1 / 12

Networking Outside the Networks

Networking Outside the Networks. Vesa A. Korhonen vesa.a.korhonen@jyu.fi University of Jyväskylä Department of Mathematical Information Technology JAMK University of Applied Sciences School of Business and Services Management. Structure of the Presentation. The World of Networks

ilar
Download Presentation

Networking Outside the Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Networking Outside the Networks Vesa A. Korhonen vesa.a.korhonen@jyu.fi University of Jyväskylä Department of Mathematical Information Technology JAMK University of Applied Sciences School of Business and Services Management

  2. Structure of the Presentation • The World of Networks • Changes, “subtle and profound”, at the same time • Changes in Networking: Mobile Encounter Network • The Dark Side of the Encounter Network • Conclusions

  3. Network – The World • Our World is the World of (Electronic) Networks • Social • Work-oriented • Learning-related • Combinations of these • Mobile Networking • Take whatever you want wherever you want whenever you want • Smart, hand-held devices capable of communicating while moving • Access to the Internet (GSM Data, 3G, 4G) • But there’s more…

  4. Technology and the Society? • James Atherton: The Great Stirrup Controversy http://www.doceo.co.uk/rbl/stirrup.htm “We tend to think of technology as a kind of passive servant, which solves problems which we define, and for which it was invented. We are much less comfortable with its unintended consequences, which may be both subtle and profound. “ • The Internet: The unintended consequences can already be seen. 4/12

  5. Mobile Encounter Network? • Short-range wireless ad-hoc –style local communication. • A paradigm, not a technology. • “Content located on the edge”: Any member of the network may be data producer. • MENs are not created or built, they emerge. (For details: Try giving “korhonen v kurhinen j”, for example, to Google Scholar.) 27.5.2009 Korhonen: Networking Outside the Networks

  6. Mobile Encounter Network! • Smart mobile devices do exist: • Smart phones • Internet tablets • Mini laptops • You name them…! • Using • Bluetooth • WLAN • ZigBee(?)

  7. Using Mobility and Encounters In MEN, the focus is on the individual encounters between the devices. • An encounter allows data items being exchanged between devices. • Mobility allows new peer being reached. → Data diffusion.

  8. Properties of the Encounter Network • Private. Controllable by the user(s), cannot be monitored. • Starting your own terminal device allows you to send and received data. • The terminal device may be hidden within your pocket. 8/12

  9. Using Mobile Encounter Networking • MEN allows you see and meet things because of • where you are (locality) and • when you are (short life-cycle of data), • not because of • who you are (anonymity). • You may not receive items of large value, • (low security, no business applications) • but you get them without extra cost: • No operator involved.

  10. A Research Topic: The Selectivity Problem • Sender not knowing whom to send. • Receiver not knowing what to receive. • Using encounters in data delivery? • The Conference Schedule Change • The first step: By-passer receives the data from the info desk. • The next step: By-passer diffuses the data to other attendees she encounters.

  11. The Dark Side? • An observation made when turning the Selectivity Problem around: • You can make virtually anything available virtually anywhere, • with a very small probability of getting caught. • Detecting the parties of an information exchange transaction is quite difficult. • No trace of the transfer is left anywhere. • These are desired properties for distributing illegal/inappropriate information. 27.5.2009 Korhonen: Networking Outside the Networks

  12. Conclusions • MEN: a paradigm with • a future • a Dark Side • With the Unintended Consequences.

More Related