The document discusses IoT architecture and related concepts. It describes IoT as a system of interconnected computing devices, data stores, and sensors embedded in the physical world. It discusses the components of an IoT system and how they interact. It also discusses IoT technologies, protocols, platforms and applications. The document provides examples of IoT use cases and explores architectural considerations for IoT systems.
Software Defined Networking: Network VirtualizationNetCraftsmen
SDN has the potential to revolutionize the way networks are designed, sold, and operated. This presentation describes SDN, discusses what it can do, and presents use cases. It also talks about the current and potential impact of SDN on the networking industry.
Software Defined Networking: Network VirtualizationNetCraftsmen
SDN has the potential to revolutionize the way networks are designed, sold, and operated. This presentation describes SDN, discusses what it can do, and presents use cases. It also talks about the current and potential impact of SDN on the networking industry.
Lambda Data Grid: An Agile Optical Platform for Grid Computing and Data-inten...Tal Lavian Ph.D.
Lambda Data Grid
An Agile Optical Platform for Grid Computing
and Data-intensive Applications
Focus on BIRN Mouse application.
Great vision –
LambdaGrid is one step towards this concepts
LambdaGrid –
A novel service architecture
Lambda as a Scheduled Service
Lambda as a prime resource - like storage and computation
Change our current systems assumptions
Potentially opens new horizon
A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
Lambda Data Grid: An Agile Optical Platform for Grid Computing and Data-inten...Tal Lavian Ph.D.
Lambda Data Grid
An Agile Optical Platform for Grid Computing
and Data-intensive Applications
Integrated SW System Provide the “Glue”
Dynamic optical network as a fundamental Grid service in data-intensive Grid application, to be scheduled, to be managed and coordinated to support collaborative operations
Common Design Elements for Data Movement Eli DartEd Dodds
Eli Dart, Network Engineer ESnet Science Engagement Lawrence Berkeley National Laboratory Cosmology CrossConnects Workshop Berkeley, CA February 11, 2015
Tech 2 tech low latency networking on Janet presentationJisc
This event took place on 27 October 2021.
In this Tech 2 Tech session, we considered questions such as:
- Which types of applications need low latency, and what are their specific requirements for both latency and jitter?
- What levels of latency might you expect across Janet?
- What can you do to optimise latency for your networked applications?
- How can we measure latency and jitter?
Lambda Data Grid: An Agile Optical Platform for Grid Computing and Data-inten...Tal Lavian Ph.D.
Lambda Data Grid
An Agile Optical Platform for Grid Computing
and Data-intensive Applications
Focus on BIRN Mouse application.
Great vision –
LambdaGrid is one step towards this concepts
LambdaGrid –
A novel service architecture
Lambda as a Scheduled Service
Lambda as a prime resource - like storage and computation
Change our current systems assumptions
Potentially opens new horizon
A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
Lambda Data Grid: An Agile Optical Platform for Grid Computing and Data-inten...Tal Lavian Ph.D.
Lambda Data Grid
An Agile Optical Platform for Grid Computing
and Data-intensive Applications
Integrated SW System Provide the “Glue”
Dynamic optical network as a fundamental Grid service in data-intensive Grid application, to be scheduled, to be managed and coordinated to support collaborative operations
Common Design Elements for Data Movement Eli DartEd Dodds
Eli Dart, Network Engineer ESnet Science Engagement Lawrence Berkeley National Laboratory Cosmology CrossConnects Workshop Berkeley, CA February 11, 2015
Tech 2 tech low latency networking on Janet presentationJisc
This event took place on 27 October 2021.
In this Tech 2 Tech session, we considered questions such as:
- Which types of applications need low latency, and what are their specific requirements for both latency and jitter?
- What levels of latency might you expect across Janet?
- What can you do to optimise latency for your networked applications?
- How can we measure latency and jitter?
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2. IoT
• A system of intercommunicating computing, data stores, and
devices embedded in the physical world (with some non-ICT
purpose but capable of some degree of
sensing/actuating/processing/storage), fulfilling some
purpose that could not be achieved by some subset of system
• Architecture
– What components in an IoT system?
– How do they interact?
• Technology / protocols
– What is an IoT technology?
– What is an IoT protocol?
– What is an IoT platform?
– What is an IoT application?
Copyright Spring 2017, Rudra Dutta, NCSU 2
3. Sample Usecase
• Consider the following usecase
– Bicyclists and pedestrians with GPS, connected heart-
rate/bp/blood-oxy meters, augmented reality glasses;
stationary and mobile connected air quality monitors
– When they turn to look in some direction, AR display
provides detailed/digested information about personalized
risk by smart integration of data from sensors, historical
data of health incidents of users correlated with historical
sensor data
• What does it take to get this done?
Copyright Spring 2017, Rudra Dutta, NCSU 3
4. Architecture – What is it
• Underlying structure that bridges intent and design
– What something needs to do and how to do it
– Actual design is distinct from architecture
• Typically same architecture can be realized by many designs
• Entities and interactions
– Potentially at multiple levels
• Entities are separated by jurisdiction/policy
• Interactions define entity capabilities/functions
– Must be standardized protocols
– Define what, not how
Copyright Fall 2016, Rudra
5. Networking
• A network is a distributed system
• Main complexity / variety comes from “boxes”
– Routers, switches, bridges, gateways, …
– Links are communications devices rather than
networking
• A network “box” is a special purpose
computer
– Use: forward data packets
– But need to configure, and possibly program
– May be static
Copyright Spring 2017, Rudra Dutta, NCSU 5
6. Network Operation
• Much of network operation comes from what routers
(forwarding engines) do
– “They forward packets”
• What routers are asked to do
– Architectural question: affects many entities
• How routers do what they do
– Implementation question: vendor-specific smarts, black-box solutions
• To have an impact on performance, must change either the
How or the What
– And trying to change the What will require changing/re-doing/re-
examining the How also
Copyright Fall, 2016, Rudra Dutta, NCSU
7. Copyright Fall, 2016, Rudra Dutta, NCSU
Ethernet – Example of Why/How
• Originally a wrapper around CSMA/CD
• A station does not transmit on busy carrier
– Uninterrupted packet transmissions can occur,
even with high traffic arrival rate
• A station stops transmission on sensing
collision
– Time wasted in contention is reduced
8. Ethernet
Copyright Fall, 2016, Rudra Dutta, NCSU
Source address
Dest. address
EtherType/
Length
...
Payload
...
...
...
FCS
SFD
Preamble
10101011
10101010 (7 times)
46 ≤ ≤ 1500
• Classic Ethernet
• Type/Length duality
– Value ≤ 1500 payload length (bytes)
– Value ≥ 1536 protocol encapsulated
• Organizationally Unique Identifier in addresses (first 3 octets)
– For globally unique addresses (bitflag in OUI part)
• Maximum and minimum wire lengths
• Binary exponential backoff
• Reception by noting destination address
• 12 octet interframe gap
9. Ethernet Hub
• Instead of long distributed medium and short tap-offs, a
short localized “medium”-in-a-box, and long “tap-off”s
– Convenience in installation
– But a major philosophical shift
• Standard defines how stations send and transmit on
medium, not how “medium” behaves
– Assumption: like a wire – but not required for compliance
Copyright Fall, 2016, Rudra Dutta, NCSU
10. Switched Ethernet
• “Hub” contracted long wire into a box
• “Switch” replaces short wire in box with a
switchable network
– No collisions – no MAC!
• Supports simultaneous transmissions
– But needs buffering Copyright Fall, 2016, Rudra Dutta, NCSU
11. Infinite Diversity Allowed
• “… while SIP typically is used over UDP or TCP, it could, without technical
changes, be run over IPX, or carrier pigeons, ATM AAL5 or X.25, in rough
order of desirability” (RFC 2458)
• RFC 1149: A Standard for the Transmission of IP Datagrams on Avian
Carriers
– “Avian carriers can provide high delay, low throughput, and low altitude
service”
Architectural change?
Copyright Fall 2016, Rudra
12. Architectural Change
• When the scope of the system, or entity within
system changes
• Either way, requires new protocols
– Old protocols may exist unchanged, require change, or
become unnecessary
• Usual drivers
– System scope change
• The need/desire for more automation
• In turn driven by the need for speed (or other desirable metric), or
reducing ennui
– Entity separation or re-factoring
• Economics
Copyright Fall 2016, Rudra
13. Example: IP Address Configuration
• Originally static, and manual
– Independently at each host that needs to connect
• Desire to automate
– Reducing ennui for admin (and ensuing errors)
– Diskless workstations
– Scale
• BUT: different authority for configuring different sets of hosts
– Solution must be scoped for that authority
– Possibly replicated, possibly with variations, in other scope
• RARP BOOTP DHCP
Copyright Fall 2016, Rudra
14. Copyright Fall 2016, Rudra Dutta, CSC, NCSU
DHCP: Dynamic Host Configuration Protocol
Goal: dynamically obtain an IP address
from network server
DHCP overview:
– host broadcasts “DHCP discover”
msg
– DHCP server responds with
“DHCP offer” msg
– host requests IP address: “DHCP
request” msg
– DHCP server sends address:
“DHCP ack” msg
Relay agent on
every LAN
• Allows reuse of addresses
• Support for mobile users
• Critical for ISPs
DHCP request
15. Architectural Evolution
• Interactions represent constraints on entities
– Entities must present correct interface for other
entities to be able to inter-operate
• “Constrain to de-constrain” (John Doyle,
Caltech)
– Defining what an entity must do allows freedom in
how to do it
– Can create new entities and interactions that
would have had no place in earlier architecture
Copyright Fall 2016, Rudra
16. IoT Architecture
• “Physical” components / capabilities
– Sensors / Actuators
– Compute, store, communicate data
• Additional “logical” components
– Security and dependability composition
– Time bound composition
– Cross-ownership service composition
– Policy negotiation and governance
– Federated orchestration
• Objectives
– Predictable scalability, stability, correctness, time-to-complete
Copyright Spring 2017, Rudra Dutta, NCSU 16
17. IoT as Confluence
Copyright Rudra Dutta, CSC, NCSU, Spring 2016 17
* Reproduced from Luigi Atzori, Antonio Iera, Giacomo Morabito, "The Internet of Things: A survey”.
Computer Networks, Volume 54, Issue 15, October 2010, Pages 2787 - 2805.
18. IoT as Confluence
• What examples do the authors give to show
that each vision cannot individually, or in
pairs, capture the real IoT vision completely ?
• Can running example (air quality health
advising) be seen as adequately covered by
the confluence of the three visions?
• Can you think of an example that is not
sufficiently covered even by the confluence of
all three?
Copyright Spring 2017, Rudra Dutta, NCSU 18
19. Cyber-Physical Systems
• “Cyber-physical systems integrate sensing, computation,
control and networking into physical objects and
infrastructure, connecting them to the Internet and to each
other.” – NSF
• “The next generation of engineered systems that require tight
integration of computing, communication, and control
technologies to achieve stability, performance, reliability,
robustness, and efficiency in dealing with physical systems of
many application domains.” [KimKumar 2012]
• So… same as IoT, then?
– Wait, “control”…
Copyright Rudra Dutta, CSC, NCSU, Spring 2016 19
Kyoung-Dae Kim and P. R. Kumar, "Cyber-Physical Systems: A Perspective at the
Centennial". Proceedings of the IEEE, Vol.100, Special Centennial Issue, Pages 1287-1308, May 2012.
20. Control System
• A “plant” evolves according to applicable
physical laws or phenomena, and some
“input”
• A “governor” / controller ensures some target
characteristic of the plant state and output, by
observing output, and modifying input
• Digital/hybrid control system: controller is
wholly or partly a computer/algorithm
• Networked control system: controlling
computer is remote
Copyright Rudra Dutta, CSC, NCSU, Spring 2016 20
22. Classical Control
• Feedback control
– Controller may have a model of plant
– Even in absence of model uncertainty, setpoints can be
achieved
– Stable systems can be made from underlying inherently
less stable (or unstable) plants
• Transfer functions
– What plant (system) does under given reference inputs
– If system is linear, can superpose
– If system is time-invariant, can dispense with history
– Laplace transforms as an easier way to analyze and design
Copyright Spring 2017, Rudra Dutta, NCSU 22
23. PID Controllers
• P, I, and D of error function superposed to create
correction input general class of controllers,
tuning consists of picking three constants
– Pure (especially) D may not be realizable or desirable
introduce smoothing / lag
Copyright Spring 2017, Rudra Dutta, NCSU 23
Plant
P
I
D
24. Generalization
• Non-linear system control
• Analysis: Laplace and Z transforms, Bode plots,
Nyquist plots, Lyapunov stabilty criteria, …
• Digital control, hybrid control, hierarchical control
• Main concepts relevant to context
– Observability, controllablity
– Model identification, adaptation, robustness
– Decentralized control
– Delay (lag), stability, relation thereof
Copyright Spring 2017, Rudra Dutta, NCSU 24
25. Back to IoT / CPS
• A controller that “closes the loop” in the
physical world by using computation in
cyberspace
• Plant may be (is likely) distributed
• Controller may be (is likely) distributed
• Perforce, must be real-time (for some
definition of real-time)
Copyright Rudra Dutta, CSC, NCSU, Spring 2016 25
26. CPS Example
• HVAC example previously discussed
• Autonomous cars?
• Running example: air quality?
• Observation: arbitrary time-bounds arise from
desired performance, less arbitrary time-
bounds arise from stability criteria
Copyright Spring 2017, Rudra Dutta, NCSU 26
27. IoT
• A system of intercommunicating computing, data stores, and
devices embedded in the physical world (with some non-ICT
purpose but capable of some degree of
sensing/actuating/processing/storage), fulfilling some
purpose that could not be achieved by some subset of system
• Architecture
– What components in an IoT system?
– How do they interact?
• Technology / protocols
– What is an IoT technology?
– What is an IoT protocol?
– What is an IoT platform?
– What is an IoT application?
Copyright Spring 2017, Rudra Dutta, NCSU 27
28. IoT
• A system of intercommunicating computing, data stores, and
devices embedded in the physical world (with some non-ICT
purpose but capable of some degree of
sensing/actuating/processing/storage), fulfilling some
purpose that could not be achieved by some subset of system
– With multiple owners, interests
– With dynamic membership
– With “real-time” bounds
• What is an IoT platform?
• What is an IoT application?
Copyright Spring 2017, Rudra Dutta, NCSU 28
29. Back to IoT Architecture
• Remember: entities and interactions
– How to enable some interactions can give rise to other entities (example of
DNS)
– Expansion/refactoring architectural change
• Entities: Users/Pro-sumers (agents)
– Represent sense/actuate/transmit/transform/store capabilities
– Represent goals, translating to need for same
– Represent intent/policy to collaborate to achieve goal
• Interactions (need interfaces/protocols):
– Rendezvous
• Declare intents, capabilities
• Declare trust basis if any
– Exchange and negotiate requests for specific service
• Agree on channels for service exchange
– Perform functionality/service
– Sign-off
Copyright Spring 2017, Rudra Dutta, NCSU 29
30. Entity Aggregation
• Entities represent roles that different stakeholders (with
different interests) can play
– Inter-entity interactions requires interface that both (all) agree on
standardized protocol
• If one entity performs multiple (standardized) roles, it must
realize every standardized interface at “external” edges, but
may ignore standardized interfaces at “internal” edges
Copyright Spring 2017, Rudra Dutta, NCSU 30
31. Entity Aggregation
• Entities represent roles that different stakeholders (with
different interests) can play
– Inter-entity interactions requires interface that both (all) agree on
standardized protocol
• If one entity performs multiple (standardized) roles, it must
realize every standardized interface at “external” edges, but
may ignore standardized interfaces at “internal” edges
Copyright Spring 2017, Rudra Dutta, NCSU 31
32. Open Interfaces vs. Closed Silos
• An entity may attempt to maintain external standard
interfaces, while speaking proprietary value-added interfaces
– Faster/better growth of efficient proprietary interfaces silo’d
solutions
• The previous architectural discussions pertain to an open,
collaborative, multi-interest IoT vision
Copyright Spring 2017, Rudra Dutta, NCSU 32
33. Open Interfaces vs. Closed Silos
• An entity may attempt to maintain external standard
interfaces, while speaking proprietary value-added interfaces
– Faster/better growth of efficient proprietary interfaces silo’d
solutions
• The previous architectural discussions pertain to an open,
collaborative, multi-interest IoT vision
Copyright Spring 2017, Rudra Dutta, NCSU 33
34. Open Interfaces vs. Closed Silos
• An entity may attempt to maintain external standard
interfaces, while speaking proprietary value-added interfaces
– Faster/better growth of efficient proprietary interfaces silo’d
solutions
• The previous architectural discussions pertain to an open,
collaborative, multi-interest IoT vision
Copyright Spring 2017, Rudra Dutta, NCSU 34
35. Platforms and Applications
• Traditional computing models: applications execute on
platforms
– Platform is “resource” for application to utilize
• Early computing: applications (programs) ran on “whole
computer” (with time-sharing)
• OS fine-grain sharing (multi-processing illusion) of
processor and storage
– “System program” is part of platform for “application program”
Program-as-a-Platform
– Later: virtualization multiple levels
• Client-server
– Distributed application program
– Later: P2P multiple end-points
– Still only at network endpoints, still specific underlying hardware
Copyright Spring 2017, Rudra Dutta, NCSU 35
36. Platforms and Applications
• AFS/NFS (storage), map-reduce (compute)
– Seamless distribution over underlying hardware
– Distribution capability now commoditized, part of platform
• SFC/NFV approaches
– Multi-point “within the network” compute storage
available to application as platform
• Platform vs. application
– Platform: general, multiuser, multi-mission
– Application: user-, mission-, and situation-specific
– Application still has the connotation of only software, but
real distinction is provider-consumer boundary
Copyright Spring 2017, Rudra Dutta, NCSU 36
37. Data
• Originally, internal to programs
– Systems program (OS) kept its own data
– Application program kept and crunched its own data
– Exchange of data: solely as archival/retrieval (use of
storage platform): “meaning” only for one program
(internal)
• Increasingly, data can be seen as resource
– Metadata allows “meaning” to be integrated into data
– Producer of data may be considered owner
– But owner can trade usage right, not just use
– Right-to-use is not same as right-to-resell
Copyright Spring 2017, Rudra Dutta, NCSU 37
38. Missions and Coalitions
• Concept of applications and platforms less
defined in dynamic multi-owner multi-technology
context
• Consider alternate concepts
• Coalition
– Transient grouping of users and capabilities
– Characterized by (and formed for) mission
• Mission
– Functional intent of a coalition
– Triggered and defined by some user (agent)
• Mission executes on coalition
Copyright Spring 2017, Rudra Dutta, NCSU 38
41. Expertise Groups
• Semantics
– Decide: what concepts need to be represented
• Anything that needs to be understood by more than one entity
– What reasoning rules to be shared (standardized)
– “Data model” only, not platform (technology embedding)
– Implement in technology picked by orchestration group
• Sensing/Actuating capabilities
– What sensors, actuators (pick actual hardware/software)
– Implement capabilities to the edge of entity (using orchestration tools)
• Analytics
– Decide analytics methods to be applied, core/edge decomposition
– Implement in technology picked by orchestration group
• Networking/Orchestration
– Decide platform for edge/core cloud analytics, semantics
• With advice from expertise groups
– Decide and implement communication/networking
Copyright Spring 2017, Rudra Dutta, NCSU 41
42. Mini-project Definition
• Running example of cooperative air-quality
based health advisory for bicyclists
• MUST ACTUALLY WORK
– We will change elements as necessary for
feasibility
– Consider testing/verification feasibility as well as
implementation/execution feasibility
• (Can you change air pollution anywhere on order?)
• Keep within (Centennial) campus
• All open technology/interfaces
Copyright Spring 2017, Rudra Dutta, NCSU 42
43. Picking Expertise Groups
• Fill out Google form to indicate your ranked choice of
groups you want to be part of
• For your first (and optionally second) choice, provide
reasoning for why you are suitable to contribute well
to that group
• For your last choice, provide reasoning for why you
are not suitable to contribute well to that group
• Balance prior strength and learning objectives
• Remember: both design and implmentation aspects
Copyright Spring 2017, Rudra Dutta, NCSU 43
44. Architectural Decisions
• Reminder: “How to enable some interactions can
give rise to other entities (example of DNS)”
– Need to make some architectural decisions up front to
ensure pieces will fit together
• Some key choices center around user’s agents
– Whether partitioned/replicated
– If partitioned, whether referral is iterative or recursive (or
either, or both)
• If any “directory services” (NEW ENTITY)
– Whether local/global
Copyright Spring 2017, Rudra Dutta, NCSU 44
45. Go
• Questions welcome
• Seed thoughts/questions for each group
Copyright Spring 2017, Rudra Dutta, NCSU 45
https://youtu.be/f6F6MzMT2g8?t=2s