs, temporal networks are better representation q Static graph metrics vs. temporal graph metrics q Use of these temporal metrics in real world networks Network topology at time t Time (second, minute, day) 27

Network robustness and criticality Is a network robust to q Malfunctioning q Attacks q Local failures q Global failures q How to measure? q Which parts/edges/links of the network are more critical? 28

Internet (ISPs, ASs, BGP) Very broad term but this topic is more about the large scale Internet, such as ASs, ISPs, BGP www.caida.org 29

Heterogeneous networks (HetNets) q A mix of radio technologies (macro cells, small cells) q Each radio technology has its own advantages for specific scenarios q Macrocell à wide coverage, high power consumption q Small cells à small coverage, spectrum re-use, lower power consumption q How to decide on the best operation mode and optimize resource allocation? q Co-existence of different technologies 30

Data center networks &cloud computing q Dumb end-devices became smart (smart phones) q Computation moving from edge to the cloud q Cloud computing q Data centers: any large, dedicated cluster of computers that is owned and operated by a single organization.* q Energy consumption, resource scheduling, robustness *Network Traffic Characteristics of Data Centers in the Wild, Theophilus Benson, Aditya Akella, and David A. Maltz, ACM IMC 2010. 31

Device-to-device communications (D2D) Rather than following the cellular core network, communicate directly, i.e., device-to-device. Increased q spectrum efficiency q energy efficiency q cellular coverage Fig. 1. Representative use-cases of D2D communications in cellular networks. Image from: Arash Asadi et al. A Survey on Device-to-Device Communication in Cellular Networks, IEEE Communication Surveys and Tutorials, 2014 32

Course page Seminar dates and meeting place: Wed 12:15-14 C220 14.01.2015-25.02.2015 Wed 12:15-14 C220 11.03.2015-29.04.2015 q We do NOT have meetings every week. Please check the schedule to see the meeting dates. q Please check regularly for the announcements: www.hiit.fi/u/bayhan/sna q My contact details: q Office hours: Friday 13:00-15:00 @C211 Exactum q Email: mysurname at hiit.fi 33

Important dates 34

Questions? Comments? 35