Approximate Networking H. T. Kung Harvard University Panel 1 on “What Are the Biggest Opportunities in Networking Problem?” NITRD Workshop on Complex Engineered.

Slides:



Advertisements
Similar presentations
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Advertisements

KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Trust relationships in sensor networks Ruben Torres October 2004.
Group #1: Protocols for Wireless Mobile Environments.
Doc.: IEEE /1539r0 Submission Dec Minho Cheong, ETRISlide 1 Beam forming for 11ah Date: Authors:
Cache Coherent Distributed Shared Memory. Motivations Small processor count –SMP machines –Single shared memory with multiple processors interconnected.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
PANEL DISCUSSION ON CROSS-LAYER DESIGN ICC ’03 Anchorage, AK A. Ephremides.
Compressive Oversampling for Robust Data Transmission in Sensor Networks Infocom 2010.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
1 Cross-Layer Design for Wireless Communication Networks Ness B. Shroff Center for Wireless Systems and Applications (CWSA) School of Electrical and Computer.
Collaborative Wireless Networks Computer Laboratory Digital Technology Group Wireless Communications Today Wireless communications today has evolved into.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
© 2005, it - instituto de telecomunicações. Todos os direitos reservados. Gerhard Maierbacher Scalable Coding Solutions for Wireless Sensor Networks IT.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Cooperative Header Compression F.H.P. Fitzek and T. K. Madsen and P. Popovski and R. Prasad and M. Katz. Cooperative IP Header Compression for Parallel.
SourceSync: A Distributed Architecture for Sender Diversity Hariharan Rahul Haitham Hassanieh Dina Katabi.
Collaborative Localization and Tracking in Wireless Sensor Networks Dr. Xinrong Li Department of Electrical Engineering University of North Texas
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Domestic Nuclear Detection Office (DNDO) NITRD Workshop What are the Biggest Opportunities in Networking Problem? Sept. 20, 2012 Timothy Ashenfelter, PhD.
Institut Experimentelles Software Engineering Fraunhofer IESE Klaus Schmid Relating Product Line Adoption Mode and Transition Process.
1 SMART ANTENNAS FOR WIRELESS COMMUNICATIONS JACK H. WINTERS AT&T Labs - Research Red Bank, NJ September 9, 1999.
Low-Power Wireless Sensor Networks
1 High-Level Carrier Requirements for Cross Layer Optimization Dave McDysan Verizon.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Tufts University. EE194-WIR Wireless Sensor Networks. April 21, 2005 Increased QoS through a Degraded Channel using a Diverse, Cross-Layered Protocol Elliot.
Adaptive Data Aggregation for Wireless Sensor Networks S. Jagannathan Rutledge-Emerson Distinguished Professor Department of Electrical and Computer Engineering.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
QoS research in a complicated world Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
Compressive Sensing for Multimedia Communications in Wireless Sensor Networks By: Wael BarakatRabih Saliba EE381K-14 MDDSP Literary Survey Presentation.
Computer Networks Group Universität Paderborn TANDEM project meeting Protocols, oversimplification, and cooperation or: Putting wireless back into WSNs.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Collaborative Communications in Wireless Networks Without Perfect Synchronization Xiaohua(Edward) Li Assistant Professor Department of Electrical and Computer.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
1 Blind Channel Identification and Equalization in Dense Wireless Sensor Networks with Distributed Transmissions Xiaohua (Edward) Li Department of Electrical.
MANET: Introduction Reference: “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”; S. Corson and J.
Lecture 1 Outline Statistical Multiplexing Inter-Process Communication.
© All rights reserved Presented by: Jamshid Khun-Jush, Senior Director.
Biggest Opportunities for Improving Network Values Presented By: Victor Glass, NECA At the NITRD Workshop: Complex Engineering Networks.
How wireless networks scale: the illusion of spectrum scarcity David P. Reed [ Presented at International Symposium on Advanced.
10/18/2004 NSF-NOSS PI meeting 1 Sensor Networks for Undersea Seismic Experimentation (SNUSE) PI: John Heidemann Co-PIs: Wei Ye, Jack Wills Information.
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
CoopNet: Cooperative Networking
Energy-Efficient Signal Processing and Communication Algorithms for Scalable Distributed Fusion.
Smart Sleeping Policies for Wireless Sensor Networks Venu Veeravalli ECE Department & Coordinated Science Lab University of Illinois at Urbana-Champaign.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Energy Consumption Perspective on Coded Cooperative Systems Liwen Yu and Andrej Stefanov.
Approximate Networking H. T. Kung Harvard University Panel 1 on “What Are the Biggest Opportunities in Networking Problem?” NITRD Workshop on Complex Engineered.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
© 2014 Utilities Telecom Council State of the Industry “WHY TELECOMMUNICATIONS TECHNOLOGY AND NETWORKS ARE CRITICAL TO THE UTILITY OF THE FUTURE: TECHNICAL,
5G. Overall Vision for 5G 5G will provide users with fiber-like access data rate and "zero" latency user experience be capable of connecting 100 billion.
Wi-Fi - IEEE Standards and the future of Wi-Fi Mingnan Yuan Department of Electrical and Computer Engineering Auburn University March 9, 2016.
Review of Useful Definitions Statistical multiplexing is a method of sharing a link among transmissions. When computers use store-and-forward packet switching,
National Institute of Standards and Technology (NIST) Advanced Manufacturing Technology Consortia (AMTech) Program Award Number: 70NANB14H056 Development.
Bluetooth Based Smart Sensor Network
The Future of Spread Spectrum
Dependable, secure and time-aware sensor networks - Overview
Outline Ganesan, D., Greenstein, B., Estrin, D., Heidemann, J., and Govindan, R. Multiresolution storage and search in sensor networks. Trans. Storage.
HUMAN AND SYSTEMS ENGINEERING:
Protocols.
120 MHz PHY Transmission Date: Authors: January 2010
Protocols.
Electricity Distribution and Energy Decarbonisation
Presentation transcript:

Approximate Networking H. T. Kung Harvard University Panel 1 on “What Are the Biggest Opportunities in Networking Problem?” NITRD Workshop on Complex Engineered Networks Washington, DC September 20-21, 2012

Wireless Networking Is Important But... Peak bandwidth is physically limited for any given frequency band Further exploitation in diversity (e.g., multipath and fine-grained beamforming) is getting increasingly difficult Gap in meeting application demands is growing Thus we need to find ways to fill the gap without violating Shannon's capacity theorem

Fortunately, There Are Opportunities Many applications don’t need networks for exact packet delivery, for example: – Sensor data processing – Big data analysis – Probability distribution estimation – Image/vision object recognition and tracking – Machine learning – Biologically inspired systems For these applications, approximate networking may be sufficient: – Deliver fraction of packets – Deliver approximate packets – Deliver combined packets

Advantages We can use approximate network node hardware and protocols, and traffic-reducing networks This allows efficient network implementation and robust network management Moreover, this enables new security means, e.g., integrated encryption and compression using secret distortion distribution keys rather than compression followed by encryption Theory in network coding and compressive sensing can be exploited

Summary We have argued that approximate networking, especially for wireless networking, is a good opportunity for future networking