Ubiquitous Computing Systems

Size: px
Start display at page:

Download "Ubiquitous Computing Systems"

Transcription

1 SeoulTech UCS Lab st Ubiquitous Computing Systems JeongKyu Lee

2 목차 Ubiquitous Computing Systems 1. Introduction 2. Ubicomp Systems Topics and Challenges 2.1 Resource-Constrained Devices 2.2 Volatile Execution Environments 2.3 Heterogenous Execution Environments 2.4 Fluctuating Usage Environments 2.5 Invisible Computing 2.6 Security and Privacy 2.7 Summary 3. Creating Ubicomp Systems 3.1 Why Duild Ubicomp Systems? 3.2 Setting Your Objectives 3.2.1Testing Your Ideas 3.3 Designing Good Systems Computational Knowledge of the Physical World Seamfulness, Sensibility, and Tolerant Ignorance User Mental Model and Responsibility It Is Always Runtime Handling Transient Connections The State of the World Is It Working? 3.4 Summary 2

3 1. Introduction 1.1 Ubiqutious Computing : Simple and safe anywhere get on necessary information from a variety of networking. Definitions - researcher in the Computer Science Lab at Xerox s PARC (Palo Alto Research Center) - first articulated the idea of ubiquitous computing in Medals for all objects inserted into intelligent computing capabilities 3

4 1. Introduction 1.1 Ubiqutious Computing Ubicomp is a post-desktop model of human computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. Integrate computers seamlessly into the world invisible, everywhere computing. Often called pervasive/invisible computing. Computers are mostly not invisible, they dominate interaction with them. Ubicomp is about making computers invisible. 4

5 1. Introduction 1.1 Ubiqutious Computing Definitions Ubiquitous Computing Virtual Reality Physical space + Electronic space Real Environment Ubiquitous Computing Environment 5 Virtual Environment

6 1. Introduction 1.2 Ubiqutious Computing Requirement (5C, 5A) Communication 6

7 1. Introduction Ubiquitous computing Mobile computing Intelligent environment. Technology View Computers everywhere embedded into fridges, washing machines, door locks, cars, furniture. Intelligent environment. Mobile portable computing devices Wireless communication seamless mobile/fixed. User View Invisible implicit interaction with your environment. Augmenting human abilities in context of tasks 7

8 1. Introduction 1.3 Ubiqutious Computing Characters - Mark Weiser (1952~1999) Characteristics Connected Invisible/Pervasive Calm Technology AnyTime, AnyWhere Description Interconnected in any network all objects are to exchange information. Invisible interface. Personalised service. Intelligent computer provides services to meet the user's own environment. Overcome the limitations of time and space. Possible to use a computer anywhere in the real world. 8

9 1. Introduction 1.3 Ubiqutious Computing Character Technology Device Technology Network Technology Sensing Technology Context awareness Technology Interaction Technology Security Technology Description IT SoC(System on Chip), MEMS, Nano Technology(NT), Battery BcM, IPv6, Wireless, Blue tooth, Grid, etc. RFID Technology, Sensor Network - Users and a user wants to recognize information on the environment type, - Context definition and representation techniques (Semantic Web) - Middleware for the delivery status information More convenient computing environment through the realization of human-centered user interface DRM(Digital Right Management) AAA(Authentication, Authorization, Accounting) Security Protocol technology 9

10 2. Ubicomp Systems Topics and Challenges 2.1 Resource-Constrained Devices (1/2) Moore s law has resulted into highly powerful PCs Fast CPUs Large memory sizes High network bandwidth Many UbiComp devices like PDAs, smart-phones, music players etc have significantly less resources than PCs Resource-aware computing An approach to develop technologies where the application is constantly notified about the consumption of vital resources, and can help the application (or the user) to take a decision based on available resources now and in the future 10

11 2. Ubicomp Systems Topics and Challenges 2.1 Resource-Constrained Devices (2/2) Examples Media streaming adjusted to available network bandwidth/battery Display brightness adjusted to prolong battery life Most constrained resources Energy One of the main hardware constraints to consider when building UbiComp systems and applications is power consumption and/or opportunities for energy harvesting including recharging Foraging: Collecting energy from the environment (e.g. kinetic energy from a walking person) Cyber foraging: Offloading resource-heavy tasks (e.g. to dedicated or shared servers) 11

12 2. Ubicomp Systems Topics and Challenges 2.2 Volatile Exrcution Environments (1/2) Service discovery Technology and standards enabling devices to discover each other, set up connections and start using each other s services Example: When a small portable device enters a smart space it might want to start using its displays, printers, etc Existing technologies Jini, UPnP Bonjour/Multicast DNS (mdns) Bluetooth discovery protocol Limitations Still, all these technologies fail to enable discovery beyond LANs Cumbersome use (e.g. Bluetooth need for PIN number) 12

13 2. Ubicomp Systems Topics and Challenges 2.2 Volatile Exrcution Environments (2/2) UbiComp and Distributed Systems Spontaneous changes Viewing UbiComp from a Distributed Systems perspective, the most important challenge is that of spontaneous changes: Mobile devices might appear or disappear without warning (because of physical movement, battery depletion, network error, etc) Appropriate handling of such spontaneous disconnections us needed More volatility factors exist, such as changes to the network topology Volatility in Distributed System While volatility is a known problem also for traditional distributed systems, UbiComp differs in that the connectivity changes are common rather than exceptional, and often of a more basic nature 13

14 2. Ubicomp Systems Topics and Challenges 2.3 Heterogeneous Execution Environments (1/2) Heterogeneity A UbiComp application also involves a wide range of possibly heterogeneous hardware and software: Devices and hardware components Network technology Operating Systems Input/Output capabilities Resources Sensors 14

15 2. Ubicomp Systems Topics and Challenges 2.3 Heterogeneous Execution Environments (2/2) UbiComp Applications Unlike traditional applications, in UbiComp applications do not reside on one or two at most computers but rather span several devices which need to closely coordinate their operation in order to make up the application 15

16 2. Ubicomp Systems Topics and Challenges 2.4 Fluctuating User Environments (1/2) Contemporary Computing - Users use PCs for information access on a one-to-one relationship Ubiquitous Computing - The same device might be used by several users and a user might use several devices - Many-to-many relationship between users and devices - Doing a task is no longer tied to one device, but rather it is distributed across several heterogeneous devices Challenges - Technology is overwhelming users with the need to set up and manage - Calm technology and invisible computing is the opposite of that 16

17 2. Ubicomp Systems Topics and Challenges 2.4 Fluctuating User Environments (2/2) Changing location of users Location-based computing Example: Tour guides Varying user context Context-aware computing Includes information about who is using the application, who is nearby, ambient environment details, etc Example: A smart conference room which adjusts temperature, lighting and whiteboard contents based on the users present Fluctuating user activity Activity-based computing Example: Smart hospital where personnel need to coordinate their activities based on the multiple patients they are attending to 17

18 2. Ubicomp Systems Topics and Challenges 2.5 Invisible Computing (1/2) One of the core elements of Weiser s vision of UbiComp Example: A smart home that transparently monitors its users so that It can automatically adjust the heating/ventilation/air conditioning The computers are invisible to the users in a double sense 1. The computers are embedded into buildings, furniture, medical devices, etc physical invisibility 2. The computers operate in the periphery of the users attention and are hence imperceptible mental invisibility Why is invisibility a major departure from traditional computing? Because traditional systems rely heavily on having the users attention explicitly 18

19 2. Ubicomp Systems Topics and Challenges 2.5 Invisible Computing (2/2) Challenge: Invisible Computing Significant research effort towards invisible computing Autonomic computing Systems that are capable of self-management Example: Mainly, cluster-based server architectures Proactive computing Anticipate failures and prepare for exception handling Example: Offload a mobile agent when a device s battery is running out or proactively download resources before leaving network coverage Graceful degradation Computers should not depend on volatile resources (such as networking) and be prepared to operate also when some are unavailable 19

20 2. Ubicomp Systems Topics and Challenges 2.6 Security Interactions will be cross multiple organisational boundaries specification, analysis and integration for heterogeneous OS, databases, firewalls, routers. Everything worth hacking gets hacked. Need for secure out of the box set up that can identify friend or foe level of trust. Small communicators, with confidential data, are easily lost or stolen biometric authentication. Necessary security technology exists. 20

21 2. Ubicomp Systems Topics and Challenges 2.6 Privacy Location service tracks movement to within metres. Clearly indicate you are being sensed or recorded + user control to stop recording or control distribution of information. You are now predictable System can co-relate location, context and behaviour patterns Do you want employer, colleagues or insurance company to know you carry a medical monitor? Tension between authentication and anonymity business want to authenticate you for financial transactions and to provide personalized service web sites. Constant spam of context dependent advertising 21

22 2. Ubicomp Systems Topics and Challenges Ubiquitous/Pervasive Computing Focus usually on technical challenges Other challenges: design challenges, human-computer interaction, real-time deployment, etc. Builds on previous work in the areas of - Distributed Systems - Mobile Computing 22

23 2. Ubicomp Systems Topics and Challenges Challenges What are some of the challenges in UbiComp systems research? How to design hardware and Operating Systems for sensors and embedded devices? How to allow devices to find one another and use the services of each other? How to support resource impoverished devices that run on batteries? How to enable seamless mobility and collaboration in smart spaces such as smart rooms and hospitals? Overlap with other systems research questions But unique set of challenges in UbiComp systems 23

24 2. Ubicomp Systems Topics and Challenges Nanotechnology (1/2) The trend toward miniaturization of computer components down to an atomic scale is known as nanotechnology 24

25 2. Ubicomp Systems Topics and Challenges Nanotechnology (2/2) Mobile data technology GSM, GPRS, UMTS, CDMA, WAP, Imode Wireless data technology Bluetooth, b Internet data technology IP over optical, Broadband Content services Web & WAP Applications Multimedia, Internet messaging 25

26 3. Creating Ubicomp Systems 3.1 Why Bulid Ubicomp Systems? Prototyping future systems to explore ubiquity in practice Empirical exploration of user reactions to ubicomp Gathering datasets to tackle computational problems relating to ubicomp Creating ubicomp experiences for public engagement or performance Creating research test beds to agglomerate activity and stimulate further research To explore a hypothesis concerning ubicomp more naturalistically To test the limits of computational technologies in a ubicomp setting Addressing the perceived needs of a problem domain or pressing societal issue 26

27 3. Creating Ubicomp Systems 3.2 Setting Your Objectives Testing Your Ideas Low-fidelity prototypes, which can be simple scenarios that can be discussed, paper prototypes, or even models of devices or graphical story boards of proposed interactions anything that can add richness to the discussion of the system with potential users. Video prototypes, although considerably requiring more effort to create, can communicate the concepts in the system quite effectively and act as a useful reference for explaining the system later on. Rapid prototypes of user interfaces using prototyping toolkits (see Section 2.6) can afford a more realistic synthesis of the intended user experience. Wizard of Oz prototypes of parts of the system may allow the final behavior of the system to be emulated and thus experienced by others. 27

28 3. Creating Ubicomp Systems 3.3 Designing Good Systems Computational Knowledge of the Physical Word From a systems design perspective, it is far from clear what the interfaces and internals of a ubicomp system should be, necessitating an experimental approach. 1. What can be reliably sensed 2. What can be reliably known? 3. What can be reliably inferred? 28

29 3. Creating Ubicomp Systems 3.3 Designing Good Systems Seamfulness, Sensibility, and Tolerant Ignorance Pessimistic: Only show information that is known to be correct Optimistic: Show everything as if it were correct Cautious: Explicitly present uncertainty Opportunistic: Exploit uncertainty (cf. Gaver et al., 2003) 29

30 3. Creating Ubicomp Systems 3.3 Designing Good Systems User Mental Model and Responsibility The frequency or inconvenience of potential user involvement The severity or undesirability of the consequences if the system gets it wrong The reliability of detecting the appropriate moment and appropriate action The acceptability to the user of automating the behavior 30

31 3. Creating Ubicomp Systems 3.3 Designing Good Systems It Is Always Runtime 1. Systems requiring a carefully contrived startup order are likely to fail. 2. If the availability of elements may be sporadic, your system should be able to gracefully handle disconnection and reconnection or rebinding to alternate services. 3. Assume that individual components may fail or be temporarily isolated (which is especially true of so"ware elements on mobile devices) and design your system accordingly so that state can be recovered. 4. Decide proactively how to handle data when an element is disconnected: are the data kept (e.g., bu#ered) until reconnection, and if so, how much will you bu#er before discarding. What strategy will you choose to decide which data to keep or discard (oldest, f reshest, resample, etc.)? 5. Consider including version information in protocols used in systems designed to run longitudinally to at least identify version mismatches. 31

32 3. Creating Ubicomp Systems 3.3 Designing Good Systems Handling Transient Connections - Network connections (or the lack or failure thereof) can have profound effects on the performance of ubicomp systems and, crucially, the end user experience Handling Transient Connections - Transient connections and component failures have an impact on how consistent the state of your overall system will be. It is important to design in strategies for recovering from both of these cases. Parts of your system may be replicable or sufficiently available to use wellknown techniques to mask such failures and achieve some degree of fault tolerance. However, in many ubicomp systems, software components are often intimately linked to specialist or personal hardware, or may be placed in unique locations, which makes traditional techniques involving redundant replication or fail-over inappropriate. 32

33 3. Creating Ubicomp Systems 3.3 Designing Good Systems Is It Working? Use of conventional mechanisms such as log files and network packet tracing to passively monitor running components Including status protocol messages that can be intercepted (often as periodic heartbeat messages) Adding status displays including use of hardware such as LED blink sequences, audible and visual feedback Including diagnostic interfaces such as embedded web servers that can be interrogated Enabling remote access to components such as remote shells, etc. Externalizing of state or communications by using a middleware such as a publish-subscribe event channel, Tuple Space, Message Oriented Middleware, etc. 33

34 3. Creating Ubicomp Systems Management Huge, complex systems - Billions of processors - Multiple organisations - Managing physical world, controlling sensors, actuators Hacker and virus paradise System propagates false information about individuals or organisation. Complexity of s/w installation on a workstation or server how do you cope with billions? 34

35 3. Creating Ubicomp Systems Proposed Management Solution Intelligent agents, mobile agents, policy. QoS Management Fat pipes and large storage can convert media streams to short traffic bursts in core network but still needed for wireless links. Adaptive self-management is the only answer Partitioned domains of responsibility Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions for short term decision making 35

36 Reference John Krumm Ubiquitous Computing Fundamentals Weiser, Gold and Brown The origins of ubiquitous computing research at PARC in the late 1980s IBM Systems Journal, VOL 38, NO 4,

37 Q & A 37

38 Thank you 38

Mobile and Ubiquitous Computing

Mobile and Ubiquitous Computing Mobile and Ubiquitous Computing Today l Mobile, pervasive and volatile systems l Association and Interoperation l Sensing context and adaptation RIP? How is mobility different Mobile elements are resource-poor

More information

Ubiquitous Computing. Ambient Intelligence

Ubiquitous Computing. Ambient Intelligence Ubiquitous Computing Ambient Intelligence CS4031 Introduction to Digital Media 2016 Computing Evolution Ubiquitous Computing Mark Weiser, Xerox PARC 1988 Ubiquitous computing enhances computer use by making

More information

Mobile and Ubiquitous Computing

Mobile and Ubiquitous Computing Mobile and Ubiquitous Computing Today l Volatile systems l Association and Interoperation l Sensing context and adaptation Volatile systems " Mobile computing Exploiting the connectedness of devices as

More information

Page 1. Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer. Topics for Today. Ubiquitous Computing Fundamentals

Page 1. Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer. Topics for Today. Ubiquitous Computing Fundamentals Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer Shwetak N. Patel 2 Topics for Today Ubiquitous Computing Fundamentals Review the history of ubiquitous computing (ubicomp)

More information

Ubiquitous Computing Introduction

Ubiquitous Computing Introduction Ubiquitous Introduction University of Innsbruck WS 2010/2011 Prof. Dr. Thomas Strang thomas.strang@uibk.ac.at Where it all started The term Ubiquitous 1 goes back to the late Mark Weiser, who wrote 1991

More information

A Very Short Introduction to Pervasive Computing

A Very Short Introduction to Pervasive Computing A Very Short Introduction to Pervasive Computing Nicola Dragoni Embedded Systems Engineering Section DTU Informatics Technical University of Denmark These slides have been found on the Web and adapted

More information

Figure Potential 5G applications

Figure Potential 5G applications 6. 5G Key Concept 6.1 Key Concepts of 5G End-to-end (E2E) quality required by applications and/or users will be far more diversified in the 5G era than what we have seen in the preceding generations. For

More information

Version 11

Version 11 The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic

More information

Computing Technologies

Computing Technologies Computing Technologies Computing CPU, Memory, Communication Ubiquitous everywhere indefinite number of times Not really possible or desirable more than in traditional computing so widespread that unnoticed

More information

System Challenges for Pervasive and Ubiquitous Computing

System Challenges for Pervasive and Ubiquitous Computing System Challenges for Pervasive and Ubiquitous Computing 18 th Roy Want Intel Research May 2005, ICSE 05 St. Louis th May 2005, ICSE What is Ubiquitous Computing? The most profound technologies are those

More information

CSE 535 Mobile Computing. An Overview of Mobile Computing: Part I Motivation and Challenges

CSE 535 Mobile Computing. An Overview of Mobile Computing: Part I Motivation and Challenges CSE 535 Mobile Computing An Overview of Mobile Computing: Part I Motivation and Challenges Georgios Varsamopoulos School of Computing and Informatics Arizona State University 2 Mobile Computing The need

More information

Multiple Dimensions in Convergence and Related Issues

Multiple Dimensions in Convergence and Related Issues Multiple Dimensions in Convergence and Related Issues S.R. Subramanya LG Electronics CDG Technology Forum Las Vegas, Oct. 7, 2005 LGE Mobile Research, USA Talk Outline Introduction» Convergence Layers

More information

Some Computer Science Issues in

Some Computer Science Issues in Some Computer Science Issues in Ubiquitous Computing Communications of the ACM (CACM) Vol. 36, No.7, July 1993 M. Weiser Presented by Hwajung Kim (hkim@dcslab.snu.ac.kr) DCSLab, SNU Table of Contents Background

More information

Ubiquitous Computing

Ubiquitous Computing Ubiquitous Computing Potentials & Challenges Jaydip Sen Senior Scientist, Wireless Research Group, Innovation Lab Tata Consultancy Services, Kolkata, INDIA Outline of the Talk The Vision of UbiComp --

More information

Mobile Middleware Course. Introduction and Overview Sasu Tarkoma

Mobile Middleware Course. Introduction and Overview Sasu Tarkoma Mobile Middleware Course Introduction and Overview Sasu Tarkoma Contents Course outline Motivation Mobile middleware overview Course Overview 4 credit course Three components Lectures Assignment Literature

More information

Context Aware Computing

Context Aware Computing CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware

More information

Wireless Sensor Networks (WSN)

Wireless Sensor Networks (WSN) Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Introduction to Distributed Systems. INF5040/9040 Autumn 2018 Lecturer: Eli Gjørven (ifi/uio)

Introduction to Distributed Systems. INF5040/9040 Autumn 2018 Lecturer: Eli Gjørven (ifi/uio) Introduction to Distributed Systems INF5040/9040 Autumn 2018 Lecturer: Eli Gjørven (ifi/uio) August 28, 2018 Outline Definition of a distributed system Goals of a distributed system Implications of distributed

More information

Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems

Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems Based on materials by Prof. Paulo Ferreira Introduction Evolution Wheredo wewantto go? Challenges last class Basic Definitions

More information

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

Introduction to Distributed Systems (DS)

Introduction to Distributed Systems (DS) Introduction to Distributed Systems (DS) INF5040/9040 autumn 2014 lecturer: Frank Eliassen Frank Eliassen, Ifi/UiO 1 Outline Ø What is a distributed system? Ø Challenges and benefits of distributed systems

More information

Introduction to Mobile Ubiquitous Computing Systems

Introduction to Mobile Ubiquitous Computing Systems CPET 565 Mobile Computing Systems CPET/ITC 499 Mobile Computing Lecture 1 Introduction to Mobile Ubiquitous Computing Systems Paul I-Hai Lin, Professor Spring 2016 A Specialty Course Purdue University

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

ITU-T Y Overview of ubiquitous networking and of its support in NGN

ITU-T Y Overview of ubiquitous networking and of its support in NGN International Telecommunication Union ITU-T Y.2002 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2009) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS

More information

Distributed Systems Conclusions & Exam. Brian Nielsen

Distributed Systems Conclusions & Exam. Brian Nielsen Distributed Systems Conclusions & Exam Brian Nielsen bnielsen@cs.aau.dk Study Regulations Purpose: That the student obtains knowledge about concepts in distributed systems, knowledge about their construction,

More information

Spontaneous Interaction using Mobile Phones and Short Text Messages

Spontaneous Interaction using Mobile Phones and Short Text Messages Spontaneous Interaction using Mobile Phones and Short Text Messages Frank Siegemund Distributed Systems Group, Department of Computer Science, Swiss Federal Institute of Technology (ETH) Zurich, 8092 Zurich,

More information

Policy-Based Context-Management for Mobile Solutions

Policy-Based Context-Management for Mobile Solutions Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,

More information

Challenges for Future Networked Embedded Systems

Challenges for Future Networked Embedded Systems Challenges for Future Networked Embedded Systems I.G. Niemegeers Centre for Wireless and Personal Communication (CWPC) Delft University of Technology PROGRESS Workshop 2006 Networks and Connected Systems

More information

Unit 1: Introduction to Ubiquitous Services

Unit 1: Introduction to Ubiquitous Services Ubiquitous and Secure Networks and Services Redes y Servicios Ubicuos y Seguros Unit 1: Introduction to Ubiquitous Services Lourdes López Santidrián llopez@diatel.upm.es, lourdes.lopez@upm.es Lourdes López

More information

Distributed Systems Conclusions & Exam. Brian Nielsen

Distributed Systems Conclusions & Exam. Brian Nielsen Distributed Systems Conclusions & Exam Brian Nielsen bnielsen@cs.aau.dk Definition A distributed system is the one in which hardware and software components at networked computers communicate and coordinate

More information

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 05 Basics of IoT Networking-Part-I In this lecture and

More information

universaal Architecture and The Resource Discovery

universaal Architecture and The Resource Discovery universaal Architecture and The Resource Discovery Michele Girolami ISTI-CNR Wireless Network Lab. Departimento di Informatica Università Pisa 1 Outline 1. Ambient Intelligence and AAL 2. The universaal

More information

HCI Lecture 14. Special Issues: Ubiquitous computing

HCI Lecture 14. Special Issues: Ubiquitous computing HCI Lecture 14 Special Issues: Ubiquitous computing Barbara Webb Key points: Making the computer part of the environment Mobile devices Implicit input Ambient output Continuous interaction Issues for design

More information

An Introduction to Cyber-Physical Systems INF5910/INF9910

An Introduction to Cyber-Physical Systems INF5910/INF9910 An Introduction to Cyber-Physical Systems INF5910/INF9910 1 Outline What is Cyber Physical Systems (CPS)? Applications Challenges Cyber Physical CPS 2 Cyber Systems Cyber is More than just software More

More information

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom CAUTIONARY STATEMENT This presentation may contain forward-looking statements

More information

Mobile Computing Introduction

Mobile Computing Introduction Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?

More information

Distributed Systems Question Bank UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems?

Distributed Systems Question Bank UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems? UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems? 2. What are different application domains of distributed systems? Explain. 3. Discuss the different

More information

Current Research Topics in Mobile Computing. Nokia. About 100 new phone models in 2003 globally. New challenges: Open platforms and SWarchitectures

Current Research Topics in Mobile Computing. Nokia. About 100 new phone models in 2003 globally. New challenges: Open platforms and SWarchitectures Current Research Topics in Mobile Computing EmSys Summer School 2003 Salzburg Heikki.Saikkonen@nokia.com Nokia Trends in Mobile Computing Software Engineering Current Research Topics in Mobile Computing

More information

CSE 5306 Distributed Systems. Course Introduction

CSE 5306 Distributed Systems. Course Introduction CSE 5306 Distributed Systems Course Introduction 1 Instructor and TA Dr. Donggang Liu @ CSE Web: http://ranger.uta.edu/~dliu Email: dliu@uta.edu Phone: 817-2720741 Office: ERB 555 Office hours: Tus/Ths

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based

More information

Mobile and ubiquitous computing. INF 5040/9040 autumn lecturer: Frank Eliassen. Frank Eliassen, SRL & Ifi/UiO 1. Home PC

Mobile and ubiquitous computing. INF 5040/9040 autumn lecturer: Frank Eliassen. Frank Eliassen, SRL & Ifi/UiO 1. Home PC Mobile and ubiquitous computing INF 5040/9040 autumn 2009 lecturer: Frank Eliassen Frank Eliassen, SRL & Ifi/UiO 1 Motivation Mobile computing is concerned with exploiting the connectedness of portable

More information

3. Quality of Service

3. Quality of Service 3. Quality of Service Usage Applications Learning & Teaching Design User Interfaces Services Content Process ing Security... Documents Synchronization Group Communi cations Systems Databases Programming

More information

Future-Generation Wireless Networks: Beyond 3G and 4G.

Future-Generation Wireless Networks: Beyond 3G and 4G. Future-Generation Wireless Networks: Beyond 3G and 4G. Kumar Adumulla 29 March 2006 Networks 1 Outline Introduction Wireless Networking Generations Issues in 3G What is 4G Beyond 3G & 4G Conclusion References

More information

Implementing Ubiquitous Network with IPv6

Implementing Ubiquitous Network with IPv6 Dr. Mazlan Abbas MIMOS Berhad Implementing Ubiquitous Network with IPv6 Agenda of Presentation Introduction to Ubiquitous Network IPv6 as the Core of All IP Network The Making of Ubiquitous Networks by

More information

Wireless Java-enabled MIDP devices as peers in Grid infrastructure

Wireless Java-enabled MIDP devices as peers in Grid infrastructure Wireless Java-enabled MIDP devices as peers in Grid infrastructure Miika Tuisku Miika.Tuisku@cern.ch Helsinki Institute of Physics, CERN Abstract. Combining Mobile Internet and Grid technologies could

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Security improvement in IOT based on Software

Security improvement in IOT based on Software International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 122 Security improvement in IOT based on Software Raghavendra Reddy, Manoj Kumar, Dr K K Sharma Abstract With the

More information

Ubiquitous and Context Aware Computing: Overview and Systems

Ubiquitous and Context Aware Computing: Overview and Systems Ubiquitous and Context Aware Computing: Overview and Systems Simon Bichler 1 / 30 Outline Definition and Motivation for Ubiquitous computing Context aware computing Sample Systems Discussion 2 / 30 Ubiquitous

More information

References. The vision of ambient intelligence. The missing component...

References. The vision of ambient intelligence. The missing component... References Introduction 1 K. Sohraby, D. Minoli, and T. Znadi. Wireless Sensor Networks: Technology, Protocols, and Applications. John Wiley & Sons, 2007. H. Karl and A. Willig. Protocols and Architectures

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN Avaya-FatPipe Solution Overview Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN The Avaya SDN-Fx and FatPipe Networks solution provides a fabric-based SDN architecture for simplicity

More information

Kaspersky Open Space Security

Kaspersky Open Space Security Kaspersky Open Space Security Flexible security for networks and remote users Kaspersky Open Space Security Kaspersky Open Space Security offers new flexibility to network security by extending beyond

More information

Introduction to Distributed Systems (DS)

Introduction to Distributed Systems (DS) Introduction to Distributed Systems (DS) INF5040/9040 autumn 2009 lecturer: Frank Eliassen Frank Eliassen, Ifi/UiO 1 Outline What is a distributed system? Challenges and benefits of distributed system

More information

Introduction to Distributed Systems

Introduction to Distributed Systems Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]

More information

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide Last Updated 8 March 2016 Contents Introduction... 2 1 Key point of contact... 2 2 Third Part IT Specialists... 2 3 Acceptable use of Information...

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Location-based Services in Ubiquitous Computing Environments

Location-based Services in Ubiquitous Computing Environments Location-based Services in Ubiquitous Computing Environments National Institute of Informatics Email: ichiro@nii.ac.jp Outline 1. Motivation 2. Approach 3. Design and Implementation 4. Applications 5.

More information

Regulation and the Internet of Things

Regulation and the Internet of Things Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions

More information

JXTA for J2ME Extending the Reach of Wireless With JXTA Technology

JXTA for J2ME Extending the Reach of Wireless With JXTA Technology JXTA for J2ME Extending the Reach of Wireless With JXTA Technology Akhil Arora Carl Haywood Kuldip Singh Pabla Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA 650 960-1300 The Wireless

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 01 (version September 5, 2007) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.

More information

Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management

Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management Copyright Nuvon, Inc. 2007, All Rights Reserved. Introduction The need to improve the quality and accessibility

More information

Middleware for Ubiquitous Computing

Middleware for Ubiquitous Computing Middleware for Ubiquitous Computing Software Testing for Mobile Computing National Institute of Informatics Ichiro Satoh Abstract When a portable computing device is moved into and attached to a new local

More information

Context-Awareness and Adaptation in Distributed Event-Based Systems

Context-Awareness and Adaptation in Distributed Event-Based Systems Context-Awareness and Adaptation in Distributed Event-Based Systems Eduardo S. Barrenechea, Paulo S. C. Alencar, Rolando Blanco, Don Cowan David R. Cheriton School of Computer Science University of Waterloo

More information

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains

More information

5G radio access. ericsson White paper Uen June research and vision

5G radio access. ericsson White paper Uen June research and vision ericsson White paper 284 23-3204 Uen June 2013 5G radio access research and vision 5G will enable the long-term Networked Society and realize the vision of unlimited access to information for anyone and

More information

Mobile Cloud Computing: Issues, Challenges and Future Trends

Mobile Cloud Computing: Issues, Challenges and Future Trends Mobile Cloud Computing: Issues, Challenges and Future Trends In Partial fulfillment of the requirements for course CMPT 890 Presented by: Ahmed Abdel Moamen Agents Lab 1 Introduction It is widely believed

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Unit 46: Network Security Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with opportunities to manage, support and implement a secure network infrastructure

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed

More information

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38 Department of Computer Science & Information Technology University of Balochistan Course Objectives To discuss the fundamental problems in the emerging area of mobile and pervasive computing, along with

More information

Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications

Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications Octav Chipara University of Iowa https://cs.uiowa.edu/~ochipara 1 Detecting clinical deterioration at low cost Clinical

More information

Requirements for the Operations & Management of 4G Networks

Requirements for the Operations & Management of 4G Networks Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering

More information

Core Embedded Systems

Core Embedded Systems Grand Challenges in Cyber Physical The Next Generation Tarek Abdelzaher Department of Computer Science University of Illinois at Urbana Champaign Core Core Challenges: Dependability Hardware/Software Co-Design

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Active source routing for ad-hoc network: seamless integration of wireless environment

Active source routing for ad-hoc network: seamless integration of wireless environment Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots

More information

IPv6 Deployment Overview & Policy Update

IPv6 Deployment Overview & Policy Update IPv6 Deployment Overview & Policy Update Takuya MIYOSHI Internet Policy Office Ministry of Internal Affairs and Communications, Japan 24 th February, 2005 History and Acceleration of Japan s IT Strategy

More information

DENETS HIDENETS DENETS. Highly Dependable IP-based Networks and Services (FP6 STREP, Jan Dec 2008)

DENETS HIDENETS DENETS.   Highly Dependable IP-based Networks and Services (FP6 STREP, Jan Dec 2008) HI Highly Dependable IP-based Networks and Services (FP6 STREP, Jan. 2006-Dec 2008) End-to-end resilience solutions for vehicular scenarios 1 HI Partners 2 Overview The HI project: goals and challenges

More information

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

Cybersecurity ecosystem and TDL Antonio F. Skarmeta Cybersecurity ecosystem and TDL Antonio F. Skarmeta University of Murcia (UMU) SPAIN CyberSecurity Challenges in a fully connected World Trust Framework 1. Policies for trust in heterogeneous

More information

Kollaborative Ambient Systems Von einfachen Steuerungen zu komplexen vernetzten und. interaktiven Systemen

Kollaborative Ambient Systems Von einfachen Steuerungen zu komplexen vernetzten und. interaktiven Systemen Kollaborative Ambient Systems Von einfachen Steuerungen zu komplexen vernetzten und interaktiven Systemen Norbert Wehn wehn@eit.uni-kl.de //ems.eit.uni-kl.de SymanO 2013 March 2013, Mannheim History of

More information

A Grid Service Infrastructure for Mobile Devices

A Grid Service Infrastructure for Mobile Devices A Grid Service Infrastructure for Mobile Devices Tao Guan, Ed Zaluska, and David De Roure Electronics and Computer Science, University of Southampton, UK, SO17 1BJ {tg04r, ejz, dder}@ecs.soton.ac.uk Abstract.

More information

Mobility and Media. How mobile computing is evolving at HP. Mark Smith Mobile and Media Systems Lab Hewlett Packard Laboratories

Mobility and Media. How mobile computing is evolving at HP. Mark Smith Mobile and Media Systems Lab Hewlett Packard Laboratories Mobility and Media How mobile computing is evolving at HP Mark Smith (msmith@hpl.hp.com) Mobile and Media Systems Lab Hewlett Packard Laboratories 2004 Hewlett-Packard Development Company, L.P. The information

More information

GPRS billing: getting ready for UMTS

GPRS billing: getting ready for UMTS GPRS billing: getting ready for UMTS In his first article about UMTS, Lucas Baugé looks into the key challenges of GPRS billing. He seeks to show how solving these challenges will help operators succeed

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

ICT-SHOK Project Proposal: PROFI

ICT-SHOK Project Proposal: PROFI ICT-SHOK Project Proposal: PROFI Full Title: Proactive Future Internet: Smart Semantic Middleware Overlay Architecture for Declarative Networking ICT-SHOK Programme: Future Internet Project duration: 2+2

More information

Introduction. Distributed Systems IT332

Introduction. Distributed Systems IT332 Introduction Distributed Systems IT332 2 Outline Definition of A Distributed System Goals of Distributed Systems Types of Distributed Systems 3 Definition of A Distributed System A distributed systems

More information

Trust Harris for LTE. Critical Conditions Require Critical Response

Trust Harris for LTE. Critical Conditions Require Critical Response Trust Harris for LTE Critical Conditions Require Critical Response Harris LTE Solution Harris LTE Solution Harris LTE Networks Critical Conditions Require Critical Response. Trust Harris for LTE. Public

More information

Introduction Distributed Systems

Introduction Distributed Systems Introduction Distributed Systems Today Welcome Distributed systems definition, goals and challenges What is a distributed system? Very broad definition Collection of components, located at networked computers,

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Year, pier University Nikos Migas PhD student 2 Supervisors: School of Computing, Na MARIAN

Year, pier University Nikos Migas PhD student 2 Supervisors: School of Computing, Na MARIAN MARIAN Mobile Agents for Routing In Ad-hoc Networks Nikos Migas PhD student 2 nd Year, School of Computing, Napier University n.migas@napier.ac.uk Supervisors: W.Buchanan, K.McArtney Introduction MARIAN

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

Browsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments

Browsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments Browsing the World in the Sensors Continuum Agents and Franco Zambonelli Agents and Motivations Agents and n Computer-based systems and sensors will be soon embedded in everywhere all our everyday objects

More information

4G Mobile Communications

4G Mobile Communications 4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to

More information

International Journal of Combined Research & Development (IJCRD) eissn: x;pissn: Volume: 1; Issue: 2; June 2013

International Journal of Combined Research & Development (IJCRD) eissn: x;pissn: Volume: 1; Issue: 2; June 2013 Simple Applications of Smart-Classroom Mr. Parmesh V Asst. Professor, Dept. of ISE Cambridge Institute of Technology Nagpur, Maharashtra, India Abstract: This paper first presents four essential characteristics

More information

The Ubiquitous Web. Dave Raggett, W3C Technical Plenary, March /14

The Ubiquitous Web. Dave Raggett, W3C Technical Plenary, March /14 The Ubiquitous Web Dave Raggett, W3C Technical Plenary, March 2005 1/14 Ubiquitous. [adj] 1. (seemingly) present everywhere simultaneously. 2. often encountered [Latin ubique everywhere] Oxford English

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is

More information

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Prof. D. Raychaudhuri ray@winlab.rutgers.edu www.winlab.rutgers.edu 1 Introduction: The Promise of Wireless Everywhere

More information

Introduction. Chapter 1: Mobile Communications SS A case for mobility History of mobile communication Market Areas of research

Introduction. Chapter 1: Mobile Communications SS A case for mobility History of mobile communication Market Areas of research Mobile Communications SS 2002 Chapter 1: Introduction A case for mobility History of mobile communication Market Areas of research Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02

More information