The network of everything, The Internet 0
Upcoming SlideShare
Loading in...5
×
 

The network of everything, The Internet 0

on

  • 2,405 views

The principles that gave rise to the Internet are leading to the network of everyday devices, The Internet 0.

The principles that gave rise to the Internet are leading to the network of everyday devices, The Internet 0.

Statistics

Views

Total Views
2,405
Views on SlideShare
2,403
Embed Views
2

Actions

Likes
0
Downloads
22
Comments
1

1 Embed 2

http://www.slideshare.net 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • Awesome presentation, congratulations!
    http://www.medicaldebtsconsolidation.com
    http://www.medicaldebtsconsolidation.com/category/bankruptcy/
    http://www.medicaldebtsconsolidation.com/category/medical-bills/
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

The network of everything, The Internet 0 The network of everything, The Internet 0 Presentation Transcript

  • Prof. Neil Gershenfeld Director http://cba.mit.edu/~neilg NSF CCR-0122419
  •  
  •  
  •  
  •  
  • I0 Beliefs
    • IP to leaf nodes
    • peers don’t need servers
    • physical identity
    • compiled standards
    • open standards
    • big bits
    • end-to-end modulation
  • Big Bits 3x10 8 m/s / 100 m = 3x10 6 s -1 time frequency RF IR AC
  • End-To-End Modulation UDP, TCP IP SLIP ASCII 8N1 start stop 0 1 0 0 1 0 0 1 “ I” Δ t no numbers
  •  
  •  
  •  
  •  
  • Click Coding
  • SEA: a Scalable Encryption Algorithm for Small Embedded Applications F.-X.Standaert, G. Piret, N. Gershenfeld, and J.-J. Quisquater ECRYPT Workshop on RFID and Lightweight Crypto, Graz, Austria (July 13-15, 2005)
    • Scalable
    • Provable security against linear, differential cryptanalysis
    • Provable diffusion
    • Parallel encryption/decryption
    • On-the-fly key derivation
    • Space -> time tradeoff
  • Protocols as Distributed Optimization IP TCP PHY layering: TCP flow control: networking: utility routes capacities (Low, Chiang, Doyle, Kelly, Maulloo, Tan, Mo, Walrand, ...)
  • IR RF powerline multidrop RFID bar codes mag stripe telephone telegraph IRDA Bluetooth Homeplug RS-485 ISO 18000/EPC UPC ANSI/ISO V.92 Morse Code I Ø
  • http://cba.mit.edu/events/04.09.I0/ end-to-end modulation interdevice internetworking
  • Cambridge University Press Henry Holt and Company http://cba.mit.edu/~neilg Basic Books