Welcome to Rutgers! - Disco Lab

Download Report

Transcript Welcome to Rutgers! - Disco Lab

Welcome to Rutgers!
1st Rutgers-Helsinki Ph.D. Student
Workshop on Spontaneous Networking
Liviu Iftode
Department of Computer Science
Rutgers University
My talk…
 Proto-History
 Workshop Overview
 Disco Lab
The time before the workshop
 Jan 2004, ANWIRE Winter School on Middleware in
Cyprus (organized by M. Dikaiakos): meeting Oriana
 Summer 2004: Oriana intern in Disco Lab
 October 2004: NSF supplemental award for
international collaboration
 August 2005: visit to University of Helsinki
 November 2005: Kimmo at Rutgers
Spontaneous Networking
 Services over ad-hoc networks
 An application-oriented approach to ad-hoc
networking
 Location-awareness
 Loosely defined boundaries
 Unplanned networks, unexpected users
 Examples
 Ad-hoc networks of smart phones
 Vehicular networks
Monday, May 8, 2006
 9:30 am - 10:30 am
Welcome
 Dr. Liviu Iftode (Rutgers University) and Dr. Kimmo Raatikainen
(University of Helsinki)
 10:30 am - 11:00 am
 11:00 am - 12:00 pm
Break
Keynote Address
 Future Trends in Wireless Technology and the Path to Pervasive
Computing - Dr. Dipankar Raychaudhuri (WINLAB Director, Rutgers
University)
 12:00 pm - 1:30 pm
 1:30 pm - 3:00 pm
Lunch
Session I
 Binary Serialization of XML for Small Devices - Jaakko Kangasharju
(University of Helsinki)
 File Synchronization with Syxaw in an Ad Hoc Network (Work-inprogress Report) - Tancred Lindholm (University of Helsinki, Finland)
 3:00 pm - 3:30 pm
 3:30 pm - 5:00 pm
Break
Session II
 Mobility Control for Throughput Maximization in Ad Hoc Networks -
Dr. Tamer Nadeem (Siemens)
 Suppressing Attacks at the Originators: Trusted Remote Policy
Enforcement in Ad Hoc Networks - Gang Xu (Rutgers University)
Tuesday, May 9, 2006
 9:30 am- 10:00 am
Opening Remarks
 Dr. Haym Hirsh (DCS Chair., Rutgers University)
 10:00 am - 10:30 am
 10:30 am - 12:00 pm
Break
Session I
 Fuego Event Service: Towards Modularity in Event Routing - Sasu
Tarkoma (University of Helsinki, Finland)
 Distributed Optimization in Networks - Elisa Schaeffer (University of
Helsinki, Finland)
 12:00 pm - 1:30 pm
 1:30 pm - 3:00 pm
Lunch
Session II
 Information Flow Control for Location-Based Services - Nishkam Ravi
(Rutgers University, CS)
 Privacy of Anonymous Location Sampling Techniques: A Traffic
Monitoring Case Study - Baik Hoh (Rutgers University, EE/WINLAB)
 3:00 pm - 3:30 pm
 3:30 pm - 5:00 pm
Break / Demo Camera Phones (Disco Lab)
Session III
 A Multipath Routing Architecture for Background Transfers -
Aniruddha Bohra (Rutgers University, CS)
 Byzantine Fault Tolerant Public Key Authentication in Peer-to-Peer
Systems - Vivek Pathak (Rutgers University, CS)
Wednesday, May 10, 2006
 9:30 am - 11:45 am
Session I
 Outdoor Distributed Computing - Dr. Cristian Borcea (New Jersey
Institute of Technology)
 Context-Aware Migratory Services in Ad Hoc Networks - Oriana Riva
(University of Helsinki, Finland)
 Extending Component-Based Software Architecture with ContextAwareness and Beyond - Michael Przybilski (University of Helsinki,
Finland)
 12:00 pm - 1:30 pm
 1:30 pm - 3:00 pm
Lunch
Session II
 ORBIT: Open-Access Research Testbed for Next-Generation Wireless
Networks - Pandurang Kamat (Rutgers University, CS/WINLAB)
 Designing an Inter-Vehicular Network Stack for Car-to-Car
Communication - Pravin Shankar (Rutgers University,CS)
 3:00 pm - 3:30 pm
TrafficView Demo (CS/Disco Lab)
 CoRE Building Parking Lot
 4:00 pm - 5:00 pm
ORBIT Tour - WINLAB
Friday, May 12, 2006
 9:30 am - 10:30 am
Programming Ad Hoc Networks of
Mobile Devices - Dr. Ulrich Kremer and Adrian Stere (Rutgers
University, CS)
 10:30 am - 11:00 am Break
 11:00 am - 12:30 pm Session I - Potpourri Session
 Application-Specific Compression for Remote Visualization of
Genomics Applications - Lars Ailo Bongo (University of Tromso,
Norway)
 Towards Automated Detection and Containment of Rootkit Attacks
- Arati Baliga (Rutgers University, CS)
 FileWall: Implementing File Access Policies Using Access Context
- Stephen Smaldone (Rutgers University, CS)
 12:30 pm - 2:00 pm
 2:00 pm - 3:00 pm
Lunch
Disco Lab – Helsinki Meeting (Core B)
Workshop Speakers
 Rutgers, Computer Science
 Disco Lab
 Power and Energy Management Lab (EEL)
 University of Helsinki, Computer Science
 Rutgers., WINLAB/ Electrical and Computer
Engineering
 New Jersey Institute of Technology
 Siemens Corporate Research, Inc.
 University of Tromso, Norway
Distributed Computing Laboratory
 Created in 1998
 One faculty, ten graduate students
 Five active projects
 Three active NSF grants ($2.1 Million)
 Three industrial collaborations
 Network Appliance, Inc
 Siemens Corporate Research, Inc
 VMware, Inc
 International Collaboration
 INRIA/IRISA Rennes, UPC Barcelona, University Paris 6, University of
Helsinki, Technical University of Bucharest
 Three joint workshops: Rennes (Dec 2005), Rutgers (May 2006), Paris
(June 2006)
 Six foreign graduate students visited Disco Lab in 2006!
 Graduate/Light Seminars: Network-Centric Systems, Self-Healing,
Vehicular Computing and Networking, Intrusion Detection
Network-Centric Systems
 Promising border-crossing systems research area
 Networking has moved from periphery to center
 Dictates performance
 Limits availability
 Makes programmability difficult
 Opens software vulnerabilities to attacks
 Networking has become the main
challenge/obstacle/opportunity for systems research
 Wide range of network-centric systems, from network
servers to pervasive systems
Disco Lab Project Areas
 Server Networking Performance
 Service Availability
 Remote Healing
 Defensive Architectures
 Distributed Embedded Systems
 Pervasive Computing using Smart Phones
 Vehicular Computing Systems
Server Networking Performance
 Execution of traditional TCP/IP protocol stack
dominates the server overhead
 Two approaches to reduce transport protocol impact
on server performance: offload or make it lighter
 Offloading TCP: TCP Servers
 Lightweight transport (Remote DMA): MemoryMapped User-Level NFS over RDMA
 Collaboration with Network Appliance, Inc
Service Availability
 For the client, server availability is not enough
 How to provide end-to-end service availability?
 Migratory TCP
 Migrate server end-point of live connection
 Service Continuations
 Migrate service sessions between cooperative servers
running the same service
Remote Healing
 Traditionally, recovery from OS failures means
reboot
 How to access memory when OS is unavailable?
 Backdoor
 Trusted I/O device that can execute remote memory
operations without involving local OS/CPU
 I-NIC (e.g. Myrinet) supporting R-DMA operations
 Remote Monitoring
 Sensor Box
 Remote Repairing
 Repare remote OS state
 Remote Recovery
 Recover service sessions from a failed OS
Defensive Architectures
 From OS failures to compromised OS
 Once OS is compromised, the attack is hard to detect and even
harder to contain
 How to do intrusion detection+containment automatically?
 Defensive Architectures use trusted entities to monitor system
integrity and/or enforce access policies
 A priviledged VM: Paladine
 A TPM-based service code monitor: Satem
 Interposed between client and file server: FileWall
 Continuous Monitoring
 Discrete detection remains vulnerable
 Continuous invariant checking
 Cooperative Monitoring
 Cooperative detection
 Cooperative Continuous Monitoring
 Continuous checking of distributed invariants
Distributed Embedded Systems
 We know how to program distributed systems with
stable configuration and reliable networking
 We do not know how to program large and dynamic
networks of embedded systems
 Execution migration and self-routing
 Smart Messages
 High-level distributed models for programming
embedded systems in the physical space
 Spatial Programming
 Spatial Views (EEL in collaboration with Disco Lab)
Pervasive Computing using Smart
Phones
 Smart phone
 the first device that enables pervasive computing and
makes undergraduate students happy
 Smiles project
 Exploit dual connectivity for service provisioning
 Indoor localization using camera phones (Demo!)
 Privacy guarantees in location-based services
 Next generation: Smart phone + iPod
 Low-bandwidth continuous connectivity is a form of
weak connectivity
 Coda on smart phones?
Vehicular Computing Systems
 Make mobile ad-hoc networks real and real-time!
 Dedicated Short Range Communications (DSRC) for V2V
communication
 What are the killer applications?
 Near view for active accident avoidance: TrafficView
 Far-view for automobile congestion detection/avoidance and
route planning
 TrafficView: one of the first outdoor experiments with a real
vehicular computing system (Demo!)
 Security concerns: Trust and Privacy

Probabilistic validation of aggregated traffic data
 Content-distribution over vehicular networks
 Dual connectivity: cellular/short range
Some Lessons
 Novel hardware inspires systems research
 RDMA, TPM, Smart Phones, DSRC
 Offloading as principle of systems design
 Functionality, monitoring, policy enforcement, validation
 Pervasive computing and vehicular computing are
coming
 Outdoors is not like indoors!
 Outdoor systems are hard to build, test and evaluate
 International collaboration is a professional and
social exercise absolutely necessary for students