Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nikhil Shetty is active.

Publication


Featured researches published by Nikhil Shetty.


global communications conference | 2009

Economics of Femtocells

Nikhil Shetty; Shyam Parekh; Jean Walrand

Femtocells or home base stations are a proposed solution to the problem of degraded indoor service from the macrocell base station in future 4G data networks. In this paper, we study user incentives for the adoption of femtocells and their resulting impact on network operator revenues. We model a monopolist network operator who offers the option of macrocell access or macro+femtocell access to a population of users who possess linear valuations for the data throughput. We compare the revenues from two possible spectrum schemes for femtocell deployment; the split spectrum scheme, where femtocells and macrocells operate on different frequencies and do not interfere, and, the common spectrum scheme, where they operate on the same frequencies (partially or fully) and interfere. Our results suggest that the optimal pricing scheme always charges a higher price for the femtocell service, i.e., the operator does not offer any subsidies for adoption. Yet, at the optimal prices, almost full adoption of femtocells is achieved even for many common spectrum schemes that degrade macrocell capacity. Femtocell deployments provide huge revenue gains when macrocell capacities are low. However, in this range, even common spectrum schemes that heavily degrade the macrocell capacity perform comparably to the split spectrum scheme. Some common spectrum schemes with moderate macrocell degradation yield revenues comparable or higher than the split spectrum scheme at all levels of macrocell congestion.


conference on emerging network experiment and technology | 2007

Modeling the adoption of new network architectures

Dilip Antony Joseph; Nikhil Shetty; John Chuang; Ion Stoica

We propose an economic model based on user utility to study the adoption of new network architectures such as IPv6. We use mathematical analysis and simulation studies to understand the role of various factors such as user and network benefits, switching costs, and the impact of converters on the adoption of new network architectures. In addition to corroborating various commonly held beliefs about new network architecture adoption, our analysis and simulation studies also reveal several surprising and non-intuitive results. For example, while in general, increasing the efficiency of converters hastens the adoption of new network architectures, there are cases in which more efficient converters hinder the adoption of such architectures. This and other results in the paper increase our understanding of new network architecture adoption and guide the design and implementation of mechanisms to hasten new network architecture adoption.


IEEE ACM Transactions on Networking | 2010

Internet QoS and regulations

Nikhil Shetty; Galina Schwartz; Jean Walrand

This paper investigates Internet service provider (ISP) incentives with a single-service class and with two-service classes in the Internet. We consider multiple competing ISPs who offer network access to a fixed user base, consisting of end-users who differ in their quality requirements and willingness to pay for the access. We model user-ISP interactions as a game in which each ISP makes capacity and pricing decisions to maximize its profits and the end-users only decide which service to buy (if any) and from which ISP. Our model provides pricing for networks with single- and two-service classes for any number of competing ISPs. Our results indicate that multiple service classes are socially desirable, but could be blocked due to the unfavorable distributional consequences that it inflicts on the existing Internet users. We propose a simple regulatory tool to alleviate the political economic constraints and thus make multiple service classes in the Internet feasible.


wireless communications and networking conference | 2009

Identifying Spectrum Usage by Unknown Systems using Experiments in Machine Learning

Nikhil Shetty; Sofie Pollin; Przemyslaw Pawelczak

We adopt a machine learning approach towards the problem of identifying wireless systems present in a dynamic radio environment with heterogeneous usage. To classify the wireless systems, we utilize two features that typify spectrum use--center frequency and the frequency spread--and cluster the measurement data in this space. Since the systems are unknown prior to clustering, we use an unsupervised clustering method that uses the Chinese restaurant process implemented using Gibbs sampling. The system identification is divided into two parts: training and online classification. In the training phase, we assign wireless systems present in the surrounding to the clusters while the online classification uses this trained data to perform classification. By means of an extensive measurement campaign, we show that the proposed machine learning process achieves up to 90% correctness in classifying the wireless systems considered here.


workshop on internet and network economics | 2008

Impact of QoS on Internet User Welfare

Galina Schwartz; Nikhil Shetty; Jean Walrand

In this paper, we investigate the welfare effects of transition from a single-service class to two-service classes in the Internet. We consider an ISP who offers network access to a fixed user base, consisting of users who differ in their quality requirements and willingness to pay for the access. We model user-ISP interactions as a game in which the ISP makes capacity and pricing decisions to maximize his profits and the users only decide which service to buy, if any. Our model provides robust pricing for networks with single- and two-service classes. Our results indicate that transition to multiple service classes is socially desirable, but could be blocked due to the unfavorable distributional consequences that it inflicts on the existing network users. To facilitate the transition, we propose a simple regulatory tool that alleviates the political economic constraints and thus makes the transition feasible.


allerton conference on communication, control, and computing | 2013

Why cyber-insurance contracts fail to reflect cyber-risks

Galina Schwartz; Nikhil Shetty; Jean Walrand

We consider arbitrary risk-averse users, whose costs of improving security are given by an arbitrary convex function. In our model, user probability to incur damage (from an attack) depends on both his own security and network security: thus, security is interdependent. We introduce two user types (normal and malicious), and allow one user type (malicious users) to subvert insurer monitoring, even if insurers perfectly enforce (at zero cost) security levels of normal users. We prove that with malicious users present, equilibrium contract that specifies user security fails to exist. We demonstrate, in a general setting, a failure of cyber-insurers to underwrite contracts conditioning the premiums on security. We consider arbitrary risk-averse users, whose costs of improving security are given by an arbitrary convex function. In our model, user probability to incur damage (from an attack) depends on both his own security and network security: thus, security is interdependent. We introduce two user types (normal and malicious), and allow one user type (malicious users) to subvert insurer monitoring, even if insurers perfectly enforce (at zero cost) security levels of normal users. We prove that with malicious users present, equilibrium contract that specifies user security fails to exist. We demonstrate, in a general setting, a failure of cyber-insurers to underwrite contracts conditioning the premiums on security.


network operations and management symposium | 2008

A novel approach to bottleneck analysis in networks

Nikhil Shetty; Assane Gueye; Jean Walrand

In this paper, we devise a novel method for bottleneck analysis of UDP networks based on the concept of network utility maximization. To determine the losses on the links in a UDP network, we propose an optimization problem (geometric program) for which we find and prove conditions under which it accurately determines the true losses. We further extend this analysis to stochastic rates using stochastic optimization techniques and provide a new metric to flag bottleneck links. This method does not rely on time-consuming packet-level simulations, but is instead based on robust mathematical models. Alternatively, one could determine the losses by solving a fixed point problem and extend it to random rates using a Monte Carlo simulation. However, lack of knowledge of convergence makes it difficult to predict the end of such simulations. Our method is more advantageous as it involves solving an optimization problem, the solution to which can be numerically determined to the desired accuracy. Also, compared to a black and white approach between worst-case analysis and average-case analysis, our method offers network managers the flexibility of choosing the shades of gray in between.


WEIS | 2010

Competitive Cyber-Insurance and Internet Security

Nikhil Shetty; Galina Schwartz; Márk Félegyházi; Jean Walrand


trust and trustworthy computing | 2010

Can competitive insurers improve network security

Nikhil Shetty; Galina Schwartz; Jean Walrand


Archive | 2010

Cyber-Insurance: Missing Market Driven by User Heterogeneity

Galina Schwartz; Nikhil Shetty; Jean Walrand

Collaboration


Dive into the Nikhil Shetty's collaboration.

Top Co-Authors

Avatar

Jean Walrand

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Assane Gueye

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ion Stoica

University of California

View shared research outputs
Top Co-Authors

Avatar

John Chuang

University of California

View shared research outputs
Top Co-Authors

Avatar

Sofie Pollin

University of California

View shared research outputs
Top Co-Authors

Avatar

Przemyslaw Pawelczak

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge