This book studies the rise of social media in the first decade of the twenty-first century, up until 2012. It provides both a historical and a critical analysis of the emergence of networking ...services in the context of a changing ecosystem of connective media. Such history is needed to understand how the intricate constellation of platforms profoundly affects our experience of online sociality. In a short period of time, services like Facebook, YouTube and many others have come to deeply penetrate our daily habits of communication and creative production. While most sites started out as amateur-driven community platforms, half a decade later they have turned into large corporations that do not just facilitate user connectedness, but have become global information and data mining companies extracting and exploiting user connectivity. Offering a dual analytical prism to examine techno-cultural as well as socio-economic aspects of social media, the author dissects five major platforms: Facebook, Twitter, Flickr, YouTube, and Wikipedia. Each of these microsystems occupies a distinct position in the larger ecosystem of connective media, and yet, their underlying mechanisms for coding interfaces, steering users, filtering content, governance and business models rely on shared ideological principles. Reconstructing the premises on which these platforms are built, this study highlights how norms for online interaction and communication gradually changed. “Sharing,” “friending,” “liking,” “following,” “trending,” and “favoriting” have come to denote online practices imbued with specific technological and economic meanings. This process of normalization is part of a larger political and ideological battle over information control in an online world where everything is bound to become “social.”
SICO Birge-Lee, Henry; Wang, Liang; Rexford, Jennifer ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
11/2019
Conference Proceeding
Open access
The Border Gateway Protocol (BGP) is the primary routing protocol for the Internet backbone, yet it lacks adequate security mechanisms. While simple BGP hijack attacks only involve an adversary ...hijacking Internet traffic destined to a victim, more complex and challenging interception attacks require that adversary intercept a victim's traffic and forward it on to the victim. If an interception attack is launched incorrectly, the adversary's attack will disrupt its route to the victim making it impossible to forward packets. To overcome these challenges, we introduce SICO attacks (Surgical Interception using COmmunities): a novel method of launching interception attacks that leverages BGP communities to scope an adversary's attack and ensure a route to the victim. We then show how SICO attacks can be targeted to specific source IP addresses for reducing attack costs. Furthermore, we ethically perform SICO attacks on the real Internet backbone to evaluate their feasibility and effectiveness. Results suggest that SICO attacks can achieve interception even when previously proposed attacks would not be feasible and outperforms them by attracting traffic from an additional 16% of Internet hosts (worst case) and 58% of Internet hosts (best case). Finally, we analyze the Internet topology to find that at least 83% of multi-homed ASes are capable of launching these attacks.
Simulations for network implementations are an essential component for developing newer and better network solutions and protocols, especially when considering complex scenarios. For instance, ...networks composed of flying objects coordinating through multi-hop communication represent a foreseeable scenario in our society. The need for analyzing new and tailored solutions for this visionary context passes through the creation of specific tools. To this aim, we present here a novel discrete event simulator deployed to test Flying Ad-Hoc Networks (FANETs) and, in particular, their routing algorithms. In our simulator we have also implemented two different position-based routing protocols for FANETs; their implementation and results are discussed as well.
Networks pervade social and economic life, and they play a prominent role in explaining a huge variety of social and economic phenomena. Standard economic theory did not give much credit to the role ...of networks until the early 1990s, but since then the study of the theory of networks has blossomed. At the heart of this research is the idea that the pattern of connections between individual rational agents shapes their actions and determines their rewards. The importance of connections has in turn motivated the study of the very processes by which networks are formed.
For decades, the spatial approach to network analysis has principally focused on planar and technical networks from a classic graph theory perspective. Reference to models and methods developed by ...other disciplines on non-planar networks, such as sociology and physics, is recent, limited, and dispersed. Conversely, the physics literature that developed the popular scale-free and small-world models pays an increasing attention to the spatial dimension of networks. Reviewing how complex network research has been integrated into geography and regional science reveals a high heterogeneity among spatial scientists as well as key directions for increasing their role inside multidisciplinary researches on networks.
The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. Handbook of Mobile Ad Hoc Networks for Mobility ...Models introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer, such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book. About this handbook: - Describes 40 different major mobility models along with numerous associate mobility models and their impact on MANET performances comprehensively. - Fills a void in commercial, military, and the research arena for multihop mobile ad hoc networking. - Provides case studies, examples, and exercises throughout the book. - ' There has been a wide variety of research in Mobile Ad-hoc Network (MANET) over past many years and there are many models. As the application of wireless technology has grown in recent years in the commercial and military applications, the practitioners and engineers are finding it difficult to make informed choices on how best to apply MANET. This book will provide focus and foundation for these decision makers,' comments Dr. Anupam Shah, Chief Engineer of Enterprise Mission Solutions Business Unit, Science Applications International Corporation (SAIC). This book targets advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.
Full text
Available for:
FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
Introduction to Network Simulator NS2 is a primer providing materials for NS2 beginners, whether students, professors, or researchers for understanding the architecture of Network Simulator 2 (NS2) ...and for incorporating simulation modules into NS2. The authors discuss the simulation architecture and the key components of NS2 including simulation-related objects, network objects, packet-related objects, and helper objects. The NS2 modules included within are nodes, links, SimpleLink objects, packets, agents, and applications. Further, the book covers three helper modules: timers, random number generators, and error models. Also included are chapters on summary of debugging, variable and packet tracing, result compilation, and examples for extending NS2. Two appendices provide the details of scripting language Tcl, OTcl and AWK, as well object oriented programming used extensively in NS2.
Full text
Available for:
FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
The primary objectives of Graphs, Dioïds and Semirings: New Models and Algorithms are to emphasize the deep relations existing between the semiring and dioïd structures with graphs and their ...combinatorial properties, while demonstrating the modeling and problem-solving capability and flexibility of these structures. In addition the book provides an extensive overview of the mathematical properties employed by "nonclassical" algebraic structures, which either extend usual algebra (i.e., semirings), or correspond to a new branch of algebra (i.e., dioïds), apart from the classical structures of groups, rings, and fields.
Full text
Available for:
FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
Network modeling is a key enabler to achieve efficient network operation in future self-driving Software-Defined Networks. However, we still lack functional network models able to produce accurate ...predictions of Key Performance Indicators (KPI) such as delay, jitter or loss at limited cost. In this paper we propose RouteNet, a novel network model based on Graph Neural Network (GNN) that is able to understand the complex relationship between topology, routing, and input traffic to produce accurate estimates of the per-source/destination per-packet delay distribution and loss. RouteNet leverages the ability of GNNs to learn and model graph-structured information and as a result, our model is able to generalize over arbitrary topologies, routing schemes and traffic intensity. In our evaluation, we show that RouteNet is able to predict accurately the delay distribution (mean delay and jitter) and loss even in topologies, routing and traffic unseen in the training (worst case MRE = 15.4%). Also, we present several use cases where we leverage the KPI predictions of our GNN model to achieve efficient routing optimization and network planning.
Graph neural networks (GNNs) are information processing architectures for signals supported on graphs. They are presented here as generalizations of convolutional neural networks (CNNs) in which ...individual layers contain banks of graph convolutional filters instead of banks of classical convolutional filters. Otherwise, GNNs operate as CNNs. Filters are composed of pointwise nonlinearities and stacked in layers. It is shown that GNN architectures exhibit equivariance to permutation and stability to graph deformations. These properties help explain the good performance of GNNs that can be observed empirically. It is also shown that if graphs converge to a limit object, a graphon, GNNs converge to a corresponding limit object, a graphon neural network. This convergence justifies the transferability of GNNs across networks with different numbers of nodes. Concepts are illustrated by the application of GNNs to recommendation systems, decentralized collaborative control, and wireless communication networks.