networking outside the networks
DESCRIPTION
Networking Outside the Networks. Vesa A. Korhonen [email protected] University of Jyväskylä Department of Mathematical Information Technology JAMK University of Applied Sciences School of Business and Services Management. Structure of the Presentation. The World of Networks - PowerPoint PPT PresentationTRANSCRIPT
UNIVERSITY OF JYVÄSKYLÄ
Vesa A. [email protected]
University of JyväskyläDepartment of Mathematical Information Technology
JAMK University of Applied SciencesSchool of Business and Services Management
Networking Outside the Networks
UNIVERSITY OF JYVÄSKYLÄ
27.5.2009 Korhonen: Networking Outside the Networks
2/12
Structure of the Presentation
The World of Networks Changes, “subtle and profound”, at the same time Changes in Networking: Mobile Encounter Network The Dark Side of the Encounter Network Conclusions
UNIVERSITY OF JYVÄSKYLÄ
27.5.2009 Korhonen: Networking Outside the Networks
3/12
Network – The World
Our World is the World of (Electronic) Networks– Social – Work-oriented– Learning-related– Combinations of these
Mobile Networking– Take whatever you want wherever you want whenever you want– Smart, hand-held devices capable of communicating while moving– Access to the Internet (GSM Data, 3G, 4G)– But there’s more…
UNIVERSITY OF JYVÄSKYLÄ
Technology and the Society?
James Atherton: The Great Stirrup Controversyhttp://www.doceo.co.uk/rbl/stirrup.htm
“We tend to think of technology as a kind of passive servant, which solves problems which we define, and for which it was invented. We are much less comfortable with its unintended consequences, which may be both subtle and profound. “
The Internet: The unintended consequences can already be seen.
27.5.2009 Korhonen: Networking Outside the Networks
4/12
UNIVERSITY OF JYVÄSKYLÄ
5/12
Mobile Encounter Network?
Short-range wireless ad-hoc –style local communication.
A paradigm, not a technology. “Content located on the edge”: Any member of the
network may be data producer. MENs are not created or built, they emerge.
(For details: Try giving “korhonen v kurhinen j”, for example, to Google Scholar.)
27.5.2009 Korhonen: Networking Outside the Networks
UNIVERSITY OF JYVÄSKYLÄ
27.5.2009 Korhonen: Networking Outside the Networks
6/12
Mobile Encounter Network!
Smart mobile devices do exist:– Smart phones– Internet tablets– Mini laptops– You name them…!
Using– Bluetooth– WLAN– ZigBee(?)
UNIVERSITY OF JYVÄSKYLÄ
27.5.2009 Korhonen: Networking Outside the Networks
7/12
Using Mobility and Encounters
In MEN, the focus is on the individual encounters between the devices.
An encounter allows data items being exchanged between devices.
Mobility allows new peer being reached.
→ Data diffusion.
UNIVERSITY OF JYVÄSKYLÄ
Properties of the Encounter Network
Private. Controllable by the user(s), cannot be monitored.
Starting your own terminal device allows you to send and received data.
The terminal device may be hidden within your pocket.
8/1227.5.2009 Korhonen: Networking Outside the Networks
UNIVERSITY OF JYVÄSKYLÄ
27.5.2009 Korhonen: Networking Outside the Networks 9/12
Using Mobile Encounter Networking
MEN allows you see and meet things because of – where you are (locality) and – when you are (short life-cycle of data),
not because of – who you are (anonymity).
You may not receive items of large value,– (low security, no business applications)
but you get them without extra cost:– No operator involved.
UNIVERSITY OF JYVÄSKYLÄ
27.5.2009 Korhonen: Networking Outside the Networks 10/12
A Research Topic: The Selectivity Problem
Sender not knowing whom to send. Receiver not knowing what to receive. Using encounters in data delivery?
The Conference Schedule Change– The first step: By-passer receives the data from the
info desk.– The next step: By-passer diffuses the data to other
attendees she encounters.
UNIVERSITY OF JYVÄSKYLÄ
11/12
The Dark Side?
An observation made when turning the Selectivity Problem around:– You can make virtually anything available virtually anywhere, – with a very small probability of getting caught.
Detecting the parties of an information exchange transaction is quite difficult.
No trace of the transfer is left anywhere. These are desired properties for distributing
illegal/inappropriate information.
27.5.2009 Korhonen: Networking Outside the Networks
UNIVERSITY OF JYVÄSKYLÄ
27.5.2009 Korhonen: Networking Outside the Networks 12/12
Conclusions
MEN: a paradigm with – a future– a Dark Side
With the Unintended Consequences.