Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Pervasive Computing

Similar presentations


Presentation on theme: "Introduction to Pervasive Computing"— Presentation transcript:

1 Introduction to Pervasive Computing
By H. Momeni Computer Engineering Department Iran University of Science and Technology December 2006

2 Introduction to Pervasive Computing
Agenda History and Evolution Vision Pervasive Computing Features System View and Support Framework Applications Challenges Of 43 Iran University of Science and Technology December 2006

3 Introduction to Pervasive Computing
History and Evolution Remote communication Fault tolerance High Availability Remote information access Distributed security Distributed Systems (mid-1970s) Mobile networking Mobile information access Adaptive applications Energy-aware systems Location sensitivity Mobile Computing (early 1990s) Smart spaces Invisibility Localized scalability Uneven conditioning Pervasive Computing (2000) Of 43 Iran University of Science and Technology December 2006

4 Introduction to Pervasive Computing
Comparison Of 43 Iran University of Science and Technology December 2006

5 Pervasive Technologies
Introduction to Pervasive Computing Pervasive Technologies Ubiquitous Computing (Mark Weiser, Xerox PARC 1990) Calm Computing (John Brown, Xerox PARC 1996) Tangible Computing (Ishii, 1997) Universal Computing (James Landay, Berkeley 1998) Invisible Computing (G. Barriello, UoWashington 1999) Context Based Computing (Berkeley/IBM 1999) Of 43 Iran University of Science and Technology December 2006

6 Pervasive Technologies cont’d
Introduction to Pervasive Computing Pervasive Technologies cont’d Hidden Computing (Toshiba 1999) Pervasive Computing (Academia, IBM 1999, SAP 2000) Everyday Computing (Georgia Tech, 2000) Sentient Computing (AT&T, 2002) Autonomous Computing (IBM, 2002) Amorphous Computing (DARPA, 2002) Spray Computing (Zambonelli, 2003) Of 43 Iran University of Science and Technology December 2006

7 Introduction to Pervasive Computing
Vision “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it”. [1991] Of 43 Iran University of Science and Technology December 2006

8 Introduction to Pervasive Computing
Computer Evolution Weiser’s idea was a vision too far ahead of its time The hardware technology did not exit After a decade hardware progress, PerCom are viable Of 43 Iran University of Science and Technology December 2006

9 The State of the Art in Pervasive Computing
Introduction to Pervasive Computing The State of the Art in Pervasive Computing The term “Pervasive Computing” emerged from research at IBM during 1996 – 97 vision: computing services available anytime, anywhere and on demand Mark Weiser at Xerox PARC was leading research labeled as “Ubiquitous Computing in 1991 Of 43 Iran University of Science and Technology December 2006

10 The State of the Art… cont’d
Introduction to Pervasive Computing The State of the Art… cont’d UbiComp’s initial focus was not on making infrastructure available everywhere UbiComp’ initial focus was on user centric PerCom’s initiative to exploit the existing wide scale deployment of computing technology UbiComp’s initiatives were to effectively make this complex mass of technology transparent to the human user’s Of 43 Iran University of Science and Technology December 2006

11 Research Areas in Pervasive Computing
Introduction to Pervasive Computing Research Areas in Pervasive Computing mobile computing wireless networking embedded computing human computer interaction (HCI) Context awareness with sensor technology other terms tend to be an overlap of these five themes Wearable Computing=Mobile Computing+Embedded Computing+HCI Nomadic Computing=Mobile Computing+wireless networking Of 43 Iran University of Science and Technology December 2006

12

13 A Pervasive Computing Model
Introduction to Pervasive Computing A Pervasive Computing Model five-layered model (from the perspective of the human) physical layer Perceptive layer Composed of sensor (input for physical layer) and actuator (output for physical layer) Analog/Digital conversion layer Converting between analog and digital signals Computational layer Communicational Layer Primary functions coordination of environments(Os, protocol) Secondary functions actual applications within environment Of 43 Iran University of Science and Technology December 2006

14 Introduction to Pervasive Computing
Of 43 Iran University of Science and Technology December 2006

15 Pervasive computing Features
Introduction to Pervasive Computing Pervasive computing Features A Device : portal into an application-data space Computing environment : an information-enhanced physical space Connected devices provide services without user’s interventions by using sensed data in physical space. Providing services for users anytime, anywhere by any devices Of 43 Iran University of Science and Technology December 2006

16 System view of pervasive computing
Introduction to Pervasive Computing System view of pervasive computing Of 43 Iran University of Science and Technology December 2006

17 Pervasiveness Support
Introduction to Pervasive Computing Pervasiveness Support Effective Use of smart spaces Invisibility Localized scalability Masking uneven conditioning Of 43 Iran University of Science and Technology December 2006

18 Effective use of Smart Spaces
Introduction to Pervasive Computing Effective use of Smart Spaces Embedding computing infrastructure in building infra. Smart spaces brings together two world that have been disjoint until now The fusion of these worlds enables sensing and control one of world by the other Smart coffee cup Automatic meeting transcription Of 43 Iran University of Science and Technology December 2006

19 Introduction to Pervasive Computing
Invisibility Weiser’s ideal: complete disappearance of technology minimal user distraction system meets user expectations continuously proactivity may sometimes be valuable Of 43 Iran University of Science and Technology December 2006

20 Localized Scalability
Introduction to Pervasive Computing Localized Scalability With increase of complexity of smart spaces, number of interactions between user’s computer and environment will be increased. This has severe bandwidth, energy for a wireless mobile user Scalability is a critical problem in PerCom Traditional scalability has ignored physical distance (web server) Of 43 Iran University of Science and Technology December 2006

21 Masking Uneven Conditioning
Introduction to Pervasive Computing Masking Uneven Conditioning There will persist huge differences in the smartness of different environments This large dynamic range of smartness can reduce invisibility of PerCom to users Solving problem Reduce the variability (to compensate space, dumb environment) Of 43 Iran University of Science and Technology December 2006

22 Pervasive Computing Framework
Introduction to Pervasive Computing Pervasive Computing Framework Of 43 Iran University of Science and Technology December 2006

23 Introduction to Pervasive Computing
Pervasive Devices Traditional input/output devices Keyboard, speaker, light-emitting diode Wireless mobile devices Pager, PDA, cell phone, palmtop, Laptop Smart devices Intelligent appliance, floor tiles with embedded sensor, biosensors Of 43 Iran University of Science and Technology December 2006

24 Introduction to Pervasive Computing
Pervasive Networking IEEE Bluetooth Internet Of 43 Iran University of Science and Technology December 2006

25 Introduction to Pervasive Computing
Pervasive middleware Interface between the network kernel and the end-user applications running on pervasive devices keep users immersed in the pervasive computing space Consist mostly firmware and software bundles executing in client-server or Peer to peer Of 43 Iran University of Science and Technology December 2006

26 User interface and application
Introduction to Pervasive Computing User interface and application User interface Web browser Micro browser Pervasive applications more environment-centric than either web-based or mobile computing applications Of 43 Iran University of Science and Technology December 2006

27 Introduction to Pervasive Computing
Applications Introduction to Pervasive Computing Of 43 Iran University of Science and Technology December 2006

28 Daily Life Application
Introduction to Pervasive Computing Daily Life Application Smart Home Of 43 Iran University of Science and Technology December 2006

29 Public Service Application
Introduction to Pervasive Computing Public Service Application Healthcare: Embedded Sensor networking for patient monitoring Of 43 Iran University of Science and Technology December 2006

30 Transportation Application
Introduction to Pervasive Computing Transportation Application Smart Cars Of 43 Iran University of Science and Technology December 2006

31 Environment Applications
Introduction to Pervasive Computing Environment Applications Environmental Monitoring Of 43 Iran University of Science and Technology December 2006

32 National Defense Applications
Introduction to Pervasive Computing National Defense Applications Surveillance Platform Of 43 Iran University of Science and Technology December 2006

33 Industrial Business Applications
Introduction to Pervasive Computing Industrial Business Applications Supply Chain Management Of 43 Iran University of Science and Technology December 2006

34 Introduction to Pervasive Computing
Challenges User intent Cyber Foraging Adaptability High Level Energy Management Context awareness Trust Privacy Security Of 43 Iran University of Science and Technology December 2006

35 Introduction to Pervasive Computing
User Intent PerCom system must track user intent for Proactivity Challenges: Can user intent be inferred? How is it handled in dynamic interactions? When and how is it updated? Will it hurt usability and performance unacceptably? Of 43 Iran University of Science and Technology December 2006

36 Introduction to Pervasive Computing
Cyber Foraging The need to make mobile devices smaller, lighter and longer battery life, reduce computing capabilities Solution: Exploiting wired hardware infrastructure in a neighborhood that it play surrogate role The mobile computer ships the computation to the surrogate Challenges: Discover the presence of surrogate Load balancing Minimal delay Of 43 Iran University of Science and Technology December 2006

37 Introduction to Pervasive Computing
Adaptability Significant mismatch between the supply and demand of a resource New user’s requirements Change Requirements Challenge Reduce human intervention Configuration Run time Reconfiguration Of 43 Iran University of Science and Technology December 2006

38 High Level Energy Management
Introduction to Pervasive Computing High Level Energy Management Proactivity and self-tuning increase the energy demand of software on mobile devices The attempts to make such devices lighter and smaller, reduce the battery capacity The higher level of must be involved to save energy. Energy aware memory management Energy aware adaptation Challenges Impact of invisibility Exploit of knowledge of user intent Of 43 Iran University of Science and Technology December 2006

39 Introduction to Pervasive Computing
Context Awareness “Context is any evidence that can be used to support arguments for the conditions of the situation of any subject or target, which influences their interactive behavior” PerCom to be minimally intrusive, has to be context aware. User, system and environment context Challenges: How does system obtain these information? Where is context stored? How frequently does context have to be consulted? Of 43 Iran University of Science and Technology December 2006

40 Introduction to Pervasive Computing
Trust Enable systems to exchange information even without the intervention of administrators to authorize these interactions How to grant users access to resources and information based on their trustworthiness rather than the application of conventional techniques that map authorizations to access rights. Challenges: Unsavory uses (targeted spam, blackmail) password-based protocols or biometric authentication? Of 43 Iran University of Science and Technology December 2006

41 Introduction to Pervasive Computing
Privacy Huge amounts of information will be shared and exchanged in pervasive computing environments With context-based services this question arise: Do you want this information shared? How can you trust the technology? What does the environment itself do? How can you secure the access to private information? Of 43 Iran University of Science and Technology December 2006

42 Introduction to Pervasive Computing
Security Security mechanisms for pervasive environments must be scalable to the small resource able to deal with devices and environments of unknown origin adaptive to the dynamics of mobile computing Of 43 Iran University of Science and Technology December 2006

43 Context, Trust, Privacy and Security
Introduction to Pervasive Computing Context, Trust, Privacy and Security Of 43 Iran University of Science and Technology December 2006


Download ppt "Introduction to Pervasive Computing"

Similar presentations


Ads by Google