Top Banner
Networking for Smart Spaces Kevin L. Mills NIST Information Technology Laboratory Air Java The Edge The Core Aroma
15
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mills_Networking_20f..

Networking for Smart Spaces

Kevin L. Mills

NIST Information Technology Laboratory

Air

Java

The Edge The Core

Aroma

Page 2: Mills_Networking_20f..

The Talk Ahead

What’s Changing?

What’s a Smart Space?

NIST Smart Spaces Project Passive Multi-Modal Sensing for Smart Spaces Networking for Smart Spaces

Some Research Challenges

Possible Synergies with Sense IT

Invitation to PC2000

Page 3: Mills_Networking_20f..

What’s Changing?

Increasing Prevalence of Mobile Work and Ad Hoc Teams

Growing Population of Embedded and Portable Information Appliances PDAs, Cell Phones, CrossPad, InfoPen …

Rich and Growing Technologies for Pico-Cellular Wireless Communications Bluetooth, HomeRF, 802.11, 802.11b, IrDA …

Emerging Technologies for Dynamic Service Discovery Jini, Universal Plug-and-Play, Service Location Protocol …

Leading toward Smart Spaces?

Page 4: Mills_Networking_20f..

What’s a Smart Space?

A Wireless Island in a Global Wired Ocean where

Available Information Services and Embedded Sensors and Devices are Discovered, Accessed, and Exploited by

Portable Devices Carried onto the Island and the

Combination of Imported and Native Devices and Services is Exploited to Support the Information Needs of Current Island Inhabitants

Page 5: Mills_Networking_20f..

Smart Spaces Project

Implement a pilot consisting of multiple smart spaces One exploring passive, multi-modal HCI sensing issues Two exploring networking and distributed systems issues

Integrate and evaluate current technology available to realize smart spaces Pico-cellular LANs Dynamic Service Discovery Distributed Computing Infrastructure Multi-modal Passive Sensing (speech, vision, language)

Networking for Smart Spaces Project AirJava: Exploring the Edge Aroma: Exploring the Core

Page 6: Mills_Networking_20f..

Exploring the Edge

Deploy embedded and portable, computer-controllable devices within a pico-cellular wireless edge network connected to the wired infrastructure

Discover local devices and automatically configure foreign portable computers to use the discovered devices and services- also enable the export of local devices and services to remote correspondents

Discover local embedded file and compute infrastructures that allow ad hoc injection of transient foreign information and programs

Air

Java

Claim: Within 5 years Systems-on-a-chip (SOC) costing $10 will include• pico-cell wireless transceiver• virtual machine• run-time environment

Page 7: Mills_Networking_20f..

A Jini-based Device Adapter

AirJava adapter emulates tomorrow’s SOC Low-power microcomputer and flash memory 2.4 GHz wireless LAN PCMCIA Card Linux or Windows Java VM and Jini

AirJava adapter provides a platform for investigating challenges Managing and Exploiting Discovered Services Security Mechanisms for Transient Users Self-Organizing Mesh of Services Logical Networking Context for Mobile

Collaborators

EPSON CARD 586 133 MHz, 48 MB RAM, 256 KB

ROM, 1 MB Video Memory Bus Controller, XGA Controller,

FDC, COMBO Controller 320 MB Flash Memory Card 320x240 Pixel Color LCD 2.4 GHz Wireless LAN PCMCIA Type II

Air

Java

Page 8: Mills_Networking_20f..

Exploring the Core

Integrate AirJava-adapted devices and other portable wireless devices with wired networking infrastructure using UCB Ninja Software

Develop, test, and evaluate algorithms for self-organizing service meshes along spatial, logical, and organization dimensions

Develop and exploit on-demand virtual private network technology to scope and protect communications and to manage information for mobile, ad hoc teams

Gigabit Ethernet

PDAs Cell PhonesFuture Devices

WirelessInfrastructure

DesktopPCs

Servers

Clusters

Massive Cluster

Picture courtesy of David CullerUC Berkeley

Aroma

Page 9: Mills_Networking_20f..

Project Status

AirJava adapter constructed and running Jini

Several Jini services designed and in early prototype form Who service Http File Upload service Service Transfer service Node Resource Information service

Initial target, controllable devices identified commercially available digital projector, video camera, audio mixer Maya Design Interstax modules

6-Node Windows NT network of workstations, running Jini and Ninja, about to be assembled.

Page 10: Mills_Networking_20f..

Challenge – Managing and Exploiting Discovered Services

Lease management - What’s the tradeoff between overhead traffic and responsiveness to changes in services? How will leased services and device drivers wither away from client devices?

Robustness - What’s the tradeoff between number of replicas and associated overhead? What’s the tradeoff between automated shutdown/restart of services and the latency for clients?

Device driver injection - What’s required to dynamically inject and automatically configure device-driver code into transient end systems (without rebooting)?

Wireless channel utilization - How can a shared wireless channel be used simultaneously for discovery protocols, code exchange, and streaming data? What’s the tradeoff between compression of mobile code and state, channel utilization, and latency?

Page 11: Mills_Networking_20f..

Challenge –Security Mechanisms for Transient Interactions

Authentication - How should transient users be authenticated? How should services and devices be authenticated?

Authorization - What capabilities should be available for granting to transient users? What capabilities should transient systems make available for granting to locality services?

Enforcement - How can capabilities be checked quickly? How should capability-denied situations be resolved?

Policy Mechanisms - How should policies be described for granting capabilities to transient users? How should capability leases be managed? How can various policy decisions be checked for inconsistencies, ambiguities, and omissions?

Integrity - How will the integrity of mobile code and state be assured? How can mobile systems safely accept foreign device drivers? How much information should be logged about activity in a smart space, and how should integrity and confidentiality be provided for logged information?

Page 12: Mills_Networking_20f..

Challenge – Self-Organizing Mesh of Services

Mesh Creation - How can services self-organize into multiple meshes based on spatial, logical, and organizational relationships, attributes, and constraints?

Mesh Management - How should service meshes adapt dynamically to transience among services and to changes in the definition of relationships, attributes, and constraints?

Queries and Event Notifications - How should queries be routed among service meshes? What protocols should be used to distribute event notifications to multiple interested listeners? How should transient event listeners be accommodated? How can event filter networks be organized in relationship to service meshes? How should event filter networks be adapted to changes in service meshes?

Distributed Pattern Recognition - How can event filter networks be deployed among distributed nodes to recognize significant patterns?

Page 13: Mills_Networking_20f..

Challenge – Logical Networking Contexts for Mobile Collaborators

Context Creation - How can virtual overlay networks be created on-demand? What application services and network services should be available within a virtual overlay network?

Mobility Management - How can virtual overlay networks be dynamically adjusted to accommodate mobile users who exhibit discontinuous connectivity from different locations? How can services be maintained in the face of intermittent connectivity to the machines host the services? How can state changes be synchronized in the face of intermittent connectivity?

Context Switching - How can end users maintain awareness, switch quickly among, and effectively operate within multiple contexts? How can services, devices, and information leased from the local context be shared across remote contexts?

Page 14: Mills_Networking_20f..

Possible Synergies with Sense IT

Adaptive wireless communications in the 2.4 GHz band Self-organization requirements in multiple dimensions

(spatial, logical, and organizational) Reliance on mobile code and mobile state Distributed system of independent nodes Need for well-understood or discoverable application

programming interfaces Security requirements for dynamic tasking Algorithms for distributed queries, event notifications, and

pattern recognition Requirement for robustness in the face of intermittent

connectivity, node failures, and redundant nodes

Page 15: Mills_Networking_20f..

You are invited to PC 2000

Pervasive Computing 2000 Workshop January 25-26, 2000 at NIST in Gaithersburg, Maryland Keynote Speaker is Bill Joy from Sun Microsystems Multiple Panels of mainly Industry, but some University Folks

Panel Topics Pico-cellular Wireless LANs Dynamic Service Discovery Systems Innovative Handheld and Embedded Devices Programming Systems for Adaptive Distributed Systems Multi-modal Human-Computer Interaction

Contact Bill Young ([email protected]) for more info