Motivating Sensor Network Research: The Applications and Computer Science Issues Prabal Dutta and David Chu September 13, 2005

Download Report

Transcript Motivating Sensor Network Research: The Applications and Computer Science Issues Prabal Dutta and David Chu September 13, 2005

Motivating Sensor Network Research:
The Applications and Computer Science Issues
Prabal Dutta and David Chu
September 13, 2005
1
What Makes Good Application-Led Research?
Richard Sharp and Kasim Rehman
September 13, 2005
2
Perspectives
• “Applications are of course the whole point of
ubiquitous computing”
– Mark Weiser [Wei93]
• “We need to increase the applications deployed to
books written ratio in sensor networks”
– Deborah Estrin [Personal Communications]
• “In the future, increasing proportion of computer
science research will be application-driven”
– Eric Brewer and Mike Franklin [CS262A-Fa04]
September 13, 2005
3
Defining Application-Led Research
• Application-Led Research
– Driven by domain problem
– Evaluated by quantifying benefits brought to domain
• Technology-Led Research
– Not necessarily motivated by potential domain benefits
– Interesting or challenging from a technical perspective
• Research Goals Should (do you agree?)
– Identify users’ problems and application requirements
– Provide infrastructure developers with application
requirements
– Validate technology and provides insights into its use
September 13, 2005
4
Selecting Applications
• Will this change the way people think?
– If nothing changes after your research, what’s the point?
• Must make an impact on computer science
– Just impacting biology or civil engineering is not enough
– Starting from scratch can make this more difficult or easier
• If system building, what will you learn from it?
– There must be an important question in there!
• Identify and attack “severe and persistent problems”
• Avoid trivial “proof-of-concept” research projects
– Team up with domain experts when selecting problems
– Make sure there’s a concept and it’s worth proving
September 13, 2005
5
Implementing Applications
• To start from scratch or not?
– Benefits?
– Drawbacks?
• Is building reusable infrastructure worth it?
– Research community values novelty over good engineering
– Research community doesn’t value implementation as research
– Do you agree?
• Reframe the question: What are your options? (Aside)
– Your efforts can be directed structurally or strategically
• Structural: change the community so that it values infrastructure
• Strategic: pick the right topic, and your work will be broadly used
(and well referenced)
September 13, 2005
6
Evaluating Applications
• Small, lab-scale evaluations
– Useful: in the early stages of design
– Insufficient: impossible to understand the impact of
• Environment on technology
• Technology on environment
• NEST FE Provides some good examples
• Applications are evaluated only against themselves
– Self-evaluation is insufficient
– Requires applications, infrastructure, and data to be
shared
• Is this a good idea?
• Is it done in other fields?
September 13, 2005
7
Recommendations
• Choose applications carefully
– Address severe persistent problems; avoid trivial ones
• Share technical infrastructure
– Design reusable SW/HW; publicly release code
• Evaluate applications in realistic environments
– Only way to investigate interactions between tech/env/users
– “The real world is it’s own best model” – Rodney Brooks
• Perform comparative evaluations
– Release data sets from field trials; allows other to analyze
September 13, 2005
8
Allen Newell’s Research Style
September 13, 2005
9
Allen Newell’s Research Style
• Good science responds to real problems
– Don’t pick fantasy problems; there are too many real ones
• Good science is in the details
– Takes the form of a working model
– Includes detailed analysis or implemented models
• Good science makes a difference
– Measure of contribution is in
• How it solves real problems
• Shapes the work of others
September 13, 2005
10
Some Computer Science Issues in Ubiquitous Computing
Mark Weiser
September 13, 2005
11
Are We There Yet?
• Hundreds of Tabs?
• Tens of Pads?
• One or two Boards?
September 13, 2005
12
Did Their Work Have Impact?
• Yes! Due to emphasis on computer science issues:
“The fruitfulness of ubiquitous computing for new computer
science problems justified our belief in the…framework”
• Issues like
– Hardware components
• Low power (P=C*V^2*f gives lots of degrees of freedom)
• Wireless (custom radios (SS/FSK/EM-NF bits/sec/meter^3 metric)
• Pens (how do you write on walls?)
– Network Protocols
•
•
•
•
Wireless media access (MACA: RTS/CTS)
Gigabit networks (lot’s of little devices create a lot of traffic)
Real-time protocols (IP telephony)
Mobile communications
September 13, 2005
13
Connecting the Physical World with Pervasive Networks
Deborah Estrin, David Culler, Kris Pister, Gaurav Sukhatme
September 13, 2005
14
Goals
• Goal: to measure the physical world
–
–
–
–
Across large spaces
Over long periods of time
Using multiple sensing modalities
In remote, and largely inaccessible locations
“The physical world is a partially observable,
dynamic system, and the sensors and actuators are
physical devices with inherent accuracy and
precision limits.”
September 13, 2005
15
Challenges
• Immense scale of distributed systems elements
– Vast numbers of devices
– Fidelity
• Limited physical access
–
–
–
–
Embedded in the environment
Remote, expensive, or difficult to access
Wireless communications
Energy harvesting or very moderated energy consumption
• Extreme dynamics
– Temperature, humidity, pressure, grass height, …
– Passive vigilance to a flurry of activity in seconds
September 13, 2005
16
Challenge: Immense Scale
NEST FE: 557 Trio Nodes, Self-powered, selfmaintaining, GPS ground truth, multiple subsets
September 13, 2005
17
Challenge: Limited Physical Access
Redwoods
Top sensing surface:
incident PAR and TSR
Top endcap
O-rings
Battery
Cylindrical enclosure
Mica2Dot
Bottom sensing surface:
temperature, humidity,
barometric pressure,
reflected PAR & TSR
Protective skirt
Bottom endcap
September 13, 2005
to appear Sensys 05
18
Challenge: Extreme Dynamics
ExScal
• Border Control
– Detect border crossing
– Classify target types and counts
• Convoy Protection
– Detect roadside movement
– Classify behavior as anomalous
– Track dismount movements off-road
• Pipeline Protection
– Detect trespassing
– Classify target types and counts
– Track movement in restricted area
September 13, 2005
19
Discussion
September 13, 2005
20