1 / 8

Networking and Pervasive Computing

Networking and Pervasive Computing. Prof. Philip McKinley Department of Computer Science and Engineering. “Historical” Perspective. Dawn of The Internet Mobile Computing Anytime, anywhere computing Pervasive Computing The environment is “active” Sensor Networks

amanda
Télécharger la présentation

Networking and Pervasive Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Networking and Pervasive Computing Prof. Philip McKinley Department of Computer Science and Engineering Computer Science and Engineering, April 13, 2004

  2. “Historical” Perspective • Dawn of The Internet • Mobile Computing • Anytime, anywhere computing • Pervasive Computing • The environment is “active” • Sensor Networks • Self configuring collections of motes or other small devices Computer Science and Engineering, April 13, 2004

  3. Internet Research in CSE Japan E. Lansing • Internet still in its infancy… • Key problems: • Multimedia performance • Real-time interaction • Security and privacy • Internet Teleoperation (Mutka) • Real-time robot control/feedback • Anonymous Communication (Shapiro) • Internet privacy, commerce • Overlay Networks (Xiao, McKinley, Shapiro) • Early warning systems, peer-to-peer • Funding: NIH, NSF, IXIA Co., MSGC • Collaborators: Dept. of Surgery, Telecomm, ECE, ME, Chemistry/BioChemistry, Mathematics, Ohio State, William and Mary, U. Helsinki Computer Science and Engineering, April 13, 2004

  4. Mobile Computing in CSE Discovering party Service provider Trust ... • User-oriented wireless communciation • Wireless multimedia • McKinley, Owen, Cheng • Service discovery and trust • Mutka • Applications: • Privacy in mobile computing, emergency services, network-centric battlefield, scientific data gathering • Funding: NSF, ONR • Collaborations: MIND Lab, Telecomm, Siemens, Lucent, HKUST Computer Science and Engineering, April 13, 2004

  5. Pervasive Computing in CSE • Removing traditional boundaries for how, where and when humans and computers interact • Augmented reality • Owen • Autonomic computing • McKinley, Kulkarni, SE faculty • Example: Critical Infrastructure Protection • Adaptive auditing to prevent cascading failures • Detect and respond to security threats • Funding: ONR, NSF, Microsoft, • Collaborations: Siemens, Cisco, Lucent, MIND Lab, Dept. Advertising • Emerging collaborations: Business School, Entomology, Cyclotron Computer Science and Engineering, April 13, 2004

  6. Sensor Networks in CSE • A special case of pervasive computing • Inexpensive MEMS devices deployed in large quantity to remote, hazardous, or denied areas • Self-organizing control and data gathering • Topics: • Self-configuring networks (Kulkarni, Mutka) • Energy management (McKinley) • Software adaptation (Kulkarni) • Example: DARPA NEST project • Applications: • Battlefield, homeland security • Ecosystem monitoring • Smart structures • Collaborators: Entomology, Ohio State, U. Iowa Computer Science and Engineering, April 13, 2004

  7. Emerging Cyberinfrastructure Secure Information Systems Ecosystem Monitoring Digital Supply Chain Network- Centric Battlefield Homeland Security Disaster Relief • Remote • Safety-critical • Real-time • All the above • Privacy • Adaptable Computer Science and Engineering, April 13, 2004

  8. Cyberinfrastructure Research • First Generation • Driven by applications in science and engineering • Advanced sensor hardware • Efficient systems software, network protocol • Understanding issues, brittle prototypes • Second Generation • Driven by applications in science and engineering • Advanced sensor hardware • Efficient systems software, network protocols • Intelligent systems for decision making • High assurance adaptable software • Designing and building robust, self-healing (autonomic) systems for deployment Computer Science and Engineering, April 13, 2004

More Related