Path Computation Enhancement in SDN Networks

Total Page:16

File Type:pdf, Size:1020Kb

Path Computation Enhancement in SDN Networks Path Computation Enhancement in SDN Networks by Tim Huang Bachelor of Computer Science in ChengDu College of University of Electronic Science and Technology of China, ChengDu, 2011 A thesis presented to Ryerson University in partial fulfillment of the requirements for the degree of Master of Applied Science in the Program of Computer Networks Toronto, Ontario, Canada, 2015 c Tim Huang 2015 AUTHOR’S DECLARATION FOR ELECTRONIC SUBMISSION OF A THESIS I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I authorize Ryerson University to lend this thesis to other institutions or individuals for the purpose of scholarly research. I further authorize Ryerson University to reproduce this thesis by photocopying or by other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. I understand that my dissertation may be made electronically available to the public. iii Path Computation Enhancement in SDN Networks Master of Applied Science 2015 Tim Huang Computer Networks Ryerson University Abstract Path computation is always the core topic in networking. The target of the path computation is to choose an appropriate path for the traffic flow. With the emergence of Software-defined networking (SDN), path computation moves from the distributed network nodes to a centralized controller. In this thesis, we will present a load balancing algorithm in SDN framework for popular data center networks and a fault management approach for hybrid SDN networks. The proposed load balancing algorithm computes and selects appropriate paths based on characteristics of data center networks and congestion status. In addition, a solution that supports proper operations of a hybrid SDN network will also be proposed. The evaluation shows the proposed load balancing algorithm performs better than classic shortest path algorithms. We also demonstrated that the proposed solution for hybrid SDN networks can support proper operations in complicated hybrid SDN networks. v Acknowledgements I would like to express my sincere gratitude to my supervisor Dr. Ngok Wa Ma for his patient support and encouragement through my graduate study. Special thanks to the Computer Networks Master program and the School of Graduate Studies at Ryerson University for their financial support and the opportunity granted me to study in this great citadel of learning. Last, but not the least, I would like to thank my wife, jojo jiang, for her continuous support over years. vii Contents Declaration ............................................... iii Abstract ................................................. v Acknowledgements ........................................... vii List of Tables .............................................. xi List of Figures .............................................xiii 1 Introduction 1 1.1 General . 1 1.2 Research Problem . 2 1.2.1 Contributions of the thesis . 3 1.2.2 Thesis Organization . 3 2 Background 5 2.1 Legacy Networks . 5 2.2 SDN Network . 5 2.2.1 OpenFlow Protocol . 5 2.2.2 OpenFlow Switch . 6 2.2.3 OpenFlow Controller . 7 2.3 Network Topology in SDN . 9 2.4 Path Computation in SDN . 9 2.5 Hybrid SDN Networks . 9 2.6 Related works in Load Balancing . 10 2.7 Related works in Hybrid SDN networks . 11 3 Proposed Path Computation and Path Selection Algorithms 13 3.1 Overview of Proposed Algorithms . 13 3.2 Path Computation . 13 3.2.1 Characters in Data Center Networks . 13 3.2.2 Path Computation Algorithm . 15 3.3 Load Balancing . 17 3.3.1 Load Balancing Background . 17 ix 3.3.2 Path selection Algorithm . 17 3.4 Summary . 19 4 Proposed Solution For Hybrid Networks 21 4.1 Overview of current Hybrid SDN Network Solution . 21 4.2 Overview of proposed Solution for hybrid network . 22 4.3 Proposed Solution for Hybird Network . 24 4.4 Summary . 27 5 Implementation 29 5.1 System Environment . 29 5.2 System Design . 30 5.3 Summary . 31 6 Experimental results and Analysis 33 6.1 Experiment Parameters and Environment . 33 6.2 Performance Metrics . 33 6.3 Path computation performance comparison . 34 6.3.1 The Floyd-Warshall algorithm . 34 6.3.2 The Dijkstra’s algorithm . 35 6.3.3 Test Case . 35 6.4 Path selection performance comparison . 36 6.4.1 Hash . 37 6.4.2 Periodic Query . 37 6.4.3 Test Case . 37 6.5 Verification For Proposed Solution of hybird SDN networks . 40 6.5.1 Test case . 40 6.5.2 Result and analysis for Hybird network solution . 41 7 Conclusion and Future Work 47 Bibliography 50 x List of Tables 2.1 Main components of a flow entry in a flow table . 7 6.1 Network changes during the test case . 36 6.2 The parameters used for ping command . 38 6.3 The flows changes during the test case . 39 xi List of Figures 1.1 A typical data center network topology . 2 2.1 The SDN architecture . 6 2.2 Main components of an OpenFlow switch . 7 2.3 The flowchart detailing packet flow through an OpenFlow switch . 8 2.4 A example of hybrid SDN network . 10 3.1 The workflow of proposed algorithms in chapter 3 . 14 3.2 The flowchart of path selection algorithm . 20 4.1 A example of hybrid SDN network that Floodlight can handle . 21 4.2 Example 1 of hybrid SDN network that Floodlight can not handle . 22 4.3 Example 2 of hybrid SDN network that Floodlight can not handle . 22 4.4 The workflow of proposed solutin for hybrid network . 23 4.5 The switches a,b,c and d are connected to legacy island 2 . 24 4.6 a,b are in a group . 25 4.7 Scenario 1 that the proposed solution handles . 26 4.8 The example that we can not use non-desiganated switch . 26 4.9 Scenario 2 that the proposed solution handles . 27 5.1 The architecture of Mininet . 30 6.1 The network topology of initial stage . 36 6.2 Performance comparison among three algorithms . 37 6.3 Network topology of path selection for test case . 38 6.4 Comparison of average delay . 39 6.5 Comparison of throughput . 39 6.6 The test scenario for proposed solution . 40 6.7 The controller discovers the legacy island link and LLDP link . 41 6.8 The controller analyzed all legacy islands . 42 6.9 The controller discover the groups of legacy islands . 42 6.10 The configuration and flows are installed to the switches . 42 xiii 6.11 The controller achieves SDN islands . 43 6.12 The spanning tree is calculated and the interface is blocked to prevent the loop . 43 6.13 The between h0 and h4 ping works . 44 6.14 The MAC table for legacy island . 45 xiv Chapter 1 Introduction 1.1 General Since the first establishment of point-to-point networks in the last century, networking industry has experienced fast development, especially after the establishment of the Internet. The network traffic is growing exponentially over time. Meanwhile, managing networks has become more complicated and difficult. Firstly, it involves too many types of network devices, from switches and routers to middle boxes such as firewalls, load balancers. Secondly, there are many network protocols to address all sorts of information asymmetry problems among network nodes, like using Spanning Tree Protocol (STP) on switches to avoid Layer-2 loop, Open Shortest Path First (OSPF) on routers to choose the shortest paths, Network address translation (NAT) on firewalls to protect internal Internet Protocol (IP) address[12]. Network devices have control and data plane. The control plane is the brain of network node, which decides what to do with incoming packets. The data plane is the limbs of network node, which takes action on the packet according to control plane decision. On control plane of legacy network devices, network device vendors usually implement the standardization protocols drafted by some organizations, such as Internet Engineering Task Force (IETF) and Institute of Electrical and Electronics Engineers (IEEE). The job of network operators is to configure different vendors’ devices to make the protocol work properly among devices. In many cases, different networking hardware vendors implement the same protocol differently. In addition, these vendors may introduce proprietary features to the standard protocol. This results in unnecessary configuration complexity for network operators and unpredicted.
Recommended publications
  • A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation
    TKK Dissertations 140 Espoo 2008 A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation Teemu Koponen Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering TKK Dissertations 140 Espoo 2008 A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation Teemu Koponen Dissertation for the degree of Doctor of Science in Technology to be presented with due permission of the Faculty of Information and Natural Sciences for public examination and debate in Auditorium T1 at Helsinki University of Technology (Espoo, Finland) on the 2nd of October, 2008, at 12 noon. Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering Teknillinen korkeakoulu Informaatio- ja luonnontieteiden tiedekunta Tietotekniikan laitos Distribution: Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering P.O. Box 5400 FI - 02015 TKK FINLAND URL: http://cse.tkk.fi/ Tel. +358-9-4511 © 2008 Teemu Koponen ISBN 978-951-22-9559-3 ISBN 978-951-22-9560-9 (PDF) ISSN 1795-2239 ISSN 1795-4584 (PDF) URL: http://lib.tkk.fi/Diss/2008/isbn9789512295609/ TKK-DISS-2510 Picaset Oy Helsinki 2008 AB ABSTRACT OF DOCTORAL DISSERTATION HELSINKI UNIVERSITY OF TECHNOLOGY P. O. BOX 1000, FI-02015 TKK http://www.tkk.fi Author Teemu Koponen Name of the dissertation A Data-Oriented Network Architecture Manuscript submitted 09.06.2008 Manuscript revised 12.09.2008 Date of the defence 02.10.2008 Monograph X Article dissertation (summary + original articles) Faculty Information and Natural Sciences Department Computer Science and Engineering Field of research Networking Opponent(s) Professor Jon Crowcroft Supervisor Professor Antti Ylä-Jääski Instructor(s) Dr.
    [Show full text]
  • Exploring the Feasibility of Applying Data Mining for Library Reference Service Improvement a Case Study of Turku Main Library
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by National Library of Finland DSpace Services Ming Zhan ([email protected]) Exploring the Feasibility of Applying Data Mining for Library Reference Service Improvement A Case Study of Turku Main Library Master thesis in Information and Knowledge Management Master’s Programme Supervisors: Gunilla Widén Faculty of Social Sciences, Business and Economics Åbo Akademi University Åbo 2016 Abstract Data mining, as a heatedly discussed term, has been studied in various fields. Its possibilities in refining the decision-making process, realizing potential patterns and creating valuable knowledge have won attention of scholars and practitioners. However, there are less studies intending to combine data mining and libraries where data generation occurs all the time. Therefore, this thesis plans to fill such a gap. Meanwhile, potential opportunities created by data mining are explored to enhance one of the most important elements of libraries: reference service. In order to thoroughly demonstrate the feasibility and applicability of data mining, literature is reviewed to establish a critical understanding of data mining in libraries and attain the current status of library reference service. The result of the literature review indicates that free online data resources other than data generated on social media are rarely considered to be applied in current library data mining mandates. Therefore, the result of the literature review motivates the presented study to utilize online free resources. Furthermore, the natural match between data mining and libraries is established. The natural match is explained by emphasizing the data richness reality and considering data mining as one kind of knowledge, an easy choice for libraries, and a wise method to overcome reference service challenges.
    [Show full text]
  • Strategic Use of the Internet and E-Commerce: Cisco Systems
    Journal of Strategic Information Systems 11 (2002) 5±29 www.elsevier.com/locate/jsis Strategic use of the Internet and e-commerce: Cisco Systems Kenneth L. Kraemer*, Jason Dedrick Graduate School of Management and Center for Research on Information Technology and Organizations, University of California, Irvine, 3200 Berkeley Place, Irvine, CA 92697-4650, USA Accepted 3October 2001 Abstract Information systems are strategic to the extent that they support a ®rm's business strategy. Cisco Systems has used the Internet and its own information systems to support its strategy in several ways: (1) to create a business ecology around its technology standards; (2) to coordinate a virtual organiza- tion that allows it to concentrate on product innovation while outsourcing other functions; (3) to showcase its own use of the Internet as a marketing tool. Cisco's strategy and execution enabled it to dominate key networking standards and sustain high growth rates throughout the 1990s. In late 2000, however, Cisco's market collapsed and the company was left with billions of dollars in unsold inventory, calling into question the ability of its information systems to help it anticipate and respond effectively to a decline in demand. q 2002 Elsevier Science B.V. All rights reserved. Keywords: Internet; e-commerce; Cisco Systems; Virtual Organization; Business Ecology 1. Introduction Information systems are strategic to the extent that they are used to support or enable different elements of a ®rm's business strategy (Porter and Millar, 1985). Cisco Systems, the world's largest networking equipment company, has used the Internet, electronic commerce (e-commerce), and information systems as part of its broad strategy of estab- lishing a dominant technology standard in the Internet era.
    [Show full text]
  • Networking Hardware: Absolute Beginner's Guide T Networking, 3Rd Edition Page 1 of 15
    Chapter 3: Networking Hardware: Absolute Beginner's Guide t Networking, 3rd Edition Page 1 of 15 Chapter 3: Networking Hardware In this chapter z Working with network interface cards z Selecting and installing a NIC z Using hubs z Working with PC motherboards z Understanding processors and PC RAM z Working with hard drives z Differentiating server and client hardware Our Age of Anxiety is, in great part, the result of trying to do today’s jobs with yesterday’s tools. –Marshall McLuhan Now that we’ve discussed the different kinds of networks and looked at network topologies, we should spend some time discussing the hardware involved in networking. This chapter will concentrate on the connectivity devices that define the network topology—the most important being the network interface card. We will also take a look at hubs, routers, and switches. Another important aspect of building your network is selecting the hardware for your client PCs and your network servers. There are many good primers on computer hardware—for example, the Absolute Beginner’s Guide to PC Upgrades, published by Que. Also, numerous advanced books, such as Upgrading and Repairing PCs (by Scott Mueller, also from Que), are available, so we won't cover PC hardware in depth in this chapter. We will take a look at motherboards, RAM, and hard drives because of the impact these components have on server performance. We will also explore some of the issues related to buying client and server hardware. Let's start our discussion with the network interface card. We can then look at network connectivity devices and finish up with some information on PC hardware.
    [Show full text]
  • D:\Documents and Settings\Ana\My Documents\Biserka-Knjiga\Digital
    CULTURELINK Network of Networks for Research and Cooperation in Cultural Development was established by UNESCO and the Council of Europe in 1989. Focal point of the Network is the Institute for International Relations, Zagreb, Croatia. Members Networks, associations, foundations, institutions and individuals engaged in cultural development and cooperation. Aims of the Network To strengthen communication among its members; to collect, process and disseminate information on culture and cultural development in the world; to encourage joint research projects and cultural cooperation. Philosophy Promotion and support for dialogue, questioning and debating cultural practices and policies for cultural development. Mailing address CULTURELINK/IMO Ul. Lj. F. Vukotinovića 2 P.O. Box 303, 10000 Zagreb, Croatia Tel.: +385 1 48 77 460 Fax.: +385 1 48 28 361 E-mail: clink@ irmo.hr URL: http://www.culturelink.hr http://www.culturelink.org Download address http://www.culturelink.org/publics/joint/digital_culture-en.pdf DIGITALCULTURE: THECHANGINGDYNAMICS ThisWorkhasbeenpublishedwiththefinancialsupportoftheUNESCOOfficein Venice-UNESCORegionalBureauforScienceandCultureinEurope. UNESCO-BRESCE The designations employed and the presentation of the material throughout this publication do not imply the expressing of any opinion whatsoever on the part of the UNESCO Secretariat concerning the legal status of any country or territory, city or areaorofitsauthorities,thedelimitationsofitsfrontiersorboundaries. The authors are responsible for the choice and the presentation
    [Show full text]
  • A Self-Sustainable Peer-To-Peer Digital Library Framework for Evolving Communities Ashraf A
    Old Dominion University ODU Digital Commons Computer Science Theses & Dissertations Computer Science Winter 2007 FreeLib: A Self-Sustainable Peer-to-Peer Digital Library Framework for Evolving Communities Ashraf A. Amrou Old Dominion University Follow this and additional works at: https://digitalcommons.odu.edu/computerscience_etds Part of the Computer Sciences Commons Recommended Citation Amrou, Ashraf A.. "FreeLib: A Self-Sustainable Peer-to-Peer Digital Library Framework for Evolving Communities" (2007). Doctor of Philosophy (PhD), dissertation, Computer Science, Old Dominion University, DOI: 10.25777/twrn-ya69 https://digitalcommons.odu.edu/computerscience_etds/96 This Dissertation is brought to you for free and open access by the Computer Science at ODU Digital Commons. It has been accepted for inclusion in Computer Science Theses & Dissertations by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. FREELIB: A SELF-SUSTAINABLE PEER-TO-PEER DIGITAL LIBRARY FRAMEWORK FOR EVOLVING COMMUNITIES by Ashraf A. Amrou M.S. February 2001, Alexandria University B.S. June 1995, Alexandria University A Dissertation Submitted to the Faculty of Old Dominion University in Partial Fulfillment of the Requirement for the Degree of DOCTOR OF PHILOSOPHY COMPUTER SCIENCE OLD DOMINION UNIVERSITY December 2007 Approved by: Kurt Maly (Co-Director) Mohammad Zubair (Co-Director) rfussein Abdel-Wahab (Member) Ravi Mjjldcamala (Member) lamea (Member Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. ABSTRACT FREELIB: A SELF-SUSTAINABLE PEER-TO-PEER DIGITAL LIBRARY FRAMEWORK FOR EVOLVING COMMUNITIES Ashraf Amrou Old Dominion University, 2007 Co-Directors of Advisory Committee: Dr. Kurt Maly Dr. Mohammad Zubair The need for efficient solutions to the problem of disseminating and sharing of data is growing.
    [Show full text]
  • A Hardware Abstraction Layer in Java
    A Hardware Abstraction Layer in Java MARTIN SCHOEBERL Vienna University of Technology, Austria STEPHAN KORSHOLM Aalborg University, Denmark TOMAS KALIBERA Purdue University, USA and ANDERS P. RAVN Aalborg University, Denmark Embedded systems use specialized hardware devices to interact with their environment, and since they have to be dependable, it is attractive to use a modern, type-safe programming language like Java to develop programs for them. Standard Java, as a platform independent language, delegates access to devices, direct memory access, and interrupt handling to some underlying operating system or kernel, but in the embedded systems domain resources are scarce and a Java virtual machine (JVM) without an underlying middleware is an attractive architecture. The contribution of this paper is a proposal for Java packages with hardware objects and interrupt handlers that interface to such a JVM. We provide implementations of the proposal directly in hardware, as extensions of standard interpreters, and finally with an operating system middleware. The latter solution is mainly seen as a migration path allowing Java programs to coexist with legacy system components. An important aspect of the proposal is that it is compatible with the Real-Time Specification for Java (RTSJ). Categories and Subject Descriptors: D.4.7 [Operating Systems]: Organization and Design—Real-time sys- tems and embedded systems; D.3.3 [Programming Languages]: Language Classifications—Object-oriented languages; D.3.3 [Programming Languages]: Language Constructs and Features—Input/output General Terms: Languages, Design, Implementation Additional Key Words and Phrases: Device driver, embedded system, Java, Java virtual machine 1. INTRODUCTION When developing software for an embedded system, for instance an instrument, it is nec- essary to control specialized hardware devices, for instance a heating element or an inter- ferometer mirror.
    [Show full text]
  • 2020 SIGACT REPORT SIGACT EC – Eric Allender, Shuchi Chawla, Nicole Immorlica, Samir Khuller (Chair), Bobby Kleinberg September 14Th, 2020
    2020 SIGACT REPORT SIGACT EC – Eric Allender, Shuchi Chawla, Nicole Immorlica, Samir Khuller (chair), Bobby Kleinberg September 14th, 2020 SIGACT Mission Statement: The primary mission of ACM SIGACT (Association for Computing Machinery Special Interest Group on Algorithms and Computation Theory) is to foster and promote the discovery and dissemination of high quality research in the domain of theoretical computer science. The field of theoretical computer science is the rigorous study of all computational phenomena - natural, artificial or man-made. This includes the diverse areas of algorithms, data structures, complexity theory, distributed computation, parallel computation, VLSI, machine learning, computational biology, computational geometry, information theory, cryptography, quantum computation, computational number theory and algebra, program semantics and verification, automata theory, and the study of randomness. Work in this field is often distinguished by its emphasis on mathematical technique and rigor. 1. Awards ▪ 2020 Gödel Prize: This was awarded to Robin A. Moser and Gábor Tardos for their paper “A constructive proof of the general Lovász Local Lemma”, Journal of the ACM, Vol 57 (2), 2010. The Lovász Local Lemma (LLL) is a fundamental tool of the probabilistic method. It enables one to show the existence of certain objects even though they occur with exponentially small probability. The original proof was not algorithmic, and subsequent algorithmic versions had significant losses in parameters. This paper provides a simple, powerful algorithmic paradigm that converts almost all known applications of the LLL into randomized algorithms matching the bounds of the existence proof. The paper further gives a derandomized algorithm, a parallel algorithm, and an extension to the “lopsided” LLL.
    [Show full text]
  • Modeling of Hardware and Software for Specifying Hardware Abstraction
    Modeling of Hardware and Software for specifying Hardware Abstraction Layers Yves Bernard, Cédric Gava, Cédrik Besseyre, Bertrand Crouzet, Laurent Marliere, Pierre Moreau, Samuel Rochet To cite this version: Yves Bernard, Cédric Gava, Cédrik Besseyre, Bertrand Crouzet, Laurent Marliere, et al.. Modeling of Hardware and Software for specifying Hardware Abstraction Layers. Embedded Real Time Software and Systems (ERTS2014), Feb 2014, Toulouse, France. hal-02272457 HAL Id: hal-02272457 https://hal.archives-ouvertes.fr/hal-02272457 Submitted on 27 Aug 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Modeling of Hardware and Software for specifying Hardware Abstraction Layers Yves BERNARD1, Cédric GAVA2, Cédrik BESSEYRE1, Bertrand CROUZET1, Laurent MARLIERE1, Pierre MOREAU1, Samuel ROCHET2 (1) Airbus Operations SAS (2) Subcontractor for Airbus Operations SAS Abstract In this paper we describe a practical approach for modeling low level interfaces between software and hardware parts based on SysML operations. This method is intended to be applied for the development of drivers involved on what is classically called the “hardware abstraction layer” or the “basic software” which provide high level services for resources management on the top of a bare hardware platform.
    [Show full text]
  • Computer Networking in Nuclear Medicine
    CONTINUING EDUCATION Computer Networking In Nuclear Medicine Michael K. O'Connor Department of Radiology, The Mayo Clinic, Rochester, Minnesota to the possibility of not only connecting computer systems Objective: The purpose of this article is to provide a com­ from different vendors, but also connecting these systems to prehensive description of computer networks and how they a standard PC, Macintosh and other workstations in a de­ can improve the efficiency of a nuclear medicine department. partment (I). It should also be possible to utilize many other Methods: This paper discusses various types of networks, network resources such as printers and plotters with the defines specific network terminology and discusses the im­ nuclear medicine computer systems. This article reviews the plementation of a computer network in a nuclear medicine technology of computer networking and describes the ad­ department. vantages and disadvantages of such a network currently in Results: A computer network can serve as a vital component of a nuclear medicine department, reducing the time ex­ use at Mayo Clinic. pended on menial tasks while allowing retrieval and transfer­ WHAT IS A NETWORK? ral of information. Conclusions: A computer network can revolutionize a stan­ A network is a way of connecting several computers to­ dard nuclear medicine department. However, the complexity gether so that they all have access to files, programs, printers and size of an individual department will determine if net­ and other services (collectively called resources). In com­ working will be cost-effective. puter jargon, such a collection of computers all located Key Words: Computer network, LAN, WAN, Ethernet, within a few thousand feet of each other is called a local area ARCnet, Token-Ring.
    [Show full text]
  • Creating and Managing a Digital Library
    Creating and Managing a Digital Library 1 Agenda • Housekeeping items • Introduction of speakers – Laura Costello – Sharon Yang – Richard Jost • Questions 2 3 Creating and Managing a Digital Library Creating a digital library takes time, effort, and resources, but the tools are available, thanks to the popularity of the digital movement. In this panel discussion, three experts in the field of librarianship will share their views on the role of the librarian in providing tools and guidance to create and manage a digital library. 4 Introducing Our Panel A Climate of Demand: The shift from traditional print collections to the emergence of eBooks and demand-driven acquisitions Laura Costello, Head of Research & Emerging Technologies Stony Brook University Altmetrics and Research Support: Tips on using altmetrics to measure the impact of your digital library Sharon Q Yang, Professor and Systems Librarian Rider University Libraries, New Jersey Staffing the Library of the Future: The skills librarians need as the library transitions from a print to a more technical environment Richard Jost, Director of the Law Librarianship Program University of Washington Information School 5 ‘ A Climate of Demand 6 Hi! I’m Laura Head of Research & Emerging Technologies at Stony Brook‘ University [email protected] http://bit.ly/CostelloDDA 7 Evaluating Demand- Driven Acquisitions Chandos Publishing,‘ 2016 8 1. Context 2. Case Studies ‘ 3. New Research 4. What’s next? 9 ➔ What we talk about when we talk about monographs ◆ Serials ◆ Space ‘ ◆ Processing/Outsourcing
    [Show full text]
  • Network‐Based Approaches for Pathway Level Analysis
    Network-Based Approaches for Pathway UNIT 8.25 Level Analysis Tin Nguyen,1 Cristina Mitrea,2 and Sorin Draghici2,3 1Department of Computer Science and Engineering, University of Nevada, Reno, Nevada 2Department of Computer Science, Wayne State University, Detroit, Michigan 3Department of Obstetrics and Gynecology, Wayne State University, Detroit, Michigan Identification of impacted pathways is an important problem because it allows us to gain insights into the underlying biology beyond the detection of differ- entially expressed genes. In the past decade, a plethora of methods have been developed for this purpose. The last generation of pathway analysis methods are designed to take into account various aspects of pathway topology in order to increase the accuracy of the findings. Here, we cover 34 such topology-based pathway analysis methods published in the past 13 years. We compare these methods on categories related to implementation, availability, input format, graph models, and statistical approaches used to compute pathway level statis- tics and statistical significance. We also discuss a number of critical challenges that need to be addressed, arising both in methodology and pathway repre- sentation, including inconsistent terminology, data format, lack of meaningful benchmarks, and, more importantly, a systematic bias that is present in most existing methods. C 2018 by John Wiley & Sons, Inc. Keywords: systems biology r pathway r topology r gene network r survey r pathway analysis How to cite this article: Nguyen, T., Mitrea, C., & Draghici, S. (2018). Network-based approaches for pathway level analysis. Current Protocols in Bioinformatics, 61, 8.25.1–8.25.24. doi: 10.1002/cpbi.42 INTRODUCTION this gap is the fact that living organisms are With rapid advances in high-throughput complex systems whose emerging phenotypes technologies, various kinds of genomic are the results of multiple complex interactions data have become prevalent in most of taking place on various metabolic and signal- biomedical research.
    [Show full text]