SlideShare uma empresa Scribd logo
1 de 27
The 5th VERDIKT Conference
Research Challenges in Networked Systems

Torsten Braun
Research Group ―Communications and Distributed Systems‖
Institute of Computer Science and Applied Mathematics
Universität Bern
Torsten Braun: Research Challenges in Networked Systems



       Overview

       >     Recommendations from Evaluation of ICT Research in Norway
       >     Looking Back: Topics in the Year 2000
       >     Future Research Topics and Challenges
       >     Remarks on Research Organization
       >     ICT in EU Horizon 2020
       >     Conclusions




       25. April 2012                                                    2
Torsten Braun: Research Challenges in Networked Systems



       Statements about the Future I

       >     It is difficult to make predictions, especially about the future.
             (Karl Valentin, Mark Twain, Winston Churchill, Albert Einstein, Niels Bohr etc.)




       >     Most technologies that will be used widely in 5-10 years
             are already existing in a lab today.
             We just do not know which of them will be successful.
             (Paul Kühn, KiVS Conference 1999)




       25. April 2012                                                                           3
Torsten Braun: Research Challenges in Networked Systems



       Evaluation of ICT Research in Norway

       Recommendations:
       ―Research areas are often fragmented and
       not well aligned with Norwegian industry.
       A bottom-up «free academic»
       approach is dominating ….
       Although the outcome of this funding
       is not bad, coordination is lacking ….
       An obvious strategic area is ICT in life
       sciences, but also industrial robotics in
       dangerous environments such as
       off-shore, and cyber‐security.
       ICT in Energy and Power Engineering
       also seems also an obvious strategic
       research area of national interest.‖

       25. April 2012                                     4
Torsten Braun: Research Challenges in Networked Systems



       Networked Systems




       25. April 2012                                     5
Torsten Braun: Research Challenges in Networked Systems



     Looking Back: ToCs in the Year 2000




     >      Wireless sensor networks                      >   Software defined radio
            and multi-sensor data fusion                  >   Programmable networks
     >      Denial of service and                         >   Voice over IP
            intrusion detection                           >   Mobile ad-hoc networks
     >      Internet-connected robots                     >   Beyond 3G mobile networks
     >      Ubiquitous computing
     >      Mobile agents
     >      E-commerce
     >      Digital libraries
     >      Web services
     >      Multimedia over ATM
       25. April 2012                                                                     6
Torsten Braun: Research Challenges in Networked Systems



       Potential Future Research Areas in
       Networked Systems

                                                                      Cyber-
                                                                                    Smart
                                                                     Physical
                                                                                    Grids
            Energy-                            Cloud                 Systems
           Efficiency                        Computing



                             Software-                                 Future
                              Defined                                 Internet
                             Communi-                                              Partici-
                              cations                                              patory/
                                                          Security
                                                                                 Opportunistic
                                                                                   Sensing
           Cognitive                                                 Federated
           Networks                                                   Social
                                                                     Networks

       25. April 2012                                                                            7
Torsten Braun: Research Challenges in Networked Systems



       Energy Consumption by
       Communications and Computing
       >     ICT already consumes approximately 2 % of energy,
             which is similar to air traffic. Trend is increasing.
       >     Approximately 10 % of ICT energy consumption by mobile
             communications (mainly base stations and mobile devices)
       >     LTE is even more energy consuming due to complex signal
             processing (MIMO, OFDM, etc.) than 3G.
       >     Trade-off between performance and energy consumption
             (→ optimization using power models, heuristics, and
             analytical techniques)




       25. April 2012                                                   8
Torsten Braun: Research Challenges in Networked Systems



       Energy-Efficient
       Communications and Computing
       >




       25. April 2012                                     9
Torsten Braun: Research Challenges in Networked Systems



       Cloud Computing: Problems

       >     Long delay between users and cloud computing infrastructure
       >     Cloud computing assumes permanently connected (mobile)
             devices and heavy communications.
       >     Processing and storage of sensitive data
       >     Availability and robustness
       >     High energy costs for data centres, in particular cooling




       25. April 2012                                                      10
Torsten Braun: Research Challenges in Networked Systems



       Cloud Computing: Challenges

       >     Use data centres close to user, data might follow mobile users
       >     Virtualization / isolation of computer and network resources
       >     Disruption-tolerant mechanisms and protocols
             for cloud computing
       >     Privacy and trust mechanisms
       >     Protection against
             denial-of-service attacks
       >     Replication vs. consistency
       >     Green data centres
       >     …




       25. April 2012                                                         11
Torsten Braun: Research Challenges in Networked Systems



       Software-Defined Communications

       More and more functions previously implemented in hardware
       or special-purpose devices will be implemented in software on
       general-purpose computers, e.g.,
       > Software-Defined Radio
              — High flexibility in terms of frequencies and
                protocols, cf. cognitive radio/networks,
                although energy consumption could be an issue
              — Future wireless systems might process even
                physical and medium access layers in software
              — Signal and protocol processing in the cloud allow
                global mobile telecommunication networks.
       >     Software-Defined Networks
              — control network devices (routers, switches, access points)
                via open APIs from external control plane software, e.g., OpenFlow
              — could simplify network configuration, e.g., in home networks

       25. April 2012                                                            12
Torsten Braun: Research Challenges in Networked Systems



       Cognitive Networks

       >     Cognitive Radio
              — Flexible adaptation to unused frequencies to better exploit
                the frequency spectrum (higher bandwidth and reliability)
       >     Generalization → Cognitive Networks
              — Application of cognitive radio approach                 Orient
                to higher protocol layers
              — Full parameterization of protocols
                based on learning and
                intelligent algorithms              Observe             Learn    Decide
              — Generation of tailored /
                customized software
                based on protocol descriptions
                                                          Environment    Act


       25. April 2012                                                                 13
Torsten Braun: Research Challenges in Networked Systems



       Smart Grids

       >     Automatic and distributed monitoring and control/adaptation of
             energy consumption, production, storage, distribution, pricing
             based on
              — accurate usage measurements by metering devices / sensors
              — interconnection of all components of the electricity grid
                (sensors, control elements, actors)
       >     Most electricity networks have
             not been designed for asymmetric
             and varying flow of energy and
             information.




       25. April 2012                                                         14
Torsten Braun: Research Challenges in Networked Systems



       Smart Grids: Challenges

       >     Intelligent, distributed, automated control and coordination
             possibly based on processing large amount of data, learning,
             and prediction
       >     Heterogeneous, adaptive, reliable, secure, self-managing
             networks
       >     Secure systems and networks
             (privacy, authentication,
             intrusion detection, etc.)
       >     …




       25. April 2012                                                       15
Torsten Braun: Research Challenges in Networked Systems



        Cyber-Physical Systems

    >       Control / Computing Co-Design
    >       actor/sensor networks & robots
            integrated into physical world
    >       have typically
            real-time requirements
    >       might use distributed /
            high-performance /
            cloud computing infrastructures




        25. April 2012                                    16
Torsten Braun: Research Challenges in Networked Systems



        Cyber-Physical Systems:
        Application Examples
    >       Critical infrastructures:
            power grid, transportation
    >       Traffic management
    >       Manufacturing
    >       Teams of (mobile)
            autonomous robots
    >       Building control
    >       Medical care




        25. April 2012                                    17
Torsten Braun: Research Challenges in Networked Systems



       Cyber-Physical Systems: Challenges

       >     Distributed real-time systems and control processing
       >     Robustness
       >     Communications and interoperability between
             systems and devices
       >     Security of systems and devices
             (confidentiality, data and service integrity),
             in particular to prevent attacks on control systems
       >     Machine-to-machine communication (→ security)
       >     Mobile CPS
       >     …




       25. April 2012                                               18
Torsten Braun: Research Challenges in Networked Systems



       Participatory and Opportunistic Sensing

       >     Motivation: Mobile end systems, cars etc. with several sensors
       >     Approach: Exploit
              — sensors, storage and processing capabilities of mobile end systems
              — mobility of users
             for sensing instead of deploying huge amount of static sensors.
       >     Application Examples
              — Environmental monitoring
              — Traffic monitoring
                and management
       >     Challenges
              — Feature extraction
                and data fusion
              — Reliability, authenticity
                and accuracy of data
              — Privacy
              — Incentives for and
                coordination of users
              — Relations to social networking, e.g., tagging of events
       25. April 2012                                                                19
Torsten Braun: Research Challenges in Networked Systems



       Federated Social Networks

       >     Today: centralized social network architectures
              — Social network provider knows all data about users and their relations
              — Disadvantages of central solutions, e.g., robustness, security
       >     Tomorrow (?): distributed/federated social network architecture require
              —     Open protocols and APIs, standardized data formats
              —     Federated authentication and authorization, access control
              —     Distributed storage
              —     Mechanisms to search distributed information




       25. April 2012                                                                    20
Torsten Braun: Research Challenges in Networked Systems



       Future Internet

       >     The current Internet is based on principles
             of the 1960s with the main purpose to
             interconnect large computers.
             Issues such as mobility, security, multimedia
             had lower importance.
       >     Today, Internet users are mainly interested in
             retrieving content and accessing services.
       >     Increasing bandwidth demand due to
              — (personalized) multimedia data streams
              — Cloud computing and storage,
                visualization on (mobile / high-resolution) end systems
              — Huge amounts of data from measurements and scientific experiments
              — Internet of Things, Internet of Services, …
       >     New approaches, e.g., Information-Centric Networking,
             need more research, development, testing etc.
       >     World-wide Future Internet research programs, e.g., GENI, FIRE

       25. April 2012                                                               21
Torsten Braun: Research Challenges in Networked Systems



       Security

       >     Internet infrastructure security, e.g., DNS, routing
       >     Security in new network paradigms, e.g., Future Internet
       >     System security
       >     Application security
       >     Cloud computing security
       >     Usability and security
       >     Network forensics vs. privacy
       >     Machine-to-machine communication,
             smart grids, CPS
       >     Federated social networks



       25. April 2012                                                   22
Torsten Braun: Research Challenges in Networked Systems



       Remarks on Research Organization

       >     Experimental research
              — Increasing importance of evaluation in testbeds,
                e.g., sensor network conferences
              — shared research infrastructures and
                repositories for results to
                     –      save costs
                     –      support comparability / repeatability of results
       >     Collaboration
              — High quality research benefits from joint research
                activities with a critical mass of persons.
                     –      Example: ACM EuroSys 2012
                            –  Average number of authors of accepted papers: 4.37
                            –  Average number of authors of rejected papers: 2.87
              — But avoid massive coordination overhead and free riding
       >     Evaluation
              — Articles in CS conferences with low acceptance rates (15-30 %)
                have often more impact than most journals.
       25. April 2012                                                               23
Torsten Braun: Research Challenges in Networked Systems



       ICT in EU Horizon 2020

       >     New generation of components and systems including
             micro/nano-electronics and photonics technologies,
             components and embedded systems engineering
       >     Next generation computing,
             advanced computing systems
             and technologies
       >     Infrastructures, technologies and
             services for the future Internet
       >     Content technologies and
             information management including
             ICT for digital content and creativity.
       >     Advanced interfaces and robots and
             robotics and smart spaces

       25. April 2012                                             24
Torsten Braun: Research Challenges in Networked Systems



       Conclusions

       >     Increasing importance of software,
             also in control and communication technology,
             possibly using cognitive approaches
       >     Security issues everywhere
       >     Energy efficiency as a grand challenge

       >     Complexity requires (interdisciplinary) research collaboration




       25. April 2012                                                         25
Torsten Braun: Research Challenges in Networked Systems



       Statements about the Future II

       >     The best way to predict the future is to invent it.
             (Alan Kay)




       25. April 2012                                              26
Torsten Braun: Research Challenges in Networked Systems



       Thanks for your attention !

       >     Contact
              — braun@iam.unibe.ch
              — http://cds.unibe.ch




       25. April 2012                                     27

Mais conteúdo relacionado

Mais procurados

FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...IJECEIAES
 
Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...TELKOMNIKA JOURNAL
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyClayton Hatathlie
 
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODSPSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODSIJNSA Journal
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
 
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc NetworksSecurity Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networksijtsrd
 
Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...IJECEIAES
 
A survey on software defined networking
A survey on software defined networkingA survey on software defined networking
A survey on software defined networkingredpel dot com
 
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...IJECEIAES
 
Mobile learning architecture using fog computing and adaptive data streaming
Mobile learning architecture using fog computing and adaptive data streamingMobile learning architecture using fog computing and adaptive data streaming
Mobile learning architecture using fog computing and adaptive data streamingTELKOMNIKA JOURNAL
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorIAEME Publication
 

Mais procurados (20)

FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...
 
Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODSPSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc NetworksSecurity Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
 
Manet overview
Manet overviewManet overview
Manet overview
 
Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...
 
Is3116341640
Is3116341640Is3116341640
Is3116341640
 
A survey on software defined networking
A survey on software defined networkingA survey on software defined networking
A survey on software defined networking
 
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...
 
Mobile learning architecture using fog computing and adaptive data streaming
Mobile learning architecture using fog computing and adaptive data streamingMobile learning architecture using fog computing and adaptive data streaming
Mobile learning architecture using fog computing and adaptive data streaming
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensor
 
Bn4301364368
Bn4301364368Bn4301364368
Bn4301364368
 

Semelhante a Research Challenges in Networked Systems

A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor NetworksDr. Amarjeet Singh
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor NetworksOn Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor NetworksTorsten Braun, Universität Bern
 
Future Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud TechnologiesFuture Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud TechnologiesTorsten Braun, Universität Bern
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
 
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATASYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATACSEIJJournal
 
Systems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big DataSystems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big DataCSEIJJournal
 
Systems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big DataSystems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big Datacivejjour
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIOSR Journals
 
Computer Network its application & network types
Computer Network its application & network typesComputer Network its application & network types
Computer Network its application & network typesMolayChakraBorty
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptxSuprithC2
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdfSherefHesham
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetMeshDynamics
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN BASHA
 

Semelhante a Research Challenges in Networked Systems (20)

A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor Networks
 
Iot Report
Iot ReportIot Report
Iot Report
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
1570272924-3
1570272924-31570272924-3
1570272924-3
 
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor NetworksOn Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
 
Future Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud TechnologiesFuture Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud Technologies
 
L010527175
L010527175L010527175
L010527175
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
 
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATASYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA
 
Systems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big DataSystems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big Data
 
Systems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big DataSystems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big Data
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
 
H017133442
H017133442H017133442
H017133442
 
Computer Network its application & network types
Computer Network its application & network typesComputer Network its application & network types
Computer Network its application & network types
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial Internet
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
 

Mais de Torsten Braun, Universität Bern

Content-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile NetworksContent-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile NetworksTorsten Braun, Universität Bern
 
Information-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksInformation-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksTorsten Braun, Universität Bern
 
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...Torsten Braun, Universität Bern
 
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...Torsten Braun, Universität Bern
 
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...Torsten Braun, Universität Bern
 
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksReliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksTorsten Braun, Universität Bern
 
Topology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc NetworksTopology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc NetworksTorsten Braun, Universität Bern
 
Content-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksContent-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksTorsten Braun, Universität Bern
 
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...Torsten Braun, Universität Bern
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor NetworksTorsten Braun, Universität Bern
 
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...Torsten Braun, Universität Bern
 

Mais de Torsten Braun, Universität Bern (20)

Internet of Things and Future Internet
Internet of Things and Future InternetInternet of Things and Future Internet
Internet of Things and Future Internet
 
Content-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile NetworksContent-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile Networks
 
Guaranteed Greedy Routing in Overlay Networks
Guaranteed Greedy Routing in Overlay NetworksGuaranteed Greedy Routing in Overlay Networks
Guaranteed Greedy Routing in Overlay Networks
 
Easily Deployable A4 Wireless Mesh Networks
Easily Deployable A4 Wireless Mesh NetworksEasily Deployable A4 Wireless Mesh Networks
Easily Deployable A4 Wireless Mesh Networks
 
Collaborations with U Coimbra and BME
Collaborations with U Coimbra and BMECollaborations with U Coimbra and BME
Collaborations with U Coimbra and BME
 
Real-World Energy Measurements of a Wireless Mesh Network
Real-World Energy Measurements of a Wireless Mesh NetworkReal-World Energy Measurements of a Wireless Mesh Network
Real-World Energy Measurements of a Wireless Mesh Network
 
Information-Centric Networking in Mobile Networks
Information-Centric Networking in Mobile NetworksInformation-Centric Networking in Mobile Networks
Information-Centric Networking in Mobile Networks
 
Ic0906 wi-uav UAVNet
Ic0906 wi-uav UAVNetIc0906 wi-uav UAVNet
Ic0906 wi-uav UAVNet
 
Die Evolution des Internet
Die Evolution des InternetDie Evolution des Internet
Die Evolution des Internet
 
Information-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksInformation-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile Networks
 
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
 
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
 
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
 
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksReliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
 
Topology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc NetworksTopology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc Networks
 
Content-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksContent-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant Networks
 
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor Networks
 
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
 
Soziale Netze – Einsatzmöglichkeiten der Zukunft
Soziale Netze – Einsatzmöglichkeiten der ZukunftSoziale Netze – Einsatzmöglichkeiten der Zukunft
Soziale Netze – Einsatzmöglichkeiten der Zukunft
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Research Challenges in Networked Systems

  • 1. The 5th VERDIKT Conference Research Challenges in Networked Systems Torsten Braun Research Group ―Communications and Distributed Systems‖ Institute of Computer Science and Applied Mathematics Universität Bern
  • 2. Torsten Braun: Research Challenges in Networked Systems Overview > Recommendations from Evaluation of ICT Research in Norway > Looking Back: Topics in the Year 2000 > Future Research Topics and Challenges > Remarks on Research Organization > ICT in EU Horizon 2020 > Conclusions 25. April 2012 2
  • 3. Torsten Braun: Research Challenges in Networked Systems Statements about the Future I > It is difficult to make predictions, especially about the future. (Karl Valentin, Mark Twain, Winston Churchill, Albert Einstein, Niels Bohr etc.) > Most technologies that will be used widely in 5-10 years are already existing in a lab today. We just do not know which of them will be successful. (Paul Kühn, KiVS Conference 1999) 25. April 2012 3
  • 4. Torsten Braun: Research Challenges in Networked Systems Evaluation of ICT Research in Norway Recommendations: ―Research areas are often fragmented and not well aligned with Norwegian industry. A bottom-up «free academic» approach is dominating …. Although the outcome of this funding is not bad, coordination is lacking …. An obvious strategic area is ICT in life sciences, but also industrial robotics in dangerous environments such as off-shore, and cyber‐security. ICT in Energy and Power Engineering also seems also an obvious strategic research area of national interest.‖ 25. April 2012 4
  • 5. Torsten Braun: Research Challenges in Networked Systems Networked Systems 25. April 2012 5
  • 6. Torsten Braun: Research Challenges in Networked Systems Looking Back: ToCs in the Year 2000 > Wireless sensor networks > Software defined radio and multi-sensor data fusion > Programmable networks > Denial of service and > Voice over IP intrusion detection > Mobile ad-hoc networks > Internet-connected robots > Beyond 3G mobile networks > Ubiquitous computing > Mobile agents > E-commerce > Digital libraries > Web services > Multimedia over ATM 25. April 2012 6
  • 7. Torsten Braun: Research Challenges in Networked Systems Potential Future Research Areas in Networked Systems Cyber- Smart Physical Grids Energy- Cloud Systems Efficiency Computing Software- Future Defined Internet Communi- Partici- cations patory/ Security Opportunistic Sensing Cognitive Federated Networks Social Networks 25. April 2012 7
  • 8. Torsten Braun: Research Challenges in Networked Systems Energy Consumption by Communications and Computing > ICT already consumes approximately 2 % of energy, which is similar to air traffic. Trend is increasing. > Approximately 10 % of ICT energy consumption by mobile communications (mainly base stations and mobile devices) > LTE is even more energy consuming due to complex signal processing (MIMO, OFDM, etc.) than 3G. > Trade-off between performance and energy consumption (→ optimization using power models, heuristics, and analytical techniques) 25. April 2012 8
  • 9. Torsten Braun: Research Challenges in Networked Systems Energy-Efficient Communications and Computing > 25. April 2012 9
  • 10. Torsten Braun: Research Challenges in Networked Systems Cloud Computing: Problems > Long delay between users and cloud computing infrastructure > Cloud computing assumes permanently connected (mobile) devices and heavy communications. > Processing and storage of sensitive data > Availability and robustness > High energy costs for data centres, in particular cooling 25. April 2012 10
  • 11. Torsten Braun: Research Challenges in Networked Systems Cloud Computing: Challenges > Use data centres close to user, data might follow mobile users > Virtualization / isolation of computer and network resources > Disruption-tolerant mechanisms and protocols for cloud computing > Privacy and trust mechanisms > Protection against denial-of-service attacks > Replication vs. consistency > Green data centres > … 25. April 2012 11
  • 12. Torsten Braun: Research Challenges in Networked Systems Software-Defined Communications More and more functions previously implemented in hardware or special-purpose devices will be implemented in software on general-purpose computers, e.g., > Software-Defined Radio — High flexibility in terms of frequencies and protocols, cf. cognitive radio/networks, although energy consumption could be an issue — Future wireless systems might process even physical and medium access layers in software — Signal and protocol processing in the cloud allow global mobile telecommunication networks. > Software-Defined Networks — control network devices (routers, switches, access points) via open APIs from external control plane software, e.g., OpenFlow — could simplify network configuration, e.g., in home networks 25. April 2012 12
  • 13. Torsten Braun: Research Challenges in Networked Systems Cognitive Networks > Cognitive Radio — Flexible adaptation to unused frequencies to better exploit the frequency spectrum (higher bandwidth and reliability) > Generalization → Cognitive Networks — Application of cognitive radio approach Orient to higher protocol layers — Full parameterization of protocols based on learning and intelligent algorithms Observe Learn Decide — Generation of tailored / customized software based on protocol descriptions Environment Act 25. April 2012 13
  • 14. Torsten Braun: Research Challenges in Networked Systems Smart Grids > Automatic and distributed monitoring and control/adaptation of energy consumption, production, storage, distribution, pricing based on — accurate usage measurements by metering devices / sensors — interconnection of all components of the electricity grid (sensors, control elements, actors) > Most electricity networks have not been designed for asymmetric and varying flow of energy and information. 25. April 2012 14
  • 15. Torsten Braun: Research Challenges in Networked Systems Smart Grids: Challenges > Intelligent, distributed, automated control and coordination possibly based on processing large amount of data, learning, and prediction > Heterogeneous, adaptive, reliable, secure, self-managing networks > Secure systems and networks (privacy, authentication, intrusion detection, etc.) > … 25. April 2012 15
  • 16. Torsten Braun: Research Challenges in Networked Systems Cyber-Physical Systems > Control / Computing Co-Design > actor/sensor networks & robots integrated into physical world > have typically real-time requirements > might use distributed / high-performance / cloud computing infrastructures 25. April 2012 16
  • 17. Torsten Braun: Research Challenges in Networked Systems Cyber-Physical Systems: Application Examples > Critical infrastructures: power grid, transportation > Traffic management > Manufacturing > Teams of (mobile) autonomous robots > Building control > Medical care 25. April 2012 17
  • 18. Torsten Braun: Research Challenges in Networked Systems Cyber-Physical Systems: Challenges > Distributed real-time systems and control processing > Robustness > Communications and interoperability between systems and devices > Security of systems and devices (confidentiality, data and service integrity), in particular to prevent attacks on control systems > Machine-to-machine communication (→ security) > Mobile CPS > … 25. April 2012 18
  • 19. Torsten Braun: Research Challenges in Networked Systems Participatory and Opportunistic Sensing > Motivation: Mobile end systems, cars etc. with several sensors > Approach: Exploit — sensors, storage and processing capabilities of mobile end systems — mobility of users for sensing instead of deploying huge amount of static sensors. > Application Examples — Environmental monitoring — Traffic monitoring and management > Challenges — Feature extraction and data fusion — Reliability, authenticity and accuracy of data — Privacy — Incentives for and coordination of users — Relations to social networking, e.g., tagging of events 25. April 2012 19
  • 20. Torsten Braun: Research Challenges in Networked Systems Federated Social Networks > Today: centralized social network architectures — Social network provider knows all data about users and their relations — Disadvantages of central solutions, e.g., robustness, security > Tomorrow (?): distributed/federated social network architecture require — Open protocols and APIs, standardized data formats — Federated authentication and authorization, access control — Distributed storage — Mechanisms to search distributed information 25. April 2012 20
  • 21. Torsten Braun: Research Challenges in Networked Systems Future Internet > The current Internet is based on principles of the 1960s with the main purpose to interconnect large computers. Issues such as mobility, security, multimedia had lower importance. > Today, Internet users are mainly interested in retrieving content and accessing services. > Increasing bandwidth demand due to — (personalized) multimedia data streams — Cloud computing and storage, visualization on (mobile / high-resolution) end systems — Huge amounts of data from measurements and scientific experiments — Internet of Things, Internet of Services, … > New approaches, e.g., Information-Centric Networking, need more research, development, testing etc. > World-wide Future Internet research programs, e.g., GENI, FIRE 25. April 2012 21
  • 22. Torsten Braun: Research Challenges in Networked Systems Security > Internet infrastructure security, e.g., DNS, routing > Security in new network paradigms, e.g., Future Internet > System security > Application security > Cloud computing security > Usability and security > Network forensics vs. privacy > Machine-to-machine communication, smart grids, CPS > Federated social networks 25. April 2012 22
  • 23. Torsten Braun: Research Challenges in Networked Systems Remarks on Research Organization > Experimental research — Increasing importance of evaluation in testbeds, e.g., sensor network conferences — shared research infrastructures and repositories for results to – save costs – support comparability / repeatability of results > Collaboration — High quality research benefits from joint research activities with a critical mass of persons. – Example: ACM EuroSys 2012 – Average number of authors of accepted papers: 4.37 – Average number of authors of rejected papers: 2.87 — But avoid massive coordination overhead and free riding > Evaluation — Articles in CS conferences with low acceptance rates (15-30 %) have often more impact than most journals. 25. April 2012 23
  • 24. Torsten Braun: Research Challenges in Networked Systems ICT in EU Horizon 2020 > New generation of components and systems including micro/nano-electronics and photonics technologies, components and embedded systems engineering > Next generation computing, advanced computing systems and technologies > Infrastructures, technologies and services for the future Internet > Content technologies and information management including ICT for digital content and creativity. > Advanced interfaces and robots and robotics and smart spaces 25. April 2012 24
  • 25. Torsten Braun: Research Challenges in Networked Systems Conclusions > Increasing importance of software, also in control and communication technology, possibly using cognitive approaches > Security issues everywhere > Energy efficiency as a grand challenge > Complexity requires (interdisciplinary) research collaboration 25. April 2012 25
  • 26. Torsten Braun: Research Challenges in Networked Systems Statements about the Future II > The best way to predict the future is to invent it. (Alan Kay) 25. April 2012 26
  • 27. Torsten Braun: Research Challenges in Networked Systems Thanks for your attention ! > Contact — braun@iam.unibe.ch — http://cds.unibe.ch 25. April 2012 27