networking and security research center nsrc.cse.psu
DESCRIPTION
Networking and Security Research Center http://nsrc.cse.psu.edu/. Professor Thomas F. La Porta, Director Department of Computer Science and Engineering. Networking and Security Research Center. Large group of networking, security and systems experts 10 faculty Approximately 50 students - PowerPoint PPT PresentationTRANSCRIPT
1Penn State, 10-5-05
Networking and Security Research Center http://nsrc.cse.psu.edu/
Professor Thomas F. La Porta, Director
Department of Computer Science and Engineering
2Penn State, 10-5-05
Networking and Security Research Center
Large group of networking, security and systems experts
– 10 faculty
– Approximately 50 students• Ph.D., M.S. and Schreyer Honors College Seniors• 8 Ph.D. graduates
– 3 Labs in addition to individual research groups
Diverse Expertise
– Wireless networking and communications
– Performance
– Software systems
– Routing
– Distributed algorithms
– All aspects of security: networking, protocols, systems, access controls and policies
Industrial partners
– Telcordia Technologies (Full)
– Raytheon (Associate)
3Penn State, 10-5-05
Accomplishments
Research Results (details later)
– 14 major journal publications
– Over 30 conference publications• ACM Conference on Computer and Communications Security (CCS), ACM MobiHoc, IEEE INFOCOM,
IEEE International Conference on Network Protocols (ICNP), International Conference on Distributed Computing Systems (ICDCS), International Conference on Mobile Data Management (MDM), Annual Computer Security Applications Conference (ACSAC)
– 45 NSRC Technical Reports
Funding: over $3M in new funding in 2005
– 8 NSF Grants: CyberTrust (3), Networking (2), Computer Systems, Research Infrastructure, Communications
– Department of Defense
– Army Research Office (ARO)
– The Technology Collaborative (3)
– Industry: Cisco, Motorola, IBM
New Member: Trent Jaeger from IBM T.J. Watson
– operating systems security mechanisms and policies, access control, hypervisor security, source code analysis for security, operating systems, mobile code security
4Penn State, 10-5-05
Accomplishments
Awards (Faculty and Students)
– Thomas Alva Edison Patent Award
– IBM Faculty Award
– IEEE Computer Society Golden Core Award
– IEEE Computer Society Meritorious Service
– AT&T Wireless Fellowship
Appointments
– General Co-Chair, ACM Mobicom
– General Chair, Financial Cryptography
– Program Chair, USENIX Security
– Program Co-Chair, IEEE Infocom 2007
– Program Co-Chair, IEEE MASS
– Editorial Boards and Steering Committees: IEEE TMC, TWC, ToN
– Next Generation Networks Task Force for the President’s National Security Telecommunications Advisory Panel
5Penn State, 10-5-05
SIIS Laboratory (http://siis.cse.psu.edu)
FacultyFacultyProf. Trent Jaeger ([email protected])
operating systems security, policy design and analysis, source code analysis
Prof. Patrick McDaniel ([email protected])network security, security modeling, critical infrastructure, security-typed languages, formal security policy
Prof. Sencun Zhu ([email protected])ad hoc and sensor networks, buffer-overflow and worm, p2p security
Ongoing Projects:
LAN Security
Secure Storage Systems
Language Based Security
SE Linux
Telecommunications Security
Self-healing Sensor Networks
FundingFunding:
National Science Foundation
Army Research Office/DOD
CISCO
Motorola (SERC)
Raytheon (NSRC)
Factoids: Factoids: Established September 2004, (15 major publications, 6 TRs), Location - 344 IST Building - contact [email protected]
Students (8 PhD , 4 MS)Students (8 PhD , 4 MS)
6Penn State, 10-5-05
Mobile Computing and Networking (MCN) Lab (http://mcn.cse.psu.edu/)
Students: 7 PhD, 3 MS, and 3 honor BS students
– Alumni: 3 Ph.D.• Faculty members at Iowa State University and Florida
International University • Motorola Research• 9 MS students went to various companies
Support: NSF (CAREER, ITR, NeTS/NOSS, CT, CNS), Army Research Office, DARPA, Telcordia (NSRC), PDG/TTC and member companies Cisco, IBM and 3ETI
Contact: Prof. Guohong Cao, [email protected]
MCN lab conducts research in many areas of wireless networks and mobile computing, with an emphasis on designing and evaluating mobile systems,
protocols, and applications.
Projects
– secure sensor networks, collaborative data access in mobile P2P networks, mobile sensor networks, data centric sensor networks, resource management in wireless networks
7Penn State, 10-5-05
The Wireless Communication and Networking Lab performs fundamental research on wireless communication network design
Students (all from Electrical Engineering)
– 4 Ph.D., 3 MS, 1 senior
Support
– Three awards from the National Science Foundation (NSF)
– Pittsburgh Digital Green House (PDG)
– Pennsylvania Infrastructure for Technology Alliance (PITA)
– Networking and Security Research Center - Telcordia
Academic collaborators
– Penn State (NSRC), UMD, Lehigh
Industrial Partners
– Telcordia (via NSRC)
– 7 PDG member companies
Contact: Prof. Aylin Yener, [email protected]
Wireless Communication and Networking Laboratory (http://labs.ee.psu.edu/labs/wcan)
WCAN@PSU
8Penn State, 10-5-05
Research Areas: Telecom Security
Current CellularHome Location
Registers
Mobile SwitchingCenters
Closed Control
Network (SS7)
Next Generation
Servers
2G Cellular 3G Cellular/All-IP
IP Services
Closed NetworkAttacks are possible, but rare
Two new dangers:Very open environmentPassage into SS7 network
Tom La Porta and Patrick McDaniel
– Exploiting open interfaces to wireless services• GSM Short Message Service
– Toolkits for detecting possible attacks on 3G networks• Map migration of data corruption across networks
– Maintaining privacy when providing Location-Based Services (with IBM)• Tune security and flexibility
9Penn State, 10-5-05
Research Areas: Secure Sensor Networks
Adversary injecting & modifying data
Simple nodes with limited
power
Powerful nodes with better
comm capabilities
No central controller
Sencun Zhu, Guohong Cao, and Tom La Porta
– Security and privacy in data centric networks• Share data between authorized applications and users
– Network access control in ad hoc networks• Neighbor and location verification
– Hybrid security solutions for sensor networks (with 3ETI)• Leverage powerful nodes and backbone connectivity when possible
10Penn State, 10-5-05
Research Areas: Internet Security
Patrick McDaniel, Sencun Zhu and Trent Jaeger
– BGP Security (with AT&T)• Combats attacks on origins and paths
– ARP Security• Combats impersonation attacks enabled by the use of ARP
– Linux IPSec (with IBM)• Per packet access controls
16 organizations
delegate80% of
addresses
Delegations must be
authorized efficiently
Current address use in the Internet
11Penn State, 10-5-05
Research Areas: Security Test Beds and Tools
George Kesidis, Chita Das and Patrick McDaniel
– Evaluation Methods for Internet Security Technology (EMIST)• Framework for thoroughly evaluating defenses against worms, DDoS and attacks on routing (BGP)
– Tools for TCP• Focus on attacks that exploit TCP congestion control
Large scale BGP simulation – up to 20,000 autonomous systems will be simulated on the DETER test bed
12Penn State, 10-5-05
Research Areas: Trusted Computing and Systems
Trent Jaeger and Patrick McDaniel
– Automatic placement of authorization hooks in Linux Security Modules• Authenticate “operations”
– Mandatory Access Control in Xen-Linux Systems • Enforce security goals
– Multi-level security in remote storage (with Raytheon)• Grant access in distributed manner; compatible with SCSI
– Language-based tools for information flow control (with Motorola)• Language ensures data of different security levels do not interact
– Trusted computing (with Intel)• Novel approach to client puzzles to combat DDoS attacks
X serverPolicyServer
<Alice, Window, Create>?
Yes/No
Security-enhanced Operating System
Hook placement Hook effectiveness
Hook execution
13Penn State, 10-5-05
Research Areas: P2P/Overlay Networks
Wang-Chien Lee, Guohong Cao and Sencun Zhu
– Collaborative data access in mobile P2P networks• Reduce latency of data access by intelligent sharing
– Security mechanisms for overlay networks• Integration of key management and access controls
– Semantic small world• Efficient p2p structure to reduce search path length and cost
14Penn State, 10-5-05
Research Areas: Algorithms and Protocols for Sensor Networks
Guohong Cao, Tom La Porta and George Kesidis
– Controllable node mobility for mission oriented sensor networks• Leverage mobility for coverage, fault recovery, routing and application-specific functions
– Energy efficient data collection in sensor networks (with Telcordia)• Cross layer energy optimization scheme to increase network lifetime and connectivity of wireless sensor networks
– Stateless routing for location aware sensor networks• Voluntary forwarding
– Mobility prediction• Improve effectiveness of cluster algorithms
sink
S1S2
S4
S3
sink
S1S2
S4
S3
First mission: perimeter monitoring Second mission: target tracking
15Penn State, 10-5-05
Aylin Yener, Tom La Porta and Guohong Cao
– Wireless relay networks • Improve overall network performance by forwarding to nodes with best wireless backhaul• Consider different relay and forwarding and power control strategies• Channel assignment algorithms
– RFID (with 3ETI and Vocollect)• Improved media access protocols
– Mobile ML-IPSec (with 3ETI, Accipiter and Cisco)• Enable wireless-specific performance enhancements in a secure network
Research Areas: Wireless and Mobile Networks
Cell
GW
1 1
2GW
1
1
1
2
2GWBS
Group1
Group2
Orthogonal networks
Orthogonal links
17Penn State, 10-5-05
Networking and Security Research Center
For Penn State
– Build relationships with Industry
– Define interesting and realistic research problems
– Diversify research collaborators
– Expose students to industrial research environments
– Increase impact of research
For companies
– Build relationship with Professors and students
– Develop new collaborations to solve interesting problems
– Partner on proposals
– Access to wide area of expertise
Members
– Telcordia Technologies (Full)
– Raytheon (Associate)
18Penn State, 10-5-05
Remainder of the day…
Lunch
– Poster and demonstrations (outside Cybertorium, 344B)
Faculty Talks
– Cybertorium – 1:30-3:00
Center Discussion/Feedback
– Room 333 – Center Faculty, PSU Admin, and Industry guests only
19Penn State, 10-5-05
Tom La Porta – Professor, CSE
Education
– PhD, Columbia University, Electrical Engineering
Background
– Director of Mobile Networking Research at Bell Labs until 2002
Professional Activities
– Founding Editor-in-Chief, IEEE Transactions on Mobile Computing
– Past Editor-in-Chief (Senior Advisor), IEEE Personal Communications
– General Co-Chair: ACM Mobicom 2005
– Program Co-Chair: IEEE ICNP 2004
Awards
– Bell Labs Fellow
– IEEE Fellow
– Bell Labs Distinguished Technical Staff Award
– IEEE Computer Society Golden Core Member
– Thomas Alva Edison Patent Award
Expertise
– Mobile networking, wireless networking, secure telecommunication network signaling and control, protocol design
Support
– National Science Foundation
– DARPA/ONR MURI (subcontract through ARL)
– Technology Collaborative/Pittsburgh Digital Greenhouse
– IBM
– NSRC
20Penn State, 10-5-05
Tom La Porta – Projects
• Evolution of all-IP Mobile Networks
– Network architectures and protocols for 3G/Mobile Internet interworking
• Secure all-IP Mobile Telecommunication Networks
– Combat threats (exploit) introduced by interfaces to IP networks
• Mobile Multilayered IPSec
– Improves security and performance in wireless, mobile networks
• Secure Data Dissemination for sensor networks
– Efficient key distribution in constrained environments
• Heterogeneous ad hoc relay networks of agile radios
– New architecture to improve performance and capacity
• Node mobility for Robust Mission-Oriented Sensor Networks
– Deployment and relocation strategies for sensors
21Penn State, 10-5-05
Guohong Cao – Associate Professor, CSE
Education
– PhD, Ohio State University, Computer Science
Professional Activities
– Associate Editor, IEEE Transactions on Mobile Computing
– Associate Editor, IEEE Transactions on Wireless Communications
– Guest Editor, ACM MONET special issues on Heterogeneous Wireless Networks, 2005
– Program Vice Chair: IEEE Int'l Conf. on Mobile Ad-hoc and Sensor Systems (MASS), 2005
– Program committee of IEEE ICDCS, ACM MOBICOM, IEEE ICNP and IEEE INFOCOM
Awards
– Presidential Fellowship at the Ohio State University
– NSF CAREER, 2001
Expertise
– Mobile computing, wireless networks, sensor networks, wireless network security, distributed fault-tolerant computing, resource management and data dissemination in mobile environments
Support
– NSF (ITR, CAREER, NeTs/NOSS, CT, CNS)
– Army Research Office
– PDG/TTC – DARPA/ONR MURI (subcontract through ARL)
22Penn State, 10-5-05
Guohong Cao – Projects
• Collaborative Data Access in Mobile Peer-to-Peer Networks – Improves performance in constrained environments through collaboration.
• Controllable Node mobility for Mission-Oriented Sensor Networks – Deployment and relocation strategies for sensors
• Secure Wireless Sensor Networks – Defend against node compromises; self-healing mechanisms for sensor networks
• Mobile Multi-layered IP Security – Improves security and performance in wireless, mobile networks
• A Data-Centric Framework for Target Tacking and Data Dissemination in Sensor Networks
– New architecture for wireless sensor networks
• Designing Efficient Resource Management Schemes to Support Integrated Services in Mobile Computing Systems
– Consider both power issues and QoS issues
• Efficient Power Aware Data Access in Pervasive Computing Environment– Consider both single-hop and multi-hop models
23Penn State, 10-5-05
Wang-Chien Lee – Associate Professor, CSE
Education– PhD, Ohio State University
Background– 1996 - 2001, GTE/Version Research Laboratories, Inc.– Research group at Penn State (2002-Present): Pervasive Data Access Research Group
(http://www.cse.psu.edu/pda)
Awards– Excellence Award: GTE/Verizon Laboratories Incorporated (1997, 1999, 2000).– Achievement Award: GTE/Verizon Laboratories Incorporated (1999).
Professional Activities– Guest Editor, IEEE Transaction on Computer, IEEE Personal Communication Magazine, ACM
Mobile Networks and Applications (MONET), ACM Wireless Networks (WINET)– Technical Program Chair: International Conference on Mobile Data Access (1999); International
Workshop on Pervasive Computing (2000); International Workshop on Wireless Networks and Mobile Computing (2000/2001).
– Industrial Program Chair: International Conference on Mobile Data Management (2001-2002).– Steering Committee: International Conference on Mobile Data Management – TPC Member (2005): ICNP, ICDE, ICDCS, SAC, VLDB (Demo), DASFAA, MDM, NetDB
Expertise – Pervasive Computing, Wireless Networks, Network Services, Data Management, TMN
Current & Past Support – NSF, ARDA, GENUITY, RGC (Hong Kong)
24Penn State, 10-5-05
Wang-Chien Lee - Projects
• Location-Based Information Access in Pervasive Computing
– Investigate new ways of indexing and caching spatial data in support of location based services in pervasive computing environments.
• Semantic Small World: A Multi-Dimensional Overlay Network
– Design of a multi-dimensional overlay network, called semantic small world (SSW), that facilitates efficient semantic based search in P2P systems.
– SSW is adaptive to distribution of data and locality of interest; is very resilient to failures; and has great load balancing property.
• Protocols and Services for Location-Aware Wireless Sensor Networks
– Design of a suite of protocols, algorithms and services to provide energy-aware, time-efficient, robust and scalable location-aware wireless sensor networks.
– Tackled research issues include communication collisions, communication voids, packet losses, location errors, scalability, service latency and validity of services.
• Automata-Based XML Access Control for Networked Computing
– Design of a new XML access control mechanism, called QFILTER, for Internet-scale networked information systems.
• Secure Wireless Data Broadcast
– Development of new air indexing and key management techniques to address the security concerns in wireless data broadcast systems.
25Penn State, 10-5-05
Patrick McDaniel – Assistant Professor, CSE
Director of the Systems and Internet Infrastructure Security Lab: http://siis.cse.psu.edu
Education– PhD, University of Michigan, Electrical Engineering and Computer Science
Professional Activities– Program Chair, 15th USENIX Security Symposium, August 2005.– Vice-Chair, Security and Privacy Track, 14th World Wide Web Conference (WWW), May 2005.– General Chair, Financial Cryptography 2006, February 2006– Program Chair, Industry Track, 11th ACM Conference on Computer and Communications Security (CCS),
November 2004.– Guest editor, Journal of Computer Networks, Special issue on Web Security, Summer 2005.– Associate editor, ACM Transactions on Internet Technology (TOIT), April 2004-present.– Program Committee Member (2005): ESORICS, ACSAC, CCS (I&G), ICIS, ACM EC SACMAT, SNS, ACNS,
USENIX Secuity, USENIX Technical
Expertise – Systems security, security policy, network security, digital rights management, digital content and public policy,
network management, applied cryptography, privacy
Past and Current Support – NSF (EMIST), NSF (Distributed Type-Secure Programming)– DARPA (Dynamic Coalitions Program)– USAF (P2INGS)– Industry: Motorola, CISCO
26Penn State, 10-5-05
Patrick McDaniel – Projects
• Exploiting Open Functionality in SMS-Capable Cellular Networks
– Understanding and fixing evolving threats in cellular phone systems
• Understanding Mutable Internet Pathogens
– Predicting and counteracting next-generation malware
• Analysis of Communities of Internet in Data Networks
– Understanding interrelationships between users, hosts, and service locality
• Path Validation in Interdomain Routing
– Design and application of efficient constructions for secure path discovery and validation on the Internet
• Internet Origin Disturbances
– Route announcement wave-fronts cause odd oscillation, explanation and characterization
• Collaborative Research: Flexible, Decentralized Information-flow Control for Dynamic Environments
– Extending strong language type-safety to distributed environments
27Penn State, 10-5-05
Trent Jaeger – Associate Professor, CSE
Co-Director of the Systems and Internet Infrastructure Security Lab: http://siis.cse.psu.edu
Education– PhD, University of Michigan, Electrical Engineering and Computer Science
Professional Activities– Program Chair, Industry Track, 10th ACM Conference on Computer and Communications
Security (CCS), November 2003.– Program Chair, 6th ACM Symposium on Access Control Models and Technologies
(SACMAT), June 2001.– Steering Committee, ACM Symposium on Access Control Models and Technologies– Program Committee Member (2005): USENIX Security, ACSAC, ACM CCS (I&G), ACM
SACMAT, WWW Conference, SELinux Symposium– Program Committee Member (past): IEEE Security & Privacy, ACM CCS, ESORICS
Expertise – operating systems security mechanisms and policies, access control, hypervisor security,
source code analysis for security, operating systems, mobile code security
28Penn State, 10-5-05
Trent Jaeger – Projects
• Linux Security Analysis
– Develop source code and policy analysis tools to verify security properties in the Linux kernel, system software, and security policies
• Network Mandatory Access Control
– Extend the Linux Security Modules framework and policy languages to enable mandatory access control among a coalition of machines
• (Mostly) Automatic Generation of Reference Monitors
– Source code analyses to place complete, optimized reference monitor interfaces within applications that enforce security properties (e.g., Xwindows, Apache, OpenSGL)
• Hypervisor-Based Mandatory Access Control
– Enable hypervisors (e.g., Xen) to enforce mandatory access controls update its resources and enable effective control of higher level resources (e.g., network) via restricted Linux partitions
• Hardware-based Integrity Measurement Architectures
– Research approaches to apply the Trusted Computing Group’s Trusted Platform Module to enable remote parties to verify the integrity of a system
29Penn State, 10-5-05
Sencun Zhu – Assistant Professor, CSE and IST
Education
– Ph.D. in Information Technology from George Mason University (Aug. 2004)
Professional activities
– TPC members for ACM SASN’04, SASN’05, IEEE ICPADS’05, IEEE MASS’05
Expertise
– Network and systems security, applied cryptography
– Wireless ad hoc and sensor networks
– Peer-to-peer computing
– Performance evaluation
Current Support
– Army Research Office (ARO), NSF Cybertrust, DoD
30Penn State, 10-5-05
Sencun Zhu – Current Projects
• Security and reliability for sensor networks
– Key management framework that supports in-network processing as well as localizes the impact of node compromises
– Secure sensor data aggregation
– Security and privacy for data-centric sensor networks
– Source location anonymity
– Applications of sensor networks to public safety
• Security for ad hoc networks
– Network access control for combating resource consumption attacks
– Traceback of compromised nodes in mobile ad hoc networks
• Security for Overlay Network
– Efficient key managements and DDoS attack prevention
– Detection and identification of malicious nodes
• Preventing email worm spreading
• Countering buffer overflow attacks
31Penn State, 10-5-05
George Kesidis – Associate Professor, EE and CSE
Education– Ph.D. in EECS from U.C. Berkeley
Background– 1992-2000: prof. in E&CE Dept, University of Waterloo, Canada– 1999: sabbatical with Nortel Networks, Ottawa– 2001: part-time technical staff at Mahi Networks
Professional Activities– IEEE INFOCOM’07 TPC co-chair
Expertise– queuing, optimization, scheduling, traffic shaping, quick simulation, performance
evaluation and testing, traffic and network measurement and modeling
Support– NSF ITR Routing of Dynamic SLAs: Internet economics, pricing, billing, traffic control– NSF ITR Surveillance networks– DARPA/ONR Emerging Surveillance Plexsus (ESP): mobile sensor networking– DHS/NSF Evaluation Methods for Internet Security Technology (EMIST)– Cisco Ltd URP (2003): Internet forensics
32Penn State, 10-5-05
George Kesidis - Projects
• Dynamic SLAs: Internet economics, pricing, billing, traffic control
• Evaluation Methods for Internet Security Technology (EMIST) (ongoing)– Testbed and methods – part of a major NSF initiative
• Dynamic quarantine of misbehaving flows – Detect and isolate non-conforming TCP flows
• Surveillance networks (ongoing)
• Emerging Surveillance Plexsus (ESP): mobile sensor networking (ongoing)
• Other– residential broadband access, wireless relay systems, Internet forensics
33Penn State, 10-5-05
Aylin Yener – Assistant Professor, Electrical Engineering
Education
– PhD, Wireless Information Network Laboratory (WINLAB), Rutgers UniversityBackground
– NSF CAREER Award, 2003
– Research group: Wireless Communications and Networking Laboratory: WCAN@PennState (http://labs.ee.psu.edu/labs/wcan)
Professional Activities
– 2001- Present, Editor, IEEE Transactions on Wireless Communications
– Co-chair, Asilomar Conference Communications Track (2005); Co-chair, WirelessCom Symposium on Information Theory (2005); TPC member in IEEE Globecom, IEEE ICC, IEEE VTC (yearly)
Expertise
– Physical layer optimization; cross-layer design; CDMA; MIMO; relay networks; physical layer security
Support
– National Science Foundation • CAREER (CCF)• CCF • CNS
– Pittsburgh Digital Greenhouse
– Pennsylvania Infrastructure Technology Alliance
– NSRC/Telcordia
– Past support: USMC, AT&T Foundation, BenFranklin
34Penn State, 10-5-05
Aylin Yener – Projects
• Multiuser MIMO systems – Design of transceivers to realize the potential capacity that multiple antenna systems offer in an
environment where multiple simultaneous MIMO users transmit.
• Throughput/Capacity enhancement for single and multiple antenna CDMA systems– Performance enhancement techniques that employ adaptive beamwidth directional antennas– Performance optimization of MIMO-CDMA uplink by signature and beamformer design.– Throughput enhancement for data-centric downlink via user scheduling.
• Secure physical layer design for multiuser systems– Transmit waveform, multiaccess strategy, and power allocation for secure wireless
communications. User strategies in response to various jammer and eavesdropper capabilities.
• Relay networks/Hybrid networks and cooperative communications– Physical layer design for networks that relay information on behalf of other nodes, network
formation, transmission strategies, impact of physical layer on MAC/routing.– Distributed resource allocation algorithms.– User cooperation strategies, multiuser relay networks.
• Cross-layer design for AdHoc wireless networks and wireless sensor networks– Power control for multi-hop AdHoc networks, the impact of optimum physical layer design on
MAC and network layers for AdHoc networks– Physical layer inspired techniques for lifetime maximization for sensor networks.
• RFID networks– Algorithm design to dramatically reduce tag collisions and interference for low power RFID
networks with communication delay constraints.
35Penn State, 10-5-05
Chita Das - Professor, CSE
Education
– Ph.D., University of Louisiana
Background
– IIT Kharagpur (India)
– Joined Penn State in 1986
Awards
– IEEE Fellow
– Best Paper Awards (ICPP, ICDCS, PRDC)
– CSE Dept Teaching Award
Expertise
– communication networks & communication mechanisms; resource management (scheduling); QoS support in clusters and Internet; mobile computing; performance evaluation; parallel distributed computer architectures; clusters; fault-tolerant computing
Support
– NSF (scheduling, QoS, Infrastructure), Unisys (performance)
36Penn State, 10-5-05
Chita Das - Projects
• Dynamic Quarantine of Unresponsive TCP Flows
– Detect and isolate non-conforming TCP flows
• Adaptive AQM Schemes for Internet and Wireless Networks
– Improve performance of Internet and limited wireless networks
• QoS Provisioning in InfiniBand Architecture (IBA) for System Area Networks
– Design and analysis of IBA-style SANs
• Scalable and Efficient Scheduling Techniques for Clusters
– Aims at developing practical scheduling techniques for large clusters
• Performance Analysis with Commercial Workloads
– Analysis of TPC-C workloads
• Design of Cluster-based Datacenters
– Design of 3-tier data centers on cluster platforms
• Design and Analysis of System-on-Chip (SoC) Interconnects
– Design of on-chip interconnects considering area, power and reliability constraints
37Penn State, 10-5-05
John Metzner - Professor, CSE and EE
Education
– Eng. Sc. D., New York University
Background
– Acting director of the Computer Engineering Program in Electrical Engineering (two years)
– Acting Dean, School of Engineering and Computer Science, Oakland University, Rochester 1974-1980
– Professor, Electrical Engineering, Wayne State University, Detroit, Michigan
– Associate Professor, Electrical Engineering New York University
– Associate Professor, Polytechnic Institute of New York
– Research Scientist, Electrical Engineering Department, New York University
Awards
– IEEE Fellow
– Fellowships: Link Aviation, National Science Foundation, David Sarnoff
– IEEE Computer Society Distinguished Speaker/Visitor
Expertise
– ARQ protocols for reliable and efficient data communication, methods for efficient comparison of remote replicated data files, efficient reliable and secure multicasting, improved utilization of ALOHA in multi-access, error correction techniques, efficient use of wireless network resources
Support
– Many previous grants from NSF
38Penn State, 10-5-05
John Metzner - Projects
• Secure Reliable Multicasting (SAM) (Poster)
– Simple acknowledgment and key changing for combined secure and reliable multicast in moderate size groups
• Reliable multicasting
– Efficient methods of gathering acknowledgments with a tree topology and a virtual ring
– Increased value of hop-by-hop versus end-to-end error control in multicasting
– Improved efficiency by cooperation of local network stations in receiving a satellite or other multicast transmission
• Ultra wideband or light traffic ALOHA
– Communication from a mobile to a network of cooperating base stations or to other stations in an Ad Hoc network for minimal interference and energy utilization.
• Vector Symbol decoding extensions
– Study of interaction of inner codes and outer vector symbol code
– Correcting combinations of erasures and errors
– Further studies of convolutional vector symbol codes
– Applications to multi-reception code combining with vector symbol codes
39Penn State, 10-5-05
Raj Acharya – Head and Professor, CSE
Education
– PhD, University of Minnesota, Mayo Graduate School of Medicine
Background
– Research Scientist, Mayo Clinic
– Research Scientist, GE (Thomson)
– Faculty Fellow, Night Vision Laboratory, Fort Belvoir, Washington, D.C.
– NASA-ASEE Faculty Fellow, Johnson Space Center, Houston, TX
– Director, Advanced Laboratory for Information Systems and Analysis
Professional Activities
– General Chair, SPIE International Conference on Physiology and Function from Multidimensional Images
– Co-Chair, IEEE Workshop on Biomedical Image Analysis
– General Chair, SPIE Conference on Biomedical Image Processing
– Associate Editor, International Journal of Computerized Medical Imaging and Graphics
Expertise
– Net-centric computing, resource management for ad hoc networks, information fusion, bioinformatics, data mining
Support
– NSF ITR