Mobile and Pervasive Computing Overview Material taken from: “Fundamental Challenges in Mobile Computing” and “Pervasive Computing: Vision and Challenges”

Slides:



Advertisements
Similar presentations
VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Motorola General Business Use MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are.
Service-Based Paradigm Anchoring the Indefinable Field Of Pervasive Computing Presenter: Vijay Dheap.
Sharing Content and Experience in Smart Environments Johan Plomp, Juhani Heinila, Veikko Ikonen, Eija Kaasinen, Pasi Valkkynen 1.
Vodacom Microsoft Hosted Lync
Jaringan Informasi Pengantar Sistem Terdistribusi oleh Ir. Risanuri Hidayat, M.Sc.
ITKS540 Fall 2008University of Jyväskylä ITKS540 Introduction to mobile technology and business Jani Kurhinen Fall 2008.
The Internet & The New IT Infrastructure Chapter 9.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Slide 1 Written by Dr Caspar Ryan, Project Leader ATcrc project 1.2 What is MobJeX? Next Generation Java Application Framework providing transparent component.
Revisiting and Reinventing - Mohammed Gufran CS575 (Human Issues in Computing)
ISA5428: 普及計算 Pervasive Computing Course Outline 金仲達教授 清華大學資訊系統與應用研究所 九十三學年度第一學期 (Slides are taken from the presentations by Prof. Friedemann Mattern of.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Mobile Agents: A Key for Effective Pervasive Computing Roberto Speicys Cardoso & Fabio Kon University of São Paulo - Brazil.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Smart Space & Oxygen CIS 640 Project By Usa Sammpun
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
ICN based Architecture for IoT (draft-zhang-iot-icn-architecture-00.txt) ICNRG/IETF 90, 2014 Ravi Ravindran (Huawei, USA)
CS 341 Networked Systems and Applications Sami Rollins Spring 2004.
Distinctions Between Computing Disciplines
Technology Overview. Confidential & Proprietary Information System Unit Server Two-way Satellite network System includes units and server Units have built.
Lecture 4: Mobile Computing
Ch 1. Mobile Adaptive Computing Myungchul Kim
Mobile Computing Applications Nour El Kadri Based on Jani Kurhinen Notes.
Copyright © 1997 by Rational Software Corporation Midterm Exam  When: 3:30 – 4:50PM, Thursday, October 4, 2012  Where: HM 201s  Format  Close book.
1 System Models. 2 Outline Introduction Architectural models Fundamental models Guideline.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
SMS to Converter - A new approach to send .
Towards the scalability of a Service-oriented PCE architecture for IoT scenarios Vitor Barbosa C. Souza Xavi Masip Bruin Eva Marin Tordera CRAAX - Technical.
Research Overview TalkOdyssey - 1 Odyssey Agile, Application-Aware Adaptation for Mobility Kip Walker some slides “borrowed” from Satya.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Performix Business Services Converging to Unified Messaging With convergence of telephony, computer and multimedia communication becoming a realistic vision,
A Study of Wireless Virtual Network Computing Kiran Erra.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)
Secure Systems Research Group - FAU Patterns for Wireless Web Services Nelly Delessy January 19, 2006.
Distributed Computing Systems CSCI 4780/6780. Geographical Scalability Challenges Synchronous communication –Waiting for a reply does not scale well!!
思科网络技术学院理事会. 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
October 10, Why Green Committed to UT Sustainability Policy Opportunity to make a difference Green IT is good business!
Connectivity  The ability of a computer to communicate with others Sending Device Communications Device Communications Channel Communications Device Receiving.
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Mobile Computing and Wireless Networking
Theia Technical Design Presentation 3. Theia Overview Theia’s purpose is to create three dimensional, virtual representations of a room. To allow the.
Copyright © Genetic Computer School 2008 Computer Systems Architecture SA Lesson 12 The TCP/IP Protocol Suite.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Computer Science and Engineering - University of Notre Dame Jimmy Neutron CSE 40827/60827 – Ubiquitous Computing December 9, 2009 Project Presentation.
Distributed Computing Systems CSCI 4780/6780. Scalability ConceptExample Centralized servicesA single server for all users Centralized dataA single on-line.
Seminar on Service Oriented Architecture Distributed Systems Architectural Models From Coulouris, 5 th Ed. SOA Seminar Coulouris 5Ed.1.
Overview of Mobile File Systems Presented by Steve Todd For WSU CS 898T Mobile and Wireless Networks Class 5/3/04.
1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel:
Slide 1© ECMWF CONSTRAINTS TO INCREASED WEATHER RADAR DATA EXCHANGE Understanding the technical Information Systems constraints (R Giraud, ECMWF and Secretariat)
Energy-Efficient Signal Processing and Communication Algorithms for Scalable Distributed Fusion.
Fuego Core 2005/7 Possible Directions Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
Understanding IT Infrastructure Lecture 9. 2 Announcements Business Case due Thursday Business Analysis teams have been formed Business Analysis Proposals.
ICN based Architecture for IoT ICNRG/IETF 88, 2013 Yanyong Zhang, Dipankar Raychadhuri Rutgers University) Ravi Ravindran and Guo-Qiang Wang.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
BLACKBERRY TECHNOLOGY PRESENTED BY SHAIK TABREZ (09J01A1225 )
Today’s Communication Complexities: Customer, Employee, Enterprise CustomerReality EnterpriseReality EmployeeReality Lost Revenue Customer Satisfaction.
Information Technology Deanship
A Study of Wireless Virtual Network Computing
Networking Applications
Adaptive Cloud Computing Based Services for Mobile Users
Mobile Computing.
Evaluating Proxy Caching Algorithms in Mobile Environments
Done by:Thikra abdullah
Presentation transcript:

Mobile and Pervasive Computing Overview Material taken from: “Fundamental Challenges in Mobile Computing” and “Pervasive Computing: Vision and Challenges” both by M. Satyanarayanan

Mobile Computing Definition: A distributed system with elements that move around Example elements? Scenario: Using my laptop to create these slides Mobile host Server Mobile host

Pervasive Computing Definition: “…environments saturated with computing and communication capability, yet gracefully integrated with human users.” Scenario: Sending from the airport Scenario: Rushing off to a meeting Mobile versus pervasive computing?

Mobile Computing Constraints Mobile elements are resource-poor Mobility is inherently hazardous Mobile connectivity is highly variable in performance and reliability Mobile elements rely on a finite energy source

Pervasive Computing Challenges Proactivity Self-tuning Integration of technologies

Mobile Computing Areas Mobile networking Mobile information access –Caching Support for adaptive applications System-level energy saving techniques Location sensitivity

Pervasive Computing Areas Effective use of smart spaces Invisibility Localized scalability Masking uneven conditioning

Theory to Practice Mobile connectivity is highly variable in performance and reliability –If you want to send a message, you may or may not be connected to the recipient Solutions?