Enabling an Energy-Efficient Future Internet Through Selectively Connected End System Mark Allman Ken Christensen Bruce Nordman Vern Paxson.

Slides:



Advertisements
Similar presentations
SKILLS LEARNED IN SCHOOL
Advertisements

Mobile Application Architectures
Operating System Security
Outlook 2007: Advanced Mail Management Western Connecticut State University presents:
Communication between clients and technicians January 2007, Alex Righolt.
New Supervisor: Skills for Success
Leveraging Good Intentions to Reduce Unwanted Network Traffic Marianne Shaw (U. Washington) USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on.
Work prepared: Karolina Baliunaite, Vytaute Gelezelyte of Klaipeda State College of Lithuania, 2013.
Time Management.  Time is a resource with a start and an end  Time goes by quickly  Time has no mercy  Time moves, doesn’t stop  Time can never be.
I102 User Support Week Four – Lab. Objectives  Effective Listening  Assessing Learners  Exercise – Learning Outcomes.
KEYS TO A SUCCESSFUL JOB SEARCH NWTC Career Services April 23,
MiLAN: Middleware to Support Sensor Network Applications Wendi B. Heinzelman, Amy L. Murphy, Hervaldo S. Carvalho, Mark A. Perillo University of Rochester.
Exercising More Frequently and Consistently By Jennifer XXX.
Game Design Serious Games Miikka Junnila.
Reviewing Papers: What Reviewers Look For Session 19 C507 Scientific Writing.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Enabling an Energy- Efficient Future Internet Through Selectively Connected End Systems Jim Spadaro and Ted Brockly.
Towards an Active Network Architecture – Critique Rejaie Johnson Gergely Biczok.
By Laura Trawin.
Leadership & Team Building
Dengktof Lpesnamtim Trogmdsxz Cemgopf Mencap logo.
Platforms for Learning in Computer Science July 28, 2005.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Habit – 5 Seek first to understand, then to be understood
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
E-consultation It is the use of electronic computing and communication technologies in consultation. This complements existing consultation.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Instructor:.  Reflect on your experience outlining and drafting your FINAL PROJECT essay.  What have you learned about your topic so far? What have.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Operational Issues – Lessons learnt So you want to do an Impact Evaluation… Luis ANDRES Lead Economist Sustainable Development Department South Asia Region.
How computers work Learning objective 2: Explain the four basic functions of a computer.
to Effective Conflict Resolution
S T A T I S T I K A U S T R I A We provide i n f o r m a t i o n
Listen and learn!. * “READ THE BOOKS. I don't understand why some kids think they can take a test on a book they have never read. That is actually crazy,
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
Best Practices in Partnering Julia King Tamang
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Reflection helps you articulate and think about your processes for communication. Reflection gives you an opportunity to consider your use of rhetorical.
How to Choose the Best Virtual Assistant Aftermarket Inception Computers & Graphics
 Computer freezes  Internet won’t connect  won’t work  Sound isn’t working  Program won’t run  Document won’t print And What Is the First.
Why should we talk about math?!?. Talking about our ideas can help us learn… Talking through our thinking can also help us clarify our own thoughts. If.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Click anywhere to start the presentation Business Etiquette.
Computer Science and Engineering - University of Notre Dame Jimmy Neutron CSE 40827/60827 – Ubiquitous Computing December 9, 2009 Project Presentation.
Listen and learn!. * “READ THE BOOKS. I don't understand why some kids think they can take a test on a book they have never read. That is actually crazy,
Review In the past three months we have discussed Hitlamdut, Behira Points and Anavah. I asked that you try to practice these by yourselves, discuss it.
Communication and Security in Machine-to-Machine Systems Date │ Reporter │ 李雅樺 1.
Introduction to Network Systems Security Mort Anvari.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
COMPUTER CONCEPTS Unit A: Computer and Internet Basics 1.
TOPIC 7 Coping ability in Various Situation INSTRUCTOR: SITI NOR BINTI YAACOB, PhD. KEL Development of A Resilient.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Magnus Areskoug, Ove Bayard, KTH Royal Institute of Technology Experience Transfer Model, a New Concept for Innovation Power Ove Bayard, Magnus.
Evaluation Questions. Evaluation – How well?  You are being asked how well or how effectively the writer has conveyed his ideas.  The question may use.
Leadership Unit Career & Family Leadership. Leadership = Relationships Past= leadership revolved around 1 person and their actions. Today= leadership.
How to Really Review Papers CS 8803 AIC. Prvulovic: CORD 2 Paper Reviewing Algorithm Read the paper Think about it Take a look at related work Leave it.
Leadership Style 101 What is Your Leadership Style?
DSMA 0393/1414 Comments of Students. Co-requisite Model Student Comments Students were given this request on their final examination: Write a statement.
10 Great Ways to Stop Procrastinating and Get More Done in Less Time Time Management Tips by Arman Sadeghi.
Welcome to How to Build Your Business and Win Clients Session 2 Marketing Approaches That Work for You Presented By: Ken Hablow KH Graphics.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Outline Basic concepts in computer security
Mobile ad hoc networking: imperatives and challenges
Computer Security Distributed System Security
How to Really Review Papers
What is the % of actual Words we hear during a conversation?
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

Enabling an Energy-Efficient Future Internet Through Selectively Connected End System Mark Allman Ken Christensen Bruce Nordman Vern Paxson

The title is “ Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems ”. It seems to be powerful, however, not systematical, Incomplete! The title is “ Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems ”. It seems to be powerful, however, not systematical, Incomplete! What the paper really did does not match the title. What the paper really did does not match the title.

The motivation is good, which realizes the energy conservation. But the proposed methodology (or technical content) does not make much sense. The motivation is good, which realizes the energy conservation. But the proposed methodology (or technical content) does not make much sense.

Many of today ’ s end systems have a “ wake on LAN ” functionality built in NIC about sleeping and wakeup. You argue that it is not enough, but what are your styles? Only On, Off, Sleeping? What is your merit? Many of today ’ s end systems have a “ wake on LAN ” functionality built in NIC about sleeping and wakeup. You argue that it is not enough, but what are your styles? Only On, Off, Sleeping? What is your merit?

Delay-Tolerant Networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in mobile or extreme environments that lack continuous network connectivity. Delay-Tolerant Networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in mobile or extreme environments that lack continuous network connectivity. DNT needs the reworking of how application use the network, but your proposed work need the rebuilt of network architecture. How do you evaluate the pros and cons? How can you convince others yours are better? DNT needs the reworking of how application use the network, but your proposed work need the rebuilt of network architecture. How do you evaluate the pros and cons? How can you convince others yours are better?

Assistant … Assistant?? Features include:  Insane clicking of mouse and keyboard  Punchable to release anger and stress  Press the SLEEP button when you leave your computer  Can carry out SIMPLE commands in Internet  Nuclear Powered – no need to consume energy  Able to tell others you are already asleep when you are actually having dinner  Drink your coffee for you

Assistant Seriously, the concept of assistant sounds magical, but it does NOT solve the problems faced by other mechanisms like Wake-On-LAN. Seriously, the concept of assistant sounds magical, but it does NOT solve the problems faced by other mechanisms like Wake-On-LAN. (too few or too many wake-ups? (too few or too many wake-ups? lack of connectivity?) lack of connectivity?)

Assistant It ’ s like someone appoints a secretary to do the preliminary work for all your business. But how can you be sure your business secrets will not be disclosed? How can you be sure she/he can handle all the unimportant business nicely? How will you know if she/he is using the title of your company to do some malicious things for others? It ’ s like someone appoints a secretary to do the preliminary work for all your business. But how can you be sure your business secrets will not be disclosed? How can you be sure she/he can handle all the unimportant business nicely? How will you know if she/he is using the title of your company to do some malicious things for others?

Assistant And if we are the your partner company, how can we trust what your secretary says if she/he just makes decision without even asking the boss? And how are we supposed to respond if your secretary keeps saying “ my boss is out of town TEMPORARILY ” forever? And if we are the your partner company, how can we trust what your secretary says if she/he just makes decision without even asking the boss? And how are we supposed to respond if your secretary keeps saying “ my boss is out of town TEMPORARILY ” forever? If one day every host all gets one assistant, will it cause result in a dramatic increase of traffic/processing time/ … ? If one day every host all gets one assistant, will it cause result in a dramatic increase of traffic/processing time/ … ?

Security How can end systems securely delegate tasks to assistants? How can end systems securely delegate tasks to assistants? How do remote hosts trust that an assistant indeed has authorization to act on behalf of an end system, and is not an imposter? How do remote hosts trust that an assistant indeed has authorization to act on behalf of an end system, and is not an imposter? How do we layer our use of cryptography mechanisms such that we can expose some portions of communications to assistants, while not exposing sensitive data to intermediaries? How do we layer our use of cryptography mechanisms such that we can expose some portions of communications to assistants, while not exposing sensitive data to intermediaries? To what degree do our generalized notions of soft state expose network elements to denial-of-service state-holding attacks? To what degree do our generalized notions of soft state expose network elements to denial-of-service state-holding attacks? If an adversary wishes to undermine the use of selective connectivity to conserve energy, to what degree will the resulting system be vulnerable to such “ denial-of-money ” attacks? If an adversary wishes to undermine the use of selective connectivity to conserve energy, to what degree will the resulting system be vulnerable to such “ denial-of-money ” attacks? … blablabla … … blablabla …

Security The authors ’ honesty is truly highly appreciated. The authors ’ honesty is truly highly appreciated. But should they consider these security flaws (or at least one or two of them) before they publish this paper? But should they consider these security flaws (or at least one or two of them) before they publish this paper? Are all those problems really solvable? Are all those problems really solvable? (assume set_of_solutions≠ Ф) Are the solutions difficult to implement? Are the solutions difficult to implement?

Security Network security is NOT a joke. Network security is NOT a joke.

Final Remarks The data looks frightening. But is the source reliable? The data looks frightening. But is the source reliable? How many people actually leave their computers turned on only for preserving network state? Or maybe they just do not have the habit to turn off the computer? How many people actually leave their computers turned on only for preserving network state? Or maybe they just do not have the habit to turn off the computer? If finally one day, the proposed plan can be widely accepted one day, who will ever turn off their computer again then? If finally one day, the proposed plan can be widely accepted one day, who will ever turn off their computer again then?

Final Remarks It ’ s great that the community starts to consider GO GREEN. It ’ s great that the community starts to consider GO GREEN. BUT, without reliable data, plausible initial experiment result, doable implementation steps and enough (or any) consideration for security, such a design can only stay on the paper … BUT, without reliable data, plausible initial experiment result, doable implementation steps and enough (or any) consideration for security, such a design can only stay on the paper …

Thanks for your attention! Questions?? Questions?? Comments?? Comments?? Presented by: Kai Chen and Shiqi Chen