Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.

Slides:



Advertisements
Similar presentations
The Windows File System and Windows Explorer To move around the file system and examine your files or get to one you want (say, to modify, delete or copy.
Advertisements

®® Microsoft Windows 7 Windows Tutorial 8 Connecting to Networks with Mobile Computing.
1 CSCI N305 C Language Programming Welcome to CSCI N305! Compiling Your First Program Using Microsoft Visual Studio 2008.
11 INSTALLING WINDOWS XP Chapter 2. Chapter 2: Installing Windows XP2 INSTALLING WINDOWS XP  Prepare a computer for the installation of Microsoft Windows.
Operating Systems File systems
1 Preliminaries  Rest of the semester, focus on mobile computing  Unfortunately, running out of time, we may need a make up class  Feedback – less networking/more.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Rensselaer Polytechnic Institute CSC 432 – Operating Systems David Goldschmidt, Ph.D.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
CPSC 203 Introduction to Computers Lab 21, 22 by Jie (Jeff) Gao Location: ES650.
C81MPR Practical Methods File Handling for Practicals Jonathan Stirk & Danielle Ropar.
Installing software on personal computer
Client-Server Computing in Mobile Environments
CS 0008 Day 2 1. Today Hardware and Software How computers store data How a program works Operators, types, input Print function Running the debugger.
Operating System & Application Files BACS 371 Computer Forensics.
OS and Application Files BACS 371 Computer Forensics.
Test Review. What is the main advantage to using shadow copies?
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Introduction to computers. What is a personal computer? Capacity: Large hard disks combined with a large working memory (RAM) Speed: Fast. Normally measured.
Intro Test 3 Chapters 5, 6 & Excel Sample Questions Spring 2005.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 20 Notebooks, Tablet PCs, and PDAs.
CPSC 203 Introduction to Computers Lab 21, 22 By Jie Gao.
Feb 7, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
TERMS TO KNOW. Desktop This does not mean a computer desktop vs. a laptop. You probably keep a number of commonly used items on your desk at home such.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Overview of Windows and Microsoft Word. Operating System Performs 3 functions –Controls the hardware of the computer Screen, keyboard, disk drives, etc.
Rensselaer Polytechnic Institute CSCI-4210 – Operating Systems CSCI-6140 – Computer Operating Systems David Goldschmidt, Ph.D.
Chapter 2: Operating-System Structures. 2.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 2: Operating-System Structures Operating.
GUI Environment Training Feb 12, 2004 Jeremiah Curtis
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Replication and Consistency (3). Reference r Automated Hoarding for Mobile Computers by G. Kuenning and G. Popek.
Networking Relationships What is a computer network?
Computer Hardware and Software Yong Choi School of Business CSU, Bakersfield.
Operating Systems David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 432.
© 2010 Computer Science Faculty, Kabul University HTTP CONTINUED… 4 TH LECTURE 2, May, 2010 Baseer Ahmad Baheer.
COMPUTER CONCEPTS Unit A: Computer and Internet Basics 1.
Technology Vocabulary By: Rakeysha Patterson. Search Engine  A computer program that searches documents, especially on the World Wide Web, for a specified.
DROPBOX VS. GOOGLE DOCS WHICH ONE TO USE?. QUESTIONS TO ASK YOURSELF – SELF ASSESSMENT Do you have too many copies of the same files on multiple computers?
CPSC 203 Introduction to Computers T43, T46 & T68 TA: Jie (Jeff) Gao.
Your Digital Technology Briefcase My information…when and where I need it.
How to use WS_FTP A Step by Step Guide to File Transfer.
“Read Only Memory” a class of storage media used in computers and other electronic devices. This tells the computer how to load the operating system.
1 Terminology. 2 Requirements for Network Printing Print server Sufficient RAM to process documents Sufficient disk space on the print server.
Introduction TO Network Administration
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
1 Introduction to Shared Folders Shared folders provide network users access to files. Users connect to the shared folder over the network. Users must.
CITA 171 Section 1 DOS/Windows Introduction. DOS Disk operating system (DOS) –Term most often associated with MS-DOS –Single-tasking operating system.
Feb 22, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements Send today with people in your project group. People seem to be dropping off and I.
Operating Systems Salihu Ibrahim Dasuki (PhD) CSC102 INTRODUCTION TO COMPUTER SCIENCE.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Basic Computer Vocabulary #2 Ms. Pape-Media Design.
Parts of a computer Vocabulary & Labeling.
Command Line Basics.
Maintaining Windows Server 2008 File Services
Chapter 2: System Structures
Download dumps - Microsoft Real Exam Questions Dumps4download
CSE 451: Operating Systems Winter Module 22 Distributed File Systems
Distributed File Systems
Distributed File Systems
Distributed File Systems
CSE 451: Operating Systems Winter Module 22 Distributed File Systems
LO3 – Understand Business IT Systems
Distributed File Systems
Distributed File Systems
Presentation transcript:

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing2 Outline Intelligent file hoarding for mobile computers Carl Tait, Hui Lei, Swarup Acharya and Henry Chang Mobicom ‘95

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing3 Hoarding Prefetching and storing objects for access when the network is disconnected or weakly-connected E.g. Internet Explorer lets you browse web pages Offline. Avantgo lets you access web pages offline in PDAs. I download power point slides for this presentation into the laptop

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing4 Problem Local storage space is limited. How do I hoard all the data that I need so that I can continue to work, while I’m offline? –Suppose I have 80 GB worth of files in the connected machine. I have a 20 GB hard drive in the mobile computer, how can I copy files such that I can continue to work without disruption? –Suppose I have 80 GB hard drive in the mobile device, hoarding profile is not necessary.

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing5 Problem User input is necessary. –Users should say what they want to be hoarded for disconnected access. But, users do not know what files they really need. They can tell that they need Powerpoint. But they can’t say that they also need some.dll file that is needed to print the presentation onto a laser printer (say)

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing6 Approaches to create hoard profiles Do Nothing: –Run the application that you intend to use on the road. Normal caching mechanism would’ve stored the documents for later access –Problem is that, there are no “typical” runs. Every program run is different, just because it worked while connected does not mean that it will work while disconnected

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing7 User Provided Information –Coda uses this approach. The users specify the files that they want to be hoarded. –Most of the time, users do not even know what files they need. Problem of hidden files and critical files that are rarely used

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing8 Snap-shot spying: –System keeps track of all files access between some markers. You specify and messages to refine files. Semantic Distance: –Seer system looked at the semantic distance between files to predict related files

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing9 Transparent, analytical spying Automatically detect working sets for applications and data Provide generalized bookends to delimit periods of activity Present convenient bundles to the user using a GUI Let the users “load the briefcase”

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing10 Detection of working set Working set defines that set of files that are part of a program execution. This may include data files, shared libraries (DLLs), related applications Log file accesses to create program execution tree. Subsequent executions of program help refine this tree Problem is differentiating application vs user data, you want to learn the “application” from my executions of the application, not the files that I operated on

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing11 Differentiate application and data 1.File name extensions (.exe,.bat,.ini etc) 2.Directory inferencing (/usr/include/file.h is related to application, /home/surendar/data/foo.dat is related to data) 3.Timestamps – Files modified at the same time as application probably belong with application

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing12 Generalized bookends Measure all files and applications accessed during the time intervals Generalize data over multiple executions Presentation and Selection – GUI tools

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing13 Implementation issues Data orphan problem –Local program accesses remote data Program orphan problem –Remote program accessing only local data GUI tools to select files for hoarding

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing14 Discussion As disks become cheaper, smaller and larger, is hoarding needed? 1 GB IBM Microdrive

Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing15