Sponsored by Microsoft Research and NSF Privacy and the Participatory Sensor Web Tarek Abdelzaher, Mike Ward University of Illinois at Urbana Champaign.

Slides:



Advertisements
Similar presentations
Routing Routing in an internetwork is the process of directing the transmission of data across two connected networks. Bridges seem to do this function.
Advertisements

Your All in 1 Logistics Solution. The Problem Problems that your business might be facing Delivery delay / mistake Facilities are not used effectively.
Hub A hub is a device that connects PCs together All hubs Contain multiple access ports the hub simply forwards the packets to all the other devices connected.
Computer Networking Components Chad DuBose ~ Assignment #3 ~ LTEC
Jacques Bus, Head of Unit DG Information Society and Media EU-US Cooperation in Network and Information Security 17 Mar, 2008 – Yale, US.
Dispatch Software for MOTOTRBO
IBM TJ Watson Research Center © 2010 IBM Corporation – All Rights Reserved AFRL 2010 Anand Ranganathan Role of Stream Processing in Ad-Hoc Networks Where.
T24 Wireless Telemetry Advanced Intelligent Instrumentation.
C - V e T Campus Vehicular Testbed E. Giordano, A. Ghosh, G. Marfia, S. Ho, J.S. Park, PhD System Design: Giovanni Pau, PhD Advisor: Mario Gerla, PhD.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
A Guide to major network components
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Telehealth Equipment Enabling Successful Telehealth Encounters Endpoints, Protocols, Networks, Peripherals.
Network Devices BY JACKSON HARDESTY. Hubs  Hubs are a now outdated way of sending signals at layer 2 compared to switches.  Hubs are used primarily.
Automated Driver Testing System Objective  Standardize and automate the procedure of evaluating the driving skills of a driver  Eliminate subjective.
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
Barracuda Load Balancer Server Availability and Scalability.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
NETWORKING COMPONENTS By Cleve Rosser. Hubs allow large numbers of computers to be connected on a single or multiple LAN. Each computer plugs into the.
University of Virginia Wireless Sensor Networks August, 2006 University of Virginia Jack Stankovic.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Michelle Alexander Dr. Sanders Library 5050 Network and Networking.
Distributed Computing Rik Sarkar. Distributed Computing Old style: Use a computer for computation.
GROUP INVOLVED IN A WEB APPLICATION DEVELOPMENT Continue.
Security Testing Case Study 360logica Software Testing Services.
{ Microsoft OneNote Organizing Your Thoughts in the Cloud Presented by: Matthew Baker (321)
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Networking Components By: Timothy O’Grady. Ethernet Hub Ethernet hubs link PC’s and peripherals and allow them to communicate over networks. Data transferring.
Section 4.2 AQA Computing A2 © Nelson Thornes 2009 Types of Operating System Unit 3 Section 4.1.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Components of wireless LAN & Its connection to the Internet
Feng Zhao and Stewart Tansley Microsoft Research July 29, 2008.
ENABLING TECHNOLOGIES FOR 4G NETWORKS BY ADEL AL-SHAHRANI June 3, 2003.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
A Service-Based SLA Model HEPIX -- CERN May 6, 2008 Tony Chan -- BNL.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
Internet of Things. Creating Our Future Together.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Select appropriate hardware for building networks. Objective Course Weight 2%
Craig Farrell CTO Telecom IBM. Why to operators want SDN and NFV? Definitions SDN: Separate control/management & data plane of switches Centralization.
Matt Hornbrook James Beams
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Introduction to ns-2: “The” Network Simulator
Spring 2015 CSE 40437/60437 Prof. Dong Wang Summary
Protocols and networks in the TCP/IP model initially.
IoT Network Monitor.
3.2 Virtualisation.
Transfer of data in ICT systems
Virtual Private Servers – Types of Virtualization platforms Virtual Private ServersVirtual Private Servers, popularly known as VPS is considered one of.
Adhoc and Wireless Sensor Networks
Purpose: present the reasons for undertaking the topic
Selfish Misbehavior in Wireless Networks
AGMLAB Information Technologies
Action Web: Towards Viewing a Mobile World in the First Person
STATEL an easy way to transfer data
IT Management, Simplified
Smart Pet Sitter Background System Design Project Overview
Presentation transcript:

Sponsored by Microsoft Research and NSF Privacy and the Participatory Sensor Web Tarek Abdelzaher, Mike Ward University of Illinois at Urbana Champaign

Sponsored by Microsoft Research and NSF SensorMap – the Social Network of Mobile Sensors WWW  a gathering place for special interest social groups SensorMap  a gathering place for special interest data pools –Joggers sharing route and fitness data –Weight-watchers sharing weight-loss data –Drivers sharing GPS/speed data –Environmentalists sharing CO2 measurements –Biologists sharing instrumented animal biometrics –Chronic sinus patients sharing allergen counts

Sponsored by Microsoft Research and NSF SensorMap – the Social Network of Mobile Sensors WWW  a gathering place for special interest social groups SensorMap  a gathering place for special interest data pools –Joggers sharing route and fitness data –Weight-watchers sharing weight-loss data –Drivers sharing GPS/speed data –Environmentalists sharing CO2 measurements –Biologists sharing instrumented animal biometrics –Chronic sinus patients sharing allergen counts A Sensor Web is a Social Network

Sponsored by Microsoft Research and NSF User Application Information Distillation Services Privacy Firewall Information Distillation Layer Privacy Layer Storage Layer PUT GET POST Private Storage Server Internet-Ready Sensors and Data Gateways Custom Local Sensors Sensor Layer Custom Protocols

Sponsored by Microsoft Research and NSF User Application Information Distillation Services Privacy Firewall Information Distillation Layer Privacy Layer Storage Layer PUT GET POST Private Storage Server Internet-Ready Sensors and Data Gateways Custom Local Sensors Sensor Layer Custom Protocols Has home on SensorMap (Viewable by “Buddy list”) Has home on SensorMap (Publicly Viewable) Perturbation

Sponsored by Microsoft Research and NSF Application: Traffic Monitoring at UIUC Demo link: On SensorMap: Real speed data, noise added, and perturbed data of a single user Real versus reconstructed Community statistics Raghu Kiran, Nam Pham, Tarek Abdelzaher, “PoolView: Stream Privacy for Grassroots Participatory Sensing,” Sensys 2008.

Sponsored by Microsoft Research and NSF Continuous recordings of an animal’s vocalizations No effect of a person stalking the animal with a microphone Can be tracking using the Automated tracking system to determine its locations 1.3 gram continuous transmitters lasts 28 days Developing software radios to record signals from multiple sources simultaneously. Enormous amounts of data Microphone recording Used on feral cats to determine what they are eating from the “death screams” of their prey Application: Animal Tracking (by Mike Ward, UIUC)

Sponsored by Microsoft Research and NSF Feral cat eating dry cat food?? Most “feral cats” live closely with humans and some receive occasional food.