Networked CPS: Some Fundamental Challenges

Size: px
Start display at page:

Download "Networked CPS: Some Fundamental Challenges"

Transcription

1 Networked CPS: Some Fundamental Challenges John S. Baras Institute for Systems Research Department of Electrical and Computer Engineering Fischell Department of Bioengineering Department of Mechanical Engineering Applied Mathematics, Statistics and Scientific Computation Program University of Maryland College Park Panel on Networking challenges for CPS 2014 INFOCOM Toronto, Canada, May 1, 2014

2 Wireless and Networked Embedded Systems: Ubiquitous Presence 2

3 A Network Immersed World: Swarms and the Cloud Courtesy: J. Rabaey 3

4 Networked CPS: Wireless Sensor Networks Everywhere 4

5 Networked CPS: Smart Grids Courtesy: Rockwell 5

6 Networked CPS: FAA NextGen 6

7 Networked CPS: Autonomous Swarms Component-based Architectures Communication vs Performance Tradeoffs Distributed asynchronous Fundamental limits At work: Two ASIMOs working together in coordination to deliver refreshments Credit: Honda 7

8 A Network Immersed World A complex collection of sensors, controllers, computing nodes, and actuators that work together to improve our daily lives From very small: Ubiquitous, Pervasive, Disappearing, perceptive, Ambient To very large: Always Connectable, Reliable, Scalable, Adaptive, Flexible Emerging Service Models Building energy management Automotive safety and control Management of metropolitan traffic flows Distributed health monitoring Smart Grid 8

9 Networked CPS Architecture: Multiple Interacting Multigraphs Multiple Interacting Graphs Nodes: agents, individuals, groups, organizations Directed graphs Links: ties, relationships Weights on links : value (strength, significance) of tie Weights on nodes : importance of node (agent) Value directed graphs with weighted nodes Real life problems: Dynamic, time varying graphs, relations, weights, policies Information network I w kl Communication network S j : w j S w ij : I k: w l: w l I k C m: w m C w mn i w i n: w n Networked System architecture & operation C S 9

10 Networks: The Fundamental Trade off The nodes gain from collaborating But collaboration has costs (e.g. communications) Trade off: gain from collaboration vs cost of collaboration Vector metrics involved typically Constrained Coalitional Games Example 1: Network Formation Effects on Topology Example 2: Collaborative robotics, communications Example 3: Web based social networks and services Example 4: Groups of cancer tumor or virus cells 10

11 Efficient Communication Graphs: Small World Graphs Simple Lattice C(n,k) Small world: Slight variation adding nk Adding a small portion of well chosen links significant increase in convergence rate 11

12 Efficient Communication Graphs: Expander Graphs Fast synchronization of a network of oscillators Network where any node is nearby any other Fast diffusion of information in a network Fast convergence of consensus Decide connectivity with smallest memory Random walks converge rapidly Easy to construct, even in a distributed way (ZigZag graph product) Graph G, Cheeger constant h(g) All partitions of G to S and S c, h(g)=min (#edges connecting S and S c ) / (#nodes in smallest of S and S c ) (k, N, e) expander : h(g) > e ; sparse but locally well connected (1 SLEM(G) increases as h(g) 2 ) 12

13 Expander Graphs Ramanujan Graphs 13

14 Construction of Efficient Communication Graphs by Computational Optimization Examples of resulting topologies 14

15 Distributed self organization Goal: design a scheme that gives each node a vector of compact global information 15

16 Component Based Networking and Security Component Based Networking : Leads to a compositional approach to the synthesis and operation of networks. Fits very well MANET, WNAN (and WAND), beyond. Does away with classical layers and with classical cross layer Compositionality, and Compositional Synthesis Cross linked executable, formal and performance models is addressing this challenging problem directly. Interacting Control, Information and Communication Graphs 16

17 Executable Models Component base Networks and Composable Security Formal Models Universally Composable Security of Network Protocols: Network with many agents running autonomously. Agents execute in mostly asynchronous manner, concurrenty several protocols many times. Protocols may or may have not been jointly designed, may or not be all secure or secure to same degree. Performance Models Key question addressed : Under what conditions can the composition of these protocols be provably secure? Investigate time and resource requirements Studying compositionality is necessary! Compositional Security is critical for all CPS! for achieving this 17

18 Trust and Collaborative Control/Operation Two linked dynamics Trust / Reputation propagation and collaborative control evolution Integrating network utility maximization (NUM) with constraint based reasoning and coalitional games Beyond linear algebra and weights, semirings of constraints, constraint programming, soft constraints semirings, policies, agents Learning on graphs and network dynamic games: behavior, adversaries Adversarial models, attacks, constrained shortest paths, Interacting Control, Information and Communication Graphs 18

19 Biological Network Types Examples of biological networks: [A] Yeast transcription factor binding network; [B] Yeast protein protein interaction network; [C] Yeast phosphorylation network ; [D] E. Coli metabolic network ; [E] Yeast genetic network ; Nodes colored according to their YPD cellular roles [Zhu et al, 2007] 19

20 How Biology Does IT? 20

21 Modularity vs Performance Optimize only on performance poor adaptivity Add cost of communications improved adaptivity Communication motifs Evolvable modularity for some networked CPS?? 21

22 Neural Network Evolution: from programmed structure to function feedback on structure 22

23 Social Networks as Networked CPS We are much more social than ever before Online social networks (SNS) permeate our lives Such new Life style gives birth to new markets Monetize the value of social network Advertising - major source of income for SNS Joining fee, donation etc. Need to know the common features of social networks 23

24 Challenges in Social Networks Can we integrate? Context based distribution Include user and product similarity Combine with user user similarity Exploit both user preferences and network structure Maximize relevance and potential profit Ensure message delivery to all interested nodes Increase recommendation accuracy and diversity Can hyperbolic embedding help? Is it real? 24

25 Key Idea: Virtual Geometry Of the network graph Of an auxiliary space underlying the graph 25

26 Possible Underlying Hyperbolic Geometry? 26

27 Navigation Efficiency and Robustness Percentage of successful greedy paths 99.99% Percentage of shortest greedy paths 100% Percentage of successful greedy paths after removal of x% of links or nodes x =10% 99% x =30% 95% 27

28 Taxonomy for Large Scale Networks based on Curvature 1987 Gromov: d hyperbolicity Courtesy: Iraj Saniee, Bell Labs 28

29 Thank you! Questions?

Networked Cyber-Physical Systems (Net-CPS) and the Internet of Things (IoT)

Networked Cyber-Physical Systems (Net-CPS) and the Internet of Things (IoT) Networked Cyber-Physical Systems (Net-CPS) and the Internet of Things (IoT) John S. Baras Institute for Systems Research, University of Maryland, USA ACCESS Linnaeus Center, Royal Institute of Technology,

More information

IoT and 5G as Enablers for Networked Human-Cyber-Physical Systems

IoT and 5G as Enablers for Networked Human-Cyber-Physical Systems IoT and 5G as Enablers for Networked Human-Cyber-Physical Systems John S. Baras and Chrysa Papagianni Institute for Systems Research University of Maryland College Park 5G Network Summit IEEE COMSOC, DC

More information

Complex Networks and Systems. Program Manager AFOSR/RSL Air Force Research Laboratory

Complex Networks and Systems. Program Manager AFOSR/RSL Air Force Research Laboratory Complex s and Systems Dr Robert J. Bonneau Program Manager AFOSR/RSL Air Force Research Laboratory 1 Complex s Roadmap Complex networks uses the results of the mathematical quantification of critical information

More information

Networked Cyber-Physical Systems (Net-CPS) 网络信息 - 物理融合系统

Networked Cyber-Physical Systems (Net-CPS) 网络信息 - 物理融合系统 Networked Cyber-Physical Systems (Net-CPS) 网络信息 - 物理融合系统 John S. Baras Institute for Systems Research, University of Maryland, USA ACCESS Linnaeus Center, Royal Institute of Technology, Sweden Institute

More information

Properties of Biological Networks

Properties of Biological Networks Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási

More information

Components, Compositionality and Architectures for Networked CPS

Components, Compositionality and Architectures for Networked CPS Components, Compositionality and Architectures for Networked CPS John S. Baras Institute for Systems Research Department of Electrical and Computer Engineering Fischell Department of Bioengineering Applied

More information

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom

More information

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services 1 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services Dr. Jian Ma, Principal Scientist Nokia Research Center, Beijing 2 2005

More information

USE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES

USE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES 5g Use Cases BROADBAND AND MEDIA EVERYWHERE 5g USE CASES SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES HUMAN MACHINE INTERACTION SENSOR NETWORKS

More information

Security and Trust in a Networked Immersed World: from Components to Systems and Beyond

Security and Trust in a Networked Immersed World: from Components to Systems and Beyond Security and Trust in a Networked Immersed World: from Components to Systems and Beyond John S. Baras Lockheed Martin Chair in Systems Engineering The Institute for Systems Research and Electrical and

More information

Link Analysis in the Cloud

Link Analysis in the Cloud Cloud Computing Link Analysis in the Cloud Dell Zhang Birkbeck, University of London 2017/18 Graph Problems & Representations What is a Graph? G = (V,E), where V represents the set of vertices (nodes)

More information

ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE?

ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE? ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE? Motivation, Approach, and Research Agenda Rolf Stadler and Gunnar Karlsson KTH, Royal Institute of Technology 164 40 Stockholm-Kista, Sweden {stadler,gk}@imit.kth.se

More information

Distributed Agent-Based Intrusion Detection for the Smart Grid

Distributed Agent-Based Intrusion Detection for the Smart Grid Distributed Agent-Based Intrusion Detection for the Smart Grid Presenter: Esther M. Amullen January 19, 2018 Introduction The smart-grid can be viewed as a Large-Scale Networked Control System (LSNCS).

More information

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation Wireless Network Security 18-639: Spring 2011 Arjun Athreya March 3, 2011 Survey: Trust Evaluation A scenario LOBOS Management Co A CMU grad student new to Pittsburgh is looking for housing options in

More information

Graph Theory. Graph Theory. COURSE: Introduction to Biological Networks. Euler s Solution LECTURE 1: INTRODUCTION TO NETWORKS.

Graph Theory. Graph Theory. COURSE: Introduction to Biological Networks. Euler s Solution LECTURE 1: INTRODUCTION TO NETWORKS. Graph Theory COURSE: Introduction to Biological Networks LECTURE 1: INTRODUCTION TO NETWORKS Arun Krishnan Koenigsberg, Russia Is it possible to walk with a route that crosses each bridge exactly once,

More information

Networking Cyber-physical Applications in a Data-centric World

Networking Cyber-physical Applications in a Data-centric World Networking Cyber-physical Applications in a Data-centric World Jie Wu Dept. of Computer and Information Sciences Temple University ICCCN 2015 Panel Computers weaving themselves into the fabric of everyday

More information

Self-Organization in Sensor and Actor Networks

Self-Organization in Sensor and Actor Networks Self-Organization in Sensor and Actor Networks Falko Dressler University of Erlangen, Germany BICENTINNIAL BICINTINNIAL John Wiley & Sons, Ltd Contents Foreword Preface About the Author List of Abbreviations

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

PARALLEL AND DISTRIBUTED PLATFORM FOR PLUG-AND-PLAY AGENT-BASED SIMULATIONS. Wentong CAI

PARALLEL AND DISTRIBUTED PLATFORM FOR PLUG-AND-PLAY AGENT-BASED SIMULATIONS. Wentong CAI PARALLEL AND DISTRIBUTED PLATFORM FOR PLUG-AND-PLAY AGENT-BASED SIMULATIONS Wentong CAI Parallel & Distributed Computing Centre School of Computer Engineering Nanyang Technological University Singapore

More information

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization Pedro Ribeiro (DCC/FCUP & CRACS/INESC-TEC) Part 1 Motivation and emergence of Network Science

More information

Networked Cyber-Physical Systems

Networked Cyber-Physical Systems Networked Cyber-Physical Systems Dr.ir. Tamás Keviczky Delft Center for Systems and Control Delft University of Technology The Netherlands t.keviczky@tudelft.nl http://www.dcsc.tudelft.nl/~tkeviczky/ September

More information

Autonomic Applications for Pervasive Environments

Autonomic Applications for Pervasive Environments Autonomic Applications for Pervasive Environments Manish Parashar WINLAB/TASSL ECE, Rutgers University http://www.caip.rutgers.edu/tassl Ack: NSF (CAREER, KDI, ITR, NGS), DoE (ASCI) Pervasive Computing:

More information

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] PD Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Science University of Erlangen http://www7.informatik.uni-erlangen.de/~dressler/

More information

An Introduction to Complex Systems Science

An Introduction to Complex Systems Science DEIS, Campus of Cesena Alma Mater Studiorum Università di Bologna andrea.roli@unibo.it Disclaimer The field of Complex systems science is wide and it involves numerous themes and disciplines. This talk

More information

5G for people and things

5G for people and things 5G for people and things Key to the programmable world Péter Szilágyi, Nokia Bell Labs ETSI User Conference on Advanced Automated Testing Budapest, 26 th October, 2016 1 Nokia 2016 5G will change the world

More information

Analysis and Modeling

Analysis and Modeling Guillaume Guérard A Complex System Approach for SMART GRID Analysis and Modeling KES 12 September 2012 1 Problematic Thesis: Optimization in complex networks. Problem: Optimization of the energy distribution

More information

Future X Network. Sanjay Kamat Managing Partner, Bell Labs Consulting Nokia

Future X Network. Sanjay Kamat Managing Partner, Bell Labs Consulting Nokia Future X Network Sanjay Kamat Managing Partner, Bell Labs Consulting 1 2017 Nokia Nokia Bell Labs innovations have been changing the way we live for more than 90 years 2 2017 Nokia Nokia Internal Nokia

More information

Autonomic Computing. Pablo Chacin

Autonomic Computing. Pablo Chacin Autonomic Computing Pablo Chacin Acknowledgements Some Slides taken from Manish Parashar and Omer Rana presentations Agenda Fundamentals Definitions Objectives Alternative approaches Examples Research

More information

The 5G Business Potential. Terminsstart Telekom 2017 Monika Byléhn, 5G marketing director

The 5G Business Potential. Terminsstart Telekom 2017 Monika Byléhn, 5G marketing director The 5G Business Potential Terminsstart Telekom 2017 Monika Byléhn, 5G marketing director DiversE opportunities with 5G 2G 3G 4G 5G VOICE BROWSING VIDEO MULTIPLE INDUSTRIES Ericsson AB 2017 September 2017

More information

Curriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.)

Curriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.) Curriculum (Structure) for M. Tech. Computer Science and Information Technology With Effect From Academic Year 2018-2019 (F. Y. M. Tech.) 2019-2020 (S. Y. M. Tech.) Teaching and Evaluation Scheme First

More information

L2 - Internet of Things

L2 - Internet of Things UNIK4750 - Measurable Security for the Internet of Things L2 - Internet of Things György Kálmán, UiO/NTNU/mnemonic gyorgy.kalman@its.uio.no Josef Noll UiO/UNIK josef.noll@its.uio.no http://cwi.unik.no/wiki/unik4750,

More information

Version 11

Version 11 The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

Structure of biological networks. Presentation by Atanas Kamburov

Structure of biological networks. Presentation by Atanas Kamburov Structure of biological networks Presentation by Atanas Kamburov Seminar Gute Ideen in der theoretischen Biologie / Systembiologie 08.05.2007 Overview Motivation Definitions Large-scale properties of cellular

More information

Boon Thau Loo University of Pennsylvania

Boon Thau Loo University of Pennsylvania Summary of Networked Systems Breakout Boon Thau Loo University of Pennsylvania Networked Systems Breakout Series of 15-20 minute talks: Challenges in safe routing (Alex Gurney) Compositional network services

More information

Some Routing Challenges in Dynamic Networks

Some Routing Challenges in Dynamic Networks Some Routing Challenges in Dynamic Networks Jie Wu Dept. of Computer and Information Sciences Temple University Overview 1. Current State of Networking More Wireless Mobile and Opportunistic Applications

More information

Concepts, Technology, and Applications of Mobile Commerce

Concepts, Technology, and Applications of Mobile Commerce Concepts, Technology, and Applications of Mobile Commerce Robert Nickerson Professor and Chair Department of Information Systems Director, Center for Electronic Business College of Business San Francisco

More information

University of Maryland. Tuesday, March 2, 2010

University of Maryland. Tuesday, March 2, 2010 Data-Intensive Information Processing Applications Session #5 Graph Algorithms Jimmy Lin University of Maryland Tuesday, March 2, 2010 This work is licensed under a Creative Commons Attribution-Noncommercial-Share

More information

Evolutionary Algorithms. CS Evolutionary Algorithms 1

Evolutionary Algorithms. CS Evolutionary Algorithms 1 Evolutionary Algorithms CS 478 - Evolutionary Algorithms 1 Evolutionary Computation/Algorithms Genetic Algorithms l Simulate natural evolution of structures via selection and reproduction, based on performance

More information

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38 Department of Computer Science & Information Technology University of Balochistan Course Objectives To discuss the fundamental problems in the emerging area of mobile and pervasive computing, along with

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Graph Algorithms. Many problems in networks can be modeled as graph problems. Graph Algorithms Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm

More information

Future-Generation Wireless Networks: Beyond 3G and 4G.

Future-Generation Wireless Networks: Beyond 3G and 4G. Future-Generation Wireless Networks: Beyond 3G and 4G. Kumar Adumulla 29 March 2006 Networks 1 Outline Introduction Wireless Networking Generations Issues in 3G What is 4G Beyond 3G & 4G Conclusion References

More information

Computing Technologies

Computing Technologies Computing Technologies Computing CPU, Memory, Communication Ubiquitous everywhere indefinite number of times Not really possible or desirable more than in traditional computing so widespread that unnoticed

More information

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based

More information

Mobile and Ubiquitous Computing

Mobile and Ubiquitous Computing Mobile and Ubiquitous Computing Today l Mobile, pervasive and volatile systems l Association and Interoperation l Sensing context and adaptation RIP? How is mobility different Mobile elements are resource-poor

More information

Swarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013

Swarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013 Slide 1 John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013 Disclaimer: I m not talking about the run- of- the- mill Internet of Things When people talk about the IoT, they often seem to be talking

More information

On the Design Framework of Context Aware Embedded System

On the Design Framework of Context Aware Embedded System On the Design Framework of Context Aware Embedded System Xian-He Sun With Abhay Daftari, Nehal Mehta, Shubhanan Bakre Illinois Institute of Technology Request Position, View Point Software Engineering

More information

Reconfigurable Robot

Reconfigurable Robot Reconfigurable Robot What is a Reconfigurable Robot? Self-reconfiguring modular robots are autonomous kinematic machines with variable morphology They are able to deliberately change their own shape by

More information

Distributed and Cloud Computing

Distributed and Cloud Computing Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 9: Ubiquitous Clouds and The Internet of Things (suggested for use in 5 lectures in 250 minutes) Prepared by Kai Hwang University

More information

A Graduate Embedded System Education Program

A Graduate Embedded System Education Program A Graduate Embedded System Education Program Alberto Sangiovanni-Vincentelli Department of EECS, University of California at Berkeley EE249:Fall03 The Killer Applications for the Future? 2 Energy Conservation

More information

Immersive user experiences in Smart Spaces challenges for future communication networks beyond 5G

Immersive user experiences in Smart Spaces challenges for future communication networks beyond 5G Immersive user experiences in Smart Spaces challenges for future communication networks beyond 5G Gino Carrozzo Deputy Head of R&D Nextworks www.nextworks.it Visions for Future Communications Summit Oct

More information

Application Enablement: The Sustainable

Application Enablement: The Sustainable Application Enablement: The Sustainable Internet Gustavo Tonini Aug 24, 2011 gustavo.tonini@alcatel-lucent.com Is the current model of Internet sustainable? The evolution of devices and behaviors Vs. A

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Distributed Routing. EECS 228 Abhay Parekh

Distributed Routing. EECS 228 Abhay Parekh Distributed Routing EECS 228 Abhay Parekh parekh@eecs.berkeley.edu he Network is a Distributed System Nodes are local processors Messages are exchanged over various kinds of links Nodes contain sensors

More information

Curriculum 2013 Knowledge Units Pertaining to PDC

Curriculum 2013 Knowledge Units Pertaining to PDC Curriculum 2013 Knowledge Units Pertaining to C KA KU Tier Level NumC Learning Outcome Assembly level machine Describe how an instruction is executed in a classical von Neumann machine, with organization

More information

Jordan Boyd-Graber University of Maryland. Thursday, March 3, 2011

Jordan Boyd-Graber University of Maryland. Thursday, March 3, 2011 Data-Intensive Information Processing Applications! Session #5 Graph Algorithms Jordan Boyd-Graber University of Maryland Thursday, March 3, 2011 This work is licensed under a Creative Commons Attribution-Noncommercial-Share

More information

5G Enables Enterprise

5G Enables Enterprise Enables Enterprise Shirley Hsieh Marketing & Corporate Affairs 1 2017 Nokia Megatrends are changing the world, and the ways we connect with it Network, compute & storage Internet of Things Augmented intelligence

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

Machine Learning Techniques for the Smart Grid Modeling of Solar Energy using AI

Machine Learning Techniques for the Smart Grid Modeling of Solar Energy using AI Machine Learning Techniques for the Smart Grid Modeling of Solar Energy using AI Professor Dr. Wilfried Elmenreich Dr. Tamer Khatib Networked and Embedded Systems Overview Scope of this tutorial Meta-heuristic

More information

Privacy in Sensor Nets

Privacy in Sensor Nets Privacy in Sensor Nets Wade Trappe Yanyong Zhang Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Talk Overview Brief Update on the Security Group and then PARIS Motivation Set the

More information

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)

More information

Figure Potential 5G applications

Figure Potential 5G applications 6. 5G Key Concept 6.1 Key Concepts of 5G End-to-end (E2E) quality required by applications and/or users will be far more diversified in the 5G era than what we have seen in the preceding generations. For

More information

Biological Networks Analysis

Biological Networks Analysis Biological Networks Analysis Introduction and Dijkstra s algorithm Genome 559: Introduction to Statistical and Computational Genomics Elhanan Borenstein The clustering problem: partition genes into distinct

More information

COS Lecture 13 Autonomous Robot Navigation

COS Lecture 13 Autonomous Robot Navigation COS 495 - Lecture 13 Autonomous Robot Navigation Instructor: Chris Clark Semester: Fall 2011 1 Figures courtesy of Siegwart & Nourbakhsh Control Structure Prior Knowledge Operator Commands Localization

More information

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Symeon Papavassiliou (joint work with Eleni Stai and Vasileios Karyotis) National Technical University of Athens (NTUA) School of

More information

Framework For Cloud Computing Networks Pdf

Framework For Cloud Computing Networks Pdf A Cooperative Intrusion Detection System Framework For Cloud Computing Networks Pdf of Intrusion Detection Systems proposed over the years. Cloud Computing Cloud Computing suffers from various network

More information

5g Use Cases. Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015

5g Use Cases. Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015 5g Use Cases Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015 BROADBAND EXPERIENCE EVERYWHERE, ANYTIME 5g USE CASES SMART VEHICLES, TRANSPORT & INFRASTRUCTURE MEDIA EVERYWHERE CRITICAL CONTROL OF

More information

GPU-based Distributed Behavior Models with CUDA

GPU-based Distributed Behavior Models with CUDA GPU-based Distributed Behavior Models with CUDA Courtesy: YouTube, ISIS Lab, Universita degli Studi di Salerno Bradly Alicea Introduction Flocking: Reynolds boids algorithm. * models simple local behaviors

More information

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains

More information

Internet of Things 2018/2019

Internet of Things 2018/2019 Internet of Things 2018/2019 Resource Management for Dependable IoT Tanir Ozcelebi John Carpenter, 1982 1 What does resource management entail? Guiding questions What are the components of dependability?

More information

Caching video contents in IPTV systems with hierarchical architecture

Caching video contents in IPTV systems with hierarchical architecture Caching video contents in IPTV systems with hierarchical architecture Lydia Chen 1, Michela Meo 2 and Alessandra Scicchitano 1 1. IBM Zurich Research Lab email: {yic,als}@zurich.ibm.com 2. Politecnico

More information

5G Journey: Path Forward

5G Journey: Path Forward 5G Journey: Path Forward Vida Ilderem, PhD Vice President, Intel Labs Director, Wireless Communication Research Acknowledgement: Schooler, Foerster, Srikanteswara, Himayat, Talwar WE ARE HERE: 5G Reactive,

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

EECS 144/244. Fundamental Algorithms for System Modeling, Analysis, and Optimization. Lecture 1: Introduction, Systems

EECS 144/244. Fundamental Algorithms for System Modeling, Analysis, and Optimization. Lecture 1: Introduction, Systems EECS 144/244 Fundamental Algorithms for System Modeling, Analysis, and Optimization Lecture 1: Introduction, Systems Stavros Tripakis UC Berkeley Spring 2013 1 Computers as parts of Systems ~98% of the

More information

Smart Grid Communications and Networking

Smart Grid Communications and Networking Smart Grid Communications and Networking EKRAM HOSSAIN University of Manitoba, Canada ZHU HAN University of Houston, Texas H. VINCENT POOR Princeton University, New Jersey CAMBRIDGE UNIVERSITY PRESS Contents

More information

1 General description of the projects

1 General description of the projects 1 General description of the projects The term projects are aimed at providing a test ground for the skills and knowledge you picked up during the course and optionally give you a chance to join ongoing

More information

Complex Networks. Structure and Dynamics

Complex Networks. Structure and Dynamics Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck

More information

Software Architecture for Immersipresence

Software Architecture for Immersipresence Software Architecture for Immersipresence Alexandre R.J. François Computer Science Department alexandre.francois@usc.edu ARJF 2006 Software Architecture Design, analysis and implementation of software

More information

Programmable Pattern-Formation and Scale-Independence

Programmable Pattern-Formation and Scale-Independence Programmable Pattern-Formation and Scale-Independence Radhika Nagpal PostDoctoral Lecturer, MIT Artificial Intelligence Lab radhi@ai.mit.edu This paper presents a programming language for pattern-formation

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

Distributed Algorithms in Networks EECS 122: Lecture 17

Distributed Algorithms in Networks EECS 122: Lecture 17 istributed lgorithms in Networks EES : Lecture 7 epartment of Electrical Engineering and omputer Sciences University of alifornia erkeley Network Protocols often have unintended effects TP Eample TP connections

More information

Sensor Network Applications and In-Network Processing

Sensor Network Applications and In-Network Processing EE360: Lecture 16 Outline Sensor Network Applications and In-Network Processing Announcements 2nd summary due today 12am (1 day extension possible) Project poster session March 15 5:30pm (3 rd floor Packard)

More information

Wireless Sensor Networks. Application Domains. Crosslayer Protocol Design in Sensor Networks. Technology Thrusts. Wireless Sensor Networks

Wireless Sensor Networks. Application Domains. Crosslayer Protocol Design in Sensor Networks. Technology Thrusts. Wireless Sensor Networks EE360: Lecture 16 Outline Sensor Network Applications and In-Network Processing Announcements 2nd summary due today 12am (1 day extension possible) Project poster session March 15 5:30pm (3 rd floor Packard)

More information

Deterministic Ethernet & Unified Networking

Deterministic Ethernet & Unified Networking Deterministic Ethernet & Unified Networking Never bet against Ethernet Mirko Jakovljevic mirko.jakovljevic@tttech.com www.tttech.com Copyright TTTech Computertechnik AG. All rights reserved. About TTTech

More information

Computational Intelligence Applied on Cryptology: a Brief Review

Computational Intelligence Applied on Cryptology: a Brief Review Computational Intelligence Applied on Cryptology: a Brief Review Moisés Danziger Marco Aurélio Amaral Henriques CIBSI 2011 Bucaramanga Colombia 03/11/2011 Outline Introduction Computational Intelligence

More information

www.grensregio.eu www.smarttooling.eu WIRELESS COMMUNICATION, LOCALIZATION (AND MORE) FOR ROBOTICS PROF. JEROEN HOEBEKE, PROF. BRUNO VOLCKAERT, PROF. PIETER SIMOENS (jeroen.hoebeke@ugent.be) GHENT UNIVERSITY

More information

The Programmable World Opportunities and Challenges

The Programmable World Opportunities and Challenges The Programmable World Opportunities and Challenges Guillaume Mascot Head of Government Relations APJ & India March 2017 1 Nokia 2016 Megatrends are bringing the programmable world Network, compute & storage

More information

Robots & Cellular Automata

Robots & Cellular Automata Integrated Seminar: Intelligent Robotics Robots & Cellular Automata Julius Mayer Table of Contents Cellular Automata Introduction Update Rule 3 4 Neighborhood 5 Examples. 6 Robots Cellular Neural Network

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

NSF-RCN Workshop #2 Panel 2

NSF-RCN Workshop #2 Panel 2 NSF-RCN Workshop #2 Panel 2 Moonshot mmw Challenges and Opportunities for 2020, 2025, 2030 Tommy Svensson Department of Electrical Engineering, Communication Systems Group Professor, PhD, Leader Wireless

More information

Boolean network robotics

Boolean network robotics Boolean network robotics An example of ongoing robotics research Andrea Roli andrea.roli@unibo.it DISI - Dept. of Computer Science and Engineering Campus of Cesena Alma Mater Studiorum Università di Bologna

More information

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web

More information

Distributed Consensus in Multivehicle Cooperative Control: Theory and Applications

Distributed Consensus in Multivehicle Cooperative Control: Theory and Applications Distributed Consensus in Multivehicle Cooperative Control: Theory and Applications Wei Ren and Randal W. Beard Springer ISBN: 978-1-84800-014-8 Tutorial Slides Prepared by Wei Ren Department of Electrical

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($ in Millions)

More information

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Journal of Materials, Processing and Design (2017) Vol. 1, Number 1 Clausius Scientific Press, Canada The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Xueyi Bai1,a,

More information

Browsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments

Browsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments Browsing the World in the Sensors Continuum Agents and Franco Zambonelli Agents and Motivations Agents and n Computer-based systems and sensors will be soon embedded in everywhere all our everyday objects

More information

Route Optimization in MANET using FIGA

Route Optimization in MANET using FIGA Route Optimization in MANET using FIGA Vishal Gupta Electronics and Communication Department P.I.E.T College Smalkha (Panipat), INDIA Abstract: In MANET route optimization is the basic requirement to improve

More information

A quick review. The clustering problem: Hierarchical clustering algorithm: Many possible distance metrics K-mean clustering algorithm:

A quick review. The clustering problem: Hierarchical clustering algorithm: Many possible distance metrics K-mean clustering algorithm: The clustering problem: partition genes into distinct sets with high homogeneity and high separation Hierarchical clustering algorithm: 1. Assign each object to a separate cluster.. Regroup the pair of

More information