Virtual Machine Abstractions for Nomadic Pervasive Computing (NPC) Environment Presented by: Hen-I Yang, Nov. 29, 2006.

Slides:



Advertisements
Similar presentations
Sharing Content and Experience in Smart Environments Johan Plomp, Juhani Heinila, Veikko Ikonen, Eija Kaasinen, Pasi Valkkynen 1.
Advertisements

A Pervasive Reminder System for Smart Homes Sylvain GIROUX and Simon GUERTIN Département d’informatique, Université de Sherbrooke 2500 boul. Université,
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
Collaborative Sensing over Smart Sensors Vassileios Tsetsos, Nikolaos Silvestros & Stathes Hadjiefthymiades Pervasive Computing Research Group Dept of.
Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Keith Wiles DPACC vNF Overview and Proposed methods Keith Wiles – v0.5.
Design and Implementation of a Middleware for Sentient Spaces Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyue Ji, Daniel Massaguer Sharad Mehrotra,
GridFlow: Workflow Management for Grid Computing Kavita Shinde.
Team 4 Pervasive Computing __________________________________ Abe El-Dewak Sheb Findik Kenneth Brancik Tom Lombardi.
590ES1 Design of Plant Care System Mike Swift Steve Swanson Stefan Bjarni Sigurdsson.
Ambient Computational Environments Sprint Research Symposium March 8-9, 2000 Professor Gary J. Minden The University of Kansas Electrical Engineering and.
Mobile and Ubiquitous Computing. Overview Attributes Discussion.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
SNAL Sensor Networks Application Language Alvise Bonivento Mentor: Prof. Sangiovanni-Vincentelli 290N project, Fall 04.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
5205 – IT Service Delivery and Support
Building an Application Server for Home Network based on Android Platform Yi-hsien Liao Supervised by : Dr. Chao-huang Wei Department of Electrical Engineering.
Use of Multimedia in Engineering. Mechatronics engineering is based on the combination from three basic engineering field that is mechaninal, electronics.
Virtualization: An Overview Brendan Lynch. Forms of virtualization In all cases virtualization is taking a physical component and simulating the interface.
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
Introduction to Cloud Computing
1 Chapter 16 Assistive Environments for Individuals with Special Needs.
Quality of Protection (QoP) An approach that separates the development of security services from the application development partitions security services.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Building Mobile Augmented Reality Services in Pervasive Computing Environment Hiroaki Kimura Eiji Tokunaga
Master Thesis Defense Jan Fiedler 04/17/98
CPET 565 Mobile Computing Systems Context-Aware Computing (2) Lecture 11 Hongli Luo Indiana University-Purdue University Fort Wayne.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
USER DRIVEN ACCESS CONTROL: RETHINKING PERMISSION GRANTING IN MODERN OPERATING SYSTEM Presentation by: Manik Challana Presented at : IEEE Symposium on.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Performance Evaluation of Image Conversion Module Based on MapReduce for Transcoding and Transmoding in SMCCSE Speaker : 吳靖緯 MA0G IEEE.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Event Management System. The system provides a solution during routine, emergency situations and unusual events It can provide the latest information.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Ulrich Norbisrath, Ibrahim Armaç, Daniel Retkowitz, Priit Salumaa RWTH Aachen University Modeling eHome Systems 4th International Workshop on.
OSes: 3. OS Structs 1 Operating Systems v Objectives –summarise OSes from several perspectives Certificate Program in Software Development CSE-TC and CSIM,
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Context in Ubiquitous Computing. Context sensing.
Virtual Memory Lecture for CPSC 5155 Edward Bosworth, Ph.D. Computer Science Department Columbus State University.
The Gator Tech Smart House: A Programmable Pervasive Space Real/Research Application In Pervasive Computing Lee Hae Dong, ICU CSE.
Chapter 13 – I/O Systems (Pgs ). Devices  Two conflicting properties A. Growing uniformity in interfaces (both h/w and s/w): e.g., USB, TWAIN.
Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
SelfCon Foil no 1 Variability in Self-Adaptive Systems.
Smart Home Technologies
What are Smart Sensors/Actuators ? Sensor/Actuator either senses environment or activates motors, solenoids. –Motion detectors and light level sensors.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Chapter 2 Introduction to OS Chien-Chung Shen CIS/UD
Gaia An Infrastructure for Active Spaces Prof. Klara Nahrstedt Prof. David Kriegman Prof. Dennis Mickunas
Third International Workshop on Networked Appliance 2001 SONA: Applying Mobile Agent to Networked Appliance Control S.Aoki, S.Makino, T.Okoshi J.Nakazawa.
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
Mobile Networks & Computing Mobile computing : Some Definitions 1 NYANZI A CCNP,CCNAI,CCNA, A+, MIT-SANA, MBA_IT.
1 Interaction in Pervasive Computing Settings using Bluetooth-enabled Active tags and passive RFID Technology tegether with Mobile Phones PerCom 2003 F.
Group 8 Virtualization of the Cloud
Chapter 1: Intro (excerpt)
Operating Systems.
Operating Systems Structure
Xen and the Art of Virtualization
Mobile Computing Lecture Materials By Bintang Eka Putera.
Presentation transcript:

Virtual Machine Abstractions for Nomadic Pervasive Computing (NPC) Environment Presented by: Hen-I Yang, Nov. 29, 2006

Outline Nomadic Pervasive Computing (NPC) Environment Problem Definition and Analysis Presenting Various Abstractions Comparison Conclusion

Pervasive Computing Environment Integrates computation into the environment, rather than having computers which are distinct objects. Embedding computation into the environment and everyday objects to enable people to interact with information-processing devices more naturally and casually than they currently do, and in whatever location or circumstance they find themselves. -- Wikipedia

Elements in a Pervasive Computing Environment Sensor Actuator Service Applications User Space System Support

Nomadic Pervasive Computing Environment Smart spaces, where ubiquitous computing services are available will become much more widespread in the near future, but will not be joined seamlessly or continuously. Nomadic Pervasive Computing encompass a federation of isolated smart spaces and the mechanisms that allow users to be continuously served as they move around.

Problems in supporting NPC Binding issues –Separating goals and means. –Deciding where binding occurs –Interoperability and compatibility –Ownership of space and authentication of entities Quality of Service (QoS) –Conflict resolution: priority and scheduling –Criteria of QoS –Service level agreement –Mobility Scalability –Service delivery –Scalability of data and processes Security and Privacy -- UbiSys 06

Goal of this Project Find suitable virtual computer abstractions that can solve the following issues in NPC: Binding issues –Separating goals and means. –Deciding where binding occurs –Interoperability and compatibility –Ownership of space and authentication of entities Quality of Service (QoS) –Conflict resolution: priority and scheduling –Criteria of QoS –Service level agreement –Mobility Scalability –Service delivery –Scalability of data and processes Security and Privacy

Scenarios Medicine Reminder Climate Control Follow-me Display

Abstraction I: System (Space) Transcoder and I/O binding Authentication Migrate VM Abstract Device Driver VMM O/S Hardware VMM O/S Hardware Transcoder and I/O binding Authentication Transcoder and I/O binding Authentication

VM Scenario using Abstraction I Medicine Reminder Timer Service Timing Device Context-aware Transcoder Svc Mobile Audio Device Stationary Audio Device Stationary Video Device Location Service Follow-me Display Svc Personal Tag Device Climate Controller Temp Sensing Device Hum. Actuating Device Abstract Device Driver Temp Actuating Device Clock Cell Phone Speaker Desktop Monitor Kitchen Small TV HDTVHeaterA/CThermometer Transcoder and I/O binder Ultrasonic Tag User Preference

Abstraction II: Service VMM O/S Hardware VM Service 1 VM Service 2 VM Service 3 VM Service 4 VM Service 5 Secured Shared Buffer Data Insertion Data Reading VMM O/S Hardware Secured Shared Buffer Abstract Device Driver Transcoder and I/O binding Transcoder and I/O binding Migrate VM Service 3’ VM Service 4’ Migrate

Scenario using Abstraction II Medicine Reminder Timer Service Timing Device Context-aware Transcoder Svc Mobile Audio Device Stationary Audio Device Stationary Video Device Location Service Follow-me Display Svc Personal Tag Device Climate Controller Temp Sensing Device Hum. Actuating Device Abstract Device Driver Clock Cell Phone Speaker Desktop Monitor Kitchen Small TV HDTVHeaterA/CThermometer Transcoder and I/O binder Ultrasonic Tag User Preference Do not Migrate Temp Actuating Device

Abstraction III: User VMM O/S Hardware VM/User User Preference Service Inflator Necessary Devices Inflated Service Logic Service Implement. Discovery Service Transcoder and I/O binder VMM O/S Hardware Discovery Service Transcoder and I/O binder Migrate VM/User User Preference Service Inflator

VM/User User Preference Service Inflator Required Device Service Logic VM/User User Preference Service Inflator Scenario using Abstraction III … …. … Service Inflator Required devices: Temperature actuator (a) Temperature sensor (s) Service Logic: while (TRUE) Retrieve reading from s if s > 75 send lower to a else if s < 70 send higher to a end if end while VM/User User Preference Service Inflator Required Device Service Logic Service Inflator (Generic Program Engine) Discovery Service Executables VM/User User Preference Service Inflator Required Device Service Logic Executables query + bind

Comparison Approach I: Space Approach II: Service Approach III: User Type of VM SystemProcessSystem Primary Mechanism Authenticator, Transcoder and I/O rebinder Everything in I + Secured Shared Buffer and Dependency Analyzer Service inflator and discovery service Suitable Scenario Relocation Summer House Frequent migrator with critical services Simple best-effort personal preference maintenance Challenges Clash of space (e.g. public space) Service conflict/redundancy detection More complicated service logic Migration Cost Very highhighlow Advantage Easy migrationLighter weight, User involved service hoarding Personal crash isolated, Private and secure, ultra light weight

Conclusion Virtual Machine provides many desirable properties that are suitable for NPC environment Difficulties in communications as a result of isolation maybe costly in highly dependent NPC environments Different abstractions provide various benefits depending on the applications and the characteristics of the space Implementation and actual deployment is necessary to verify the design using these abstractions and the benefits