Vision Networks make it easy to locate resources, both nearby and further away, using names that express what is needed (e.g., "the nearest available printer"), rather than where to find it (e.g., myprinter.mynet.com). This makes them more useful and more resilient to failures, load conditions, and resource mobility.
Networks route heterogeneous traffic efficiently, in response to application
demands, through nodes that differ in connectivity, computational power, and
resources. They adapt to current channel conditions, no longer treating all
channels as "leaky pipes" with fixed and known diameters (peak bandwidths) and
loss characteristics. This adaptability is essential for wireless channels,
whose peak bandwidth and error characteristics can vary dynamically and
unpredictably. RF channels, for example, are affected by terrain, weather, and
interference from other transmitters. Networks respond flexibly to such
unpredictability. Instead of sending all packets at low data rates or
broadcasting at high power, they allow applications to trade data rates off
against energy consumption. Instead of always using complex and costly error
correction, they use only as much as applications require. Instead of being
designed to handle unlikely combinations of worst-case conditions, they are
designed more economically to handle current or common conditions.
Approach
Collaborative regions Resource and location discovery N21 networks integrate name resolution and routing. Intra-space routing protocols perform resolution and forwarding based on queries that express the characteristics of the desired data or resources in a collaborative region. Late binding between names and addresses (i.e., at delivery time) supports mobility and multicast. Early binding supports high bandwidth streams and anycast. Wide-area routing uses a scalable resolver architecture; techniques for soft state and caching provide scalability and fault tolerance. N21 networks support location discovery through proximity to named physical objects (for example, low-power RF beacons embedded in the walls of buildings). Location discovery enables mobile devices to access and present location-specific information. For example, an H21 might help visitors navigate to their destination with spoken right-left instructions; held up next to a paper or an electronic poster of an old talk, it could provide access to stored audio and video fragments of the talk; pointed to a door, it could provide information about what is happening behind the door. Security Resource and location discovery systems address privacy issues by giving resources and users control over how much to reveal. Rather than tracking the identity, location, and characteristics of all resources and users at all times, these systems accept and propagate only the information that resources and users choose to advertise. Self-certifying names enable clients of discovery systems to trust the advertised information. Adaptation Oxygen Today Dynamic networks
Span is a topology maintenance protocol for energy efficient, ad-hoc wireless
networks. Since idle receive circuits consume almost as much power listening
for packets as do active circuits when receiving packets, Span nodes save power
by turning off their radio receivers most of the time. Nonetheless, they
forward packets between any source and destination with a delay close to a
standard 802.11 ad-hoc network, and the topology formed by awake nodes provides
about as much total capacity as the original network. (Hari Balakrishnan, Networks and Mobile Systems; Robert Morris, Parallel and Distributed Operating Systems)
A Resiliant Overlay Network (RON)
allows distributed Internet applications to detect and recover from path
outages and periods of degraded performance within several seconds, improving
over today's wide-area routing protocols that take at least several minutes to
recover. RON nodes use active measurements to monitor the functioning and
quality of the Internet paths among themselves, and use this information to
decide whether to route packets directly over the Internet or by way of other
RON nodes, optimizing the path using application-specific routing metrics. (Hari Balakrishnan, Networks and Mobile Systems; M. Frans Kaashoek, Robert Morris, Parallel and Distributed Operating Systems)
Chord is a scalable distributed
lookup protocol for peer-to-peer networks. Chord maps keys to nodes, adapting
efficiently as nodes join and leave the system. Communication costs and the
state maintained by each node scale logarithmically with the number of Chord
nodes. The Cooperative File System
(CFS) is based on Chord
and provides highly available, read-only storage to a group of cooperating
users. (Hari Balakrishnan, Networks and Mobile Systems; M. Frans Kaashoek, Robert Morris, Parallel and Distributed Operating Systems;
David Karger, Theory of Computation)
Resource discovery
Access to resources is either public or protected by SPKI/SDSI (Simple Public
Key Intrastructure / Simple Distributed Security Infrastructure) access control
lists (ACLs). Software proxies (K21s) for resources and users run either on
embedded processors or, for users and lightweight resources, on remote hosts
that communicate securely with resources using shared symmetric keys. When
using INS for resource discovery, a user's K21 proxy presents authorization
information along with an intentional query, and INS compares this information
to resource-supplied ACLs, thereby sparing the user from having to iterate
through lists of inaccessible resources while searching for an accessible one.
(Srinivas Devadas, Computation Structures Group; Ronald Rivest, Cryptography and Information
Security) Mobility
The Self-Certifying File System
(SFS) is a secure decentralized global file system that provides users with
authenticated access to their data from any location. SFS path names
effectively contain public keys, which makes them self-certifying and
guarantees that the files being accessed indeed belong to the user. (M. Frans Kaashoek, Parallel and Distributed Operating Systems)
Network applications |
||