CrowJack

  • Calculators
  • Swot Analysis
  • Pestle Analysis
  • Five Forces Analysis
  • Organizational Structure
  • Copywriting
  • Research Topics
  • Student Resources

CrowJack

Services We Provide

proof-reading

Resources We Provide

blog

Login / Register

login

  • 15 Latest Networking Research Topics for Students

Kiara Miller - Image

Comparative analysis between snort and suricata IDS software(s)

Description of the topic

The main focus of this research is to conduct a comparative analysis between Snort and Suricata software to determine which IDS software can provide better performance. There are various IDS software(s) available that can be used by organizations but it is difficult to identify which one is best (Aldarwbi et al., 2022). Different organizational structures are often facing problems while setting up an IDS system which results in false positives and intrusions. Through this research, it can be identified which IDS software is better and what secure configuration is required to detect intrusions (Waleed et al., 2022).

Research objectives

  • To evaluate Snort and Suricata IDS software(s) to determine the most optimal one.
  • To identify the false positive rate of Snort and Suricata on the networked environment.

Research questions

RQ1: Which IDS software can perform better on the production network in terms of performance, security, scalability and reliability?

RQ2: What different ways can be followed to deal with false positive problems in IDS technology?

Research methodology

The given research objectives and research questions can be addressed using quantitative research methodology where an experimental approach can be followed. For the given topic, both Snort and Suricata IDS systems should be configured and tested against different attacks. Depending on the findings, it can be analyzed which IDS software can perform better in terms of performance and security (Shuai & Li, 2021).

  • Aldarwbi, M.Y., Lashkari, A.H. and Ghorbani, A.A. (2022) “The sound of intrusion: A novel network intrusion detection system,” Computers and Electrical Engineering , 104, p. 108455.
  • Shuai, L. and Li, S. (2021) “Performance optimization of Snort based on DPDK and Hyperscan,” Procedia Computer Science , 183, pp. 837-843.
  • Waleed, A., Jamali, A.F. and Masood, A. (2022) “Which open-source ids? Snort, Suricata or Zeek,” Computer Networks , 213, p. 109116.

Role of honeypots and honey nets in network security

Network Security has become essential nowadays and there is a need for setting up robust mechanisms to maintain confidentiality and integrity (Feng et al., 2023). Due to the number of security mechanisms available, organizations found it hard to finalize and implement them on their network. For example, honey pots and honeynet approaches look almost the same and have the same purpose but work differently. Under this research topic, the configuration of honeynets and honeypots can be done to check which one can perform better security in terms of trapping cyber attackers. The entire implementation can be carried out in the cloud-based instance for improved security and it can be identified which type of honey pot technology must be preferred (Maesschalck et al., 2022).

  • To set up a honey pot system using Open Canary on the virtual instance to protect against cyber attackers.
  • To set up a honeynet system on the virtual instance to assure protection is provided against malicious attackers.
  • To test honeypots and honeynets by executing DDoS attacks to check which can provide better security.

RQ1: Why is there a need for using honeypots over honey pots in a production networked environment?

RQ2: What are the differences between cloud-based and local honey pot systems for endpoint protection?

This research can be carried out using the quantitative method of research. At the initial stage, the implementation of honeypots and honeypots can be done on the virtual instance following different security rules. Once the rules are applied, the testing can be performed using a Kali Linux machine to check whether honey pots were effective or honeynets (Gill et al., 2020).

  • Feng, H. et al. (2023) “Game theory in network security for Digital Twins in industry,” Digital Communications and Networks [Preprint].
  • Gill, K.S., Saxena, S. and Sharma, A. (2020) “GTM-CSEC: A game theoretic model for cloud security based on ids and Honeypot,” Computers & Security , 92, p. 101732
  • Maesschalck, S. et al. (2022) “Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security,” Computers & Security , 114, p. 102598.

How do malware variants are progressively improving?

This research can be based on evaluating how malware variants are progressively improving and what should be its state in the coming future. Malware is able to compromise confidential user’s information assets which is why this research can be based on identifying current and future consequences owing to its improvements (Deng et al., 2023). In this field, there is no research work that has been carried out to identify how malware variants are improving their working and what is expected to see in future. Once the evaluation is done, a clear analysis can also be done on some intelligent preventive measures to deal with dangerous malware variants and prevent any kind of technological exploitation (Tang et al., 2023).

  • To investigate types of malware variants available to learn more about malware's hidden features.
  • To focus on future implications of malware executable programs and how they can be avoided.
  • To discuss intelligent solutions to deal with all malware variants.

RQ1: How do improvements in malware variants impact enterprises?

RQ2: What additional solutions are required to deal with malware variants?

In this research, qualitative analysis can be conducted on malware variants and the main reason behind their increasing severity. The entire research can be completed based on qualitative research methodology to answer defined research questions and objectives. Some real-life case studies should also be integrated into the research which can be supported by the selected topic (Saidia Fasci et al., 2023).

  • Deng, H. et al. (2023) “MCTVD: A malware classification method based on three-channel visualization and deep learning,” Computers & Security , 126, p. 103084.
  • Saidia Fasci, L. et al. (2023) “Disarming visualization-based approaches in malware detection systems,” Computers & Security , 126, p. 103062.
  • Tang, Y. et al. (2023) “BHMDC: A byte and hex n-gram based malware detection and classification method,” Computers & Security , p. 103118.

Implementation of IoT - enabled smart office/home using cisco packet tracer

The Internet of Things has gained much more attention over the past few years which is why each enterprise and individual aims at setting up an IoT network to automate their processes (Barriga et al., 2023). This research can be based on designing and implementing an IoT-enabled smart home/office network using Cisco Packet Tracer software. Logical workspace, all network devices, including IoT devices can be used for preparing a logical network star topology (Elias & Ali, 2014). To achieve automation, the use of different IoT rules can be done to allow devices to work based on defined rules.

  • To set up an IoT network on a logical workspace using Cisco Packet Tracer simulation software.
  • To set up IoT-enabled rules on an IoT registration server to achieve automation (Hou et al., 2023).

RQ: Why is the Cisco packet tracer preferred for network simulation over other network simulators?

At the beginning of this research, a quantitative research methodology can be followed where proper experimental set-up can be done. As a packet tracer is to be used, the star topology can be used to interconnect IoT devices, sensors and other network devices at the home/office. Once a placement is done, the configuration should be done using optimal settings and all IoT devices can be connected to the registration server. This server will have IoT rules which can help in achieving automation by automatically turning off lights and fans when no motion is detected (Baggan et al., 2022).

  • Baggan, V. et al. (2022) “A comprehensive analysis and experimental evaluation of Routing Information Protocol: An Elucidation,” Materials Today: Proceedings , 49, pp. 3040–3045.
  • Barriga, J.A. et al. (2023) “Design, code generation and simulation of IOT environments with mobility devices by using model-driven development: Simulateiot-Mobile,” Pervasive and Mobile Computing , 89, p. 101751.
  • Elias, M.S. and Ali, A.Z. (2014) “Survey on the challenges faced by the lecturers in using packet tracer simulation in computer networking course,” Procedia - Social and Behavioral Sciences , 131, pp. 11–15.
  • Hou, L. et al. (2023) “Block-HRG: Block-based differentially private IOT networks release,” Ad Hoc Networks , 140, p. 103059.

Comparative analysis between AODV, DSDV and DSR routing protocols in WSN networks

For wireless sensor networks (WSN), there is a major need for using WSN routing rather than performing normal routines. As WSN networks are self-configured, there is a need for an optimal routing protocol that can improve network performance in terms of latency, jitter, and packet loss (Luo et al., 2023). There are often various problems faced when WSN networks are set up due to a lack of proper routing protocol selection. As a result of this, severe downtime is faced and all links are not able to communicate with each other easily (Hemanand et al., 2023). In this research topic, the three most widely used WSN routing protocols AODV, DSDV and DSR can be compared based on network performance. To perform analysis, three different scenarios can be created in network simulator 2 (Ns2).

  • To create three different scenarios on ns2 software to simulate a network for 1 to 100 seconds.
  • To analyze which WSN routing is optimal in terms of network performance metrics, including latency, jitter and packet loss.
  • To use CBR and NULL agents for all wireless scenarios to start with simulation purposes.

RQ: How do AODV, DSR and DSDV routing protocols differ from each other in terms of network performance?

This research can be carried out using a quantitative research method. The implementation for the provided research topic can be based on Ns2 simulation software where three different scenarios can be created (AODV, DSDV and DSR). For each scenario, NULL, CSR and UDP agents can be done to start with simulation for almost 1 to 100 seconds. For all transmissions made during the given time, network performance can be checked to determine which routing is best (Mohapatra & Kanungo, 2012).

  • Human and, D. et al. (2023) “Analysis of power optimization and enhanced routing protocols for Wireless Sensor Networks,” Measurement: Sensors , 25, p. 100610. Available at: https://doi.org/10.1016/j.measen.2022.100610.
  • Luo, S., Lai, Y. and Liu, J. (2023) “Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network,” Computers & Security , 126, p. 103083. Available at: https://doi.org/10.1016/j.cose.2022.103083.
  • Mohapatra, S. and Kanungo, P. (2012) “Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 Simulator,” Procedia Engineering , 30, pp. 69–76. Available at: https://doi.org/10.1016/j.proeng.2012.01.835.

Securing wireless network using AAA authentication and WLAN controller

Wireless networks often face intrusion attempts due to insecure protocols and sometimes open SSIDs. As a result of this, man-in-the-middle and eavesdropping attacks become easier which results in the loss of confidential information assets (Sivasankari & Kamalakkannan, 2022). When it comes to managing networks in a large area, there are higher chances for attacks that enable cyber attackers in intercepting ongoing communication sessions. However, there is currently no research conducted where the use of AAA authentication has been done with WLAN controllers to make sure a higher level of protection is provided (Nashwan, 2021). The proposed research topic can be based on securing wireless networks with the help of AAA authentication and WLAN controllers. The use of AAA authentication can be done to set up a login portal for users whilst the WLAN controller can be used for managing all wireless access points connected to the network (Nashwan, 2021).

  • To set up AAA authentication service on the wireless network simulated on Cisco Packet Tracer for proper access control.
  • To set up a WLAN controller on the network to manage all wireless access points effortlessly.
  • To use WPA2-PSK protocol on the network to assure guest users are only able to access wireless networks over a secure protocol.

RQ1: What additional benefits are offered by AAA authentication on the WLAN networks?

RQ2: Why are wireless networks more likely to face network intrusions than wired networks?

This research topic is based on the secure implementation of a wireless LAN network using a Cisco packet tracer. Hence, this research can be carried out using a quantitative research method. The implementation can be carried out using AAA authentication which can assure that access control is applied for wireless logins. On the other hand, a WLAN controller can also be configured which can ensure that all WAPs are managed (ZHANG et al., 2012).

  • Nashwan, S. (2021) “AAA-WSN: Anonymous Access Authentication Scheme for wireless sensor networks in Big Data Environment,” Egyptian Informatics Journal , 22(1), pp. 15–26.
  • Sivasankari, N. and Kamalakkannan, S. (2022) “Detection and prevention of man-in-the-middle attack in IOT network using regression modeling,” Advances in Engineering Software , 169, p. 103126.
  • ZHANG, J. et al. (2012) “AAA authentication for Network mobility,” The Journal of China Universities of Posts and Telecommunications , 19(2), pp. 81-86.

OWASP's approach to secure web applications from web application exploits

The research can revolve around the development of web applications by considering OWASP's top 10 rules. Usually, web applications are deployed by organizations depending on their requirements and these applications are vulnerable to various exploits, including injection, broken authentication and other forgery attacks (Poston, 2020). Identifying every single vulnerability is difficult when reference is not taken and often organizations end up hosting a vulnerable server that leads to privacy issues and compromises confidential information easily. In this research, OWASP's top 10 approaches can be followed to develop a secure web application that can be able to protect against top web application exploits. This approach is based on emphasizing severe and minor vulnerabilities which must be patched for protecting against web application attacks (Deepa & Thilagam, 2016).

  • The first objective can be setting up an insecure web application on the cloud environment which can be exploited with different techniques.
  • The second objective can be to consider all techniques and procedures provided by OWASP's top 10 methodologies.
  • The last objective can be applying all fixes to insecure web applications to make them resistant to OWASP top 10 attacks (Sonmez, 2019).

RQ1: What are the benefits of using OWASP's top 10 approaches to harden web applications in comparison to other security approaches?

The research methodology considered for this research project can be quantitative using an experimental approach. The practical work can be done for the selected topic using AWS or the Azure cloud platform. Simply, a virtual web server can be configured and set up with a secure and insecure web application. Following OWASP's top 10 techniques and procedures, the web application can be secured from possible attacks. In addition, insecure applications can also be exploited and results can be evaluated (Applebaum et al., 2021).

  • Applebaum, S., Gaber, T. and Ahmed, A. (2021) “Signature-based and machine-learning-based web application firewalls: A short survey,” Procedia Computer Science , 189, pp. 359–367. Available at: https://doi.org/10.1016/j.procs.2021.05.105.
  • Deepa, G. and Thilagam, P.S. (2016) “Securing web applications from injection and logic vulnerabilities: Approaches and challenges,” Information and Software Technology , 74, pp. 160–180. Available at: https://doi.org/10.1016/j.infsof.2016.02.005.
  • Poston, H. (2020) “Mapping the owasp top Ten to the blockchain,” Procedia Computer Science , 177, pp. 613-617. Available at: https://doi.org/10.1016/j.procs.2020.10.087.
  • Sonmez, F.Ö. (2019) “Security qualitative metrics for Open Web Application Security Project Compliance,” Procedia Computer Science , 151, pp. 998-1003. Available at: https://doi.org/10.1016/j.procs.2019.04.140.

Importance of configuring RADIUS (AAA) server on the network

User authentication has become significant nowadays as it guarantees that a legitimate user is accessing the network. But a problem is faced when a particular security control is to be identified for authentication and authorization. These controls can be categorized based on mandatory access controls, role-based access control, setting up captive portals and many more. Despite several other security controls, one of the most efficient ones is the RADIUS server (SONG et al., 2008). This server can authenticate users on the network to make sure network resources are accessible to only legal users. This research topic can be based on understanding the importance of RADIUS servers on the network which can also be demonstrated with the help of the Cisco Packet Tracer. A network can be designed and equipped with a RADIUS server to ensure only legal users can access network resources (WANG et al., 2009).

  • To configure RADIUS (AAA) server on the network which can be able to authenticate users who try to access network resources.
  • To simulate a network on a packet tracer simulation software and verify network connectivity.

RQ1: What are other alternatives to RADIUS (AAA) authentication servers for network security?

RQ2: What are the common and similarities between RADIUS and TACACS+ servers?

As a logical network is to be designed and configured, a quantitative research methodology can be followed. In this research coursework, a secure network design can be done using a packet tracer network simulator, including a RADIUS server along with the DMZ area. The configuration for the RADIUS server can be done to allow users to only access network resources by authenticating and authorizing (Nugroho et al., 2022).

  • Nugroho, Y.S. et al. (2022) “Dataset of network simulator related-question posts in stack overflow,” Data in Brief , 41, p. 107942.
  • SONG, M., WANG, L. and SONG, J.-de (2008) “A secure fast handover scheme based on AAA protocol in Mobile IPv6 Networks,” The Journal of China Universities of Posts and Telecommunications , 15, pp. 14-18.
  • WANG, L. et al. (2009) “A novel congestion control model for interworking AAA in heterogeneous networks,” The Journal of China Universities of Posts and Telecommunications , 16, pp. 97-101.

Comparing mod security and pF sense firewall to block illegitimate traffic

Firewalls are primarily used for endpoint security due to their advanced features ranging from blocking to IDS capabilities and many more. It is sometimes challenging to identify which type of firewall is best and due to this reason, agencies end up setting up misconfigured firewalls (Tiwari et al., 2022). This further results in a cyber breach, destroying all business operations. The research can be emphasizing conducting a comparison between the two most widely used firewalls i.e. Mod Security and pF sense. Using a virtualized environment, both firewalls can be configured and tested concerning possible cyber-attacks (Lu & Yang, 2020).

  • To use the local environment to set up Mod security and pF sense firewall with appropriate access control rules.
  • To test both firewalls by executing distributed denial of service attacks from a remote location.
  • To compare which type of firewall can provide improved performance and robust security.

RQ: How do Mod security and pF sense differ from each other in terms of features and performance?

The practical experimentation for both firewalls can be done using a virtualized environment where two different machines can be created. Hence, this research can be carried out using a quantitative research method . The first machine can have Mod security and the second machine can have pF sense configured. A new subnet can be created which can have these two machines. The third machine can be an attacking machine which can be used for testing firewalls. The results obtained can be then evaluated to identify which firewall is best for providing security (Uçtu et al., 2021).

  • Lu, N. and Yang, Y. (2020) “Application of evolutionary algorithm in performance optimization of Embedded Network Firewall,” Microprocessors and Microsystems , 76, p. 103087.
  • Tiwari, A., Papini, S. and Hemamalini, V. (2022) “An enhanced optimization of parallel firewalls filtering rules for scalable high-speed networks,” Materials Today: Proceedings , 62, pp. 4800-4805.
  • Uçtu, G. et al. (2021) “A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls,” Future Generation Computer Systems , 124, pp. 56-67.

Conducting a comprehensive investigation on the PETYA malware

The main purpose of this research is to conduct a comprehensive investigation of the PETYA malware variant (McIntosh et al., 2021). PETYA often falls under the category of ransomware attacks which not only corrupt and encrypt files but can compromise confidential information easily. Along with PETYA, there are other variants also which lead to a security outage and organizations are not able to detect these variants due to a lack of proper detection capabilities (Singh & Singh, 2021). In this research, a comprehensive analysis has been done on PETYA malware to identify its working and severity level. Depending upon possible causes of infection of PETYA malware, some proactive techniques can also be discussed (Singh & Singh, 2021). A separation discussion can also be made on other malware variants, their features, and many more.

  • The main objective of this research is to scrutinize the working of PETYA malware because a ransomware attack can impact the micro and macro environment of the organizations severely.
  • The working of PETYA malware along with its source code can be reviewed to identify its structure and encryption type.
  • To list all possible CVE IDs which are exploited by the PETYA malware.

RQ1: How dangerous is PETYA malware in comparison to other ransomware malware?

This research can be based on qualitative research methodology to evaluate the working of PETYA malware from various aspects, the methodology followed and what are its implications. The research can be initiated by evaluating the working of PETYA malware, how it is triggered, what encryption is applied and other factors. A sample source code can also be analyzed to learn more about how cryptography is used with ransomware (Abijah Roseline & Geetha, 2021).

  • Abijah Roseline, S. and Geetha, S. (2021) “A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks,” Computers & Electrical Engineering , 92, p. 107143.
  • McIntosh, T. et al. (2021) “Enforcing situation-aware access control to build malware-resilient file systems,” Future Generation Computer Systems , 115, pp. 568-582.
  • Singh, J. and Singh, J. (2021) “A survey on machine learning-based malware detection in executable files,” Journal of Systems Architecture , 112, p. 101861.

Setting up a Live streaming server on the cloud platform

Nowadays, various organizations require a live streaming server to stream content depending upon their business. However, due to a lack of proper hardware, organizations are likely to face high network congestion, slowness and other problems (Ji et al., 2023). Referring to the recent cases, it has been observed that setting up a streaming server on the local environment is not expected to perform better than a cloud-based streaming server configuration (Martins et al., 2019). This particular research topic can be based on setting up a live streaming server on the AWS or Azure cloud platform to make sure high network bandwidth is provided with decreased latency. The research gap analysis would be conducted to analyze the performance of live streaming servers on local and cloud environments in terms of network performance metrics (Bilal et al., 2018).

  • To set up a live streaming server on the AWS or Azure cloud platform to provide live streaming services.
  • To use load balancers alongside streaming servers to ensure the load is balanced and scalability is achieved.
  • To use Wireshark software to test network performance during live streaming.

RQ1: Why are in-house streaming servers not able to provide improved performance in comparison to cloud-based servers?

RQ2: What additional services are provided by cloud service providers which help in maintaining network performance?

The implementation is expected to carry out on the AWS cloud platform with other AWS services i.e. load balancer, private subnet and many more (Efthymiopoulou et al., 2017). Hence, this research can be carried out using a quantitative research method. The configuration of ec2 instances can be done which can act as a streaming server for streaming media and games. For testing this project, the use of OBS studio can be done which can help in checking whether streaming is enabled or not. For network performance, Wireshark can be used for testing network performance (George et al., 2020).

  • Bilal, KErbad, A. and Hefeeda, M. (2018) “QoE-aware distributed cloud-based live streaming of multi-sourced Multiview Videos,” Journal of Network and Computer Applications , 120, pp. 130-144.
  • Efthymiopoulou, M. et al. (2017) “Robust control in cloud-assisted peer-to-peer live streaming systems,” Pervasive and Mobile Computing , 42, pp. 426-443.
  • George, L.C. et al. (2020) “Usage visualization for the AWS services,” Procedia Computer Science , 176, pp. 3710–3717.
  • Ji, X. et al. (2023) “Adaptive QoS-aware multipath congestion control for live streaming,” Computer Networks , 220, p. 109470.
  • Martins, R. et al. (2019) “Iris: Secure reliable live-streaming with Opportunistic Mobile Edge Cloud offloading,” Future Generation Computer Systems , 101, pp. 272-292.

Significance of using OSINT framework for Network reconnaissance

Network reconnaissance is becoming important day by day when it comes to penetration testing. Almost all white hat hackers are dependent on the OSINT framework to start with network reconnaissance and footprinting when it comes to evaluating organizational infrastructure. On the other hand, cyber attackers are also using this technique to start fetching information about their target. Currently, there is no investigation carried out to identify how effective the OSINT framework is over traditional reconnaissance activities (Liu et al., 2022). This research is focused on using OSINT techniques to analyze victims using different sets of tools like Maltego, email analysis and many other techniques. The analysis can be based on fetching sensitive information about the target which can be used for conducting illegal activities (Abdullah, 2019).

  • To use Maltego software to conduct network reconnaissance on the target by fetching sensitive information.
  • To compare the OSINT framework with other techniques to analyze why it performs well.

RQ1: What is the significance of using the OSINT framework in conducting network reconnaissance?

RQ2: How can the OSINT framework be used by cyber hackers for conducting illegitimate activities?

The OSINT framework is easily accessible on its official website where different search options are given. Hence, this research can be carried out using a quantitative research method. Depending upon the selected target, each option can be selected and tools can be shortlisted for final implementation. Once the tools are shortlisted, they can be used to conduct network reconnaissance (González-Granadillo et al., 2021). For example, Maltego can be used as it is a powerful software to fetch information about the target.

  • Abdullah, S.A. (2019) “Seui-64, bits an IPv6 addressing strategy to mitigate reconnaissance attacks,” Engineering Science and Technology , an International Journal, 22(2), pp. 667–672.
  • Gonzalez-Granadillo, G. et al. (2021) “ETIP: An enriched threat intelligence platform for improving OSINT correlation, analysis, visualization and sharing capabilities,” Journal of Information Security and Applications , 58, p. 102715.
  • Liu, W. et al. (2022) “A hybrid optimization framework for UAV Reconnaissance Mission Planning,” Computers & Industrial Engineering , 173, p. 108653.

Wired and wireless network hardening in cisco packet tracer

At present, network security has become essential and if enterprises are not paying attention to the security infrastructure, there are several chances for cyber breaches. To overcome all these issues, there is a need for setting up secure wired and wireless networks following different techniques such as filtered ports, firewalls, VLANs and other security mechanisms. For the practical part, the use of packet tracer software can be done to design and implement a highly secure network (Sun, 2022).

  • To use packet tracer simulation software to set up secure wired and wireless networks.
  • Use different hardening techniques, including access control rules, port filtering, enabling passwords and many more to assure only authorized users can access the network (Zhang et al., 2012).

RQ: Why is there a need for emphasizing wired and wireless network security?

Following the quantitative approach, the proposed research topic implementation can be performed in Cisco Packet Tracer simulation software. Several devices such as routers, switches, firewalls, wireless access points, hosts and workstations can be configured and interconnected using Cat 6 e cabling. For security, every device can be checked and secure design principles can be followed like access control rules, disabled open ports, passwords, encryption and many more (Smith & Hasan, 2020).

  • Smith, J.D. and Hasan, M. (2020) “Quantitative approaches for the evaluation of Implementation Research Studies,” Psychiatry Research , 283, p. 112521.
  • Sun, J. (2022) “Computer Network Security Technology and prevention strategy analysis,” Procedia Computer Science , 208, pp. 570–576.
  • Zhang, YLiang, R. and Ma, H. (2012) “Teaching innovation in computer network course for undergraduate students with a packet tracer,” IERI Procedia , 2, pp. 504–510.

Different Preemptive ways to resist spear phishing attacks

When it comes to social engineering, phishing attacks are rising and are becoming one of the most common ethical issues as it is one of the easiest ways to trick victims into stealing information. This research topic is based on following different proactive techniques which would help in resisting spear phishing attacks (Xu et al., 2023). This can be achieved by using the Go-Phish filter on the machine which can automatically detect and alert users as soon as the phished URL is detected. It can be performed on the cloud platform where the apache2 server can be configured along with an anti-phishing filter to protect against phishing attacks (Yoo & Cho, 2022).

  • To set up a virtual instance on the cloud platform with an apache2 server and anti-phishing software to detect possible phishing attacks.
  • To research spear phishing and other types of phishing attacks that can be faced by victims (Al-Hamar et al., 2021).

RQ1: Are phishing attacks growing just like other cyber-attacks?

RQ2: How effective are anti-phishing filters in comparison to cyber awareness sessions?

The entire research can be conducted by adhering to quantitative research methodology which helps in justifying all research objectives and questions. The implementation of the anti-phishing filter can be done by creating a virtual instance on the cloud platform which can be configured with an anti-phishing filter. Along with this, some phishing attempts can also be performed to check whether the filter works or not (Siddiqui et al., 2022).

  • Al-Hamar, Y. et al. (2021) “Enterprise credential spear-phishing attack detection,” Computers & Electrical Engineering , 94, p. 107363.
  • Siddiqui, N. et al. (2022) “A comparative analysis of US and Indian laws against phishing attacks,” Materials Today: Proceedings , 49, pp. 3646–3649.
  • Xu, T., Singh, K. and Rajivan, P. (2023) “Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks,” Applied Ergonomics , 108, p. 103908.
  • Yoo, J. and Cho, Y. (2022) “ICSA: Intelligent chatbot security assistant using text-CNN and multi-phase real-time defense against SNS phishing attacks,” Expert Systems with Applications , 207, p. 117893.

Evaluating the effectiveness of distributed denial of service attacks

The given research topic is based on evaluating the effectiveness of distributed denial of service attacks on cloud and local environments. Hence, this research can be carried out using a quantitative research method. Cyber attackers find DDoS as one of the most dangerous technological exploitation when it comes to impacting network availability (Krishna Kishore et al., 2023). This research can revolve around scrutinizing the impact of DDoS attacks on the local environment and cloud environment. This can be done by executing DDoS attacks on a simulated environment using hoping or other software(s) to check where it has a higher magnitude (de Neira et al., 2023).

  • To set up a server on the local and cloud environment to target using DDoS attacks for checking which had experienced slowness.
  • To determine types of DDoS attack types, their magnitude and possible mitigation techniques.

RQ: Why do DDoS attacks have dynamic nature and how is it likely to sternly impact victims?

The experimentation for this research can be executed by creating a server on the local and cloud environment. Hence, this research can be carried out using a quantitative research method. These servers can be set up as web servers using apache 2 service. On the other hand, a Kali Linux machine can be configured with DDoS execution software. Each server can be targeted with DDoS attacks to check its effectiveness (Benlloch-Caballero et al., 2023).

  • Benlloch-Caballero, P., Wang, Q. and Alcaraz Calero, J.M. (2023) “Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IOT networks from distributed denial of service attacks,” Computer Networks , 222, p. 109526.
  • de Neira, A.B., Kantarci, B. and Nogueira, M. (2023) “Distributed denial of service attack prediction: Challenges, open issues and opportunities,” Computer Networks , 222, p. 109553.
  • Krishna Kishore, P., Ramamoorthy, S. and Rajavarman, V.N. (2023) “ARTP: Anomaly-based real time prevention of distributed denial of service attacks on the web using machine learning approach,” International Journal of Intelligent Networks , 4, pp. 38–45.

Recommended Readings

Latest Web Development Research Topics

Top Management Research Topics

Newest AI Research Topics

15 Latest Networking Research Topics for Students

Research in every field is becoming more and more essential because of constant developments around the world. Similar is the case in the field of networking. This is the reason; students who are preparing to master the field of networking need to keep their knowledge of the current state of the art in the field up to date.

However, choosing the right research topic often becomes a tough task for students to carry out their research effectively. That being the case, this list contains 15 latest research topics in the field of networking. Whether you are a seasoned researcher or just starting, this list can provide you with ample inspiration and guidance to drive your research forward in the dynamic and evolving field of Networking.

Facebook

Copyright © 2023 CrowJack. All Rights Reserved

new research topics in networking

  • SUGGESTED TOPICS
  • The Magazine
  • Newsletters
  • Managing Yourself
  • Managing Teams
  • Work-life Balance
  • The Big Idea
  • Data & Visuals
  • Reading Lists
  • Case Selections
  • HBR Learning
  • Topic Feeds
  • Account Settings
  • Email Preferences

A Better Approach to Networking

  • Christie Hunter Arscott

new research topics in networking

Move from “small talk” to “deep talk.”

Meeting strangers — especially in the context of work — is uncomfortable for most people. Just the thought of networking can provoke discomfort and anxiety. As humans, we have an innate need to be liked. Research shows we even have a tendency to connect our self-worth to the number of people who like us.

  • Because of this, many struggle with performance anxiety when it comes to networking. You’re afraid you might say the wrong thing, forget what you were going to say, or stumble over your words. The result would be the other person not liking you. But there’s a better way to network.
  • Focus on what you’re going to ask, not what going to say. Instead of preparing what you’d say when meeting someone new or how you’d respond to questions from a stranger, focus on what you’d ask in those same scenarios.
  • Then, practice moving from small talk to deep talk. We tend to underestimate how much other people, and especially first-time contacts, might enjoy and find satisfaction in meaningful conversation. Instead of asking “Where are you from?” ask, “What places have you lived in and traveled to during your educational and career journey that have shaped who you are?”

Do you shy away from talking to new people at networking events? Have you ever walked into the room and felt a tightness in your chest as you stood there, sweating, wondering what to say? Most of us can relate to some version of this experience. Meeting strangers — especially in the context of work — is uncomfortable. Just the thought of networking can provoke discomfort and anxiety.

new research topics in networking

  • Christie Hunter Arscott is an award-winning advisor, speaker, and author of the book Begin Boldly: How Women Can Reimagine Risk, Embrace Uncertainty, and Launch A Brilliant Career . A Rhodes Scholar, Christie has been named by Thinkers50 as one of the top management thinkers likely to shape the future of business.

Partner Center

edugate

Latest Research Topics in Networking

                Latest Research Topics in Networking offer newfangled project topics for our students from bachelors and master degree (B.E/M.E/M.Phil/M.Tech/MCA) in the field of networking. Networking is the biggest and fastest emerging area, making it hinder students with new research into networking technologies. However, students spend more money on their networking projects. To help our students, we also offer the latest networking projects at optimum cost as far as we also provided 5000+ projects from 120+ countries students from all over the world.

We develop projects both in software and hardware, and in software, we use both open source and proprietary software. We also suggest our students always choose the latest topics because the latest ideas only give something innovative and colorful.

Think well…Always be a part of us… we pose your pioneering projects…..

Topics in Networking

                  Latest Research Topics in Networking covers possible list of topics intended also for under graduate and also post graduate students and scholars. In networking, security is one of the major issues in all types of wired and wireless networks, e.g., cloud networking. There is also a lot of research in the networking field because it is also a vast area that prefers among more users.  

Generally,  networking is defined as the computing devices that exchange information and share ideas among individuals or groups of devices or users using either wired or wireless connection.

Let us see the latest topics in networking,

  • Secure and control sensitive data also in cloud environment (any)
  • The future of IoT and also bio metrics
  • Software defined networking
  • Network security and also cryptography
  • Network Function Virtualization
  • Cognitive computing and also machine learning
  • Micro services architecture
  • Adaptive security
  • Augmented and virtual reality
  • Cloud networking
  • Big data analytics in mobile networking
  • Smart personal assistants
  • Wearable’s in sensor networks
  • Blockchain as a service (BaaS)
  • Containerization (traditional virtualization)
  • Resource allocation SDN
  • Ultra dense wireless networks planning
  • SDN + Virtualized radio Access Networks also with Fog computing
  • Spectrum efficiency enhancement by LTE-U also with Wi-Fi
  • 5G wireless backhaul networks
  • SDN based Elastic optical networks also in cloud.
  • Green mobile cloud network: Green cloudlet
  • C-RAN: Cloud Radio Access Network
  • 5G networks multicasting
  • Traffic engineering also in software defined networks
  • D2D communication in 5G
  • Over Wi-Fi secure device-to-device communication
  • Cloud Robotics
  • 5G networks for visible light communication
  • Big data in mobile cloud networks
  • Prevention and also in detection of network attacks
  • SDN network automation to 802.11ac and also in IPv6

Simulation Tools, Software’s and Programming Languages Used in Networking Projects

Programming languages:.

  • R-programming
  • Matlab and also in scilab

Simulation Software’s:

  • Psimulator2
  • Network simulators (NS2 and also in NS3)

Other Tools:

  • Matlab Simulink
  • Matlab tool boxes
  • Word net tool
  • And also in MADAMIRA tool

        We also provide a few collections of networking and simulation tools, software, and programming languages for developing projects in the networking and other areas. For each project, we give PPT, documents, video files, and also completed code implementation. Our additional support for our students is journal paper writing support, paper publication in high reputed journals, and thesis writing support.

A good beginning is often overt as happy endings…..

Let us come together for your immense research…… , related pages, services we offer.

Mathematical proof

Pseudo code

Conference Paper

Research Proposal

System Design

Literature Survey

Data Collection

Thesis Writing

Data Analysis

Rough Draft

Paper Collection

Code and Programs

Paper Writing

Course Work

new research topics in networking

Getty Images/iStockphoto

The top 5 networking technology trends for 2022

A yearly check-in on the top networking technology trends reveals more of the same themes, including the ongoing development of sd-wan, 5g and wi-fi 6..

John Fruehe

  • John Fruehe

Each year, networking analysts lay out their technology predictions for the next year. No one, however, accurately predicted COVID-19 and how it would transform businesses. When we look at the networking technology trends for 2022, it helps to consider the primary themes of the past couple years to see how those trends fared in the face of a global pandemic.

In 2020, at the onset of the pandemic in the U.S., the key focus areas in networking were software-defined WAN (SD-WAN), 5G cellular, Wi-Fi 6, AI enablement and network automation. These technologies will continue to be critical areas of focus in 2022, primarily because they represent true technological advantages for businesses.

Let's take a look at these top networking technology trends and how they're shaping the industry.

SD-WAN has become far more critical as businesses shut down offices, driving either a hybrid work environment or a complete work-from-home (WFH) strategy. WFH went from temporary to permanent for many companies, which redefined the network edge.

VPNs, which were often the point-to-point solution for remote workers, gave way to always-on SD-WAN appliances for many tasks as the network edge extended into employees' homes . With businesses becoming more distributed, they have accelerated their migration plans to SD-WAN because of the improved experience and security for their WFH workforce.

2. 5G cellular

Because of the pandemic, the migration to 5G cellular changed significantly and not just because some oddball conspiracy theories suggested 5G caused the pandemic. While carriers continued their 5G rollouts, many businesses that planned to migrate to 5G have stuck with 4G/LTE for now. Government programs for 5G, like smart cities, came under pressure from the pandemic's unexpected and mounting healthcare costs.

But where 5G has gained a foothold -- and will continue to grow in 2022 and beyond -- is fixed 5G to the home . Many WFH companies are finding fixed 5G as a solution to segment work systems from home systems and deliver internet to WFH employees who did not have previous broadband access.

We should expect today's changes to have a lasting effect on networking for years.

The transition to Wi-Fi 6 has been problematic for many businesses that began planning the migration for 2020 or 2021. The shift to WFH has had a dramatic effect on commercial real estate. Many offices are shuttered, and those that are still running often see lower employee density.

Device density, one of the greatest benefits of Wi-Fi 6 , is in less demand in the new commercial real estate reality. Where Wi-Fi 6 is growing, and will continue to grow, is on the consumer side, especially with WFH. The demands of home-based employees for higher bandwidth can more easily justify the small price in moving to the new technology.

4. AI enablement

The AI enablement of networking products has been rolling along as expected. 2020 had a concerted focus on the enablement of applications with AI, especially in the security and analytics areas.

As the workplace splintered into WFH and hybrid environments, the security threat profile changed dramatically. Additionally, managing productivity for remote workers is infinitely more challenging, and AI can help bolster the human efforts through monitoring and analytics.

While AI can't replace humans entirely, it does a tremendous job of scaling and adapting as the landscape underneath is shifting.

5. Network automation

Finally, network automation has had an important role because of the pandemic. As employees moved to WFH, IT was clearly not immune to the changes. Many IT professionals became further removed from their systems.

Additionally, many IT folks realized they were now managing far more physical devices than ever before and relying more on automation to help compensate for the changing work profile. As we roll into 2022, automation will continue to grow as it has proved its value through these trying times.

2020 and 2021 have brought new dynamics to the field of networking but not necessarily new ideas. Instead of radical, breakthrough products, most companies were positioning their IT budgets to handle radical, breakthrough processes. It was not as much about new technologies and far more about new ways to do things.

As we step into 2022, the ingenuity of IT will continue to be challenged as many of the changes expected to be temporary have become the new normal. We should expect today's changes to have a lasting effect on networking for years.

6 trends in corporate campus networks

Private 5G, NaaS, automation among top networking trends

Related Resources

  • SD-WAN: Accelerating network transformation in APAC –TechTarget ComputerWeekly.com
  • How SASE and SD-WAN are making on-premise firewalls redundant –Superloop
  • Palo Alto Networks Cloudgenix SD-WAN Delivers 243% ROI By Reducing WAN ... –Palo Alto Networks
  • National Pain Relief Network Saves Time And Money With SD-WAN + TEM Solution –ARG, Inc.

Dig Deeper on SD-WAN

new research topics in networking

5G and SD-WAN bring benefits to branch locations and beyond

AndrewFroehlich

How Aruba is tapping opportunities in networking

AaronTan

5G for WWAN interest grows as enterprises go wireless-first

DeannaDarah

Verizon Business opens gates to international stadium, deploys SD-WAN at Bertelsmann

JoeO’Halloran

Organizations have ramped up their use of communications platform as a service and APIs to expand communication channels between ...

Google will roll out new GenAI in Gmail and Docs first and then other apps throughout the year. In 2025, Google plans to ...

For successful hybrid meeting collaboration, businesses need to empower remote and on-site employees with a full suite of ...

For organizations that value convenience and UX, zero touch could be an ideal Android Enterprise enrollment method. Learn about ...

Apple has built a Private Cloud Compute server to process and then delete data sent from Apple Intelligence running on an iPhone,...

When setting up Android Enterprise devices, there are several enrollment methods IT should consider. Admins should learn how to ...

With many organizations developing or evaluating generative AI initiatives, HPE increased its commitment to the space through a ...

Cool air is expensive, and wasting it is inefficient. Maintaining hot and cool air separation maximizes cooling effectiveness, ...

A data center's UPS might not be overloaded. Check loads on the circuits and balance all three phases as closely as possible to ...

IT service providers are upskilling a large portion of their workforces on the emerging technology. The campaign seeks to boost ...

Early-stage companies featured at MIT Sloan's annual CIO event tap partners to speed up technology deployment and broaden their ...

Kaseya's pledge to partners promises more pricing controls and a new subscription service that lets MSPs manage and secure their ...

Articles on Networking

Displaying 1 - 20 of 40 articles.

new research topics in networking

Ready for the next step in your career? Here’s how to get ready for your first leadership position

Leda Stawnychko , Mount Royal University and Ean Tsou , University of Calgary

new research topics in networking

Despite appearances, digital networking hasn’t killed the business card – yet

Jane Menzies , University of the Sunshine Coast

new research topics in networking

Networking: an opportunity or an obstacle for women?

Miryam Martinez Martinez , Universidad CEU San Pablo ; Gabriela Contreras , Radboud University , and Susana González Pérez , Universidad CEU San Pablo

new research topics in networking

Optus has revealed the cause of the major outage. Could it happen again?

Mark A Gregory , RMIT University

new research topics in networking

Businesses that address social or environmental problems often struggle to survive: 3 things that can help them

Willie Tafadzwa Chinyamurindi , University of Fort Hare ; Motshedisi Mathibe , University of Pretoria , and Progress Hove-Sibanda , Nelson Mandela University

new research topics in networking

Here’s what to do when you encounter people with ‘dark personality traits’ at work

Cinthia Beccacece Satornino , University of New Hampshire

new research topics in networking

Fishing, strip clubs and golf: How male-focused networking in medicine blocks female colleagues from top jobs

Jennifer R. Grandis , University of California, San Francisco

new research topics in networking

Got $1.2T to invest in roads and other infrastructure? Here’s how to figure out how to spend it wisely

Anna Nagurney , UMass Amherst

new research topics in networking

Study shows the power of networking in alleviating hardship during  COVID-19

Naiema Taliep , University of South Africa and Ghouwa Ismail , University of South Africa

new research topics in networking

4 ways that volunteering can be good for you

Jennifer A. Jones , University of Florida

new research topics in networking

How to narrow the gap between what universities produce and what employers expect

Angelo Fynn , University of South Africa

new research topics in networking

How WhatsApp groups support Nigeria’s nurse graduates

Ademola Johnson Ajuwon , University of the Witwatersrand and Christoph Pimmer , University of Applied Sciences Northwestern Switzerland

new research topics in networking

How immigrants give American companies a powerful boost against Chinese rivals

Benjamin A.T. Graham , USC Dornsife College of Letters, Arts and Sciences

new research topics in networking

Research shows networking is painful, but it can be a lot better

Libby (Elizabeth) Sander , Bond University

new research topics in networking

Internet openness pits collaborative history against competitive future

Lorenzo De Carli , Colorado State University

new research topics in networking

Access to mobile phones won’t magically fix youth unemployment in Africa

Gina Porter , Durham University and Ariane De Lannoy , University of Cape Town

new research topics in networking

Unraveling what’s holding back women economists in academia

Michael E. Rose , University of Cape Town

new research topics in networking

Why the FCC’s proposed internet rules may spell trouble ahead

David Choffnes , Northeastern University

new research topics in networking

Creating a high-speed internet lane for emergency situations

Nirmala Shenoy , Rochester Institute of Technology ; Erik Golen , Rochester Institute of Technology , and Jennifer Schneider , Rochester Institute of Technology

new research topics in networking

New research highlights challenges of building networks for employees and entrepreneurs

Related topics.

  • Net neutrality
  • Professional networking
  • Social networks
  • Telecommunications

Top contributors

new research topics in networking

MBA Director & Assistant Professor of Organisational Behaviour, Bond Business School, Bond University

new research topics in networking

Professor and Eugene M. Isenberg Chair in Integrative Studies, UMass Amherst

new research topics in networking

Associate Professor, School of Psychology, UNSW Sydney

new research topics in networking

Associate Professor, Rotterdam School of Management, Erasmus University Rotterdam

new research topics in networking

Professor, Computer Networking and Telecommunications, University of Salford

new research topics in networking

Professor, Information Security Group, Royal Holloway University of London

new research topics in networking

Professor of Theoretical Economics, Queen's University Belfast

new research topics in networking

Adjunct professor, Universidad CEU San Pablo

new research topics in networking

Profesora Adjunta Área de Comercialización e Investigación de Mercados, Universidad CEU San Pablo

new research topics in networking

Assistant Professor, Radboud University

new research topics in networking

Senior Lecturer in Computer science, Queen Mary University of London

new research topics in networking

Professor of Cybersecurity, School of Computer Science and Informatics, De Montfort University

new research topics in networking

Professor of Physics, University of the Witwatersrand

new research topics in networking

Associate Professor, University of the Free State

new research topics in networking

Associate Professor of Marketing, Curtin University

  • X (Twitter)
  • Unfollow topic Follow topic
  • Artificial Intelligence
  • Generative AI
  • Cloud Computing
  • CPUs and Processors
  • Data Center
  • Edge Computing
  • Enterprise Storage
  • Virtualization
  • Internet of Things
  • Network Management Software
  • Network Security
  • Enterprise Buyer’s Guides
  • United States
  • Newsletters
  • Foundry Careers
  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright Notice
  • Member Preferences
  • About AdChoices
  • E-commerce Links
  • Your California Privacy Rights

Our Network

  • Computerworld

bob_brown

25 of today’s coolest network and computing research projects

Latest concoctions from university labs include language learning website, a newfangled internet for mobile devices and even ip over xylophones.

University labs, fueled with millions of dollars in funding and some of the biggest brains around, are bursting with new research into computer and networking technologies.

ALPHADOGGS: Follow our and Facebook page 

networks, computer and a general focus on shrinking things and making them faster are among the hottest areas, with some advances already making their way into the market. Here’s a roundup of 25 such projects that caught our eyes:

This free website, Duolingo, from a pair of Carnegie Mellon University computer scientists serves double duty: It helps people learn new languages while also translating the text on Web pages into different languages.

CMU’s Luis von Ahn and Severin Hacker have attracted more than 100,000 people in a beta test of the system, which initially offered free language lessons in English, Spanish, French and German, with the computer offering advice and guidance on unknown words. Using the system could go a long way toward translating the Web, many of whose pages are unreadable by those whose language skills are narrow.

Von Ahn is a veteran of such crowdsourcing technologies, having created online reCAPTCHA puzzles to cut down on spam while simultaneously digitizing old books and periodicals. Von Ahn’s spinoff company, reCAPTCHA, was acquired by Google in 2009. Duolingo, spun off in November to offer commercial and free translation services, received $3.3 million in funding from Union Square Ventures, actor Ashton Kutcher and others.

Princeton University Computer Science researchers envision an Internet that is more flexible for operators and more useful to mobile users. Princeton’s Serval system is what Assistant Professor of Computer Science Michael Freedman calls a Service Access Layer that sits between the IP Network Layer (Layer 3) and Transport Layer (Layer 4), where it can work with unmodified network devices. Serval’s purpose is to make Web services such as Gmail and Facebook more easily accessible, regardless of where an end user is, via a services naming scheme that augments what the researchers call an IP address set-up “designed for communication between fixed hosts with topology-dependent addresses.” Data center operators could benefit by running Web servers in virtual machines across the cloud and rely less on traditional load balancers.

Serval, which Freedman describes as a “replacement” technology, will likely have its first production in service-provider networks. “Its largest benefits come from more dynamic settings, so its features most clearly benefit the cloud and mobile spaces,” he says.

If any of this sounds similar to software-defined networking (SDN), there are in fact connections. Freedman worked on an SDN/OpenFlow project at Stanford University called Ethane that was spun out into a startup called Nicira for which VMware recently plunked down $1.26 billion.

WiFi routers to the rescue

Researchers at Germany’sTechnical University in Darmstadt have described a way for home Wi-Fi routers to form a backup mesh network to be used by the police, firefighters and other emergency personnel in the case of a disaster or other incident that wipes out standard cell and phone systems.

The proliferation of Wi-Fi routers makes the researchers confident that a dense enough ad hoc network could be created, but they noted that a lack of unsecured routers would require municipalities to work with citizens to allow for the devices to be easily switched into emergency mode. The big question is whether enough citizens would really allow such access, even if security was assured.

Hyperspeed signaling

University of Tulsa engineers want to slow everything down, for just a few milliseconds, to help network administrations avoid cyberattacks.

By slowing traffic, the researchers figure more malware can be detected and then headed off via an algorithm that signals at hyperspeed to set up defenses. Though researcher Sujeet Shenoi told the publication New Scientist that it might not be cheap to set up such a defense system, between the caching system and reserved data pipes needed to support the signals.

Control-Alt-Hack

University of Washington researchers have created a card game called Control-Alt-Hack that’s designed to introduce computer science students to security topics.

The game, funded in part by Intel Labs and the National Science Foundation, made its debut at the Black Hat security conference in Las Vegas over the summer. The tabletop game involves three to six players working for an outfit dubbed Hackers, Inc., that conducts security audits and consulting, and players are issued challenges, such as hacking a hotel mini bar payment system or wireless medical implant, or converting a robotic vacuum cleaner into a toy. The game features cards (including descriptions of well-rounded hackers who rock climb, ride motorcycles and do more than sit at their computers), dice, mission cards, “hacker cred tokens” and other pieces, and is designed for players ages 14 and up. It takes about an hour to play a game. No computer security degree needed.

“We went out of our way to incorporate humor,” said co-creator Tamara Denning, a UW doctoral student in computer science and engineering, referring to the hacker descriptions and challenges on the cards. “We wanted it to be based in reality, but more importantly we want it to be fun for the players.”

Ghost-USB-Honeypot project

This effort, focused on nixing malware like Flame that spreads from computer to computer via USB storage drives, got its start based on research from Sebastian Poeplau at Bonn University’s Institute of Computer Science. Now it’s being overseen by the broader Honeynet Project.

The breakthrough by Poeplau and colleagues was to create a virtual drive that runs inside a USB drive to snag malware . According to the project website: “Basically, the honeypot emulates a USB storage device. If your machine is infected by malware that uses such devices for propagation, the honeypot will trick it into infecting the emulated device.”

One catch: the security technology only works on XP 32 bit, for starters.

IP over Xylophone Players (IPoXP)

Practical applications for running IP over xylophones might be a stretch, but doing so can teach you a few things about the truly ubiquitous protocol.

A University of California Berkeley researcher named R. Stuart Geiger led this project, which he discussed earlier this year at the Association for Computing Machinery’s Conference on Human Factors in Computing Systems . Geiger’s Internet Protocol over Xylophone Players (IPoXP) provides a fully compliant IP connection between two computers. His setup uses a pair of Arduino microcontrollers, some sensors, a pair of xylophones and two people to play the xylophones.

The exercise provided some insights into the field of Human-Computer Interaction (HCI). It emulates a technique HCI specialists use to design interfaces called umwelt, which is a practice of imagining what the world must look like to the potential users of the interface. This experiment allowed participants to get the feel for what it would be like to be a circuit.

“I don’t think I realized how robust and modular the OSI model is,” Geiger said. “The Internet was designed for much more primitive technologies, but we haven’t been able to improve on it, because it is such a brilliant model.”

Making software projects work

San Francisco State University and other researchers are puzzling over why so many software projects wind up getting ditched, fail or get completed, but late and over budget. The key, they’ve discovered, is rethinking how software engineers are trained and managed to ensure they can work as teams.

The researchers, also from Florida Atlantic University and Fulda University in Germany, are conducting a National Science Foundation-funded study with their students that they hope will result in a software model that can predict whether a team is likely to fail. Their study will entail collecting information on how often software engineering students – teamed with students at the same university and at others — meet, email each other, etc.

“We want to give advice to teachers and industry leaders on how to manage their teams,” says Dragutin Petkovic, professor and chair of SF State’s Computer Science Department. “Research overwhelmingly shows that it is ‘soft skills,’ how people work together, that are the most critical to success.”

Ultra low-power wireless

Forget about 3G, 4G and the rest: University of Arkansas engineering researchers are focused on developing very low-power wireless systems that can grab data from remote sensors regardless of distortion along the network path.

These distortion-tolerant systems would enable sensors, powered by batteries or energy-harvesting, to remain in the field for long periods of time and withstand rough conditions to monitor diverse things such as tunnel stability and animal health. By tolerating distortion, the devices would expend less energy on trying to clean up communications channels.

“If we accept the fact that distortion is inevitable in practical communication systems, why not directly design a system that is naturally tolerant to distortion?” says Jingxian Wu, assistant professor of electrical engineering.

The National Science Foundation is backing this research with $280,000 in funding.

2-way wireless

University of Waterloo engineering researchers have developed a way for wireless voice and data signals to be sent and received simultaneously on a single radio channel frequency, a breakthrough they say could make for better performing, more easily connected and more secure networks.

“This means wireless companies can increase the bandwidth of voice and data services by at least a factor of two by sending and receiving at the same time, and potentially by a much higher factor through better adaptive transmission and user management in existing networks,” said Amir Khandani, a Waterloo electrical and computer engineering professor, in a statement. He says the cost for hardware and antennas to support such a system wouldn’t cost any more than for current one-way systems.

Next up is getting industry involved in bringing such technology into the standards process.

Next steps require industry involvement by including two-way in forthcoming standards to enable wide spread implementation.

The Waterloo research was funded in part by the Canada Foundation for Innovation and the Ontario Ministry of Research and Innovation.

Spray-on batteries

Researchers at Rice University in Houston have developed a prototype spray-on battery that could allow engineers to rethink the way portable electronics are designed.

The rechargeable battery boasts similar electrical characteristics to the lithium ion batteries that power almost every mobile gadget, but it can be applied in layers to almost any surface with a conventional airbrush, said Neelam Singh, a Rice University graduate student who led a team working on the technology for more than a year.

Current lithium ion batteries are almost all variations on the same basic form: an inflexible block with electrodes at one end. Because they cannot easily be shaped, they sometimes restrict designers, particularly when it comes to small gadgets with curved surfaces, but the Rice prototypes could change that. “Today, we only have a few form factors of batteries, but this battery can be fabricated to fill the space available,” said Singh.

The battery is sprayed on in five layers: two current collectors sandwich a cathode, a polymer separator and an anode. The result is a battery that can be sprayed on to plastics, metal and ceramics.

The researchers are hoping to attract interest from electronics companies, which Singh estimates could put it into production relatively easily. “Airburshing technology is well-established. At an industrial level it could be done very fast,” she said.

Mobile Mosh pit

Two MIT researchers formally unveiled over the summer a protocol called State Synchronization Protocol (SSP) and a remote log-in program using it dubbed Mosh (for mobile shell) that’s intended as an alternative to Secure Shell (SSH) for ensuring good connectivity for mobile clients even when dealing with low bandwidth connections. SSP and Mosh have been made available for free, on GNU/, FreeBSD and OS X, via an MIT website.

SSH, often used by network and system admins for remotely logging into servers, traditionally connects computers via TCP, but it’s that use of TCP that creates headaches for mobile users, since TCP assumes that the two endpoints are fixed, says Keith Winstein, a graduate student with MIT’s Computer Science and Artificial Intelligence Lab (CSAIL), and Mosh’s lead developer. “This is not a great way to do real-time communications,” Winstein says. SSP uses UDP, a connectionless, stateless transport mechanism that could be useful for stabilizing mobile usage of apps from Gmail to Skype.

Network Coding

Researchers from MIT, California Institute of Technology and University of Technology in Munich are putting network coding and error-correction coding to use in an effort to measure capacity of wired, and more challengingly, even small wireless networks (read their paper here for the gory details).

The researchers have figured out a way to gauge the upper and lower bounds of capacity in a wireless network. Such understanding could enable enterprises and service providers to design more efficient networks regardless of how much noise is on them (and wireless networks can get pretty darn noisy).

More details from MIT press office.

100 terahertz level

A University of Pittsburgh research team is claiming a communications breakthrough that they say could be used to speed up electronic devices such as and laptops in a big way. Their advance is a demonstrated access to more than 100 terahertz of bandwidth (electromagnetic spectrum between infrared and microwave light), whereas electronic devices traditionally have been limited to bandwidth in the gigahertz realm.

Researchers Hrvoje Petek of the University of Pittsburgh and visiting professor Muneaki Hase of the University of Tsukuba in Japan, have published their NSF-funded research findings in a paper in Nature Photonics. The researchers “detail their success in generating a frequency comb-dividing a single color of light into a series of evenly spaced spectral lines for a variety of uses-that spans a more than 100 terahertz bandwidth by exciting a coherent collective of atomic motions in a semiconductor silicon crystal.”

Petek says the advance could result in devices that carry a thousand-fold more information.

Separately, IBM researchers have developed a prototype optical chip that can transfer data at 1Tbps, the equivalent of downloading 500 high-definition movies, using light pulses rather than by sending electrons over wires.

The Holey Optochip is described as a parallel optical transceiver consisting of a transmitter and a receiver, and designed to handle gobs of data on corporate and consumer networks.

Cooling off with graphene

Graphene is starting to sound like a potential wonder material for the electronics business. Researchers from the University of California at Riverside, the University of Texas at Dallas and Austin, and Xiamen University in China have come up with a way to engineer graphene so that it has much better thermal properties. Such an isotopically-engineered version of graphene could be used to build cooler-running laptops, wireless gear and other equipment. The need for such a material has grown as electronic devices have gotten more powerful but shrunk in size.

“The important finding is the possibility of a strong enhancement of thermal conduction properties of isotopically pure graphene without substantial alteration of electrical, optical and other physical properties,” says UC Riverside Professor of Electrical Engineering Alexander Balandin, in a statement. “Isotopically pure graphene can become an excellent choice for many practical applications provided that the cost of the material is kept under control.”

Such a specially engineered type of graphene would likely first find its way into some chip packaging materials as well into photovoltaic solar cells and flexible displays, according to UC Riverside. Beyond that, it could be used with silicon in computer chips, for interconnect wiring to to spread heat.

Industry researchers have been making great strides on the graphene front in recent years. IBM, for example, last year said it had created the first graphene-based integrated circuit. Separately, two Nobel Prize winning scientists out of the U.K. have come up with a new way to use graphene – the thinnest material in the world – that could make Internet pipes feel a lot fatter.

Keeping GPS honest

Cornell University researchers are going on the offense against those who would try to hack GPS systems like those used in everything from cars to military drones to cellphone systems and power grids. Over the summer, Cornell researchers tested their system for outsmarting GPS spoofers during a Department of Homeland Security-sponsored demo involving a mini helicopter in the New Mexico desert at the White Sands Missile Range.

Cornell researchers have come up with GPS receiver modifications that allow the systems to distinguish between real and bogus signals that spoofers would use to trick cars, airplanes and other devices into handing over control. They emphasized that the threat of GPS spoofing is very real, with Iran last year claiming to have downed a GPS-guided American drone using such techniques.

Getting smartphones their ZZZZs

Purdue University researchers have come up with a way to detect smartphone bugs that can drain batteries while they’re not in use.

“These energy bugs are a silent battery killer,” says Y. Charlie Hu, a Purdue University professor of electrical and computer engineering. “A fully charged phone battery can be drained in as little as five hours.”

The problem is that app developers aren’t perfect when it comes to building programs that need to perform functions when phones are asleep and that use APIs provided by smartphone makers. The researchers, whose work is funded in part by the National Science Foundation, investigated the problem on Android phones, and found that about a quarter of some 187 apps contained errors that could drain batteries. The tools they’re developing to detect such bugs could be made available to developers to help them cut down on battery-draining mistakes.

Quantum leap in search

University of Southern California and University of Waterloo researchers are exploring how quantum computing technology can be used to speed up the math calculations needed to make Internet search speedy even as the gobs of data on the Web expands.

The challenge is that Google’s page ranking algorithm is considered by some to be the largest numerical calculation carried out worldwide, and no quantum computer exists to handle that. However, the researchers have created models of the web to simulate how quantum computing could be used to slice and dice the Web’s huge collection of data. Early findings have been encouraging, with quantum computers shown through the models to be faster at ranking the most important pages and improving as more pages needed to be ranked.

The research was funded by the NSF, NASA Ames Research Center, Lockheed Martin’s University Research Initiative and a Google faculty research award.

Sharing malware in a good way

Georgia Tech Research Institute security specialists have built a system called Titan designed to help corporate and government officials anonymously share information on malware attacks they are fighting, in hopes of fighting back against industrial espionage.

The threat analysis system plows through a repository of some 100,000 pieces of malicious code per day, and will give contributors quick feedback on malware samples that can be reverse-engineered by the Titan crew. Titan will also alert members of new threats, such as targeted spear-phishing attacks, and will keep tabs on not just Windows threats, but also those to MacIntosh and iOS, and Google Android systems.

“As a university, Georgia Tech is uniquely positioned to take this white hat role in between industry and government,” said Andrew Howard, a GTRI research scientist who is part of the Titan project . “We want to bring communities together to break down the walls between industry and government to provide a trusted, sharing platform.”

Touch-feely computing

Researchers from the University of Notre Dame, MIT and the University of Memphis are working on educational software that can respond to students’ cognitive and emotional states, and deliver the appropriate content based on how knowledgeable a student is about a subject, or even how bored he or she is with it.

AutoTutor and Affective AutoTutor get a feel for students’ mood and capabilities based on their responses to questions, including their facial expressions, speech patterns and hand movements.

“Most of the 20th-century systems required humans to communicate with computers through windows, icons, menus and pointing devices,” says Notre Dame Assistant Professor of Psychology Sidney D’Mello, an expert in human-computer interaction and AI in education . “But humans have always communicated with each other through speech and a host of nonverbal cues such as facial expressions, eye contact, posture and gesture. In addition to enhancing the content of the message, the new technology provides information regarding the cognitive states, motivation levels and social dynamics of the students.”

Mobile nets on the move

For emergency responders and others who need to take their mobile networks with them, even in fast-moving vehicles, data transmission quality can be problematic. North Carolina State University researchers say they’ve come up with a way to improve the quality of these Mobile ad hoc networks (MANET).

“Our goal was to get the highest data rate possible, without compromising the fidelity of the signal,” says Alexandra Duel-Hallen, a professor of electrical and computer engineering at NC State whose work is outlined in the paper “ Enabling Adaptive Rate and Relay Selection for 802.11 Mobile Ad Hoc Networks .” 

The challenge is that fast moving wireless nodes make it difficult for relay paths to be identified by the network, as channel power tends to fluctuate much more in fast-moving vehicles. The researchers have come up with an algorithm for nodes to choose the best data relay and transmission paths, based on their experience with recent transmissions.

Tweet the Street

Researchers from the University of California, Riverside and Yahoo Research Barcelona have devised a model that uses data about volumes to predict how financial markets will behave. Their model bested other baseline strategies by 1.4% to 11% and outperformed the Dow Jones Industrial Average during a four-month simulation.

“These findings have the potential to have a big impact on market investors,” said Vagelis Hristidis, an associate professor at the Bourns College of Engineering. “With so much data available from social media, many investors are looking to sort it out and profit from it.”

The research, focused on what Twitter volumes, retweets and who is doing the tweeting might say about individual stocks, differs from that of earlier work focused on making sense of the broader market based on positive and negative sentiments in tweets.

As with so many stock-picking techniques, the researchers here tossed out plenty of caveats about their system, which they said might work quite differently, for example, during a period of overall market growth rather than the down market that their research focused on.

Franken-software

University of Texas, Dallas scientists have developed software dubbed Frankenstein that’s designed to be even more monstrous than the worst malware in the wild so that such threats can be understood better and defended against. Frankenstein can disguise itself as it swipes and messes with data, and could be used as a cover for a virus or other malware by stitching together pieces of such data to avoid antivirus detection methods.

“[Mary] Shelley’s story [about Dr. Frankenstein and his monster] is an example of a horror that can result from science, and similarly, we intend our creation as a warning that we need better detections for these types of intrusions,” said Kevin Hamlen, associate professor of computer science at UT Dallas who created the software, along with doctoral student Vishwath Mohan. “Criminals may already know how to create this kind of software, so we examined the science behind the danger this represents, in hopes of creating countermeasures.”

Such countermeasures might include infiltrating terrorist computer networks, the researchers say. To date, they’ve used the NSF and Air Force Office of Scientific Research-funded technology on benign algorithms, not any production systems.

Safer e-wallets

While e-wallets haven’t quite taken off yet, University of Pittsburgh researchers are doing their part to make potential e-wallet users more comfortable with the near-field communications (NRC) and/or RFID-powered technology.

Security has been a chief concern among potential users, who are afraid thieves could snatch their credit card numbers through the air. But these researchers have come up with a way for e-wallet credit cards to turn on and off, rather than being always on whenever in an electromagnetic field.

“Our new design integrates an antenna and other electrical circuitry that can be interrupted by a simple switch, like turning off the lights in the home or office,” says Marlin Mickle, the Nickolas A. DeCecco Professor of Engineering and executive director of the RFID Center for Excellence in the Swanson School. “The RFID or NFC credit card is disabled if left in a pocket or lying on a surface and unreadable by thieves using portable scanners.”

Mickle claims the advance is both simple and inexpensive, and once the researchers have received what they hope will be patent approval, they expect the technology to be adopted commercially.

Digging into Big Data

The University of California, Berkeley has been handed $10 million by the National Science Foundation as part of a broader $200 million federal government effort to encourage the exploration and better exploitation of massive amounts of information dubbed Big Data collected by far-flung wireless sensors, social media systems and more.

UC Berkeley has five years to use its funds for a project called the Algorithms, Machines and People (AMP) Expedition, which will focus on developing tools to extract important information from Big Data, such as trends that could predict everything from earthquakes to cyberattacks to epidemics.

“Buried within this flood of information are the keys to solving huge societal problems and answering the big questions of science,” said Michael Franklin, director of the AMP Expedition team and a UC Berkeley professor of electrical engineering and computer sciences, in a statement . “Our goal is to develop a new generation of data analysis tools that provide a quantum leap in our ability to make sense of the world around us.”

AMP Expedition researchers are building an open-source software stack called the Berkeley Data Analysis System (BDAS) that boasts large-scale machine-learning and data analysis methods, infrastructure that lets programmers take advantage of cloud and cluster computing, and crowdsourcing (in other words, human intelligence). It builds on the AMPLab formed early last year, with backing from Google, SAP and others.

Bob Brown tracks network research in his and Facebook page, as well on Twitter and Google + . 

IDG News Service and other IDG publications contributed to this report

Related content

Broadcom bolsters vmware edge compute stack, pure storage adds ai features for security and performance, top network and data center events 2024, 2024 global network outage report and internet health check, newsletter promo module test.

bob_brown

Bob Brown is the former news editor for Network World.

More from this author

Small cell forum seeks advice from large enterprises, how to make fully homomorphic encryption “practical and usable”, iphone 8 rumor rollup: cranking up the processors; 3d cameras; $1k-plus price, snl one step ahead of amazon with echo silver, you really should know what the andrew file system is, getting a jump on private lte networks, iphone 8 rumor rollup: tim cook cites rumors; lte shortfall; envisioning a function area, boring old enterprise vendors pay interns well, most popular authors.

new research topics in networking

  • Gyana Swain

Show me more

Optical networking challenges gain attention as ai networking demands rise.

Image

Tata Communications partners with Versa Networks on hosted SASE

Image

US investigates China Mobile, China Telecom, and China Unicom over data misuse concerns

Image

Has the hype around ‘Internet of Things’ paid off? | Ep. 145

Image

Episode 1: Understanding Cisco’s Converged SDN Transport

Image

Episode 2: Pluggable Optics and the Internet for the Future

Image

Has the hype around ‘Internet of Things’ paid off?

Image

Are unused IPv4 addresses a secret gold mine?

Image

Preparing for a 6G wireless world: Exciting changes coming to the wireless industry

Image

Sponsored Links

  • Visibility, monitoring, analytics. See Cisco SD-WAN in a live demo.

MarketSplash

10 Networking Trends To Watch In 2024 Based On Industry Experts

Discover 2024's key networking trends: the rise of digital platforms, the value of in-person events, and networking's role in career growth and mentorship. Stay ahead in your professional journey with these insights.

💡 KEY INSIGHTS

  • Networking's Impact on Career: A strong network is vital for career advancement, with 85% of jobs filled through networking, highlighting its essential role in job search success.
  • Preference for In-Person Networking: Despite the rise of digital mediums, 68% of individuals still prefer in-person networking, and 95% recognize its importance in building long-term business relationships.
  • Virtual Networking's Growing Role: Virtual networking has surged in popularity, offering cost-effective, flexible, and global connectivity, but still requires enhancement in human interaction for effectiveness.
  • Networking and Job Satisfaction: Employees who find jobs through their network tend to experience greater job satisfaction and longer tenure, emphasizing the value of networking in finding suitable job roles.

Networking trends in the modern professional landscape are increasingly emphasizing the importance of digital and social media platforms for building and maintaining connections. There's a growing preference for in-person networking events , which are seen as more effective for establishing long-term business relationships.

Additionally, leveraging networking for career advancement , mentorship opportunities , and staying updated with industry trends is becoming more prevalent among professionals.

Despite recognizing its significance, only 48% of individuals actively maintain communication with their network.

What's important to networking as we enter 2024? Our industry experts are ready to introduce you to 10 networking trends for this year.

Meet Our Experts

Our team comprises industry-leading experts in fields ranging from design and marketing to growth strategies, each bringing a wealth of experience and unparalleled knowledge to the table.

Vlad Shvets

Vlad is a founder of MarketSplash and its parent company Empact Partners. Vlad is a serial entrepreneur & SaaS founder with 10+ years of experience in the tech industry. Vlad is deeply passionate about digital publishing, software, and growth marketing.

Shanal, the Chief Editor at MarketSplash has diverse experience in content strategy and digital publishing. Her skills extend to integrating AI tools, managing social media, and navigating affiliate partnerships, reflecting her deep passion for the tech and publishing sectors. She is passionate about writing, research, and innovative tools in the marketing niche.

Juxhina is a content creator, editor, and researcher. She has an MSc degree in Communication Science from the University of Vienna and 10+ years of experience in the tech industry. She is passionate about startups, SEO marketing, content creation, art, and photography.

Sharné is an artist, digital designer, researcher, and informal educator by training. She has 5+ years' experience in the SaaS industry as a Product Marketing Manager and Head of Customer Support. She supports a handful of remarkable SaaS brands in achieving sustainable business growth through targeted online content.

Trend 1: Job Placements Through Networking

Trend 2: in-person networking, trend 3: active communication maintenance, trend 4: networking for job openings, trend 5: networking for career advancement, trend 6: networking for mentorship, trend 7: networking for long-term career growth, trend 8: networking for job satisfaction, trend 9: networking for professional knowledge, trend 10: next-gen wi-fi is here, future insights.

Job placements through networking involve leveraging professional connections to discover and secure employment opportunities.

Most job placements, around 85% , occur through personal and professional connections.

This approach often leads to unadvertised job openings, as many positions are filled through referrals and personal recommendations .

Networking is your secret key to unlocking hidden job opportunities.

Examples Of Job Placements Through Networking:

  • Referrals from Current Employees : Gaining job opportunities through recommendations by friends or colleagues already employed at a company.
  • Professional Networking Events : Meeting potential employers or referrals at industry conferences, seminars, and meetups.
  • Social Media Connections : Leveraging platforms like LinkedIn to connect with industry professionals and discover job openings.
  • Alumni Networks : Utilizing college or university alumni groups for job leads and career advice.
  • Industry Associations : Joining professional associations to access exclusive job boards and networking opportunities.
  • Informal Meetups : Engaging in casual settings like coffee meetings for informal job referrals and advice.
  • Online Networking Groups : Participating in online forums and groups related to one's profession for job leads.
  • Mentorship Programs : Connecting with mentors who can provide guidance and introduce job opportunities in their networks.

Of employers and recruiters reported that the recruiting process is shorter when done through referrals.

Of employers mentioned that recruiting through referrals is a more cost-effective approach.

Zig Ziglar , a renowned motivational speaker and the founder of Ziglar Performance Group, emphasized the reciprocal nature of success and networking.

images

You can have everything in life you want if you will just help enough other people get what they want.

Founder at Ziglar Performance Group

Source: HubSpot

Ziglar's statement highlights the idea that success in networking, and by extension in job placements, is often a result of mutual benefit and support. It suggests that by assisting others in achieving their goals, whether through referrals, advice, or support, individuals can also advance their own careers.

Ziglar's perspective points to a future where networking is less about transactional interactions and more about creating a supportive professional community.

In-person networking involves face-to-face interactions, offering a more personal and impactful way to build professional relationships.

These interactions often occur at events like conferences, meetups, or informal gatherings, providing opportunities for direct communication and rapport building.

Chance encounters at in-person networking events have led to job offers or new business opportunities for  60%   of professionals .

The value of in-person networking lies in its ability to create stronger, more memorable connections compared to virtual alternatives.

Examples Of In-Person Networking:

  • Industry Conferences : Attending specialized conferences where professionals can connect, share ideas, and learn about industry trends.
  • Local Meetups and Workshops : Participating in local events focused on specific professional interests or skills development.
  • Business Mixers and Social Events : Engaging in casual networking events organized by professional groups or chambers of commerce.
  • Job Fairs and Career Expos : Opportunities for job seekers to meet potential employers and learn about job openings.
  • Professional Association Meetings : Regular meetings held by professional associations, offering networking along with educational content.
  • Alumni Events : Events organized by educational institutions for alumni to reconnect and network.
  • Networking Breakfasts/Lunches : Informal gatherings where professionals meet over a meal to discuss business and career opportunities.

Why Do You Prefer In-Person Business Meetings?

The future of in-person networking is likely to see a resurgence as professionals increasingly value the depth and quality of connections made through face-to-face interactions.

In the coming years, we can expect a blend of virtual and in-person networking events, as each offers distinct advantages. Technology will continue to play a role in enhancing in-person networking experiences, such as through apps for event networking, digital business cards , and augmented reality features for interactive engagements.

This trend suggests a future where in-person networking becomes more intentional, with a focus on quality over quantity of connections, and where technology complements rather than replaces the human element of professional networking.

Active communication maintenance in networking involves regularly engaging with and nurturing professional relationships.

Maintaining strong business relationships leads to increased customer loyalty and repeat business, as  90% of professionals acknowledge.

It's about staying in touch with contacts through follow-ups, updates, and meaningful interactions, rather than just reaching out when in need.

Examples Of Active Communication Maintenance:

  • Regular Check-Ins : Sending periodic messages or emails to keep in touch with contacts and update them on your professional progress.
  • Networking Follow-Up : Reaching out to new contacts post-networking events to establish a connection and express interest in staying in touch.
  • Social Media Engagement : Actively engaging with contacts on platforms like LinkedIn by commenting on posts, sharing relevant content, and congratulating them on milestones.
  • Information Sharing : Sending articles, research, or other resources that are relevant to a contact’s interests or industry.
  • Birthday and Work Anniversary Messages : Acknowledging personal and professional milestones of your contacts.
  • Hosting or Attending Gatherings : Organizing or participating in small professional gatherings or webinars to maintain visibility and engagement.
  • Participating in Group Discussions : Being active in professional groups or forums by contributing to discussions and sharing insights.

The future of active communication maintenance in networking is likely to become more strategic and integrated with digital tools. Professionals are expected to leverage digital tools like CRM systems, social media platforms, and personalized email marketing tools to manage and nurture their networks efficiently.

The trend will also see a shift towards reciprocal value in networking, where interactions are not just about personal gain but also about providing support, information, and opportunities to others in the network.

Networking for job openings is a strategic approach where professionals use their connections to discover and secure employment opportunities.

This method often uncovers hidden job markets, as many positions are filled through referrals and not publicly advertised.

70%  of jobs are not advertised online.

Effective networking for job openings involves actively engaging with your network, attending industry events, and leveraging platforms like LinkedIn to connect with potential employers and industry insiders.

Examples Of Networking For Job Openings:

  • LinkedIn Networking : Utilizing LinkedIn to connect with industry professionals, recruiters, and hiring managers, and to learn about new job opportunities.
  • Informational Interviews : Arranging meetings with professionals in your desired field to gain insights and inquire about potential job openings.
  • Referrals from Current Employees : Leveraging your network to get referred for job openings by employees within the company.
  • Professional Associations and Clubs : Joining industry-specific associations or clubs where job openings are often shared among members.
  • Networking Events and Career Fairs : Attending events specifically designed for networking and career development, where companies often scout for talent.
  • Alumni Networks : Using college or university alumni networks to discover job opportunities and connect with alumni in your field.
  • Social Media Groups and Forums : Participating in industry-specific groups and forums where job openings are frequently posted.

Here Are Some Of The Most Effective Ways To Find A Job

Brene Brown, a renowned researcher and storyteller, captures the essence of proactive networking.

images

Courage starts with showing up and letting ourselves be seen.

Brene Brown

Researcher & Storyteller

Brown's statement highlights the necessity of stepping out of one's comfort zone to make meaningful connections in the professional world.

It suggests that the act of putting oneself out there, whether through attending networking events, reaching out to industry professionals, or participating in discussions, is the first step towards uncovering job opportunities.

The future of this trend is about leveraging one's network through active participation and genuine self-presentation, aligning with Brown's perspective on the importance of being seen and heard in the professional arena.

Effective networking can lead to promotions, job changes, and enhanced professional development, making it a vital component of career progression.

Over 70% of people see networking as a catalyst for increased career advancement opportunities.

Imagine unlocking doors to opportunities you never knew existed – that's the power of networking for career advancement.

Examples Of Networking For Career Advancement:

  • Mentorship Relationships : Building connections with experienced professionals who can offer guidance, advice, and support in your career journey.
  • Professional Associations : Joining industry-specific organizations to meet peers and leaders, and to stay informed about trends and opportunities.
  • Networking Events and Conferences : Attending events relevant to your field to make connections that could lead to career advancement opportunities.
  • LinkedIn Networking : Actively using LinkedIn to connect with industry professionals, share your achievements, and discover new opportunities.
  • Alumni Networks : Leveraging your alma mater's alumni network for job leads, advice, and introductions to industry professionals.
  • Industry Workshops and Seminars : Participating in workshops and seminars to learn new skills and connect with like-minded professionals.
  • Online Professional Forums and Groups : Engaging in online communities related to your field to build your network and learn from others’ experiences.

Of individuals made an effort to connect with their existing network.

Of individuals sought assistance from their network or requested introductions to others.

Binod Shankar , a seasoned professional, emphasizes the critical role of visibility in career advancement.

The old practice of doing your job and keeping your head down doesn’t work that well anymore. As an experienced professional, you must be out there and if you are not visible you might as well not exist. And if you are looking to change careers or jobs, visibility is not a luxury — it’s a necessity.

Binod Shankar

Executive Coach

Source: Goodreads

Shankar's insight highlights a shift in the professional landscape where simply performing well in a current role is no longer sufficient for career growth. His words underscore the importance of being actively visible in your professional network and industry.

In essence, the future of this trend is about strategically positioning oneself in the professional world, where visibility and networking are key drivers for discovering new opportunities and advancing one's career.

Networking for mentorship is about connecting with experienced professionals who can offer guidance, insights, and support in your career journey.

Successful mentorship opportunities have been secured through in-person networking connections for  65%  of professionals.

These mentor-mentee relationships are built on trust and mutual respect, providing a platform for learning, personal development, and professional growth.

Examples Of Networking For Mentorship:

  • Industry Conferences and Seminars : Meeting potential mentors at events related to your field of interest.
  • Professional Associations : Joining industry-specific organizations where mentorship programs are often available.
  • LinkedIn Connections : Reaching out to experienced professionals on LinkedIn for mentorship opportunities.
  • Alumni Networks : Utilizing alumni associations from colleges or universities to connect with alumni mentors in your field.
  • Corporate Mentorship Programs : Participating in formal mentorship programs offered by employers.
  • Online Mentorship Platforms : Using platforms like MentorCruise or Score for finding mentors in various industries.
  • Social Media Groups : Engaging in industry-specific groups on platforms like Facebook or Reddit to find mentorship opportunities.

Communication Statistics Indicated A Decline In Face-To-Face Interactions And A Surge In Online Communications

The future of networking for mentorship is set to become more vital in professional growth, with an increasing emphasis on digital platforms to facilitate mentor-mentee connections.

Mentorship programs are expected to be more integrated into organizational culture, focusing on leadership development and employee engagement.

The trend is moving towards diverse mentorship models, including group and peer-to-peer mentoring, highlighting its importance in continuous learning and career advancement.

Networking for long-term career growth is about establishing and nurturing relationships that contribute to your professional journey over time.

Networking is seen as essential by  89%  of professionals for establishing long-term business relationships.

This strategic approach to networking helps in building a sustainable career path, with a focus on continuous learning and adapting to industry changes.

Examples Of Networking For Long-Term Career Growth:

  • Building Relationships with Industry Leaders : Connecting with experienced professionals who can provide long-term career advice and mentorship.
  • Participating in Professional Development Groups : Joining groups or associations that offer ongoing learning and networking opportunities.
  • Attending Industry Conferences and Events : Regularly attending events to stay informed about industry trends and meet influential professionals.
  • Engaging in Continuous Learning : Enrolling in workshops, courses, and seminars to expand skills and network with like-minded individuals.
  • Active LinkedIn Networking : Regularly updating your profile, sharing insights, and connecting with others in your field on LinkedIn.
  • Seeking Out Mentors and Advisors : Establishing mentorship relationships that provide guidance throughout various stages of your career.
  • Alumni Networking : Utilizing alumni networks for long-term professional connections and opportunities.
  • Volunteering for Leadership Roles : Taking on roles in professional organizations to build visibility and connections.

What is the primary purpose of professional networking?

The future of networking for long-term career growth is set to emphasize digital platforms and meaningful, quality connections.

Professionals will focus on building sustainable networks that provide ongoing support and opportunities, leveraging tools like LinkedIn for continuous engagement and learning.

The trend will shift towards strategic, proactive networking, highlighting its importance as a key element in career development and success.

Networking for job satisfaction involves connecting with peers and mentors who can provide support, share experiences, and offer guidance in your career.

Strong professional relationships contribute to a 70% increase in job satisfaction.

These relationships can lead to a better understanding of your industry, improved work-life balance, and increased job fulfillment

Examples Of Networking For Job Satisfaction:

  • Peer Support Groups : Joining or forming groups with colleagues for sharing experiences, challenges, and solutions.
  • Mentorship Programs : Participating in mentorship programs within your organization for guidance and career advice.
  • Professional Associations : Becoming active in professional associations related to your field for community support and resources.
  • Online Forums and Communities : Engaging in industry-specific online forums for advice, support, and sharing experiences.
  • Workplace Networking Events : Attending or organizing informal networking events at your workplace to build camaraderie.
  • Industry Conferences and Seminars : Participating in conferences to connect with peers and discuss common professional interests.
  • Social Media Professional Groups : Joining LinkedIn or Facebook groups dedicated to your profession for insights and support.

Click the buttons to navigate through the slides!

Time spent with colleagues outside of work, maintaining connections with past professional contacts, and attending conferences  directly contribute to career success , including salary growth and job satisfaction.

Digital platforms will be crucial in fostering professional connections and community, with companies increasingly recognizing and supporting the role of networking in employee well-being.

The trend will emphasize diverse and broad networks, extending beyond immediate colleagues to include mentors and industry peers, enhancing job satisfaction and overall work-life fulfillment.

Networking for professional knowledge involves engaging with peers, mentors, and industry experts to exchange information, insights, and best practices.

Networking expands professional knowledge and expertise by 50% .

This collaborative approach allows for continuous learning, keeping you updated with the latest trends and advancements in your field.

Examples Of Networking For Professional Knowledge:

  • Industry Conferences and Workshops : Attending events where experts share the latest research, trends, and innovations in your field.
  • Professional Online Forums and Groups : Participating in discussions on platforms like LinkedIn groups or industry-specific forums.
  • Webinars and Online Courses : Enrolling in webinars and online courses offered by industry leaders and experts.
  • Knowledge Exchange Meetups : Joining or organizing meetups focused on sharing knowledge and experiences within your profession.
  • Peer Learning Sessions : Setting up peer learning or study groups with colleagues to share skills and insights.
  • Mentorship Relationships : Engaging with mentors who can provide in-depth knowledge and guidance in your area of expertise.
  • Industry Newsletters and Journals : Subscribing to and reading industry-specific publications to stay informed about new developments.

In the future, networking for professional knowledge will increasingly rely on digital platforms and online communities for accessible and continuous learning.

Virtual Reality (VR) and Augmented Reality (AR) Integration

Networking events and professional gatherings might increasingly take place in virtual environments.

AI-Powered Professional Matchmaking

Artificial Intelligence could play a significant role in connecting professionals.

Remote Networking Becoming the Norm

With the normalization of remote work, professional networking might also shift predominantly online.

Sustainability in Networking

There might be a growing emphasis on sustainability, with professionals preferring virtual meetings over travel to reduce their carbon footprint, and organizations might adopt more environmentally friendly practices in hosting events.

There will be a greater emphasis on collaborative and cross-functional knowledge sharing within organizations, fostering a culture of innovation and continuous learning.

This trend underscores the importance of staying connected and informed in a rapidly evolving professional landscape, where knowledge exchange is key to career growth and adaptability.

The advancement of Wi-Fi technology is occurring swiftly.

In 2025, Wi-Fi 6 is anticipated to add roughly $1.6 trillion to the overall economic worth of the United States.

Enhanced speed is a key advantage of this latest Wi-Fi iteration. While Wi-Fi 5 provides a maximum throughput of 3.5 Gbps, Wi-Fi 6 offers a significantly faster 9.6 Gbps .

Additionally, Wi-Fi 6 has the capability to prioritize traffic and improve communication with multiple devices.

Examples Of Next-Gen Wi-Fi:

  • Higher Data Rates : Next-gen Wi-Fi offers significantly higher data rates compared to previous generations. This means faster internet speeds for downloading and uploading content.
  • Increased Capacity : These new Wi-Fi standards can handle more devices at once. This is particularly important in crowded areas or in smart homes where multiple devices need to be connected simultaneously.
  • Improved Performance in Crowded Environments : Next-gen Wi-Fi is designed to perform better in environments with many Wi-Fi networks, such as apartment buildings or dense urban areas.
  • Lower Latency : Reduced latency is a key feature, which means that there is less delay in the communication between your device and the network. This is crucial for applications like online gaming or video conferencing.

97% of large enterprises

will use AI-based automation for their wireless networks.

Slide 2 Heading

Slide 2 Text

Slide 3 Heading

Slide 3 Text

Furthermore, Wi-Fi 6 enhances device battery longevity thanks to a feature known as Target Wake Time. This function enables devices to enter a low-power sleep mode during periods when data transfer is not needed.

images

Although public WiFi hotspots are an invaluable services, there is a strong need for businesses to stay on top of the potential threats and security risks.

Tom Gaffney

Hong Kong at CBRE

This aspect is particularly crucial for businesses implementing new ventures involving IoT devices , intelligent building technologies, and consumer-centric applications.

What are the leading networking trends in 2024?

In 2024, the leading trends include the expansion of 5G networks, increased adoption of edge computing, advancements in network security protocols, and the growth of AI-driven network management solutions.

How is 5G impacting networking?

5G is providing significantly faster speeds and lower latency, enabling a surge in IoT device connectivity and new applications in areas like telemedicine, smart cities, and automated vehicles.

What role does AI play in networking?

AI plays a crucial role in network management by automating complex tasks, enhancing security through predictive analysis, and optimizing network performance in real-time.

Are there any new developments in Wi-Fi technology?

Wi-Fi 6 and subsequent technologies are advancing, offering higher speeds, increased capacity, and better performance in dense environments.

This concludes our overview of the major networking trends that will influence IT executives and enterprises in the upcoming years.

Businesses actively embracing these evolving trends are witnessing significant benefits in terms of cost reduction, innovation, and expedited processes.

By customizing solutions to fit their specific sector, these companies are maximizing the benefits of networking technology.

However, IT leaders are still grappling with pressing issues related to network security and complexity. These challenges are expected to undergo significant advancements and innovations in the near future.

Continue Learning About The Latest Trends With These Reads

  • 10 Snapchat Trends You Need To Know For 2024
  • 15 Video Trends You Need To Know For 2024
  • 10 Marketing Automation Trends To Watch In 2024 Based On Industry Experts
  • 10 Salesforce Trends To Watch In 2024 Based On Industry Experts
  • 12 Gaming Trends Set To Dominate In 2024 According To Industry Experts

Subscribe to our newsletter

Subscribe to be notified of new content on marketsplash..

Educational resources and simple solutions for your research journey

new research topics in networking

Effective Research Networking Tips for Researchers

new research topics in networking

Networking—a crucial academic research skill for career advancement— can be challenging, particularly for early career researchers. Academic researchers are often confused and frustrated by the concept of networking because it is not straightforward, and they are not sure where to start. Introverted academic researchers often sit by themselves at conferences with drink in hand because they find networking for research impossible. In fact, some studies have found that networking can make people feel dishonest, phoney, and selfish 1 .

Table of Contents

Importance of networking

Nonetheless, networking is a crucial research skill for students and early career researchers, who likely find it the most intimidating. There are several benefits to research networking. It is a great way to start new collaborations, share research, learn about funding opportunities, and connect with journal editors and reviewers 2 . Networking also enables shared learning, the transfer of technology, and the chance to collaborate on projects. Data shows articles based on collaborative research receives more citations due to the diverse range of authors 3 .

Networking tips for researchers

Now that it’s been established that this is a key skill for academics to build relationships and advance their careers, here are some effective networking tips for researchers.

Attend more conferences

This is a no-brainer, but academic conferences present a wonderful opportunity to network with peers working in the same or related fields. Interactions with like-minded peers can provide a new perspective to your research, even providing new direction for future research. Virtual modes are now available for some conferences, which is great for researchers who find in-person meetings challenging and nerve-wracking. Although virtual meetings lack the personal touch of in-person encounters, they are accessible, affordable, and user-friendly. The availability of recorded sessions makes it simple for participants to join the meetings at their convenience and serves as a great resource for future use.

Communicate your research

Researchers can maximize their conference experience by choosing to present their work either orally or through academic posters . The poster or oral presentation gives you a platform to communicate your research and receive feedback from other researchers. It also enables colleagues in the same or related fields to approach you. This could be a good place to start networking since it’s typical for most researchers to feel at ease discussing their work in public and with individuals who appear interested in it. The next time you present your research at a conference, ask questions and engage in a two-way conversation with researchers. This would allow you to build relationships with these researchers and broaden your network.

new research topics in networking

Don’t lose touch with your network

Building strong networks call for effort and communication, and these two factors are crucial to the networking process. We have a propensity to drift apart, so sometimes, the connections we make at conferences can be brief and fleeting. The best way to strengthen a relationship is to follow people you meet on various social media platforms , share their work, and leave comments on their most recent articles. Most researchers value emails praising their work, and keeping in touch over social media will only help expand your network. As one of the tips for researchers to search for a research job, use your network to your advantage. Let your network know you are looking for job so they will keep you in mind when suitable positions become available.

Build an online presence

Social media has emerged as an essential tool for networking in the modern world. Researchers can create an online presence for themselves by sharing their work on different platforms and using these channels to interact with peers, ask questions, and provide assistance with others’ research-related needs. These online platforms, like Twitter, Facebook, and LinkedIn, frequently offer a casual setting for two-way interactions that lead to idea sharing, forming of partnerships, and learning about the most recent developments in your area of expertise. Remaining active on social media allows you to have conversations with researchers all over the world and establish some enduring professional connections.

Sign up for workshops and webinars

Training workshops are the simplest means to expand your academic network and meet more researchers. Despite being time-consuming, workshops offer researchers enough exposure and time to ask questions in person, discuss your research, and connect with instructors and other attendees in the interactive sessions. Similarly, participating in webinars can be an excellent educational tool that enables you to meet active researchers working in your area of interest. Learning to connect with researchers who have the potential to become collaborators on future projects are among the top skills of a good researcher.

Become a member of academic associations/societies

A common advice for future researchers is to join academic associations and learned societies as you advance in your research career and gain experience in your field. The resources and information available through these groups and societies not only keep you abreast of the latest in your field but also help you learn about related conferences, job openings, and calls for papers. These associations also frequently provide members with added benefits, such as fee waivers, training, publishing, and funding advice and support. However, to leverage these advantages, it’s important to be an active member of the group.

Make a website and write blogs

Regardless of where you are in your career, one of the effective networking tips is to have a personal website. It comes in handy for those in the final year of their PhD and early career researchers looking for career opportunities. The link to your site can be added to your social media platforms, effectively acting as an online resume that is accessible to anyone with interest in your research. You can create blog posts summarizing your research, research interests, and ideas, future goals, and can even have a short biographical statement on the website. Remember to include your email address and phone number on your website so that prospective employers and researchers can contact you.

A final advice for future researchers – networking effectively can boost your output, productivity, and research caliber. Your network can aid in navigating career paths, securing funding, and also providing a sense of belonging by listening to your struggles and creating long-lasting connections. If you are still having trouble, keep in mind this effective networking tip: find common interests to introduce yourself to researchers at events; if not, mention any skills you have that might be useful for working with them in the future. If you are still at a loss for words, simply express gratitude and appreciation for their work and connection. Happy networking!

  • Clark, D. If Networking Makes You Feel Dirty, You’re Doing It Wrong. The Wall Street Journal, 2021. https://www.wsj.com/articles/if-networking-makes-you-feel-dirty-youre-doing-it-wrong-11631883600
  • George, E. Networking made easy: Top 10 tips for the smart and savvy researcher. Editage Insights, 2020. https://www.editage.com/insights/networking-made-easy-top-10-tips-for-the-smart-and-savvy-researcher
  • Puljak, L. & Vari, S. G. Significance of research networking for enhancing collaboration and research productivity. Croat Med J 55 , 181–183 (2014).

Related Posts

thesis defense

Thesis Defense: How to Ace this Crucial Step

independent publishing

What is Independent Publishing in Academia?

  • IEEE CS Standards
  • Career Center
  • Subscribe to Newsletter
  • IEEE Standards

new research topics in networking

  • For Industry Professionals
  • For Students
  • Launch a New Career
  • Membership FAQ
  • Membership FAQs
  • Membership Grades
  • Special Circumstances
  • Discounts & Payments
  • Distinguished Contributor Recognition
  • Grant Programs
  • Find a Local Chapter
  • Find a Distinguished Visitor
  • About Distinguished Visitors Program
  • Find a Speaker on Early Career Topics
  • Technical Communities
  • Collabratec (Discussion Forum)
  • My Subscriptions
  • My Referrals
  • Computer Magazine
  • ComputingEdge Magazine
  • Let us help make your event a success. EXPLORE PLANNING SERVICES
  • Events Calendar
  • Calls for Papers
  • Conference Proceedings
  • Conference Highlights
  • Top 2024 Conferences
  • Conference Sponsorship Options
  • Conference Planning Services
  • Conference Organizer Resources
  • Virtual Conference Guide
  • Get a Quote
  • CPS Dashboard
  • CPS Author FAQ
  • CPS Organizer FAQ
  • Find the latest in advanced computing research. VISIT THE DIGITAL LIBRARY
  • Open Access
  • Tech News Blog
  • Author Guidelines
  • Reviewer Information
  • Guest Editor Information
  • Editor Information
  • Editor-in-Chief Information
  • Volunteer Opportunities
  • Video Library
  • Member Benefits
  • Institutional Library Subscriptions
  • Advertising and Sponsorship
  • Code of Ethics
  • Educational Webinars
  • Online Education
  • Certifications
  • Industry Webinars & Whitepapers
  • Research Reports
  • Bodies of Knowledge
  • CS for Industry Professionals
  • Resource Library
  • Newsletters
  • Women in Computing
  • Digital Library Access
  • Organize a Conference
  • Run a Publication
  • Become a Distinguished Speaker
  • Participate in Standards Activities
  • Peer Review Content
  • Author Resources
  • Publish Open Access
  • Society Leadership
  • Boards & Committees
  • Local Chapters
  • Governance Resources
  • Conference Publishing Services
  • Chapter Resources
  • About the Board of Governors
  • Board of Governors Members
  • Diversity & Inclusion
  • Open Volunteer Opportunities
  • Award Recipients
  • Student Scholarships & Awards
  • Nominate an Election Candidate
  • Nominate a Colleague
  • Corporate Partnerships
  • Conference Sponsorships & Exhibits
  • Advertising
  • Recruitment
  • Publications
  • Education & Career

The 4 Most Important Networking Trends in 2020 and Beyond

networking trends

In today’s digital world, networking technology is everything. It’s what makes the internet possible. It’s how businesses support sprawling multinational footprints. It’s even stitching together the appliances in our homes into one, smart, convenient fabric. For all of its importance, though, networking technology as a whole doesn’t tend to change much. For example, the internet itself runs on an iteration of a protocol that’s now 40 years old . Most of the developments in networking over that time have revolved around capacity and speed – not capability. As we move into the 2020s, though, there are a number of trends and technologies that are poised to create real change in the world of networking. Here are the four most important ones among them.

Next-Generation Wireless Technology

Without a doubt, the biggest networking technology development of the 2020s is one that’s going to be all around us very soon – the deployment of next-generation wireless networks. In the mobile networking arena, it’s the 5G standard that’s going to rewrite the rules of what’s possible for technology on-the-go. It’s these new cellular networks that are going to unleash the true potential of things like augmented reality and the IoT, as well as bringing us closer to a world filled with “ smart everything “. Indoors, the wireless revolution’s going to be led by Wi-Fi 6, the soon-to-go-mainstream standard that’s making its way into devices right now . It will not only triple the theoretical maximum throughput of its immediate predecessor, but will deliver better indoor signal penetration and support greater device density. In a world where every electrical device is gaining networking capabilities, the effects of Wi-Fi 6 can’t be overstated.

SD-WAN Becoming Common

Over the course of the last decade, cloud providers, SaaS and IaaS solutions, and mobile computing have come to challenge the traditional notion of boundary-driven networking. In the past, corporate and other private networks were animated by the concept of fenced-off access using firewalls and other location-centric controls. Now, as business computing assets have started to spread to remote data centers and mobile systems, a new concept has emerged – software-defined wide area networks (SD-WAN). This new paradigm in networking makes it possible to use a variety of network interconnections to create a private business LAN analog consisting of assets in the cloud, data centers, and branch offices that function like a single, seamless system. More than anything, this is made possible by continued improvements in WAN link bandwidth, which now allow geographically disbursed resources to move data at or near LAN speeds across vast distances. As the 2020s wear on, SD-WAN will come to replace traditional hardware-based onsite networking approaches.

Want More Tech News? Subscribe to ComputingEdge Newsletter Today!

Encryption Everywhere

One of the glaring deficiencies in the internet’s infrastructure has always been a lack of built-in data security and privacy features. That reality is increasing the pressure on website operators, app developers, and networking vendors to take steps to make encryption a part of their platforms as a means of making up for the underlying insecurity of the networks they rely on. And even though the tech media would have you believe that users looking for ways to watch any country’s Netflix is what’s driving the increase in the use of consumer VPN services, it too is a result of the push toward encryption everywhere. In the networking world, the push for encryption everywhere hasn’t gone unnoticed. It has in fact spurred hardware developers toward making encryption at the network layer a standard feature of their hardware going forward. It’s become so important that estimates now believe that the network encryption market will be worth $5.8 billion by 2026 , almost doubling in size in little more than five years.

UCaaS Displacing VoIP, OTT Messaging

One of the biggest results of the explosion of networking technology over the past 40 years is that it has revolutionized the way that we communicate. The internet began by displacing switched telephone networks as the primary means of real-time communication around the globe, and in the years since has spawned myriad ways for people to talk to one another. The result has been a fragmented communications environment that networked systems often struggle to keep up with. Between traffic shaping and prioritization to support VoIP protocols and managing the traffic generated by innumerable over-the-top messaging platforms on computers, tablets, and smartphones, the lack of standardization has been tough to navigate. In the 2020s, though, a trend toward Unified Communications as a Service (UCaaS) solutions aims to reset the landscape and allow network hardware developers to move away from supporting multiple application-specific protocols and specifications.

Connecting the Future

Judging by these and other trends now reshaping the world of networking, the 2020s are going to see the technology landscape in that field change significantly. Many of the longest-held concepts and traditional infrastructures will be replaced with more modern ones that take the needs of next-generation connected devices into account. In many ways, the idea of data networks themselves will be updated to reflect the new reality of border-free, seamless connectivity that we have now come to expect. There’s sure to be plenty of hurdles to overcome and obstacles to the remaking of networking technology as we’ve known it, but one thing is clear: networking technology, which has remained mostly unchanged for much of its history, is due for disruption on several fronts – and it’s coming in more ways than anyone is likely to be able to foresee. It’s going to make it an interesting time to be a networking professional, and that part is certain.

About the Author

Andrej is a digital marketing expert, editor at  TechLoot , and a contributing writer for a variety of other technology-focused online publications. He has covered the intersection of marketing and technology for several years and is pursuing an ongoing mission to share his expertise with business leaders and marketing professionals everywhere.

Recommended by IEEE Computer Society

new research topics in networking

Navigating Cloud Evolution: Best Practices in AWS and Azure

new research topics in networking

Quantum Data Scientist: The New Role of the 21st Century

new research topics in networking

4 Key Aspects of ESG Sustainability Reporting for Tech Companies

new research topics in networking

7 Ways to Practice Green Coding in Your Next Projects

new research topics in networking

AI and CRM: Pioneering the Evolution of Banking as a Service

new research topics in networking

Real-time Performance Analysis: Understanding K8s Environments

new research topics in networking

Master Data Management: Unlocking the Power of Data Excellence

new research topics in networking

User Management in the Enterprise: Technologies and Best Practices

Five Trends That Will Influence IT Networking in 2022

As networks continue to expand, organizations have to fine-tune them to make them secure and ready for future challenges. Here’s a list of the top IT networking trends that could become commonplace in 2022.

Since 2020, organizations have had to fine-tune their IT networks to make them seamless for remote employees to access internal applications and data, to make them secure against emerging threats, and to effectively support expanding operations. Let’s look at some of the top emerging trends in the IT networking domain in 2022 that should help organizations fine-tune their networks to meet the challenges ahead.

At the dawn of 2020, no one could have foreseen the swift migration to remote work strategies that would take place just months later. Even as companies began rushing their employees out the door at the start of the COVID outbreak, no one could have predicted that these swift trends would establish the roots that they did. 

Because technology moves so fast today, the crystal ball that we use to peer into the future seems to get murkier each year. However, businesses always rely on recent trends and events to form future strategies. Here’s a look at some of the recent trends that have taken root in the IT networking sphere and would inform developments in the space in the year ahead.

Five Top IT Networking Trends for 2022

Networking as a service (naas).

We have grown accustomed now to delivering IT as a service. Over the past decade, enterprises have recognized the great benefits that “_______ as a Service” models, such as SaaS, IaaS and PaaS come with. Well, get ready for another acronym – NaaS or Networking as a Service. While the global Network Networking-as-a-Service (NaaS) market was valued at just over $8 billion in 2020, it is expected to exceed Opens a new window $45 billion by 2026.  

The concept of NaaS is like other ‘as a Service’ types. A networking vendor such as Aruba or Cisco provides your networking infrastructure to your facility and charges you for using it, thus shifting it to an OPEX predictable budgeting model. As is characteristic of such models, it eliminates the high CAPEX of product refreshes for all switches and routers across your IT estate. Because these refreshes are part of the service, customers can take advantage of shorter product cycles, allowing them to leverage better technology faster. The outside vendor then manages everything through the cloud, removing the burden of mundane tasks such as patching, updating and basic troubleshooting for internal IT. In addition to a zero-ticket experience, internal IT gains added visibility and insights into their network that was unattainable before through self-service portals. 

See More: Network Management: Why NetOps Is the New DevOps

Hot desking becomes the next evolutionary step of hybrid work

As employees began returning to work in the latter half of 2021, we heard the conversation turn from remote work strategies to hybrid work architectures. Does the conundrum then become how to allocate office space for your employees when you don’t know where they may be working from? How do you avoid the expense of large amounts of empty office space or risk running out of space when everyone comes in simultaneously?  

The answer is hot desking. Hot desking incorporates communal workspaces that employees can utilize when they come into the office. Some desks will include high-performance PCs for users who need devices more powerful than their laptops. Desks and computers are unassigned, sort of like a public library’s PC area. An employee simply chooses whatever workspace happens to be available and starts working. This negates the need for assigned offices and desktop PCs. Conference rooms are available for team meetings or client interfacing. Besides providing high-performance wireless access for these areas, a primary challenge will be delivering the assigned desktop and application portfolio to any user that logs on to a community machine.   

5G takes remote work to the next level

There is no doubt that the proliferation of Wi-Fi provided the infrastructure for today’s mobile society and workforce. Believe it or not though, you haven’t seen anything yet. While Wi-Fi access is highly prevalent, it still lacks the ubiquitous presence that employees need to work from anywhere truly. That will change once enterprise computing devices become embedded with 5G capability later this year. Users will no longer be restricted to available Wi-Fi perimeters or lug around personal hotspots whenever they go out. Companies must deliver applications and create workspaces to any remotely connected device to allow users to work from any device, from any location. 5G will truly allow employees to work from anywhere, even in the middle of nowhere. It is the next chapter of network mobility.

The transformation of internal IT 

Of late, enterprises have witnessed the growing presence of shadow IT throughout their organizations as business units have grown weary of wrangling with internal IT concerning their technology needs. Indeed, IT can no longer reside on an island, and they can’t be the ones driving technology anymore. While it may not be time to get rid of the IT Department, as a recent article in the Wall Street Journal Opens a new window alluded to, it is time for IT to make itself more valuable to the business by aligning itself with the needs of the business through cooperative partnerships. Through these new liaisons, Internal IT will deliver the necessary solutions to satisfy the visions of those that dream it. Business units will now help mold the future of the company network.

In addition, we will see less specialization within internal IT departments. For example, with NaaS, you will no longer need a routing and switch specialist. With the growing popularity of hyperconverged infrastructure solutions, you no longer need a storage specialist. To keep pace with the speed of business, internal IT will no longer build their network environments, either through cloud providers or outside vendors that can deploy and implement new solutions according to best practices to get the new technology working. Internal IT will consist of operators who will run the environment.  

See More: Why the Future of Networks Is WAN Convergence

Clipping the VPN cord

While companies continue to migrate applications and internal systems to the cloud, there are limitations to what they can move. It isn’t easy to lift and shift legacy ERP systems and customized applications to the cloud. The problem is that remote users need to get to applications and websites inside the company domain. The traditional answer has been to allot VPN access to remote users, but VPN comes with significant risk as hackers readily target VPN connections. Once a VPN login is compromised, hackers directly connect to the LAN. VPN clients must also be updated and supported, which is a mundane assignment that Internal IT is trying to eliminate. VPN connections also tend to be problematic, increasing help desk calls. Expect a growing assortment of remote access solutions on the market that provide access to the exact assets that remote users need without VPN dependency. 

Whether any of these predictions come true is anyone’s guess. There may be something just beyond the horizon that we don’t see coming that will initiate significant, unpredictable changes to our lives. We only know for sure that businesses will expand their use of technology and that the size of their IT estates will continue to grow as networks continue to expand outward.  

MORE ON IT NETWORKING

  • What Is Network Hardware? Definition, Architecture, Challenges, and Best Practices
  • Top 10 Software-Defined Networking (SDN) Solutions in 2022
  • What Is Software-Defined Networking (SDN)? Definition, Architecture, and Applications
  • Wide Area Network (WAN) vs. Local Area Network (LAN): Key Differences and Similarities

What do you think will be the top networking trend in 2022?   Comment below or let us know on LinkedIn Opens a new window , Twitter Opens a new window , or Facebook Opens a new window . We’d love to hear from you!

Share This Article:

IT Specialist

Take me to Community

Recommended Reads

The Future of the Deskless Workforce is Cloud-optional

The Future of the Deskless Workforce is Cloud-optional

UK Competition Watchdog Probes Hewlett Packard’s Juniper Networks Acquisition

UK Competition Watchdog Probes Hewlett Packard’s Juniper Networks Acquisition

Internet in Vietnam Suffers as Three Out of Five Undersea Cables Fail

Internet in Vietnam Suffers as Three Out of Five Undersea Cables Fail

The Big Changes in Store for Telecom in the Year Ahead

The Big Changes in Store for Telecom in the Year Ahead

Speed vs. Stream: ACSI Findings Showcase Fiber Internet’s Dominance

Speed vs. Stream: ACSI Findings Showcase Fiber Internet’s Dominance

Smart Manufacturing: Flexibility Is King and 5G Is Its Enabler

Smart Manufacturing: Flexibility Is King and 5G Is Its Enabler

  • How it works

researchprospect post subheader

Useful Links

How much will your dissertation cost?

Have an expert academic write your dissertation paper!

Dissertation Services

Dissertation Services

Get unlimited topic ideas and a dissertation plan for just £45.00

Order topics and plan

Order topics and plan

Get 1 free topic in your area of study with aim and justification

Yes I want the free topic

Yes I want the free topic

Computer Networking Dissertation Topics

Published by Carmen Troy at January 5th, 2023 , Revised On May 16, 2024

A dissertation is an essential aspect of completing your degree program. Whether you are pursuing your master’s or are enrolled in a PhD program, you will not be awarded a degree without successfully submitting a thesis. To ensure that your thesis is submitted successfully without any hindrances, you should first get your topic and dissertation outline approved by your professor. When approving, supervisors focus on a lot of aspects.

However, relevance, recency, and conciseness play a huge role in accepting or rejecting your topic.

As a computer networking student, you have a variety of networking topics to choose from. With the field evolving with each passing day, you must ensure that your thesis covers recent computer networking topics and explores a relevant problem or issue. To help you choose the right topic for your dissertation, here is a list of recent and relevant computer networking dissertation topics.

List Of Trending Ideas For Your Computer Networking Dissertation

  • Machine learning for proactive network anomaly detection 
  • The role of software-defined-networking (SDN) for network performance and security 
  • Applications and challenges of 6G technologies 
  • How to ensure fairness and efficiency in Multi-Access Edge Computing (MEC)
  • Denial-of-Service (DoS) Attacks in the Age of Distributed Denial-of-Service (DDoS) Attacks
  • Applications and rise of Low-Power Wide Area Networks (LPWANs)
  • Efficient Resource Allocation and Quality-of-Service (QoS) Management
  • Ethical Implications of Artificial Intelligence (AI) in Network Management
  • The best ways to use Blockchain for Tamper-Proof Evidence Collection and Storage
  • Role of Network Operators in Cloud Gaming

Computer Networking Dissertation Topics For Your Research

Topic 1: an evaluation of the network security during machine to machine communication in iot.

Research Aim: The research aims to evaluate the network security issues associated with M2M communication in IoT.

 Objectives:

  • To evaluate the factors affecting the network security of IoT devices.
  • To determine the methods for increasing data integrity in M2M communication against physical tampering and unauthorised monitoring.
  • To evaluate the network security issues associated with M2M communication in IoT and offer suitable recommendations for improvement.

Topic 2: An analysis of the cybersecurity challenges in public clouds and appropriate intrusion detection mechanisms.

Research Aim: The aim of the research is to analyse the cybersecurity challenges in public clouds and the appropriate intrusion detection mechanisms.

Objectives:

  • To analyse the types of cybersecurity threats impacting public clouds.
  • To determine some of the competent intrusion detection techniques that can be used in cloud computing.
  • To investigate the cybersecurity challenges in public clouds and offer mitigating with appropriate intrusion detection techniques.

Topic 3: Investigating the impact of SaaS cloud ERP on the scalability and cost-effectiveness of business.

Research Aim: The research aims to investigate the impact of SaaS cloud ERP on the scalability and cost-effectiveness of business.

  • To analyse the benefits of SaaS ERP over traditional ERP.
  • To evaluate the characteristics of SaaS architecture in cloud computing and determine its varieties.
  • To investigate how SaaS cloud ERP impacts business scalability and cost-effectiveness.

Topic 4: An evaluation of the requirements of cloud repatriation and the challenges associated with it.

Research Aim: The research aims to evaluate the requirements of cloud repatriation in organisations and the associated challenges

  • To analyse the key factors of cloud repatriation.
  • To determine the challenges associated with cloud repatriation from public clouds.
  • To evaluate the need for cloud repatriation in organisations and the associated complexities

Topic 5: An examination of the security mechanisms in decentralised networks and the ways of enhancing system robustness

Research Aim: The research aims to investigate the security mechanisms in decentralised networks and the ways of enhancing system robustness.

  • To analyse the concept of decentralised networks and understand their difference from centralised networks.
  • To analyse the security mechanisms in decentralised networks to determine how it offers visibility and traceability.
  • To investigate the security mechanisms in decentralised networks and how system robustness can be increased for better privacy and security.

Latest Computer Networking Dissertation Topics

Exploring the importance of computer networking in today’s era.

Research Aim: Even though computer networking has been practised for a few years now, its importance has increased immensely over the past two years. A few main reasons include the use of technology by almost every business and the aim to offer customers an easy and convenient shopping experience. The main aim of this research will be to explain the concepts of computer networking, its benefits, and its importance in the current era. The research will also discuss how computer networking has helped businesses and individuals perform their work and benefit from it. The research will then specifically state examples where computer networking has brought positive changes and helped people achieve what they want.

Wireless Networks in Business Settings – An Analysis

Research Aim: Wireless networks are crucial in computer networking. They help build networks seamlessly, and once the networks are set up on a wireless network, it becomes extremely easy for the business to perform its daily activities. This research will investigate all about wireless networks in a business setting. It will first introduce the various wireless networks that can be utilised by a business and will then talk about how these networks help companies build their workflow around them. The study will analyse different wireless networks used by businesses and will conclude how beneficial they are and how they are helping the business.

Understanding Virtual Private Networks – A Deep Analysis of Their Challenges

Research Aim: Private virtual networks (VPN) are extremely common today. These are used by businesses and individuals alike. This research aims to understand how these networks operate and how they help businesses build strong and successful systems and address the challenges of VPNs. A lot of businesses do not adopt virtual private networks due to the challenges that they bring. This research will address these challenges in a way that will help businesses implement VPNs successfully.

A Survey of the Application of Wireless Sensor Networks

Research Aim: Wireless sensor networks are self-configured, infrastructure-less wireless networks to pass data. These networks are now extremely popular amongst businesses because they can solve problems in various application domains and possess the capacity to change the way work is done. This research will investigate where wireless sensor networks are implemented, how they are being used, and how they are performing. The research will also investigate how businesses implement these systems and consider factors when utilising these wireless sensor networks.

Computer Network Security Attacks – Systems and Methods to Respond

Research Aim: With the advent of technology today, computer networks are extremely prone to security attacks. A lot of networks have security systems in place. However, people with nefarious intent find one way to intrude and steal data/information. This research will address major security attacks that have impacted businesses and will aim to address this challenge. Various methods and systems will be highlighted to protect the computer networks. In addition to this, the research will also discuss various methods to respond to attacks and to keep the business network protected.

Preventing a Cyberattack – How Can You Build a Powerful Computer Network?

Research Aim: Cyberattacks are extremely common these days. No matter how powerful your network is, you might be a victim of phishing or hacking. The main aim of this research will be to outline how a powerful computer network can be built. Various methods to build a safe computer network that can keep data and information will be outlined, and the study will also highlight ways to prevent a cyberattack. In addition to this, the research will talk about the steps that should be taken to keep the computer network safe. The research will conclude with the best way and system to build a powerful and safe computer network.

Types of Computer Networks: A Comparison and Analysis

Research Aim: There are different types of computer networks, including LAN, WAN, PAN, MAN, CAN, SAN, etc. This research will discuss all the various types of computer networks to help readers understand how all these networks work. The study will then compare the different types of networks and analyse how each of them is implemented in different settings. The dissertation will also discuss the type of computer networks that businesses should use and how they can use them for their success. The study will then conclude which computer network is the best and how it can benefit when implemented.

Detecting Computer Network Attacks by Signatures and Fast Content Analysis

Research Aim: With technological advancement, today, many computer network attacks can be detected beforehand. While many techniques are utilised for detecting these attacks, the use of signatures and fast content analysis are the most popular ones. This research will explore these techniques in detail and help understand how they can detect a computer network attack and prevent it. The research will present different ways these techniques are utilised to detect an attack and help build powerful and safe computer networks. The research will then conclude how helpful these two techniques are and whether businesses should implement them.

Overview of Wireless Network Technologies and their Role in Healthcare

Research Aim: Wireless network technologies are utilised by several industries. Their uses and benefits have helped businesses resolve many business problems and assisted them in conducting their daily activities without any hindrance. This networking topic will help explore how wireless network technologies work and will talk about their benefits. This research aims to find out how wireless technologies help businesses carry out their daily routine tasks effortlessly. For this research, the focus will be on the healthcare industry. The study will investigate how wireless network technology has helped the healthcare sector and how it has benefited them to perform their daily tasks without much effort.

Setting up a Business Communication System over a Computer Network

Research Aim: Communication is an essential aspect of every business. Employees need to communicate effectively to keep the business going. In the absence of effective communication, businesses suffer a lot as the departments are not synchronised, and the operations are haphazard. This research will explore the different ways through which network technologies help conduct smooth and effective communication within organisations. This research will conclude how wireless networks have helped businesses build effective communication systems within their organisation and how they have benefited from it. It will then conclude how businesses have improved and solved major business problems with the help of these systems.

Free Dissertation Topic

Phone Number

Academic Level Select Academic Level Undergraduate Graduate PHD

Academic Subject

Area of Research

Frequently Asked Questions

How to find computer networking dissertation topics.

To find computer networking dissertation topics:

  • Follow industry news and emerging technologies.
  • Investigate unresolved networking challenges.
  • Review recent research papers.
  • Explore IoT, cybersecurity , and cloud computing.
  • Consider real-world applications.
  • Select a topic aligned with your expertise and career aspirations.

You May Also Like

Need interesting and manageable Cryptocurrency – Bitcoin, Etherum & Ripple on dissertation topics or thesis? Here are the trending Cryptocurrency – Bitcoin, Etherum & Ripple dissertation titles so you can choose the most suitable one.

Medical law becomes increasingly important as healthcare dominates as a social issue. Graduate students must select a thesis subject as part of their programs. The subject you choose must have sufficient data to support your thesis.

Need interesting and manageable Sexual Harassment of Women dissertation topics? Here are the trending Sexual Harassment of Women dissertation titles so you can choose the most suitable one.

USEFUL LINKS

LEARNING RESOURCES

researchprospect-reviews-trust-site

COMPANY DETAILS

Research-Prospect-Writing-Service

  • How It Works
  • Research & Faculty
  • Offices & Services
  • Information for:
  • Faculty & Staff
  • News & Events
  • Contact & Visit
  • About the Department
  • Message from the Chair
  • Computer Science Major (BS/BA)
  • Computer Science Minor
  • Data Science and Engineering Minor
  • Combined BS (or BA)/MS Degree Program
  • Intro Courses
  • Special Programs & Opportunities
  • Student Groups & Organizations
  • Undergraduate Programs
  • Undergraduate Research
  • Senior Thesis
  • Peer Mentors
  • Curriculum & Requirements
  • MS in Computer Science
  • PhD in Computer Science
  • Admissions FAQ
  • Financial Aid
  • Graduate Programs
  • Courses Collapse Courses Submenu
  • Research Overview
  • Research Areas
  • Systems and Networking
  • Security and Privacy
  • Programming Languages
  • Artificial Intelligence
  • Human-Computer Interaction
  • Vision and Graphics
  • Groups & Labs
  • Affiliated Centers & Institutes
  • Industry Partnerships
  • Adobe Research Partnership
  • Center for Advancing Safety of Machine Intelligence
  • Submit a Tech Report
  • Tech Reports
  • Tenure-Track Faculty
  • Faculty of Instruction
  • Affiliated Faculty
  • Adjunct Faculty
  • Postdoctoral Fellows
  • PhD Students
  • Outgoing PhDs and Postdocs
  • Visiting Scholars
  • News Archive
  • Weekly Bulletin
  • Monthly Student Newsletter
  • All Public Events
  • Seminars, Workshops, & Talks
  • Distinguished Lecture Series
  • CS Colloquium Series
  • CS + X Events
  • Tech Talk Series
  • Honors & Awards
  • External Faculty Awards
  • University Awards
  • Department Awards
  • Student Resources
  • Undergraduate Student Resources
  • MS Student Resources
  • PhD Student Resources
  • Student Organization Resources
  • Faculty Resources
  • Postdoc Resources
  • Staff Resources
  • Purchasing, Procurement and Vendor Payment
  • Expense Reimbursements
  • Department Operations and Facilities
  • Initiatives
  • Student Groups
  • CS Faculty Diversity Committee
  • Broadening Participation in Computing (BPC) Plan
  • Northwestern Engineering

Research   /   Research Areas Systems and Networking

Systems and Networking is a broad and diverse area of computing research which spans areas including: systems, networks and distributed systems, programming languages and software engineering, compilers, databases and data science, security and cryptography, and mobile and wireless systems.

Photo of Nabil Alshurafa

Nabil Alshurafa

Associate Professor of Preventive Medicine and (by courtesy) Computer Science and Electrical and Computer Engineering

Email Nabil Alshurafa

Photo of Fabian Bustamante

Fabian Bustamante

Professor of Computer Science

Email Fabian Bustamante

Photo of Simone Campanoni

Simone Campanoni

Associate Professor of Computer Science and (by courtesy) Electrical and Computer Engineering

Email Simone Campanoni

Photo of Yan Chen

Yan Chen

Email Yan Chen

Photo of Alok Choudhary

Alok Choudhary

Harold Washington Professor of Electrical and Computer Engineering and Computer Science

Email Alok Choudhary

Photo of Christos Dimoulas

Christos Dimoulas

Assistant Professor of Computer Science

Email Christos Dimoulas

Photo of Peter Dinda

Peter Dinda

Professor of Computer Science and (by courtesy) Electrical and Computer Engineering

Email Peter Dinda

Photo of Robby Findler

Robby Findler

Email Robby Findler

Photo of Branden Ghena

Branden Ghena

Assistant Professor of Instruction

Email Branden Ghena

Photo of Nikos Hardavellas

Nikos Hardavellas

Associate Professor of Computer Science

Associate Professor of Electrical and Computer Engineering

Email Nikos Hardavellas

Photo of Josiah Hester

Josiah Hester

Adjunct Associate Professor of Electrical and Computer Engineering

Adjunct Associate Professor of Computer Science

Email Josiah Hester

Photo of Russell Joseph

Russell Joseph

Email Russell Joseph

Photo of Aleksandar Kuzmanovic

Aleksandar Kuzmanovic

Email Aleksandar Kuzmanovic

Photo of Seda Ogrenci

Seda Ogrenci

Professor of Electrical and Computer Engineering

Email Seda Ogrenci

Photo of Jennie Rogers

Jennie Rogers

Email Jennie Rogers

Photo of Vincent St-Amour

Vincent St-Amour

Associate Professor of Instruction

Email Vincent St-Amour

Photo of Kate Smith

Kate Smith

Email Kate Smith

More in this section

  • Engineering Home
  • CS Department

Related Links

  • Research at McCormick
  • Meet our Faculty
  • Northwestern Research Overview

Contact Info

Fabian Bustamante Professor Email

Peter Dinda Professor Email

Computer Science

Computer networks.

Computer networks allow computers to communicate with one another, and provide the fundamental infrastructures supporting our modern society. Research on computer networks at Yale improves on essential network system properties such as efficiency, robustness, and programmability. The research spans all networking layers, including application-network integration (ANI); highly robust, flexible networking; software-defined networking (SDN) and programmable networking applications; and mobile networking.

Faculty working in this area:

faculty email website
Anurag Khandelwal
Sohee Park  
Robert Soulé
Lin Zhong

Highlights in this area:

Networking is central to modern computing, from WANs connecting cell phones to massive data stores, to the data-center interconnects that deliver seamless storage and fine-grained distributed computing. Because our distributed computing infrastructure is a key differentiator for the company, Google has long focused on building network infrastructure to support our scale, availability, and performance needs, and to apply our expertise and infrastructure to solve similar problems for Cloud customers. Our research combines building and deploying novel networking systems at unprecedented scale, with recent work focusing on fundamental questions around data center architecture, cloud virtual networking, and wide-area network interconnects. We helped pioneer the use of Software Defined Networking, the application of ML to networking, and the development of large-scale management infrastructure including telemetry systems. We are also addressing congestion control and bandwidth management, capacity planning, and designing networks to meet traffic demands. We build cross-layer systems to ensure high network availability and reliability. By publishing our findings at premier research venues, we continue to engage both academic and industrial partners to further the state of the art in networked systems.

Recent Publications

Some of our teams.

Cloud networking

Global networking

Network infrastructure

We're always looking for more talented, passionate people.

Careers

new research topics in networking

Communications and Networking Research Group

PUBLICATIONS

Journal articles | other papers | conference papers | book chapters | technical reports, journal articles.

134. Vishrant Tripathi, Nick Jones, Eytan Modiano, Fresh-CSMA: A Distributed Protocol for Minimizing Age of Information, IEEE Journal on Communications and Networks, 2024.

133. Bai Liu, Quang Nguyen, Qingkai Liang, Eytan Modiano, Tracking Drift-Plus-Penalty: Utility Maximization for Partially Observable and Controllable Networks, IEEE/ACM Transactions on Networking, 2024.

132. Xinzhe Fu, Eytan Modiano, Optimal Routing to Parallel Servers with Unknown Utilities – Multi-armed Bandit With Queues, IEEE/ACM Transactions on Networking, January 2022.

131. Bai Liu, Qingkai Liang, Eytan Modiano, Tracking MaxWeight: Optimal Control for Partially Observable and Controllable Networks, IEEE/ACM Transactions on Networking, August 2023.

130. Xinzhe Fu, Eytan Modiano, Joint Learning and Control in Stochastic Queueing Networks with unknown Utilities, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2023.

129. Vishrant Tripathi, Rajat Talak, Eytan Modiano, Information Freshness in Multi-Hop Wireless Networks, IEEE/ACM Transactions on Networking,” April 2023.

128.  Xinzhe Fu, Eytan Modiano, “ Learning-NUM: Network Utility Maximization with Unknown Utility Functions and Queueing Delay ,”  IEEE/ACM Transactions on Networking,” 2022.

127.  Bai Liu, Qiaomin Xie, Eytan Modiano,  “ RL-QN: A Reinforcement Learning Framework for Optimal Control of Queueing Systems ,”  ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS), 2022.

126. Xinzhe Fu and E. Modiano,  “ Elastic Job Scheduling with Unknown Utility Functions ,” Performance Evaluation, 2021.

125. Bai Liu and E. Modiano, “ Optimal Control for Networks with Unobservable Malicious Nodes ,”  Performance Evaluation, 2021.

124. Vishrant Tripathi, Rajat Talak, Eytan Modiano, “ Age Optimal Information Gathering and Dissemination on Graphs ,”  Transactions on Mobile Computing, April 2021.

123.  Xinyu Wu, Dan Wu, Eytan Modiano, “ Predicting Failure Cascades in Large Scale Power Systems via the Influence Model Framework, ”  IEEE Transactions on Power Systems, 2021.

122.   Roy D. Yates, Yin Sun, D. Richard Brown III, Sanjit K. Kaul, Eytan Modiano and Sennur Ulukus, “ Age of Information: An Introduction and Survey, ”  Journal on Selected Areas in Communications, February 2021.

121.   Jianan Zhang, Abhishek Sinha, Jaime Llorca, Anonia Tulino, Eytan Modiano, “ Optimal Control of Distributed Computing Networks with Mixed-Cast Traffic Flows ,”  IEEE/ACM Transactions on Networking, 2021.

120.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Learning Algorithms for Minimizing Queue Length Regret ,”  IEEE Transactions on Information Theory, 2021.

119.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Throughput Maximization in Uncooperative Spectrum Sharing Networks ,”  IEEE/ACM IEEE/ACM Transactions on Networking, Vol. 28, No. 6, December 2020.

118.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Learning algorithms for scheduling in wireless networks with unknown channel statistics ,” Ad Hoc Networks, Vol. 85, pp. 131-144, 2019.

117.   Rajat Talak, Eytan Modiano, “ Age-Delay Tradeoffs in Queueing Systems ,”  IEEE Transactions on Information Theory, 2021.

116.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Improving Age of Information in Wireless Networks with Perfect Channel State Information ,”  IEEE/ACM Transactions on Networking, Vol. 28, No. 4, August 2020.

115.   Igor Kadota and Eytan Modiano, “ Minimizing the Age of Information in Wireless Networks with Stochastic Arrivals ,” IEEE Transactions on Mobile Computing, 2020.

114.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Optimizing Information Freshness in Wireless Networks under General Interference Constraints ,”  IEEE/ACM transactions on Networking, Vol. 28, No. 1, February 2020.

113.   X. Fu and E. Modiano, “ Fundamental Limits of Volume-based Network DoS Attacks ,” Proceedings of the ACM on Measurement and Analysis of Computing Systems, Vol. 3, No. 3, December 2019. 

112.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Capacity and Delay Scaling for Broadcast Transmission in Highly Mobile Wireless Networks ,” IEEE Transactions on Mobile Computing, 2019.

111.   Abhishek Sinha and Eytan Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions , IEEE Transactions on Mobile Computing, Vol. 19, No. 9, September 2020.

110.   Yu-Pin Hsu, Eytan Modiano, Lingjie Duan, “ Scheduling Algorithms for Minimizing Age of Information in Wireless Broadcast Networks with Random Arrivals ,”  IEEE Transactions on Mobile Computing, Vol. 19, No. 12, December 2020.

109.   Xiaolin Jiang, Hossein S. Ghadikolaei, Gabor Fodor, Eytan Modiano, Zhibo Pang, Michele Zorzi, Carlo Fischione, “ Low-latency Networking: Where Latency Lurks and How to Tame It ,”  Proceedings of the IEEE, 2019.

108.   Jianan Zhang, Edmund Yeh, Eytan Modiano, “ Robustness of Interdependent Random Geometric Networks ,” IEEE Transactions on Network Science and Engineering, Vol. 6, No. 3, July-September 2019.

107.   Qingkai Liang, Hyang-Won Lee, Eytan Modiano, “ Robust Design of Spectrum-Sharing Networks ,” IEEE Transactions on Mobile Computing, Vol. 18, No. 8, August 2019.

106.   A. Sinha, L. Tassiulas, E. Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Dynamic Topology ,”  IEEE Transactions on Mobile Computing, Vol. 18, No. 5, May 2019.

105. Igor Kadota, Abhishek Sinha, Eytan Modiano, “ Scheduling Algorithms for Optimizing Age of Information in Wireless Networks With Throughput Constraints ,”  IEEE/ACM Transactions on Networking, August 2019.

104.   Igor Kadota, Abhishek Sinha, Rahul Singh, Elif Uysal-Biyikoglu, Eytan Modjano, “ Scheduling Policies for Minimizing Age of Information in Broadcast Wireless Networks ,” IEEE/ACM Transactions on Networking, Vol. 26, No. 5, October 2018.

103.   Jianan Zhang and Eytan Modiano, “ Connectivity in Interdependent Networks ,”  IEEE/ACM Transactions on Networking, 2018.

102.   Qingkai Liang, Eytan Modiano, “ Minimizing Queue Length Regret Under Adversarial Network Models ,” Proceedings of the ACM on Measurement and Analysis of Computing Systems, Volume 2, Issue 1, April 2018, Article No.: 11, pp 1-32. (same as Sigmetrics 2018).

101.   A. Sinha and E. Modiano, “ Optimal Control for Generalized Network Flow Problems ,”  IEEE/ACM Transactions on Networking, 2018.

100.   Hossein Shokri-Ghadikolaei, Carlo Fischione, Eytan Modiano  “ Interference Model Similarity Index and Its Applications to mmWave Networks ,”  IEEE Transactions on Wireless Communications, 2018.

99.   Matt Johnston, Eytan Modiano, “ Wireless Scheduling with Delayed CSI: When Distributed Outperforms Centralized, ’ IEEE Transactions on Mobile Computing, 2018.

98.   A. Sinha, G. Paschos, E. Modiano, “ Throughput-Optimal Multi-hop Broadcast Algorithms ,” IEEE/ACM Transactions on Networking, 2017.

97.   Nathan Jones, Georgios Paschos, Brooke Shrader, Eytan Modiano, “ An Overlay Architecture for Throughput Optimal Multipath Routing ,” IEEE/ACM Transactions on Networking, 2017.

96.   Greg Kuperman, Eytan Modiano, “ Providing Guaranteed Protection in Multi-Hop Wireless Networks with Interference Constraints ,” IEEE Transactions on Mobile Computing, 2017.

95.   Matt Johnston, Eytan Modiano, Isaac Kesslassy, “ Channel Probing in Opportunistic Communications Systems ,”  IEEE Transactions on Information Theory, November, 2017.

94.   Anurag Rai, Georgios Paschos, Chih-Ping Lee, Eytan Modiano, “ Loop-Free Backpressure Routing Using Link-Reversal Algorithms “, IEEE/ACM Transactions on Networking, October, 2017.

93.   Matt Johnston and Eytan Modiano, “” Controller Placement in Wireless Networks with Delayed CSI ,” IEEE/ACM Transactions on Networking, 2017.

92.   Jianan Zheng, E. Modiano, D. Hay, “ Enhancing Network Robustness via Shielding ,”  IEEE Transactions on Networking, 2017.

91.   M. Markakis, E. Modiano, J.N. Tsitsiklis, “ Delay Analysis of the Max-Weight Policy under Heavy-Tailed Traffic via Fluid Approximations ,” Mathematics of Operations Research, October, 2017.

90.   Qingkai Liang and E. Modiano, “ Survivability in Time-Varying Graphs ,”  IEEE Transactions on Mobile Computing, 2017.

89.   A. Sinha, G. Paschos, C. P. Li, and E. Modiano, “ Throughput-Optimal Multihop Broadcast on Directed Acyclic Wireless Networks ,” IEEE/ACM Transactions on Networking, Vol. 25, No. 1, Feb. 2017.

88.   G. Celik, S. Borst, , P. Whiting , E. Modiano, “ Dynamic Scheduling with Reconfiguration Delays ,”  Queueing Systems, 2016.

87.  G. Paschos, C. P. Li, E. Modiano, K. Choumas, T. Korakis, “ In-network Congestion Control for Multirate Multicast ,”   IEEE/ACM Transactions on Networking,  2016.

86.   H. Seferoglu and E. Modiano, “ TCP-Aware Backpressure Routing and Scheduling ,” IEEE Transactions on Mobile Computing, 2016.

85.   H. Seferoglu and E. Modiano, “ Separation of Routing and Scheduling in Backpressure-Based Wireless Networks ,” IEEE/ACM Transactions on Networking, Vol. 24, No. 3, 2016.

84.   M. Markakis, E. Modiano, J.N. Tsitsiklis, “ Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic ,”  IEEE/ACM Transactions on Networking, 2015.

83.   S. Neumayer, E. Modiano,  “ Network Reliability Under Geographically Correlated Line and Disk Failure Models ,” Computer Networks, to appear, 2016.

82.   S. Neumayer, E. Modiano, A. Efrat, “ Geographic Max-Flow and Min-Cut Under a Circular Disk Failure Model ,” Computer Networks, 2015.

81.   Marzieh Parandehgheibi, Hyang-Won Lee, Eytan Modiano, Survivable Path Sets:  A new approach to survivability in multi-layer networks ,”  IEEE Journal on Lightwave Technology, 2015.

80.   G. Kuperman, E. Modiano, A. Narula-Tam, “ Network Protection with Multiple Availability Guarantees ,” Computer Networks, 2015.

79.   G. Kuperman, E. Modiano, A. Narula-Tam, “ Analysis and Algorithms for Partial Protection in Mesh Networks ,” IEEE/OSA Journal of Optical Communications and Networks, 2014.

78.   Krishna Jagannathan, Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Throughput Optimal Scheduling over Time-Varying Channels in the presence of Heavy-Tailed Traffic ,” IEEE Transactions on Information Theory, 2014.

77.   Chih-Ping Li and Eytan Modiano, “ Receiver-Based Flow Control for Networks in Overload ,” IEEE/ACM Transactions on Networking, Vol. 23, No. 2, 2015.

76.   Matthew Johnston, Hyang-Won Lee, Eytan Modiano, “ A Robust Optimization Approach to Backup Network Design with Random Failures ,” IEEE/ACM Transactions on Networking, Vol. 23, No. 4, 2015.

75.   Guner Celik and Eytan Modiano, “ Scheduling in Networks with Time-Varying Channels and Reconfiguration Delay ,” IEEE/ACM Transactions on Networking, Vol. 23, No. 1, 2015.

74.   Matt Johnston, H.W. Lee, E. Modiano, “ Robust Network Design for Stochastic Traffic Demands ,” IEEE Journal of Lightwave Technology, 2013.

73.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Max-Weight Scheduling in Queueing Networks With Heavy-Tailed Traffic, ” IEEE/ACM Transactions on Networking, 2014.

72.   Kayi Lee, Hyang-Won Lee, Eytan Modiano, “ Maximizing Reliability in WDM Networks through Lightpath Routing ,”  IEEE ACM Transactions on Networking, 2014.

71.   Krishna Jaggannathan and Eytan Modiano, “ The Impact of Queue Length Information on Buffer Overflow in Parallel Queues ,”  IEEE transactions on Information Theory, 2013.

70.   Krishna Jagannathan, Ishai Menashe, Gil Zussman, Eytan Modiano, “ Non-cooperative Spectrum Access – The Dedicated vs. Free Spectrum Choice ,” IEEE JSAC, special issue on Economics of Communication Networks & Systems, to appear, 2012.

69.   Guner Celik and Eytan Modiano, “ Dynamic Server Allocation over Time Varying Channels with Switchover Delay ,” IEEE Transactions on Information Theory, to appear, 2012.

68.   Anand Srinivas and Eytan Modiano, “ Joint Node Placement and Assignment for Throughput Optimization in Mobile Backbone Networks ,” IEEE JSAC, special issue on Communications Challenges and Dynamics for Unmanned Autonomous Vehicles, June, 2012.

67.   Guner Celik and Eytan Modiano, “ Controlled Mobility in Stochastic and Dynamic Wireless Networks ,” Queueing Systems, 2012.

66.   Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano, “ A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels ,” Internet Mathematics, Vol. 9, Nos. 2–3: 136–160.

65.   Long Le, E. Modiano, N. Shroff, “Optimal Control of Wireless Networks with Finite Buffers ,” IEEE/ACM Transactions on Networking, to appear, 2012.

64.   K. Jagannathan, M. Markakis, E. Modiano, J. Tsitsiklis, “Queue Length Asymptotics for Generalized Max-Weight Scheduling in the presence of Heavy-Tailed Traffic,” IEEE/ACM Transactions on Networking, Vol. 20, No. 4, August 2012.

63.   Kayi Lee, Hyang-Won Lee, Eytan Modiano, “ Reliability in Layered Networks with Random Link Failures, ” IEEE/ACM Transactions on Networking, December 2011.

62.   Krishna Jagannathan, Eytan Modiano, Lizhong Zheng, “ On the Role of Queue Length Information in Network Control ,” IEEE Transactions on Information Theory, September 2011.

61.   Hyang-Won Lee, Long Le, Eytan Modiano, “ Distributed Throughput Maximization in Wireless Networks via Random Power Allocation, ” IEEE Transactions on Mobile Computing, 2011.

60.   Sebastian Neumayer, Gil Zussman, Rueven Cohen, Eytan Modiano, “ Assessing the Vulnerability of the Fiber Infrastructure to Disasters, ” IEEE/ACM Transactions on Networking, December 2011.

59.   Kayi Lee, Eytan Modiano, Hyang-Won Lee, “ Cross Layer Survivability in WDM-based Networks ,” IEEE/ACM Transactions on Networking, August 2011.

58.   Emily Craparo, Jon How, and Eytan Modiano, “Throughput Optimization in Mobile Backbone Networks,” IEEE Transactions on Mobile Computing, April, 2011.

57.   Hyang-Won Lee, Kayi Lee, and Eytan Modiano, “Diverse Routing in Networks with Probabilistic Failures,” IEEE/ACM Transactions on Networking, December, 2010.

56.   Guner Celik, Gil Zussman, Wajahat Khan and Eytan Modiano, “MAC Protocols For Wireless Networks With Multi-packet Reception Cabaility ,” IEEE Transactions on Mobile Computing, February, 2010.

55.   Atilla Eryilmaz, Asuman Ozdaglar, Devavrat Shah, and Eytan Modiano, “Distributed Cross-Layer Algorithms for the Optimal Control of Multi-hop Wireless Networks,” IEEE/ACM Transactions on Networking, April 2010.

54.   Murtaza Zafer and Eytan Modiano, “Minimum Energy Transmission over a Wireless Channel With Deadline and Power Constraints ,” IEEE Transactions on Automatic Control, pp. 2841-2852, December, 2009.

53.   Murtaza Zafer and Eytan Modiano, “A Calculus Approach to Energy-Efficient Data Transmission with Quality of Service Constraints,” IEEE/ACM Transactions on Networking, 2009.

52.   Anand Srinivas, Gil Zussman, and Eytan Modiano, “Construction and Maintenance of Wireless Mobile Backbone Networks,” IEEE/ACM Transactions on Networking, 2009.

51.   Andrew Brzezinski, Gil Zussman, and Eytan Modiano, “Distributed Throughput Maximization in Wireless Mesh Networks Via Pre-Partitioning,” IEEE/ACM Transactions on Networking, December, 2008.

50.   Amir Khandani, Eytan Modiano, Jinane Abounadi, Lizhong Zheng, “Reliability and Route Diversity in Wireless Networks,” IEEE Transactions on Wireless Communications, December, 2008.

49.   Alessandro Tarello, Jun Sun, Murtaza Zafer and Eytan Modiano, “Minimum Energy Transmission Scheduling Subject to Deadline Constraints,” ACM Wireless Networks, October, 2008.

48.   Murtaza Zafer, Eytan Modiano, “Optimal Rate Control for Delay-Constrained Data Transmission over a Wireless Channel,” IEEE Transactions on Information Theory, September, 2008.

47.   Andrew Brzezinski and Eytan Modiano, “Achieving 100% Throughput In Reconfigurable IP/WDM Networks,” IEEE/ACM Transactions on Networking, August, 2008.

46.   Michael Neely, Eytan Modiano and C. Li, “Fairness and Optimal Stochastic Control for Heterogeneous Networks,” IEEE/ACM Transactions on Networking, September, 2008.

45.   Amir Khandani, Jinane Abounadi, Eytan Modiano, Lizhong Zheng, “Cooperative Routing in Static Wireless Networks,” IEEE Transactions on Communications, November 2007.

44.   Murtaza Zafer, Eytan Modiano, “Joint Scheduling of Rate-guaranteed and Best-effort Users over a Wireless Fading Channel,” IEEE Transactions on Wireless Communications, October, 2007.

43.   Krishna Jagannathan, Sem Borst, Phil Whiting and Eytan Modiano, “Scheduling of Multi-Antenna Broadcast Systems with Heterogeneous Users,” IEEE Journal of Selected Areas in Communications, September, 2007.Amir Khandani, Jinane

42.   Anand Ganti, Eytan Modiano, and John Tsitsiklis, “Optimal Transmission Scheduling in Symmetric Communication Models with Intermittent Connectivity, ” IEEE Transactions on Information Theory, March, 2007.

41.   Michael Neely and Eytan Modiano, “Logarithmic Delay for NxN Packet Switches Under Crossbar Constraints,” IEEE/ACM Transactions on Networking, November, 2007.

40.   Jun Sun, Jay Gao, Shervin Shambayati and Eytan Modiano, “Ka-Band Link Optimization with Rate Adaptation for Mars and Lunar Communications,”   International Journal of Satellite Communications and Networks, March, 2007.

39.   Jun Sun and Eytan Modiano, “Fair Allocation of A Wireless Fading Channel: An Auction Approach” Institute for Mathematics and its Applications, Volume 143: Wireless Communications, 2006.

38.   Jun Sun, Eytan Modiano and Lizhong Zhang, “Wireless Channel Allocation Using An Auction Algorithm,” IEEE Journal on Selected Areas in Communications, May, 2006.

37.   Murtaza Zafer and Eytan Modiano, “Blocking Probability and Channel Assignment for Connection Oriented Traffic in Wireless Networks,” IEEE Transactions on Wireless Communications, April, 2006.

36.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “Optimal Transmission Scheduling over a fading channel with Energy and Deadline Constraints” IEEE Transactions on Wireless Communications, March,2006.

35.   Poompat Saengudomlert, Eytan Modiano and Rober Gallager, “On-line Routing and Wavelength Assignment for Dynamic Traffic in WDM Ring and Torus Networks,” IEEE Transactions on Networking, April, 2006.

34.   Li-Wei Chen, Eytan Modiano and Poompat Saengudomlert, “Uniform vs. Non-Uniform band Switching in WDM Networks,” Computer Networks (special issue on optical networks), January, 2006.

33.   Andrew Brzezinski and Eytan Modiano, “Dynamic Reconfiguration and Routing Algorithms for IP-over-WDM networks with Stochastic Traffic,” IEEE Journal of Lightwave Technology, November, 2005

32.   Randall Berry and Eytan Modiano, “Optimal Transceiver Scheduling in WDM/TDM Networks,” IEEE Journal on Selected Areas in Communications, August, 2005.

31.   Poompat Saengudomlert, Eytan Modiano, and Robert G. Gallager, “Dynamic Wavelength Assignment for WDM All-Optical Tree Networks,” IEEE Transactions on Networking, August, 2005.

30.   Ashwinder Ahluwalia and Eytan Modiano, “On the Complexity and Distributed Construction of Energy Efficient Broadcast Trees in Wireless Ad Hoc Networks,” IEEE Transactions on Wireless Communications, October, 2005.

29.   Michael Neely, Charlie Rohrs and Eytan Modiano, “Equivalent Models for Analysis of Deterministic Service Time Tree Networks,” IEEE Transactions on Information Theory, October, 2005.

28.   Michael Neely and Eytan Modiano, “Capacity and Delay Tradeoffs for Ad Hoc Mobile Networks,” IEEE Transactions on Information Theory, May, 2005.

27.   Li-Wei Chen and Eytan Modiano, “Efficient Routing and Wavelength Assignment for Reconfigurable WDM Networks with Wavelength Converters,” IEEE/ACM Transactions on Networking, February, 2005. Selected as one of the best papers from Infocom 2003 for fast-track publication in IEEE/ACM Transactions on Networking.

26.   Michael Neely and Eytan Modiano, “Convexity in Queues with General Inputs,” IEEE Transactions on Information Theory, May, 2005.

25.   Anand Srinivas and Eytan Modiano, “Finding Minimum Energy Disjoint Paths in Wireless Ad Hoc Networks,” ACM Wireless Networks, November, 2005. Selected to appear in a special issue dedicated to best papers from Mobicom 2003.

24.   Michael Neely, Eytan Modiano and Charlie Rohrs, “Dynamic Power Allocation and Routing for Time-Varying Wireless Networks,” IEEE Journal of Selected Areas in Communication, January, 2005.

23.   Chunmei Liu and Eytan Modiano, “On the performance of additive increase multiplicative decrease (AIMD) protocols in hybrid space-terrestrial networks,” Computer Networks, September, 2004.

22.   Li-Wei Chen and Eytan Modiano, “Dynamic Routing and Wavelength Assignment with Optical Bypass using Ring Embeddings,” Optical Switching and Networking (Elsevier), December, 2004.

21.   Aradhana Narula-Tam, Eytan Modiano and Andrew Brzezinski, “Physical Topology Design for Survivable Routing of Logical Rings in WDM-Based Networks,” IEEE Journal of Selected Areas in Communication, October, 2004.

20.   Randall Berry and Eytan Modiano, “‘The Role of Switching in Reducing the Number of Electronic Ports in WDM Networks,” IEEE Journal of Selected Areas in Communication, October, 2004.

19.   Jun Sun and Eytan Modiano, “Routing Strategies for Maximizing Throughput in LEO Satellite Networks,,” IEEE JSAC, February, 2004.

18.   Jun Sun and Eytan Modiano, “Capacity Provisioning and Failure Recovery for Low Earth Orbit Satellite Networks,” International Journal on Satellite Communications, June, 2003.

17.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “Optimal Energy Allocation and Admission Control for Communications Satellites,” IEEE Transactions on Networking, June, 2003.

16.   Michael Neely, Eytan Modiano and Charles Rohrs, “Power Allocation and Routing in Multi-Beam Satellites with Time Varying Channels,” IEEE Transactions on Networking, February, 2003.

15.   Eytan Modiano and Aradhana Narula-Tam, “Survivable lightpath routing: a new approach to the design of WDM-based networks,” IEEE Journal of Selected Areas in Communication, May 2002.

14.   Aradhana Narula-Tam, Phil Lin and Eytan Modiano, “Efficient Routing and Wavelength Assignment for Reconfigurable WDM Networks,” IEEE Journal of Selected Areas in Communication, January, 2002.

13.   Brett Schein and Eytan Modiano, “Quantifying the benefits of configurability in circuit-switched WDM ring networks with limited ports per node,” IEEE Journal on Lightwave Technology, June, 2001.

12.   Aradhana Narula-Tam and Eytan Modiano, “Dynamic Load Balancing in WDM Packet Networks with and without Wavelength Constraints,” IEEE Journal of Selected Areas in Communications, October 2000.

11.   Randy Berry and Eytan Modiano, “Reducing Electronic Multiplexing Costs in SONET/WDM Rings with Dynamically Changing Traffic,” IEEE Journal of Selected Areas in Communications, October 2000.

10.   Eytan Modiano and Richard Barry, “A Novel Medium Access Control Protocol for WDM-Based LANs and Access Networks Using a Master-Slave Scheduler,” IEEE Journal on Lightwave Technology, April 2000.

9.   Eytan Modiano and Anthony Ephremides, “Communication Protocols for Secure Distributed Computation of Binary Functions,” Information and Computation, April 2000.

8.   Angela Chiu and Eytan Modiano, “Traffic Grooming Algorithms for Reducing Electronic Multiplexing Costs in WDM Ring Networks,” IEEE Journal on Lightwave Technology, January 2000.

7.   Eytan Modiano, “An Adaptive Algorithm for Optimizing the Packet Size Used in Wireless ARQ Protocols,” Wireless Networks, August 1999.

6.   Eytan Modiano, “Random Algorithms for Scheduling Multicast Traffic in WDM Broadcast-and-Select Networks,” IEEE Transactions on Networking, July, 1999.

5.   Eytan Modiano and Richard Barry, “Architectural Considerations in the Design of WDM-based Optical Access Networks,” Computer Networks, February 1999.

4.   V.W.S. Chan, K. Hall, E. Modiano and K. Rauschenbach, “Architectures and Technologies for High-Speed Optical Data Networks,” IEEE Journal of Lightwave Technology, December 1998.

3.   Eytan Modiano and Anthony Ephremides, “Efficient Algorithms for Performing Packet Broadcasts in a Mesh Network,” IEEE Transactions on Networking, May 1996.

2.   Eytan Modiano, Jeffrey Wieselthier and Anthony Ephremides, “A Simple Analysis of Queueing Delay in a Tree Network of Discrete-Time Queues with Constant Service Times,” IEEE Transactions on Information Theory, February 1996.

1.   Eytan Modiano and Anthony Ephremides, “Communication Complexity of Secure Distributed Computation in the Presence of Noise,” IEEE Transactions on Information Theory, July 1992.

Other Papers

5.  Eytan Modiano, “Satellite Data Networks,” AIAA Journal on Aerospace Computing, Information and Communication, September, 2004.

4.  Eytan Modiano and Phil Lin, “Traffic Grooming in WDM networks,” IEEE Communications Magazine, July, 2001.

3.  Eytan Modiano and Aradhana Narula, “Mechanisms for Providing Optical Bypass in WDM-based Networks,” SPIE Optical Networks, January 2000.

2.  K. Kuznetsov, N. M. Froberg, Eytan Modiano, et. al., “A Next Generation Optical Regional Access Networks,” IEEE Communications Magazine, January, 2000.

1.  Eytan Modiano, “WDM-based Packet Networks,” (Invited Paper) IEEE Communications Magazine, March 1999.

Conference Papers

246. Xinyu Wu, Dan Wu, Eytan Modiano, “ Overload Balancing in Single-Hop Networks With Bounded Buffers ,” IFIP Networking, 2022.

245.  Xinzhe Fu, Eytan Modiano, “ Optimal Routing for Stream Learning Systems ,”  IEEE Infocom, April 2022.

244.  Vishrant Tripathi, Luca Ballotta, Luca Carlone, E. Modiano, “ Computation and Communication Co-Design for Real-Time Monitoring and Control in Multi-Agent Systems ,”  IEEE Wiopt, 2021.

243. Eray Atay, Igor Kadota, E. Modiano, “ Aging Wireless Bandits: Regret Analysis and Order-Optimal Learning Algorithm ,”  IEEE Wiopt 2021.

242. Xinzhe Fu and E. Modiano,  “ Elastic Job Scheduling with Unknown Utility Functions ,” IFIP Performance, Milan, 2021.

241. Bai Liu and E. Modiano, “ Optimal Control for Networks with Unobservable Malicious Nodes ,”  IFIP Performance, Milan, 2021.

240. Bai Liu, Qiaomin Xie,  Eytan Modiano, “ RL-QN:  A Reinforcement Learning Framework for Optimal Control of Queueing Systems ,”  ACM Sigmetrics Workshop on Reinforcement Learning in Networks and Queues (RLNQ), 2021.

239. Xinzhe Fu and E. Modiano,  “ Learning-NUM: Network Utility Maximization with Unknown Utility Functions and Queueing Delay ,  ACM MobiHoc 2021.  

238. Vishrant Tripathi and Eytan Modiano,  “ An Online Learning Approach to Optimizing Time-Varying Costs of AoI ,”  ACM MobiHoc 2021. 

237.   Igor Kadota, Muhammad Shahir Rahman, and Eytan Modiano, “ WiFresh: Age-of-Information from Theory to Implementation ,”  International Conference on Computer Communications and Networks (ICCCN), 2021.

236. Vishrant Tripathi and Eytan Modiano, “ Age Debt: A General Framework For Minimizing Age of Information ,”  IEEE Infocom Workshop on Age-of-Information, 2021.

235. Igor Kadota, Eytan Modiano, “ Age of Information in Random Access Networks with Stochastic Arrivals ,” IEEE Infocom, 2020.

234. Igor Kadota, M. Shahir Rahman, Eytan Modiano, Poster: Age of Information in Wireless Networks: from Theory to Implementation , ACM Mobicom, 2020.

233. Xinyu Wu, Dan Wu, Eytan Modiano, “ An Influence Model Approach to Failure Cascade Prediction in Large Scale Power Systems ,” IEEE American Control Conference, July, 2020.

232. X. Fu and E. Modiano, “ Fundamental Limits of Volume-based Network DoS Attacks ,” Proc. ACM Sigmetrics, Boston, MA, June 2020.

231. Vishrant Tripathi, Eytan Modiano, “ A Whittle Index Approach to Minimizing Functions of Age of Information ,” Allerton Conference on Communication, Control, and Computing, September 2019.

230. Bai Liu, Xiaomin Xie, Eytan Modiano, “ Reinforcement Learning for Optimal Control of Queueing Systems ,” Allerton Conference on Communication, Control, and Computing, September 2019.

229. Rajat Talak, Sertac Karaman, Eytan Modiano, “ A Theory of Uncertainty Variables for State Estimation and Inference ,” Allerton Conference on Communication, Control, and Computing, September 2019.

228. Rajat Talak, Eytan Modiano, “ Age-Delay Tradeoffs in Single Server Systems ,” IEEE International Symposium on Information Theory, Paris, France, July, 2019.

227. Rajat Talak, Sertac Karaman, Eytan Modiano, “ When a Heavy Tailed Service Minimizes Age of Information ,” IEEE International Symposium on Information Theory, Paris, France, July, 2019.

226. Qingkai Liang, Eytan Modiano, “ Optimal Network Control with Adversarial Uncontrollable Nodes ,” ACM MobiHoc, Catania, Italy, June 2019.

225. Igor Kadota, Eytan Modiano, “ Minimizing the Age of Information in Wireless Networks with Stochastic Arrivals ,” ACM MobiHoc, June 2019.

224. Maotong Xu, Jelena Diakonikolas, Suresh Subramaniam, Eytan Modiano, “ A Hierarchical WDM-based Scalable Data Center Network Architecture ,” IEEE International Conference on Communications (ICC), Shanghai, China, June 2019.

223. Maotong Xu, Min Tian, Eytan Modiano, Suresh Subramaniam, “ RHODA Topology Configuration Using Bayesian Optimization

222.   Anurag Rai, Rahul Singh and Eytan Modiano, “ A Distributed Algorithm for Throughput Optimal Routing in Overlay Networks ,”  IFIP Networking 2019, Warsaw, Poland, May 2019.

221.   Qingkai Liang and Eytan Modiano, “ Optimal Network Control in Partially-Controllable Networks ,”  IEEE Infocom, Paris, April 2019.

220.   Xinzhe Fu and Eytan Modiano, “ Network Interdiction Using Adversarial Traffic Flows ,”  IEEE Infocom, Paris, April 2019.

219.   Vishrant Tripathi, Rajat Talak, Eytan Modiano, “ Age Optimal Information Gathering and Dissemination on Graphs ,”  IEEE Infocom, Paris, April 2019.

218.   Jianan Zhang, Hyang-Won Lee, Eytan Modiano, “ On the Robustness of Distributed Computing Networks ,”  DRCN 2019, Coimbra, Portugal, March, 2019.

217.   Hyang-Won Lee, Jianan Zhang and Eytan Modiano, “ Data-driven Localization and Estimation of Disturbance in the Interconnected Power System ,”  IEEE Smartgridcomm, October, 2018.

216.   Jianan Zhang and Eytan Modiano, “ Joint Frequency Regulation and Economic Dispatch Using Limited Communication ,”  IEEE Smartgridcomm, October, 2018.

215.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Scheduling Policies for Age Minimization in Wireless Networks with Unknown Channel State ,”  IEEE International Symposium on Information Theory, July 2018.

214.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Online Learning Algorithms for Minimizing Queue Length Regret ,”  IEEE International Symposium on Information Theory, July 2018.

213.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks ,”  IEEE SPAWC, Kalamata, Greece, June, 2018.

212.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Optimizing Information Freshness in Wireless Networks under General Interference Constraints ,”  ACM MobiHoc 2018, Los Angeles, CA, June 2018.

211.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Learning Algorithms for Scheduling in Wireless Networks with Unknown Channel Statistics ,”  ACM MobiHoc, June 2018.

210.   Khashayar Kamran, Jianan Zhang, Edmund Yeh, Eytan Modiano, “ Robustness of Interdependent Geometric Networks Under Inhomogeneous Failures ,”  Workshop on Spatial Stochastic Models for Wireless Networks (SpaSWiN), Shanghai, China, May 2018.

209.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Optimizing Age of Information in Wireless Networks with Perfect Channel State Information ,”  Wiopt 2018, Shanghai, China, May 2018.

208.   Abhishek Sinha, Eytan Modiano, “ Network Utility Maximization with Heterogeneous Traffic Flows ,”  Wiopt 2018, Shanghai, China, May 2018.

207.   Qingkai Liang, Eytan Modiano, “ Minimizing Queue Length Regret Under Adversarial Network Models ,”  ACM Sigmetrics, 2018.

206.   Jianan Zhang, Abhishek Sinha, Jaime Llorca, Anonia Tulino, Eytan Modiano, “ Optimal Control of Distributed Computing Networks with Mixed-Cast Traffic Flows ,”  IEEE Infocom, Honolulu, HI, April 2018.

205.   Qingkai Liang, Eytan Modiano, “ Network Utility Maximization in Adversarial Environments ,”  IEEE Infocom, Honolulu, HI, April 2018.

204.   Igor Kadota, Abhishek Sinha, Eytan Modiano, “ Optimizing Age of Information in Wireless Networks with Throughput Constraints ,”  IEEE Infocom, Honolulu, HI, April 2018.

203.   QIngkai Liang, Verina (Fanyu) Que, Eytan Modiano, “ Accelerated Primal-Dual Policy Optimization for Safe Reinforcement Learning ,”  NIPS workshop on “Transparent and interpretable machine learning in safety critical environments,”December 2017.

202.   Rahul Singh, Xueying Guo,Eytan Modiano, “ Risk-Sensitive Optimal Control of Queues ,”  IEEE Conference on Decision and Control (CDC), December 2017.

201.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Minimizing Age of Information in Multi-Hop Wireless Networks ,”  Allerton Conference on Communication, Control, and Computing, September 2017.

200.   Abhishek Sinha, Eytan Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions ,”  ACM MobiHoc, Madras, India, July 2017.

199.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Capacity and delay scaling for broadcast transmission in highly mobile wireless networks ,”  ACM MobiHoc, Madras, India, July 2017.

198.5 . Y.-P. Hsu, E. Modiano, and L. Duan, “ Age of Information: Design and Analysis of Optimal Scheduling Algorithms ,”  IEEE International Symposium on Information Theory (ISIT), 2017.

198.   Qingkai Liang and Eytan Modiano, “ Coflow Scheduling in Input-Queued Switches: Optimal Delay Scaling and Algorithms ,”  IEEE Infocom, Atlanta, GA, May 2017.

197.   Jianan Zhang and Eytan Modiano, “ Robust Routing in Interdependent Networks ,”  IEEE Infocom, Atlanta, GA, May 2017.

196.   Abhishek Sinha, Eytan Modiano, “ Optimal Control for Generalized Network Flow Problems ,”  IEEE Infocom, Atlanta, GA, May 2017.

195.   Rajat Talak*, Sertac Karaman, Eytan Modiano, “ Speed Limits in Autonomous Vehicular Networks due to Communication Constraints ,”  IEEE Conference on Decision and Control (CDC), Las Vegas, NV, December 2016.

194.   Marzieh Parandehgheibi*, Konstantin Turitsyn, Eytan Modiano, “ Distributed Frequency Control in Power Grids Under Limited Communication ,”  IEEE Conference on Decision and Control (CDC), Las Vegas, NV, December 2016.

193.   Igor Kadota, Elif Uysal-Biyikoglu, Rahul Singh, Eytan Modiano, “ Minimizing Age of Information in Broadcast Wireless Networks ,”  Allerton Allerton Conference on Communication, Control, and Computing, September 2016.

192.   Jianan Zhang, Edmund Yeh, Eytan Modiano, “ Robustness of Interdependent Random Geometric Networks ,”  Allerton Conference on Communication, Control, and Computing, September 2016.

191.   Abhishek Sinha, Leandros Tassiulas, Eytan Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Dynamic Topology ,”  ACM MobiHoc’16, Paderborn, Germany, July, 2016. (winner of best paper award)

190.   Abishek Sinha, Georgios Paschos, Eytan Modiano, “ Throughput-Optimal Multi-hop Broadcast Algorithms ,”  ACM MobiHoc’16, Paderborn, Germany, July, 2016.

189.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Throughput Maximization in Uncooperative Spectrum Sharing Networks ,”  IEEE International Symposium on Information Theory, Barcelona, Spain, July 2016.

188.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Topology Control for Wireless Networks with Highly-Directional Antennas ,”  IEEE Wiopt, Tempe, Arizona, May, 2016.

187.   Qingkai Liang, H.W. Lee, Eytan Modiano, “ Robust Design of Spectrum-Sharing Networks ,”  IEEE Wiopt, Tempe, Arizona, May, 2016.

186.   Hossein Shokri-Ghadikolae, Carlo Fischione and Eytan Modiano, “ On the Accuracy of Interference Models in Wireless Communications ,”  IEEE International Conference on Communications (ICC), 2016.

185.   Qingkai Liang and Eytan Modiano, “ Survivability in Time-varying Networks ,”  IEEE Infocom, San Francisco, CA, April 2016.

184.   Kyu S. Kim, Chih-Ping Li, Igor Kadota, Eytan Modiano, “ Optimal Scheduling of Real-Time Traffic in Wireless Networks with Delayed Feedback ,”  Allerton conference on Communication, Control, and Computing, September 2015.

183.   Marzieh Parandehgheibi, Eytan Modiano, “ Modeling the Impact of Communication Loss on the Power Grid Under Emergency Control ,”  IEEE SmartGridComm, Miami, FL, Nov. 2015.

182.   Anurag Rai, Chih-ping Li, Georgios Paschos, Eytan Modiano, “ Loop-Free Backpressure Routing Using Link-Reversal Algorithms ,”  Proceedings of the ACM MobiHoc, July 2015.

181.   Longbo Huang, Eytan Modiano, “ Optimizing Age of Information in a Multiclass Queueing System ,”  Proceedings of IEEE ISIT 2015, Hong Kong, Jun 2015.

180.   M. Johnston, E. Modiano, “ A New Look at Wireless Scheduling with Delayed Information ,”  Proceedings of IEEE ISIT 2015, Hong Kong, June 2015.

179.   M. Johnston, E. Modiano, “ Scheduling over Time Varying Channels with Hidden State Information ,”  Proceedings of IEEE ISIT 2015, Hong Kong, June 2015.

178.   M. Johnston and E. Modiano, “ Controller Placement for Maximum Throughput Under Delayed CSI ,”  IEEE Wiopt, Mombai, India, May 2015.

177.   A. Sinha, G. Paschos, C. P. Li, and E. Modiano, “ Throughput Optimal Broadcast on Directed Acyclic Graphs ,”  IEEE Infocom, Hong Kong, April 2015.

176.   J. Zheng and E. Modiano, “ Enhancing Network Robustness via Shielding ,”  IEEE Design of Reliable Communication Networks, Kansas City, March 2015.

175.   H. W. Lee and E. Modiano, “ Robust Design of Cognitive Radio Networks ,”  Information and Communication Technology Convergence (ICTC), 2014.

174.   Greg Kuperman and Eytan Modiano, “ Disjoint Path Protection in Multi-Hop Wireless Networks with Interference Constraints ,”  IEEE Globecom, Austin, TX, December 2014.

173.   Marzieh Parandehgheibi, Eytan Modiano, David Hay, “ Mitigating Cascading Failures in Interdependent Power Grids and Communication Networks ,”  IEEE Smartgridcomm, Venice, Italy, November 2014.

172.   Georgios Paschos and Eytan Modiano, “ Throughput optimal routing in overlay networks ,”  Allerton conference on Communication, Control, and Computing, September 2014.

171.   Nathan Jones, George Paschos, Brooke Shrader, Eytan Modiano, “ An overlay architecture for Throughput Optimal Multipath Routing ,”  ACM MobiHoc, August 2014.

170.   Matt Johnston, Eytan Modiano, Yuri Polyanskiy, “ Opportunistic Scheduling with Limited Channel State Information: A Rate Distortion Approach ,”  IEEE International Symposium on Information Theory, Honolulu, HI, July 2014.

169.   Chih-Ping Li, Georgios Paschos, Eytan Modiano, Leandros Tassiulas, “ Dynamic Overload Balancing in Server Farms ,”  Networking 2014, Trondheim, Norway, June, 2014.

168.   Hulya Seferonglu and Eytan Modiano, “ TCP-Aware Backpressure Routing and Scheduling ,”  Information Theory and Applications, San Diego, CA, February 2014.

167.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic ,”  Information Theory and Applications, San Diego, CA, February 2014.

166.   Kyu Soeb Kim, Chih-ping Li, Eytan Modiano, “ Scheduling Multicast Traffic with Deadlines in Wireless Networks ,”  IEEE Infocom, Toronto, CA, April 2014.

165.   Georgios Paschos, Chih-ping Li, Eytan Modiano, Kostas Choumas, Thanasis Korakis, “ A Demonstration of Multirate Multicast Over an 802.11 Mesh Network ,”  IEEE Infocom, Toronto, CA, April 2014.

164.   Sebastian Neumayer, Eytan Modiano, “ Assessing the Effect of Geographically Correlated Failures on Interconnected Power-Communication Networks ,”  IEEE SmartGridComm, 2013.

163.   Marzieh Parandehgheibi, Eytan Modiano, “ Robustness of Interdependent Networks: The case of communication networks and the power grid ,”  IEEE Globecom, December 2013.

162.   Matt Johnston, Eytan Modiano, “ Optimal Channel Probing in Communication Systems: The Two-Channel Case ,”  IEEE Globecom, December 2013.

161.   Mihalis Markakis, Eytan Modiano, John N. Tsitsiklis, “ Delay Analysis of the Max-Weight Policy under Heavy-Tailed Traffic via Fluid Approximations ,”  Allerton Conference, October 2013.

160.   Matthew Johnston, Isaac Keslassy, Eytan Modiano, “ Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal ,”  IEEE International Symposium on Information Theory, July 2013.

159.   Krishna P Jagannathan, Libin Jiang, Palthya Lakshma Naik, Eytan Modiano, “ Scheduling Strategies to Mitigate the Impact of Bursty Traffic in Wireless Networks ,”  11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks Wiopt 2013, Japan, May 2013. (Winner – Best Paper Award).

158.   Hulya Seferoglu and Eytan Modiano, “ Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks ,”  IEEE Infocom, Turin, Italy, April 2013.

157.   Chih-Ping Li, Eytan Modiano, “ Receiver-Based Flow Control for Networks in Overload ,”  IEEE Infocom, Turin, Italy, April 2013.

156.   Nathan Jones, Brooke Shrader, Eytan Modiano, “ Distributed CSMA with Pairwise Coding ,”  IEEE Infocom, Turin, Italy, April 2013.

155.   Greg Kuperman and Eytan Modiano, “ Network Protection with Guaranteed Recovery Times using Recovery Domains ,”  IEEE Infocom, Turin, Italy, April 2013.

154.   Greg Kuperman and Eytan Modiano, “ Providing Protection in Multi-Hop Wireless Networks ,”  IEEE Infocom, Turin, Italy, April 2013.

153.   Greg Kuperman, Eytan Modiano, Aradhana Narula-Tam, “ Network Protection with Multiple Availability Guarantees ,”  IEEE ICC workshop on New Trends in Optical Networks Survivability, June 2012.

152.   Nathaniel Jones, Brooke Shrader, Eytan Modiano, “ Optimal Routing and Scheduling for a Simple Network Coding Scheme ,”  IEEE Infocom, Orlando, Fl, March, 2012.

151.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Max-Weight Scheduling in Networks with Heavy-Tailed Traffic ,”  IEEE Infocom, Orlando, Fl, March, 2012.

150.   Guner Celik and Eytan Modiano, “ Scheduling in Networks with Time-Varying Channels and Reconfiguration Delay ,”  IEEE Infocom, Orlando, Fl, March, 2012.

149.   Sebastian Neumayer, Alon Efrat, Eytan Modiano, “ Geographic Max-Flow and Min-cut Under a Circular Disk Failure Model ,”  IEEE Infocom (MC), Orlando, Fl, March, 2012.

148.   Marzieh Parandehgheibi, Hyang-Won Lee, and Eytan Modiano, “ Survivable Paths in Multi-Layer Networks ,”  Conference on Information Science and Systems, March, 2012.

147.   Greg Kuperman, Eytan Modiano, and Aradhana Narula-Tam, “ Partial Protection in Networks with Backup Capacity Sharing ,”  Optical Fiber Communications Conference (OFC), Anaheim, CA, March, 2012.

146.   Krishna Jagannathan, Libin Jiang, Eytan Modiano, “ On Scheduling Algorithms Robust to Heavy-Tailed Traffic ,”  Information Theory and Applications (ITA), San Diego, CA, February 2012.

145.   M. Johnston, H.W. Lee, E. Modiano, “ Robust Network Design for Stochastic Traffic Demands ,”  IEEE Globecom, Next Generation Networking Symposium, Houston, TX, December 2011.

144.   S. Neumayer, E. Modiano, “ Network Reliability Under Random Circular Cuts ,”  IEEE Globecom, Optical Networks and Systems Symposium, Houston, TX, December 2011.

143.   H.W. Lee, K. Lee, E. Modiano, “ Maximizing Reliability in WDM Networks through Lightpath Routing ,”  IEEE Globecom, Optical Networks and Systems Symposium, Houston, TX, December 2011.

142.   Guner Celik, Sem Borst, Eytan Modiano, Phil Whiting, “ Variable Frame Based Max-Weight Algorithms for Networks with Switchover Delay ,”  IEEE International Symposium on Information Theory, St. Petersburgh, Russia, August 2011.

141.   Krishna Jaganathan, Ishai Menache, Eytan Modiano, and Gil Zussman, “ Non-cooperative Spectrum Access – The Dedicated vs. Free Spectrum Choice ,”  ACM MOBIHOC’11, May 2011.

140.   Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano, “ A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels ,”  IEEE Infocom (Mini-conference), Shanghai, China, April 2011.

139.   Guner Celik, Long B. Le, Eytan Modiano, “ Scheduling in Parallel Queues with Randomly Varying Connectivity and Switchover Delay ,”  IEEE Infocom (Mini-conference), Shanghai, China, April 2011.

138.   Gregory Kuperman, Eytan Modiano, Aradhana Narula-Tam, “ Analysis and Algorithms for Partial Protection in Mesh Networks ,”  IEEE Infocom (Mini-conference), Shanghai, China, April 2011.

137.   Matthew Johnston, Hyang-Won Lee, Eytan Modiano, “ A Robust Optimization Approach to Backup Network Design with Random Failures ,”  IEEE Infocom, Shanghai, China, April 2011.

136.   Krishna Jagannathan, Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Queue Length Asymptotics for Generalized Max-Weight Scheduling in the presence of Heavy-Tailed Traffic ,”  IEEE Infocom, Shanghai, China, April 2011.

135.   Guner Celik and Eytan Modiano, “ Dynamic Vehicle Routing for Data Gathering in Wireless Networks ,”  In Proc. IEEE CDC’10, Dec. 2010..***

134.   Long B. Le, Eytan Modiano, Changhee Joo, and Ness B. Shroff, “ Longest-queue-first scheduling under the SINR interference model ,”  ACM MobiHoc, September 2010..***

133.   Krishna Jagannathan, Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Throughput Optimal Scheduling in the Presence of Heavy-Tailed Traffic ,”  Allerton Conference on Communication, Control, and Computing, September 2010..**

132.   Delia Ciullo, Guner Celik, Eytan Modiano, “ Minimizing Transmission Energy in Sensor Networks via Trajectory Control ,”  IEEE Wiopt 2010, Avignon, France, June 2010, (10 pages; CD proceedings – page numbers not available).

131.   Sebastian Neumayer and Eytan Modiano, “ Network Reliability with Geographically Correlated Failures ,”  IEEE Infocom 2010, San Diego, CA, March 2010, (9 pages; CD proceedings – page numbers not available).**

130.   Long Le, Eytan Modiano, Ness Shroff, “ Optimal Control of Wireless Networks with Finite Buffers ,”  IEEE Infocom 2010, San Diego, CA, March 2010, (9 pages; CD proceedings – page numbers not available).

129.   Kayi Lee, Hyang-Won Lee, Eytan Modiano, “ Reliability in Layered Network with Random Link Failures ,”  IEEE Infocom 2010, San Diego, CA, March 2010, (9 pages; CD proceedings – page numbers not available).**

128.   Krishna Jagannathan, Eytan Modiano, “ The Impact of Queue length Information on Buffer Overflow in Parallel Queues ,”  Allerton Conference on Communication, Control, and Computing, September 2009, pgs. 1103 -1110 **

127.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Scheduling Policies for Single-Hop with Heavy-Tailed Traffic ,”  Allerton Conference on Communication, Control, and Computing, September 2009, pgs. 112 – 120..**

126.   Dan Kan, Aradhana Narula-Tam, Eytan Modiano, “ Lightpath Routing and Capacity Assignment for Survivable IP-over-WDM Networks ,”  DRCN 2009, Alexandria, VA October 2009, pgs. 37 -44..**

125.   Mehdi Ansari, Alireza Bayesteh, Eytan Modiano, “ Opportunistic Scheduling in Large Scale Wireless Networks ,”  IEEE International Symposium on Information Theory, Seoul, Korea, June 2009, pgs. 1624 – 1628.

124.   Hyang-Won Lee, Eytan Modiano and Long Bao Le, “ Distributed Throughput Maximization in Wireless Networks via Random Power Allocation ,”  IEEE Wiopt, Seoul, Korea, June 2009. (9 pages; CD proceedings – page numbers not available).

123.   Wajahat Khan, Eytan Modiano, Long Le, “ Autonomous Routing Algorithms for Networks with Wide-Spread Failures ,”  IEEE MILCOM, Boston, MA, October 2009. (6 pages; CD proceedings – page numbers not available).**

122.   Guner Celik and Eytan Modiano, “ Random Access Wireless Networks with Controlled Mobility ,”  IEEE Med-Hoc-Nets, Haifa, Israel, June 2009, pgs. 8 – 14.**

121.   Hyang-Won Lee and Eytan Modiano, “ Diverse Routing in Networks with Probabilistic Failures ,”  IEEE Infocom, April 2009, pgs. 1035 – 1043.

120.   Kayi Lee and Eytan Modiano, “ Cross-layer Survivability in WDM-based Networks ,”  IEEE Infocom, April 2009, pgs. 1017 -1025..**

119.   Krishna Jagannathan, Eytan Modiano, Lizhong Zheng, “ On the Trade-off between Control Rate and Congestion in Single Server Systems ,”  IEEE Infocom, April 2009, pgs. 271 – 279.**

118.   Sebastian Neumayer, Gil Zussman, Rueven Cohen, Eytan Modiano, “ Assessing the Vulnerability of the Fiber Infrastructure to Disasters ,”  IEEE Infocom, April 2009, pgs. 1566 – 1574.**

117.   Long Le, Krishna Jagannathan and Eytan Modiano, “ Delay analysis of max-weight scheduling in wireless ad hoc networks ,”  Conference on Information Science and Systems, Baltimore, MD, March, 2009, pgs. 389 – 394.**

116.   Krishna Jagannathan, Eytan Modiano, Lizhong Zheng, “ Effective Resource Allocation in a Queue: How Much Control is Necessary? ,”  Allerton Conference on Communication, Control, and Computing, September 2008, pgs. 508 – 515.**

115.   Sebastian Neumayer, Gil Zussman, Rueven Cohen, Eytan Modiano, “ Assessing the Impact of Geographically Correlated Network Failures ,”  IEEE MILCOM, November 2008. (6 pages; CD proceedings – page numbers not available).**

114.   Emily Craparo, Jonathan P. How, and Eytan Modiano, “ Simultaneous Placement and Assignment for Exploration in Mobile Backbone Networks ,”  IEEE conference on Decision and Control (CDC), November 2008, pgs. 1696 – 1701 **

113.   Anand Srinivas and Eytan Modiano, “ Joint node placement and assignment for throughput optimization in mobile backbone networks ,”  IEEE INFOCOM’08, pp. 1130 – 1138, Phoenix, AZ, Apr. 2008, pgs. 1130 – 1138.**

112.   Guner Celik, Gil Zussman, Wajahat Khan and Eytan Modiano, “ MAC for Networks with Multipacket Reception Capability and Spatially Distributed Nodes ,”  IEEE INFOCOM’08, Phoenix, AZ, Apr. 2008, pgs. 1436 – 1444.**

111.   Gil Zussman, Andrew Brzezinski, and Eytan Modiano, “ Multihop Local Pooling for Distributed Throughput Maximization in Wireless Networks ,”  IEEE INFOCOM’08, Phoenix, AZ, Apr. 2008, pgs 1139 – 1147.**

110.   Emily Craparo, Jonathan How and Eytan Modiano, “ Optimization of Mobile Backbone Networks: Improved Algorithms and Approximation ,”  IEEE American Control Conference, Seattle, WA, June 2008, pgs. 2016 – 2021.**

109.   Atilla Eryilmaz, Asuman Ozdaglar, Devavrat Shah, Eytan Modiano, “ Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks ,”  Conference on Information Science and Systems, Princeton, NJ, March, 2008, pgs. 932 – 937.

108.   Anand Srinivas and Eytan Modiano, “ Optimal Path Planning for Mobile Backbone Networks ,”  Conference on Information Science and Systems, Princeton, NJ, March, 2008, pgs. 913 – 918.

107.   Kayi Lee and Eytan Modiano, “ Cross-layer Survivability in WDM Networks with Multiple Failures ,”  IEEE Optical Fiber Communications Conference, San Diego, CA February, 2008 (3 pages; CD proceedings – page numbers not available).

106.   Andrew Brzezinski, Gil Zussman and Eytan Modiano, “ Local Pooling Conditions for Joint Routing and Scheduling ,”  Workshop on Information Theory and Applications, pp. 499 – 506, La Jolla, CA, January, 2008, pgs. 499 – 506.

105.   Murtaza Zafer and Eytan Modiano, “ Minimum Energy Transmission over a Wireless Fading Channel with Packet Deadlines ,”  Proceedings of IEEE Conference on Decision and Control (CDC), New Orleans, LA, December, 2007, pgs. 1148 – 1155.**

104.   Atilla Eryilmaz, Asuman Ozdaglar, Eytan Modiano, “ Polynomial Complexity Algorithms for Full Utilization of Multi-hop Wireless Networks ,”  IEEE Infocom, Anchorage, AK, April, 2007, pgs. 499 – 507.

103.   Murtaza Zafer and Eytan Modiano, “ Delay Constrained Energy Efficient Data Transmission over a Wireless Fading Channel ,”  Workshop on Information Theory and Application, University of California, San Diego, CA, February, 2007, pgs. 289 – 298.**

102.   Atilla Eryilmaz, Eytan Modiano, Asuman Ozdaglar, “ Randomized Algorithms for Throughput-Optimality and Fairness in Wireless Networks ,”  Proceedings of IEEE Conference on Decision and Control (CDC), San Diego, CA, December, 2006, pgs. 1936 – 1941.

101.   Anand Srinivas, Gil Zussman, and Eytan Modiano, “ Distributed Mobile Disk Cover – A Building Block for Mobile Backbone Networks ,”  Proc. Allerton Conf. on Communication, Control, and Computing, Allerton, IL, September 2006, (9 pages; CD proceedings – page numbers not available).**

100.   Krishna Jagannathan, Sem Borst, Phil Whiting, Eytan Modiano, “ Scheduling of Multi-Antenna Broadcast Systems with Heterogeneous Users ,”  Allerton Conference on Communication, Control and Computing, Allerton, IL, September 2006, (10 pages; CD proceedings – page numbers not available).**

99.   Andrew Brzezinski, Gil Zussman, and Eytan Modiano, “ Enabling Distributed Throughput Maximization in Wireless Mesh Networks – A Partitioning Approach ,”  Proceedings of ACM MOBICOM’06, Los Angeles, CA, Sep. 2006, (12 pages; CD proceedings – page numbers not available).**

98.   Eytan Modiano, Devavrat Shah, and Gil Zussman, “ Maximizing Throughput in Wireless Networks via Gossiping ,”  Proc. ACM SIGMETRICS / IFIP Performance’06, Saint-Malo, France, June 2006, (12 pages; CD proceedings – page numbers not available). (best paper award)

97.   Anand Srinivas, Gil Zussman, and Eytan Modiano, “ Mobile Backbone Networks – Construction and Maintenance ,”  Proc. ACM MOBIHOC’06, Florence, Italy, May 2006, (12 pages; CD proceedings – page numbers not available).**

96.   Andrew Brzezinski and Eytan Modiano, “ Achieving 100% throughput in reconfigurable optical networks ,”  IEEE INFOCOM 2006 High-Speed Networking Workshop, Barcelona, Spain, April 2006, (5 pages; CD proceedings – page numbers not available).**

95.   Krishna P. Jagannathan, Sem Borst, Phil Whiting, Eytan Modiano, “ Efficient scheduling of multi-user multi-antenna systems ,”  Proceedings of WiOpt 2006, Boston, MA, April 2006, (8 pages; CD proceedings – page numbers not available).**

94.   Andrew Brzezinski and Eytan Modiano, “ Greedy weighted matching for scheduling the input-queued switch ,”  Conference on Information Sciences and Systems (CISS), Princeton, NJ, March 2006, pgs. 1738 – 1743.**

93.   Murtaza Zafer and Eytan Modiano, “ Optimal Adaptive Data Transmission over a Fading Channel with Deadline and Power Constraints ,”  Conference on Information Sciences and Systems (CISS), Princeton, New Jersey, March 2006, pgs. 931 – 937.**

92.   Li-Wei Chen and E. Modiano, “ A Geometric Approach to Capacity Provisioning in WDM Networks with Dynamic Traffic ,”  Conference on Information Science and Systems (CISS), Princeton, NJ, March, 2006, pgs. 1676 – 1683, **

91.   Jun Sun and Eytan Modiano, “ Channel Allocation Using Pricing in Satellite Networks ,”  Conference on Information Science and Systems (CISS), Princeton, NJ, March, 2006, pgs. 182 – 187.**

90.   Jun Sun, Jay Gao, Shervin Shambayatti and Eytan Modiano, “ Ka-Band Link Optimization with Rate Adaptation ,”  IEEE Aerospace Conference, Big Sky, MN, March, 2006. (7 pages; CD proceedings – page numbers not available).

89.   Alessandro Tarello, Eytan Modiano and Jay Gao, “ Energy efficient transmission scheduling over Mars proximity links ,”  IEEE Aerospace Conference, Big Sky, MN, March, 2006. (10 pages; CD proceedings – page numbers not available).

88.   A. Brzezinski and E. Modiano, “ RWA decompositions for optimal throughput in reconfigurable optical networks ,”  INFORMS Telecommunications Conference, Dallas, TX, March 2006 (3 pages; CD proceedings – page numbers not available).**

87.   Li Wei Chen and E. Modiano, “ Geometric Capacity Provisioning for Wavelength Switched WDM Networks ,”  Workshop on Information Theory and Application, University of California, San Diego, CA, February, 2006. (8 pages; CD proceedings – page numbers not available).**

86.   Murtaza Zafer and Eytan Modiano, “ Joint Scheduling of Rate-guaranteed and Best-effort Services over a Wireless Channel ,”  IEEE Conference on Decision and Control, Seville, Spain, December, 2005, pgs. 6022–6027.**

85.   Jun Sun and Eytan Modiano, “ Opportunistic Power Allocation for Fading Channels with Non-cooperative Users and Random Access ,”  IEEE BroadNets – Wireless Networking Symposium, Boston, MA, October, 2005, pgs. 397–405.**

84.   Li Wei Chen and Eytan Modiano, “ Uniform vs. Non-uniform Band Switching in WDM Networks ,”  IEEE BroadNets-Optical Networking Symposium, Boston, MA, October, 2005, pgs. 219– 228.**

83.   Sonia Jain and Eytan Modiano, “ Buffer Management Schemes for Enhanced TCP Performance over Satellite Links ,”  IEEE MILCOM, Atlantic City, NJ, October 2005 (8 pages; CD proceedings – page numbers not available).**

82.   Murtaza Zafer and Eytan Modiano, “ Continuous-time Optimal Rate Control for Delay Constrained Data Transmission ,”  Allerton Conference on Communications, Control and Computing, Allerton, IL, September, 2005 (10 pages; CD proceedings – page numbers not available).**

81.   Alessandro Tarello, Eytan Modiano, Jun Sun, Murtaza Zafer, “ Minimum Energy Transmission Scheduling subject to Deadline Constraints ,”  IEEE Wiopt, Trentino, Italy, April, 2005, pgs. 67–76. (Winner of best student paper award).**

80.   Amir Khandani, Eytan Modiano, Jinane Abounadi, Lizhong Zheng, “ Reliability and Route Diversity in Wireless Networks ,”  Conference on Information Science and System, Baltimore, MD, March, 2005, (8 pages; CD proceedings – page numbers not available).**

79.   Andrew Brzezinski, Iraj Saniee, Indra Widjaja, Eytan Modiano, “ Flow Control and Congestion Management for Distributed Scheduling of Burst Transmissions in Time-Domain Wavelength Interleaved Networks ,”  IEEE/OSA Optical Fiber Conference (OFC), Anaheim, CA, March, 2005, pgs. WC4-1–WC4-3.

78.   Andrew Brzezinski and Eytan Modiano, “ Dynamic Reconfiguration and Routing Algorithms for IP-over-WDM Networks with Stochastic Traffic ,”  IEEE Infocom 2005, Miami, FL, March, 2005, pgs. 6–11.**

77.   Murtaza Zafer and Eytan Modiano, “ A Calculus Approach to Minimum Energy Transmission Policies with Quality of Service Guarantees ,”  IEEE Infocom 2005, Miami, FL, March, 2005, pgs. 548–559.**

76.   Michael Neely and Eytan Modiano, “ Fairness and optimal stochastic control for heterogeneous networks ,”  IEEE Infocom 2005, Miami, FL, March, 2005, pgs. 1723 – 1734.**

75.   Aradhana Narula-Tam, Thomas G. Macdonald, Eytan Modiano, and Leslie Servi, “ A Dynamic Resource Allocation Strategy for Satellite Communications ,”  IEEE MILCOM, Monterey, CA, October, 2004, pgs. 1415 – 1421.

74.   Li-Wei Chen, Poompat Saengudomlert and Eytan Modiano, “ Optimal Waveband Switching in WDM Networks ,”  IEEE International Conference on Communication (ICC), Paris, France, June, 2004, pgs. 1604 – 1608.**

73.   Michael Neely and Eytan Modiano, “ Logarithmic Delay for NxN Packet Switches ,”  IEEE Workshop on High performance Switching and Routing (HPSR 2004), Phoenix, AZ, April, 2004, pgs. 3–9.**

72.   Li-Wei Chen and Eytan Modiano, “ Dynamic Routing and Wavelength Assignment with Optical Bypass using Ring Embeddings ,”  IEEE Workshop on High performance Switching and Routing (HPSR 2004), Phoenix, Az, April, 2004, pgs. 119–125.**

71.   Randall Berry and Eytan Modiano, “ On the Benefits of Tunability in Reducing Electronic Port Counts in WDM/TDM Networks ,”  IEEE Infocom, Hong Kong, March 2004, pgs. 1340–1351.

70.   Andrew Brzezinski and Eytan Modiano, “ A new look at dynamic traffic scheduling in WDM networks with transceiver tuning latency ,”  Informs Telecommunications Conference, Boca Raton, FL, March 2004, pgs. 25–26.**

69.   Chunmei Liu and Eytan Modiano, “ Packet Scheduling with Window Service Constraints ,”  Conference on Information Science and System, Princeton, NJ, March, 2004, pgs. 178–184.**

68.   Jun Sun, Eytan Modiano, and Lizhong Zheng, “ A Novel Auction Algorithm for Fair Allocation of a Wireless Fading Channel ,”  Conference on Information Science and System, Princeton, NJ, March, 2004, pgs. 1377–1383.**

67.   Murtaza Zafer and Eytan Modiano, “ Impact of Interference and Channel Assignment on Blocking Probability in Wireless Networks ,”  Conference on Information Science and System, Princeton, NJ, March, 2004, pgs. 430–436.**

66.   Chunmei Liu and Eytan Modiano, “ An Analysis of TCP over Random Access Satellite Links ,”  IEEE Wireless Communications and Networking Conference (WCNC), Atlanta, GA, February, 2004, pgs. 2033–2040..**

65.   Randall Berry and Eytan Modiano, “ Using tunable optical transceivers for reducing the number of ports in WDM/TDM Networks ,”  IEEE/OSA Optical Fiber Conference (OFC), Los Angeles, CA, February, 2004, pgs. 23–27.

64.   Aradhana Narula-Tam, Eytan Modiano and Andrew Brzezinski, “ Physical Topology Design for Survivable Routiing of Logical Rings in WDM-based Networks ,”  IEEE Globecom, San francisco, CA, December, 2003, pgs. 2552–2557.

63.   Jun Sun, Lizhong Zheng and Eytan Modiano, “ Wireless Channel Allocation Using an Auction Algorithm ,”  Allerton Conference on Communications, Control and Computing, October, 2003, pgs. 1114–1123..**

62.   Amir Khandani, Jinane Abounadi, Eytan Modiano, Lizhong Zhang, “ Cooperative Routing in Wireless Networks ,”  Allerton Conference on Communications, Control and Computing, October, 2003, pgs. 1270–1279.**

61.   Poompat Saengudomlert, Eytan Modiano and Robert Gallager, “ Dynamic Wavelength Assignment for WDM all optical Tree Networks ,”  Allerton Conference on Communications, Control and Computing, October, 2003, 915–924.**

60.   Aradhana Narula-Tam and Eytan Modiano, “ Designing Physical Topologies that Enable Survivable Routing of Logical Rings ,”  IEEE Workshop on Design of Reliable Communication Networks (DRCN), October, 2003, pgs. 379–386.

59.   Anand Srinivas and Eytan Modiano, “ Minimum Energy Disjoint Path Routing in Wireless Ad Hoc Networks ,”  ACM Mobicom, San Diego, Ca, September, 2003, pgs. 122–133.**

58.   Michael Neely and Eytan Modiano, “ Improving Delay in Ad-Hoc Mobile Networks Via Redundant Packet Transfers ,”  Conference on Information Science and System, Baltimore, MD, March, 2003 (6 pages; CD proceedings – page numbers not available).**

57.   Michael Neely, Eytan Modiano and Charles Rohrs, “ Dynamic Power Allocation and Routing for Time Varying Wireless Networks ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 745–755.**

56.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “ Optimal Energy Allocation for Delay-Constrained Data Transmission over a Time-Varying Channel ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 1095–1105.**

55.   Poompat Saengudomlert, Eytan Modiano and Rober Gallager, “ On-line Routing and Wavelength Assignment for Dynamic Traffic in WDM Ring and Torus Networks ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 1805–1815.**

54.   Li-Wei Chen and Eytan Modiano, “ Efficient Routing and Wavelength Assignment for Reconfigurable WDM Networks with Wavelength Converters ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 1785–1794. Selected as one of the best papers of Infocom 2003 for fast track publication in IEEE/ACM Transactions on Networking.**

53.   Mike Neely, Jun Sun and Eytan Modiano, “ Delay and Complexity Tradeoffs for Dynamic Routing and Power Allocation in a Wireless Network ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, October, 2002, pgs. 157 –159.**

52.   Anand Ganti, Eytan Modiano and John Tsitsiklis, “ Transmission Scheduling for Multi-Channel Satellite and Wireless Networks ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, October, 2002, pgs. 1318–1327.**

51.   Poompat Saengudomlert, Eytan Modiano, and Robert G. Gallager, “ Optimal Wavelength Assignment for Uniform All-to-All Traffic in WDM Tree Networks ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, October, 2002, pgs. 528–537.**

50.   Hungjen Wang, Eytan Modiano and Muriel Medard, “ Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information ,”  IEEE International Symposium on Computer Communications (ISCC), Taormina, Italy, July 2002, pgs. 719–725.**

49.   Jun Sun and Eytan Modiano, “ Capacity Provisioning and Failure Recovery in Mesh-Torus Networks with Application to Satellite Constellations ,”  IEEE International Symposium on Computer Communications (ISCC), Taormina, Italy, July 2002, pgs. 77–84.**

48.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “ Optimal Energy Allocation and Admission Control for Communications Satellites ,”  IEEE INFOCOM 2002, New York, June, 2002, pgs. 648–656.**

47.   Michael Neely, Eytan Modiano and Charles Rohrs, “ Power and Server Allocation in a Multi-Beam Satellite with Time Varying Channels ,”  IEEE INFOCOM 2002, New York, June, 2002, pgs. 1451–1460..**

46.   Mike Neely, Eytan Modiano and Charles Rohrs, “ Tradeoffs in Delay Guarantees and Computation Complexity for N x N Packet Switches ,”  Conference on Information Science and Systems, Princeton, NJ, March, 2002, pgs. 136–148.**

45.   Alvin Fu, Eytan Modiano and John Tsitsiklis, “ Transmission Scheduling Over a Fading Channel with Energy and Deadline Constraints ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 1018–1023.**

44.   Chunmei Liu and Eytan Modiano, “ On the Interaction of Layered Protocols: The Case of Window Flow Control and ARQ ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 118–124.**

43.   Mike Neely, Eytan Modiano and Charles Rohrs, “ Packet Routing over Parallel Time-varying Queues with Application to Satellite and Wireless Networks ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 360–366.**

42.   Ahluwalia Ashwinder, Eytan Modiano and Li Shu, “ On the Complexity and Distributed Construction of Energy Efficient Broadcast Trees in Static Ad Hoc Wireless Networks ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 807–813.**

41.   Jun Sun and Eytan Modiano, “ Capacity Provisioning and Failure Recovery for Satellite Constellations ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 1039–1045.**

40.   Eytan Modiano, Hungjen Wang, and Muriel Medard, “ Partial Path Protection for WDM networks ,”  Informs Telecommunications Conference, Boca Raton, FL, March 2002, pgs. 78–79.**

39.   Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager, “ An On-Line Routing and Wavelength Assignment Algorithm for Dynamic Traffic in a WDM Bidirectional Ring ,”  Joint Conference on Information Sciences (JCIS), Durham, North Carolina, March, 2002, pgs. 1331–1334.**

38.   Randy Berry and Eytan Modiano, “ Switching and Traffic Grooming in WDM Networks ,”  Joint Conference on Information Sciences (JCIS), Durham, North Carolina, March, 2002, pgs. 1340–1343.

37.   Eytan Modiano, Hungjen Wang, and Muriel Medard, “ Using Local Information for WDM Network Protection ,”  Joint Conference on Information Sciences (JCIS), Durham, North Carolina, March, 2002, pgs. 1398–1401.**

36.   Aradhana Narula-Tam and Eytan Modiano, “ Network architectures for supporting survivable WDM rings ,”  IEEE/OSA Optical Fiber Conference (OFC) 2002, Anaheim, CA, March, 2002, pgs. 105–107.

35.   Michael Neely, Eytan Modiano, Charles Rohrs, “ Packet Routing over Parallel Time-Varying Queues with Application to Satellite and Wireless Networks ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, September, 2001, pgs. 1110-1111.**

34.   Eytan Modiano and Randy Berry, “ The Role of Switching in Reducing Network Port Counts ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, September, 2001, pgs. 376-385.

33.   Eytan Modiano, “ Resource allocation and congestion control in next generation satellite networks ,”  IEEE Gigabit Networking Workshop (GBN 2001), Anchorage, AK, April 2001, (2 page summary-online proceedings).

32.   Eytan Modiano and Aradhana Narula-Tam, “ Survivable Routing of Logical Topologies in WDM Networks ,”  IEEE Infocom 2001, Anchorage, AK, April 2001, pgs. 348–357.

31.   Michael Neely and Eytan Modiano, “ Convexity and Optimal Load Distribution in Work Conserving */*/1 Queues ,”  IEEE Infocom 2001, Anchorage, AK, April 2001, pgs. 1055–1064.

30.   Eytan Modiano and Randy Berry, “ Using Grooming Cross- Connects to Reduce ADM Costs in Sonet/WDM Ring Networks ,”  IEEE/OSA Optical Fiber Conference (OFC) 2001, Anaheim, CA March 2001, pgs. WL1- WL3.

29.   Eytan Modiano and Aradhana Narula-Tam, “ Designing Survivable Networks Using Effective Rounting and Wavelenght Assignment (RWA) ,”  IEEE/OSA Optical Fiber Conference (OFC) 2001, Anaheim, CA March 2001, pgs. TUG5-1 – TUG5– 3.

28.   Roop Ganguly and Eytan Modiano, “ Distributed Algorithms and Architectures for Optical Flow Switching in WDM networks ,”  IEEE International Symposium on Computer Communications (ISCC 2000), Antibes, France, July 2000, pgs. 134–139.

27.   Aradhana Narula-Tam, Philip J. Lin and Eytan Modiano, “ Wavelength Requirements for Virtual topology Reconfiguration in WDM Ring Networks ,”  IEEE International Conference on Communications (ICC 2000), New Orleans, LA, June 2000, pgs. 1650–1654.

26.   Eytan Modiano, “Optical Flow Switching for the Next Generation Internet,”  IEEE Gigabit Networking Workshop (GBN 2000), Tel-aviv, March 2000 (2 page summary-online proceedings).

25.   Aradhana Narula and Eytan Modiano, “ Dynamic Reconfiguration in WDM Packet Networks with Wavelength Limitations ,”  IEEE/OSA Optical Fiber Conference (OFC) 2000, Baltimore, MD, March, 2000, pgs. 1210–1212.

24.   Brett Schein and Eytan Modiano, “ Quantifying the benefits of configurability in circuit-switched WDM ring networks ,”  IEEE Infocom 2000, Tel Aviv, Israel, April, 2000, pgs.1752–1760..***

23.   Aradhana Narula-Tam and Eytan Modiano, “ Load Balancing Algorithms for WDM-based IP networks ,”  IEEE Infocom 2000, Tel Aviv, Israel, April, 2000, pgs. 1010–1019.

22.   Nan Froberg, M. Kuznetsov, E. Modiano, et. al., “ The NGI ONRAMP test bed: Regional Access WDM technology for the Next Generation Internet ,”  IEEE LEOS ’99, October, 1999, pgs. 230–231.

21.   Randy Berry and Eytan Modiano, “ Minimizing Electronic Multiplexing Costs for Dynamic Traffic in Unidirectional SONET Ring Networks ,”  IEEE International Conference on Communications (ICC ’99), Vancouver, CA, June 1999, pgs. 1724–1730..***

20.   Brett Schein and Eytan Modiano, “Increasing Traffic Capacity in WDM Ring Networks via Topology Reconfiguration,”  Conference on Information Science and Systems, Baltimore, MD, March 1999, pgs. 201 – 206.

19.   Eytan Modiano and Richard Barry, “ Design and Analysis of an Asynchronous WDM Local Area Network Using a Master/Slave Scheduler ,”  IEEE Infocom ’99, New York, NY, March 1999, pgs. 900–907.

18.   Randy Berry and Eytan Modiano, “ Grooming Dynamic Traffic in Unidirectional SONET Ring Networks ,”  IEEE/OSA Optical Fiber Conference (OFC) ’99, San Diego, CA, February 1999, pgs. 71–73.

17.   Angela Chiu and Eytan Modiano, “ Reducing Electronic Multiplexing Costs in Unidirectional SONET/WDM Ring Networks Via Efficient Traffic Grooming ,”  IEEE Globecom ’98, Sydney, Australia, November 1998, pgs. 322–327.

16.   Eytan Modiano, “ Throughput Analysis of Unscheduled Multicast Transmissions in WDM Broadcast-and-Select Networks ,”  IEEE International Symposium on Information Theory, Boston, MA, September 1998, pg. 167.

15.   Eytan Modiano and Angela Chiu, “Traffic Grooming Algorithms for Minimizing Electronic Multiplexing Costs in Unidirectional SONET/WDM Ring Networks,”  Conference on Information Science and Systems, Princeton, NJ, March 1998, 653–658.

14.   Eytan Modiano and Eric Swanson, “ An Architecture for Broadband Internet Services over a WDM-based Optical Access Network ,”  IEEE Gigabit Networking Workshop (GBN ’98), San Francisco, CA, March 1998 (2 page summary-online proceedings).

13.   Eytan Modiano, “ Unscheduled Multicasts in WDM Broadcast-and-Select Networks ,”  IEEE Infocom ’98, San Francisco, CA, March 1998, pgs. 86–93.

12.   Eytan Modiano, Richard Barry and Eric Swanson, “ A Novel Architecture and Medium Access Control (MAC) protocol for WDM Networks ,”  IEEE/OSA Optical Fiber Conference (OFC) ’98, San Jose, CA, February 1998, pgs. 90–91.

11.   Eytan Modiano, “ Scheduling Algorithms for Message Transmission Over a Satellite Broadcast System ,”  IEEE MILCOM 97, Monterey, CA, November 1997, pgs. 628–634.

10.   Eytan Modiano, “ Scheduling Packet Transmissions in A Multi-hop Packet Switched Network Based on Message Length ,”  IEEE International Conference on Computer Communications and Networks (IC3N) Las Vegas, Nevada, September 1997, pgs. 350–357.

9.   Eytan Modiano, “A Simple Algorithm for Optimizing the Packet Size Used in ARQ Protocols Based on Retransmission History,”  Conference on Information Science and Systems, Baltimore, MD, March 1997, pgs. 672–677.

8.   Eytan Modiano, “ A Multi-Channel Random Access Protocol for the CDMA Channel ,”  IEEE PIMRC ’95, Toronto, Canada, September 1995, pgs. 799–803.

7.   Eytan Modiano Jeffrey Wieselthier and Anthony Ephremides, “ A Simple Derivation of Queueing Delay in a Tree Network of Discrete-Time Queues with Deterministic Service Times ,”  IEEE International Symposium on Information Theory, Trondheim, Norway, June 1994, pg. 372.

6.   Eytan Modiano, Jeffrey Wieselthier and Anthony Ephremides, “An Approach for the Analysis of Packet Delay in an Integrated Mobile Radio Network,”  Conference on Information Sciences and Systems, Baltimore, MD, March 1993, pgs. 138-139.

5.   Eytan Modiano and Anthony Ephremides, “ A Method for Delay Analysis of Interacting Queues in Multiple Access Systems ,”  IEEE INFOCOM 1993, San Francisco, CA, March 1993, pgs. 447 – 454.

4.   Eytan Modiano and Anthony Ephremides, “ A Model for the Approximation of Interacting Queues that Arise in Multiple Access Schemes ,”  IEEE International Symposium on Information Theory, San Antonio, TX, January 1993, pg. 324.

3.   Eytan Modiano and Anthony Ephremides, “ Efficient Routing Schemes for Multiple Broadcasts in a Mesh ,”  Conference on Information Sciences and Systems, Princeton, NJ, March 1992, pgs. 929 – 934.

2.   Eytan Modiano and Anthony Ephremides, “ On the Secrecy Complexity of Computing a Binary Function of Non-uniformly Distributed Random Variables ,”  IEEE International Symposium on Information Theory, Budapest, Hungary, June 1991, pg. 213.

1.   Eytan Modiano and Anthony Ephremides, “Communication Complexity of Secure Distributed Computation in the Presence of Noise,”  IEEE International Symposium on Information Theory, San Diego, CA, January 1990, pg. 142.

Book Chapters

  • Hyang-Won Lee, Kayi Lee, Eytan Modiano, “ Cross-Layer Survivability ” in Cross-Layer Design in Optical Networks, Springer, 2013.
  • Li-Wei Chen and Eytan Modiano, “ Geometric Capacity Provisioning for Wavelength-Switched WDM Networks ,” Chapter in Computer Communications and Networks Series: Algorithms for Next Generation Networks, Springer, 2010.
  • Amir Khandani, Eytan Modiano, Lizhong Zhang, Jinane Aboundi, “ Cooperative Routing in Wireless Networks ,” Chapter in Advances in Pervasive Computing and Networking, Kluwer Academic Publishers, 2005.
  • Jian-Qiang Hu and Eytan Modiano, “ Traffic Grooming in WDM Networks ,” Chapter in Emerging Optical Network Technologies, Kluwer Academic Publishers, to appear, 2004.
  • Eytan Modiano, “ WDM Optical Networks ,” Wiley Encyclopedia of Telecommunications (John Proakis, Editor), 2003.
  • Eytan Modiano, “ Optical Access Networks for the Next Generation Internet ,” in Optical WDM Networks: Principles and Practice, Kluwer Academic Prublishers, 2002.
  • Eytan Modiano, Richard Barry and Eric Swanson, “ A Novel Architecture and Medium Access Control protocol for WDM Networks ,” Trends in Optics and Photonics Series (TOPS) volume on Optical Networks and Their Applications, 1998.
  • Eytan Modiano and Kai-Yeung Siu, “Network Flow and Congestion Control,” Wiley Encyclopedia of Electrical and Electronics Engineering, 1999.

Technical Reports

  • Amir Khandani, Eytan Modiano, Jinane Abounadi, Lizhong Zheng, “Reliability and Route Diversity in Wireless Networks, ” MIT LIDS Technical Report number 2634, November, 2004.
  • Anand Srinivas and Eytan Modiano, “Minimum Energy Disjoint Path Routing in Wireless Ad Hoc Networks, ” MIT LIDS Technical Report, P-2559, March, 2003.
  • Eytan Modiano and Aradhana Narula-Tam, “Survivable lightpath routing: a new approach to the design of WDM-based networks, ” LIDS report 2552, October, 2002.
  • Michael Neely, Eytan Modiano and Charles Rohrs, “Packet Routing over Parallel Time-Varying Queues with Application to Satellite and Wireless Networks,” LIDS report 2520, September, 2001.
  • Jun Sun and Eytan Modiano, “Capacity Provisioning and Failure Recovery in Mesh-Torus Networks with Application to Satellite Constellations,” LIDS report 2518, September, 2001.
  • Hungjen Wang, Eytan Modiano and Muriel Medard, “Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information, ” LIDS report 2517, Sept. 2001.
  • Alvin Fu, Eytan Modiano, and John Tsitsiklis, “Optimal Energy Allocation and Admission Control for Communications Satellites, ” LIDS report 2516, September, 2001.
  • Michael Neely, Eytan Modiano and Charles Rohrs, “Power and Server Allocation in a Multi-Beam Satellite with Time Varying Channels, ” LIDS report 2515, September, 2001.
  • Eytan Modiano, “Scheduling Algorithms for Message Transmission Over the GBS Satellite Broadcast System, ” Lincoln Laboratory Technical Report Number TR-1035, June 1997.
  • Eytan Modiano, “Scheduling Packet Transmissions in A Multi-hop Packet Switched Network Based on Message Length, ” Lincoln Laboratory Technical Report number TR-1036, June, 1997.

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

  • Shop Early Amazon Prime Day Deals
  • I Tried Both: Ring vs Nest Doorbell

5 Computer Networking Trends for 2024 and Beyond

AI will continue to dominate the headlines

  • Massachusetts Institute of Technology
  • University of Illinois
  • The Wireless Connection
  • Routers & Firewalls
  • Network Hubs
  • Installing & Upgrading
  • Wi-Fi & Wireless

Computer network technology continues to develop in new and interesting ways. Here are five of the most important areas and trends to watch in the year ahead.

AI Will Continue to Expand

The ability of computer systems like Deep Blue to play chess at world champion levels helped legitimize artificial intelligence (AI) decades ago. Since then, both computer processing speed and the ability to exploit it have advanced tremendously.

One key barrier to more general-purpose artificial intelligence has been limitations on the ability of AI systems to communicate and interact with the outside world. With the much faster wireless speeds available today, it's possible to add sensors and network interfaces to AI systems that will enable impressive new applications.

Watch for applications in the healthcare and manufacturing industries. Also, look for new ways to establish AI trustworthiness and security.

IoT Gadgets Will Become Commonplace

 Busakorn Pongparnit/Getty Images

In 2024, an array of internet-connected products will compete for your attention. The Internet of Things (IoT) is another name for these "wired" items, and some categories will be especially interesting to watch:

  • Wearables. You will likely see operational improvements, including processing speed and battery life. Watches will continue to focus on health and fitness tracking.
  • Smart kitchens.  Keep an eye out for things like temperature-controlled smart mugs, microwaves you can command with your voice, blenders that know the exact amount of ingredients to add, and improved food recognition in your connected fridge.
  • Smarter light bulbs . Be on the lookout for Wi-Fi or Bluetooth -enabled lighting systems and expect additional improvements in bulb quality, programming options, and ease of integration.
  • Public applications. Besides home equipment, IoT functionality will appear more in stores, restaurants, and municipal locations.

Along with these innovations, expect accompanying security concerns. Many fear the privacy risks accompanying IoT devices, given their access to users' homes, activities, and personal data.

We'll See Even More Hype Over 5G

Even while 4G LTE mobile networks don’t reach many parts of the world (and won’t for years), the telecommunications industry has been hard at work developing the next-generation, 5G cellular communication technology.

5G is set to boost the speeds of mobile connections dramatically. But, exactly how fast consumers should expect these connections to go and when they can buy 5G devices might not be known until industry technical standards are set.  

However, like when 4G was initially being developed, companies aren’t waiting to advertise their 5G efforts. Researchers will continue to test prototype versions of what might become part of standard 5G networks. While reports from these tests will tout maximum data rates of many gigabits per second ( Gbps ), consumers should be just as interested in the promise of improved signal coverage with 5G.

Some vendors will undoubtedly start to retrofit this tech into their 4G installations, so look for “4.5G” and “pre-5G” products (and the confusing marketing claims that go along with these vaguely defined labels) to appear on the scene soon.

IPv6 Rollout Will Continue to Accelerate

Internet Protocol Version 6 (IPv6) will one day replace the traditional Internet Protocol addressing system we are familiar with, IPv4. The Google IPv6 Adoption page illustrates roughly how quickly the deployment of IPv6 is progressing. As shown, the pace of IPv6 rollout has continued to accelerate since 2013 but will require many more years to reach a complete replacement of IPv4. In 2024, expect to see IPv6 mentioned more often in the news, especially about business computer networks.

IPv6 benefits everyone either directly or indirectly. With an expanded number of available IP address space to accommodate almost unlimited devices, internet providers will find it easier to manage subscriber accounts. IPv6 also adds other improvements that boost the efficiency and security of TCP/IP traffic management on the internet. Those who administer home networks must learn a new style of IP address notation.

SD-WAN Will Become the Norm

ID 36177459 © Wilm Ihlenfeld | Dreamstime.com 

A software-defined wide-area network (SD-WAN) is a networking technology that offers greater flexibility for companies than previous WAN systems. While a traditional WAN enables businesses with multiple locations to give employees access to data, files, and applications at the home office via multiprotocol label switching (MPLS), SD-WAN takes that process a step further, using Long Term Evolution (LTE) and broadband internet services to provide access. SD-WAN adds cloud-based applications, allowing employees to gain remote entry to enterprise-wide programs like Salesforce, Amazon Web Services, and Microsoft 365.

The technology is still relatively new, so customers and providers have been experimenting to understand how best to use this innovation to increase productivity, enhance business agility, and improve security. But now that it's been available for a few years, SD-WAN will likely become the new norm.

Get the Latest Tech News Delivered Every Day

  • The 3 Most Important Tech Trends to Watch in 2024
  • CES 2025: Dates, News, Announcements, Rumors, and Everything Else to Know
  • IPv4 vs. IPv6: What's the Difference?
  • tvOS 18: Price (Free), Release Date, Features, and News
  • M4 MacBook Pro: News and Expected Price, Release Date, Specs; and More Rumors
  • Predicting the Future of Computer Networks and the Internet
  • What Happened to IPv5?
  • 6G: What It Is & When to Expect It
  • What Is Artificial Intelligence (AI)?
  • Where Is 5G Available in South Korea? (Updated for 2024)
  • 10 Positive Impacts of Artificial Intelligence
  • Where Is 5G Available in Canada? (Updated for 2024)
  • Apple Worldwide Developer Conference (WWDC) 2025: Announcements, News, and More
  • The Best Free and Public DNS Servers (2024)
  • Where Is 5G Available in the UK? (Updated for 2024)
  • What Is an IP Address?

5 Top Networking Trends (2024 & 2025)

new research topics in networking

You may also like:

  • New Social Media Networks
  • Emerging Event Industry Trends
  • Important Social Media Trends

The performance of network infrastructure is constantly being pushed to the limit as businesses look for new ways to boost capacity and speed.

Businesses want high-performing networks that are agile and scalable. But today’s IT decision-makers face a combination of uncertainty and new possibilities associated with emerging technology.

Read this list of trends to learn more about the top networking trends impacting IT leaders.

1. Security and Budget Concerns Drive Adoption of NaaS

IT departments are continually looking for agility, resiliency, and the ability to quickly adapt to new technologies. For many organizations, cost, and scalability stand in the way of these goals.

That’s where networking-as-a-service (NaaS) comes into play.

undefined

This consumption-based model allows organizations to deploy network capabilities as an ongoing operational expense instead of facing a large upfront cost.

NaaS offers employees the ability to access necessary applications wherever they are working — at home, in the office, or on any device.

The NaaS market is predicted to hit $78.38 billion by 2028. That’s a CAGR of more than 32.36%.

Much of that growth will come from businesses that are prepared to act quickly on network transformation.

According to IDC, 49% of IT leaders are planning or considering a NaaS transformation for their organization.

Nearly 70% of them are planning to invest in the switch in the next 12 months.

This solution is especially appealing to organizations that face ongoing security concerns.

NTT’s 2022–23 Global Network Report shows that 89% of IT leaders are concerned about running complex networks while staying compliant with security issues.

NaaS is the way many IT executives are addressing this issue. NTT reports that 88% of IT leaders say they would like to outsource their end-to-end network to a single partner.

2022-23 Global Network Report infogra...

Another main draw of NaaS is hands-off lifecycle management.

With NaaS, internal IT departments no longer need to spend time deploying, controlling, updating, or repairing the network infrastructure.

In fact, in a 2022 survey, 48% of respondents ranked lifecycle management as the top feature of NaaS providers.

NaaS-Services-Ranked-min.png

2. Next-Gen Wi-Fi Is Here

Wi-Fi technology is developing at a rapid pace.

In 2020, the world was first introduced to Wi-Fi 6.

undefined

By 2025, the WiFi Alliance predicts the total economic value of Wi-Fi 6 in the United States will be nearly $1.6 trillion .

full-potential-of-6-ghz-min.webp

One of the main benefits of this new generation of Wi-Fi is increased speed.

While Wi-Fi 5 offers 3.5 Gbps of maximum throughput, Wi-Fi 6 offers 9.6 Gbps .

Wi-Fi 6 is also able to prioritize traffic and communicate better with multiple devices.

In addition, Wi-Fi 6 offers improved battery life on devices because of a feature called Target Wake Time .

This technology allows devices to go to sleep at times when data transmission isn’t occurring.

These are all key points for organizations that are launching new business initiatives involving IoT devices, smart building capabilities, and customer-focused apps.

Businesses can also utilize Wi-Fi 6 for 4k/8k video and AR/VR capabilities.

The same benefits hold true for homeowners with multiple users running several smart devices.

Right on the heels of Wi-Fi 6 is Wi-Fi 6E .

This refers to devices that are operating in the 6 GHz band. Previously there have been only two bands: 2.4 GHz and 5GHz.

It provides even more capacity and speed with lower latency when compared to Wi-Fi 6.

While Wi-Fi 6 hardware has become fairly common and reasonably priced, Wi-Fi 6E devices aren’t widely available yet and they’re expensive.

For example, the iPhone 14 series doesn’t offer Wi-Fi 6E.

In December 2022, Google announced its first Wi-Fi 6E compatible router, Nest Wifi Pro , that’s priced at $200.

nest_wifi_pro-min.webp

IT industry experts are even beginning to talk about Wi-Fi 7 (IEEE 802.11be).

Speeds could reach 40 Gbps on Wi-Fi 7 — that’s four times faster than Wi-Fi 6.

Wi-Fi 7 routers are now available as of early 2024 .

One sector in which next-gen Wi-Fi is critical is the healthcare industry.

In large hospitals, there can be up to 15 connected medical devices per patient and more than 350,000 internet-connected devices.

Wi-Fi 6E and 7 could mean increased usage of software-as-a-medical-device, AR training of medical personnel, and improved telemedicine capabilities.

wifi-for-healthcare-min.webp

3. SD-WAN Provides Improved Integration and Lower Costs

According to TeleGeography, the WAN market will hit $85 billion among the world’s 5,000 largest companies in 2026. That’s an increase of 44% over 2021.

Traditional WAN uses multiprotocol label switching (MPLS) to make data and applications available among distributed sites.

However, this approach doesn’t work well in today’s cloud-centric IT world.

Both security and user experience are compromised by large amounts of traffic.

But SD-WAN (software-defined wide area networking) utilizes long-term evolution and broadband internet to provide access.

undefined

This solution lowers operational costs by up to 40% and improves efficiency while ensuring security.

Installation and deployment are also much simpler than traditional WAN.

sd-wan-adoption-min.webp

IDC researched the bottom-line impact of SD-WAN and found that organizations saw a 402% ROI over five years as well as 39% lower total cost of operations and 38% more efficient network management.

In another example, Forrester studied the total economic impact of Prisma SD-WAN and found an ROI of 243% and a 99% reduction in network trouble tickets.

sd-wan-customer-results-min.webp

The TeleGeography report predicts the share of revenue driven by MPLS will decrease by 55% over the next five years.

Meanwhile, the adoption of SD-WAN is growing.

The market expanded 35% in 2021 alone to reach record revenue of more than $2 billion.

In the second half of 2021, 36% of enterprises said they were in the process of deploying SD-WAN or had already done so.

4. Increasing Security Threats from IoT

Globally, the number of IoT devices is expected to nearly triple by 2030.

number-of-iot-connected-devices-min.webp

At that time, estimates show there will be more than 29 billion IoT devices.

Approximately 60% of IoT devices are owned by consumers.

On the other hand, industries like electricity, waste management, transportation, and gas currently have more than 100 million IoT devices each.

As the reliance on IoT devices grows, so do the security threats.

IoT devices are difficult to secure for several reasons.

addressing-iot-security-min.webp

The variety and scale of the devices make integrating them into security systems a serious challenge.

They generate an incredible amount of data and utilize open-source code, which is vulnerable to attack.

One study showed that nearly 100% of traffic on these devices is unencrypted and more than half of the devices are vulnerable to medium- or high-level attacks.

Once an IoT device has been hacked, it can take less than six minutes to launch a full-scale attack.

Cameras are one of the most vulnerable types of IoT devices.

In one example from 2021, hackers gained access to sensitive data from security system provider Verkada and were able to access live and archived camera feeds inside hospitals, police departments, schools, Tesla factories, and other locations.

More than 150,000 IoT security cameras were compromised.

hackers-breach-cameras-min.webp

In addition, the healthcare industry is especially vulnerable to IoT-mediated attacks because of the extensive use of connected medical devices.

A recent survey found that medical organizations with more than 70% of their devices connected were 24% more likely to experience a security breach than those that had 50% or fewer connected devices.

The survey also reported that 57% of healthcare IT staff do not always change the default username/password on IoT devices, and 68% don’t always update the devices when a patch is available.

Claroty is one of the leading IoT security firms of 2024.

undefined

Their expertise lies in protecting industrial and healthcare networks.

Company statistics show their platform is in use at more than 2,000 medical facilities and 8,000 industrial sites worldwide.

industrial-cybersecurity-min.webp

In late 2021 they closed a $400 million series E funding round and acquired a healthcare IoT security startup.

The company has posted revenue growth of 1,139% over the past three years.

5. Industry Cloud Platforms Grow In Popularity

Industry cloud platforms are those that bring together various cloud services in a way that’s designed to fit the needs of specified industries.

undefined

These are targeted solutions that provide composable building blocks like cloud services, applications, tools, and other offerings.

Because the solution is tailored to a certain vertical, organizations are able to focus on which tech capabilities matter most to their business.

This enables agility and reduced time to market for new business initiatives.

Businesses that have been operating on legacy solutions find industry clouds particularly appealing because migrating to traditional cloud services can be time-consuming and expensive.

The modular approach of the industry cloud is an easier transition that can more closely replicate their longstanding systems.

Deloitte estimates that there’s a $640 billion potential market for industry clouds.

DI_CIR-Industry-transformation-min.webp

Gartner reports that close to 40% of enterprises based in North America and Europe have started adopting an industry cloud and an additional 15% are currently in pilot programs. A final 15% are considering development by 2026.

They estimate that 50% of enterprises will be using industry clouds by 2027.

Industry cloud platforms are especially valuable for highly regulated industries like those in the financial sector.

For example, Goldman Sachs recently partnered with Amazon Web Services to launch a cloud-based solution for financial data and analytics .

In another example, ABB, Bosch, Honeywell, and other manufacturing leaders have partnered with Microsoft to create Microsoft Cloud for Manufacturing . It’s currently only available for preview.

microsoft-cloud-for-manufacturing-min...

In total, Microsoft offers five industry clouds.

In 2022, Cropin launched the first-ever industry cloud platform for agriculture enterprises.

cropin-min.webp

It’s designed to be utilized by a variety of industry players like farming companies, food processing companies, seed companies, fertilizer manufacturers, and others.

So far, the company has raised more than $46 million in funding with backing from investors like the Bill and Melinda Gates Foundation and CDC Group.

The company was also named to the list of 2022 Regional and Global AWS Partners of the Year .

That wraps up our list of the top networking trends impacting IT leaders and businesses in the next few years.

Companies that are already adapting to these changes are seeing business impacts related to cost-savings, innovation, and speed. With solutions tailored specifically to their industry, these organizations are able to utilize networking technology to its fullest potential.

Still, IT leaders have yet to get a handle on the critical security and complexity concerns regarding networks. These issues are set to see critical innovation in the years to come.

Find Thousands of Trending Topics With Our Platform

newsletter banner

Home

Rare Research Report: June 2024

Each month, we share summaries of recent Rare Diseases Clinical Research Network (RDCRN) grant-funded publications. Catch up on the latest RDCRN research below.

Brain Vascular Malformation Consortium (BVMC)

Genetic disorders of mucociliary clearance consortium (gdmcc), global leukodystrophy initiative clinical trials network (glia-ctn), urea cycle disorders consortium (ucdc).

Listen to these summaries on the Rare Research Report podcast .

Investigating the Formation of New Brain Vascular Malformations in Patients with Hereditary Hemorrhagic Telangiectasia

Hereditary hemorrhagic telangiectasia (HHT) is an inherited disorder of the blood vessels that can cause excessive bleeding. About 10% of individuals with HHT have brain vascular malformations, which occur when the blood vessels in the brain develop abnormally. Children with HHT are screened for brain vascular malformations upon initial diagnosis, and many North American centers rescreen children for brain vascular malformations at interval throughout childhood. However, not much is known about whether people with HHT can develop new brain vascular malformations over time.

In this study, researchers investigated the formation of new brain vascular malformations in patients with HHT. The team analyzed data from 1,909 patients enrolled in the Brain Vascular Malformation Consortium natural history study, searching for brain vascular malformations that were new since previous imaging was performed.

Results showed that 409 patients had brain vascular malformations, with three showing new malformations confirmed by neuroimaging review. These findings demonstrate that patients with HHT can form new brain vascular malformations over time, though this is probably a rare occurrence. Authors note that more information about the frequency of new brain vascular malformation formation is needed.

Beslow LA, Krings T, Kim H, Hetts SW, Lawton MT, Ratjen F, Whitehead KJ, Gossage JR, McCulloch CE, Clancy M, Bagheri N, Faughnan ME; Brain Vascular Malformation Consortium HHT Investigator Group. De Novo Brain Vascular Malformations in Hereditary Hemorrhagic Telangiectasia. Pediatr Neurol. 2024 Jun;155:120-125. doi: 10.1016/j.pediatrneurol.2024.03.013. Epub 2024 Mar 22. PMID: 38631080; PMCID: PMC11102835.

Investigating Clinical Outcomes of Children with Primary Ciliary Dyskinesia and Situs Ambiguus

Primary ciliary dyskinesia (PCD) is a genetic disorder in which mucociliary clearance of the lungs is impaired. While most individuals with PCD have normal arrangement of organs in the abdomen and chest (situs solitus), some present with situs ambiguus (abnormal arrangement) or situs inversus totalis (mirror image of normal arrangement).

In this study, researchers compared the clinical outcomes of children with PCD and situs ambiguus to those with situs solitus or situs inversus totalis. The team categorized 397 participants with PCD aged 21 years or younger into situs groups, then evaluated markers of disease severity.

Results show that children with PCD and situs ambiguus have worse nutritional and pulmonary outcomes with more hospitalizations for acute respiratory illnesses than those with situs solitus or situs inversus totalis combined. Authors also note that these outcomes are associated with cardiovascular malformations requiring cardiac surgery, splenic anomalies, or both.

Kaspy KR, Dell SD, Davis SD, Ferkol TW, Rosenfeld M, Sagel SD, Milla C, Olivier KN, Barber AT, Wee W, Lin FC, Li L, Rampakakis E, Zariwala MA, Knowles MR, Leigh MW, Shapiro AJ. Situs Ambiguus Is Associated With Adverse Clinical Outcomes in Children With Primary Ciliary Dyskinesia. Chest. 2024 May;165(5):1070-1081. doi: 10.1016/j.chest.2023.12.005. Epub 2023 Dec 9. PMID: 38072392.

Describing Patients with  TBL1XR1 -Related Disorder Using a Caregiver Survey

TBL1XR1 -related disorder is a group of neurodevelopmental disorders caused by variants in the  TBL1XR1  gene. As these disorders are rare with a wide range of characteristics, not much is known about the developmental trajectory and progression of neurological symptoms over time.

In this study, researchers describe the largest group of patients to date with  TBL1XR1 -related disorder. The team surveyed caregivers of 41 patients with  TBL1XR1 -related disorder, focusing on the pregnancy and perinatal course, caregiver-reported developmental trajectory, associated symptoms and diagnoses, neurological progression over time, and genetic information.

Results reflect the spectrum of diverse traits in  TBL1XR1 -related disorder, including developmental delay and regression ranging in severity. Seizures were common, which could be related to language regression. Authors note that further study is needed to determine whether functional differences caused by different variants in the  TBL1XR1  gene explain the range of characteristics in this disorder.

Nagy A, Molay F, Hargadon S, Brito Pires C, Grant N, De La Rosa Abreu L, Chen JY, D'Souza P, Macnamara E, Tifft C, Becker C, Melo De Gusmao C, Khurana V, Neumeyer AM, Eichler FS. The spectrum of neurological presentation in individuals affected by TBL1XR1 gene defects. Orphanet J Rare Dis. 2024 Feb 20;19(1):79. doi: 10.1186/s13023-024-03083-3. PMID: 38378692; PMCID: PMC10880200.

Sharing a New Approach to Creating Longitudinal Natural History Studies for Rare Diseases 

In rare diseases, natural history studies are essential to understanding disease progression over time. Prospective studies are limited by fewer available patients at a given time, impacting the timely collection of natural history data. These studies are also unlikely to capture pre-diagnostic clinical trajectories in conditions where diagnostic delays are common. 

In this study, researchers shared a new approach to creating real-world data-based longitudinal natural history studies for rare diseases. The team outlined various strategies developed by the Global Leukodystrophy Initiative Clinical Trials Network. Strategies include use of standard operating procedures and rigorous processes for staff training, data extraction, source documentation, and data management.

Authors note that these strategies will complement prospective studies by enabling the use of existing medical records to collect natural history data on large numbers of patients in a short time and map complete disease trajectory, including the time period before diagnosis.

Adang LA, Sevagamoorthy A, Sherbini O, Fraser JL, Bonkowsky JL, Gavazzi F, D'Aiello R, Modesti NB, Yu E, Mutua S, Kotes E, Shults J, Vincent A, Emrick LT, Keller S, Van Haren KP, Woidill S, Barcelos I, Pizzino A, Schmidt JL, Eichler F, Fatemi A, Vanderver A. Longitudinal natural history studies based on real-world data in rare diseases: Opportunity and a novel approach. Mol Genet Metab. 2024 May;142(1):108453. doi: 10.1016/j.ymgme.2024.108453. Epub 2024 Mar 18. PMID: 38522179.

Exploring Risk Factors in Asymptomatic Females with Ornithine Transcarbamylase Deficiency

Ornithine transcarbamylase deficiency (OTCD) is a type of urea cycle disorder characterized by hyperammonemia (high blood ammonia levels) due to deficiency or absence of an enzyme needed to convert nitrogen from protein into urea (a waste product). Because OTCD is caused by an X-linked mutation in the OTC gene, the majority of patients with severe presentation of OTC deficiency are male, as they have only one X chromosome. Although 80% of females with OTCD are typically thought to remain asymptomatic, not much is known about their clinical characteristics and long-term health vulnerabilities. 

In this study, researchers explored the factors that might predict development of defined complications and serious illness in apparent asymptomatic females with OTCD. The team reviewed data from 302 females enrolled in the Urea Cycle Disorders Consortium (UCDC) longitudinal natural history study. Researchers also performed several types of neuroimaging studies in a female patient with OTCD.

Results show that these patients can experience neuropsychiatric and behavioral symptoms as well as an increased risk of hyperammonemia later in life, demonstrating that asymptomatic females with OTCD are not always asymptomatic. Authors note that these findings can aid in the development of a risk calculator and improve guidelines for management of these patients, paving the way for potential new therapies.

Sen K, Izem R, Long Y, Jiang J, Konczal LL, McCarter RJ; Members of the Urea Cycle Disorders Consortium (UCDC); Gropman AL, Bedoyan JK. Are asymptomatic carriers of OTC deficiency always asymptomatic? A multicentric retrospective study of risk using the UCDC longitudinal study database. Mol Genet Genomic Med. 2024 Apr;12(4):e2443. doi: 10.1002/mgg3.2443. PMID: 38634223; PMCID: PMC11024633.

The Rare Diseases Clinical Research Network (RDCRN) is funded by the National Institutes of Health (NIH) and led by the National Center for Advancing Translational Sciences (NCATS) through its Division of Rare Diseases Research Innovation (DRDRI). Now in its fourth five-year funding cycle, RDCRN is a partnership with funding and programmatic support provided by Institutes, Centers, and Offices across NIH, including the National Institute of Neurological Disorders and Stroke, the National Institute of Allergy and Infectious Diseases, the National Institute of Diabetes and Digestive and Kidney Diseases, the Eunice Kennedy Shriver National Institute of Child Health and Human Development, the National Institute of Arthritis and Musculoskeletal and Skin Diseases, the National Heart, Lung, and Blood Institute, the National Institute of Dental and Craniofacial Research, the National Institute of Mental Health, and the Office of Dietary Supplements.

View News by Topic

  • Research News
  • Inside the Research
  • Patient Stories
  • Scientist Spotlight
  • Early Stage Investigators
  • Patient Advocacy
  • COVID Updates

Recent Articles


Wednesday, June 26, 2024

Wednesday, May 29, 2024

Tuesday, May 28, 2024

Thursday, April 25, 2024

Wednesday, April 24, 2024

Facebook

Related News

Dystonia over time: what we’re learning from a natural history study.

Dystonia Over Time: What We're Learning from a Natural History Study

Rare Research Report: May 2024

Rare Research Report logo

Phenylketonuria Over Time: What We’re Learning from a Natural History Study

Phenylketonuria Over Time: What We’re Learning from a Natural History Study

NASA Logo

NASA SCoPE Connects Early Career Scientists and STEM Outreach Professionals

On May 21st, 2024, NASA SCoPE (NASA SMD Community of Practice for Engagement) held its first Virtual Networking event for 2024 in direct response to community feedback from annual surveys requesting more networking opportunities. This event series aims to connect early career scientists, engineers, and NASA Science Activation teams, providing a platform for networking and mutual learning on science communications topics. The event brought together 21 NASA science content experts from across the United States, all eager to learn more about balancing their research and educational outreach to make a meaningful impact.

During this event, NASA SCoPE hosted a panel featuring six Science, Technology, Engineering, and Mathematics (STEM) professionals from various NASA Science Activation Teams who shared their best practices for balancing scientific research with educational outreach. The panelists included:

Ariel Anbar: President's Professor, Geochemist, Infiniscope Principal Investigator (PI), and Director of the Center for Education through Exploration at Arizona State University

Matthew Cass: Physics & Astronomy Professor at Southwestern Community College, Rural Education Advocate, Smoky Mountain STEM Collaborative PI

Lin Chambers: American Association for the Advancement of Science (AAAS) Fellow, Aerospace Engineer, and Deputy Director of NASA Science Activation

Emma Marcucci: Astrobiologist and Geophysicist, Co-Investigator for NASA’s Universe of Learning, and Science Communications and Engagement Branch Manager at the Space Telescope Science Institute

Juan Torres-Pérez: Research Scientist at NASA Ames, Biological & Geological Oceanographer, OCEANOS (Ocean Community Engagement and Awareness using NASA Earth Observations and Science for Hispanic/Latino Students) PI

Patricia Udomprasert: Astronomer, Cosmic Data Stories Science PI, and Research Associate at the Center for Astrophysics | Harvard & Smithsonian

Attendees praised the event, with one participant noting, "The personal experiences were valuable to hear about from each panel member. Careers in this space can take so many trajectories and be hard to find at the same time, so learning about the pathways others took and the navigational details that matter along the way was really valuable."

Another attendee highlighted the importance of supportive environments, saying, "Finding environments that value outreach is important - I have had an advisor who thought of outreach as only a distraction and I didn't realize that wasn't necessarily typical."

There are two remaining Virtual Networking opportunities for 2024, scheduled for August 20th with a STEM BIPOC Panel and November 5th for SciComm Best Practices. If you identify as a NASA science researcher or a Science Activation team, we encourage you to register here for upcoming workshops:

August 20th Topic: This session you'll hear from our panelists of BIPOC (Black, Indigenous, and People of Color) professionals. They’ll be sharing their challenges, successes and ways that you can impact your community.

November 5th Topic: We’ll be sharing our top 3 SciComm best practices that we’ve learned along the way and how to implement them in your own outreach efforts. You’ll also have the chance to practice your new skills!.

Register: https://asu.zoom.us/meeting/register/tZAuc-yvrzwuGNCzCVmKGiVrxRs7jB1B_jV5

NASA SCoPE is supported by NASA under cooperative agreement award number 80NSSC21M0006 and is part of NASA’s Science Activation Portfolio. Learn more about how Science Activation connects NASA science experts, real content, and experiences with community leaders to do science in ways that activate minds and promote deeper understanding of our world and beyond: https://science.nasa.gov/learn

An image of a computer monitor displaying a virtual networking opportunity panel with six participants. The screen is divided into six sections, each showing a headshot of a different individual. The names of the participants are labeled under their images: Ariel Anbar, Matthew Cass, Lin Chambers, Emma Marcucci, Juan Torres-Pérez, and Patricia Udomprasert.

Related Terms

  • Science Activation

Explore More

Four students and their teacher smiling, holding their research poster titled "Does Car Idling in rural New Jersey affect air quality?" The students have medals.

Teachers Bring Student Teams to GLOBE Research Symposia

Collage of awardees starting upper left and ending lower right: April Russell, Valeria Jaramillo, Margo Thornton, David James, Allison Cusick, David Coria, Joshua Bardwell, Dr. Celia Blanco.

NASA SCoPE Funds Early Career Scientists for NASA Educational Outreach

A group of four people, sitting around the exhibit hall table, engaging in a shrinky dink craft. The table is covered with a blue cloth and various materials including pens, badges, and small tools. Behind them are exhibit booths labeled "Meteor Mayhem" and "Infiniscope," with additional conference attendees visible in the background.

NASA SCoPE Engages and Empowers at AbSciCon 2024 with Gaming Activities and Childcare Support

Discover more topics from nasa.

James Webb Space Telescope

The image is divided horizontally by an undulating line between a cloudscape forming a nebula along the bottom portion and a comparatively clear upper portion. Speckled across both portions is a starfield, showing innumerable stars of many sizes. The smallest of these are small, distant, and faint points of light. The largest of these appear larger, closer, brighter, and more fully resolved with 8-point diffraction spikes. The upper portion of the image is blueish, and has wispy translucent cloud-like streaks rising from the nebula below. The orangish cloudy formation in the bottom half varies in density and ranges from translucent to opaque. The stars vary in color, the majority of which have a blue or orange hue. The cloud-like structure of the nebula contains ridges, peaks, and valleys – an appearance very similar to a mountain range. Three long diffraction spikes from the top right edge of the image suggest the presence of a large star just out of view.

Perseverance Rover

new research topics in networking

Parker Solar Probe

new research topics in networking

A Nature Research Service

martin-dm

  • On-demand Courses
  • Work with others

Networking for Researchers

For researchers in the natural sciences who want to gain confidence by improving their networking skills or mentor others through the process

10 experts in networking, including researchers, experienced academic networkers, fellows, networking consultants and communications specialists

8 hours of learning

15-minute bite-sized lessons

4-module course with certificate

About this course

‘Networking for Researchers’ covers the key elements needed to acquire or perfect effective professional networking skills for scientific researchers. In this course you will discover how building a professional network will benefit your research and career, and learn the skills to build and maintain networking connections in a variety of settings, both in-person and online.

What you’ll learn

  • The theory behind and the importance of networking, and how to use your research and career goals to guide you to find appropriate networking opportunities 
  • How to research and prepare key resources to help you build an effective network 
  • Strategies to approach and connect with potential contacts, and how to follow up – both in person and online
  • Strategies for nurturing your networking contacts, and how to leverage them to advance your research and career

Free Sample Why network?

5 lessons 2h

Free Sample Getting ready to network

6 lessons 2h

Free Sample Connect with new networking contacts - in person and online

7 lessons 2h 30m

Free Sample Nurturing and harnessing the power of your network

5 lessons 1h 30m

Free Sample Networking for Researchers: Free sample

No subscription yet? Try this free sample to preview lessons from the course

3 lessons 30m

Start this module

Developed with expert academics and professionals

This course has been created with an international team of experts with a wide range of experience in networking, including:

  • Setting career goals
  • Evaluating current networks
  • Identifying networking opportunities and researching potential contacts
  • Studying social networks
  • Leveraging networks to advance your research and career

Sarah Blackford

Independent Career Consultant and Honorary Teaching Fellow, Lancaster University

Ben Johnson

Head of Communities & Engagement and Magazine Editor, Nature Medicine

Tanya Menon

Professor of Management & Human Resources, Fisher School of Business, Ohio State University

David Payne

Managing Editor, Careers & Supplements, Springer Nature

Despina Sanoudou

Associate Professor, National & Kapodistrian University of Athens

Advice from experienced presenters

The course also has additional insights through interviews from:

Paige Brown Jarreau

VP of Science Communication, LifeOmic and Co-founder of Lifeology.io

Emma Chapman

Lecturer, University of Nottingham

Head, Laboratory of Tumor Biology and Chair, Department of Pathology, Sackler Faculty of Medicine, Tel Aviv University, Israel

Edmond Sanganyado

Associate Professor, Shantou University and President, Zimbabwe Young Academy of Sciences

Lucy A. Taylor

Junior Research Fellow, Christ Church College and Department of Zoology, University of Oxford

Discover related courses

Getting an academic research position.

Prepare yourself to take your next career step, into either a postdoc or faculty role

Participating in a Collaboration

Build your skills to make a more meaningful contribution to your collaborative projects

Access options

For researchers.

  • Register and complete our free course offering , or try a free sample of any of our paid-for courses
  • Recommend our courses to your institution, so that we can contact them to discuss becoming a subscriber

For institutions, departments and labs

Find out which of our subscription plans best suits your needs See our subscription plans

Does my institution provide full course access?

When registering, you’ll be asked to select your institution first. If your institution is listed, it has subscribed and provides full access to our on-demand courses catalogue.

My institution isn’t listed!

Select „other“ and register with an individual account. This allows you to access all our free sample course modules, and our entirely free course on peer review. You might also want to recommend our courses to your institution.

I am in charge of purchasing training materials for our lab / department / institution. Buy a subscription

Start this course

Full course access via institutional subscription only. More info

Institutions, departments and labs: Give your research full access to our entire course catalogue

Image Credits

  • Alzheimer's disease & dementia
  • Arthritis & Rheumatism
  • Attention deficit disorders
  • Autism spectrum disorders
  • Biomedical technology
  • Diseases, Conditions, Syndromes
  • Endocrinology & Metabolism
  • Gastroenterology
  • Gerontology & Geriatrics
  • Health informatics
  • Inflammatory disorders
  • Medical economics
  • Medical research
  • Medications
  • Neuroscience
  • Obstetrics & gynaecology
  • Oncology & Cancer
  • Ophthalmology
  • Overweight & Obesity
  • Parkinson's & Movement disorders
  • Psychology & Psychiatry
  • Radiology & Imaging
  • Sleep disorders
  • Sports medicine & Kinesiology
  • Vaccination
  • Breast cancer
  • Cardiovascular disease
  • Chronic obstructive pulmonary disease
  • Colon cancer
  • Coronary artery disease
  • Heart attack
  • Heart disease
  • High blood pressure
  • Kidney disease
  • Lung cancer
  • Multiple sclerosis
  • Myocardial infarction
  • Ovarian cancer
  • Post traumatic stress disorder
  • Rheumatoid arthritis
  • Schizophrenia
  • Skin cancer
  • Type 2 diabetes
  • Full List »

share this!

June 26, 2024

This article has been reviewed according to Science X's editorial process and policies . Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked

trusted source

More than a quarter of 'healthy' over-60s have heart valve disease, according to new research

by University of East Anglia

heart valve

The sheer scale of undiagnosed heart valve disease in our aging population has been revealed for the first time, thanks to new research led by the University of East Anglia.

The work appears in the European Heart Journal—Cardiovascular Imaging .

More than a quarter of healthy and symptom-free over-60s examined in the study were found to have previously undetected heart valve disease.

Co-lead author Vassilios Vassiliou, Clinical Professor of Cardiac Medicine at UEA's Norwich Medical School, said, "This study focused on understanding how widespread heart valve issues of any severity are among healthy, symptom-free adults without any known heart diseases.

"We examined almost 4,500 individuals aged 60 and older from three regions in the UK: Norfolk, West Midlands, and Aberdeen, using echocardiography, which is an ultrasound of the heart. Our findings showed that more than 28 percent of these adults had some form of heart valve disease, although reassuringly it was only mild in the majority of the cases.

"The data also indicated that age was the main factor associated with these heart valve problems, meaning that the older a person is, the higher their chance of having a significant valve issue."

Blood flows around the heart and the rest of the body in one direction, like a one-way traffic system.

The four heart valves (pulmonary and tricuspid on the right side, and aortic and mitral on the left side of the heart) control the direction of the blood flow, ensuring optimal pumping of the heart.

Co-lead author Prof Michael Frenneaux, of the Royal Brompton Hospital, part of Guy's and St Thomas' NHS Foundation Trust and Imperial College London, said, "Heart valve disease is when one or more of the heart valves do not work like they should. The main problems are caused by the valve not opening fully (valve stenosis) which restricts the flow of blood, or the valve not closing properly (valve regurgitation) which means blood can leak back in the wrong direction.

"These problems can put extra strain on the heart and make the heart work harder. Over time, it can increase the risk of having a heart attack, stroke and other heart conditions."

Symptoms can include feeling breathless, chest pain , feeling weak or dizzy, swollen ankles and feet, feeling more tired than usual and chest or neck palpitations.

Between 2007 and 2016, a total of 10,000 asymptomatic patients , over the age of 60, were invited through their general practices to take part in the study. Of those, 5,429 volunteered to participate, of whom 4,237 were eligible for inclusion.

They were evaluated with a health questionnaire, clinical examination and transthoracic echocardiography, which is an ultrasound of the heart.

Heart valve disease was diagnosed in 28.2%. The prevalence of clinically significant valvular heart disease was reassuringly only 2.4%, with one in 42 of the over-60s found to have a moderate or severe case, rising to one in 15 for those aged 75 and older.

However, only 21%—900 of the 4,237 patients evaluated—were 75 or over, and only 8.6% were over the age of 80.

Prof Vassiliou said, "The diagnosis of heart valve disease mostly relies on transthoracic echocardiography. However, this is normally only carried out if symptoms are reported or if an unusual murmur is heard during a physical examination. This can be challenging in the elderly because mild symptoms may be masked by reduced physical activity and impaired mobility.

"This study reveals that many older adults have heart valve issues, even if they don't show any symptoms, and we would suggest that if people do develop any new symptoms or signs that could indicate heart disease, to discuss this with their doctor.

"As our population ages, this information can help health care providers understand the scale of valve disease and streamline routine care methods and screening programs to ensure that we can cope with the demand in the future. This way, they can better identify and help those at risk before problems become serious."

The researchers say further studies are needed to clarify the prevalence of the disease in the elderly population and how screening could be used to help identify and manage the disease.

James Leiper, Associate Medical Director at the British Heart Foundation, said, "This important research using a very large group of people without symptoms showed that over a quarter of participants had a previously undetected heart valve condition. Further research will be required to build on these strong foundations and develop methods to test the feasibility of disease identification in these individuals. While we have made strides, there is still more to be done to eradicate heart disease for good. It is essential that we keep funding lifesaving research, so fewer people have to go through heart break."

The research also involved the Norfolk and Norwich University Hospital, Aberdeen Royal Infirmary, University of Aberdeen, University of Birmingham, the Royal Brompton Hospital, London, and Imperial College London.

Explore further

Feedback to editors

new research topics in networking

New study shows alcohol rehabilitation and abstinence reduce the risk of alcohol-associated cancers

new research topics in networking

Cardiovascular health could be biggest risk factor for future dementia rates

new research topics in networking

Majority of female cancer survivors at low risk of developing most obstetric complications

new research topics in networking

Tai chi reduces risk of inflammatory disease, treats insomnia among breast cancer survivors

3 hours ago

new research topics in networking

Study shows how liver damage from stress and aging might be reversible

new research topics in networking

New research tools reveal the dynamics behind breaking a sweat

4 hours ago

new research topics in networking

Bone stem cells with IFITM5 mutation get caught in a loop leading to osteogenesis imperfecta type V

new research topics in networking

Neuroscience research leverages stem cells to understand how neurons connect and communicate in the brain

new research topics in networking

Research uncovers 'molecular glue' that helps ensure memory formation and stabilization

6 hours ago

new research topics in networking

Children who spend more time in natural environments have significantly better mental health

9 hours ago

Related Stories

new research topics in networking

The timing of heart surgery is crucial, research shows

May 17, 2022

new research topics in networking

Biomimetic transcatheter aortic heart valve offers new option for aortic stenosis patients

May 3, 2024

new research topics in networking

Take heart murmurs seriously say cardiologists

Feb 26, 2024

new research topics in networking

A heart valve that grows with a pediatric patient

Dec 13, 2023

Does open heart surgery affect cognitive abilities?

Oct 12, 2018

new research topics in networking

What's that sound? A heart murmur can be innocent or serious

Oct 5, 2023

Recommended for you

new research topics in networking

Balancing act: Novel wearable sensors and AI transform balance assessment

10 hours ago

new research topics in networking

Female heart patients less likely to have additional problems fixed during surgery

new research topics in networking

Study finds innovative cuffless blood pressure device streamlines and enhances hypertension management

17 hours ago

new research topics in networking

Charting super-colorful brain wiring using an AI's super-human eye

Jun 25, 2024

new research topics in networking

Researchers more effectively study mutations that cause heart disease by putting cells through their paces

Let us know if there is a problem with our content.

Use this form if you have come across a typo, inaccuracy or would like to send an edit request for the content on this page. For general inquiries, please use our contact form . For general feedback, use the public comments section below (please adhere to guidelines ).

Please select the most appropriate category to facilitate processing of your request

Thank you for taking time to provide your feedback to the editors.

Your feedback is important to us. However, we do not guarantee individual replies due to the high volume of messages.

E-mail the story

Your email address is used only to let the recipient know who sent the email. Neither your address nor the recipient's address will be used for any other purpose. The information you enter will appear in your e-mail message and is not retained by Medical Xpress in any form.

Newsletter sign up

Get weekly and/or daily updates delivered to your inbox. You can unsubscribe at any time and we'll never share your details to third parties.

More information Privacy policy

Donate and enjoy an ad-free experience

We keep our content available to everyone. Consider supporting Science X's mission by getting a premium account.

E-mail newsletter

Numbers, Facts and Trends Shaping Your World

Read our research on:

Full Topic List

Regions & Countries

  • Publications
  • Our Methods
  • Short Reads
  • Tools & Resources

Read Our Research On:

  • Americans’ Views of Government’s Role: Persistent Divisions and Areas of Agreement

1. Government’s scope, efficiency and role in regulating business

Table of contents.

  • Views on the efficiency of government
  • Views on the government’s regulation of business
  • Confidence in the nation’s ability to solve problems
  • Views on the effect of government aid to the poor
  • Views on government’s role in health care
  • Views on the future of Social Security
  • Trust in government
  • Feelings toward the federal government
  • Acknowledgments
  • The American Trends Panel survey methodology

American s are evenly divided in their preferences for the size of government. Yet a somewhat greater share wants the government to do more to solve problems than say it is doing too much better left to others.

Chart shows Americans are closely divided on the size of government, and these views increasingly partisan

There is a persistent belief that government is wasteful: 56% say it is “almost always wasteful and inefficient.”

However, a majority of Americans (58%) say government regulation of business is necessary to protect the public good.

Divisions on government’s size, scope

Overall, 49% say they would prefer a smaller government providing fewer services, while 48% say they would rather have a bigger government providing more services.

Most Democrats prefer a larger government. For nearly half a century, Democrats and Republicans have differed in their preferences for the size of government. Today, those differences are as wide as they have ever been:

  • Nearly three-quarters of Democrats and Democratic-leaning independents (74%) favor a bigger government, providing more services. By comparison, in 2015, a smaller majority of Democrats (59%) said they preferred a bigger government.
  • Just 20% of Republicans and Republican leaners prefer a bigger government; nearly four times as many want smaller government with fewer services. Republicans’ views of the size of government have changed less than Democrats’. Still, when George W. Bush was running for reelection in 2004, roughly a third of Republicans favored a bigger government.

Chart shows Differences by age, race and ethnicity, and family income on government’s role in solving problems

When asked about the proper role of government, about half of Americans (53%) say the government should do more to solve problems, while 46% say the government is doing too many things better left to businesses and individuals.

An overwhelming share of Democrats (76%) say government should do more to solve problems, while about a quarter (23%) say it is doing too many things better left to individuals and businesses.

By contrast, Republicans prefer a more limited role for government: 71% say government is doing too many things better left to businesses and individuals, while 28% say government should do more to solve problems.

There are also sizable demographic differences in these views:

  • White adults (54%) are the most likely to say government is doing too many things better left to businesses and individuals, while smaller shares of Asian (34%), Black (31%) and Hispanic (29%) adults say the same.
  • Younger adults are more likely than older adults to favor a larger role for government, with adults ages 18 to 29 (66%) being the most likely to say government should do more to solve problems.
  • Among income groups, a majority of lower-income adults (61%) say government should do more to solve problems, while smaller shares of upper- and middle-income adults (53% and 48%, respectively) say the same.

Views among partisans by race, ethnicity and income

Among partisans, there are wide demographic differences on the preferred role of government – especially among Republicans.

Chart shows Republicans are divided internally on whether government should do more to solve problems

Hispanic Republicans (58%) are much more likely than White Republicans (21%) to favor a larger role for government.

Views among Democrats are much less divided, with at least seven-in-ten Democrats in each racial and ethnic group saying government should do more to solve problems.

Nearly half of lower-income Republicans (46%) say that the government should do more to solve problems, while smaller shares of middle- (22%) and upper-income (19%) Republicans say the same.

Wide majorities of Democrats across income groups say government should do more to solve problems.

In assessments of the efficiency of the government, a majority of Americans (56%) find it to be “almost always wasteful and inefficient.” A smaller share (42%) say government “often does a better job than people give it credit for.”

Chart shows Majority of Americans say government is ‘almost always wasteful and inefficient’

Overall, views on the efficiency of government have remained somewhat steady since 2019, with views today mirroring those five years ago.

Among partisans, a majority of Democrats (63%) say the government often does a better job than people give it credit for, while a large majority of Republicans (77%) say government is often wasteful and inefficient.

Views on the efficiency of government in both parties have remained steady since 2021.

While Democrats are generally more likely than Republicans to say government does not get enough credit, these views vary somewhat depending on which party holds the presidency:

  • Democrats are now more likely to give credit to the government than they were during the Trump administration.
  • Among Republicans, views of government efficiency were more positive during the Trump administration.

This is consistent with shifts in views during prior administrations .

On the topic of government regulation of business, about six-in-ten Americans (58%) say that government regulation of business is necessary to protect the public interest. Four-in-ten, however, say government regulation of business usually does more harm than good.

Chart shows Broad support for government regulation of business among Democrats, young adults, and Black, Hispanic and Asian adults

These views have remained largely unchanged since 2017.

As with other attitudes about government, Republicans and Democrats differ on the impact of government regulation of business:

  • About two-thirds of Republicans (65%) say government regulation does more harm than good.
  • Roughly eight-in-ten Democrats (82%) say government regulation is necessary to protect the public interest.

Among other demographic differences:

  • White adults (45%) are the most likely to say government regulation does more harm than good, while smaller shares of Hispanic (32%), Asian (29%) and Black (27%) adults say the same.
  • Younger adults are more likely than older adults to say government regulation of business is necessary to protect the public interest, with adults ages 18 to 29 (64%) being the most likely to say this.

Chart shows Americans are evenly divided on whether the U.S. can solve many of its important problems

Americans are divided in their views on the country’s ability to solve important problems. About half (52%) of Americans say “this country can’t solve many of its important problems,” while 47% say that “as Americans, we can always find ways to solve our problems and get what we want.”

More Americans express confidence in the country’s ability to solve problems now than a year ago (47% now, 43% then). Still, the share saying this is lower than it was from 2019 to 2022.

Unlike assessments of government, there are no partisan differences in views on the country’s ability to solve its important problems.

In both parties, about half say the U.S. can’t solve many of its important problems, while slightly narrower shares say Americans can always find ways to solve the country’s problems.

Views among age groups

Chart shows Age differences over whether the U.S. can solve its important problems

Among age groups, younger adults are the most likely to express skepticism in the country’s ability to solve its important problems. About six-in-ten adults ages 18 to 29 (62%) say the U.S. can’t solve many of its important problems, while smaller shares of older adults say the same.

Overall, the shares of adults in each age group who voice skepticism on the country’s ability to solve its problems remain higher than they were in 2022.

However, older adults have grown slightly more optimistic on this issue in the past year. Views among the youngest adults are relatively unchanged from 2022.

Sign up for our weekly newsletter

Fresh data delivery Saturday mornings

Sign up for The Briefing

Weekly updates on the world of news & information

  • Election 2024
  • Federal Government
  • Government Spending & the Deficit
  • Health Care
  • Partisanship & Issues
  • Social Security & Medicare
  • Trust in Government

6 facts about presidential and vice presidential debates

Biden, trump are least-liked pair of major party presidential candidates in at least 3 decades, cultural issues and the 2024 election, more than half of americans are following election news closely, and many are already worn out, americans have mixed views about how the news media cover biden’s, trump’s ages, most popular, report materials.

1615 L St. NW, Suite 800 Washington, DC 20036 USA (+1) 202-419-4300 | Main (+1) 202-857-8562 | Fax (+1) 202-419-4372 |  Media Inquiries

Research Topics

  • Email Newsletters

ABOUT PEW RESEARCH CENTER  Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping the world. It conducts public opinion polling, demographic research, media content analysis and other empirical social science research. Pew Research Center does not take policy positions. It is a subsidiary of  The Pew Charitable Trusts .

© 2024 Pew Research Center

COMMENTS

  1. 15 comprehensive networking research topics for students

    This particular research topic can be based on setting up a live streaming server on the AWS or Azure cloud platform to make sure high network bandwidth is provided with decreased latency. The research gap analysis would be conducted to analyze the performance of live streaming servers on local and cloud environments in terms of network ...

  2. A Better Approach to Networking

    A Better Approach to Networking. by. Christie Hunter Arscott. November 04, 2022. PM Images/Getty Images. Summary. Meeting strangers — especially in the context of work — is uncomfortable for ...

  3. Five networking trends teams should focus on in 2023

    Organizations should focus on five areas in 2023 to ensure their networks can enable the business. 1. Network automation and AIOps. The increase in corporate locations, devices and remote workers has led to an overwhelming number of devices that need to be configured, deployed and managed. Many organizations are already using network automation ...

  4. Top 15+ Latest Research Topics in Networking (Help)

    Networking is the biggest and fastest emerging area, making it hinder students with new research into networking technologies. However, students spend more money on their networking projects. To help our students, we also offer the latest networking projects at optimum cost as far as we also provided 5000+ projects from 120+ countries students ...

  5. The top 5 networking technology trends for 2022

    As we step into 2022, the ingenuity of IT will continue to be challenged as many of the changes expected to be temporary have become the new normal. We should expect today's changes to have a lasting effect on networking for years. Next Steps. 6 trends in corporate campus networks. Private 5G, NaaS, automation among top networking trends

  6. Networking News, Research and Analysis

    Jennifer R. Grandis, University of California, San Francisco. By surveying over 100 people in academic medicine, a researcher found that women are consistently excluded from important networking ...

  7. 25 of today's coolest network and computing research projects

    Ghost-USB-Honeypot project. This effort, focused on nixing malware like Flame that spreads from computer to computer via USB storage drives, got its start based on research from Sebastian Poeplau ...

  8. 10 Networking Trends To Watch In 2024 Based On Industry Experts

    💡 KEY INSIGHTS; Networking's Impact on Career: A strong network is vital for career advancement, with 85% of jobs filled through networking, highlighting its essential role in job search success. Preference for In-Person Networking: Despite the rise of digital mediums, 68% of individuals still prefer in-person networking, and 95% recognize its importance in building long-term business ...

  9. Effective Research Networking Tips for Researchers

    Nonetheless, networking is a crucial research skill for students and early career researchers, who likely find it the most intimidating. There are several benefits to research networking. It is a great way to start new collaborations, share research, learn about funding opportunities, and connect with journal editors and reviewers 2. Networking ...

  10. Advanced Topics in Networking Course I Stanford Online

    This course is typically offered in the spring quarter. Topics Include. Architectural principles: naming, addressing, routing; congestion control, traffic management, QoS. Wireless and mobility. Overlay networks and virtualization. Network security. Switching and routing. Content distribution. Proposals for future Internet structures.

  11. 4 Important Networking Trends 2020

    The 4 Most Important Networking Trends in 2020 and Beyond. In today's digital world, networking technology is everything. It's what makes the internet possible. It's how businesses support sprawling multinational footprints. It's even stitching together the appliances in our homes into one, smart, convenient fabric.

  12. Five Trends That Will Influence IT Networking in 2022

    Well, get ready for another acronym - NaaS or Networking as a Service. While the global Network Networking-as-a-Service (NaaS) market was valued at just over $8 billion in 2020, it is expected to exceed Opens a new window $45 billion by 2026. The concept of NaaS is like other 'as a Service' types.

  13. Computer Networking Dissertation Topics

    Topic 1: An evaluation of the network security during machine to machine communication in IoT. Research Aim: The research aims to evaluate the network security issues associated with M2M communication in IoT. Objectives: To evaluate the factors affecting the network security of IoT devices. To determine the methods for increasing data integrity ...

  14. Systems and Networking

    Systems and Networking. Systems and Networking is a broad and diverse area of computing research which spans areas including: systems, networks and distributed systems, programming languages and software engineering, compilers, databases and data science, security and cryptography, and mobile and wireless systems.

  15. Computer Networks

    Computer Networks. Computer networks allow computers to communicate with one another, and provide the fundamental infrastructures supporting our modern society. Research on computer networks at Yale improves on essential network system properties such as efficiency, robustness, and programmability. The research spans all networking layers ...

  16. Networking

    Our research combines building and deploying novel networking systems at unprecedented scale, with recent work focusing on fundamental questions around data center architecture, cloud virtual networking, and wide-area network interconnects. We helped pioneer the use of Software Defined Networking, the application of ML to networking, and the ...

  17. PUBLICATIONS

    6. Eytan Modiano, "Random Algorithms for Scheduling Multicast Traffic in WDM Broadcast-and-Select Networks," IEEE Transactions on Networking, July, 1999. 5. Eytan Modiano and Richard Barry, "Architectural Considerations in the Design of WDM-based Optical Access Networks," Computer Networks, February 1999.

  18. Frontiers in Communications and Networks

    Emerging Technologies, Challenges and Solutions for Zero Trust. An innovative journal that explores the critical branches of contemporary telecommunications in our hyper-connected world, from the physical layer to cross-layer and networking design, performance ...

  19. Advancements and Challenges in Networking Technologies: A Comprehensive

    This survey paper provides a comprehensive overview of emerging technologies in networking, focusing on caching in Information-Centric Networking (ICN), context-aware radio access technology (RAT) selection in 5G ultra-dense networks, cryptocurrency adoption, and mobility support for routing in Low Power and Lossy Networks (LLNs). Adaptive RAT selection mechanisms are stressed in 5G context ...

  20. 5 Computer Networking Trends for 2024 and Beyond

    5 Computer Networking Trends for 2024 and Beyond. AI will continue to dominate the headlines. By. Bradley Mitchell. Updated on January 23, 2024. Computer network technology continues to develop in new and interesting ways. Here are five of the most important areas and trends to watch in the year ahead. 01.

  21. 5 Top Networking Trends (2024 & 2025)

    Read this list of trends to learn more about the top networking trends impacting IT leaders. 1. Security and Budget Concerns Drive Adoption of NaaS. IT departments are continually looking for agility, resiliency, and the ability to quickly adapt to new technologies. For many organizations, cost, and scalability stand in the way of these goals.

  22. Rare Research Report: June 2024

    The Rare Diseases Clinical Research Network (RDCRN) is funded by the National Institutes of Health (NIH) and led by the National Center for Advancing Translational Sciences (NCATS) through its Division of Rare Diseases Research Innovation (DRDRI). Now in its fourth five-year funding cycle, RDCRN is a partnership with funding and programmatic ...

  23. Looking for undergraduate research projects/topics in Networking

    Topics that I was thinking about: Delay Tolerant Networking (in rural villages or interplanetary networking) Datagram Transport Layer Security. Namecoin or other Bitcoin forks. A good one-semester long project involving implementation and coding. Some ideas that I was thinking of: Implementing a well known application or QoS protocol in ns3.

  24. NASA SCoPE Connects Early Career Scientists and STEM Outreach

    This event series aims to connect early career scientists, engineers, and NASA Science Activation teams, providing a platform for networking and mutual learning on science communications topics. The event brought together 21 NASA science content experts from across the United States, all eager to learn more about balancing their research and ...

  25. New SnailLoad Attack Relies on Network Latency Variations to Infer User

    New attack named SnailLoad allows a remote attacker to infer websites and videos viewed by a user without direct access to network traffic. A team of researchers from the Graz University of Technology in Austria has disclosed the details of a new attack method that allows a remote attacker to infer ...

  26. New at-home monitoring program for patients with high blood pressure

    (SACRAMENTO) UC Davis Health has launched a new program that monitors patients with high blood pressure at home. To support this initiative, the health system is working with Best Buy Health 's care-at-home platform, Current Health.. Patients will use connected devices including blood pressure cuffs and scales.

  27. These are the Top 10 Emerging Technologies of 2024

    With AI expanding the world of data like never before, finding ways of leveraging it without ethical or security concerns is key. Enter synthetic data, an exciting privacy-enhancing technology re-emerging in the age of AI. It replicates the patterns and trends in sensitive datasets but does not contain specific information that could be linked to individuals or compromise organizations or ...

  28. Networking for Researchers

    Networking for Researchers. For researchers in the natural sciences who want to gain confidence by improving their networking skills or mentor others through the process. 10 experts in networking, including researchers, experienced academic networkers, fellows, networking consultants and communications specialists. 8 hours of learning.

  29. More than a quarter of 'healthy' over-60s have heart valve disease

    The sheer scale of undiagnosed heart valve disease in our aging population has been revealed for the first time, thanks to new research led by the University of East Anglia. Topics Conditions

  30. US views of government's size, efficiency, role ...

    ABOUT PEW RESEARCH CENTER Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping the world. It conducts public opinion polling, demographic research, media content analysis and other empirical social science research. Pew Research Center does not take policy positions.