Welcome to Rutgers by nikeborome


									  Welcome to Rutgers!

 1st Rutgers-Helsinki Ph.D. Student
Workshop on Spontaneous Networking

               Liviu Iftode
      Department of Computer Science
            Rutgers University
My talk…

 Proto-History
 Workshop Overview
 Disco Lab
   The time before the workshop

 Jan 2004, ANWIRE Winter School on Middleware in
  Cyprus (organized by M. Dikaiakos): meeting Oriana
 Summer 2004: Oriana intern in Disco Lab
 October 2004: NSF supplemental award for
  international collaboration
 August 2005: visit to University of Helsinki
 November 2005: Kimmo at Rutgers
 Spontaneous Networking

 Services over ad-hoc networks
 An application-oriented approach to ad-hoc
 Location-awareness
 Loosely defined boundaries
 Unplanned networks, unexpected users
 Examples
    Ad-hoc networks of smart phones
    Vehicular networks
     Monday, May 8, 2006
 9:30 am - 10:30 am      Welcome
    Dr. Liviu Iftode (Rutgers University) and Dr. Kimmo Raatikainen
       (University of Helsinki)
 10:30 am - 11:00 am     Break
 11:00 am - 12:00 pm     Keynote Address
    Future Trends in Wireless Technology and the Path to Pervasive
      Computing - Dr. Dipankar Raychaudhuri (WINLAB Director, Rutgers
 12:00 pm - 1:30 pm      Lunch
 1:30 pm - 3:00 pm       Session I
    Binary Serialization of XML for Small Devices - Jaakko Kangasharju
     (University of Helsinki)
    File Synchronization with Syxaw in an Ad Hoc Network (Work-in-
     progress Report) - Tancred Lindholm (University of Helsinki, Finland)
 3:00 pm - 3:30 pm       Break
 3:30 pm - 5:00 pm       Session II
    Mobility Control for Throughput Maximization in Ad Hoc Networks -
     Dr. Tamer Nadeem (Siemens)
    Suppressing Attacks at the Originators: Trusted Remote Policy
     Enforcement in Ad Hoc Networks - Gang Xu (Rutgers University)
   Tuesday, May 9, 2006
 9:30 am- 10:00 am        Opening Remarks
    Dr. Haym Hirsh (DCS Chair., Rutgers University)
 10:00 am - 10:30 am      Break
 10:30 am - 12:00 pm      Session I
    Fuego Event Service: Towards Modularity in Event Routing - Sasu
     Tarkoma (University of Helsinki, Finland)
    Distributed Optimization in Networks - Elisa Schaeffer (University of
     Helsinki, Finland)
 12:00 pm - 1:30 pm       Lunch
 1:30 pm - 3:00 pm        Session II
    Information Flow Control for Location-Based Services - Nishkam Ravi
     (Rutgers University, CS)
    Privacy of Anonymous Location Sampling Techniques: A Traffic
     Monitoring Case Study - Baik Hoh (Rutgers University, EE/WINLAB)
 3:00 pm - 3:30 pm        Break / Demo Camera Phones (Disco Lab)
 3:30 pm - 5:00 pm        Session III
    A Multipath Routing Architecture for Background Transfers -
     Aniruddha Bohra (Rutgers University, CS)
    Byzantine Fault Tolerant Public Key Authentication in Peer-to-Peer
     Systems - Vivek Pathak (Rutgers University, CS)
   Wednesday, May 10, 2006
 9:30 am - 11:45 am      Session I
    Outdoor Distributed Computing - Dr. Cristian Borcea (New Jersey
     Institute of Technology)
    Context-Aware Migratory Services in Ad Hoc Networks - Oriana
     Riva (University of Helsinki, Finland)
    Extending Component-Based Software Architecture with Context-
     Awareness and Beyond - Michael Przybilski (University of Helsinki,
 12:00 pm - 1:30 pm      Lunch
 1:30 pm - 3:00 pm       Session II
    ORBIT: Open-Access Research Testbed for Next-Generation
     Wireless Networks - Pandurang Kamat (Rutgers University,
    Designing an Inter-Vehicular Network Stack for Car-to-Car
     Communication - Pravin Shankar (Rutgers University,CS)
 3:00 pm - 3:30 pm       TrafficView Demo (CS/Disco Lab)
    CoRE Building Parking Lot
 4:00 pm - 5:00 pm       ORBIT Tour - WINLAB
 Friday, May 12, 2006
 9:30 am - 10:30 am     Programming Ad Hoc Networks of
  Mobile Devices - Dr. Ulrich Kremer and Adrian Stere (Rutgers
  University, CS)
 10:30 am - 11:00 am Break
 11:00 am - 12:30 pm Session I - Potpourri Session
     Application-Specific Compression for Remote Visualization of
      Genomics Applications - Lars Ailo Bongo (University of Tromso,
     Towards Automated Detection and Containment of Rootkit
      Attacks - Arati Baliga (Rutgers University, CS)
     FileWall: Implementing File Access Policies Using Access
      Context - Stephen Smaldone (Rutgers University, CS)
 12:30 pm - 2:00 pm       Lunch
 2:00 pm - 3:00 pm        Disco Lab – Helsinki Meeting (Core B)
Workshop Speakers

 Rutgers, Computer Science
    Disco Lab
    Power and Energy Management Lab (EEL)
 University of Helsinki, Computer Science
 Rutgers., WINLAB/ Electrical and Computer
 New Jersey Institute of Technology
 Siemens Corporate Research, Inc.
 University of Tromso, Norway
     Distributed Computing Laboratory
 Created in 1998
 One faculty, ten graduate students
 Five active projects
 Three active NSF grants ($2.1 Million)
 Three industrial collaborations
     Network Appliance, Inc
     Siemens Corporate Research, Inc
     VMware, Inc
 International Collaboration
     INRIA/IRISA Rennes, UPC Barcelona, University Paris 6, University of
      Helsinki, Technical University of Bucharest
     Three joint workshops: Rennes (Dec 2005), Rutgers (May 2006), Paris
      (June 2006)
     Six foreign graduate students visited Disco Lab in 2006!
 Graduate/Light Seminars: Network-Centric Systems, Self-Healing,
   Vehicular Computing and Networking, Intrusion Detection
  Network-Centric Systems

 Promising border-crossing systems research area
 Networking has moved from periphery to center
    Dictates performance
    Limits availability
    Makes programmability difficult
    Opens software vulnerabilities to attacks
 Networking has become the main
  challenge/obstacle/opportunity for systems research
 Wide range of network-centric systems, from network
  servers to pervasive systems
Disco Lab Project Areas

 Server Networking Performance
 Service Availability
 Remote Healing
 Defensive Architectures
 Distributed Embedded Systems
 Pervasive Computing using Smart Phones
 Vehicular Computing Systems
 Server Networking Performance

 Execution of traditional TCP/IP protocol stack
  dominates the server overhead
 Two approaches to reduce transport protocol impact
  on server performance: offload or make it lighter
 Offloading TCP: TCP Servers
 Lightweight transport (Remote DMA): Memory-
  Mapped User-Level NFS over RDMA
    Collaboration with Network Appliance, Inc
 Service Availability
 For the client, server availability is not enough
 How to provide end-to-end service availability?
 Migratory TCP
   Migrate server end-point of live connection
 Service Continuations
    Migrate service sessions between cooperative servers
     running the same service
 Remote Healing

 Traditionally, recovery from OS failures means
 How to access memory when OS is unavailable?
 Backdoor
     Trusted I/O device that can execute remote memory
      operations without involving local OS/CPU
     I-NIC (e.g. Myrinet) supporting R-DMA operations
 Remote Monitoring
    Sensor Box
 Remote Repairing
    Repare remote OS state
 Remote Recovery
    Recover service sessions from a failed OS
  Defensive Architectures
 From OS failures to compromised OS
     Once OS is compromised, the attack is hard to detect and even
      harder to contain
     How to do intrusion detection+containment automatically?
 Defensive Architectures use trusted entities to monitor system
   integrity and/or enforce access policies
     A priviledged VM: Paladine
     A TPM-based service code monitor: Satem
     Interposed between client and file server: FileWall
 Continuous Monitoring
     Discrete detection remains vulnerable
     Continuous invariant checking
 Cooperative Monitoring
     Cooperative detection
 Cooperative Continuous Monitoring
     Continuous checking of distributed invariants
Distributed Embedded Systems
 We know how to program distributed systems with
  stable configuration and reliable networking
 We do not know how to program large and dynamic
  networks of embedded systems
 Execution migration and self-routing
    Smart Messages
 High-level distributed models for programming
  embedded systems in the physical space
    Spatial Programming
    Spatial Views (EEL in collaboration with Disco Lab)
 Pervasive Computing using Smart
 Smart phone
    the first device that enables pervasive computing and
     makes undergraduate students happy
 Smiles project
    Exploit dual connectivity for service provisioning
    Indoor localization using camera phones (Demo!)
    Privacy guarantees in location-based services
 Next generation: Smart phone + iPod
    Low-bandwidth continuous connectivity is a form of
     weak connectivity
    Coda on smart phones?
  Vehicular Computing Systems
 Make mobile ad-hoc networks real and real-time!
 Dedicated Short Range Communications (DSRC) for V2V
 What are the killer applications?
     Near view for active accident avoidance: TrafficView
     Far-view for automobile congestion detection/avoidance and
        route planning
 TrafficView: one of the first outdoor experiments with a real
  vehicular computing system (Demo!)
 Security concerns: Trust and Privacy
       Probabilistic validation of aggregated traffic data
 Content-distribution over vehicular networks
 Dual connectivity: cellular/short range
Some Lessons

 Novel hardware inspires systems research
    RDMA, TPM, Smart Phones, DSRC
 Offloading as principle of systems design
    Functionality, monitoring, policy enforcement, validation
 Pervasive computing and vehicular computing are
     Outdoors is not like indoors!
     Outdoor systems are hard to build, test and evaluate
 International collaboration is a professional and
   social exercise absolutely necessary for students

To top