Algorithmic Foundations of P2P and Wireless Networks

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=wEgT9MN8xrw



Duration: 1:09:17
88 views
2


Many of today's most exciting distributed systems are large-scale and highly decentralized networks, such as peer-to-peer networks, wireless ad hoc networks, or the Internet. In this talk, I will present several recent theoretical results with practical implications in peer-to-peer and wireless networks. Scheduling being one of the most crucial tasks in multi-hop wireless networks, it is not surprising that a multiplicity of MAC layer and scheduling protocols have been proposed. In contrast, little is known about the fundamental possibilities and limitations of scheduling. In my talk, I will introduce the 'scheduling complexity' as a measure for quantifying the achievable efficiency of scheduling protocols. Intuitively, the scheduling complexity captures the amount of time required to schedule a set of requests. As it turns out, all intuitive and currently employed scheduling protocols in multi-hop radio networks perform very sub-optimally even for simple request sequences when studied in realistic network models. On the other hand, a careful assignment of time slots and power levels to nodes can guarantee in every network that complicated requests are scheduled quickly. Moreover, this result implies that even in worst-case networks, there is no dramatic scaling problem when it comes to scheduling. In the second part of my talk, I will address problems related to peer-to-peer networks in which nodes may be selfish, trying to optimize their own utility. Using a game theoretic approach, I quantify the degradation of unstructured P2P network topologies due to the peer's selfishness. In particular, strategic behavior can create inefficiency and instability even in the absence of churn or mobility. In addition to selfishness, however, modern networks must also be able to cope with malicious Byzantine adversaries who cannot be considered rational and selfish. Instead, these adversaries seek to degrade the utility of the entire system or to attack its correctness. So far, selfishness and maliciousness have typically been studied separately. In my talk, I will present exact bounds on the impact of malicious attacks on a system consisting of selfish agents (i.e., the Price of Malice), and I will analytically capture how the 'fear-factor' resulting from the existence of malicious attackers among selfish agents may actually increase the system's overall performance.




Other Videos By Microsoft Research


2016-09-06Towards Accurate Internet Distance Prediction
2016-09-06Guanxi (The Art of Relationships) : Microsoft, China, and Bill Gates's Plan to Win the Road Ahead
2016-09-06Increasing Concurrency using EDGE Architectures
2016-09-06Decision Procedures for Recursive Data Structures with Integer Arithmetic
2016-09-06Supporting Construction, Analysis, and Understanding of Software Models.
2016-09-06Program Verification via Three-Valued Logic Analysis
2016-09-06Efficient Data Dissemination in Bandwidth-Asymmetric P2P Networks
2016-09-06Tractable Learning of Structured Prediction Models
2016-09-06Future Hype: The Myths of Technology Change
2016-09-06Improving Packet Delivery Efficiency Using Multi-Radio Diversity in Wireless LANs
2016-09-06Algorithmic Foundations of P2P and Wireless Networks
2016-09-06Semi-unsupervised learning of taxonomic and non-taxonomic relationships from the web
2016-09-06The Weather Makers: How Man is Changing the Climate and What it Means for Life on Earth
2016-09-06Touched with Light: Scanned beams display or capture information at video rates
2016-09-06Internet Background Radiation
2016-09-06Understanding and Improving Wireless Networks
2016-09-06SAFECode: A Platform for Developing Reliable Software in Unsafe Languages
2016-09-06Enabling Internet Malware Investigation and Defense Using Virtualization
2016-09-06Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity
2016-09-06Approximate inference techniques for optimal design in self-assembly and automated programming
2016-09-06Machine Learning Methods for Structured and Collective Classification



Tags:
microsoft research