Introduction to Pervasive Computing

Slides:



Advertisements
Similar presentations
1 From Grids to Service-Oriented Knowledge Utilities research challenges Thierry Priol.
Advertisements

Chapter 1:Introduction to the world of computers
Sharing Content and Experience in Smart Environments Johan Plomp, Juhani Heinila, Veikko Ikonen, Eija Kaasinen, Pasi Valkkynen 1.
1 The Ubiquitous Web Eunchae Yoon. School of Engineering, Eunchae Yoon 2 Contents What is Ubiquitous computing? What is Ubiquitous Web? Ubiquitous computing.
1 What Comes Next ? Tim Finin University of Maryland, Baltimore County February 17, 2004
Pervasive Computing 通訊所 鄭筱親. Outline  Introduction  Context Awareness  Recent Research  Future and Conclusion.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002)
Ubiquitous Computing The death of PC?. Ubiquitous Computing ubiquitous = Being or seeming to be everywhere at the same time; omnipresent. Mark Weiser,
Ubiquitous Computing Computers everywhere. Agenda Old future videos
Wireless Sensor Networks. The most profound technologies are those that disappear. They weaves themselves into the fabric of everyday life until they.
PhD course - Milan, March /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science.
Kjeld Svidt, Aalborg University Intelligent Buildings - a short overview Kjeld Svidt December 2003.
Master Course /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
AgentOS: The Agent-based Distributed Operating System for Mobile Networks Salimol Thomas Department of Computer Science Illinois Institute of Technology,
Mobile and Pervasive Computing Overview Material taken from: “Fundamental Challenges in Mobile Computing” and “Pervasive Computing: Vision and Challenges”
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
Undergraduate Poster Presentation Match 31, 2015 Department of CSE, BUET, Dhaka, Bangladesh Wireless Sensor Network Integretion With Cloud Computing H.M.A.
Challenges in Ubiquitous Computing and Networking Management Jong T. Park Kyungpook National University Korea APNOMS 2003 DEP, Fukuoka,
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
Introduction to the Atlas Platform Mobile & Pervasive Computing Laboratory Department of Computer and Information Sciences and Engineering University of.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Internet de las Cosas The Internet of Things (IoT) Internet der Dinge Internet des Objects.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
ST01 - Introduction 1 Introduction Lecturer: Smilen Dimitrov Sensors Technology – MED4.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
203A Intro to Ubicomp Prof. Cristina Lopes
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
Looking ahead in Pervasive Computing: Challenges, Opportunities in the era of Cyber Physical Convergence Authors : Marco Conti, Sajal K. Das, Chatschik.
Distributed Systems: Concepts and Design Chapter 1 Pages
1 Chapter 7 Designing for the Human Experience in Smart Environments.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
C5- IT Infrastructure and Emerging Technologies. Input – Process - Output 2 A computer  Takes data as input  Processes it  Outputs information CPU.
Comp 15 - Usability & Human Factors Unit 9 - Ubiquitous Computing in Healthcare This material was developed by Columbia University, funded by the Department.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
$20 billion business 230 million printers sold  170 million inkjet  60 million laserjet #1 in ink, laser, scanners, designjet, print servers Consistent.
Challenges in UbiComp Take 2 Sushmita Subramanian.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Trends in Embedded Computing The Ubiquitous Computing through Sensor Swarms.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Institute for Security Technology Studies Dartmouth College Digital Living 2010: Sensors, Privacy, and Trust David Kotz September 2005.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Computer Architecture and Embedded Systems Paul Havinga University of Twente.
Mobile Computing and Wireless Networking
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
The Gator Tech Smart House: A Programmable Pervasive Space Real/Research Application In Pervasive Computing Lee Hae Dong, ICU CSE.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Pervasive Computing Parts of the slides are extracted from those of Profs. Mark Weiser, Deborah Estrin, Akbar Sayeed, Jack Stankovic, Mani Srivastava,
Mobile Computing and Wireless Communication Pisa 26 November 2002 Roberto Baldoni University of Roma “La Sapienza”
Internet of Things in Industries
Chapter 8 – Cloud Computing
1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel:
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
LECTURER: NGUY Ễ N ANH TU Ấ N (TUAN NGUYEN) TUTORS: TÔN TH Ị KIM LOAN TR Ầ N H Ồ NG NGHI {TUANNA, LOANTTK, Developing Applications.
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
Ubiquitous and Pervasive Computing. MY DEFINTION OF PERVASIVE COMPUTING Pervasive computing describes the trend that connected computational devices become.
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
Internet of Things – Getting Started
Mobile Networks & Computing Mobile computing : Some Definitions 1 NYANZI A CCNP,CCNAI,CCNA, A+, MIT-SANA, MBA_IT.
COMPSCI 110 Operating Systems
A brief introduction to IoT gateway
Ubiquitous Computing and Augmented Realities
Networking Applications
Broad Emerging Themes in CPS/IoT
Sensor Networks – Motes, Smart Spaces, and Beyond
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Introduction to Pervasive Computing By H. Momeni Computer Engineering Department Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Agenda History and Evolution Vision Pervasive Computing Features System View and Support Framework Applications Challenges Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing History and Evolution Remote communication Fault tolerance High Availability Remote information access Distributed security Distributed Systems (mid-1970s) Mobile networking Mobile information access Adaptive applications Energy-aware systems Location sensitivity Mobile Computing (early 1990s) Smart spaces Invisibility Localized scalability Uneven conditioning Pervasive Computing (2000) Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Comparison Of 43 Iran University of Science and Technology December 2006

Pervasive Technologies Introduction to Pervasive Computing Pervasive Technologies Ubiquitous Computing (Mark Weiser, Xerox PARC 1990) Calm Computing (John Brown, Xerox PARC 1996) Tangible Computing (Ishii, 1997) Universal Computing (James Landay, Berkeley 1998) Invisible Computing (G. Barriello, UoWashington 1999) Context Based Computing (Berkeley/IBM 1999) Of 43 Iran University of Science and Technology December 2006

Pervasive Technologies cont’d Introduction to Pervasive Computing Pervasive Technologies cont’d Hidden Computing (Toshiba 1999) Pervasive Computing (Academia, IBM 1999, SAP 2000) Everyday Computing (Georgia Tech, 2000) Sentient Computing (AT&T, 2002) Autonomous Computing (IBM, 2002) Amorphous Computing (DARPA, 2002) Spray Computing (Zambonelli, 2003) Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Vision “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it”. [1991] Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Computer Evolution Weiser’s idea was a vision too far ahead of its time The hardware technology did not exit After a decade hardware progress, PerCom are viable Of 43 Iran University of Science and Technology December 2006

The State of the Art in Pervasive Computing Introduction to Pervasive Computing The State of the Art in Pervasive Computing The term “Pervasive Computing” emerged from research at IBM during 1996 – 97 vision: computing services available anytime, anywhere and on demand Mark Weiser at Xerox PARC was leading research labeled as “Ubiquitous Computing in 1991 Of 43 Iran University of Science and Technology December 2006

The State of the Art… cont’d Introduction to Pervasive Computing The State of the Art… cont’d UbiComp’s initial focus was not on making infrastructure available everywhere UbiComp’ initial focus was on user centric PerCom’s initiative to exploit the existing wide scale deployment of computing technology UbiComp’s initiatives were to effectively make this complex mass of technology transparent to the human user’s Of 43 Iran University of Science and Technology December 2006

Research Areas in Pervasive Computing Introduction to Pervasive Computing Research Areas in Pervasive Computing mobile computing wireless networking embedded computing human computer interaction (HCI) Context awareness with sensor technology other terms tend to be an overlap of these five themes Wearable Computing=Mobile Computing+Embedded Computing+HCI Nomadic Computing=Mobile Computing+wireless networking Of 43 Iran University of Science and Technology December 2006

A Pervasive Computing Model Introduction to Pervasive Computing A Pervasive Computing Model five-layered model (from the perspective of the human) physical layer Perceptive layer Composed of sensor (input for physical layer) and actuator (output for physical layer) Analog/Digital conversion layer Converting between analog and digital signals Computational layer Communicational Layer Primary functions coordination of environments(Os, protocol) Secondary functions actual applications within environment Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Of 43 Iran University of Science and Technology December 2006

Pervasive computing Features Introduction to Pervasive Computing Pervasive computing Features A Device : portal into an application-data space Computing environment : an information-enhanced physical space Connected devices provide services without user’s interventions by using sensed data in physical space. Providing services for users anytime, anywhere by any devices Of 43 Iran University of Science and Technology December 2006

System view of pervasive computing Introduction to Pervasive Computing System view of pervasive computing Of 43 Iran University of Science and Technology December 2006

Pervasiveness Support Introduction to Pervasive Computing Pervasiveness Support Effective Use of smart spaces Invisibility Localized scalability Masking uneven conditioning Of 43 Iran University of Science and Technology December 2006

Effective use of Smart Spaces Introduction to Pervasive Computing Effective use of Smart Spaces Embedding computing infrastructure in building infra. Smart spaces brings together two world that have been disjoint until now The fusion of these worlds enables sensing and control one of world by the other Smart coffee cup Automatic meeting transcription Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Invisibility Weiser’s ideal: complete disappearance of technology minimal user distraction system meets user expectations continuously proactivity may sometimes be valuable Of 43 Iran University of Science and Technology December 2006

Localized Scalability Introduction to Pervasive Computing Localized Scalability With increase of complexity of smart spaces, number of interactions between user’s computer and environment will be increased. This has severe bandwidth, energy for a wireless mobile user Scalability is a critical problem in PerCom Traditional scalability has ignored physical distance (web server) Of 43 Iran University of Science and Technology December 2006

Masking Uneven Conditioning Introduction to Pervasive Computing Masking Uneven Conditioning There will persist huge differences in the smartness of different environments This large dynamic range of smartness can reduce invisibility of PerCom to users Solving problem Reduce the variability (to compensate space, dumb environment) Of 43 Iran University of Science and Technology December 2006

Pervasive Computing Framework Introduction to Pervasive Computing Pervasive Computing Framework Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Pervasive Devices Traditional input/output devices Keyboard, speaker, light-emitting diode Wireless mobile devices Pager, PDA, cell phone, palmtop, Laptop Smart devices Intelligent appliance, floor tiles with embedded sensor, biosensors Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Pervasive Networking IEEE 802.11 Bluetooth Internet Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Pervasive middleware Interface between the network kernel and the end-user applications running on pervasive devices keep users immersed in the pervasive computing space Consist mostly firmware and software bundles executing in client-server or Peer to peer Of 43 Iran University of Science and Technology December 2006

User interface and application Introduction to Pervasive Computing User interface and application User interface Web browser Micro browser Pervasive applications more environment-centric than either web-based or mobile computing applications Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Applications Introduction to Pervasive Computing Of 43 Iran University of Science and Technology December 2006

Daily Life Application Introduction to Pervasive Computing Daily Life Application Smart Home Of 43 Iran University of Science and Technology December 2006

Public Service Application Introduction to Pervasive Computing Public Service Application Healthcare: Embedded Sensor networking for patient monitoring Of 43 Iran University of Science and Technology December 2006

Transportation Application Introduction to Pervasive Computing Transportation Application Smart Cars Of 43 Iran University of Science and Technology December 2006

Environment Applications Introduction to Pervasive Computing Environment Applications Environmental Monitoring Of 43 Iran University of Science and Technology December 2006

National Defense Applications Introduction to Pervasive Computing National Defense Applications Surveillance Platform Of 43 Iran University of Science and Technology December 2006

Industrial Business Applications Introduction to Pervasive Computing Industrial Business Applications Supply Chain Management Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Challenges User intent Cyber Foraging Adaptability High Level Energy Management Context awareness Trust Privacy Security Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing User Intent PerCom system must track user intent for Proactivity Challenges: Can user intent be inferred? How is it handled in dynamic interactions? When and how is it updated? Will it hurt usability and performance unacceptably? Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Cyber Foraging The need to make mobile devices smaller, lighter and longer battery life, reduce computing capabilities Solution: Exploiting wired hardware infrastructure in a neighborhood that it play surrogate role The mobile computer ships the computation to the surrogate Challenges: Discover the presence of surrogate Load balancing Minimal delay Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Adaptability Significant mismatch between the supply and demand of a resource New user’s requirements Change Requirements Challenge Reduce human intervention Configuration Run time Reconfiguration Of 43 Iran University of Science and Technology December 2006

High Level Energy Management Introduction to Pervasive Computing High Level Energy Management Proactivity and self-tuning increase the energy demand of software on mobile devices The attempts to make such devices lighter and smaller, reduce the battery capacity The higher level of must be involved to save energy. Energy aware memory management Energy aware adaptation Challenges Impact of invisibility Exploit of knowledge of user intent Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Context Awareness “Context is any evidence that can be used to support arguments for the conditions of the situation of any subject or target, which influences their interactive behavior” PerCom to be minimally intrusive, has to be context aware. User, system and environment context Challenges: How does system obtain these information? Where is context stored? How frequently does context have to be consulted? Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Trust Enable systems to exchange information even without the intervention of administrators to authorize these interactions How to grant users access to resources and information based on their trustworthiness rather than the application of conventional techniques that map authorizations to access rights. Challenges: Unsavory uses (targeted spam, blackmail) password-based protocols or biometric authentication? Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Privacy Huge amounts of information will be shared and exchanged in pervasive computing environments With context-based services this question arise: Do you want this information shared? How can you trust the technology? What does the environment itself do? How can you secure the access to private information? Of 43 Iran University of Science and Technology December 2006

Introduction to Pervasive Computing Security Security mechanisms for pervasive environments must be scalable to the small resource able to deal with devices and environments of unknown origin adaptive to the dynamics of mobile computing Of 43 Iran University of Science and Technology December 2006

Context, Trust, Privacy and Security Introduction to Pervasive Computing Context, Trust, Privacy and Security Of 43 Iran University of Science and Technology December 2006