1 The Endeavour Expedition: Computing and Communications at the eXtremes Professor Randy H. Katz CS Division, EECS Department University of California,

Slides:



Advertisements
Similar presentations
Composite Device Computing Environment: A Framework for Situated Interaction Using Small Screen Devices Thai-Lai Pham, Georg Schneider, Stuart Goose and.
Advertisements

 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
1 The Endeavour Expedition: 21st Century Computing to the eXtreme Randy H. Katz, Principal Investigator EECS Department University of California, Berkeley.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Information Day on Embedded Systems - Call 5 Jens Schumacher The Product Avatar Concept as a Platform for Networked Embedded.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
Option 2: The Oceanic Data Utility: Global-Scale Persistent Storage John Kubiatowicz.
System Architecture for Extreme Devices David Culler U.C. Berkeley DARPA Meeting 9/21/1999.
1 The Endeavour Expedition: Computing and Communications at the eXtremes Professor Randy H. Katz IBM Research Visit 15 June Soda Hall.
1 Internet-Scale Systems Research Group (ISRG) Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division, EECS Department University.
1 Internet-Scale Systems Research Group (ISRG) Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division, EECS Department University.
Information Capture and Re-Use Joe Hellerstein. Scenario Ubiquitous computing is more than clients! –sensors and their data feeds are key –smart dust.
1 The Endeavour Expedition: Charting the Fluid Information Utility Randy H. Katz, Principal Investigator EECS Department University of California, Berkeley.
ICEBERG : Internet core for CEllular networks BEyond the thiRd Generation A research project at the University of California, Berkeley Randy H. Katz Anthony.
Think. Learn. Succeed. Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments Presented by: Ashirvad Naik April 20, 2010.
Option 2: The Oceanic Data Utility: Global-Scale Persistent Storage John Kubiatowicz.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
Towards I-Space Ninja Mini-Retreat June 11, 1997 David Culler, Steve Gribble, Mark Stemm, Matt Welsh Computer Science Division U.C. Berkeley.
1 The Endeavour Expedition: 21st Century Computing to the eXtreme Randy H. Katz, Principal Investigator EECS Department University of California, Berkeley.
1 Internet-Scale Systems Research Group Eric Brewer, David Culler, Anthony Joseph, Randy Katz, Steven McCanne Computer Science Division, EECS Department.
1 The Endeavour Expedition: Charting the Fluid Information Utility Randy H. Katz, Principal Investigator EECS Department University of California, Berkeley.
The Case for ICEBERG Integrated services from diverse networks-- “PANS” (Potentially Any Network Services) Service infrastructure that allows user level.
1 Adventures in TomorrowLand Randy H. Katz United Microelectronics Corporation Distinguished Professor and Chair, Electrical Engineering and Computer Science.
Finale’ cs294-8 Design of Deeply Networked Systems Spring 2000 David Culler & Randy Katz U.C. Berkeley
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Telegraph: An Adaptive Global- Scale Query Engine Joe Hellerstein.
1 Beyond Third Generation Cellular Networks: The Integration of Internet and Telephony Technology Prof. Randy H. Katz UC Berkeley AT&T Cambridge Laboratory.
Brewer’s Endeavor Goals Make the fluid infrastructure an extension of the Ninja services frameworkMake the fluid infrastructure an extension of the Ninja.
The Oceanic Data Utility: (OceanStore) Global-Scale Persistent Storage John Kubiatowicz.
Connecting the Invisible Extremes of Computing David Culler U.C. Berkeley Summer Inst. on Invisible Computing July,
1 The Endeavour Expedition: 21st Century Computing to the eXtreme Randy H. Katz, Principal Investigator EECS Department University of California, Berkeley.
1 Internet-Scale Systems Research Group (ISRG) Retreat Winter 2000 Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division, EECS.
Clusters Massive Cluster Gigabit Ethernet System Design for Vastly Diverse Devices David Culler U.C. Berkeley HP Visit 3/9/2000.
1 Internet-Scale Systems Research Group Eric Brewer, David Culler, Anthony Joseph, Randy Katz, Steven McCanne Computer Science Division, EECS Department.
1 Personal Activity Coordinator (PAC) Xia Hong UC Berkeley ISRG retreat 1/11/2000.
Streaming Data, Continuous Queries, and Adaptive Dataflow Michael Franklin UC Berkeley NRC June 2002.
1 The Endeavour Expedition: Computing and Communications at the eXtremes Professor Randy H. Katz CS Division, EECS Department University of California,
CS : Creating the Grid OS—A Computer Science Approach to Energy Problems David E. Culler, Randy H. Katz University of California, Berkeley August.
1 Internet-Scale Systems Research Group (ISRG) Eric Brewer, David Culler, Anthony Joseph, Randy Katz, Steven McCanne Computer Science Division, EECS Department.
Universal Berkeley Activities in the ISRG / Endeavour David Culler Randy Katz, Eric Brewer, Anthony Joseph, James Landay and others
Packing for the Expedition David Culler. 5/25/992 Ongoing Endeavors Millennium: building a large distributed experimental testbed –Berkeley Cluster Software.
Data-Intensive Systems Michael Franklin UC Berkeley
Internet-Scale Systems Research Group Eric Brewer David Culler Anthony Joseph Randy Katz Steven McCanne Computer Science Division University of California,
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
Hosted on the Powerful Microsoft Azure Platform, Advent Countdown Lets Companies Run Reliable and Scalable Holiday Marketing Campaigns MICROSOFT AZURE.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
NINJA. Project of UC Berkeley Computer Science Division Paper : The Ninja Architecture for Robust Internet-Scale Systems and Services
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
IPS Infrastructure Technological Overview of Work Done.
Societal-Scale Computing: The eXtremes Scalable, Available Internet Services Information Appliances Client Server Clusters Massive Cluster Gigabit Ethernet.
Axis AI Solves Challenges of Complex Data Extraction and Document Classification through Advanced Natural Language Processing and Machine Learning MICROSOFT.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
Option 2: The Oceanic Data Utility: Global-Scale Persistent Storage
Design Decisions / Lessons Learned
Internet-Scale Systems Research Group
Telegraph: An Adaptive Global-Scale Query Engine
Mobile Computing.
The Endeavour Expedition: Charting the Fluid Information Utility
Sensor Networks – Motes, Smart Spaces, and Beyond
Information Capture and Re-Use
Presentation transcript:

1 The Endeavour Expedition: Computing and Communications at the eXtremes Professor Randy H. Katz CS Division, EECS Department University of California, Berkeley Invited Presentation IBM PvCC2000 Conference

2 The eXtremes Scalable, Available Internet Services Information Appliances Client Server Clusters Massive Cluster Gigabit Ethernet MEMS The Very Large The Very Small New System Architectures New Enabled Applications Diverse, Connected, Physical

3 Presentation Outline Expedition Motivation –The Needed Revolution in Computing and Communications Packing for the Expedition –Project Organization Base Exploration plus Extended Expeditions New Century Distributed System Architecture Summary and Conclusions

4 Background PITAC Report: “Information Technology Research--Investing in Our Future” –Create a strategic initiative in long-term information technology R&D –Priorities: Software, Scalable Information Infrastructure, High-End Computing, Socioeconomic Impacts DARPA (and Industry) as Patron –Chart potential “revolutions” in information technology, with promise to achieve dramatic improvements in computing and applications in 21st Century –Technology discontinuities drive new computing paradigms, applications, system architectures »E.g., Project MAC, ARPAnet, Xerox Alto –What will drive the next discontinuity?

5 The Endeavour Expedition: Motivation and Goals Exploiting IT to enhance understanding –Make it dramatically more convenient for people to interact with information, devices, and other people –Supported by a “planetary-scale” Information Utility »Stress tested by challenging applications in decision making and learning »New methodologies for design, construction, and administration of systems of unprecedented scale and complexity –Figure of merit: how effectively we amplify and leverage human intellect Technical Approach: Pervasive Information Utility, based on “fluid systems,” enabling new approaches for problem solving & learning

6 Why “Endeavour”? To strive or reach; a serious determined effort (Webster’s 7th New Collegiate Dictionary); British spelling Captain Cook’s ship from his first voyage of exploration of the great unknown of his day: the southern Pacific Ocean ( ) –Brought more land and wealth to the British Empire than any military campaign –Cook’s lasting contribution: comprehensive knowledge of the people, customs, and ideas that lay across the sea –“He left nothing to his successors other than to marvel at the completeness of his work.” Software and resources as a fluid: pools, floods, rivers, eddies, containers,...

7 Signing On to the Expedition “Difficulties are just things to overcome.” "Men [and Women] wanted for Hazardous Journey. Small wages, bitter cold, long months of complete darkness, constant danger, safe return doubtful. Honour and recognition in case of success." –Sir Ernest Shackleton, Legendary Antarctic explorer who lost not a single person on two highly perilous expeditions to reach the South Pole (which he never reached!) Business UNusual: Research seminars, experimental courses, new synthesis of existing courses

8 Expedition Assumptions Human time and attention, not processing or storage, are the limiting factors Givens: –Vast diversity of computing devices (PDAs, cameras, displays, sensors, actuators, mobile robots, vehicles); No “average” device –Unlimited storage: everything that can be captured, digitized, and stored, will be –Every computing device is connected in proportion to its capacity –Devices are predominately compatible rather than incompatible (plug-and-play enabled by on-the-fly translation/adaptation) Tremendous innovations in technology; yet a comprehensive system architecture is lacking

9 Expedition Challenges Managing Attention is the Killer App –Not corporate processing but management, analysis, aggregation, dissemination, filtering for the individual Create Knowledge, not Data –Not management/retrieval of explicitly entered information, but automated extraction and organization of daily activities Information Technology as a Utility –Continuous service delivery, on a planetary-scale, on top of a highly dynamic information base Beyond the Desktop –Community computing: infer relationships among information, delegate control, establish authority

10 The Coming Revolution Evolution Information Appliances: Scaled down desktops, e.g., CarPC, PdaPC, etc. Evolved Desktops Servers: Scaled-up Desktops, Millennium Revolution Information Appliances: Many computers per person, MEMs, CCDs, LCDs, connectivity Servers: Integrated with comms infrastructure; Lots of computing in small footprint Display Keyboard Disk Mem  Proc PC Evolution Display Camera Smart Sensors Camera Smart Spaces Computing Revolution WAN Server, Mem, Disk Information Utility BANG! Display Mem Disk  Proc

11 Expedition Approach Information Devices –Beyond desktop computers to MEMS-sensors/actuators with capture/display to yield enhanced activity spaces Information Utility Information Applications –High Speed/Collaborative Decision Making and Learning –Augmented “Smart” Spaces: Rooms and Vehicles Design Methodology –User-centric Design with HW/SW Co-design; –Formal methods for safe and trustworthy decomposable and reusable components “Fluid”, Network-Centric System Software –Partitioning and management of state between soft and persistent state –Data processing placement and movement –Component discovery and negotiation –Flexible capture, self- organization, and re-use of information

12 Information Utility Information Devices Applications Collaboration Spaces High Speed Decision Making Learning Classroom Info Appliances E-BookVehicles PDA Handset Laptop Camera Smartboard MEMS Sensor/Actuator/Locator Wallmount Display Generalized UI Support Proxy Agents Human Activity Capture Event Modeling Transcoding, Filtering, Aggregating Statistical Processing/Inference Negotiated APIsSelf-Organizing Data Interface ContractsWide-area Search & Index Nomadic Data & Processing Automated Duplication Distributed Cache Management Wide-Area Data & Processing Movement & Positioning Stream- and Path-Oriented Processing & Data Mgmt Non-Blocking RMISoft-/Hard-State Partitioning

13 The Endeavournauts: Interdisciplinary, Technology- Centered Expedition Team Eric Brewer, OS John Canny, AI David Culler, OS/Arch Michael Franklin, DB Joseph Hellerstein, DB Anthony Joseph, OS Randy Katz, Nets John Kubiatowicz, Arch James Landay, UI David Patterson, Arch Kris Pister, Mems Larry Rowe, MM Doug Tygar, Security Robert Wilensky, DL/AI

14 Organization: The Expedition Cube Information Devices Information Utility Applications DesIgnDesIgn MethodologyMethodology MEMS Sensors/Actuators, Smart Dust, Radio Tags, Cameras, Displays, Communicators, PDAs Fluid Software, Cooperating Components, Diverse Device Support, Sensor-Centric Data Mgmt, Always Available, Tacit Information Exploitation (event modeling) Rapid Decision Making, Learning, Smart Spaces: Collaboration Rooms, Classrooms, Vehicles Base Program Option 1: Sys Arch for Diverse Devices Option 2: Oceanic Data Utility Option 4: Negotiation Arch for Cooperation Option 5: Tacit Knowledge Infrastructure Option 6: Classroom Testbed Option 7: Scalable Safe Component-Based Design Option 3: Capture and Re-Use

15 Base Expedition Broad but necessarily shallow investigation into all technologies/applications of interest –Primary focus on Information Utility »No new HW design: commercially available information devices »Only small-scale testbed in Soda Hall –Fundamental enabling technologies for Fluid Software »Partitioning and management of state between soft and persistent state »Data and processing placement and movement »Component discovery and negotiation »Flexible capture, self-organization, info re-use –Limited Applications –Methodology: Formal Methods & User-Centered Design

16 System Architecture for Vastly Diverse Devices Design Issues for “Small Device OS” –Current: managing address spaces,thread scheduling, IP stack, windowing system, device drivers, file system, APIs, power management –How can OSs for tiny devices be made radically simpler, manageable, and automatically composable? Devices of Interest: Dust Motes

17 Prototype Dust Mote

18 Servers Clients Servers Infrastructure Services Open “The Large”: Service-Centric Platform Arch Enable distributed creation/deployment of scalable, available services – Service registry, aggregate execution env., transparency – Persistent distributed data structures – Massive fluid storage (“Oceanic” Storage) – Adaptive high-bandwidth flows (rivers) Build infrastructure via composition of services

19 “The Small”: Radically Simple OS for Management & Composition Basic Assumptions: –Communication is fundamental –Direct “user interface” is the exception not the norm –Critical resource is scheduling data movements, not arbitrary threads of computation Tiny OS: Little more than an FSM –Commands: event stream merged with sensor/actuator events –General thread compiled to sequence of bounded atomic xacts –Constant self-checking and telemetry –Rely on the infrastructure for complex processing Correctness-by-construction techniques for cooperating FSMs (tie in to HW/SW co-design)

20 Pac Bell IBM AT&T Canadian OceanStore IBM Sprint Implementation & Deployment of Oceanic Data Info Utility Ubiquitous devices require ubiquitous storage –Consumers of data move, change access devices, work in many different physical places, etc. Needed properties: –Strong Security –Coherence –Automatic replica management and optimization –Simple and automatic recovery from disasters –Utility model Confederations of (Mutually Suspicious) Utilities

21 OceanStore Architecture/Technology Name and Data Location –Issue: Find nearby data without global communication –Approach: Data location is aform of gradient-search of local pools of data (use of attenuated Bloom-filters) High Availability and Disaster Recovery –Issue: Eliminate backup as independent/fallible technology –Approach: Erasure-codes/mobile replicas provide stable storage for archival copies and snapshots of live data Introspective Monitoring and Optimization –Issue: Optimize performance on a global scale –Approach: Monitoring and analysis of access/usage relationships Rapid Update in Untrusted Infrastructure –Issue: Updates should not reveal info to untrusted servers –Approach: Incremental cryptographic techniques/oblivious function techniques to perform update

22 Sensor-Centric Data Management for Capture/Reuse Managing Data Floods –Never ends: interactive direction –Big: data reduction/aggregation –Unpredictable: scale of devices and nets not behave nicely Builds on CONTROL and River/Eddy System –Early answers, interactivity, online aggregation –Information processing via massively parallel, adaptive dataflows –Extended to wide-area: operator placement, reordering Telegraph Data Manager –Distributed Storage Manager based on event flow and state machines –Continuously adaptive dataflow with applications to sensor data and streaming media

23 Negotiation Architecture for Cooperating Components Cooperating Components –Self-administration through auto-discovery and configuration among confederated components –Less brittle/more adaptive systems Negotiation Architecture –Components announce their needs and services –Service discovery and rendezvous mechanisms to initiate confederations –Negotiated/contractural APIs: contract designing agents –Compliance monitoring/renegotiation/non- compliance recovery –Graceful degradation in response to environmental changes

24 Tacit Knowledge Infrastructure and Collaborative Applications Exploit information about the flow of information to improve collaborative work –Capture, organize, and place tacit information for most effective use –Learning techniques: infer communications flow, indirect relationships, availability/participation to enhance awareness and support opportunistic decision making New applications –3D “activity spaces” for representing decision- making activities, people, & information sources –Visual cues to denote strength of ties between agents, awareness levels, activity tracking, & attention span –Electronic Problem-based Learning in Enhanced Physical and Virtual Learning Spaces Display Camera Smart Sensors Camera Smart Spaces

25 User Interfaces and Design Tools Future devices won’t have PC-style UI –Extreme range of devices »Small or embedded in environment »Often w/ “alternative” I/O & w/o screens »Special purpose applications, e.g., Info Appliances –Lots of devices per user, all working in concert Key Technologies –Tacit information analysis algorithms –Design tools that integrate »“Sketching” & other low-fidelity techniques »Immediate context & tacit information »Interface models

26 Safe Component Design Correctness by Construction –Safe partitionings of communicating subcomponents placed in wide-area –Builds on on-going work in embedded systems design Compositions of Third Party Components –Safety enforcement technologies –Design and development methodologies –Builds on Necula’s Proof Carrying Code Trust and Assurance –Integrated use of secure tokens for rights management, economic protocols/auctions, support for mobile code,... –Secure protocol design & deployment based on super-fast model-checking/automatic generation from requirements

27 Experimental Testbeds Network Infrastructure GSM BTS Millennium Cluster WLAN / Bluetooth Pager IBM WorkPad CF788 MC-16 Motorola Pagewriter 2000 Velo Adaptive Broadband LMDS H.323 GW Nino Smart Classrooms Audio/Video Capture Rooms Pervasive Computing Lab CoLab Soda Hall CalRen/Internet2/NGI Smart Dust LCD Displays Wearable Displays

28 Putting It Together 1. eXtreme Devices 2. Data Utility 3. Capture/Reuse 4. Negotiation 5. Tacit Knowledge 6. Classroom 7. Design Methods 8. Scale-up Devices Utility Applications Fluid Software Info Extract/Re-use Decision Making Group Learning Component Discovery & Negotiation Self-Organization

29 Evolution of “A Project of Projects” ICEBERG Computer-Telephony Integration Service Creation ICEBERG Computer-Telephony Integration Service Creation Millennium Campus-Area Distributed Clusters Millennium Campus-Area Distributed Clusters NINJA Scalable, Secure Services in the Network NINJA Scalable, Secure Services in the Network Endeavour Post-PC Explorations Vastly Diverse Devices Oceanic Data Utility Sensor-Centric Data Mgmt Negotiation Architecture Tacit Knowledge I/F Intelligent Classrooms Design Methods Endeavour Post-PC Explorations Vastly Diverse Devices Oceanic Data Utility Sensor-Centric Data Mgmt Negotiation Architecture Tacit Knowledge I/F Intelligent Classrooms Design Methods

30 Millennium Goals Enable major advances in Computational Science and Engineering –Simulation, Modeling, and Information Processing becoming ubiquitous Explore novel design techniques for large, complex systems –Fundamental Computer Science problems ahead are problems of scale –Computational Economy: decentralized resource allocation based on perceived value Develop fundamentally better ways of assimilating and interacting with large volumes of information –and with each other Explore emerging technologies –networking, OS, devices

31 Campus-wide Millennium Testbed PDAs Cell Phones Future Devices Wireless Infrastructure Gigabit Ethernet Desktop PCs Servers Clusters Massive Cluster

32 Ninja Goals Create a framework that enables programmatic generation and composition of services from strongly typed reusable components Key Elements –Structured architecture with a careful partitioning of state »Bases, Active Proxies, and Units –Wide-area paths formed out of strongly-typed components »Operators and Connectors –Execution environments with efficient, but powerful communication primitives »Active Messages + capsules »TACC + persistence + customization

33 Bases (1M’s) –scalable, highly available –persistent state (safe) –databases, agents –“home” base per user –service programming environment Wide-Area Path Active Proxies (100M’s) –not packet routers, may be active networking nodes –bootstrap thin devices into infrastructure –soft-state and well-connected NINJA Distributed Computing Platform Units (1B’s) –sensors / actuators –PDAs / smartphones / PCs –heterogeneous –Minimal functionality: “Smart Clients” Jini devices

34 ICEBERG Goals Demonstrate ease of new service deployment –Packet voice for computer-telephony integration –Speech- and location-enabled applications –Complete interoperation of speech, text, fax/image across the four P’s: PDAs, pads, pagers, phones) –Mobility and generalized routing redirection Demonstrate new system architecture to support innovative applications –Personal Information Management »Universal In-box: , news, fax, voice mail »Notification redirection: e.g., , pager –Home networking and control of “smart” spaces, sensor/actuator integration »Build on experience with A/V equipped rooms in Soda Hall

35 Policy-based Location-based Activity-based Empower users! Speech-to-Text Speech-to-Voice Attached- Call-to-Pager/ Notification -to-Speech All compositions of the above! Universal Inbox ICEBERG: Transparent Information Access

36 Evolution of a “Project of Projects” OceanStore Distributed, Redundant Storage OceanStore Distributed, Redundant Storage Data Recharging Mobile and Disconnected Access to Information Data Recharging Mobile and Disconnected Access to Information Telegraph Scalable Data/Information Processing Telegraph Scalable Data/Information Processing Endeavour Post-PC Explorations Vastly Diverse Devices Oceanic Data Utility Sensor-Centric Data Mgmt Negotiation Architecture Tacit Knowledge I/F Intelligent Classrooms Design Methods Endeavour Post-PC Explorations Vastly Diverse Devices Oceanic Data Utility Sensor-Centric Data Mgmt Negotiation Architecture Tacit Knowledge I/F Intelligent Classrooms Design Methods

37 Millennium: “Cluster of Clusters” Scalable Processing Environment Ninja: Java-Based Scalable, Fault Tolerate, Available Service Execution Environment Subproject Dependencies Tiny OS Ad Hoc Wireless Networking “Dust Motes” Telegraph: Cluster-based Storage Manager, Scalable Query Processing, Federated Service Providers, Internet-scale Service Discovery ICEBERG: Wide-Area Service Creation/Mgmt for Computer-Telephony Integration OceanStore: Distributed Storage Manager, Untrusted Service Providers, Service Discovery, Introspection Smart Spaces Learning Environments Data Charging/Decoupled Access Context-Aware Group Scheduling and Group Activity Management Applications

38 Dust Motes Tiny OS Wireless/Pwr Aware Ad Hoc Networking Cluster Servers (Millennium) Communicators Wireless LAN System Area Network Concurrency Mgmt Resource Mgmt Storage Manager Flow-oriented QP Device-Specific Access Network “Core” Wide-Area Network Performance Measurement and Monitoring Wide-Area Services: Discovery, Mobility, Trust, Availability Adaptation Services: Introspection, Tacit Information Extraction/Organization Context-Awareness Services: Activity Tracking/Coordination, Preferences Specification/Interpretation OceanStore File Management Telegraph Data Federation ICEBERG Service Mobility Data Recharging Info Distribution Prototype Applications: Universal In-Box, Context-Aware UI, Group Collaboration

39 Summary and Conclusions 21st Century Computing –Making people’s exploitation of information more effective –Encompassing eXtreme diversity, distribution, and scale –Computing you can depend on Key Support Technologies –“Fluid software” computational paradigms –System and UI support for eXtreme devices –Pervasive, planetary-scale system utility functionality –Active, adaptive, safe and trusted components –New “power tool” applications that leverage community activity Broad multidisciplinary team spanning the needed applications, evaluation, and system technology skills –Culture of large-scale, industry-relevant high impact research projects

40 Summary and Conclusions Emerging Network-centric Distributed Architecture spanning processing and access Open, composable services architecture--the wide-area “operating system” of the 21st Century Beyond the desktop PC: information appliances supported by infrastructure services--multicast real- time media plus proxies for any-to-any format translation and delivery to diverse devices Common network core: optimized for data, based on IP, enabling packetized voice, supporting user, terminal, and service mobility New capability and applications focus: MEMS devices, sensor applications, smart spaces, tacit info extraction