Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

The Case For Technology in Developing Regions By: Eric Brewer, Mathew Kam Sonesh Surana etc. University of California at Berkeley ICT4D-CS761 1 Jitendra.
SSIA SUMMIT October 2014 Advanced Bridging Technologies Hold Key to Finally Making Smart Homes a Reality Fred Dart – FTDI Chip.
Networking: A Key Driver for Globalization Krishan K. Sabnani Networking Research, Bell Labs August 27, 2007.
What is Wireless LAN? Mika Setälä Chairman, HiperLAN/2 Global Forum Marketing Working Group And what it is not!
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
The Internet and Politics Agenda for Today  Course changes  Development projects  Discussion.
Internet, Intranet and Extranets
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Save the World! What’s appropriate for global networking?
IT for Developing Regions Prof. Eric A. Brewer UC Berkeley NEST Retreat June 17, 2003.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
The Internet & The New IT Infrastructure Chapter 9.
SeeTest Network Virtualization
4G Technology Presented By Nithin Raj. 4G Definition 4G is not one defined technology or standard, but rather a collection of technologies at creating.
Osteolepiform fish Ichthyostega Acanthostega Evolution of Tetrapods – wonderful example of transitional forms.
Digital Inclusion Research: A Global Survey Tom Healy Lead Program Manager John SanGiovanni Program Manager, External Research and Programs Microsoft Research.
Survey of Data Network Infrastructure Options for Rural Areas A Platform for Asynchronous Messaging Team Members: Stephane Guerraz, Sukun Kim, Adam Ludwin,
Big Infrastructure, Small Clients Prof. Eric A. Brewer
The Case for Technology for Emerging Regions Prof. Eric A. Brewer UC Berkeley Columbia University October 22, 2003.
DAKNET Presented By: rreema.
Post-PC Summary Prof. Eric A. Brewer
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
SeeTest Network Virtualization. End-to-End Suite of Tools for iOS, Android, BlackBerry & Windows Phone Automation tools for 24/7 testing and monitoring.
WAN Technology Overview Lecture 3: Introduction to WAN.
Introduction to Computers
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Jaime Robertson-Lavalle VP Business Development, Intel Dialogic Director of Strategic Investments, Intel Capital “Opening The Public Network” Voice - an.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Wireless Ad-Hoc Networks
Computing Fundamentals Module Lesson 1 — What Is A Computer?
Exploring the Internet with IE51 Chapter 1 Welcome to Cyberspace: The Internet And The World Wide Web By Gretchen Marx.
Unit 4- Networks, Printers, Monitors.  Identify what a network is.  Describe the benefits of a network.  Identify ways to connect to a network.  Compare.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
The Internet. Network - Collection of computers and devices connected together via communications devices Internet - Worldwide collection of networks.
Welcome! Stands for integration.  Cronus eBusiness Delivers Internet Protocol Contact Center Solutions  Speaker: Laurentiu Zanca.
Networking Components By: Timothy O’Grady. Ethernet Hub Ethernet hubs link PC’s and peripherals and allow them to communicate over networks. Data transferring.
C5- IT Infrastructure and Emerging Technologies. Input – Process - Output 2 A computer  Takes data as input  Processes it  Outputs information CPU.
Risk Management. What we offer? We provide IP video monitoring solutions for safety and security through our systems integration capabilities.
Chapter 7 Mobile Commerce— The Business of Time
Mobile website designing is one of the latest emerging technologies which are capable to be fit for wide range of devices. Line Focus delivers highly.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Teaching and Learning with Technology ck to edit Master title style  Allyn and Bacon 2002 Teaching and Learning with Technology k to edit Master title.
Copyright (c) 2003 by Prentice Hall. All rights reserved. Understanding the Internet CHAPTER ONE How the Internet is Changing the World.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Computing Fundamentals Module Lesson 1 — Introducing Computers Computer Literacy BASICS.
Internet of Things (Ref: Slideshare)
Introducing… Conferencing Manager. Agenda Citrix MetaFrame Conferencing Manager Solving business challenges Value to our channel Citrix MetaFrame Conferencing.
G041: Lecture 08 ICT Infrastructure Used By Organisations Mr C Johnston ICT Teacher
DAKNET Presentation By: Aishwarya Patil Under the guidance of Prof. Shivkumar K. 1.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
COMP1321 Digital Infrastructure Richard Henson March 2016.
A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected.
Internet of Things. Creating Our Future Together.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
DakNet (WIRELESS TECHNOLOGY). What do you do when you want to provide Digital communication services Voice mail Digital documents Isolated Villages.
ZigBee
March 2009 Sipera Overview. 2 © 2009 Sipera Systems, Inc. All Rights Reserved. About Sipera  Leader in real-time Unified Communications (UC) security.
Survey of Data Network Infrastructure Options for Rural Areas
Internet, Intranet and Extranets
Types of Internet Access
Ultra Wideband Technology
Internet, Intranet and Extranets
PREPARED BY: RIDDHI PATEL (09CE085)
Presentation transcript:

Can We Secure the Internet? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003

Can we reduce the motivation for attack? Prof. Eric A. Brewer UC Berkeley Berkeley in Silicon Valley March 1, 2003

Adlai Stevenson, July 1965 We travel together, passengers on a little space ship … all committed for our safety to its security and peace; We cannot maintain it half fortunate, half miserable, half confident, half despairing, half slave … half free in a liberation of resources undreamed of until this day. No craft, no crew can travel with such vast contradictions. On their resolution depends the survival of us all.

Hypothesis 1  Current IT projects “trickle down” first- world technology:  Too expensive  Assumes infrastructure, power  Assumes IT knowledge and support  Assumes literacy  We can directly attack these issues

Hypothesis 2  Thousands of IT projects, but  Focus on devices not infrastructure  No single project can afford to build infrastructure, but all of them would benefit.  We can enable low-cost infrastructure  Enhance all of the existing projects  Enable new projects that were previously intractable

Population (in millions) >$20,000 $2,000–20,000 <$2,000 Purchasing power parity (in U.S. dollars) There is a market, too… 100 4,000 emerging ‘mass’ markets adjacent markets 2,000 source: Harvard Business Review © 2002

ICT4B Information and Communication Technology for Billions

Big Picture  Enhance and enable IT projects:  Novel technology (direct attack)  Novel deployment/support  Support for semi- and illiterate users  Two real-world deployments (validate)  Great partners

Novel Technology  Device cost: times reduction  Infrastructure cost: times reduction  Device power: times lower  Speech recognition for obscure languages and dialects

Three Layer Architecture  Devices  1-70 users each, $1-10  Short range wireless  Proxies (basestations)  users, $200, < $1/user  Mixed wired, wireless, satellite  Transient storage  Data Centers  >1M users, < $0.10 / user  Full power, networking, persistent storage

Devices  Co-Design Devices/Infrastructure  => 20-40x lower cost  Enables more functionality  Storage, processing, human analysis  Longer battery life  Novel low-cost flexible displays  10-50x cheaper, more robust  Printed using an inkjet process  System on a chip => $1-5 per device  Looking at 1mW per device (with radio!)

Data is in the Infrastructure  Manage persistent state in the infrastructure  Can lose/rent the device  Enables social science research (with privacy)  Enables group state  group calendars and news

Decouple Apps & Devices  Remote reprogramming over the network (authenticated)  Can upgrade/add services without changing the device!  Devices last longer  Devices increase in usefulness  Enables flexibility and research

Low-cost Infrastructure  Goal: lower cost  Key idea: intermittent networking  Most apps do not need real-time continuous communication  Asynchronous is times cheaper  Feel: some spots are interactive, most are more like  Novel protocols, app support

Novel Deployment & Support  Micro-franchise model for long term  Grameen Phone  Remote management for most things  Self-contained wireless proxies with ad hoc networking  No keyboard, monitor, etc. on proxies.  Data Centers are widely shared

Grameen Phone Lady  Micro-franchisee  Usually with a micro- loan ($200)  Buy and manages the cell phone  Rents it out to her village (10-70 users)  Income goes up 2-3x  Pays back loan (98% !)

Grameen Phone Lady  Micro-franchisee  Usually with a micro- loan ($200)  Buy and manages the cell phone  Rents it out to her village (10-70 users)  Income goes up 2-3x  Pays back loan (98% !) Uganda

Literacy  Novel speech recognition:  Easy to train  Speaker independent  Any language or dialect  Small vocabulary (order 100 words)  A non-IT person can train the speech for her dialect  Also speech output (canned)  May do recognition on the device, or on proxy

Real Deployments  First one is in India (2005-6)  IIT Delhi, HP Labs India  Second outside of Asia (2006-7)  Probably Africa, Mexico or US

Five Application Areas  Commerce  Health  Education  Government  Location-based services  Team includes social scientists:  Stephen Weber, Isha Ray

Great Partners  HP  Intel  Grameen Bank  UNDP  Markle  IIT Delhi More welcome!!!

Summary  New approach for IT in developing regions  Novel technology, infrastructure  “direct attack” on the key challenges  Real deployments  Enable and enhance 1000s of projects worldwide  Long term: development over defense

Reduced overall cost  Functionality moved to the infrastructure costs far less!  Device utilization = 4%  Infrastructure servers = 80%  Ex: ISPs have times less modems than there customers, even though every connection takes one from each...  Admin & support costs also decrease

Transformation Examples  Tailor content for each user & device  Noticeably faster than home PC + modem 1.2 The Remote Queue Model We introduce Remote Queues (RQ), …. 1.2 The Remote Queue Model We introduce Remote Queues (RQ), …. 65x 6.8x 10x

Refinement  Retrieve part of distilled object at higher quality Distilled image (by 60X) Zoom in to original resolution