Networking and Security Research Center http://nsrc.cse.psu.edu/ Professor Thomas F. La Porta, Director Department of Computer Science and Engineering Penn State, 10-5-05 0 Networking and Security Research Center Large group of networking, security and systems experts – 10 faculty – Approximately 50 students • Ph.D., M.S. and Schreyer Honors College Seniors • 8 Ph.D. graduates – 3 Labs in addition to individual research groups Diverse Expertise – Wireless networking and communications – Performance – Software systems – Routing – Distributed algorithms – All aspects of security: networking, protocols, systems, access controls and policies Industrial partners – Telcordia Technologies (Full) – Raytheon (Associate) Penn State, 10-5-05 1 Accomplishments Research Results (details later) – 14 major journal publications – Over 30 conference publications • ACM Conference on Computer and Communications Security (CCS), ACM MobiHoc, IEEE INFOCOM, IEEE International Conference on Network Protocols (ICNP), International Conference on Distributed Computing Systems (ICDCS), International Conference on Mobile Data Management (MDM), Annual Computer Security Applications Conference (ACSAC) – 45 NSRC Technical Reports Funding: over $3M in new funding in 2005 – 8 NSF Grants: CyberTrust (3), Networking (2), Computer Systems, Research Infrastructure, Communications – Department of Defense – Army Research Office (ARO) – The Technology Collaborative (3) – Industry: Cisco, Motorola, IBM New Member: Trent Jaeger from IBM T.J. Watson – operating systems security mechanisms and policies, access control, hypervisor security, source code analysis for security, operating systems, mobile code security Penn State, 10-5-05 2 Accomplishments Awards (Faculty and Students) – Thomas Alva Edison Patent Award – IBM Faculty Award – IEEE Computer Society Golden Core Award – IEEE Computer Society Meritorious Service – AT&T Wireless Fellowship Appointments – General Co-Chair, ACM Mobicom – General Chair, Financial Cryptography – Program Chair, USENIX Security – Program Co-Chair, IEEE Infocom 2007 – Program Co-Chair, IEEE MASS – Editorial Boards and Steering Committees: IEEE TMC, TWC, ToN – Next Generation Networks Task Force for the President’s National Security Telecommunications Advisory Panel Penn State, 10-5-05 3 SIIS Laboratory (http://siis.cse.psu.edu) Faculty Prof. Trent Jaeger (tjaeger@cse.psu.edu) operating systems security, policy design and analysis, source code analysis Prof. Patrick McDaniel (mcdaniel@cse.psu.edu) network security, security modeling, critical infrastructure, security-typed languages, formal security policy Prof. Sencun Zhu (szhu@cse.psu.edu) ad hoc and sensor networks, buffer-overflow and worm, p2p security Funding: Ongoing Projects: National Science Foundation LAN Security Army Research Office/DOD Secure Storage Systems CISCO Language Based Security Motorola (SERC) SE Linux Raytheon (NSRC) Telecommunications Security Self-healing Sensor Networks Students (8 PhD , 4 MS) Factoids: Established September 2004, (15 major publications, 6 TRs), Location - 344 IST Building - contact siislab@cse.psu.edu Penn State, 10-5-05 4 Mobile Computing and Networking (MCN) Lab (http://mcn.cse.psu.edu/) MCN lab conducts research in many areas of wireless networks and mobile computing, with an emphasis on designing and evaluating mobile systems, protocols, and applications. Projects – secure sensor networks, collaborative data access in mobile P2P networks, mobile sensor networks, data centric sensor networks, resource management in wireless networks Students: 7 PhD, 3 MS, and 3 honor BS students – Alumni: 3 Ph.D. • Faculty members at Iowa State University and Florida International University • Motorola Research • 9 MS students went to various companies Support: NSF (CAREER, ITR, NeTS/NOSS, CT, CNS), Army Research Office, DARPA, Telcordia (NSRC), PDG/TTC and member companies Cisco, IBM and 3ETI Contact: Prof. Guohong Cao, gcao@cse.psu.edu Penn State, 10-5-05 5 Wireless Communication and Networking Laboratory (http://labs.ee.psu.edu/labs/wcan) The Wireless Communication and Networking Lab performs fundamental research on wireless communication network design Students (all from Electrical Engineering) – 4 Ph.D., 3 MS, 1 senior Support – Three awards from the National Science Foundation (NSF) – Pittsburgh Digital Green House (PDG) – Pennsylvania Infrastructure for Technology Alliance (PITA) – Networking and Security Research Center - Telcordia Academic collaborators – Penn State (NSRC), UMD, Lehigh Industrial Partners – Telcordia (via NSRC) – 7 PDG member companies Contact: Prof. Aylin Yener, yener@ee.psu.edu Penn State, 10-5-05 WCAN @PSU 6 Research Areas: Telecom Security Current Cellular Next Generation Home Location Registers Mobile Switching Centers IP Services Closed Control Network (SS7) Closed Network Attacks are possible, but rare Servers 2G Cellular 3G Cellular/ All-IP Two new dangers: Very open environment Passage into SS7 network Tom La Porta and Patrick McDaniel – Exploiting open interfaces to wireless services • GSM Short Message Service – Toolkits for detecting possible attacks on 3G networks • Map migration of data corruption across networks – Maintaining privacy when providing Location-Based Services (with IBM) • Tune security and flexibility Penn State, 10-5-05 7 Research Areas: Secure Sensor Networks Adversary injecting & modifying data Powerful nodes with better comm capabilities Simple nodes with limited power No central controller Sencun Zhu, Guohong Cao, and Tom La Porta – Security and privacy in data centric networks • Share data between authorized applications and users – Network access control in ad hoc networks • Neighbor and location verification – Hybrid security solutions for sensor networks (with 3ETI) • Leverage powerful nodes and backbone connectivity when possible Penn State, 10-5-05 8 Research Areas: Internet Security 16 organizations delegate 80% of addresses Delegations must be authorized efficiently Current address use in the Internet Patrick McDaniel, Sencun Zhu and Trent Jaeger – BGP Security (with AT&T) • Combats attacks on origins and paths – ARP Security • Combats impersonation attacks enabled by the use of ARP – Linux IPSec (with IBM) • Per packet access controls Penn State, 10-5-05 9 Research Areas: Security Test Beds and Tools Large scale BGP simulation – up to 20,000 autonomous systems will be simulated on the DETER test bed George Kesidis, Chita Das and Patrick McDaniel – Evaluation Methods for Internet Security Technology (EMIST) • Framework for thoroughly evaluating defenses against worms, DDoS and attacks on routing (BGP) – Tools for TCP • Focus on attacks that exploit TCP congestion control Penn State, 10-5-05 10 Research Areas: Trusted Computing and Systems <Alice, Window, Create>? Yes/No Hook placement X server Policy Server Security-enhanced Operating System Hook effectiveness Hook execution Trent Jaeger and Patrick McDaniel – Automatic placement of authorization hooks in Linux Security Modules • Authenticate “operations” – Mandatory Access Control in Xen-Linux Systems • Enforce security goals – Multi-level security in remote storage (with Raytheon) • Grant access in distributed manner; compatible with SCSI – Language-based tools for information flow control (with Motorola) • Language ensures data of different security levels do not interact – Trusted computing (with Intel) • Novel approach to client puzzles to combat DDoS attacks Penn State, 10-5-05 11 Research Areas: P2P/Overlay Networks Wang-Chien Lee, Guohong Cao and Sencun Zhu – Collaborative data access in mobile P2P networks • Reduce latency of data access by intelligent sharing – Security mechanisms for overlay networks • Integration of key management and access controls – Semantic small world • Efficient p2p structure to reduce search path length and cost Penn State, 10-5-05 12 Research Areas: Algorithms and Protocols for Sensor Networks sink sink S2 S2 S1 S1 S4 S3 First mission: perimeter monitoring S4 S3 Second mission: target tracking Guohong Cao, Tom La Porta and George Kesidis – Controllable node mobility for mission oriented sensor networks • Leverage mobility for coverage, fault recovery, routing and application-specific functions – Energy efficient data collection in sensor networks (with Telcordia) • Cross layer energy optimization scheme to increase network lifetime and connectivity of wireless sensor networks – Stateless routing for location aware sensor networks • Voluntary forwarding – Mobility prediction • Improve effectiveness of cluster algorithms Penn State, 10-5-05 13 Research Areas: Wireless and Mobile Networks Group2 1 GW BS Orthogonal links GW GW 2 2 1 1 Cell 1 2 Orthogonal networks Group1 1 Aylin Yener, Tom La Porta and Guohong Cao – Wireless relay networks • Improve overall network performance by forwarding to nodes with best wireless backhaul • Consider different relay and forwarding and power control strategies • Channel assignment algorithms – RFID (with 3ETI and Vocollect) • Improved media access protocols – Mobile ML-IPSec (with 3ETI, Accipiter and Cisco) • Enable wireless-specific performance enhancements in a secure network Penn State, 10-5-05 14 Networking Research Center Faculty Raj Acharya Guohong Cao Chita Das Trent Jaeger George Kesidis Department/College Computer Science and Engineering (CSE)/College of Engineering (COE) CSE/COE CSE/COE CSE/COE CSE & Electrical Engineering/COE Thomas La Porta, Director Wang-Chien Lee CSE/COE Patrick McDaniel John Metzner CSE/COE CSE & EE/COE Aylin Yener EE/COE Sencun Zhu CSE/COE and IST Penn State, 10-5-05 CSE/COE Expertise QoS Mobility, Distributed Systems Network Performance Secure operating systems Network Performance, Modeling, Pricing, Security Mobility, Networking Software, Telecommunications Pervasive computing, Network Services, Data Management Network Security Coding, Reliable Data Communication Wireless Communications, Physical Layer Optimization, Cross-layer Design Network Security 15 Networking and Security Research Center For Penn State – Build relationships with Industry – Define interesting and realistic research problems – Diversify research collaborators – Expose students to industrial research environments – Increase impact of research For companies – Build relationship with Professors and students – Develop new collaborations to solve interesting problems – Partner on proposals – Access to wide area of expertise Members – Telcordia Technologies (Full) – Raytheon (Associate) Penn State, 10-5-05 16 Remainder of the day… Lunch – Poster and demonstrations (outside Cybertorium, 344B) Faculty Talks – Cybertorium – 1:30-3:00 Center Discussion/Feedback – Room 333 – Center Faculty, PSU Admin, and Industry guests only Penn State, 10-5-05 17 Tom La Porta – Professor, CSE Education – PhD, Columbia University, Electrical Engineering Background – Director of Mobile Networking Research at Bell Labs until 2002 Professional Activities – Founding Editor-in-Chief, IEEE Transactions on Mobile Computing – Past Editor-in-Chief (Senior Advisor), IEEE Personal Communications – General Co-Chair: ACM Mobicom 2005 – Program Co-Chair: IEEE ICNP 2004 Awards – – – – – Bell Labs Fellow IEEE Fellow Bell Labs Distinguished Technical Staff Award IEEE Computer Society Golden Core Member Thomas Alva Edison Patent Award Expertise – Mobile networking, wireless networking, secure telecommunication network signaling and control, protocol design Support – – – – – National Science Foundation DARPA/ONR MURI (subcontract through ARL) Technology Collaborative/Pittsburgh Digital Greenhouse IBM NSRC Penn State, 10-5-05 18 Tom La Porta – Projects • Evolution of all-IP Mobile Networks – Network architectures and protocols for 3G/Mobile Internet interworking • Secure all-IP Mobile Telecommunication Networks – Combat threats (exploit) introduced by interfaces to IP networks • Mobile Multilayered IPSec – Improves security and performance in wireless, mobile networks • Secure Data Dissemination for sensor networks – Efficient key distribution in constrained environments • Heterogeneous ad hoc relay networks of agile radios – New architecture to improve performance and capacity • Node mobility for Robust Mission-Oriented Sensor Networks – Deployment and relocation strategies for sensors Penn State, 10-5-05 19 Guohong Cao – Associate Professor, CSE Education – PhD, Ohio State University, Computer Science Professional Activities – Associate Editor, IEEE Transactions on Mobile Computing – Associate Editor, IEEE Transactions on Wireless Communications – Guest Editor, ACM MONET special issues on Heterogeneous Wireless Networks, 2005 – Program Vice Chair: IEEE Int'l Conf. on Mobile Ad-hoc and Sensor Systems (MASS), 2005 – Program committee of IEEE ICDCS, ACM MOBICOM, IEEE ICNP and IEEE INFOCOM Awards – Presidential Fellowship at the Ohio State University – NSF CAREER, 2001 Expertise – Mobile computing, wireless networks, sensor networks, wireless network security, distributed fault-tolerant computing, resource management and data dissemination in mobile environments Support – NSF (ITR, CAREER, NeTs/NOSS, CT, CNS) – Army Research Office – PDG/TTC – DARPA/ONR MURI (subcontract through ARL) Penn State, 10-5-05 20 Guohong Cao – Projects • Collaborative Data Access in Mobile Peer-to-Peer Networks – Improves performance in constrained environments through collaboration. • Controllable Node mobility for Mission-Oriented Sensor Networks – Deployment and relocation strategies for sensors • Secure Wireless Sensor Networks – Defend against node compromises; self-healing mechanisms for sensor networks • Mobile Multi-layered IP Security – Improves security and performance in wireless, mobile networks • A Data-Centric Framework for Target Tacking and Data Dissemination in Sensor Networks – New architecture for wireless sensor networks • Designing Efficient Resource Management Schemes to Support Integrated Services in Mobile Computing Systems – Consider both power issues and QoS issues • Efficient Power Aware Data Access in Pervasive Computing Environment – Consider both single-hop and multi-hop models Penn State, 10-5-05 21 Wang-Chien Lee – Associate Professor, CSE Education – PhD, Ohio State University Background – 1996 - 2001, GTE/Version Research Laboratories, Inc. – Research group at Penn State (2002-Present): Pervasive Data Access Research Group (http://www.cse.psu.edu/pda) Awards – Excellence Award: GTE/Verizon Laboratories Incorporated (1997, 1999, 2000). – Achievement Award: GTE/Verizon Laboratories Incorporated (1999). Professional Activities – Guest Editor, IEEE Transaction on Computer, IEEE Personal Communication Magazine, ACM Mobile Networks and Applications (MONET), ACM Wireless Networks (WINET) – Technical Program Chair: International Conference on Mobile Data Access (1999); International Workshop on Pervasive Computing (2000); International Workshop on Wireless Networks and Mobile Computing (2000/2001). – Industrial Program Chair: International Conference on Mobile Data Management (2001-2002). – Steering Committee: International Conference on Mobile Data Management – TPC Member (2005): ICNP, ICDE, ICDCS, SAC, VLDB (Demo), DASFAA, MDM, NetDB Expertise – Pervasive Computing, Wireless Networks, Network Services, Data Management, TMN Current & Past Support – NSF, ARDA, GENUITY, RGC (Hong Kong) Penn State, 10-5-05 22 Wang-Chien Lee - Projects • Location-Based Information Access in Pervasive Computing – Investigate new ways of indexing and caching spatial data in support of location based services in pervasive computing environments. • Semantic Small World: A Multi-Dimensional Overlay Network – Design of a multi-dimensional overlay network, called semantic small world (SSW), that facilitates efficient semantic based search in P2P systems. – SSW is adaptive to distribution of data and locality of interest; is very resilient to failures; and has great load balancing property. • Protocols and Services for Location-Aware Wireless Sensor Networks – Design of a suite of protocols, algorithms and services to provide energy-aware, time-efficient, robust and scalable location-aware wireless sensor networks. – Tackled research issues include communication collisions, communication voids, packet losses, location errors, scalability, service latency and validity of services. • Automata-Based XML Access Control for Networked Computing – Design of a new XML access control mechanism, called QFILTER, for Internet-scale networked information systems. • Secure Wireless Data Broadcast – Development of new air indexing and key management techniques to address the security concerns in wireless data broadcast systems. 23 Penn State, 10-5-05 Patrick McDaniel – Assistant Professor, CSE Director of the Systems and Internet Infrastructure Security Lab: http://siis.cse.psu.edu Education – PhD, University of Michigan, Electrical Engineering and Computer Science Professional Activities – Program Chair, 15th USENIX Security Symposium, August 2005. – Vice-Chair, Security and Privacy Track, 14th World Wide Web Conference (WWW), May 2005. – General Chair, Financial Cryptography 2006, February 2006 – Program Chair, Industry Track, 11th ACM Conference on Computer and Communications Security (CCS), November 2004. – Guest editor, Journal of Computer Networks, Special issue on Web Security, Summer 2005. – Associate editor, ACM Transactions on Internet Technology (TOIT), April 2004-present. – Program Committee Member (2005): ESORICS, ACSAC, CCS (I&G), ICIS, ACM EC SACMAT, SNS, ACNS, USENIX Secuity, USENIX Technical Expertise – Systems security, security policy, network security, digital rights management, digital content and public policy, network management, applied cryptography, privacy Past and Current Support – NSF (EMIST), NSF (Distributed Type-Secure Programming) – DARPA (Dynamic Coalitions Program) – USAF (P2INGS) – Industry: Motorola, CISCO Penn State, 10-5-05 24 Patrick McDaniel – Projects • Exploiting Open Functionality in SMS-Capable Cellular Networks – Understanding and fixing evolving threats in cellular phone systems • Understanding Mutable Internet Pathogens – Predicting and counteracting next-generation malware • Analysis of Communities of Internet in Data Networks – Understanding interrelationships between users, hosts, and service locality • Path Validation in Interdomain Routing – Design and application of efficient constructions for secure path discovery and validation on the Internet • Internet Origin Disturbances – Route announcement wave-fronts cause odd oscillation, explanation and characterization • Collaborative Research: Flexible, Decentralized Information-flow Control for Dynamic Environments – Extending strong language type-safety to distributed environments Penn State, 10-5-05 25 Trent Jaeger – Associate Professor, CSE Co-Director of the Systems and Internet Infrastructure Security Lab: http://siis.cse.psu.edu Education – PhD, University of Michigan, Electrical Engineering and Computer Science Professional Activities – Program Chair, Industry Track, 10th ACM Conference on Computer and Communications Security (CCS), November 2003. – Program Chair, 6th ACM Symposium on Access Control Models and Technologies (SACMAT), June 2001. – Steering Committee, ACM Symposium on Access Control Models and Technologies – Program Committee Member (2005): USENIX Security, ACSAC, ACM CCS (I&G), ACM SACMAT, WWW Conference, SELinux Symposium – Program Committee Member (past): IEEE Security & Privacy, ACM CCS, ESORICS Expertise – operating systems security mechanisms and policies, access control, hypervisor security, source code analysis for security, operating systems, mobile code security Penn State, 10-5-05 26 Trent Jaeger – Projects • Linux Security Analysis – Develop source code and policy analysis tools to verify security properties in the Linux kernel, system software, and security policies • Network Mandatory Access Control – Extend the Linux Security Modules framework and policy languages to enable mandatory access control among a coalition of machines • (Mostly) Automatic Generation of Reference Monitors – Source code analyses to place complete, optimized reference monitor interfaces within applications that enforce security properties (e.g., Xwindows, Apache, OpenSGL) • Hypervisor-Based Mandatory Access Control – Enable hypervisors (e.g., Xen) to enforce mandatory access controls update its resources and enable effective control of higher level resources (e.g., network) via restricted Linux partitions • Hardware-based Integrity Measurement Architectures – Research approaches to apply the Trusted Computing Group’s Trusted Platform Module to enable remote parties to verify the integrity of a system Penn State, 10-5-05 27 Sencun Zhu – Assistant Professor, CSE and IST Education – Ph.D. in Information Technology from George Mason University (Aug. 2004) Professional activities – TPC members for ACM SASN’04, SASN’05, IEEE ICPADS’05, IEEE MASS’05 Expertise – Network and systems security, applied cryptography – Wireless ad hoc and sensor networks – Peer-to-peer computing – Performance evaluation Current Support – Army Research Office (ARO), NSF Cybertrust, DoD Penn State, 10-5-05 28 Sencun Zhu – Current Projects • Security and reliability for sensor networks – Key management framework that supports in-network processing as well as localizes the impact of node compromises – Secure sensor data aggregation – Security and privacy for data-centric sensor networks – Source location anonymity – Applications of sensor networks to public safety • Security for ad hoc networks – Network access control for combating resource consumption attacks – Traceback of compromised nodes in mobile ad hoc networks • Security for Overlay Network – Efficient key managements and DDoS attack prevention – Detection and identification of malicious nodes • Preventing email worm spreading • Countering buffer overflow attacks Penn State, 10-5-05 29 George Kesidis – Associate Professor, EE and CSE Education – Ph.D. in EECS from U.C. Berkeley Background – 1992-2000: prof. in E&CE Dept, University of Waterloo, Canada – 1999: sabbatical with Nortel Networks, Ottawa – 2001: part-time technical staff at Mahi Networks Professional Activities – IEEE INFOCOM’07 TPC co-chair Expertise – queuing, optimization, scheduling, traffic shaping, quick simulation, performance evaluation and testing, traffic and network measurement and modeling Support – – – – – NSF ITR Routing of Dynamic SLAs: Internet economics, pricing, billing, traffic control NSF ITR Surveillance networks DARPA/ONR Emerging Surveillance Plexsus (ESP): mobile sensor networking DHS/NSF Evaluation Methods for Internet Security Technology (EMIST) Cisco Ltd URP (2003): Internet forensics Penn State, 10-5-05 30 George Kesidis - Projects • Dynamic SLAs: Internet economics, pricing, billing, traffic control • Evaluation Methods for Internet Security Technology (EMIST) (ongoing) – Testbed and methods – part of a major NSF initiative • Dynamic quarantine of misbehaving flows – Detect and isolate non-conforming TCP flows • Surveillance networks (ongoing) • Emerging Surveillance Plexsus (ESP): mobile sensor networking (ongoing) • Other – residential broadband access, wireless relay systems, Internet forensics Penn State, 10-5-05 31 Aylin Yener – Assistant Professor, Electrical Engineering Education – PhD, Wireless Information Network Laboratory (WINLAB), Rutgers University Background – NSF CAREER Award, 2003 – Research group: Wireless Communications and Networking Laboratory: WCAN@PennState (http://labs.ee.psu.edu/labs/wcan) Professional Activities – 2001- Present, Editor, IEEE Transactions on Wireless Communications – Co-chair, Asilomar Conference Communications Track (2005); Co-chair, WirelessCom Symposium on Information Theory (2005); TPC member in IEEE Globecom, IEEE ICC, IEEE VTC (yearly) Expertise – Physical layer optimization; cross-layer design; CDMA; MIMO; relay networks; physical layer security Support – National Science Foundation • • • CAREER (CCF) CCF CNS – Pittsburgh Digital Greenhouse – Pennsylvania Infrastructure Technology Alliance – NSRC/Telcordia – Past support: USMC, AT&T Foundation, BenFranklin Penn State, 10-5-05 32 Aylin Yener – Projects • Multiuser MIMO systems – Design of transceivers to realize the potential capacity that multiple antenna systems offer in an environment where multiple simultaneous MIMO users transmit. • Throughput/Capacity enhancement for single and multiple antenna CDMA systems – Performance enhancement techniques that employ adaptive beamwidth directional antennas – Performance optimization of MIMO-CDMA uplink by signature and beamformer design. – Throughput enhancement for data-centric downlink via user scheduling. • Secure physical layer design for multiuser systems – Transmit waveform, multiaccess strategy, and power allocation for secure wireless communications. User strategies in response to various jammer and eavesdropper capabilities. • Relay networks/Hybrid networks and cooperative communications – Physical layer design for networks that relay information on behalf of other nodes, network formation, transmission strategies, impact of physical layer on MAC/routing. – Distributed resource allocation algorithms. – User cooperation strategies, multiuser relay networks. • Cross-layer design for AdHoc wireless networks and wireless sensor networks – Power control for multi-hop AdHoc networks, the impact of optimum physical layer design on MAC and network layers for AdHoc networks – Physical layer inspired techniques for lifetime maximization for sensor networks. • RFID networks – Algorithm design to dramatically reduce tag collisions and interference for low power RFID networks with communication delay constraints. Penn State, 10-5-05 33 Chita Das - Professor, CSE Education – Ph.D., University of Louisiana Background – IIT Kharagpur (India) – Joined Penn State in 1986 Awards – IEEE Fellow – Best Paper Awards (ICPP, ICDCS, PRDC) – CSE Dept Teaching Award Expertise – communication networks & communication mechanisms; resource management (scheduling); QoS support in clusters and Internet; mobile computing; performance evaluation; parallel distributed computer architectures; clusters; fault-tolerant computing Support – NSF (scheduling, QoS, Infrastructure), Unisys (performance) Penn State, 10-5-05 34 Chita Das - Projects • Dynamic Quarantine of Unresponsive TCP Flows – Detect and isolate non-conforming TCP flows • Adaptive AQM Schemes for Internet and Wireless Networks – Improve performance of Internet and limited wireless networks • QoS Provisioning in InfiniBand Architecture (IBA) for System Area Networks – Design and analysis of IBA-style SANs • Scalable and Efficient Scheduling Techniques for Clusters – Aims at developing practical scheduling techniques for large clusters • Performance Analysis with Commercial Workloads – Analysis of TPC-C workloads • Design of Cluster-based Datacenters – Design of 3-tier data centers on cluster platforms • Design and Analysis of System-on-Chip (SoC) Interconnects – Design of on-chip interconnects considering area, power and reliability constraints Penn State, 10-5-05 35 John Metzner - Professor, CSE and EE Education – Eng. Sc. D., New York University Background – Acting director of the Computer Engineering Program in Electrical Engineering (two years) – Acting Dean, School of Engineering and Computer Science, Oakland University, Rochester 1974-1980 – Professor, Electrical Engineering, Wayne State University, Detroit, Michigan – Associate Professor, Electrical Engineering New York University – Associate Professor, Polytechnic Institute of New York – Research Scientist, Electrical Engineering Department, New York University Awards – IEEE Fellow – Fellowships: Link Aviation, National Science Foundation, David Sarnoff – IEEE Computer Society Distinguished Speaker/Visitor Expertise – ARQ protocols for reliable and efficient data communication, methods for efficient comparison of remote replicated data files, efficient reliable and secure multicasting, improved utilization of ALOHA in multi-access, error correction techniques, efficient use of wireless network resources Support – Many previous grants from NSF Penn State, 10-5-05 36 John Metzner - Projects • Secure Reliable Multicasting (SAM) (Poster) – Simple acknowledgment and key changing for combined secure and reliable multicast in moderate size groups • Reliable multicasting – Efficient methods of gathering acknowledgments with a tree topology and a virtual ring – Increased value of hop-by-hop versus end-to-end error control in multicasting – Improved efficiency by cooperation of local network stations in receiving a satellite or other multicast transmission • Ultra wideband or light traffic ALOHA – Communication from a mobile to a network of cooperating base stations or to other stations in an Ad Hoc network for minimal interference and energy utilization. • Vector Symbol decoding extensions – Study of interaction of inner codes and outer vector symbol code – Correcting combinations of erasures and errors – Further studies of convolutional vector symbol codes – Applications to multi-reception code combining with vector symbol codes Penn State, 10-5-05 37 Raj Acharya – Head and Professor, CSE Education – PhD, University of Minnesota, Mayo Graduate School of Medicine Background – Research Scientist, Mayo Clinic – Research Scientist, GE (Thomson) – Faculty Fellow, Night Vision Laboratory, Fort Belvoir, Washington, D.C. – NASA-ASEE Faculty Fellow, Johnson Space Center, Houston, TX – Director, Advanced Laboratory for Information Systems and Analysis Professional Activities – General Chair, SPIE International Conference on Physiology and Function from Multidimensional Images – Co-Chair, IEEE Workshop on Biomedical Image Analysis – General Chair, SPIE Conference on Biomedical Image Processing – Associate Editor, International Journal of Computerized Medical Imaging and Graphics Expertise – Net-centric computing, resource management for ad hoc networks, information fusion, bioinformatics, data mining Support – NSF ITR Penn State, 10-5-05 38 Raj Acharya - Projects • Service level agreements using bandwidth brokers • Quality of service in wireless ad hoc networks (Poster) Penn State, 10-5-05 39