Mobile and Ubiquitous Computing

Similar documents
Mobile and Ubiquitous Computing

Mobile and ubiquitous computing. INF 5040/9040 autumn lecturer: Frank Eliassen. Frank Eliassen, SRL & Ifi/UiO 1. Home PC

System Challenges for Pervasive and Ubiquitous Computing

Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems

PERVASIVE COMPUTING SPCT- F2012 MOBILE COMPUTING

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services

Ambient Service Space

Page 1. Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer. Topics for Today. Ubiquitous Computing Fundamentals

Ubiquitous Computing. Ambient Intelligence

Networking Cyber-physical Applications in a Data-centric World

Ubiquitous and Context Aware Computing: Overview and Systems

Service-Oriented Programming

Cisco Wide Area Bonjour Solution Overview

Internet of Things: The story so far

Development Tools for context aware and Secure Pervasive Computing in Embedded Systems Middleware

Security and Privacy in the Internet of Things : Antonio F. Skarmeta

Context Aware Computing

A Location Model for Ambient Intelligence

Support for Situation-Awareness in. Trustworthy Ubiquitous Computing Application Software

Multiple Dimensions in Convergence and Related Issues

Link Security Considerations in the. Enterprise

Using the Semantic Web in Ubiquitous and Mobile Computing

Applying Semantic Web in Mobile and Ubiquitous Computing: Will Policy-Awareness Help?

The Ubiquitous Web. Dave Raggett, W3C Technical Plenary, March /14

HCI Lecture 14. Special Issues: Ubiquitous computing

Adaptive Middleware for Real-Time Software. Louise Avila CIS November 2, 2005

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Shao-Wen Yang, Ph.D. Staff Research Scientist Intel Labs, Intel Corporation

Distributed Systems - Mertz & McCarthy

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

Distributed Systems Question Bank UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems?

Computing Technologies

NSF-RCN Workshop #2 Panel 2

Definitions of USN, M2M, IoT, UN, and UC by International Standards and Papers

describe the functions of Windows Communication Foundation describe the features of the Windows Workflow Foundation solution

Ubiquitous Computing Introduction

GENI Experimental Infrastructure Wireless & Sensor Networks Aug 8, 2005

Ubiquitous Computing Systems

Smart City, Internet of Things, Security and Privacy

The S6000 Family of Processors

Amigo Symposium 28 February 2008

An IoT-Aware Architecture for Smart

one.world Towards a System Architecture for Pervasive Computing

AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS AN ARUBA AIRGROUP SOLUTION GUIDE

SRA A Strategic Research Agenda for Future Network Technologies

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

* Inter-Cloud Research: Vision

Networked World.

Web of Things Architecture and Use Cases. Soumya Kanti Datta, Christian Bonnet Mobile Communications Department

Semantic web technologies for ubiquitous computing resource management in smart spaces

Location-based Services in Ubiquitous Computing Environments

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

Unit 1: Introduction to Ubiquitous Services

D-Link DP-311P. Manual. Wireless Print Server. Building Networks for People

Beetle: Many-to-many communication in Bluetooth LE. Amit Levy, Laurynas Riliskis, Philip Levis, David Mazières, and Keith Winstein

CoAP communication with the mobile phone sensors over the IPv6

Network Deployment Guide

A Grid Service Infrastructure for Mobile Devices

Spontaneous Interaction using Mobile Phones and Short Text Messages

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS

Einführung in die Erweiterte Realität

COURSE OUTLINE. COURSE OBJECTIVES After completing this course, students will be able to: 1 - INSTALLING & CONFIGURING DCS

IEEE Assisted Network Layer Mobility Support

Development of IPX: Myth or Reality?

Introduction to the Semantic Web

Exposing network capabilities via the software layer. Dr. Christoph Peylo (Deutsche Telekom Laboratories) TELEKOM INNOVATION LABORATORIES

DTV for Personalized Mobile Access and Unified Home Control

USER MANUAL. VIA IT Deployment Guide for Firmware 2.3 MODEL: P/N: Rev 7.

Ubiquitous Computing The Future of Computing

Ubiquitous services and applications: needs of mobile users

Internet of secure things: issues and perspectives. Pasquale Pace Dimes - UNICAL

Cyberattack Analysis and Information Sharing in the U.S.

Extending Instant Messaging to Support Spontaneous Interactions in Ad-hoc Networks

Global Data Plane. The Cloud is not enough: Saving IoT from the Cloud & Toward a Global Data Infrastructure PRESENTED BY MEGHNA BAIJAL

Enabling Smart Energy as a Service via 5G Mobile Network advances. The Energy as a Service: when the Smart Energy uses the 5G technology

Distributed and Cloud Computing

Simplify WAN Service Discovery for Mac Users & Eliminate AppleTalk

IoT Engineering 1: Introduction to the Internet of Things. CC BY-SA, Thomas Amberg, FHNW (Screenshots considered fair use)

(i) Fixed, portable or mobile computing devices -- categorized on the basis of their mobility and portability,

Enabling Apple AirPrint with Your Xerox AltaLink Multifunction Printer. White Paper

Middleware for Ubiquitous Computing

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Internet of Things(IoT):A Future Vision OF MODERN SOCIETY

Smart Organization. Vivek Ghule Department of Computer Engineering Vishwakarma Institute of Information Technology Pune, India

26/05/2015 AR & VR? 1 1

Quality of service issues for world-wide mobile telephony

AuthentiCall: Efficient Identity and Content Authentication for

Digital (Virtual) Identities in Daidalos and beyond. Amardeo Sarma NEC Laboratories Europe

High Performance Computing Course Notes Grid Computing I

TSN and EtherNet/IP Networks

CASE STUDY. THE INSTALLATION OF MANAGED WIFI for Oxford International College INTELLIGENTWIRELESS MANAGEDCONNECTIVITY

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Vortex Whitepaper. Intelligent Data Sharing for the Business-Critical Internet of Things. Version 1.1 June 2014 Angelo Corsaro Ph.D.

TNC EVERYWHERE. Pervasive Security

Department for Informatics University of Fribourg (Switzerland)

Bark: Default-Off Networking and Access Control for the IoT. James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University

Beetle: Operating System Support for the Internet of Things

Cisco DNA Service for Bonjour Solution

Evolving IoT with Smart Objects

CptS 464/564 Lecture 18

Transcription:

Mobile and Ubiquitous Computing Today l Volatile systems l Association and Interoperation l Sensing context and adaptation

Volatile systems " Mobile computing Exploiting the connectedness of devices as they move; laptops or handheld computing " Ubiquitous/pervasive computing - Exploiting the integration of devices with the physical world; in Weiser s vision [1991] One person, many computers Disappearing computer weave into the fabric of everyday life (wearable and context-aware computing) " Volatile systems For DS there are no difference between mobile, ubiquitous computing and subfields Rapid change is the norm rather than the exception 2

Smart spaces as an example " Physical space provide the background to mobile and ubiquitous computing " Smart space is a physical space with embedded devices (from a room to a train cart) Algorithms (e.g., routing) and systems solution for more stable environments may fail Devices have limited energy, typically are resource constrained (in computation, storage and networking) and have a multitude of sensors Motes Smart phones " Volatile connectivity and spontaneous interoperations With the trust and privacy issues that come along 3

Association " Volatile components need to interoperate Network bootstrapping the device must first get an address on the local network and may acquire/register a name Association once connected, components need to associate with services and/or provide services to others " Network boostratpping Some well-established solutions like DHCP, Apple s Bonjour " Association Considering scale the number of devices and software components could be large, and Scope association with those in the smart space, no larger/ smaller Boundary principle smart spaces need to have system boundaries that correspond accurately to meaningful spaces 4

Discovery services for association " Discovery service a directory service where services in a smart space ar registered and looked up by their attributes The set of attributes against which queries are run may be determined at runtime There may no be infrastructure to host a directory server The registered services may spontaneously disappear Protocols for accessing the discovery service must be careful of th energy and bandwidth consumed " Known examples Jini, Intentional Naming System [Adjie-Winoto 99], Service Location Protocol [Guttman 99] Commonly, network discovery service using a subnet for binding and the problems with the boundary principle Space may expand beyond (WiFi reach) or be smaller than (hotel room) the subnet reach 5

Interoperation " After association how do components inter-operate? From the communication protocol to the programming model " Main difficulty interface incompatibility Allow heterogeneous interfaces and adapt interfaces But semantic compatibilities are hard to overcome Constraint interfaces to be identical across a class Not as hard as a first take consider Unix s pipes! " Data-oriented programming for volatile systems Event systems Active Badge, One.world Tuple spaces LIME (Linda in Mobile Environments), TOTA (Tuples On The Air), L 2 imbo Direct device interoperation JetSend, Speakeasy 6

Sensing and Context Awareness " Physical circumstances/context are relevant to determine volatile systems behaviors " To determine context sensors Location, velocity and orientation sensors Ambient sensors Presence sensors " Working with sensors Integrating idiosyncratic sensors Abstracting sensors data (long/lat or the coffee shop?) Combining sensors Handling dynamics (has the user changed locations or is just an error on the sensor reading?) Connecting multiple sensors sensor networks 7

Security and Privacy " Trust is complicated in volatile systems with spontaneous interactions Access to a printer, a screen or your heart rate monitor " Mobile hardware simple walks away " Devices may no have sufficient resources (including energy) for certain cryptographic approaches " Some solutions out there Out-of-band communication Other side-channels physical contact, infrared, audio, barcode/camera, " Privacy protection Avoiding hard-wired identifiers (e.g., MAC or RIFD) Mixing communication (statistically combining communication from many users) 8

Adaptation " Wide heterogeneity of devices consider producers and consumers of media content " Adaptation of media data to the context of the consumer Characteristics of the devices the task of the user to dynamic levels of energy and bandwidth " Who should adapt the content and how? Producer, consumer, proxies, " Ideally, adaptive software that accommodate to changing environments, resources, user demands Cyber foraging and application composition 9

Summary " Mobile and ubiquitous computing a wide open field Challenges of volatility " Changing users, devices, services, connectivity, " Integration of devices with our physical world depends on sensing and context awareness Many subtle complications " Security, privacy and trust 10