OPPORTUNITIES IN OPPORTUNISTIC COMPUTING Marco Conti, Italian National Research Council Mohan Kumar, University of Texas at Arlington RTLab. Kim Tae-Hyon.

Slides:



Advertisements
Similar presentations
What Is an Ad Hoc Network?
Advertisements

Workshop on Online Social Networks Microsoft Research Cambridge December 7, 2007.
Composite Device Computing Environment: A Framework for Situated Interaction Using Small Screen Devices Thai-Lai Pham, Georg Schneider, Stuart Goose and.
Some questions o What are the appropriate control philosophies for Complex Manufacturing systems? Why????Holonic Manufacturing system o Is Object -Oriented.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Group #1: Protocols for Wireless Mobile Environments.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Arsitektur Jaringan Terkini
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Electronic Commerce Semester 1 Term 1 Lecture 2. Forces Fuelling E-Commerce Interest in e-commerce is being fuelled by: –Economic forces –Customer interaction.
DAKNET Presented By: rreema.
Communication Networks A Second Course Jean Walrand Department of EECS University of California at Berkeley.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.
FI-WARE – Future Internet Core Platform FI-WARE Interface to Networks and Devices (I2ND) July 2011 High-level description.
SAP: STORAGE AWARE PROTOCOLS FOR HETEROGENEOUS NETWORKS Shweta Jain Assistant Professor Mathematics and Computer Science York College CUNY.
Xiaoyu Tong and Edith C.-H. Ngai Dept. of Information Technology, Uppsala University, Sweden A UBIQUITOUS PUBLISH/SUBSCRIBE PLATFORM FOR WIRELESS SENSOR.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Introduction to Delay Tolerant Networks Tzu-Chieh Tsai Department of Computer Science, National Cheng Chi University.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
1 National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN Architecture and Protocols 2nd MobileMAN.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
Challenged Networking An Experimental Study of New Protocols and Architectures Erik Nordström.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Wireless Networks Breakout Session Summary September 21, 2012.
Un peu de recherche…. 2 LIRIS/DCS/DRIM 3 Nostalgia: an overview of the past 10 years Some contributions to the management of data in grids Some contributions.
Looking ahead in Pervasive Computing: Challenges, Opportunities in the era of Cyber Physical Convergence Authors : Marco Conti, Sajal K. Das, Chatschik.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
The Digital Revolution and The Global E-Marketplace Chapter 25 Matakuliah: J0474 International Marketing Tahun: 2009.
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
1 Wireless Networks and Services 10 Years Down the Road Ross Murch Professor, Electronic and Computer Engineering Director, Centre for Wireless Information.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Chapter 17 Internetworking: Concepts, Architecture, and Protocols
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Introduction to Networked Robotics CS 643 Seminar on Advanced Robotics Wenzhe Li, Graduate Student Texas A&M University.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
COGNITIVE RADIO NETWORKING AND RENDEZVOUS Presented by Vinay chekuri.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
1. Nortel Confidential Information BUSINESS MADE SIMPLE 2 The Future of Telecommunications John A. Phillips Nortel, ETSI General Assembly Chairman 2007.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Event Based Routing In Delay Tolerant Networks Rohit Mullangi And Lakshmish Ramaswamy DTN is fundamentally an opportunistic network environment, where.
B. RAMMAMURTHY Connected Vehicle Technology 6/6/2014 cse651 1.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Security of the Internet of Things: perspectives and challenges
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
IMPROVING OF WIRELESS MESH NETWORKS.
Delay-Tolerant Networks (DTNs)
1st Draft for Defining IoT (1)
Ad Hoc and Sensor Networks
Mobile Computing.
Mobile ad hoc networking: imperatives and challenges
Next-generation Internet architecture
CSE 4340/5349 Mobile Systems Engineering
Presentation transcript:

OPPORTUNITIES IN OPPORTUNISTIC COMPUTING Marco Conti, Italian National Research Council Mohan Kumar, University of Texas at Arlington RTLab. Kim Tae-Hyon

Contents  1. OPPORTUNISM  2. BACKDROP  3. THE ENABLERS  4. OPPORTUNISTIC COMPUTING  5. RESEARCH ISSUES  6. APPLICATIONS

 When two devices come into contact, albeit opportunistically, it provides a great opportunity to match services to resources, exchange information, cyberforage, execute tasks remotely, and forward messages. BotFighters Love Getty The Core Concept

OPPORTUNISM  Technological advances are leading to a world replete with mobile and static sensors, user cell phones, and vehicles equipped with a variety of sensing and computing devices  Opportunistic computing opens an exciting avenue for research and development, one hitherto not fully exploited, and at the same time expands the potential of opportunistic networks for real-life application problems

OPPORTUNISM (Cont’)  Mobile cell phones with integrated technology such as Wi-Fi, cameras, Bluetooth, and other, similar capabilities along with embedded computing devices in moving vehicles and mobile and static sensory devices, including surveillance cameras and others are available worldwide at reasonable costs.  The widespread use of these devices creates a huge number of contact opportunities that are key to opportunistic communications

OPPORTUNISM (Cont’)  Analysts estimate that 3.3 billion people worldwide use cell phones a little more than half the world’s population  A conservative look at each cell phone’s processor reveals a performance figure of 100 MIPS and communication at 200 Kbps. Exploiting these opportunistic contacts gives the potential to perform approximately one quadrillion processing tasks, and exchange 1 peta byte of data per second.

OPPORTUNISM (Cont’)  Given the plethora of wired and wireless communication technologies, such as Wi-Fi, Bluetooth, cellular, and WiMax, along with device capabilities, opportunistic contacts among pairs of devices are the norm rather than a rarity  In effect, large-scale opportunistic computing, which can simply be defined as delay-tolerant distributed computing (DTDC), has tremendous potential

BACKDROP  ~ Mid-1990s  Computer Centric  Now  User Centric Computer User iPhone iPadMacBook User Omnia VLUU Paradigm Shift SENS

THE ENABLERS  Examples of the opportunistic network paradigm’s effectiveness  special-purpose  Sámi Network  general-purpose networking  Haggle project  Haggle is a new autonomic networking architecture designed to enable communication in the presence of intermittent network connectivity, which exploits autonomic opportunistic communications (i.e., in the absence of end-to-end communication infrastructures).

THE ENABLERS (Cont’) Server VS How about MANET?

THE ENABLERS (Cont’)  Legacy wired and wireless network architectures force human communications to follow network engineering paradigms.  Mobility management in MANETs exemplifies the engineering- centric approach in the design of self-organizing networks: Mobility is a challenge to cope with, and routing-protocol design focuses on building stable end-to-end paths, as do mobile nodes  Opportunistic networks represent the first attempt to close the gap between human and network behavior by taking a user-centric approach to networking and exploiting user nodes’ mobility as an opportunity rather than a challenge to improve data forwarding

THE ENABLERS (Cont’)  In opportunistic networks such as MANETs, the communication is multi hop, with intermediate nodes acting as routers that forward the messages addressed to other nodes. In this case, however, forwarding is not “on the fly” because intermediate nodes such as mobile relays store the messages when no forwarding opportunity exists for example, there are no other useful nodes in the transmission range and exploit any contact opportunity with other mobile devices to forward information. For this reason, developers refer to the forwarding paradigm as “store, carry, and forward.”  In opportunistic networks, the nodes’ mobility creates opportunities for communication, unlike MANETs, in which mobility is viewed as a disruption.

THE ENABLERS (Cont’)  In the literature, developers often refer to opportunistic networks as delay-tolerant networks. The DTN architecture and protocols are currently under study in the Internet Research Task Force’s Delay Tolerant Networking Research Group (  Anyway...  Opportunistic networking is a more general concept as it does not assume any compatibility with the Internet architecture  In opportunistic networks, route computations differ from those in traditional Internet- or MANET-routing algorithms

Data Forwarding in Disconnected Mobile Ad Hoc Networks  Luciana Pelusi, Andrea Passarella, and Marco Conti, IIT- CNR Flooding Epidemic Routing protocol Best Next Hop

THE ENABLERS (Cont’)  The Haggle project  Layerless Architecture  Implemented on mobile phones with the Windows Mobile OS  Metrosense project  Nokia mobile phones with the Symbian OS  Sensing devices and opportunistic carriers of the sensed information inside a city

THE ENABLERS (Cont’) This picture summarizes the basic ideas of the Socialnets project. By embedding the social relationships in the electronic world, we can identify at least two levels in an opportunistic environment: an electronic social network (in which relationships depend on the physical properties) and a virtual social network that builds an overlay atop the electronic social network Bubble Rap offers a promising forwarding protocol that tries to exploit the electronic social network idea to design effective opportunistic network protocols

THE ENABLERS (Cont’)  Studying and modeling human mobility is a research area that has attracted increasing attention. Mobility models based on social behavior represent an important tool for testing the performance of opportunistic systems. Further, a clear understanding of the properties that characterize user movements (such as for any couple of nodes, their contact times, and their inter contact times) provides a cornerstone to design efficient protocols

THE ENABLERS (Cont’)  Opportunistic computing can benefit from the ongoing and past research outcomes in pervasive and sensor systems, distributed and fault-tolerant computing, and mobile ad hoc networking  While electronic social network relationships provide key information for designing opportunistic network protocols, the virtual social network provides a basis for the development of opportunistic computing services. For example, information and services can be replicated and distributed inside the community’s electronic social network, taking into consideration its members’ interests and locations

BUBBLE Rap Each node belongs to at least one community. Here we allow single node communities to exist. Each node has a global ranking (i.e.global centrality) across the whole system, and also a local ranking within its local community. It may also belong to multiple communities and hence may have multiple local rankings.

OPPORTUNISTIC COMPUTING

OPPORTUNISTIC COMPUTING(Cont’)  Opportunistic networking requires a paradigm shift toward human-centric solutions to establish trust for interactions between peers.  Key Challenges  Intermittent connectivity  Delay tolerance  Heterogeneity.

RESEARCH ISSUES  Middleware services  Information management  Context awareness  Services and data placement and replication  Resource management  Trust, security, and privacy  Economic model and social cooperation  Mobile agents, remote execution, and cyberforaging

APPLICATIONS  Crisis management  Infomobility services and intelligent transportation systems  Pervasive healthcare