Ubiquitous Computing Systems
|
|
- Opal Clarissa Perkins
- 6 years ago
- Views:
Transcription
1 SeoulTech UCS Lab st Ubiquitous Computing Systems JeongKyu Lee
2 목차 Ubiquitous Computing Systems 1. Introduction 2. Ubicomp Systems Topics and Challenges 2.1 Resource-Constrained Devices 2.2 Volatile Execution Environments 2.3 Heterogenous Execution Environments 2.4 Fluctuating Usage Environments 2.5 Invisible Computing 2.6 Security and Privacy 2.7 Summary 3. Creating Ubicomp Systems 3.1 Why Duild Ubicomp Systems? 3.2 Setting Your Objectives 3.2.1Testing Your Ideas 3.3 Designing Good Systems Computational Knowledge of the Physical World Seamfulness, Sensibility, and Tolerant Ignorance User Mental Model and Responsibility It Is Always Runtime Handling Transient Connections The State of the World Is It Working? 3.4 Summary 2
3 1. Introduction 1.1 Ubiqutious Computing : Simple and safe anywhere get on necessary information from a variety of networking. Definitions - researcher in the Computer Science Lab at Xerox s PARC (Palo Alto Research Center) - first articulated the idea of ubiquitous computing in Medals for all objects inserted into intelligent computing capabilities 3
4 1. Introduction 1.1 Ubiqutious Computing Ubicomp is a post-desktop model of human computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. Integrate computers seamlessly into the world invisible, everywhere computing. Often called pervasive/invisible computing. Computers are mostly not invisible, they dominate interaction with them. Ubicomp is about making computers invisible. 4
5 1. Introduction 1.1 Ubiqutious Computing Definitions Ubiquitous Computing Virtual Reality Physical space + Electronic space Real Environment Ubiquitous Computing Environment 5 Virtual Environment
6 1. Introduction 1.2 Ubiqutious Computing Requirement (5C, 5A) Communication 6
7 1. Introduction Ubiquitous computing Mobile computing Intelligent environment. Technology View Computers everywhere embedded into fridges, washing machines, door locks, cars, furniture. Intelligent environment. Mobile portable computing devices Wireless communication seamless mobile/fixed. User View Invisible implicit interaction with your environment. Augmenting human abilities in context of tasks 7
8 1. Introduction 1.3 Ubiqutious Computing Characters - Mark Weiser (1952~1999) Characteristics Connected Invisible/Pervasive Calm Technology AnyTime, AnyWhere Description Interconnected in any network all objects are to exchange information. Invisible interface. Personalised service. Intelligent computer provides services to meet the user's own environment. Overcome the limitations of time and space. Possible to use a computer anywhere in the real world. 8
9 1. Introduction 1.3 Ubiqutious Computing Character Technology Device Technology Network Technology Sensing Technology Context awareness Technology Interaction Technology Security Technology Description IT SoC(System on Chip), MEMS, Nano Technology(NT), Battery BcM, IPv6, Wireless, Blue tooth, Grid, etc. RFID Technology, Sensor Network - Users and a user wants to recognize information on the environment type, - Context definition and representation techniques (Semantic Web) - Middleware for the delivery status information More convenient computing environment through the realization of human-centered user interface DRM(Digital Right Management) AAA(Authentication, Authorization, Accounting) Security Protocol technology 9
10 2. Ubicomp Systems Topics and Challenges 2.1 Resource-Constrained Devices (1/2) Moore s law has resulted into highly powerful PCs Fast CPUs Large memory sizes High network bandwidth Many UbiComp devices like PDAs, smart-phones, music players etc have significantly less resources than PCs Resource-aware computing An approach to develop technologies where the application is constantly notified about the consumption of vital resources, and can help the application (or the user) to take a decision based on available resources now and in the future 10
11 2. Ubicomp Systems Topics and Challenges 2.1 Resource-Constrained Devices (2/2) Examples Media streaming adjusted to available network bandwidth/battery Display brightness adjusted to prolong battery life Most constrained resources Energy One of the main hardware constraints to consider when building UbiComp systems and applications is power consumption and/or opportunities for energy harvesting including recharging Foraging: Collecting energy from the environment (e.g. kinetic energy from a walking person) Cyber foraging: Offloading resource-heavy tasks (e.g. to dedicated or shared servers) 11
12 2. Ubicomp Systems Topics and Challenges 2.2 Volatile Exrcution Environments (1/2) Service discovery Technology and standards enabling devices to discover each other, set up connections and start using each other s services Example: When a small portable device enters a smart space it might want to start using its displays, printers, etc Existing technologies Jini, UPnP Bonjour/Multicast DNS (mdns) Bluetooth discovery protocol Limitations Still, all these technologies fail to enable discovery beyond LANs Cumbersome use (e.g. Bluetooth need for PIN number) 12
13 2. Ubicomp Systems Topics and Challenges 2.2 Volatile Exrcution Environments (2/2) UbiComp and Distributed Systems Spontaneous changes Viewing UbiComp from a Distributed Systems perspective, the most important challenge is that of spontaneous changes: Mobile devices might appear or disappear without warning (because of physical movement, battery depletion, network error, etc) Appropriate handling of such spontaneous disconnections us needed More volatility factors exist, such as changes to the network topology Volatility in Distributed System While volatility is a known problem also for traditional distributed systems, UbiComp differs in that the connectivity changes are common rather than exceptional, and often of a more basic nature 13
14 2. Ubicomp Systems Topics and Challenges 2.3 Heterogeneous Execution Environments (1/2) Heterogeneity A UbiComp application also involves a wide range of possibly heterogeneous hardware and software: Devices and hardware components Network technology Operating Systems Input/Output capabilities Resources Sensors 14
15 2. Ubicomp Systems Topics and Challenges 2.3 Heterogeneous Execution Environments (2/2) UbiComp Applications Unlike traditional applications, in UbiComp applications do not reside on one or two at most computers but rather span several devices which need to closely coordinate their operation in order to make up the application 15
16 2. Ubicomp Systems Topics and Challenges 2.4 Fluctuating User Environments (1/2) Contemporary Computing - Users use PCs for information access on a one-to-one relationship Ubiquitous Computing - The same device might be used by several users and a user might use several devices - Many-to-many relationship between users and devices - Doing a task is no longer tied to one device, but rather it is distributed across several heterogeneous devices Challenges - Technology is overwhelming users with the need to set up and manage - Calm technology and invisible computing is the opposite of that 16
17 2. Ubicomp Systems Topics and Challenges 2.4 Fluctuating User Environments (2/2) Changing location of users Location-based computing Example: Tour guides Varying user context Context-aware computing Includes information about who is using the application, who is nearby, ambient environment details, etc Example: A smart conference room which adjusts temperature, lighting and whiteboard contents based on the users present Fluctuating user activity Activity-based computing Example: Smart hospital where personnel need to coordinate their activities based on the multiple patients they are attending to 17
18 2. Ubicomp Systems Topics and Challenges 2.5 Invisible Computing (1/2) One of the core elements of Weiser s vision of UbiComp Example: A smart home that transparently monitors its users so that It can automatically adjust the heating/ventilation/air conditioning The computers are invisible to the users in a double sense 1. The computers are embedded into buildings, furniture, medical devices, etc physical invisibility 2. The computers operate in the periphery of the users attention and are hence imperceptible mental invisibility Why is invisibility a major departure from traditional computing? Because traditional systems rely heavily on having the users attention explicitly 18
19 2. Ubicomp Systems Topics and Challenges 2.5 Invisible Computing (2/2) Challenge: Invisible Computing Significant research effort towards invisible computing Autonomic computing Systems that are capable of self-management Example: Mainly, cluster-based server architectures Proactive computing Anticipate failures and prepare for exception handling Example: Offload a mobile agent when a device s battery is running out or proactively download resources before leaving network coverage Graceful degradation Computers should not depend on volatile resources (such as networking) and be prepared to operate also when some are unavailable 19
20 2. Ubicomp Systems Topics and Challenges 2.6 Security Interactions will be cross multiple organisational boundaries specification, analysis and integration for heterogeneous OS, databases, firewalls, routers. Everything worth hacking gets hacked. Need for secure out of the box set up that can identify friend or foe level of trust. Small communicators, with confidential data, are easily lost or stolen biometric authentication. Necessary security technology exists. 20
21 2. Ubicomp Systems Topics and Challenges 2.6 Privacy Location service tracks movement to within metres. Clearly indicate you are being sensed or recorded + user control to stop recording or control distribution of information. You are now predictable System can co-relate location, context and behaviour patterns Do you want employer, colleagues or insurance company to know you carry a medical monitor? Tension between authentication and anonymity business want to authenticate you for financial transactions and to provide personalized service web sites. Constant spam of context dependent advertising 21
22 2. Ubicomp Systems Topics and Challenges Ubiquitous/Pervasive Computing Focus usually on technical challenges Other challenges: design challenges, human-computer interaction, real-time deployment, etc. Builds on previous work in the areas of - Distributed Systems - Mobile Computing 22
23 2. Ubicomp Systems Topics and Challenges Challenges What are some of the challenges in UbiComp systems research? How to design hardware and Operating Systems for sensors and embedded devices? How to allow devices to find one another and use the services of each other? How to support resource impoverished devices that run on batteries? How to enable seamless mobility and collaboration in smart spaces such as smart rooms and hospitals? Overlap with other systems research questions But unique set of challenges in UbiComp systems 23
24 2. Ubicomp Systems Topics and Challenges Nanotechnology (1/2) The trend toward miniaturization of computer components down to an atomic scale is known as nanotechnology 24
25 2. Ubicomp Systems Topics and Challenges Nanotechnology (2/2) Mobile data technology GSM, GPRS, UMTS, CDMA, WAP, Imode Wireless data technology Bluetooth, b Internet data technology IP over optical, Broadband Content services Web & WAP Applications Multimedia, Internet messaging 25
26 3. Creating Ubicomp Systems 3.1 Why Bulid Ubicomp Systems? Prototyping future systems to explore ubiquity in practice Empirical exploration of user reactions to ubicomp Gathering datasets to tackle computational problems relating to ubicomp Creating ubicomp experiences for public engagement or performance Creating research test beds to agglomerate activity and stimulate further research To explore a hypothesis concerning ubicomp more naturalistically To test the limits of computational technologies in a ubicomp setting Addressing the perceived needs of a problem domain or pressing societal issue 26
27 3. Creating Ubicomp Systems 3.2 Setting Your Objectives Testing Your Ideas Low-fidelity prototypes, which can be simple scenarios that can be discussed, paper prototypes, or even models of devices or graphical story boards of proposed interactions anything that can add richness to the discussion of the system with potential users. Video prototypes, although considerably requiring more effort to create, can communicate the concepts in the system quite effectively and act as a useful reference for explaining the system later on. Rapid prototypes of user interfaces using prototyping toolkits (see Section 2.6) can afford a more realistic synthesis of the intended user experience. Wizard of Oz prototypes of parts of the system may allow the final behavior of the system to be emulated and thus experienced by others. 27
28 3. Creating Ubicomp Systems 3.3 Designing Good Systems Computational Knowledge of the Physical Word From a systems design perspective, it is far from clear what the interfaces and internals of a ubicomp system should be, necessitating an experimental approach. 1. What can be reliably sensed 2. What can be reliably known? 3. What can be reliably inferred? 28
29 3. Creating Ubicomp Systems 3.3 Designing Good Systems Seamfulness, Sensibility, and Tolerant Ignorance Pessimistic: Only show information that is known to be correct Optimistic: Show everything as if it were correct Cautious: Explicitly present uncertainty Opportunistic: Exploit uncertainty (cf. Gaver et al., 2003) 29
30 3. Creating Ubicomp Systems 3.3 Designing Good Systems User Mental Model and Responsibility The frequency or inconvenience of potential user involvement The severity or undesirability of the consequences if the system gets it wrong The reliability of detecting the appropriate moment and appropriate action The acceptability to the user of automating the behavior 30
31 3. Creating Ubicomp Systems 3.3 Designing Good Systems It Is Always Runtime 1. Systems requiring a carefully contrived startup order are likely to fail. 2. If the availability of elements may be sporadic, your system should be able to gracefully handle disconnection and reconnection or rebinding to alternate services. 3. Assume that individual components may fail or be temporarily isolated (which is especially true of so"ware elements on mobile devices) and design your system accordingly so that state can be recovered. 4. Decide proactively how to handle data when an element is disconnected: are the data kept (e.g., bu#ered) until reconnection, and if so, how much will you bu#er before discarding. What strategy will you choose to decide which data to keep or discard (oldest, f reshest, resample, etc.)? 5. Consider including version information in protocols used in systems designed to run longitudinally to at least identify version mismatches. 31
32 3. Creating Ubicomp Systems 3.3 Designing Good Systems Handling Transient Connections - Network connections (or the lack or failure thereof) can have profound effects on the performance of ubicomp systems and, crucially, the end user experience Handling Transient Connections - Transient connections and component failures have an impact on how consistent the state of your overall system will be. It is important to design in strategies for recovering from both of these cases. Parts of your system may be replicable or sufficiently available to use wellknown techniques to mask such failures and achieve some degree of fault tolerance. However, in many ubicomp systems, software components are often intimately linked to specialist or personal hardware, or may be placed in unique locations, which makes traditional techniques involving redundant replication or fail-over inappropriate. 32
33 3. Creating Ubicomp Systems 3.3 Designing Good Systems Is It Working? Use of conventional mechanisms such as log files and network packet tracing to passively monitor running components Including status protocol messages that can be intercepted (often as periodic heartbeat messages) Adding status displays including use of hardware such as LED blink sequences, audible and visual feedback Including diagnostic interfaces such as embedded web servers that can be interrogated Enabling remote access to components such as remote shells, etc. Externalizing of state or communications by using a middleware such as a publish-subscribe event channel, Tuple Space, Message Oriented Middleware, etc. 33
34 3. Creating Ubicomp Systems Management Huge, complex systems - Billions of processors - Multiple organisations - Managing physical world, controlling sensors, actuators Hacker and virus paradise System propagates false information about individuals or organisation. Complexity of s/w installation on a workstation or server how do you cope with billions? 34
35 3. Creating Ubicomp Systems Proposed Management Solution Intelligent agents, mobile agents, policy. QoS Management Fat pipes and large storage can convert media streams to short traffic bursts in core network but still needed for wireless links. Adaptive self-management is the only answer Partitioned domains of responsibility Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions for short term decision making 35
36 Reference John Krumm Ubiquitous Computing Fundamentals Weiser, Gold and Brown The origins of ubiquitous computing research at PARC in the late 1980s IBM Systems Journal, VOL 38, NO 4,
37 Q & A 37
38 Thank you 38
Mobile and Ubiquitous Computing
Mobile and Ubiquitous Computing Today l Mobile, pervasive and volatile systems l Association and Interoperation l Sensing context and adaptation RIP? How is mobility different Mobile elements are resource-poor
More informationUbiquitous Computing. Ambient Intelligence
Ubiquitous Computing Ambient Intelligence CS4031 Introduction to Digital Media 2016 Computing Evolution Ubiquitous Computing Mark Weiser, Xerox PARC 1988 Ubiquitous computing enhances computer use by making
More informationMobile and Ubiquitous Computing
Mobile and Ubiquitous Computing Today l Volatile systems l Association and Interoperation l Sensing context and adaptation Volatile systems " Mobile computing Exploiting the connectedness of devices as
More informationPage 1. Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer. Topics for Today. Ubiquitous Computing Fundamentals
Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer Shwetak N. Patel 2 Topics for Today Ubiquitous Computing Fundamentals Review the history of ubiquitous computing (ubicomp)
More informationUbiquitous Computing Introduction
Ubiquitous Introduction University of Innsbruck WS 2010/2011 Prof. Dr. Thomas Strang thomas.strang@uibk.ac.at Where it all started The term Ubiquitous 1 goes back to the late Mark Weiser, who wrote 1991
More informationA Very Short Introduction to Pervasive Computing
A Very Short Introduction to Pervasive Computing Nicola Dragoni Embedded Systems Engineering Section DTU Informatics Technical University of Denmark These slides have been found on the Web and adapted
More informationFigure Potential 5G applications
6. 5G Key Concept 6.1 Key Concepts of 5G End-to-end (E2E) quality required by applications and/or users will be far more diversified in the 5G era than what we have seen in the preceding generations. For
More informationVersion 11
The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic
More informationComputing Technologies
Computing Technologies Computing CPU, Memory, Communication Ubiquitous everywhere indefinite number of times Not really possible or desirable more than in traditional computing so widespread that unnoticed
More informationSystem Challenges for Pervasive and Ubiquitous Computing
System Challenges for Pervasive and Ubiquitous Computing 18 th Roy Want Intel Research May 2005, ICSE 05 St. Louis th May 2005, ICSE What is Ubiquitous Computing? The most profound technologies are those
More informationCSE 535 Mobile Computing. An Overview of Mobile Computing: Part I Motivation and Challenges
CSE 535 Mobile Computing An Overview of Mobile Computing: Part I Motivation and Challenges Georgios Varsamopoulos School of Computing and Informatics Arizona State University 2 Mobile Computing The need
More informationMultiple Dimensions in Convergence and Related Issues
Multiple Dimensions in Convergence and Related Issues S.R. Subramanya LG Electronics CDG Technology Forum Las Vegas, Oct. 7, 2005 LGE Mobile Research, USA Talk Outline Introduction» Convergence Layers
More informationSome Computer Science Issues in
Some Computer Science Issues in Ubiquitous Computing Communications of the ACM (CACM) Vol. 36, No.7, July 1993 M. Weiser Presented by Hwajung Kim (hkim@dcslab.snu.ac.kr) DCSLab, SNU Table of Contents Background
More informationUbiquitous Computing
Ubiquitous Computing Potentials & Challenges Jaydip Sen Senior Scientist, Wireless Research Group, Innovation Lab Tata Consultancy Services, Kolkata, INDIA Outline of the Talk The Vision of UbiComp --
More informationMobile Middleware Course. Introduction and Overview Sasu Tarkoma
Mobile Middleware Course Introduction and Overview Sasu Tarkoma Contents Course outline Motivation Mobile middleware overview Course Overview 4 credit course Three components Lectures Assignment Literature
More informationContext Aware Computing
CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware
More informationWireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationIntroduction to Distributed Systems. INF5040/9040 Autumn 2018 Lecturer: Eli Gjørven (ifi/uio)
Introduction to Distributed Systems INF5040/9040 Autumn 2018 Lecturer: Eli Gjørven (ifi/uio) August 28, 2018 Outline Definition of a distributed system Goals of a distributed system Implications of distributed
More informationMobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems
Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems Based on materials by Prof. Paulo Ferreira Introduction Evolution Wheredo wewantto go? Challenges last class Basic Definitions
More informationLecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday
Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive
More informationMobile Ad Hoc Networks: Basic Concepts and Research Issues
Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full
More informationIntroduction to Distributed Systems (DS)
Introduction to Distributed Systems (DS) INF5040/9040 autumn 2014 lecturer: Frank Eliassen Frank Eliassen, Ifi/UiO 1 Outline Ø What is a distributed system? Ø Challenges and benefits of distributed systems
More informationIntroduction to Mobile Ubiquitous Computing Systems
CPET 565 Mobile Computing Systems CPET/ITC 499 Mobile Computing Lecture 1 Introduction to Mobile Ubiquitous Computing Systems Paul I-Hai Lin, Professor Spring 2016 A Specialty Course Purdue University
More informationIPv6-based Beyond-3G Networking
IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless
More informationITU-T Y Overview of ubiquitous networking and of its support in NGN
International Telecommunication Union ITU-T Y.2002 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2009) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
More informationDistributed Systems Conclusions & Exam. Brian Nielsen
Distributed Systems Conclusions & Exam Brian Nielsen bnielsen@cs.aau.dk Study Regulations Purpose: That the student obtains knowledge about concepts in distributed systems, knowledge about their construction,
More informationSpontaneous Interaction using Mobile Phones and Short Text Messages
Spontaneous Interaction using Mobile Phones and Short Text Messages Frank Siegemund Distributed Systems Group, Department of Computer Science, Swiss Federal Institute of Technology (ETH) Zurich, 8092 Zurich,
More informationPolicy-Based Context-Management for Mobile Solutions
Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,
More informationChallenges for Future Networked Embedded Systems
Challenges for Future Networked Embedded Systems I.G. Niemegeers Centre for Wireless and Personal Communication (CWPC) Delft University of Technology PROGRESS Workshop 2006 Networks and Connected Systems
More informationUnit 1: Introduction to Ubiquitous Services
Ubiquitous and Secure Networks and Services Redes y Servicios Ubicuos y Seguros Unit 1: Introduction to Ubiquitous Services Lourdes López Santidrián llopez@diatel.upm.es, lourdes.lopez@upm.es Lourdes López
More informationDistributed Systems Conclusions & Exam. Brian Nielsen
Distributed Systems Conclusions & Exam Brian Nielsen bnielsen@cs.aau.dk Definition A distributed system is the one in which hardware and software components at networked computers communicate and coordinate
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 05 Basics of IoT Networking-Part-I In this lecture and
More informationuniversaal Architecture and The Resource Discovery
universaal Architecture and The Resource Discovery Michele Girolami ISTI-CNR Wireless Network Lab. Departimento di Informatica Università Pisa 1 Outline 1. Ambient Intelligence and AAL 2. The universaal
More informationHCI Lecture 14. Special Issues: Ubiquitous computing
HCI Lecture 14 Special Issues: Ubiquitous computing Barbara Webb Key points: Making the computer part of the environment Mobile devices Implicit input Ambient output Continuous interaction Issues for design
More informationAn Introduction to Cyber-Physical Systems INF5910/INF9910
An Introduction to Cyber-Physical Systems INF5910/INF9910 1 Outline What is Cyber Physical Systems (CPS)? Applications Challenges Cyber Physical CPS 2 Cyber Systems Cyber is More than just software More
More informationINSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom
INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom CAUTIONARY STATEMENT This presentation may contain forward-looking statements
More informationMobile Computing Introduction
Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?
More informationDistributed Systems Question Bank UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems?
UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems? 2. What are different application domains of distributed systems? Explain. 3. Discuss the different
More informationCurrent Research Topics in Mobile Computing. Nokia. About 100 new phone models in 2003 globally. New challenges: Open platforms and SWarchitectures
Current Research Topics in Mobile Computing EmSys Summer School 2003 Salzburg Heikki.Saikkonen@nokia.com Nokia Trends in Mobile Computing Software Engineering Current Research Topics in Mobile Computing
More informationCSE 5306 Distributed Systems. Course Introduction
CSE 5306 Distributed Systems Course Introduction 1 Instructor and TA Dr. Donggang Liu @ CSE Web: http://ranger.uta.edu/~dliu Email: dliu@uta.edu Phone: 817-2720741 Office: ERB 555 Office hours: Tus/Ths
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More informationEuropean Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105
European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based
More informationMobile and ubiquitous computing. INF 5040/9040 autumn lecturer: Frank Eliassen. Frank Eliassen, SRL & Ifi/UiO 1. Home PC
Mobile and ubiquitous computing INF 5040/9040 autumn 2009 lecturer: Frank Eliassen Frank Eliassen, SRL & Ifi/UiO 1 Motivation Mobile computing is concerned with exploiting the connectedness of portable
More information3. Quality of Service
3. Quality of Service Usage Applications Learning & Teaching Design User Interfaces Services Content Process ing Security... Documents Synchronization Group Communi cations Systems Databases Programming
More informationFuture-Generation Wireless Networks: Beyond 3G and 4G.
Future-Generation Wireless Networks: Beyond 3G and 4G. Kumar Adumulla 29 March 2006 Networks 1 Outline Introduction Wireless Networking Generations Issues in 3G What is 4G Beyond 3G & 4G Conclusion References
More informationImplementing Ubiquitous Network with IPv6
Dr. Mazlan Abbas MIMOS Berhad Implementing Ubiquitous Network with IPv6 Agenda of Presentation Introduction to Ubiquitous Network IPv6 as the Core of All IP Network The Making of Ubiquitous Networks by
More informationWireless Java-enabled MIDP devices as peers in Grid infrastructure
Wireless Java-enabled MIDP devices as peers in Grid infrastructure Miika Tuisku Miika.Tuisku@cern.ch Helsinki Institute of Physics, CERN Abstract. Combining Mobile Internet and Grid technologies could
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationSecurity improvement in IOT based on Software
International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 122 Security improvement in IOT based on Software Raghavendra Reddy, Manoj Kumar, Dr K K Sharma Abstract With the
More informationUbiquitous and Context Aware Computing: Overview and Systems
Ubiquitous and Context Aware Computing: Overview and Systems Simon Bichler 1 / 30 Outline Definition and Motivation for Ubiquitous computing Context aware computing Sample Systems Discussion 2 / 30 Ubiquitous
More informationReferences. The vision of ambient intelligence. The missing component...
References Introduction 1 K. Sohraby, D. Minoli, and T. Znadi. Wireless Sensor Networks: Technology, Protocols, and Applications. John Wiley & Sons, 2007. H. Karl and A. Willig. Protocols and Architectures
More informationIEEE networking projects
IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified
More informationIntroducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN
Avaya-FatPipe Solution Overview Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN The Avaya SDN-Fx and FatPipe Networks solution provides a fabric-based SDN architecture for simplicity
More informationKaspersky Open Space Security
Kaspersky Open Space Security Flexible security for networks and remote users Kaspersky Open Space Security Kaspersky Open Space Security offers new flexibility to network security by extending beyond
More informationIntroduction to Distributed Systems (DS)
Introduction to Distributed Systems (DS) INF5040/9040 autumn 2009 lecturer: Frank Eliassen Frank Eliassen, Ifi/UiO 1 Outline What is a distributed system? Challenges and benefits of distributed system
More informationIntroduction to Distributed Systems
Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]
More informationBASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide
BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide Last Updated 8 March 2016 Contents Introduction... 2 1 Key point of contact... 2 2 Third Part IT Specialists... 2 3 Acceptable use of Information...
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationLocation-based Services in Ubiquitous Computing Environments
Location-based Services in Ubiquitous Computing Environments National Institute of Informatics Email: ichiro@nii.ac.jp Outline 1. Motivation 2. Approach 3. Design and Implementation 4. Applications 5.
More informationRegulation and the Internet of Things
Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions
More informationJXTA for J2ME Extending the Reach of Wireless With JXTA Technology
JXTA for J2ME Extending the Reach of Wireless With JXTA Technology Akhil Arora Carl Haywood Kuldip Singh Pabla Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA 650 960-1300 The Wireless
More informationDistributed Systems Principles and Paradigms
Distributed Systems Principles and Paradigms Chapter 01 (version September 5, 2007) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.
More informationSolution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management
Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management Copyright Nuvon, Inc. 2007, All Rights Reserved. Introduction The need to improve the quality and accessibility
More informationMiddleware for Ubiquitous Computing
Middleware for Ubiquitous Computing Software Testing for Mobile Computing National Institute of Informatics Ichiro Satoh Abstract When a portable computing device is moved into and attached to a new local
More informationContext-Awareness and Adaptation in Distributed Event-Based Systems
Context-Awareness and Adaptation in Distributed Event-Based Systems Eduardo S. Barrenechea, Paulo S. C. Alencar, Rolando Blanco, Don Cowan David R. Cheriton School of Computer Science University of Waterloo
More informationAlma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering
Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains
More information5G radio access. ericsson White paper Uen June research and vision
ericsson White paper 284 23-3204 Uen June 2013 5G radio access research and vision 5G will enable the long-term Networked Society and realize the vision of unlimited access to information for anyone and
More informationMobile Cloud Computing: Issues, Challenges and Future Trends
Mobile Cloud Computing: Issues, Challenges and Future Trends In Partial fulfillment of the requirements for course CMPT 890 Presented by: Ahmed Abdel Moamen Agents Lab 1 Introduction It is widely believed
More informationPortable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
More informationUnit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15
Unit 46: Network Security Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with opportunities to manage, support and implement a secure network infrastructure
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed
More informationPervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38
Department of Computer Science & Information Technology University of Balochistan Course Objectives To discuss the fundamental problems in the emerging area of mobile and pervasive computing, along with
More informationReliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications
Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications Octav Chipara University of Iowa https://cs.uiowa.edu/~ochipara 1 Detecting clinical deterioration at low cost Clinical
More informationRequirements for the Operations & Management of 4G Networks
Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering
More informationCore Embedded Systems
Grand Challenges in Cyber Physical The Next Generation Tarek Abdelzaher Department of Computer Science University of Illinois at Urbana Champaign Core Core Challenges: Dependability Hardware/Software Co-Design
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationActive source routing for ad-hoc network: seamless integration of wireless environment
Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots
More informationIPv6 Deployment Overview & Policy Update
IPv6 Deployment Overview & Policy Update Takuya MIYOSHI Internet Policy Office Ministry of Internal Affairs and Communications, Japan 24 th February, 2005 History and Acceleration of Japan s IT Strategy
More informationDENETS HIDENETS DENETS. Highly Dependable IP-based Networks and Services (FP6 STREP, Jan Dec 2008)
HI Highly Dependable IP-based Networks and Services (FP6 STREP, Jan. 2006-Dec 2008) End-to-end resilience solutions for vehicular scenarios 1 HI Partners 2 Overview The HI project: goals and challenges
More informationCybersecurity ecosystem and TDL Antonio F. Skarmeta
Cybersecurity ecosystem and TDL Antonio F. Skarmeta University of Murcia (UMU) SPAIN CyberSecurity Challenges in a fully connected World Trust Framework 1. Policies for trust in heterogeneous
More informationKollaborative Ambient Systems Von einfachen Steuerungen zu komplexen vernetzten und. interaktiven Systemen
Kollaborative Ambient Systems Von einfachen Steuerungen zu komplexen vernetzten und interaktiven Systemen Norbert Wehn wehn@eit.uni-kl.de //ems.eit.uni-kl.de SymanO 2013 March 2013, Mannheim History of
More informationA Grid Service Infrastructure for Mobile Devices
A Grid Service Infrastructure for Mobile Devices Tao Guan, Ed Zaluska, and David De Roure Electronics and Computer Science, University of Southampton, UK, SO17 1BJ {tg04r, ejz, dder}@ecs.soton.ac.uk Abstract.
More informationMobility and Media. How mobile computing is evolving at HP. Mark Smith Mobile and Media Systems Lab Hewlett Packard Laboratories
Mobility and Media How mobile computing is evolving at HP Mark Smith (msmith@hpl.hp.com) Mobile and Media Systems Lab Hewlett Packard Laboratories 2004 Hewlett-Packard Development Company, L.P. The information
More informationGPRS billing: getting ready for UMTS
GPRS billing: getting ready for UMTS In his first article about UMTS, Lucas Baugé looks into the key challenges of GPRS billing. He seeks to show how solving these challenges will help operators succeed
More informationInternational Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN
International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization
More informationICT-SHOK Project Proposal: PROFI
ICT-SHOK Project Proposal: PROFI Full Title: Proactive Future Internet: Smart Semantic Middleware Overlay Architecture for Declarative Networking ICT-SHOK Programme: Future Internet Project duration: 2+2
More informationIntroduction. Distributed Systems IT332
Introduction Distributed Systems IT332 2 Outline Definition of A Distributed System Goals of Distributed Systems Types of Distributed Systems 3 Definition of A Distributed System A distributed systems
More informationTrust Harris for LTE. Critical Conditions Require Critical Response
Trust Harris for LTE Critical Conditions Require Critical Response Harris LTE Solution Harris LTE Solution Harris LTE Networks Critical Conditions Require Critical Response. Trust Harris for LTE. Public
More informationIntroduction Distributed Systems
Introduction Distributed Systems Today Welcome Distributed systems definition, goals and challenges What is a distributed system? Very broad definition Collection of components, located at networked computers,
More informationElimination Of Redundant Data using user Centric Data in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant
More informationYear, pier University Nikos Migas PhD student 2 Supervisors: School of Computing, Na MARIAN
MARIAN Mobile Agents for Routing In Ad-hoc Networks Nikos Migas PhD student 2 nd Year, School of Computing, Napier University n.migas@napier.ac.uk Supervisors: W.Buchanan, K.McArtney Introduction MARIAN
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More informationBrowsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments
Browsing the World in the Sensors Continuum Agents and Franco Zambonelli Agents and Motivations Agents and n Computer-based systems and sensors will be soon embedded in everywhere all our everyday objects
More information4G Mobile Communications
4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to
More informationInternational Journal of Combined Research & Development (IJCRD) eissn: x;pissn: Volume: 1; Issue: 2; June 2013
Simple Applications of Smart-Classroom Mr. Parmesh V Asst. Professor, Dept. of ISE Cambridge Institute of Technology Nagpur, Maharashtra, India Abstract: This paper first presents four essential characteristics
More informationThe Ubiquitous Web. Dave Raggett, W3C Technical Plenary, March /14
The Ubiquitous Web Dave Raggett, W3C Technical Plenary, March 2005 1/14 Ubiquitous. [adj] 1. (seemingly) present everywhere simultaneously. 2. often encountered [Latin ubique everywhere] Oxford English
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is
More informationPervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008
Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Prof. D. Raychaudhuri ray@winlab.rutgers.edu www.winlab.rutgers.edu 1 Introduction: The Promise of Wireless Everywhere
More informationIntroduction. Chapter 1: Mobile Communications SS A case for mobility History of mobile communication Market Areas of research
Mobile Communications SS 2002 Chapter 1: Introduction A case for mobility History of mobile communication Market Areas of research Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02
More information