PERVASIVE COMPUTING SPCT- F2012 MOBILE COMPUTING
|
|
- Rolf Stone
- 6 years ago
- Views:
Transcription
1 PERVASIVE COMPUTING SPCT- F2012 MOBILE COMPUTING Jakob E. Bardram
2 Jakob E. Bardram 2
3 Mobile CompuGng intro Today s Agenda Chapter 16 Mobile and Ubiquitous Compu:ng, pp of Distributed Systems: Concepts and Design. G. Coulouris, J. Dollimore, T. Kindberg. 5 th edi:on, vola:lity & vola:le systems associa:on and interopera:on (sensing and context awareness) security adapta:on Jakob E. Bardram 3
4 Job Announcement We re looking for a student programmer in the PIT lab Working with Android programming PHP Deployment at the Rigshopitalet hence Danish speaking The MONARCA project mobile phone applica:on for bipolar disorder Jakob E. Bardram 4
5 Jakob E. Bardram 5
6 Mobile compugng in relagon to distr. systems and pervasive compugng (Satyanarayanan, 2001) Jakob E. Bardram 6
7 Different names... handheld compugng the device fits in the user's hand examples: mobile phones, PDAs, cameras mobile compugng users carry computers with them wireless connec:vity (Wifi, Bluetooth, GPRS, etc) example: laptops, smart phones, PDAs ubiquitous/pervasive compugng computers everywhere "one person, many computers "weave themselves into the fabric of life example: intelligent whiteboards Jakob E. Bardram 7
8 ... and more related areas wearable compugng user wears device on the body, integrated in clothes, watches, etc typically operated without user manipula:on example: user iden:fying badge, body sensors Jakob E. Bardram 8
9 VolaGle systems Jakob E. Bardram 9
10 volaglity & volagle systems all previously mengoned compugng forms have one thing in common: changes are common rather than excepgonal. note: volatility Examples of is volagle not a defining properges: parameter of mobile and ubiquitous computing systems. There are other systems out there that are also highly volatile, e.g. peer-to-peer file sharing applications connec:vity set of users hardware sobware excepgons devices and communica:on links fail communica:on characteris:cs change associa:ons are created and destroyed Jakob E. Bardram 10
11 Smart Spaces a smart space is any physical place with embedded services example: mee:ng room with intelligent whiteboard ubiquitous compugng happens within smart (physical) spaces mobile compugng happens both in- between and within "within" example 1: Magic Touch office environment (p271 in course book) "within" example 2: easyadl cogni:ve prosthesis Jakob E. Bardram 11
12 Example RecGcularSpaces JE Bardram, S Gueddana, S Houben, S Nielsen. ReticularSpaces: Activity- Based Computing Support for Physically Distributed and Collaborative Smart Spaces. In Proceeding of CHI 2012, ACM Press, Jakob E. Bardram 12
13 Q&A What did you just see in terms of...?... mobility... connec:vity... vola:lity Jakob E. Bardram 13
14 physical mobility Mobility... devices visit and leave the space (carried by human agents or by robots) logical mobility a sobware component might move in or out of a space, or of a device oben caused by physical mobility devices appears and disappears (and you really don t know why) "degree of volaglity = rate of change" Jakob E. Bardram 14
15 the typical mobile device (today) mobile devices are small with the following characterisgcs: limited energy bafery- powered devices balance performance, connec:vity, storage, bafery life resource constraints limited resources (processor speed, storage capacity, network bandwidth) adapt and design algorithms for limited resources use infrastructure to augment resources sensors and actuators needed to enable integra:on with the physical world sensors measures physical parameters actuators affect physical parameters Jakob E. Bardram 15
16 volagle connecgvity wireless connecgvity: WiFi, Bluetooth, GPRS, 3G, 4G, infrared,... disconnecgon connec:vity is not con:nuous, e.g. devices pass in and out of range variable bandwidth and latency bandwidth changes when users move about variable rougng communica:on without stable infrastructure ("ad- hoc") Jakob E. Bardram 16
17 spontaneous interoperagon in volagle systems, components change associagons oden associagon: logical relagonship between communicagng components. Examples: mobile device associated with local printer laptop client associated with an server (associa:on independent of connec:vity: client and server associated even if disconnected) in a smart space, associa:ons change because mobile components take the opportunity to interact with local components. associa:on spontaneity is oben driven by proximity in physical space. interoperagon: concrete interacgons during associagon. Examples: the mobile device sends data to be printed to the printer the laptop client receives the latest s from the server Jakob E. Bardram 17
18 lowered trust and privacy security in distributed systems relies on trusted hardware and sodware components trust: in mobile & ubiquitous systems, trust is problemagc because of the spontaneous interoperagon: components have never seen each other before components belong to different individuals/organiza:ons trusted third- party resource might not exist privacy: human agents might not like to be silently tracked by sensors in smart spaces other people might be able to directly or indirectly find out what you are doing, when, and where Jakob E. Bardram 18
19 associagon appearing devices need to associate with services and devices in smart spaces step 1: get an address on the network (the network bootstrapping problem) example solu:ons: DHCP (with infrastructure), ZeroConf (without infrastructure), UPnP (generalised plug- and- play) step 2: associate with available and relevant services in the smart space Jakob E. Bardram 19
20 Case Study Service Creates an object that implements the service Register the service object with lookup service(s) Keep it alive and running Lookup and Discovery Mul:cast request protocol Unicast discovery protocol Mul:cast announcement protocol Jakob E. Bardram 20
21 Step I Service RegistraGon Jakob E. Bardram 21
22 Step II Service Lookup Jakob E. Bardram 22
23 Step III Service Usage Jakob E. Bardram 23
24 JINI features... Centralized uses a lookup service (LUS) requires IP networking (DNS, DHCP, (zeroconf)) Object- oriented requires standardized (Java) interfaces needs to be shared / dynamically loaded i.e. needs compile :me considera:ons Java- based requires JVM, dynamical code loading, RMI Uses RPC using RMI implies non vola:le networking Jakob E. Bardram 24
25 associagon appearing devices need to associate with services and devices in smart spaces step 1: get an address on the network (the network bootstrapping problem) example solu:ons: DHCP (with infrastructure), ZeroConf (without infrastructure), UPnP (generalised plug- and- play) step 2: associate with available and relevant services in the smart space Jakob E. Bardram 25
26 associagon appearing devices need to associate with services and devices in smart spaces step 1: get an address on the network (the network bootstrapping problem) example solu:ons: DHCP (with infrastructure), ZeroConf (without infrastructure), UPnP (generalised plug- and- play) step 2: associate with available and relevant services in the smart space the scale problem: if available services components are many (e.g. > 1000) how can the device quickly choose with which component(s) to associate itself? Example solu:on: discovery services (allows the newcomer to ask someone who knows what is indeed present in the space) Jakob E. Bardram 26
27 associagon appearing devices need to associate with services and devices in smart spaces step 1: get an address on the network (the network bootstrapping problem) example solu:ons: DHCP (with infrastructure), ZeroConf (without infrastructure), UPnP (generalised plug- and- play) step 2: associate with available and relevant services in the smart space the scale problem: if available services components are many (e.g. > 1000) how can the device quickly choose with which component(s) to associate itself? Example solu:on: discovery services (allows the newcomer to ask someone who knows what is indeed present in the space) the scope problem: limit to devices within the smart space (and all of them), not, not outside it. Example solu:on: to adhere to the "boundary principle" which aligns logical topology to spa:al structures that make sense to humans example of a problema:c situa:on: find a hotel printer within room (not next door room) Jakob E. Bardram 27
28 associagon appearing devices need to associate with services and devices in smart spaces step 1: get an address on the network (the network bootstrapping problem) example solu:ons: DHCP (with infrastructure), ZeroConf (without infrastructure), UPnP (generalised plug- and- play) step 2: associate with available and relevant services in the smart space the scale problem: if available services components are many (e.g. > 1000) how can the device quickly choose with which component(s) to associate itself? Example solu:on: discovery services (allows the newcomer to ask someone who knows what is indeed if this cannot present be in done the space) automatically, the device/system the scope needs problem: to involve limit to devices the human within the smart space (and all of them), not, not agent, e.g outside rely on it. Example "physical solu:on: association" to adher to the "boundary principle" which aligns logical topology to spa:al structures that make sense to humans example of a problema:c situa:on: find a hotel printer within room (not next door room) Jakob E. Bardram 28
29 physical associagon examples: manual text input: let the human agent input in what room she/he is in. the room number can be linked directly to a specific printer on the network "physically constrained channel": e.g., digital id of room embedded in the music in the room (the digital id is thus only available within the room itself) (no human input needed) symbol capture: let the human use a mobile device to photograph a visual tag ("glyph") fifed somewhere in the space or on the printer itself to obtain the unique network iden:ty of the room or printer which is then looked up using a directory service direct associa:on: encode the network id of the device directly in the symbol (no directory service needed) read visually or through short- range radio (e.g. NFC, RFID) temporal/physical correla:on (e.g. press bufons/shake devices at the same :me) Jakob E. Bardram 29
30 interoperagon "a goal for ubiquitous and mobile compu:ng is that a component should have a reasonable chance of interopera:ng with a func:onally compa:ble component, even if the lafer is in a different type of smart space than from the one for which it was originally developed main challenge: interface incompagbility the object- oriented approach: use "translator" components which act as proxies for devices that need to communicate but do not understand each other benefit: each component interface can be very specialized and thus powerful drawback: for N device types you need to have up to N^2 translators the data- oriented approach: define one general interface that allows for a smaller set but well defined func:onali:es useful for a wide range of devices benefit: most devices can be made to speak the (limited) language drawback: more specialized devices cannot offer their special services Jakob E. Bardram 30
31 object- oriented example camera and a digital frame should be able to interoperate camera and digital frame disagree on interface solu:on: adapt the digital frame interface to one cameras understand many adaptors required (one for each camera/frame type or brand) for each missing adaptor we have a "lost opportunity" for interoperagon! this is the JINI approach a less complex standardized data- oriented interface is more feasible Jakob E. Bardram 31
32 data- oriented example camera and a digital frame should be able to interoperate camera discovers the frame service and its HTTP interface camera invokes HTTP POST/PUT on frame with a message body containing content type and image data camera and frame could first nego:ate viable content types this is the REST model combined with mdns / bonjour for discovery Jakob E. Bardram 32
33 security & privacy in mobile compugng Jakob E. Bardram 33
34 security & privacy in mobile compugng security is more difficult in mobile compugng cryptography public key cryptography requires too much CPU power one global symmetric key for all nodes makes systems vulnerable N 2 /2 symmetric keys may require too much memory energy spending ahacks can cause denial- of- service examples of spontaneous interoperagon problems: wireless services should only be available inside a smart space coworkers should be able to exchange documents on public WiFis wireless heart monitors should work easily with any pa:ent and not mix them up Jakob E. Bardram 34
35 spontaneous device associagon secure spontaneous associagon approaches: users enter PIN on devices (e.g., Bluetooth) keys sent via a physically constrained channel limited range (e.g., NFC) limited angle (e.g., infrared) limited :ming (e.g., wireless mouse pairing) various ways to use the physical channel send session key authen:cate a public key validate insecurely transmifed key Jakob E. Bardram 35
36 locagon based authengcagon authengcagng users of services in smart spaces can be based on the loca:on of clients rather than iden:ty e.g., using sound that does not escape the smart space that cannot travel far within a small :me interval loca:on based methods can compromise privacy: several different physical aspects (Bluetooth MAC, WLAN MAC, CCTV, credit card transac:ons,...) may now be associated by the system Jakob E. Bardram 36
37 devices in volagle systems are heterogeneous variability in processing power I/O capabili:es network bandwidth memory energy capacity adaptagon applicagons and services have to adapt to current resource availability Jakob E. Bardram 37
38 (technical) context- aware adaptagon services may adapt the content they provide to the context of the client examples adapt streamed video to screen size adapt encoding to device- present decoders and resources compress content to reduce bandwidth requirements content adaptors ("proxies") in the smart space poten:ally any device may serve content content adaptagon on the fly increasing set of permuta:ons of clients and services media- specific and lossy compression example: black & white images instead of color images Jakob E. Bardram 38
39 adapgng to changing resources network bandwidth and energy are crigcal resources, but can change at rungme OS support for adaptagon applica:on reserves resources (e.g., reserves a certain bandwidth for streamed video) user no:fied of changes in resources (e.g., when bandwidth is low, allows use to select fewer frames or black & white) applica:on no:fied of resource changes (e.g., when bandwidth is low, automa:cally switch to a stream with less requirements) smart space support for adaptagon equip the space with compute servers, "cyber foraging extend applica:ons to adapt to the presence of such servers example: a compute server may convert speech to text Jakob E. Bardram 39
40 mobile (phone) plakorms Android (Google) J2Me ios (Apple) Symbian (Symbian FoundaGon (Ericsson, Nokia, Motorola &Psion, now Nokia)) Meego (Nokia) HP webos (HP, formerly Palm) Windows Mobile (Microsod) BlackBerry 7.1 OS (RIM) Jakob E. Bardram 40
Mobile and Ubiquitous Computing
Mobile and Ubiquitous Computing Today l Volatile systems l Association and Interoperation l Sensing context and adaptation Volatile systems " Mobile computing Exploiting the connectedness of devices as
More informationMobile and Ubiquitous Computing
Mobile and Ubiquitous Computing Today l Mobile, pervasive and volatile systems l Association and Interoperation l Sensing context and adaptation RIP? How is mobility different Mobile elements are resource-poor
More informationSystem Challenges for Pervasive and Ubiquitous Computing
System Challenges for Pervasive and Ubiquitous Computing 18 th Roy Want Intel Research May 2005, ICSE 05 St. Louis th May 2005, ICSE What is Ubiquitous Computing? The most profound technologies are those
More informationMobile and ubiquitous computing. INF 5040/9040 autumn lecturer: Frank Eliassen. Frank Eliassen, SRL & Ifi/UiO 1. Home PC
Mobile and ubiquitous computing INF 5040/9040 autumn 2009 lecturer: Frank Eliassen Frank Eliassen, SRL & Ifi/UiO 1 Motivation Mobile computing is concerned with exploiting the connectedness of portable
More informationBroad Objectives/Outcomes of the course
Broad Objectives/Outcomes of the course Course Aims: Introduces the basic concepts and principles in mobile computing. The major techniques involved, and networks & systems issues for the design and implementation
More informationComputing Technologies
Computing Technologies Computing CPU, Memory, Communication Ubiquitous everywhere indefinite number of times Not really possible or desirable more than in traditional computing so widespread that unnoticed
More informationArchitectures, and Protocol Design Issues for Mobile Social Networks: A Survey
Applica@ons, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey N. Kayastha,D. Niyato, P. Wang and E. Hossain, Proceedings of the IEEEVol. 99, No. 12, Dec. 2011. Sabita Maharjan
More informationMobile Middleware Course. Introduction and Overview Sasu Tarkoma
Mobile Middleware Course Introduction and Overview Sasu Tarkoma Contents Course outline Motivation Mobile middleware overview Course Overview 4 credit course Three components Lectures Assignment Literature
More informationuniversaal Architecture and The Resource Discovery
universaal Architecture and The Resource Discovery Michele Girolami ISTI-CNR Wireless Network Lab. Departimento di Informatica Università Pisa 1 Outline 1. Ambient Intelligence and AAL 2. The universaal
More informationUbiquitous Computing. Ambient Intelligence
Ubiquitous Computing Ambient Intelligence CS4031 Introduction to Digital Media 2016 Computing Evolution Ubiquitous Computing Mark Weiser, Xerox PARC 1988 Ubiquitous computing enhances computer use by making
More informationContents. Mobile Middleware Course. Introduction and Overview Sasu Tarkoma. Lecture Outline. Course Book. Mobile Evolution.
Contents Mobile Middleware Course Introduction and Overview Sasu Tarkoma Lecture outline Motivation Mobile middleware overview Examples Summary Lecture Outline Course Book 16.3. 16-18 Introduction and
More informationMobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma
Mobile Middleware Course Mobile Platforms and Middleware Sasu Tarkoma Role of Software and Algorithms Software has an increasingly important role in mobile devices Increase in device capabilities Interaction
More informationUbiquitous and Context Aware Computing: Overview and Systems
Ubiquitous and Context Aware Computing: Overview and Systems Simon Bichler 1 / 30 Outline Definition and Motivation for Ubiquitous computing Context aware computing Sample Systems Discussion 2 / 30 Ubiquitous
More informationEnergy Efficient Mobile Compu4ng Building low power sensing devices with Bluetooth low energy. Simo Veikkolainen Nokia May 2014
Energy Efficient Mobile Compu4ng Building low power sensing devices with Bluetooth low energy Simo Veikkolainen Nokia May 2014 Bluetooth low energy Short range radio technology and protocol suite designed
More informationUNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION PERVASIVE COMPUTING PART A
UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION 2008 080250049-PERVASIVE COMPUTING PART A 1. Mention the characteristics of pervasive computing. Minimal user distraction Collaborative interaction User
More informationSwarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013
Slide 1 John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013 Disclaimer: I m not talking about the run- of- the- mill Internet of Things When people talk about the IoT, they often seem to be talking
More informationDistributed Systems - Mertz & McCarthy
Design Issues in Distributed Mobile Applications Association Sensing and Context Awareness Security and Privacy Adaptation Devices Appear and disappear from the space. Do so unpredictably May be totally
More informationSoftware Development for Mobile Devices
Software Development for Mobile Devices Operating System Diversity Many Operating Systems Google Android Apple ios Microsoft Windows Phone Nokia Symbian Linux RIM BlackBerry OS HP/Palm WebOS BREW Differences
More informationAdvanced Network Approaches for Wireless Environment
Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk
More informationDistributed Systems 26. Mobile Ad Hoc Mesh Networks
Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers
More informationWestern Michigan University
CS-6030 Cloud compu;ng Google App engine Sepideh Mohammadi Summer II 2017 Western Michigan University content Categories of cloud compu;ng Google cloud plaborm Google App Engine Storage technologies Datastore
More informationModule 1 - Distributed System Architectures & Models
Module 1 - Distributed System Architectures & Models System Architecture Defines the structure of the system components identified functions of each component defined interrelationships and interactions
More informationExperiments with User-Centric Ad-hoc Applications
Experiments with User-Centric Ad-hoc Applications Durga Prasad Pandey MIT Media Lab July 31st 2007 Presented at: IBM Watson Research Center Cambridge ~FluidVoice~ an infrastructure-less voice conferencing
More informationSpontaneous Interaction using Mobile Phones and Short Text Messages
Spontaneous Interaction using Mobile Phones and Short Text Messages Frank Siegemund Distributed Systems Group, Department of Computer Science, Swiss Federal Institute of Technology (ETH) Zurich, 8092 Zurich,
More informationEngaging Employees and Customers with Video. The Benefits of Corporate Webcas3ng
Engaging Employees and Customers with Video The Benefits of Corporate Webcas3ng Agenda Introduc9on UnityLivestream Teradek Wowza Workflow Produc9on Streaming Delivery Case Studies Demo - Live Solu9on -
More informationContext Aware Computing
CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware
More informationIntroduction to Distributed Systems (DS)
Introduction to Distributed Systems (DS) INF5040/9040 autumn 2009 lecturer: Frank Eliassen Frank Eliassen, Ifi/UiO 1 Outline What is a distributed system? Challenges and benefits of distributed system
More informationCisco Wide Area Bonjour Solution Overview
, page 1 Topology Overview, page 2 About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM), page 5 The Cisco Wide Area Bonjour solution is based on a distributed and hierarchical
More informationMiddleware for Ubiquitous Computing
Middleware for Ubiquitous Computing Software Testing for Mobile Computing National Institute of Informatics Ichiro Satoh Abstract When a portable computing device is moved into and attached to a new local
More informationDistributed Systems INF Michael Welzl
Distributed Systems INF 3190 Michael Welzl What is a distributed system (DS)? Many defini8ons [Coulouris & Emmerich] A distributed system consists of hardware and sodware components located in a network
More informationMobile based Text Image Translation System for Smart Tourism. Saw Zay Maung Maung UCSY, Myanmar. 23 November 2017, Brunei
Mobile based Text Image Translation System for Smart Tourism Saw Zay Maung Maung UCSY, Myanmar. 23 November 2017, Brunei 1 Smart Tourism Tourism is cultural and economic phenomenon which entails the movement
More informationMobile Security Fall 2011
Mobile Security 14-829 Fall 2011 Patrick Tague Class #9 Smartphones, PANs, and the IoT Announcements HW #2 will be posted this week Project group meetings: I'd like to schedule a meeting with each group
More informationCCW Workshop Technical Session on Mobile Cloud Compu<ng
CCW Workshop Technical Session on Mobile Cloud Compu
More informationCYBER RISK CONSULTING. Smartphone Security Issues
CYBER RISK CONSULTING Blackhat Briefings Europe 2004 Smartphone Security Issues May 2004 Luc DELPHA Maliha RASHID 1. Introduction Why smartphones? Functionalities Operating Systems Supported Connectivity
More informationWIFI VS BLUETOOTH Bluetooth. Wi-Fi.
TECHNICAL WRITING WIFI VS BLUETOOTH http://www.bfrx.com/wifi-vs-bluetooth/ Bluetooth. Developed in 1994 by telecommunications vendor, Ericsson, Bluetooth has a transmission range of about 30 feet, so it
More informationEnabling Apple AirPrint with Your Xerox AltaLink Multifunction Printer. White Paper
Enabling Apple AirPrint with Your Xerox AltaLink Multifunction Printer White Paper Contents 3 Background 3 AirPrint Basics Step 1: Device Discovery Apple Bonjour 3 Step 2: Device Information and Status
More informationDTV for Personalized Mobile Access and Unified Home Control
DTV for Personalized Mobile Access and Unified Home Control Jianlin Guo, Fernando Matsubara, Johnas Cukier, Haosong Kong Mitsubishi Electric Research Labs, 558 Central Avenue, Murray Hill, NJ 07974, USA
More informationMultiple Dimensions in Convergence and Related Issues
Multiple Dimensions in Convergence and Related Issues S.R. Subramanya LG Electronics CDG Technology Forum Las Vegas, Oct. 7, 2005 LGE Mobile Research, USA Talk Outline Introduction» Convergence Layers
More informationExtending Instant Messaging to Support Spontaneous Interactions in Ad-hoc Networks
Extending Instant Messaging to Support Spontaneous Interactions in Ad-hoc Networks Jesus Favela 1, Christian Navarro 1,2, and Marcela Rodriguez 1,2 1 Departamento de Ciencias de la Computación, CICESE,
More informationCOMP327 Mobile Computing Session: Lecture Set 6 - The Internet of Things
COMP327 Mobile Computing Session: 2015-2016 Lecture Set 6 - The Internet of Things Internet of Things An invasion of devices for the home and the environment Internet of Things In 2008, the number of things
More informationLoosely Coupled Actor Systems
Loosely Coupled Actor Systems for the Internet of Things Raphael Hiesgen Internet Technologies Group Hamburg University of Applied Sciences Agenda Introduction Where We Are Next Steps Risks and Conclusion
More informationRELATIONSHIP WITH KONICA MINOLTA
JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS MOBILE TRUSTFUL WORKSTYLE RELATIONSHIP WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and the same level
More informationNetworking Cyber-physical Applications in a Data-centric World
Networking Cyber-physical Applications in a Data-centric World Jie Wu Dept. of Computer and Information Sciences Temple University ICCCN 2015 Panel Computers weaving themselves into the fabric of everyday
More information2. System Models Page 1. University of Freiburg, Germany Department of Computer Science. Distributed Systems. Chapter 2 System Models
2. System Models Page 1 University of Freiburg, Germany Department of Computer Science Distributed Systems Chapter 2 System Models Christian Schindelhauer 27. April 2012 2. System Models 2.1. Introduction
More informationKONICA MINOLTA MOBILE PRINTING SOLUTIONS
JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS WORKSTYLE TRUSTFUL WITH RELATIONSHIP MOBILE PRINTING WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and
More informationMobile Security Fall 2012
Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,
More informationEMBEDDED SYSTEMS AND MOBILE SYSTEMS
EMBEDDED SYSTEMS AND MOBILE SYSTEMS Embedded systems Sensors, actuators, devices 8-bit uc, sensors, actuators Mobile systems: Portable PC (powerfull, WiFi connected, heavy, cumbersome, about 4h of battery
More informationJSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level
JSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level Kay Glahn Consultant Mobile Service Architecture, Vodafone http://www.vodafone.com Erkki Rysä Technologist Nokia Corporation http://www.nokia.com
More informationDistributed Information Processing
Distributed Information Processing 1 st Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2017 Eom, Hyeonsang All Rights Reserved Outline
More informationMobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems
Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems Based on materials by Prof. Paulo Ferreira Introduction Evolution Wheredo wewantto go? Challenges last class Basic Definitions
More informationAdaptive Middleware for Real-Time Software. Louise Avila CIS November 2, 2005
Adaptive Middleware for Real-Time Software Louise Avila CIS 700-02 November 2, 2005 Topic An Adaptive Middleware for Context-Sensitive Communications for Real-Time Applications in Ubiquitous Computing
More informationHow to use Video Conferencing & Desktop Sharing on Magnet Voice
How to use Video Conferencing & Desktop Sharing on Magnet Voice Video Conferencing and Collaboration CONTENTS User Guide... 1 1. How to set up a video session... 2. Running a video conference... 4 3. Screen
More informationService-Oriented Programming
Service-Oriented Programming by Guy Bieber, Lead Architect, ISD C4I, Motorola ABSTRACT - The Service-Oriented Programming (SOP) model is the most exciting revolution in programming since Object Oriented
More informationComputer chip: A very small pieces of silicon or other semi-conducting material onto which integrated circuits are embedded Circuit board: A thin
INTRODUCTION We can divide the parts that make up a computer into three broad categories or subsystem: the central processing unit (CPU), the main memory, and the input/output subsystem. The next three
More informationSERVICE DISCOVERY IN MOBILE ENVIRONMENTS
SERVICE DISCOVERY IN MOBILE ENVIRONMENTS Nandini Ravi Department of Computer Science and Engineering University of Texas, Arlington nravi@cse.uta.edu Abstract Mobile computing and mobile devices such as
More informationEpsilon. Project Proposal. Randy Smith, Owen Densmore Glenn Scott, Laura Hill. Project Description
ε Project Proposal Epsilon Randy Smith, Owen Densmore Glenn Scott, Laura Hill Project Description The everyday things around us are becoming digital. Devices can achieve flexibility by being small, independent,
More informationPanel 1 Service Platform and Network Infrastructure for Ubiquitous Services
Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich
More informationPeer-to-Peer Systems. Internet Computing Workshop Tom Chothia
Peer-to-Peer Systems Internet Computing Workshop Tom Chothia Plagiarism Reminder Plagiarism is a very serious offense. Never submit work by other people without clearly stating who wrote it. If you did
More informationMOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.
MOBILE COMPUTING CSE 40814/60814 Spring 2018 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment
More informationJXTA TM Technology for XML Messaging
JXTA TM Technology for XML Messaging OASIS Symposium New Orleans, LA 27-April-2004 Richard Manning Senior Software Architect Advanced Technology & Edge Computing Center Sun Microsystems Inc. www.jxta.org
More informationUser Manual. Mobile Viewer Mobile Manager Software (MMS) 1 st Edition : 10 Jan nd Edition : 31 Mar rd Edition : 20 May 2010
Mobile Viewer Mobile Manager Software (MMS) User Manual The picture might differ according to the specification and model. Contents of this manual are protected under copyrights and computer program laws.
More informationHCI FOR IPHONE. Veronika Irvine PhD Student, VisID lab University of Victoria
HCI FOR IPHONE Veronika Irvine PhD Student, VisID lab University of Victoria Technologies of the Decade http://spectrum.ieee.org/static/special-report-top-11-technologies-of-the-decade No. 1 Smart Phones
More informationCHAPTER 03: MULTIMEDIA & OPERATING SYSTEM. :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~
CHAPTER 03: MULTIMEDIA & OPERATING SYSTEM :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~ 1 Operating System and Software Computer Operating System An operating
More informationCompetence. e-learning. Patrick Krekelberg, Allen Interactions.
710 711 The Apple Training iphone Excellence Practical Uses Starts with in Corporate Training Competence e-learning Patrick Krekelberg, Allen Interactions www.elearningguild.com iphone and elearning Patrick
More informationQuality of service issues for world-wide mobile telephony
Quality of service issues for world-wide mobile telephony Gregor v. Bochmann e-mail: bochmann@site.uottawa.ca School of Information Technology and Engineering (SITE) University of Ottawa This presentation
More informationWhite Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web
White Paper EVERY THING CONNECTED Is Putting Every Physical Thing Every Thing Connected The Internet of Things a term first used by technology visionaries at the AUTO-ID Labs at MIT in the 90s 1 has received
More informationMOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.
MOBILE COMPUTING CSE 40814/60814 Spring 2017 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment
More informationHow to make an AES70 controller
AES 143 Network Audio Track How to make an AES70 controller Session NA10 October 21, 2017 1 Agenda AES70 Concepts for Controllers Morten Lave, Principal, All Access Consulting Issues in Controller Design
More informationTypes and Methods of Content Adaptation. Anna-Kaisa Pietiläinen
Types and Methods of Content Adaptation Anna-Kaisa Pietiläinen Agenda Introduction Multimedia Content Types Types of Adaptation Methods of Adaptation Conclusion Networks 2 Introduction Networks 3 The Problem
More informationNetwork Guide for Listen Everywhere
Network Guide for Listen Everywhere Overview: The Listen Everywhere (LE) System is designed to be used on pre-existing wireless networks and to be plug and play. However, it may be necessary to have an
More informationSmart City, Internet of Things, Security and Privacy
Smart City, Internet of Things, Security and Privacy Peter Waher Abstract. This course contains a series of lectures and practical laboratory assignments spanning four days that provide the participants
More informationIntroduction to Wireless Networking ECE 401WN Spring 2009
I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range
More informationThe network requirements can vary based on the number of simultaneous users the system will need to support. The most basic requirements are:
NETWORK CONFIGURATION GUIDE Listen EVERYWHERE (LE) was designed to be used on pre-existing wireless networks as a plug-and-play system, however it might be necessary to have an IT/Network Administrator
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Prof Cecilia Mascolo About Me time In this course The course will include aspects related to general understanding of Mobile and ubiquitous
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationA Framework for Mobile Interactions with the Physical World
A Framework for Mobile Interactions with the Physical World Enrico Rukzio 1, Sergej Wetzstein 1, Albrecht Schmidt 2 1 Media Informatics Group, 2 Embedded Interaction Group, University of Munich {Enrico.Rukzio,
More informationCptS 464/564 Lecture 18
CptS 464/564 Lecture 18 2nd November 2004 Checkpoint What have we covered so far? Paradigms and Models: frameworks for the discussion of DS What is the plan ahead? Next: examples of distributed systems
More informationEasy to connect to internet & browse or listen to music or videos A range of software and programs can be used for home, business, education etc
EIT, Author Gay Robertson, 2016 Desktop PC Made up of system unit, keyboard, monitor, mouse Relatively cheap but not portable and take up a lot of space Are versatile You can add extras for speed or storage
More informationLecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday
Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive
More informationLecture 04 Introduction: IoT Networking - Part I
Introduction to Industry 4.0 and Industrial Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 04 Introduction: IoT Networking
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationWhat s the magic of real-time video streaming with hyper-low latency?
What s the magic of real-time video streaming with hyper-low latency? A technical overview about streaming infrastructure solutions and transfer protocols. Development and improvement two big words united
More informationKINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING
IT1452 Fundamentals Of Pervasive Computing 1 KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING Year / Sem : IV
More informationLocation-based Services in Ubiquitous Computing Environments
Location-based Services in Ubiquitous Computing Environments National Institute of Informatics Email: ichiro@nii.ac.jp Outline 1. Motivation 2. Approach 3. Design and Implementation 4. Applications 5.
More informationAd Hoc Networks - Applications and System Design
Ad Hoc Networks - Applications and System Design Prof Sanjay Srivastava DA-IICT, Gandhinagar Modelling and Analysis Group of NeTworks (MAGNeT) Two day workshop on Ad Hoc Networks: Design, Applications,
More informationOpen challenges in ubiquitous and net-centric computing middleware
Open challenges in ubiquitous and net-centric computing middleware bodhuin/canfora/preziosi/tortorella@unisannio.it RCOST Research Centre On Software Technology University of Sannio Benevento, Italy Thierry
More informationSecurity of Mobile Ad Hoc and Wireless Sensor Networks
Security of Mobile Ad Hoc and Wireless Sensor Networks July, 2013 Edward Bonver LA Board Member Symantec Corporation edward@owasp.org Copyright The Foundation Permission is granted to copy, distribute
More informationComputer Science 461 Final Exam May 22, :30-3:30pm
NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge
More informationTechnology Overview. Gallery SIENNA London, England T
Technology Overview Gallery SIENNA London, England T +44 208 340 5677 sales@sienna.tv www.sienna.tv http://ndi.newtek.com SIENNA Cloud for NDI An IP Video Protocol which works today NDI Protocol The NDI
More informationHow to Secure ipads, Tablets and Android Devices for Corporate Use. John Masserini CISO Dow Jones
How to Secure ipads, Tablets and Android Devices for Corporate Use John Masserini CISO Dow Jones VIDEO / COMMUNITY 5.6 million streams each month 140,400 WSJ.com Community members 200,000 MarketWatch.com
More informationBYOD Signals & Connectivity. Integrating Mobile Devices with Fixed AV Systems. Joe Cornwall, CTS-D. Technologoy Evangelist l Legrand NA
Integrating Mobile Devices with Fixed AV Systems BYOD Signals & Connectivity Joseph D. Cornwall, CTS-D Joe Cornwall, CTS-D Technologoy Evangelist l Legrand NA Equip yourself for your own needs. Patti Digh,
More informationBrief Intro on Mobile Platforms and Dev. Tools
Brief Intro on Mobile Platforms and Dev. Tools Top Mobile Operating Systems!! - Android by Google Inc. - ios by Apple Inc. - BlackBerry OS by RIM - Symbian OS by Nokia and Accenture - Windows 8 by Microsoft
More informationBuilding Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey
Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom
More informationMobility and Media. How mobile computing is evolving at HP. Mark Smith Mobile and Media Systems Lab Hewlett Packard Laboratories
Mobility and Media How mobile computing is evolving at HP Mark Smith (msmith@hpl.hp.com) Mobile and Media Systems Lab Hewlett Packard Laboratories 2004 Hewlett-Packard Development Company, L.P. The information
More informationJoseph D. Cornwall, CTS-D Technology Evangelist
Joseph D. Cornwall, CTS-D Technology Evangelist Our Agenda Why BYOD? Wireless Challenges Parrots, Reflectors and Servers MirrorOp Foundations USB, DisplayPort and HDMI The Coming Revolution In C 1.62 Billion
More informationWhat? Why? How? Dave Botherway November
What? Why? How? Dave Botherway November - 2016 Connecting any Computer-type devices PCs, Tablets, Phones, GPS Smart TV, Smart Watches, Fitbit-type devices Printers, Modems, Routers, Network Storage Keyboards,
More informationSERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT
SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, 53851 Lappeenranta, Finland arto.hamalainen@lut.fi Jari Porras Lappeenranta University
More informationvsolution Cynap Pure Network Integration
vsolution Cynap Pure Network Integration 1. Basics... 2 2. Glossary... 2 2.1. LAN / Ethernet settings... 2 2.2. WLAN settings access point... 3 2.3. WLAN settings infrastructure (Cynap Pure acts as client)...
More informationTCG Physical Security Interoperability Alliance IP Video Use Case 002 (PSI-UC-IPV002) Specification Version 1.0 Revision 0.2
TCG Physical Security Interoperability Alliance IP Video Use Case 002 (PSI-UC-IPV002) Specification Version 1.0 Revision 0.2 Revision History Description Date By Version 1.0 Rev 0.1 Initial Draft August
More informationIntegrating Handhelds into Environments of Cooperating Smart Everyday Objects
Integrating Handhelds into Environments of Cooperating Smart Everyday Objects Frank Siegemund and Tobias Krauer Institute for Pervasive Computing Department of Computer Science ETH Zurich, Switzerland
More information