1 / 20

Welcome to Rutgers!

Welcome to Rutgers!. 1 st Rutgers-Helsinki Ph.D. Student Workshop on Spontaneous Networking Liviu Iftode Department of Computer Science Rutgers University. My talk…. Proto-History Workshop Overview Disco Lab. The time before the workshop.

harmon
Download Presentation

Welcome to Rutgers!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Welcome to Rutgers! 1st Rutgers-Helsinki Ph.D. Student Workshop on Spontaneous Networking Liviu Iftode Department of Computer Science Rutgers University

  2. My talk… • Proto-History • Workshop Overview • Disco Lab

  3. The time before the workshop • Jan 2004, ANWIRE Winter School on Middleware in Cyprus (organized by M. Dikaiakos): meeting Oriana • Summer 2004: Oriana intern in Disco Lab • October 2004: NSF supplemental award for international collaboration • August 2005: visit to University of Helsinki • November 2005: Kimmo at Rutgers

  4. Spontaneous Networking • Services over ad-hoc networks • An application-oriented approach to ad-hoc networking • Location-awareness • Loosely defined boundaries • Unplanned networks, unexpected users • Examples • Ad-hoc networks of smart phones • Vehicular networks

  5. Monday, May 8, 2006 • 9:30 am - 10:30 am Welcome • Dr. Liviu Iftode (Rutgers University) and Dr. Kimmo Raatikainen (University of Helsinki) • 10:30 am - 11:00 am Break • 11:00 am - 12:00 pm Keynote Address • Future Trends in Wireless Technology and the Path to Pervasive Computing - Dr. Dipankar Raychaudhuri (WINLAB Director, Rutgers University) • 12:00 pm - 1:30 pm Lunch • 1:30 pm - 3:00 pm Session I   • Binary Serialization of XML for Small Devices - Jaakko Kangasharju (University of Helsinki) • File Synchronization with Syxaw in an Ad Hoc Network (Work-in-progress Report) - Tancred Lindholm (University of Helsinki, Finland) • 3:00 pm - 3:30 pm Break • 3:30 pm - 5:00 pm Session II   • Mobility Control for Throughput Maximization in Ad Hoc Networks - Dr. Tamer Nadeem (Siemens)  • Suppressing Attacks at the Originators: Trusted Remote Policy Enforcement in Ad Hoc Networks - Gang Xu (Rutgers University)

  6. Tuesday, May 9, 2006 • 9:30 am- 10:00 am Opening Remarks • Dr. Haym Hirsh (DCS Chair., Rutgers University) • 10:00 am - 10:30 am Break • 10:30 am - 12:00 pm Session I  • Fuego Event Service: Towards Modularity in Event Routing - Sasu Tarkoma (University of Helsinki, Finland)  • Distributed Optimization in Networks - Elisa Schaeffer (University of Helsinki, Finland) • 12:00 pm - 1:30 pm Lunch • 1:30 pm - 3:00 pm Session II   • Information Flow Control for Location-Based Services - Nishkam Ravi (Rutgers University, CS)  • Privacy of Anonymous Location Sampling Techniques: A Traffic Monitoring Case Study - Baik Hoh (Rutgers University, EE/WINLAB) • 3:00 pm - 3:30 pm Break / Demo Camera Phones (Disco Lab) • 3:30 pm - 5:00 pm Session III   • A Multipath Routing Architecture for Background Transfers - Aniruddha Bohra (Rutgers University, CS) • Byzantine Fault Tolerant Public Key Authentication in Peer-to-Peer Systems - Vivek Pathak (Rutgers University, CS)

  7. Wednesday, May 10, 2006 • 9:30 am - 11:45 am Session I   • Outdoor Distributed Computing - Dr. Cristian Borcea (New Jersey Institute of Technology)   • Context-Aware Migratory Services in Ad Hoc Networks - Oriana Riva (University of Helsinki, Finland)   • Extending Component-Based Software Architecture with Context-Awareness and Beyond - Michael Przybilski (University of Helsinki, Finland) • 12:00 pm - 1:30 pm Lunch • 1:30 pm - 3:00 pm Session II   • ORBIT: Open-Access Research Testbed for Next-Generation Wireless Networks - Pandurang Kamat (Rutgers University, CS/WINLAB)  • Designing an Inter-Vehicular Network Stack for Car-to-Car Communication - Pravin Shankar (Rutgers University,CS) • 3:00 pm - 3:30 pm TrafficView Demo (CS/Disco Lab) • CoRE Building Parking Lot • 4:00 pm - 5:00 pm ORBIT Tour - WINLAB

  8. Friday, May 12, 2006 • 9:30 am - 10:30 am Programming Ad Hoc Networks of Mobile Devices - Dr. Ulrich Kremer and Adrian Stere (Rutgers University, CS) • 10:30 am - 11:00 am Break • 11:00 am - 12:30 pm Session I - Potpourri Session • Application-Specific Compression for Remote Visualization of Genomics Applications - Lars Ailo Bongo (University of Tromso, Norway)   • Towards Automated Detection and Containment of Rootkit Attacks - Arati Baliga (Rutgers University, CS)   • FileWall: Implementing File Access Policies Using Access Context - Stephen Smaldone (Rutgers University, CS) • 12:30 pm - 2:00 pm Lunch • 2:00 pm - 3:00 pm Disco Lab – Helsinki Meeting (Core B)

  9. Workshop Speakers • Rutgers, Computer Science • Disco Lab • Power and Energy Management Lab (EEL) • University of Helsinki, Computer Science • Rutgers., WINLAB/ Electrical and Computer Engineering • New Jersey Institute of Technology • Siemens Corporate Research, Inc. • University of Tromso, Norway

  10. Distributed Computing Laboratory • Created in 1998 • One faculty, ten graduate students • Five active projects • Three active NSF grants ($2.1 Million) • Three industrial collaborations • Network Appliance, Inc • Siemens Corporate Research, Inc • VMware, Inc • International Collaboration • INRIA/IRISA Rennes, UPC Barcelona, University Paris 6, University of Helsinki, Technical University of Bucharest • Three joint workshops: Rennes (Dec 2005), Rutgers (May 2006), Paris (June 2006) • Six foreign graduate students visited Disco Lab in 2006! • Graduate/Light Seminars: Network-Centric Systems, Self-Healing, Vehicular Computing and Networking, Intrusion Detection

  11. Network-Centric Systems • Promising border-crossing systems research area • Networking has moved from periphery to center • Dictates performance • Limits availability • Makes programmability difficult • Opens software vulnerabilities to attacks • Networking has become the main challenge/obstacle/opportunity for systems research • Wide range of network-centric systems, from network servers to pervasive systems

  12. Disco Lab Project Areas • Server Networking Performance • Service Availability • Remote Healing • Defensive Architectures • Distributed Embedded Systems • Pervasive Computing using Smart Phones • Vehicular Computing Systems

  13. Server Networking Performance • Execution of traditional TCP/IP protocol stack dominates the server overhead • Two approaches to reduce transport protocol impact on server performance: offload or make it lighter • Offloading TCP: TCP Servers • Lightweight transport (Remote DMA): Memory-Mapped User-Level NFS over RDMA • Collaboration with Network Appliance, Inc

  14. Service Availability • For the client, server availability is not enough • How to provide end-to-end service availability? • Migratory TCP • Migrate server end-point of live connection • Service Continuations • Migrate service sessions between cooperative servers running the same service

  15. Remote Healing • Traditionally, recovery from OS failures means reboot • How to access memory when OS is unavailable? • Backdoor • Trusted I/O device that can execute remote memory operations without involving local OS/CPU • I-NIC (e.g. Myrinet) supporting R-DMA operations • Remote Monitoring • Sensor Box • Remote Repairing • Repare remote OS state • Remote Recovery • Recover service sessions from a failed OS

  16. Defensive Architectures • From OS failures to compromised OS • Once OS is compromised, the attack is hard to detect and even harder to contain • How to do intrusion detection+containment automatically? • Defensive Architectures use trusted entities to monitor system integrity and/or enforce access policies • A priviledged VM: Paladine • A TPM-based service code monitor: Satem • Interposed between client and file server: FileWall • Continuous Monitoring • Discrete detection remains vulnerable • Continuous invariant checking • Cooperative Monitoring • Cooperative detection • Cooperative Continuous Monitoring • Continuous checking of distributed invariants

  17. Distributed Embedded Systems • We know how to program distributed systems with stable configuration and reliable networking • We do not know how to program large and dynamic networks of embedded systems • Execution migration and self-routing • Smart Messages • High-level distributed models for programming embedded systems in the physical space • Spatial Programming • Spatial Views (EEL in collaboration with Disco Lab)

  18. Pervasive Computing using Smart Phones • Smart phone • the first device that enables pervasive computing and makes undergraduate students happy • Smiles project • Exploit dual connectivity for service provisioning • Indoor localization using camera phones (Demo!) • Privacy guarantees in location-based services • Next generation: Smart phone + iPod • Low-bandwidth continuous connectivity is a form of weak connectivity • Coda on smart phones?

  19. Vehicular Computing Systems • Make mobile ad-hoc networks real and real-time! • Dedicated Short Range Communications (DSRC) for V2V communication • What are the killer applications? • Near view for active accident avoidance: TrafficView • Far-view for automobile congestion detection/avoidance and route planning • TrafficView: one of the first outdoor experiments with a real vehicular computing system (Demo!) • Security concerns: Trust and Privacy • Probabilistic validation of aggregated traffic data • Content-distribution over vehicular networks • Dual connectivity: cellular/short range

  20. Some Lessons • Novel hardware inspires systems research • RDMA, TPM, Smart Phones, DSRC • Offloading as principle of systems design • Functionality, monitoring, policy enforcement, validation • Pervasive computing and vehicular computing are coming • Outdoors is not like indoors! • Outdoor systems are hard to build, test and evaluate • International collaboration is a professional and social exercise absolutely necessary for students

More Related