Next century challenges: data-centric networking for invisible computing: the Portolano project at the University of Washington

Computing and telecommunications are maturing, and the next century promises a shift away from technology-driven general-purpose devices. Instead, we will focus on the needs of consumers: easy-to-use, low-maintenance, portable, ubiquitous, and ultra-reliable task-specific devices. Such devices, although not as limited by computational speed or communication bandwidth, will instead be constrained by new limits on size, form-factor, and power consumption. Data that they generate will need to be injected into the Internet and find its way to the services to which the user has subscribed. This is not simply a problem of ad-hoc networking, but one that requires re-thinking our basic assumptions regarding network transactions and challenges us to develop entirely new models for distributed services. Network topologies will be intermittent and services will have to be discovered independently of user guidance. In fact, data transfers from user interfaces to services and back, will need to become invisible to the user and guided by the task rather than explicit commands. This paper outlines a vision of this future and identifies research problems that will require our attention in the areas of user interfaces, distributed services, and networking infrastructure.

[1]  Marvin Theimer,et al.  Designing and implementing asynchronous collaborative applications with Bayou , 1997, UIST '97.

[2]  Thomas P. Moran,et al.  Embodied User Interfaces: Towards Invisible User Interfaces , 1998, EHCI.

[3]  John H. Hartman,et al.  Liquid Software: A New Paradigm for Networked Systems , 1996 .

[4]  Gaetano Borriello,et al.  ipChinook: an integrated IP-based design framework for distributed embedded systems , 1999, DAC '99.

[5]  Donald A. Norman,et al.  The invisible computer , 1998 .

[6]  Randy H. Katz,et al.  Enabling “Smart Spaces:” Entity Description and User Interface Generation for a Heterogeneous Component-based Distributed System , 1998 .

[7]  Arturo Serra Hurtado System building : estudio etnográfico de los proyectos de investigación de la School of Computer Science de Carnegie Mellon University, un "computer-intensive campus" norteamericano , 1992 .

[8]  Gordon S. Blair,et al.  Distributed Systems Support for Adaptive Mobile Applications , 1996, Mob. Networks Appl..

[9]  John V. Guttag,et al.  ANTS: a toolkit for building and dynamically deploying network protocols , 1998, 1998 IEEE Open Architectures and Network Programming.

[10]  Randy H. Katz,et al.  Composable ad-hoc mobile services for universal interaction , 1997, MobiCom '97.

[11]  Roy Want,et al.  Bridging real and virtual worlds with electronic tags , 1999, CHI 1999.

[12]  Andy Hopper,et al.  A new location technique for the active office , 1997, IEEE Wirel. Commun..

[13]  A.T. Wetzel,et al.  IEEE 1394 High Performance Serial Bus: The Digital Interface for ATV , 1995, Proceedings of International Conference on Consumer Electronics.

[14]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[15]  PHILLIP V. TOBIAS Open house , 1986, Nature.

[16]  D. Estrin,et al.  RSVP: a new resource reservation protocol , 2001 .

[17]  Charles E. Perkins,et al.  IP Mobility Support , 1996, RFC.

[18]  Douglas E. Comer,et al.  Internetworking with TCP/IP, Volume 1: Principles, Protocols, and Architectures, Fourth Edition , 2000 .

[19]  Douglas Comer,et al.  Internetworking with TCP/IP , 1988 .

[20]  R. Sietmann,et al.  UNIVERSAL PLUG AND PLAY , 1999 .

[21]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[22]  Lance J. Hoffman,et al.  Answers to frequently asked questions about today's cryptography , 1995 .

[23]  Gregory D. Abowd,et al.  Living laboratories: the future computing environments group at the Georgia Institute of Technology , 2000, CHI Extended Abstracts.

[24]  Bill N. Schilit,et al.  The Parctab Ubiquitous Computing Experiment , 1994, Mobidata.

[25]  Roy Want,et al.  Bridging physical and virtual worlds with electronic tags , 1999, CHI '99.

[26]  Charles E. Perkins,et al.  Resource Discovery Protocol for Mobile Computing , 1996, Mob. Networks Appl..

[27]  Hyacinth S. Nwana,et al.  Software agents: an overview , 1996, The Knowledge Engineering Review.

[28]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..