Grand Challenges in Networking Nick Feamster CS 7001.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Using Network Virtualization Techniques for Scalable Routing Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton University.
Improving Internet Availability. Some Problems Misconfiguration Miscoordination Efficiency –Market efficiency –Efficiency of end-to-end paths Scalability.
Path Splicing with Network Slicing
Accessibility and Trust Nick Feamster Georgia Tech.
Improving Internet Availability with Path Splicing Nick Feamster Georgia Tech Joint work with Murtaza Motiwala and Santosh Vempala.
Improving Internet Availability with Path Splicing Murtaza Motiwala Nick Feamster Santosh Vempala.
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
Data-Plane Accountability with In-Band Path Diagnosis Murtaza Motiwala, Nick Feamster Georgia Tech Andy Bavier Princeton University.
Research Summary Nick Feamster. The Big Picture Improving Internet availability by making networks easier to operate Three approaches –From the ground.
Using VINI to Test New Network Protocols Murtaza Motiwala, Georgia Tech Andy Bavier, Princeton University Nick Feamster, Georgia Tech Santosh Vempala,
AGORA: A Market for Internet Connectivity Nick Feamster, Georgia Tech Ramesh Johari, Stanford Vijay Vazirani, Georgia Tech.
Path Splicing Nick Feamster, Murtaza Motiwala, Megan Elmore, Santosh Vempala.
Multihoming and Multi-path Routing
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Improving Internet Availability. Availability of Other Services Carrier Airlines (2002 FAA Fact Book) –41 accidents, 6.7M departures – % availability.
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Network Security Highlights Nick Feamster Georgia Tech.
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
MINT: A Market for Internet Transit Nick Feamster Georgia Tech Joint work with Vytautas Valancius, Ramesh Johari, Vijay Vazirani.
Network Security Highlights Nick Feamster Georgia Tech.
Nick Feamster Georgia Tech
A Narrow Waist for Multipath Routing Murtaza Motiwala Bilal Anwer, Mukarram bin Tariq David Andersen, Nick Feamster.
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Spring 2000CS 4611 Introduction Outline Statistical Multiplexing Inter-Process Communication Network Architecture Performance Metrics.
NDN in Local Area Networks Junxiao Shi The University of Arizona
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Internetworking.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
15-441: Computer Networking Lecture 26: Networking Future.
1 Path Splicing Author: Murtaza Motiwala, Megan Elmore, Nick Feamster and Santosh Vempala Publisher: SIGCOMM’08 Presenter: Hsin-Mao Chen Date:2009/12/09.
Computer Networks Fall, 2007 Prof Peterson. CIS 235: Networks Fall, 2007 Western State College  What is “store and forward”?  What is a buffer / queue?
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Fundamentals of Computer Networks ECE 478/578 Lecture #2 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona.
Chapter 1: Overview Lecturer: Alias Mohd Telecommunications Department Faculty of Electrical Engineering UTM SET 4573: Data Communication and Switching.
Capacity of Wireless Mesh Networks: Comparing Single- Radio, Dual-Radio, and Multi- Radio Networks By: Alan Applegate.
Network Sensitivity to Hot-Potato Disruptions Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Network Architecture: Design Philosophies IS250 Spring 2010 John Chuang
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
Computer Networks with Internet Technology William Stallings
Impact of Topology on Overlay Multicast Suat Mercan.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Networking Components Starla Wachsmann. COMPUTER NETWORKING COMPONETS Today’s wireless and enterprise networks are more complex than ever, delivering.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Fall 2001CS 6401 Introduction to Networking Outline Networking History Statistical Multiplexing Performance Metrics.
Star Topology Star Networks are one of the most common network topologies. consists of one central switch, hub or computer, which acts as a conduit to.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
1 CSCD 433/533 Advanced Networks Lecture 2 Network Review Spring 2016 Reading: Chapter 1.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
COMPUTER NETWORKS CS610 Lecture-22 Hammad Khalid Khan.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Multi-layer software defined networking in GÉANT
Zueyong Zhu† and J. William Atwood‡
Introduction to Internet Routing
Presentation transcript:

Grand Challenges in Networking Nick Feamster CS 7001

Network Security & Operations Goal: Improve network reliability and availability in the face of both accidental and malicious faults Sub-areas –Reliability: fast recovery from failures –Efficiency: improving the efficiency of the Internets connectivity markets –Security and trust: spam filtering, phishing, etc. –Management: fault diagnosis, provisioning, etc. –Accessibility: defeating the great firewall of China

Reliability Step 1: Run multiple instances of the routing protocol, each with slightly perturbed versions of the configuration Step 2: Allow traffic to switch between instances at any node in the protocol t s Compute multiple forwarding trees per destination. Allow packets to switch slices midstream. Joint with Prof. Santosh Vempala Student: Murtaza Motiwala

Paths become longer simply because two ASes decide not to interconnect Comcast Abilene AT&T Cogent $$ Peering points in Atlanta Peering point in Washington, D.C. Structure of Internet paths Exploit new structure to allow new types of contracts Efficiency Two Changes Joint with Prof. Vijay Vazirani and Prof. Ramesh Johari (Stanford)

Trust Many applications rely on trusted communications between end hosts Social networks contain rich information about interpersonal relationships (How) can the trust that is inherent in these relationships be used to bootstrap trusted communications at the network layer? –Access control –File sharing / Cooperative backup –Key exchange

Transparency ISPs are increasingly applying discriminatory access to different ISPs, application traffic, etc. Problem: Can data that is passively collected from end users be used to distinguish normal degradations (e.g., due to transient failure, congestion, etc.) from intentional discrimination?

Accessibility 59+ countries block access to content on the Internet –News, political information, etc. Idea: Use the increasing amount of user-generated content on the Internet (e.g., photo-sharing sites) as the basis for covert channels Some problems: –How do publishers and consumers agree on places to exchange content? –How to design for robustness against blocking? –How to provide deniability for users? –Incentives for participation –System design and implementation

Networking Faculty and Projects Mostafa Ammar –Delay-tolerant networks, multi-layer network architectures Constantine Dovrolis –Network measurement, evolution of network graphs Jim Xu –Data streaming, data structures for network measurement, network security Ellen Zegura –Network topology, networks in developing regions