Dr. Kenichi Mase, Dr. Toshini Tsuboi and Dr. Hiromi Ueda will visit Institute IMDEA Networkson Monday September 20th and will take the opportunity to present their research lines. The overall talk will last about 45 minutes, including questions and answers, and it will be divided in the following three 15 minute slots:
Seguir leyendo arrow_right_altA great deal of of interesting work was done in the 1970s in generalizing shortest path algorithms to a wide class of semirings also called "path algebras" or "dioids". Although the evolution of Internet Routing protocols does not seem to have taken much inspiration from this work, recent "reverse engineering" efforts have demonstrated that an algebraic approach is very useful for both understanding existing protocols and for exploring the design space of future Internet routing protocols. This course is intended teach participants the basic concepts needed to understand this approach. No previous background will be assumed.
Seguir leyendo arrow_right_altIt this talk I will start with a brief overview of the research activities of our group at the University of New South Wales, Sydney, Australia, in the areas of core network switching, body area networking, and security for wireless sensor networks. I will then focus on the specific problem of sizing buffers in core routers, highlighting constraints posed by power consumption and optical storage technology. We investigate the impact of router buffer size on the characteristics of TCP traffic and its co-existence with open-loop traffic. We propose and analyze the efficacy of techniques such as traffic conditioning and forward error correction in managing contention loss in the network core. Finally, we speculate on the feasibility of a future Internet core with near-zero buffers.
Seguir leyendo arrow_right_altA frequent problem in settings where a unique resource must be shared among users is how to resolve the contention that arises when all of them must use it, but the resource allows only for one user each time. The application of efficient solutions for this problem spans a myriad of settings such as radio communication networks or databases.
Seguir leyendo arrow_right_altSome among the most widespread applications of the Internet (real-time streaming multimedia applications) are based on packet exchanges that assume a very low packet delay. In order to offer some form of better service to this kind of traffic some architectural frameworks have been proposed, in which traffic sources obey some form of constraints on the maximum number of packets sent in every time interval, in which traffic is subdivided into classes, and where at any node all packets are served taking only into account the class to which they belong to. For these networks an open issue is their stability, that is the possibility to derive finite bounds to packet delay and queue size at each node.
Seguir leyendo arrow_right_altCloud computing has great potential to change how enterprises run and manage their IT systems. Cloud computing platforms provide customers with flexible, on demand resources at low cost. However, while existing offerings are useful for providing basic computation and storage resources, they fail to provide the security and network controls that enterprise customers need. The CloudNet architecture provides more comprehensive control over network resources and security for users by utilizing Virtual Private Networks to securely and seamlessly link cloud and enterprise sites. CloudNet incorporates VM migration over WANs. CloudNet's capability for WAN migration transforms the scope of provisioning from a single data center to multiple data centers spread across the country or the world. This will open new opportunities for cross data center load balancing and dynamic application placement based on metrics like latency to users or energy cost. It also provides the foundation for a range of Disaster Recovery solutions. (The talk is based on joint work with Timothy Wood (UMass), Jacobus van der Merwe (AT&T Labs Research), and Prashant Shenoy (UMass) ).
Seguir leyendo arrow_right_altMobile networks allow accessing and sharing information everywhere, but current infrastructures are limited by their legacies from circuit-switched networks. Although mobile ad-hoc networks (MANETs) solve many of these shortcomings, they face important challenges regarding routing and security. Localized geographic forwarding schemes are very promising for handling the routing challenge even in large multihop wireless networks, since they enable nodes to take routing decisions based only on information about their neighbors.
Seguir leyendo arrow_right_alt
We consider multi-class single server queueing networks that have a product form stationary distribution. A new limit result proves a sequence of such networks converges weakly to a stochastic flow level model. The stochastic flow level model found is insensitive. A large deviation principle for the stationary distribution of these multi-class queueing networks is also found. Its rate function has a dual form that coincides with proportional fairness. We then give the first rigorous proof that the stationary throughput of a multi-class single server queueing network converges to a proportionally fair allocation.
Seguir leyendo arrow_right_altIn the last decade, there have been radical changes in both the nature of the mechanisms used for Internet content distribution, and the type of content delivered. On the one hand, Peer-to-Peer (P2P) based content distribution has matured. On the other hand, there has been a tremendous growth in video traffic. The goal of my work is to characterize these emerging trends in content distribution and understand their implications for Internet Service Providers (ISP) and users. Such characterization is critical given the predominance of P2P and video traffic in the Internet today and can enable further evolution of content delivery systems in ways that benefit both providers and users.
Seguir leyendo arrow_right_alt
The technological advancement and information overload in recent years increased the popularity of Distributed Storage Systems where the data is replicated and maintained at multiple disks or servers residing at different network locations. While replication is sufficient to ensure data survivability, it raises an important question: "How can we efficiently maintain consistency among the replicas, despite system asynchrony and failures?"
Seguir leyendo arrow_right_alt
Comentarios recientes