Mitigating systemic risks in future networks

Antonio Manzalini, Noel Crespi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper elaborates about the potential risks of systemic instabilities in future networks and proposes a methodology to control and mitigate them. The starting concept is modeling the network as a complex environment (e.g. ecosystem) of resources and associated controllers in a continuous and dynamic game of cooperation and competition. Key observation is that Internet might be viewed as "self-organizing" and that this is achieved through "constrained optimizations" (through protocols methods, algorithms, etc). The methodology foresees defining and associating utility functions to these controllers and elaborating a global utility function (as an aggregated function of local utilities) for the overall network. It is conjectured that the optimization of proper global utility functions ensures network optimization and stability at the same time.

Original languageEnglish
Title of host publication2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2012
Pages176-180
Number of pages5
DOIs
Publication statusPublished - 5 Dec 2012
Externally publishedYes
Event2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2012 - Barcelona, Spain
Duration: 17 Sept 201219 Sept 2012

Publication series

Name2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2012

Conference

Conference2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2012
Country/TerritorySpain
CityBarcelona
Period17/09/1219/09/12

Keywords

  • Cloud Computing
  • Network of Networks
  • Self-Governance
  • Self-Organization
  • Stability

Fingerprint

Dive into the research topics of 'Mitigating systemic risks in future networks'. Together they form a unique fingerprint.

Cite this