Context-awareness, cloudlets and the case for AP-embedded, anonymous computing Anthony LaMarca Associate Director Intel Labs Seattle.

Slides:



Advertisements
Similar presentations
Architecture and Algorithms for an IEEE 802
Advertisements

Vision & Way Forward The Internet took a long time to make it!
Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath, Alec Wolman.
Doc.: IEEE /001r0 Submission January 2003 Joe Houle, AT&TSlide 1 A Service Provider View of QoS Needs for Hot Spot and Public Venues Joe Houle.
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Multi-hop wireless networks Fact or fiction? Injong Rhee Department of Computer Science North Carolina State University.
Future Internet Assembly: THE REAL WORLD INTERNET Knowledge Café on Device Technologies The knowledge café on Device Technologies addresses the functional.
Network Systems Sales LLC
Salem Health Tech Talk – iPhones, Laptops and Rogue Devices, OH MY!
anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
White-Fi: What are the Applications ? By Akshay Sharma Research Director Communications Service Provider Technology - Gartner Feb 2012.
Real world application Corporate Wireless Networking Andrew Yeomans DrKW & Jericho Forum Board.
The case for VM based Cloudlets in Mobile Computing
Source: IEEE Pervasive Computing, Vol. 8, Issue.4, Oct.2009, pp. 14 – 23 Author: Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N. Adviser: Chia-Nian.
Mostafa Ammar, School of Computer Science Georgia Institute of Technology Atlanta, GA Mobile Computing in Cirrus Clouds: Mobile Computing in Cirrus Clouds:
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Doc.: IEEE /0898r2 Submission July 2012 Marc Emmelmann, FOKUSSlide 1 Fast Initial Service Discovery: An enabler for Self-Growing Date:
Embedded System Lab. What is an embedded systems? An embedded system is a computer system designed for specific control functions within a larger system,
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Gemplus and OSGI Benjamin Maury Gemplus Introduction  World Leader for Smart Card Solutions  Smart Solutions in Telecommunications  Beyond.
US Strategy Days /16/2017 7:46 PM Richard Moore Server & Tools Business Group Lead Microsoft Ireland ©2006 Microsoft.
Eyal de Lara Department of Computer Science University of Toronto.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
Eyal de Lara Department of Computer Science University of Toronto.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
CSI5175 Wireless and Mobile Electronic Commerce Networks and their Applications Mao Zhang Wireless Hotspots: Current Challenges and Future Directions.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
 Energy Results: Memory Assistant Arcade Game  Performance Results:  Response Time ▪ Memory assistant: 17.3 sec -> 1.5 sec ▪ Arcade game: 6 FPS -> 13.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
MOBILE CLOUD COMPUTING
© 2013 IBM Corporation Version 1.0 The New Eye Insight through Big Data and Analytics: A Case Study on Citizen Sentiment Analysis Sandipan Sarkar, Executive.
(Josef Noll) -> MasterThesis Masteroppgaver 2008 Josef Noll, Prof. stip. Mohammad M. R. Chowdhury, PhD student.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
SensIT PI Meeting, January 15-17, Self-Organizing Sensor Networks: Efficient Distributed Mechanisms Alvin S. Lim Computer Science and Software Engineering.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
ErdOS: An energy-aware social operating system Further Reading: (*) Narseo Vallina-Rodriguez, Pan Hui, Jon Crowcroft, Andrew Rice. “Exhausting Battery.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
Introduction to Mobile Computing -CSE 535 Fall 2007 Sandeep K. S. Gupta School of Computing and Informatics Arizona State University.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
Payment Systems. Payment Revolution 1970: Electronic Funds Transfer between banking industries 1980: Electronic Data Interchange (EDI) for e- commerce.
Dynamic VM Synthesis for Cloudlet -ISTC Retreat Poster- Kiryong Ha, Padmanabhan S Pillai, Mahadev Satyanarayanan.
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Why Wireless is Different Herb Little Research In Motion.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Mobile Computing and Wireless Networking
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
 Steve Craig  A Sacramento native and graduate of UC Davis  Over ten years experience working with web technologies  Associate Product Manager for.
Introduction to Mobile Computing -CSE 535 Fall 2010 Sandeep K. S. Gupta School of Computing, Informatics and Decision Systems Engineering Arizona State.
Office 365 Performance Management. Meet Paul Andrew Office 365 Technical Product Manager – Office 365 datacenter, networking, identity management.
Tackling I/O Issues 1 David Race 16 March 2010.
Mohit Gupta, Prashanth Mohan, Lenin Ravindranath.
Quantifying the Impact of Edge Computing on Mobile Applications
Dan Bieler, Principal Analyst
PowerApps and Microsoft Flow for Business Users
Mobile edge computing Report by Weiqing huang.
Mobile Agents.
Speaker: Jin-Wei Lin Advisor: Dr. Ho-Ting Wu
Mobile P2P Data Retrieval and Caching
Technical Capabilities
Presentation transcript:

Context-awareness, cloudlets and the case for AP-embedded, anonymous computing Anthony LaMarca Associate Director Intel Labs Seattle

Context Awareness Is driving the next generation of applications and services –Health & assisted living, advertising, gaming, travel, social networking, task assistance and education, etc… Is currently driven by low data rate sensors –Accelerometers, RFID and radio base station IDs, thermocouples, barometers, and capacitive sensors 2

The Future of Context Awareness SOA is not accurate or robust enough for many applications –Location: meters error, no pose or direction info –Activity: 20-40% error rates unless drastically limited in scope Next gen context aware solutions –High data rate sensors (Cameras and microphones) –Compute intensive (real time classification & online learning) –Interactive Puts huge pressure on mobile devices in terms of compute capacity, communication, and power budget 3

Supporting Mobile Context Awareness The Case for VM-based Cloudlets in Mobile Computing Satyanarayanan, Bahl, Caceres, Davies The cloud isnt the solution –Too much latency for real-time responsiveness (Internet2 mean RTT ms) Bring the cloud closer –Cloudlet: data center in a box One network hop from the client Shared with other nearby clients 4

Put the cloudlet into the Access Point n AP with a n-core CPU –Lots of cores with no power constraints one network hop away –Forms a natural rendezvous point between the cloud and the client Trusted by both parties and lies within trusted boundary of the client (AP in the home or coffee shop) –Leverage existing protocols for service discovery, encryption, billing and authentication with no extra overhead –Provides tight coupling between the network and the computation –Incremental deployment Today APs are added as business, home usage grow Cloudlet capabilities could be incrementally added with cloudlet-APs Low latency, high bandwidth

Challenges Providing mechanisms to guarantee execution integrity –Privacy: Client should trust that no sensitive data is retained –Correctness of execution: Clients and service provider should trust the correctness of the computation –Approach: Leverage trusted hardware primitives of Dynamic Root of Trust for Measurement (DRTM) and attestation Developing applications that span the client, AP and cloud –Seamless migration of execution between the client, AP and the cloud Supporting flexible business models –Give users access to proprietary algorithms in exchange for context –Provide micropayments to cloudlet owners in exchange for cycles –Broker connections between advertisers and customers based on conetxt 6