Tactical Service-oriented Infrastructure (TSI) uses reactive/proactive orchestrations of services to manage connectivity within mobile nodes the battlefield. Such infra is hosting information systems (ISs) also using quality constrained services forming local/distributed orchestrations. The distributed orchestrations are provided through tactical radios composing disruption/delay tolerant networks (DTNs). In this presentation, we describe a model to represent the IS’s services orchestrations together with the orchestrations of core services providing the reactive/proactive connectivity mechanisms within TSI’s in/out chains.
2. Agenda
Three things:
The Internet
2
One of the most important human inventions
Wheel (3500 BC)
(1960s)
Transistor (1947) Microprocessor (1971)
Airplane (1903) Nuclear fission (1939)
Electricity (late 19th)
Most of them also used/created for military purposes…
THE Computer Network: network of networks
Remember!<you>
3. Agenda
Presentation title
Three things:
Agenda
3
SOA
13 years (2003)
ARPANET
47 years (1969)
TCP/IP
~42 years (1974)
OSPF
27 years (1989)
Nonlinear path from the origin to modern tactical networks
PDP-10
Mobile Devices TSITactical Service Infrastructure
OLSRv2
1 year (2014)
<you>
Cross-layer model
3 months (2016)
4. Agenda
Presentation title yyyy-mm-dd
Three things:
The references
Where wizards stay up late
The Origins of the Internet
4
How? Why? Who? Where?
Computer Networking
A top-down approach
<you>
TSITactical Service Infrastructure
*
5. Agenda
Presentation title yyyy-mm-dd
Three things:
ARPANET
RFCs
Request For Comments
Developing hardware + software for
packet switching
5
Advanced Research Projects Agency Network
Data Link
<Network Interface>
Network
Transport
Application
(1960s)
Telephone lines
Circuit switching
<you>
TCP/IP
Stack of protocols
PDP-10
Host
DDP-516
Interface Message Processor
<No mobility + security at the design>
6. In Short
Presentation title yyyy-mm-dd
TSI Tactical Service Infrastructure
6 <you>
<Mobile device>
Data Link
<Network Interface>
Transport
Application
Controller
Service Mediator
Message Handler
Packet Handler
TSI Node
Southbound Interface
Northbound Interface
1
2
3
Cross-layer
4
Service(s)Information System(s)
Network1
32
+ TCP/IP
7. Agenda
Presentation title yyyy-mm-dd
Three things:
TCP/IP
7
Communication Layers
Data Link
<Network Interface>
Network
IPv4-6
Transport
TCP, UDP
Application
HTTP, SMTP
(RFC 1122, 1989)
<you>
You are handling two flows: sound and image.
Nodes at the battlefield need to handle disruption/delay.
Services:
Blueforce tracking
Event reports
TSI
Provider Clients
<Radio(s)> <Voice> <Projector> <Eyes> <Ears>
Multicast
Publish
/Subscribe Multicast
Publish
/Subscribe
Error correction
Congestion control
<you running>
<slides + ideas>
<Disruption>
<ideas>
8. Agenda
Presentation title yyyy-mm-dd
Three things:
The tactical network
8
Connectivity scenario
ARPANET + Tactical network
<you>
Data Link
<Network Interface>
Network
IPv4-6
Transport
TCP, UDP
Application
HTTP, SMTP
Services
TSI
<Radio(s)>
The mobile nodes:
Node A
<Dismounted>
UHF WLAN
Node C
<Mobile>
VHFUHFWLAN SatCom
HQ Node D
<Deployed>
SatComVHF UHFWLAN
Node B
<Relay>
SatComVHF
HQ
Custom
Mobile
WLAN, UHF
Dismounted
VHF
VHF, SatCom
UHF, VHF, SatCom
WLAN, UHF,
VHF
WLANUHF, VHF,
SatCom
Connectivity graph
SatComVHF UHFWLAN
<Disruption>
Disruption/Delaty Tolerant Network (DTN)
9. Agenda
Presentation title yyyy-mm-dd
Three things:
What is service?
9
Wraped up logical process even carrying its semantics and requirements.
<you>
*
What if we try a different service?
<IP phone> <Voice> <Ears>
TCP/IP
Stack of protocols
Orchestration
of services?
<Online payment>
<Authentication, check
funds and withdraw>
<Online stores>
10. Agenda
Presentation title yyyy-mm-dd
Three things:
The power source
10
We all share the same source of power
<Massive amount
of energy>
Remember!
<Mobile devices>
<Sun>
<Humans>
<meat>
<apple> <milk>
<plant> <cattle>
<Physics, Mathematics,
Engineering and etc>
<you>
<Hydro power>
<Human-created
universe>
Science and
Technology
149,600,000 km
<Earth>
<moon>
*
11. In Short
Presentation title yyyy-mm-dd
TSI Tactical Service Infrastructure
11 <you>
Mission #1: local/distributed Services
Mission #2: Core Services
Mission #3: handle stable +
unstable network conditions
<Mobile device>
Controller
Service Mediator
Message Handler
Packet Handler
TSI Node
Southbound Interface
Northbound Interface
1
2
3
Cross-layer
PEP
PEP
PEP
4
Service(s)Information Systems
12. Tactical Ground Report System
Gathering context information in the battlefield
Example of services from the literature12
Node C
Node A
Soldier localization
Adversary localization
Vehicle localization
Live camera
Aerial photos
Node B
J. Evans, B. Ewy, M. Swink, S. Pennington, D. Siquieros, and S. Earp, “TIGR: the tactical ground
reporting system,” IEEE Communications Magazine, vol. 51, no. 10, pp. 42–49, October 2013.
<Aerial photos>
<Blue/Red force
tracking>
<Live camera, compile
and share>
<you>
13. TACTICS Connectivity Scenario13
<Mobile>
<Core>
HQ (TN-H)
Dismounted (TN-D)
Mobile (TN-M)
Custom (TN-C)
Company
Brigade
Squads
Platoon1
MEDEVAC
Communication patterns:
Mobility:
Convoy
RSTA
Combat, …
a) From Core to All
Non-critical
If possible
b) From Core to All
Immediate threat
Reliable, 15s when pushed
c) From Mobile to Core
Blue Force Tracking
Reliable, 60s when requested
Quality of Service (QoS):
Integral (complete/error-free)
Reliable (confirmed)
If possible (no guarantees)
<you>
RSTA: Reconnaissance, Surveillance and Target Acquisition
14. In Short
TSI Tactical Service Infrastructure
14 <you>
Connectivity states:
i
At two or more nodes, V = {TN-x1, TN-x2,..., TN-xn}
i o
TN-D1
O1 O2o i
Odistributed (V,E,D)
TN-x2
oOni
TN-Coren
...
i = {i1, i2, i3} o = {o1, o2, o3}Southbound interfaces
reliable, 10 secs when pushed
Dismounted
i
reliable, 30 secs when pushed
Deployed
Immediate threat
Distributed service orchestrations
<Mobile> <Core>
={ }S1 S2 Sn
...
O1
How routing is done?
s2 s3
Established DTN
Unstable
Stable
<Stable>
Good connectivity
Poor connectivity
16. Agenda
Three things:
Link State Routing
16
Computing the metrics
OLSRv2 (2014)
Optimized Link State Routing Protocol
OSPF (1989)
Open Shortest Path First
𝐸𝑇𝑇 =
1
𝑙𝑞 ∗ 𝑛𝑙𝑞
∗
𝑠𝑐𝑎𝑙𝑖𝑛𝑔
𝑙𝑖𝑛𝑘𝑠𝑝𝑒𝑒𝑑
𝐷𝐴𝑇 =
1
𝑙𝑞
∗
𝑠𝑐𝑎𝑙𝑖𝑛𝑔
𝑙𝑖𝑛𝑘𝑠𝑝𝑒𝑒𝑑
<you>
𝐸𝑇𝑋 =
1
𝑙𝑞 ∗ 𝑛𝑙𝑞
Expected Transmission Count (ETX)
Direction Airtime (DAT)
Expected Transmission Time (ETT)
Data Link
Network
OLSR
<Radio>
Handheld
<Dismounted>
Laptop
<Mobile>
Data Link
Network
OLSR
<Radio>
𝑙𝑞 𝑙𝑞
𝑛𝑙𝑞 𝑛𝑙𝑞
𝐶𝑜𝑠𝑡 =
108
𝑏𝑎𝑛𝑑𝑤𝑖𝑑𝑡ℎ
𝑙𝑞 (𝑙𝑖𝑛𝑘 𝑞𝑢𝑎𝑙𝑖𝑡𝑦)
𝑛𝑙𝑞 (𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟 𝑙𝑖𝑛𝑘 𝑞𝑢𝑎𝑙𝑖𝑡𝑦)
𝑙𝑖𝑛𝑘𝑠𝑝𝑒𝑒𝑑
How to handle disruptions?
17. Example of orchestration
TODO: work on that paper diagram…
State of the art review
yyyy-mm-ddPresentation title
Neighbor discovery
Data Transmit
Neighbors?
Messages?
Receiving/Sending?
17
DTN handling in the literature
No
No
No
Yes
Yes
Yes
Store/Forward
1
2
1
Controller
Service Mediator
Message Handler
Packet Handler1
2
3
4
PEP
PEP
PEP
4
4
4
Disruption/Delay Tolerant Networks
3
3
SatComVHF UHFWLAN
Good connectivity Poor connectivity
The task is do it using the Core Services…
Tactical Service Infrastructure (TSI)
2
*
<your brain>
<mobile device>
18. State of the art at TSI18
Dynamic view
Service
Sn
i3i2i1 o1o2o3
In Out
TSI TSICross-layer calls
rorin
Cross-layer calls
1 Packet handler
2 Message handler
3 Service mediator
r Radio {WLAN, UHF, VHF, SatCom}
Neighbor discovery
Data Transmit
Store/Forward
1
1 3
2 3
2
<you>
01
02
03
04
C2,1 = Labelling; C2,2 = Cryptography;
label = C2,1:i2.readLabel();
C2,1:o2.createLabel();
C2,1:o2.update(label)
/* Constructors */
C2,1:i2.readLabel(){C2,2:i2.decryptLabel()}
C2,1:o2.createLabel(){C2,2:o2.encryptLabel()}
update{ o2.decryptLabel(), o2.encryptLabel()}
i2
.readLabel()
.decryptLabel()
<message handler>
19. In Short
Presentation title
TSI Tactical Service Infrastructure
19 <you>
Routing Service
Packet Handling Service
1
Proxy Service
Message Queue Service
3
Message Transport
Messaging Service
2
QoS Handler
Policy Management
Security Handler
4
TSI Node
Southbound Interface
Northbound Interface
Cross-layer
Service(s)Information Systems
ri
i3
i2
i1 o1
o2
o3
ro
C11 C12 C1x
...
C21 C22 C2x
...
C31 C32 C3x
...
*
*
*
Core Services
20. Agenda
Presentation title
Three things:
20 <you>
s1
s2 s3
Disconnected
Established DTN
Unstable
Stable
EMCON EMCON
The model
<you running><you standing>
<you @toilet>
Disconnected
Established DTN
3 States + 3 Actions
Mobile Devices
Emission Control (EMCON)
When you are close to an adversary
States = {Disconnected, Established and DTN}
Actions = {Stable, Unstable}
21. State of the art review21
Connectivity
Mobility
Resources Requirements
Network setup:
Fully connected
Fragmented
Opportunistic
Mobility pattern
Bandwidth
Storage capacity
Power consumption
QoS
Priority, reliability,
sensitivity
Node A
<Dismounted>
UHF WLAN
<you>
Kernel IP routing table
Destination Gateway Metric
10.1.1.2 10.1.1.19 2
10.1.1.3 10.1.1.19 2
10.1.1.4 10.1.1.19 2
10.1.1.5 10.1.1.19 2
10.1.1.6 10.1.1.19 2
a) From Core to All
Non-critical
If possible
b) From Core to All
Immediate threat
Reliable, 15s pushed
Solutions in the literature are based on availability of:
Controller
Service Mediator
Message Handler
Packet Handler1
2
3
4
PEP
PEP
PEP
Tactical Service Infrastructure (TSI)
Group 02
Group 01 Group 03
1 2 31
1
1 2
23. Agenda
Presentation title yyyy-mm-dd
Three things:
Hypothesis
23
A feasible guess?
<you>
𝐸𝑇𝑇 =
1
𝑙𝑞 ∗ 𝑛𝑙𝑞
∗
𝑠𝑐𝑎𝑙𝑖𝑛𝑔
𝑙𝑖𝑛𝑘𝑠𝑝𝑒𝑒𝑑
𝐷𝐴𝑇 =
1
𝑙𝑞
∗
𝑠𝑐𝑎𝑙𝑖𝑛𝑔
𝑙𝑖𝑛𝑘𝑠𝑝𝑒𝑒𝑑
𝐸𝑇𝑋 =
1
𝑙𝑞 ∗ 𝑛𝑙𝑞
Expected Transmission Count (ETX)
Direction Airtime (DAT)
Expected Transmission Time (ETT)
<Radio(s)>
<Localization>
Path availability 𝑃𝐴(𝑖, 𝑗) =
𝑡=𝑠𝑡𝑎𝑟𝑡(𝑖,𝑗)
𝑇
𝐴(𝑖, 𝑗, 𝑡)
𝑇 − 𝑠𝑡𝑎𝑟𝑡(𝑖, 𝑗)
Link changes
Link duration 𝐿𝐷(𝑖, 𝑗) =
𝑡=1
𝑇
𝑋(𝑖, 𝑗, 𝑡)
𝐿𝐶(𝑖, 𝑗)
𝐿𝐶 𝑖, 𝑗 =
𝑡=1
𝑇
𝐶(𝑖, 𝑗, 𝑡)
<Time>
s1
s2 s3
Disconnected
Established DTN
Unstable
Stable
EMCON EMCON
We started with the hypothesis that the stable and unstable
actions can be defined based on the metrics above.
The system has 3 states
and 3 actions:
Spatial dependence
Temporal dependence
𝐷 𝑠𝑝𝑎𝑡𝑖𝑎𝑙(𝑖, 𝑗, 𝑡) = 𝑅𝐷( 𝑣𝑖 𝑡 , 𝑣 𝑗(𝑡)) * 𝑆𝐷( 𝑣𝑖 𝑡 , 𝑣 𝑗(𝑡))
𝐷𝑡𝑒𝑚𝑝𝑜𝑟𝑎𝑙(𝑖, 𝑗, 𝑡′) = 𝑅𝐷( 𝑣𝑖 𝑡 , 𝑣 𝑗(𝑡′)) * 𝑆𝐷( 𝑣𝑖 𝑡 , 𝑣 𝑗(𝑡′))
Random, Group and Grid
<three mobility patterns>
OLSRv2
<one metric>
24. Simulation results
yyyy-mm-ddPresentation title
24
Random Group
Group 01 Group 02
Group 03Group 02
Group 01 Group 03
Data overhead OLSRv2 (18 nodes) Adding nodes (18 to 42 nodes)
Group 01
Grid (convoy)
<you>
Mobility patterns:
<unstable>
Worst case <stable>
Best case
<Group>
In between
25. In Short
Presentation title yyyy-mm-dd
TSI Tactical Service Infrastructure
25 <you>
Mission #1: local/distributed Services
Mission #2: Core Services
Mission #3: handle stable +
unstable network conditions
Controller
Service Mediator
Message Handler
Packet Handler
TSI Node
Southbound Interface
Northbound Interface
1
2
3
Cross-layer
PEP
PEP
PEP
4
Service(s)Information Systems
s2 s3
Established DTN
Unstable
Stable
26. Simulation results26
Group
18(6),27(9),36(12),42(14)
Group 02
Group 01 Group 03
<you>
Group 18 nodes, 3 groups of 6
Link changes: 9 ±3.2
Link duration: 4 ±2.6 secs
<isolated>
<intermittent>
DTN
@Critical points A, B and C (DTN)
Intermittent routes between 01 and 02
Path availiability: 0 min (DTN)
No routes between Group 01 and 03
27. The decision process27 <you>
Tactical DTNri
i3
i2
i1 o1
o2
o3
ro
S1,...,Sn
Packet Handler
Olocal
Disruption or EMCON
Cross-layer feedback
In Out
1
2
3
Packet handler
Message handler
Service mediator
1
2
Behaviour
Behaviour
01 nextHop = C1,1:o1.chooseNextHop();
02 MEP = C3,1:i3.|o3.chooseProxy(nextHop);
03 C2,1:i2.|o2.chooseWrapper(MEP);
04 // The trigger for the decision process
05 C1,1:i1.|o1.getConnectivityContext(){
06 if costFunction(context) then
07 { i1,2,3.|o1,2,3}.set(stable);
08 else {i1,2,3.|o1,2,3}.set(unstable);}
What happens when a critical point occurs?
s2 s3
Established DTN
Unstable
Stable
Actions:
<Critical point>
<Path availability, link changes and link duration>
28. TSI should host a hybrid mechanism:
Connectivity + Mobility + Resources + Requirements
Conclusion28
Tactical DTNri
i3
i2
i1 o1
o2
o3
ro
C11 C12 C1x
...
C21 C22 C2x
...
C31 C32 C3x
...
*
*
*
TN-xn
S1,...,Sn
Olocal
1
2
3
Packet handler
Message handler
Service mediator
* Controller
r Radio
o1
o2
o3
ro
S1
Handheld
TN-D
<Dismounted>
ri
i3
i2
i1
Sn
Client ServerIntermediary
Simulated metrics +
two actions
={ }S1 S2 Sn
...
O1
Model for orchestrations
Information Systems
Core Services
<you>
s2 s3
Established DTN
Unstable
Stable
29. In Short
Scaling the solution
29
Multi-homed devices + message exchange patterns
<you>
Multi-homed node SatCom
VHF
< 20 km
< 9.6 kbps
∞
< 5 mbps
UHF
< 10 km
< 256 kbps
<Mobile>
Stable
Unstable
Stable
Unstable
Stable
Unstable
What happens in multi-homed nodes?
How to define the reward for changing
protocols?
The Message Exchange Patterns
can be mapped to specific protocols?
s1
s2 s3
Disconnected
Established DTN
Unstable
Stable
EMCON EMCON
s4 s5 s6 s7
Request/Response
Publish/Subscribe
𝑅 𝑠 , 𝑅 𝑠, 𝑎 , 𝑅(𝑠, 𝑎, 𝑠′)
30. Agenda
Presentation title yyyy-mm-dd
Three things:
M1HDi8ZKSwslVx3BooDuiPyqAMtRhPNuuiQWv+w66AthroSh7VVYyKYJUdgNzRUGR0UKCPdtkCzbdrgXfLLqPp1k1MldmaJw6MejBN5dqMIfqn4zbu0x70blYAk3/vsXYzclw9e50veFpVOmLI16W4
NfKy8dnkVh9hXFXNBER7bdonBwdXAtT1+lyXUa6VO/BMwAIp+BNZ7A1bwjBoP0GmnlcA/doDUIvMVwi53FGKpysJx/Rn/VH9KthVklEP1bgRBK1tucK/FuuQFjIdhpzQqr7MhArMRWGjq2hg4fzHB1
FK+SJpD+0Ja1oWBMuC13ZAxHhyU2va4Hsf8+DRIbq4PQgxm+1QROWVlbkcAEz+T/19hqTNlZSql0Q3jhyBCMUtZDgx71y+8GQp4q+VdOGohAtFyWRb/Io76+uRUmg/jsxf+Yx+sdws6Uwm3ILyIxv
4RDvtH5XBVNpZlbCSnCrHdDTuyjOZyEpzQbcuNSBsYbCW8oHSl8VR+VWNAJnV9S2JwARPqMbjQxn1FWkMhi6F26KHrpwY/y8d+TgQpr/K8k26auQEtJMpDHrxaMa30HdwrruzcQ8tOAOwBae
VfDWBbgKxEOmnbPuPOPx4XS+x/azMX+B41hL1V45zPOms7FXJ71pza0txYWs7t/ntTOw+djE0c4qIJqyYjzclf3Z3LK8Co7LnM5szibGdbc+b54JF/XFlLsIRFJix31T0yLyEQOE1M04NCHMKBLuRoa
KHPLZuB85i6LyYlcvjF7prPbvQ0sSy9c4ztHB9arY4koKWb/YJI6feLWaLgJNFo+zn9nBqbL4CmaFLiVORp/6ra1YudmDHFS7eTx2cRfFcOGmcOKQWtJKwgUaTCuvUKNFvT2ollEJnj7H8tKqEwQxB
NW5L29tXCEB8Ytr5UPccK7AmV5Y8SnJ+0J0q8gtbrl28na4bUxazX2HSZN/aug5BVQGS7qtQ8Eru6RsWJGS7iZ6RXLWlWIsimKMmNSRX4veEVuZ9BUbRpCXo4LVTp6/k2BDsAtV3o4Da6NnN
X5jcRHr3mQrrwhTK7/x6w8zBtlMW8W7Tj4XCC9v6Sa1feuxvX3LlXi1+Aathz8k7c18Xm6WgoVpOLy0Gel9u/hAR+OnTDgCK3pWOVFA5HmeEfYNx6rY3LC7Wxb84IY+8/5nOIEcJel9vJ3D5zQE
NXC1v8H2a8vpt3MtdR4L/3Nypu5tdJlYTG363NLO9YtX3BUDPqKAgxPUe58TLRbU1viVEXMtZ3WH/OQZWh/hactj5kFwBd2jc1+q4WcDswT4xcaYJavEywChtgSFgxodVuNjaMLUP0GPaKYGXD4
88NN2NckgSxihTNzvuYD/RsKYJH8NM2G67cj1/6g1ERKRI9phberE5beBcJ5NvOoI+qRagD/z4GlYRfrvQS6Smn4kdcUv1WQXxn/D7bKc/GPCJNVipj+WOBhW7m5Ya750oqUOX8aQA88aZDYBF
CX/y0wz/k9qXTL4rLGARVp6YdmPph9XJGS9piPKa+oCNsdKt/njkNL2BVn1O5e6SzzqYwEdJGzL7z0yGJ53w23kRIs0j+JI/4w6SO1L0vDSwtfHJMAYAA+4062NlCFadJ8WAmGhbkFCpTBZNwYkk
xg7V0O4vi19v/nLEu6m/v9A+sZOWZcnO052t/U9WK1GCxuoiZ40IllrhVdYQe2dlRKo4Tt4yh3sQJ2exGMPQ2Fho3PQp6Hn3KwzDpPYE+77K5A8Z1OfhIAzCRIvA2SJ8e5BTRa7kBLBBohZOcvbxx
BOS2CZ+xZxFMQqMAodHdnEkOruFopek9dbU3YmttU8QL+sanVLnhzUkWcE7uWxvXgkH5ZhGpJ/Ehr8CDohpY/AVy1QkCDuA0eszi/LzhYf1BK+23OasWSTHjaMhGNAOfwdDoYy0ewxOngwIgc
AbYWigkZw/qvP7n6i1EiAKYpqDKg+VDKTCVynToO80qdYeskgd7ZHv2lbKDYe+A8ap9hgDE4jXorrtZbeHl2zCfCnzt+kczOE2NlT31XV/numPnm+OtKN2X2tZlbw9kjcxvmNAZVUGw7lX7z7FmHA8O
3fMLfGcQNGhwrLr8gHAro5O3o/XnBmbOtn1t7ort8A0OMOULnUyv4/6mb/ifOl5RiJpB0hvvdz7PIL2xSaAt1h4TD8IPh04KzkHGnRTHeCQX5tCoF7Nc7ceHcRP9O9gdYc/1m9/TsqAMsttfR5n+E
HU0ICudSIZKySk0Kf8EHCe43H45eJcZxF9u7EpT7Gt6UwJg07T303cNRy6oZiI2msNh4bWsFV6+GWUsu0Jo99+dx/zj1/8EH8+qut2e45z3+xK9p3azo2Kh4McEnwEZiJHA9UjoUoGdwI24jslvK7
0YwH3IF7a2ip3Lbxx0raJ4TTJt1jqdk5DQhqYGY6PNWvaE10DW5JKEKv2RYsLmt2bVGLBfd23zTRJujal7LtYOrI+Vxnx+5v9R0ncY7c8NUV9XP0LusJCWxCpFrr5lgA2iGWNRWgXufih8poqFu1vR
Gy1ynQASOk+HEsPtPDsZfSqB4ehHQq3SjaLRDokh0vvumzXrR2RBfsZfj4AWUZGZhDwdSeX2L6yBpKkINJDXTZv/b6pD+l645Y+IXdBga722K5Edt7H3V48GmFDIrChxoui0OMIcBp+f0mkGQ8gg
c/MavB/YVRzEyPxbE4gP1xS0cwgTK4mVIsqvXcVJNAfYquE/JKIJIVJ9q2asjw9wuX99Hc9wwegKcHd10DOKpKwBe7HROlIgpEWM9KPJT8d4/YJhIIwdQNO+Jz9ZXiMmtvN0Np6UNbLajWlExe
ey9AnEgbkjNot0I4wy4s/jemU8hQn6mFk8TmLfvOAx9Pp/SsydNo9b22wCDX9fs4crPi1e6
Roberto Rigolin Ferreira Lopes
roberto.lopes@ntnu.no
# ifdown wlan0
Computer Networks: from ARPANET
to the modern battlefield
30
You cannot teach a man anything, you can only
help him find it within himself.
― Galileo GalileiAlways remember,
your power comes from the sun!
<Disruption>
31. Agenda
Presentation title
yyyy-mm-dd
Three things:
Mindset behind ARPANET
Computers had the potential to act as extensions of the whole human being, as
tools that could amplify the range of human intelligence and expand the reach
of our analytical powers.
Lyon, Matthew; Hafner, Katie (1999-08-19). Where Wizards Stay Up Late: The Origins Of The Internet (p. 27). Simon & Schuster. Kindle Edition
31
Licklider
Gentlemen obsessed with the human brain
(1960s) Shannon
(1948)
Turing
(1936)
Von Neumann
(1945)
<your brain>
Notas del editor
Don't be encumbered by history. Go off and do something wonderful.― Robert Noyce
There are thousands of years in the past, and there is an unknown amount of time in the future.
There are all kinds of opportunities, and there are all kinds of dangers. ― Richard Feynman
Rise free from care before the dawn, and seek adventures.― Henry David Thoreau
Curiosity is the engine of achievement.
Creativity is as important as literacy.― Ken Robinson
Every really new idea looks crazy at first. ― Alfred North Whitehead
The present is the only thing that has no end.― Erwin Schrödinger
Don't be satisfied with stories, how things have gone with others. Unfold your own myth.― Rumi
Learn the rules like a pro, so you can break them like an artist. ― Pablo Picasso
Life has become immeasurably better since I have been forced to stop taking it seriously. ― Hunter S. Thompson
We can judge our progress by the courage of our questions and the depth of our answers, our willingness to embrace what is true rather than what feels good. ― Carl Sagan
“Begin at the beginning," the King said, very gravely, "and go on till you come to the end: then stop.”― Lewis Carroll, Alice in Wonderland
Don't tell people how to do things, tell them what to do and let them surprise you with their results.― George S. Patton
I don't measure a man's success by how high he climbs but how high he bounces when he hits bottom. ― George S. Patton Jr.
Creativity requires the courage to let go of certainties.― Erich Fromm
What you do speaks so loudly I cannot hear what you say.
- Ralph Waldo Emerson
Let your plans be dark and impenetrable as night, and when you move, fall like a thunderbolt.― Sun Tzu, The Art of War
Daring ideas are like chessmen moved forward. They may be beaten, but they may start a winning game.― Johann Wolfgang von Goethe
If you're not prepared to be wrong, you'll never come up with anything original.― Ken Robinson
It is not enough to be industrious; so are the ants. What are you industrious about?― Henry David Thoreau
Begin doing what you want to do now. We are not living in eternity. We have only this moment, sparkling like a star in our hand--and melting like a snowflake...Francis Bacon
The true delight is in the finding out rather than in the knowing.― Isaac Asimov
“Every man is a creature of the age in which he lives and few are able to raise themselves above the ideas of the time.” ― Voltaire
“Self-education is, I firmly believe, the only kind of education there is.” ― Isaac Asimov
Our novice runs the risk of failure without additional traits: a strong inclination toward originality, a taste for research, and a desire to experience the incomparable gratification associated with the act of discovery itself.― Santiago Ramón y Cajal, Advice for a Young Investigator
He who is brave is free.― Seneca
The true sign of intelligence is not knowledge but imagination.― Albert Einstein