System Software for Ubiquitous Computing

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
Mobile and ubiquitous computing Chapter 16 Distributed systems, concepts and design, 4th edition, 2005, Coulouris et al Ylva-Li Lindh Gabriella Hammarin.
Interaction model of grid services in mobile grid environment Ladislav Pesicka University of West Bohemia.
Ubiquitous Computing and Active Spaces The Gaia Approach Fabio Kon Department of Computer Science University of São Paulo, Brazil
0 DOD/DT/CEDCV – 20 th & 21 st January Paris meeting SAGEM RTD Activities C2-Sense project Paris – 20 & 21 January 2015.
Dynamic Reconfiguration Support for Pervasive Computing
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Wirelessly Accessible Sensor Populations (WASP) for Elderly Care Monitoring Presented by Student Name: Ashraf Youssef Mostafa.
Social Computing Networks: A New Paradigm for Engineering Pervasive Software Systems Naeem Esfahani Sam Malek 32th International Conference on Software.
Speaker: Oscar Corcho Building Semantic Sensor Webs and Applications ESWC 2011 Tutorial 29 May 2011.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Distributed Software Engineering Lecture 1 Introduction Sam Malek SWE 622, Fall 2012 George Mason University.
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Responding to the Unexpected Yigal Arens Paul Rosenbloom Information Sciences Institute University of Southern California.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Semantic Gadgets Pervasive Computing Meets the Semantic Web Reza Zakeri Sharif University of Technology.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Dynamic Synthesis of Mediators in Pervasive Environments Amel Bennaceur supervised by Valérie Issarny ARLES 14 February 2012, Junior Seminar, INRIA.
Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
Slide no 1 Cognitive Systems in FP6 scope and focus Colette Maloney DG Information Society.
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
Understanding IT Infrastructure Lecture 9. 2 Announcements Business Case due Thursday Business Analysis teams have been formed Business Analysis Proposals.
System Software for Ubiquitous Computing Pervasive Computing 2002 Tim Kindberg, Armando Fox 2003 년 11 월 26 일 박준호.
Venu Veeravalli ECE Dept and Coordinated Science Lab University of Illinois at Urbana-Champaign
Security of the Internet of Things: perspectives and challenges
Design Engineering 1. Analysis  Design 2 Characteristics of good design 3 The design must implement all of the explicit requirements contained in the.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Load balancing in heterogeneous network use case Date Submitted:
Chapters 3 and 5 Possible questions
Kundan Singh Venkatesh Oct 2013
By Dr.G.K.D.Prasanna Venkatesan, Professor
Internet of Things Approach to Cloud-Based Smart Car Parking
COMPSCI 110 Operating Systems
Chapter 19: Network Management
MIT – Laboratory for Computer Science
Cognitive Networking ECLT 5820 Presentation &
MetaOS Concept MetaOS developed by Ambient Computing to coordinate the function of smart, networked devices Smart networked devices include processing.
Internet of Things and its applications
An Overview of MPEG-21 Cory McKay.
Service Discovery Middleware
Ad Hoc and Sensor Networks
Ambient Intelligence -by Internal Guide: M.Preethi(10C91A0563)
Mobile Computing.
Recombinant Computing
Systems Analysis and Design in a Changing World, 6th Edition
DATA COMMUNICATION Lecture-3.
Unit V Mobile Middleware.
Pervasive Computing Happening?
Resilient Information Architecture Platform for Smart Grid
Middleware for Internet of Things: A Survey
Central Topic: EMBEDDED SYSTEM
An Architecture for Secure Wide-Area Service Discovery
Embedded OS for IoT Tu Le Nov 19, 2018.
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

System Software for Ubiquitous Computing 유비퀴터시 시스템을 실제로 운용할 때 생길 수 있는 문제점들에 대한 내용을 정리하였다. 즉 시스템 소프트웨어에 대한 내용은 아니다. (제목을 잘못 지었음) Presented by 진성근

Ubiquitous !! But, How?

Outline Characteristics of ubiquitous systems The semantic Rubicon Discussion areas related to ubicomp Summary

Characteristics of ubiquitous systems Physical integration Integration between computing nodes and physical world Spontaneous interoperation Spontaneous interoperating in changing environments Need to cope with the highly dynamic and unpredictable changes of users, HW, and SW

Semantic Rubicon What is Semantic Rubicon Division between system and user for high-level decision-making or physical-world semantics processing world

Progress report Discovery Adaptation Integration Programming framework Robustness Security

Discovery and interaction Service discovery Example Address allocation and name resolution Challenges Avoiding overspecification More abstract and much less detailed specifications can lead to ambiguity Interaction Event systems and tuple-spaces

Adaptation Varying resources Content adaptation Ubicomp should deal with limited and dynamically varying computational resources Content adaptation Content adaptation among various heterogeneous device types

Integration Integration with the physical world It needs low-level application programming interfaces software is able to deal with physical sensors It needs high-level software framework Applications can sense and interact with their environment

Programming frameworks Compatibility To leverage existing applications Because of large investment in the applications, their data, and knowledge of how to use them To leverage Oss without modification Oss are fragile, most users are reluctant or insufficiently sophisticated to apply OS patches, and OS functionality is generally regarded as beyond application writers’ control

Robustness and Routine Failures Ubiquitous systems using wireless A radical increase of failure frequency due to wireless networking Solutions Expiration-based schemes and soft state Periodic advertisement announcing its presence or availability to the directory service Separating operations Failure-free and failure-prone operations Provide a method to solve the failures. Group communication for ‘free’ indirection To provide a level of indirection that helps rediscover lost resources

Security Trust Security for resource-poor devices Access control Spontaneous interoperation Exchange cryptographic keys Security for resource-poor devices Resource-poor devices do not have sufficient computing resources for asymmetric encryption  symmetric encryption Access control Knowing an identified user’s whereabouts raises privacy issues It can be advantageous to issue time-limited capabilities

What is this?

Summary When developing ubicomp software Ubicomp devices are small and resource constraint Human should step a side for spontaneous interoperation Ubicomp should be a part of our lives.