PERVASIVE COMPUTING SPCT- F2012 MOBILE COMPUTING

Size: px
Start display at page:

Download "PERVASIVE COMPUTING SPCT- F2012 MOBILE COMPUTING"

Transcription

1 PERVASIVE COMPUTING SPCT- F2012 MOBILE COMPUTING Jakob E. Bardram

2 Jakob E. Bardram 2

3 Mobile CompuGng intro Today s Agenda Chapter 16 Mobile and Ubiquitous Compu:ng, pp of Distributed Systems: Concepts and Design. G. Coulouris, J. Dollimore, T. Kindberg. 5 th edi:on, vola:lity & vola:le systems associa:on and interopera:on (sensing and context awareness) security adapta:on Jakob E. Bardram 3

4 Job Announcement We re looking for a student programmer in the PIT lab Working with Android programming PHP Deployment at the Rigshopitalet hence Danish speaking The MONARCA project mobile phone applica:on for bipolar disorder Jakob E. Bardram 4

5 Jakob E. Bardram 5

6 Mobile compugng in relagon to distr. systems and pervasive compugng (Satyanarayanan, 2001) Jakob E. Bardram 6

7 Different names... handheld compugng the device fits in the user's hand examples: mobile phones, PDAs, cameras mobile compugng users carry computers with them wireless connec:vity (Wifi, Bluetooth, GPRS, etc) example: laptops, smart phones, PDAs ubiquitous/pervasive compugng computers everywhere "one person, many computers "weave themselves into the fabric of life example: intelligent whiteboards Jakob E. Bardram 7

8 ... and more related areas wearable compugng user wears device on the body, integrated in clothes, watches, etc typically operated without user manipula:on example: user iden:fying badge, body sensors Jakob E. Bardram 8

9 VolaGle systems Jakob E. Bardram 9

10 volaglity & volagle systems all previously mengoned compugng forms have one thing in common: changes are common rather than excepgonal. note: volatility Examples of is volagle not a defining properges: parameter of mobile and ubiquitous computing systems. There are other systems out there that are also highly volatile, e.g. peer-to-peer file sharing applications connec:vity set of users hardware sobware excepgons devices and communica:on links fail communica:on characteris:cs change associa:ons are created and destroyed Jakob E. Bardram 10

11 Smart Spaces a smart space is any physical place with embedded services example: mee:ng room with intelligent whiteboard ubiquitous compugng happens within smart (physical) spaces mobile compugng happens both in- between and within "within" example 1: Magic Touch office environment (p271 in course book) "within" example 2: easyadl cogni:ve prosthesis Jakob E. Bardram 11

12 Example RecGcularSpaces JE Bardram, S Gueddana, S Houben, S Nielsen. ReticularSpaces: Activity- Based Computing Support for Physically Distributed and Collaborative Smart Spaces. In Proceeding of CHI 2012, ACM Press, Jakob E. Bardram 12

13 Q&A What did you just see in terms of...?... mobility... connec:vity... vola:lity Jakob E. Bardram 13

14 physical mobility Mobility... devices visit and leave the space (carried by human agents or by robots) logical mobility a sobware component might move in or out of a space, or of a device oben caused by physical mobility devices appears and disappears (and you really don t know why) "degree of volaglity = rate of change" Jakob E. Bardram 14

15 the typical mobile device (today) mobile devices are small with the following characterisgcs: limited energy bafery- powered devices balance performance, connec:vity, storage, bafery life resource constraints limited resources (processor speed, storage capacity, network bandwidth) adapt and design algorithms for limited resources use infrastructure to augment resources sensors and actuators needed to enable integra:on with the physical world sensors measures physical parameters actuators affect physical parameters Jakob E. Bardram 15

16 volagle connecgvity wireless connecgvity: WiFi, Bluetooth, GPRS, 3G, 4G, infrared,... disconnecgon connec:vity is not con:nuous, e.g. devices pass in and out of range variable bandwidth and latency bandwidth changes when users move about variable rougng communica:on without stable infrastructure ("ad- hoc") Jakob E. Bardram 16

17 spontaneous interoperagon in volagle systems, components change associagons oden associagon: logical relagonship between communicagng components. Examples: mobile device associated with local printer laptop client associated with an server (associa:on independent of connec:vity: client and server associated even if disconnected) in a smart space, associa:ons change because mobile components take the opportunity to interact with local components. associa:on spontaneity is oben driven by proximity in physical space. interoperagon: concrete interacgons during associagon. Examples: the mobile device sends data to be printed to the printer the laptop client receives the latest s from the server Jakob E. Bardram 17

18 lowered trust and privacy security in distributed systems relies on trusted hardware and sodware components trust: in mobile & ubiquitous systems, trust is problemagc because of the spontaneous interoperagon: components have never seen each other before components belong to different individuals/organiza:ons trusted third- party resource might not exist privacy: human agents might not like to be silently tracked by sensors in smart spaces other people might be able to directly or indirectly find out what you are doing, when, and where Jakob E. Bardram 18

19 associagon appearing devices need to associate with services and devices in smart spaces step 1: get an address on the network (the network bootstrapping problem) example solu:ons: DHCP (with infrastructure), ZeroConf (without infrastructure), UPnP (generalised plug- and- play) step 2: associate with available and relevant services in the smart space Jakob E. Bardram 19

20 Case Study Service Creates an object that implements the service Register the service object with lookup service(s) Keep it alive and running Lookup and Discovery Mul:cast request protocol Unicast discovery protocol Mul:cast announcement protocol Jakob E. Bardram 20

21 Step I Service RegistraGon Jakob E. Bardram 21

22 Step II Service Lookup Jakob E. Bardram 22

23 Step III Service Usage Jakob E. Bardram 23

24 JINI features... Centralized uses a lookup service (LUS) requires IP networking (DNS, DHCP, (zeroconf)) Object- oriented requires standardized (Java) interfaces needs to be shared / dynamically loaded i.e. needs compile :me considera:ons Java- based requires JVM, dynamical code loading, RMI Uses RPC using RMI implies non vola:le networking Jakob E. Bardram 24

25 associagon appearing devices need to associate with services and devices in smart spaces step 1: get an address on the network (the network bootstrapping problem) example solu:ons: DHCP (with infrastructure), ZeroConf (without infrastructure), UPnP (generalised plug- and- play) step 2: associate with available and relevant services in the smart space Jakob E. Bardram 25

26 associagon appearing devices need to associate with services and devices in smart spaces step 1: get an address on the network (the network bootstrapping problem) example solu:ons: DHCP (with infrastructure), ZeroConf (without infrastructure), UPnP (generalised plug- and- play) step 2: associate with available and relevant services in the smart space the scale problem: if available services components are many (e.g. > 1000) how can the device quickly choose with which component(s) to associate itself? Example solu:on: discovery services (allows the newcomer to ask someone who knows what is indeed present in the space) Jakob E. Bardram 26

27 associagon appearing devices need to associate with services and devices in smart spaces step 1: get an address on the network (the network bootstrapping problem) example solu:ons: DHCP (with infrastructure), ZeroConf (without infrastructure), UPnP (generalised plug- and- play) step 2: associate with available and relevant services in the smart space the scale problem: if available services components are many (e.g. > 1000) how can the device quickly choose with which component(s) to associate itself? Example solu:on: discovery services (allows the newcomer to ask someone who knows what is indeed present in the space) the scope problem: limit to devices within the smart space (and all of them), not, not outside it. Example solu:on: to adhere to the "boundary principle" which aligns logical topology to spa:al structures that make sense to humans example of a problema:c situa:on: find a hotel printer within room (not next door room) Jakob E. Bardram 27

28 associagon appearing devices need to associate with services and devices in smart spaces step 1: get an address on the network (the network bootstrapping problem) example solu:ons: DHCP (with infrastructure), ZeroConf (without infrastructure), UPnP (generalised plug- and- play) step 2: associate with available and relevant services in the smart space the scale problem: if available services components are many (e.g. > 1000) how can the device quickly choose with which component(s) to associate itself? Example solu:on: discovery services (allows the newcomer to ask someone who knows what is indeed if this cannot present be in done the space) automatically, the device/system the scope needs problem: to involve limit to devices the human within the smart space (and all of them), not, not agent, e.g outside rely on it. Example "physical solu:on: association" to adher to the "boundary principle" which aligns logical topology to spa:al structures that make sense to humans example of a problema:c situa:on: find a hotel printer within room (not next door room) Jakob E. Bardram 28

29 physical associagon examples: manual text input: let the human agent input in what room she/he is in. the room number can be linked directly to a specific printer on the network "physically constrained channel": e.g., digital id of room embedded in the music in the room (the digital id is thus only available within the room itself) (no human input needed) symbol capture: let the human use a mobile device to photograph a visual tag ("glyph") fifed somewhere in the space or on the printer itself to obtain the unique network iden:ty of the room or printer which is then looked up using a directory service direct associa:on: encode the network id of the device directly in the symbol (no directory service needed) read visually or through short- range radio (e.g. NFC, RFID) temporal/physical correla:on (e.g. press bufons/shake devices at the same :me) Jakob E. Bardram 29

30 interoperagon "a goal for ubiquitous and mobile compu:ng is that a component should have a reasonable chance of interopera:ng with a func:onally compa:ble component, even if the lafer is in a different type of smart space than from the one for which it was originally developed main challenge: interface incompagbility the object- oriented approach: use "translator" components which act as proxies for devices that need to communicate but do not understand each other benefit: each component interface can be very specialized and thus powerful drawback: for N device types you need to have up to N^2 translators the data- oriented approach: define one general interface that allows for a smaller set but well defined func:onali:es useful for a wide range of devices benefit: most devices can be made to speak the (limited) language drawback: more specialized devices cannot offer their special services Jakob E. Bardram 30

31 object- oriented example camera and a digital frame should be able to interoperate camera and digital frame disagree on interface solu:on: adapt the digital frame interface to one cameras understand many adaptors required (one for each camera/frame type or brand) for each missing adaptor we have a "lost opportunity" for interoperagon! this is the JINI approach a less complex standardized data- oriented interface is more feasible Jakob E. Bardram 31

32 data- oriented example camera and a digital frame should be able to interoperate camera discovers the frame service and its HTTP interface camera invokes HTTP POST/PUT on frame with a message body containing content type and image data camera and frame could first nego:ate viable content types this is the REST model combined with mdns / bonjour for discovery Jakob E. Bardram 32

33 security & privacy in mobile compugng Jakob E. Bardram 33

34 security & privacy in mobile compugng security is more difficult in mobile compugng cryptography public key cryptography requires too much CPU power one global symmetric key for all nodes makes systems vulnerable N 2 /2 symmetric keys may require too much memory energy spending ahacks can cause denial- of- service examples of spontaneous interoperagon problems: wireless services should only be available inside a smart space coworkers should be able to exchange documents on public WiFis wireless heart monitors should work easily with any pa:ent and not mix them up Jakob E. Bardram 34

35 spontaneous device associagon secure spontaneous associagon approaches: users enter PIN on devices (e.g., Bluetooth) keys sent via a physically constrained channel limited range (e.g., NFC) limited angle (e.g., infrared) limited :ming (e.g., wireless mouse pairing) various ways to use the physical channel send session key authen:cate a public key validate insecurely transmifed key Jakob E. Bardram 35

36 locagon based authengcagon authengcagng users of services in smart spaces can be based on the loca:on of clients rather than iden:ty e.g., using sound that does not escape the smart space that cannot travel far within a small :me interval loca:on based methods can compromise privacy: several different physical aspects (Bluetooth MAC, WLAN MAC, CCTV, credit card transac:ons,...) may now be associated by the system Jakob E. Bardram 36

37 devices in volagle systems are heterogeneous variability in processing power I/O capabili:es network bandwidth memory energy capacity adaptagon applicagons and services have to adapt to current resource availability Jakob E. Bardram 37

38 (technical) context- aware adaptagon services may adapt the content they provide to the context of the client examples adapt streamed video to screen size adapt encoding to device- present decoders and resources compress content to reduce bandwidth requirements content adaptors ("proxies") in the smart space poten:ally any device may serve content content adaptagon on the fly increasing set of permuta:ons of clients and services media- specific and lossy compression example: black & white images instead of color images Jakob E. Bardram 38

39 adapgng to changing resources network bandwidth and energy are crigcal resources, but can change at rungme OS support for adaptagon applica:on reserves resources (e.g., reserves a certain bandwidth for streamed video) user no:fied of changes in resources (e.g., when bandwidth is low, allows use to select fewer frames or black & white) applica:on no:fied of resource changes (e.g., when bandwidth is low, automa:cally switch to a stream with less requirements) smart space support for adaptagon equip the space with compute servers, "cyber foraging extend applica:ons to adapt to the presence of such servers example: a compute server may convert speech to text Jakob E. Bardram 39

40 mobile (phone) plakorms Android (Google) J2Me ios (Apple) Symbian (Symbian FoundaGon (Ericsson, Nokia, Motorola &Psion, now Nokia)) Meego (Nokia) HP webos (HP, formerly Palm) Windows Mobile (Microsod) BlackBerry 7.1 OS (RIM) Jakob E. Bardram 40

Mobile and Ubiquitous Computing

Mobile and Ubiquitous Computing Mobile and Ubiquitous Computing Today l Volatile systems l Association and Interoperation l Sensing context and adaptation Volatile systems " Mobile computing Exploiting the connectedness of devices as

More information

Mobile and Ubiquitous Computing

Mobile and Ubiquitous Computing Mobile and Ubiquitous Computing Today l Mobile, pervasive and volatile systems l Association and Interoperation l Sensing context and adaptation RIP? How is mobility different Mobile elements are resource-poor

More information

System Challenges for Pervasive and Ubiquitous Computing

System Challenges for Pervasive and Ubiquitous Computing System Challenges for Pervasive and Ubiquitous Computing 18 th Roy Want Intel Research May 2005, ICSE 05 St. Louis th May 2005, ICSE What is Ubiquitous Computing? The most profound technologies are those

More information

Mobile and ubiquitous computing. INF 5040/9040 autumn lecturer: Frank Eliassen. Frank Eliassen, SRL & Ifi/UiO 1. Home PC

Mobile and ubiquitous computing. INF 5040/9040 autumn lecturer: Frank Eliassen. Frank Eliassen, SRL & Ifi/UiO 1. Home PC Mobile and ubiquitous computing INF 5040/9040 autumn 2009 lecturer: Frank Eliassen Frank Eliassen, SRL & Ifi/UiO 1 Motivation Mobile computing is concerned with exploiting the connectedness of portable

More information

Broad Objectives/Outcomes of the course

Broad Objectives/Outcomes of the course Broad Objectives/Outcomes of the course Course Aims: Introduces the basic concepts and principles in mobile computing. The major techniques involved, and networks & systems issues for the design and implementation

More information

Computing Technologies

Computing Technologies Computing Technologies Computing CPU, Memory, Communication Ubiquitous everywhere indefinite number of times Not really possible or desirable more than in traditional computing so widespread that unnoticed

More information

Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey

Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey Applica@ons, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey N. Kayastha,D. Niyato, P. Wang and E. Hossain, Proceedings of the IEEEVol. 99, No. 12, Dec. 2011. Sabita Maharjan

More information

Mobile Middleware Course. Introduction and Overview Sasu Tarkoma

Mobile Middleware Course. Introduction and Overview Sasu Tarkoma Mobile Middleware Course Introduction and Overview Sasu Tarkoma Contents Course outline Motivation Mobile middleware overview Course Overview 4 credit course Three components Lectures Assignment Literature

More information

universaal Architecture and The Resource Discovery

universaal Architecture and The Resource Discovery universaal Architecture and The Resource Discovery Michele Girolami ISTI-CNR Wireless Network Lab. Departimento di Informatica Università Pisa 1 Outline 1. Ambient Intelligence and AAL 2. The universaal

More information

Ubiquitous Computing. Ambient Intelligence

Ubiquitous Computing. Ambient Intelligence Ubiquitous Computing Ambient Intelligence CS4031 Introduction to Digital Media 2016 Computing Evolution Ubiquitous Computing Mark Weiser, Xerox PARC 1988 Ubiquitous computing enhances computer use by making

More information

Contents. Mobile Middleware Course. Introduction and Overview Sasu Tarkoma. Lecture Outline. Course Book. Mobile Evolution.

Contents. Mobile Middleware Course. Introduction and Overview Sasu Tarkoma. Lecture Outline. Course Book. Mobile Evolution. Contents Mobile Middleware Course Introduction and Overview Sasu Tarkoma Lecture outline Motivation Mobile middleware overview Examples Summary Lecture Outline Course Book 16.3. 16-18 Introduction and

More information

Mobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma

Mobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma Mobile Middleware Course Mobile Platforms and Middleware Sasu Tarkoma Role of Software and Algorithms Software has an increasingly important role in mobile devices Increase in device capabilities Interaction

More information

Ubiquitous and Context Aware Computing: Overview and Systems

Ubiquitous and Context Aware Computing: Overview and Systems Ubiquitous and Context Aware Computing: Overview and Systems Simon Bichler 1 / 30 Outline Definition and Motivation for Ubiquitous computing Context aware computing Sample Systems Discussion 2 / 30 Ubiquitous

More information

Energy Efficient Mobile Compu4ng Building low power sensing devices with Bluetooth low energy. Simo Veikkolainen Nokia May 2014

Energy Efficient Mobile Compu4ng Building low power sensing devices with Bluetooth low energy. Simo Veikkolainen Nokia May 2014 Energy Efficient Mobile Compu4ng Building low power sensing devices with Bluetooth low energy Simo Veikkolainen Nokia May 2014 Bluetooth low energy Short range radio technology and protocol suite designed

More information

UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION PERVASIVE COMPUTING PART A

UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION PERVASIVE COMPUTING PART A UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION 2008 080250049-PERVASIVE COMPUTING PART A 1. Mention the characteristics of pervasive computing. Minimal user distraction Collaborative interaction User

More information

Swarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013

Swarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013 Slide 1 John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013 Disclaimer: I m not talking about the run- of- the- mill Internet of Things When people talk about the IoT, they often seem to be talking

More information

Distributed Systems - Mertz & McCarthy

Distributed Systems - Mertz & McCarthy Design Issues in Distributed Mobile Applications Association Sensing and Context Awareness Security and Privacy Adaptation Devices Appear and disappear from the space. Do so unpredictably May be totally

More information

Software Development for Mobile Devices

Software Development for Mobile Devices Software Development for Mobile Devices Operating System Diversity Many Operating Systems Google Android Apple ios Microsoft Windows Phone Nokia Symbian Linux RIM BlackBerry OS HP/Palm WebOS BREW Differences

More information

Advanced Network Approaches for Wireless Environment

Advanced Network Approaches for Wireless Environment Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk

More information

Distributed Systems 26. Mobile Ad Hoc Mesh Networks

Distributed Systems 26. Mobile Ad Hoc Mesh Networks Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers

More information

Western Michigan University

Western Michigan University CS-6030 Cloud compu;ng Google App engine Sepideh Mohammadi Summer II 2017 Western Michigan University content Categories of cloud compu;ng Google cloud plaborm Google App Engine Storage technologies Datastore

More information

Module 1 - Distributed System Architectures & Models

Module 1 - Distributed System Architectures & Models Module 1 - Distributed System Architectures & Models System Architecture Defines the structure of the system components identified functions of each component defined interrelationships and interactions

More information

Experiments with User-Centric Ad-hoc Applications

Experiments with User-Centric Ad-hoc Applications Experiments with User-Centric Ad-hoc Applications Durga Prasad Pandey MIT Media Lab July 31st 2007 Presented at: IBM Watson Research Center Cambridge ~FluidVoice~ an infrastructure-less voice conferencing

More information

Spontaneous Interaction using Mobile Phones and Short Text Messages

Spontaneous Interaction using Mobile Phones and Short Text Messages Spontaneous Interaction using Mobile Phones and Short Text Messages Frank Siegemund Distributed Systems Group, Department of Computer Science, Swiss Federal Institute of Technology (ETH) Zurich, 8092 Zurich,

More information

Engaging Employees and Customers with Video. The Benefits of Corporate Webcas3ng

Engaging Employees and Customers with Video. The Benefits of Corporate Webcas3ng Engaging Employees and Customers with Video The Benefits of Corporate Webcas3ng Agenda Introduc9on UnityLivestream Teradek Wowza Workflow Produc9on Streaming Delivery Case Studies Demo - Live Solu9on -

More information

Context Aware Computing

Context Aware Computing CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware

More information

Introduction to Distributed Systems (DS)

Introduction to Distributed Systems (DS) Introduction to Distributed Systems (DS) INF5040/9040 autumn 2009 lecturer: Frank Eliassen Frank Eliassen, Ifi/UiO 1 Outline What is a distributed system? Challenges and benefits of distributed system

More information

Cisco Wide Area Bonjour Solution Overview

Cisco Wide Area Bonjour Solution Overview , page 1 Topology Overview, page 2 About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM), page 5 The Cisco Wide Area Bonjour solution is based on a distributed and hierarchical

More information

Middleware for Ubiquitous Computing

Middleware for Ubiquitous Computing Middleware for Ubiquitous Computing Software Testing for Mobile Computing National Institute of Informatics Ichiro Satoh Abstract When a portable computing device is moved into and attached to a new local

More information

Distributed Systems INF Michael Welzl

Distributed Systems INF Michael Welzl Distributed Systems INF 3190 Michael Welzl What is a distributed system (DS)? Many defini8ons [Coulouris & Emmerich] A distributed system consists of hardware and sodware components located in a network

More information

Mobile based Text Image Translation System for Smart Tourism. Saw Zay Maung Maung UCSY, Myanmar. 23 November 2017, Brunei

Mobile based Text Image Translation System for Smart Tourism. Saw Zay Maung Maung UCSY, Myanmar. 23 November 2017, Brunei Mobile based Text Image Translation System for Smart Tourism Saw Zay Maung Maung UCSY, Myanmar. 23 November 2017, Brunei 1 Smart Tourism Tourism is cultural and economic phenomenon which entails the movement

More information

Mobile Security Fall 2011

Mobile Security Fall 2011 Mobile Security 14-829 Fall 2011 Patrick Tague Class #9 Smartphones, PANs, and the IoT Announcements HW #2 will be posted this week Project group meetings: I'd like to schedule a meeting with each group

More information

CCW Workshop Technical Session on Mobile Cloud Compu<ng

CCW Workshop Technical Session on Mobile Cloud Compu<ng CCW Workshop Technical Session on Mobile Cloud Compu

More information

CYBER RISK CONSULTING. Smartphone Security Issues

CYBER RISK CONSULTING. Smartphone Security Issues CYBER RISK CONSULTING Blackhat Briefings Europe 2004 Smartphone Security Issues May 2004 Luc DELPHA Maliha RASHID 1. Introduction Why smartphones? Functionalities Operating Systems Supported Connectivity

More information

WIFI VS BLUETOOTH Bluetooth. Wi-Fi.

WIFI VS BLUETOOTH   Bluetooth. Wi-Fi. TECHNICAL WRITING WIFI VS BLUETOOTH http://www.bfrx.com/wifi-vs-bluetooth/ Bluetooth. Developed in 1994 by telecommunications vendor, Ericsson, Bluetooth has a transmission range of about 30 feet, so it

More information

Enabling Apple AirPrint with Your Xerox AltaLink Multifunction Printer. White Paper

Enabling Apple AirPrint with Your Xerox AltaLink Multifunction Printer. White Paper Enabling Apple AirPrint with Your Xerox AltaLink Multifunction Printer White Paper Contents 3 Background 3 AirPrint Basics Step 1: Device Discovery Apple Bonjour 3 Step 2: Device Information and Status

More information

DTV for Personalized Mobile Access and Unified Home Control

DTV for Personalized Mobile Access and Unified Home Control DTV for Personalized Mobile Access and Unified Home Control Jianlin Guo, Fernando Matsubara, Johnas Cukier, Haosong Kong Mitsubishi Electric Research Labs, 558 Central Avenue, Murray Hill, NJ 07974, USA

More information

Multiple Dimensions in Convergence and Related Issues

Multiple Dimensions in Convergence and Related Issues Multiple Dimensions in Convergence and Related Issues S.R. Subramanya LG Electronics CDG Technology Forum Las Vegas, Oct. 7, 2005 LGE Mobile Research, USA Talk Outline Introduction» Convergence Layers

More information

Extending Instant Messaging to Support Spontaneous Interactions in Ad-hoc Networks

Extending Instant Messaging to Support Spontaneous Interactions in Ad-hoc Networks Extending Instant Messaging to Support Spontaneous Interactions in Ad-hoc Networks Jesus Favela 1, Christian Navarro 1,2, and Marcela Rodriguez 1,2 1 Departamento de Ciencias de la Computación, CICESE,

More information

COMP327 Mobile Computing Session: Lecture Set 6 - The Internet of Things

COMP327 Mobile Computing Session: Lecture Set 6 - The Internet of Things COMP327 Mobile Computing Session: 2015-2016 Lecture Set 6 - The Internet of Things Internet of Things An invasion of devices for the home and the environment Internet of Things In 2008, the number of things

More information

Loosely Coupled Actor Systems

Loosely Coupled Actor Systems Loosely Coupled Actor Systems for the Internet of Things Raphael Hiesgen Internet Technologies Group Hamburg University of Applied Sciences Agenda Introduction Where We Are Next Steps Risks and Conclusion

More information

RELATIONSHIP WITH KONICA MINOLTA

RELATIONSHIP WITH KONICA MINOLTA JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS MOBILE TRUSTFUL WORKSTYLE RELATIONSHIP WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and the same level

More information

Networking Cyber-physical Applications in a Data-centric World

Networking Cyber-physical Applications in a Data-centric World Networking Cyber-physical Applications in a Data-centric World Jie Wu Dept. of Computer and Information Sciences Temple University ICCCN 2015 Panel Computers weaving themselves into the fabric of everyday

More information

2. System Models Page 1. University of Freiburg, Germany Department of Computer Science. Distributed Systems. Chapter 2 System Models

2. System Models Page 1. University of Freiburg, Germany Department of Computer Science. Distributed Systems. Chapter 2 System Models 2. System Models Page 1 University of Freiburg, Germany Department of Computer Science Distributed Systems Chapter 2 System Models Christian Schindelhauer 27. April 2012 2. System Models 2.1. Introduction

More information

KONICA MINOLTA MOBILE PRINTING SOLUTIONS

KONICA MINOLTA MOBILE PRINTING SOLUTIONS JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS WORKSTYLE TRUSTFUL WITH RELATIONSHIP MOBILE PRINTING WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and

More information

Mobile Security Fall 2012

Mobile Security Fall 2012 Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,

More information

EMBEDDED SYSTEMS AND MOBILE SYSTEMS

EMBEDDED SYSTEMS AND MOBILE SYSTEMS EMBEDDED SYSTEMS AND MOBILE SYSTEMS Embedded systems Sensors, actuators, devices 8-bit uc, sensors, actuators Mobile systems: Portable PC (powerfull, WiFi connected, heavy, cumbersome, about 4h of battery

More information

JSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level

JSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level JSR 248: Taking Java Platform, Micro Edition (Java ME) to the Next Level Kay Glahn Consultant Mobile Service Architecture, Vodafone http://www.vodafone.com Erkki Rysä Technologist Nokia Corporation http://www.nokia.com

More information

Distributed Information Processing

Distributed Information Processing Distributed Information Processing 1 st Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2017 Eom, Hyeonsang All Rights Reserved Outline

More information

Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems

Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems Based on materials by Prof. Paulo Ferreira Introduction Evolution Wheredo wewantto go? Challenges last class Basic Definitions

More information

Adaptive Middleware for Real-Time Software. Louise Avila CIS November 2, 2005

Adaptive Middleware for Real-Time Software. Louise Avila CIS November 2, 2005 Adaptive Middleware for Real-Time Software Louise Avila CIS 700-02 November 2, 2005 Topic An Adaptive Middleware for Context-Sensitive Communications for Real-Time Applications in Ubiquitous Computing

More information

How to use Video Conferencing & Desktop Sharing on Magnet Voice

How to use Video Conferencing & Desktop Sharing on Magnet Voice How to use Video Conferencing & Desktop Sharing on Magnet Voice Video Conferencing and Collaboration CONTENTS User Guide... 1 1. How to set up a video session... 2. Running a video conference... 4 3. Screen

More information

Service-Oriented Programming

Service-Oriented Programming Service-Oriented Programming by Guy Bieber, Lead Architect, ISD C4I, Motorola ABSTRACT - The Service-Oriented Programming (SOP) model is the most exciting revolution in programming since Object Oriented

More information

Computer chip: A very small pieces of silicon or other semi-conducting material onto which integrated circuits are embedded Circuit board: A thin

Computer chip: A very small pieces of silicon or other semi-conducting material onto which integrated circuits are embedded Circuit board: A thin INTRODUCTION We can divide the parts that make up a computer into three broad categories or subsystem: the central processing unit (CPU), the main memory, and the input/output subsystem. The next three

More information

SERVICE DISCOVERY IN MOBILE ENVIRONMENTS

SERVICE DISCOVERY IN MOBILE ENVIRONMENTS SERVICE DISCOVERY IN MOBILE ENVIRONMENTS Nandini Ravi Department of Computer Science and Engineering University of Texas, Arlington nravi@cse.uta.edu Abstract Mobile computing and mobile devices such as

More information

Epsilon. Project Proposal. Randy Smith, Owen Densmore Glenn Scott, Laura Hill. Project Description

Epsilon. Project Proposal. Randy Smith, Owen Densmore Glenn Scott, Laura Hill. Project Description ε Project Proposal Epsilon Randy Smith, Owen Densmore Glenn Scott, Laura Hill Project Description The everyday things around us are becoming digital. Devices can achieve flexibility by being small, independent,

More information

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich

More information

Peer-to-Peer Systems. Internet Computing Workshop Tom Chothia

Peer-to-Peer Systems. Internet Computing Workshop Tom Chothia Peer-to-Peer Systems Internet Computing Workshop Tom Chothia Plagiarism Reminder Plagiarism is a very serious offense. Never submit work by other people without clearly stating who wrote it. If you did

More information

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input. MOBILE COMPUTING CSE 40814/60814 Spring 2018 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

JXTA TM Technology for XML Messaging

JXTA TM Technology for XML Messaging JXTA TM Technology for XML Messaging OASIS Symposium New Orleans, LA 27-April-2004 Richard Manning Senior Software Architect Advanced Technology & Edge Computing Center Sun Microsystems Inc. www.jxta.org

More information

User Manual. Mobile Viewer Mobile Manager Software (MMS) 1 st Edition : 10 Jan nd Edition : 31 Mar rd Edition : 20 May 2010

User Manual. Mobile Viewer Mobile Manager Software (MMS) 1 st Edition : 10 Jan nd Edition : 31 Mar rd Edition : 20 May 2010 Mobile Viewer Mobile Manager Software (MMS) User Manual The picture might differ according to the specification and model. Contents of this manual are protected under copyrights and computer program laws.

More information

HCI FOR IPHONE. Veronika Irvine PhD Student, VisID lab University of Victoria

HCI FOR IPHONE. Veronika Irvine PhD Student, VisID lab University of Victoria HCI FOR IPHONE Veronika Irvine PhD Student, VisID lab University of Victoria Technologies of the Decade http://spectrum.ieee.org/static/special-report-top-11-technologies-of-the-decade No. 1 Smart Phones

More information

CHAPTER 03: MULTIMEDIA & OPERATING SYSTEM. :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~

CHAPTER 03: MULTIMEDIA & OPERATING SYSTEM. :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~ CHAPTER 03: MULTIMEDIA & OPERATING SYSTEM :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~ 1 Operating System and Software Computer Operating System An operating

More information

Competence. e-learning. Patrick Krekelberg, Allen Interactions.

Competence. e-learning. Patrick Krekelberg, Allen Interactions. 710 711 The Apple Training iphone Excellence Practical Uses Starts with in Corporate Training Competence e-learning Patrick Krekelberg, Allen Interactions www.elearningguild.com iphone and elearning Patrick

More information

Quality of service issues for world-wide mobile telephony

Quality of service issues for world-wide mobile telephony Quality of service issues for world-wide mobile telephony Gregor v. Bochmann e-mail: bochmann@site.uottawa.ca School of Information Technology and Engineering (SITE) University of Ottawa This presentation

More information

White Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web

White Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web White Paper EVERY THING CONNECTED Is Putting Every Physical Thing Every Thing Connected The Internet of Things a term first used by technology visionaries at the AUTO-ID Labs at MIT in the 90s 1 has received

More information

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input. MOBILE COMPUTING CSE 40814/60814 Spring 2017 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

How to make an AES70 controller

How to make an AES70 controller AES 143 Network Audio Track How to make an AES70 controller Session NA10 October 21, 2017 1 Agenda AES70 Concepts for Controllers Morten Lave, Principal, All Access Consulting Issues in Controller Design

More information

Types and Methods of Content Adaptation. Anna-Kaisa Pietiläinen

Types and Methods of Content Adaptation. Anna-Kaisa Pietiläinen Types and Methods of Content Adaptation Anna-Kaisa Pietiläinen Agenda Introduction Multimedia Content Types Types of Adaptation Methods of Adaptation Conclusion Networks 2 Introduction Networks 3 The Problem

More information

Network Guide for Listen Everywhere

Network Guide for Listen Everywhere Network Guide for Listen Everywhere Overview: The Listen Everywhere (LE) System is designed to be used on pre-existing wireless networks and to be plug and play. However, it may be necessary to have an

More information

Smart City, Internet of Things, Security and Privacy

Smart City, Internet of Things, Security and Privacy Smart City, Internet of Things, Security and Privacy Peter Waher Abstract. This course contains a series of lectures and practical laboratory assignments spanning four days that provide the participants

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

The network requirements can vary based on the number of simultaneous users the system will need to support. The most basic requirements are:

The network requirements can vary based on the number of simultaneous users the system will need to support. The most basic requirements are: NETWORK CONFIGURATION GUIDE Listen EVERYWHERE (LE) was designed to be used on pre-existing wireless networks as a plug-and-play system, however it might be necessary to have an IT/Network Administrator

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Prof Cecilia Mascolo About Me time In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

A Framework for Mobile Interactions with the Physical World

A Framework for Mobile Interactions with the Physical World A Framework for Mobile Interactions with the Physical World Enrico Rukzio 1, Sergej Wetzstein 1, Albrecht Schmidt 2 1 Media Informatics Group, 2 Embedded Interaction Group, University of Munich {Enrico.Rukzio,

More information

CptS 464/564 Lecture 18

CptS 464/564 Lecture 18 CptS 464/564 Lecture 18 2nd November 2004 Checkpoint What have we covered so far? Paradigms and Models: frameworks for the discussion of DS What is the plan ahead? Next: examples of distributed systems

More information

Easy to connect to internet & browse or listen to music or videos A range of software and programs can be used for home, business, education etc

Easy to connect to internet & browse or listen to music or videos A range of software and programs can be used for home, business, education etc EIT, Author Gay Robertson, 2016 Desktop PC Made up of system unit, keyboard, monitor, mouse Relatively cheap but not portable and take up a lot of space Are versatile You can add extras for speed or storage

More information

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive

More information

Lecture 04 Introduction: IoT Networking - Part I

Lecture 04 Introduction: IoT Networking - Part I Introduction to Industry 4.0 and Industrial Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 04 Introduction: IoT Networking

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

What s the magic of real-time video streaming with hyper-low latency?

What s the magic of real-time video streaming with hyper-low latency? What s the magic of real-time video streaming with hyper-low latency? A technical overview about streaming infrastructure solutions and transfer protocols. Development and improvement two big words united

More information

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING IT1452 Fundamentals Of Pervasive Computing 1 KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING Year / Sem : IV

More information

Location-based Services in Ubiquitous Computing Environments

Location-based Services in Ubiquitous Computing Environments Location-based Services in Ubiquitous Computing Environments National Institute of Informatics Email: ichiro@nii.ac.jp Outline 1. Motivation 2. Approach 3. Design and Implementation 4. Applications 5.

More information

Ad Hoc Networks - Applications and System Design

Ad Hoc Networks - Applications and System Design Ad Hoc Networks - Applications and System Design Prof Sanjay Srivastava DA-IICT, Gandhinagar Modelling and Analysis Group of NeTworks (MAGNeT) Two day workshop on Ad Hoc Networks: Design, Applications,

More information

Open challenges in ubiquitous and net-centric computing middleware

Open challenges in ubiquitous and net-centric computing middleware Open challenges in ubiquitous and net-centric computing middleware bodhuin/canfora/preziosi/tortorella@unisannio.it RCOST Research Centre On Software Technology University of Sannio Benevento, Italy Thierry

More information

Security of Mobile Ad Hoc and Wireless Sensor Networks

Security of Mobile Ad Hoc and Wireless Sensor Networks Security of Mobile Ad Hoc and Wireless Sensor Networks July, 2013 Edward Bonver LA Board Member Symantec Corporation edward@owasp.org Copyright The Foundation Permission is granted to copy, distribute

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

Technology Overview. Gallery SIENNA London, England T

Technology Overview. Gallery SIENNA London, England T Technology Overview Gallery SIENNA London, England T +44 208 340 5677 sales@sienna.tv www.sienna.tv http://ndi.newtek.com SIENNA Cloud for NDI An IP Video Protocol which works today NDI Protocol The NDI

More information

How to Secure ipads, Tablets and Android Devices for Corporate Use. John Masserini CISO Dow Jones

How to Secure ipads, Tablets and Android Devices for Corporate Use. John Masserini CISO Dow Jones How to Secure ipads, Tablets and Android Devices for Corporate Use John Masserini CISO Dow Jones VIDEO / COMMUNITY 5.6 million streams each month 140,400 WSJ.com Community members 200,000 MarketWatch.com

More information

BYOD Signals & Connectivity. Integrating Mobile Devices with Fixed AV Systems. Joe Cornwall, CTS-D. Technologoy Evangelist l Legrand NA

BYOD Signals & Connectivity. Integrating Mobile Devices with Fixed AV Systems. Joe Cornwall, CTS-D. Technologoy Evangelist l Legrand NA Integrating Mobile Devices with Fixed AV Systems BYOD Signals & Connectivity Joseph D. Cornwall, CTS-D Joe Cornwall, CTS-D Technologoy Evangelist l Legrand NA Equip yourself for your own needs. Patti Digh,

More information

Brief Intro on Mobile Platforms and Dev. Tools

Brief Intro on Mobile Platforms and Dev. Tools Brief Intro on Mobile Platforms and Dev. Tools Top Mobile Operating Systems!! - Android by Google Inc. - ios by Apple Inc. - BlackBerry OS by RIM - Symbian OS by Nokia and Accenture - Windows 8 by Microsoft

More information

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom

More information

Mobility and Media. How mobile computing is evolving at HP. Mark Smith Mobile and Media Systems Lab Hewlett Packard Laboratories

Mobility and Media. How mobile computing is evolving at HP. Mark Smith Mobile and Media Systems Lab Hewlett Packard Laboratories Mobility and Media How mobile computing is evolving at HP Mark Smith (msmith@hpl.hp.com) Mobile and Media Systems Lab Hewlett Packard Laboratories 2004 Hewlett-Packard Development Company, L.P. The information

More information

Joseph D. Cornwall, CTS-D Technology Evangelist

Joseph D. Cornwall, CTS-D Technology Evangelist Joseph D. Cornwall, CTS-D Technology Evangelist Our Agenda Why BYOD? Wireless Challenges Parrots, Reflectors and Servers MirrorOp Foundations USB, DisplayPort and HDMI The Coming Revolution In C 1.62 Billion

More information

What? Why? How? Dave Botherway November

What? Why? How? Dave Botherway November What? Why? How? Dave Botherway November - 2016 Connecting any Computer-type devices PCs, Tablets, Phones, GPS Smart TV, Smart Watches, Fitbit-type devices Printers, Modems, Routers, Network Storage Keyboards,

More information

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, 53851 Lappeenranta, Finland arto.hamalainen@lut.fi Jari Porras Lappeenranta University

More information

vsolution Cynap Pure Network Integration

vsolution Cynap Pure Network Integration vsolution Cynap Pure Network Integration 1. Basics... 2 2. Glossary... 2 2.1. LAN / Ethernet settings... 2 2.2. WLAN settings access point... 3 2.3. WLAN settings infrastructure (Cynap Pure acts as client)...

More information

TCG Physical Security Interoperability Alliance IP Video Use Case 002 (PSI-UC-IPV002) Specification Version 1.0 Revision 0.2

TCG Physical Security Interoperability Alliance IP Video Use Case 002 (PSI-UC-IPV002) Specification Version 1.0 Revision 0.2 TCG Physical Security Interoperability Alliance IP Video Use Case 002 (PSI-UC-IPV002) Specification Version 1.0 Revision 0.2 Revision History Description Date By Version 1.0 Rev 0.1 Initial Draft August

More information

Integrating Handhelds into Environments of Cooperating Smart Everyday Objects

Integrating Handhelds into Environments of Cooperating Smart Everyday Objects Integrating Handhelds into Environments of Cooperating Smart Everyday Objects Frank Siegemund and Tobias Krauer Institute for Pervasive Computing Department of Computer Science ETH Zurich, Switzerland

More information