introduction to pervasive computing
DESCRIPTION
Introduction to Pervasive Computing Agenda History and Evolution Vision Pervasive Computing Features System View and Support Framework Applications Challenges Of 43 Iran University of Science and Technology December 2006TRANSCRIPT
![Page 1: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/1.jpg)
Introduction to Pervasive Computing
By H. Momeni Computer Engineering Department Iran University of Science and Technology
December 2006
![Page 2: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/2.jpg)
Page 2
Agenda• History and Evolution• Vision• Pervasive Computing Features• System View and Support• Framework• Applications• Challenges
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 3: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/3.jpg)
Page 3
Remote communication
Fault tolerance
High Availability
Remote information access
Distributed security
Distributed Systems
(mid-1970s)
Mobile networking
Mobile information access
Adaptive applications
Energy-aware systems
Location sensitivity
Mobile Computing(early 1990s)
Smart spaces
Invisibility
Localized scalability
Uneven conditioning
Pervasive Computing
(2000)
History and Evolution
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 4: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/4.jpg)
Page 4
Comparison
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 5: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/5.jpg)
Page 5
Pervasive Technologies• Ubiquitous Computing (Mark Weiser, Xerox PARC
1990)• Calm Computing (John Brown, Xerox PARC 1996)• Tangible Computing (Ishii, 1997)• Universal Computing (James Landay, Berkeley
1998)• Invisible Computing (G. Barriello, UoWashington
1999)• Context Based Computing (Berkeley/IBM 1999)
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 6: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/6.jpg)
Page 6
Pervasive Technologies cont’d• Hidden Computing (Toshiba 1999)• Pervasive Computing (Academia, IBM 1999, SAP
2000)• Everyday Computing (Georgia Tech, 2000)• Sentient Computing (AT&T, 2002)• Autonomous Computing (IBM, 2002)• Amorphous Computing (DARPA, 2002)• Spray Computing (Zambonelli, 2003)
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 7: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/7.jpg)
Page 7
Vision“The most profound technologies are those
that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it”. [1991]
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 8: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/8.jpg)
Page 8
Computer Evolution• Weiser’s idea was a vision too far ahead of its time• The hardware technology did not exit• After a decade hardware progress, PerCom are viable
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 9: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/9.jpg)
Page 9
The State of the Art in Pervasive Computing• The term “Pervasive Computing” emerged from
research at IBM during 1996 – 97
• vision: computing services available anytime, anywhere and on demand
• Mark Weiser at Xerox PARC was leading research labeled as “Ubiquitous Computing in 1991
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 10: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/10.jpg)
Page 10
The State of the Art… cont’d• UbiComp’s initial focus was not on making
infrastructure available everywhere
• UbiComp’ initial focus was on user centric
• PerCom’s initiative to exploit the existing wide scale deployment of computing technology
• UbiComp’s initiatives were to effectively make this complex mass of technology transparent to the human user’s
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 11: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/11.jpg)
Page 11
Research Areas in Pervasive Computing• mobile computing• wireless networking• embedded computing• human computer interaction (HCI)• Context awareness with sensor technology
other terms tend to be an overlap of these five themes
Wearable Computing=Mobile Computing+Embedded Computing+HCI
Nomadic Computing=Mobile Computing+wireless networking
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 12: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/12.jpg)
Page 12
![Page 13: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/13.jpg)
Page 13
A Pervasive Computing Model• five-layered model (from the perspective of the
human)– physical layer– Perceptive layer
• Composed of sensor (input for physical layer) and actuator (output for physical layer)
– Analog/Digital conversion layer• Converting between analog and digital signals
– Computational layer– Communicational Layer
Primary functions• coordination of environments(Os, protocol)
Secondary functions•actual applications within environment
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 14: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/14.jpg)
Page 14 December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 15: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/15.jpg)
Page 15
Pervasive computing Features• A Device : portal into an application-data space
• Computing environment : an information-enhanced physical space
• Connected devices provide services without user’s interventions by using sensed data in physical space.
• Providing services for users anytime, anywhere by any devices
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 16: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/16.jpg)
Page 16
System view of pervasive computing
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 17: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/17.jpg)
Page 17
Pervasiveness Support• Effective Use of smart spaces• Invisibility• Localized scalability• Masking uneven conditioning
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 18: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/18.jpg)
Page 18
Effective use of Smart Spaces• Embedding computing infrastructure in
building infra.• Smart spaces brings together two world that
have been disjoint until now• The fusion of these worlds enables sensing and
control one of world by the other
Smart coffee cup
Automatic meeting transcription
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 19: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/19.jpg)
Page 19
Invisibility• Weiser’s ideal: complete disappearance of
technology• minimal user distraction• system meets user expectations continuously• proactivity may sometimes be valuable
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 20: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/20.jpg)
Page 20
Localized Scalability• With increase of complexity of smart spaces,
number of interactions between user’s computer and environment will be increased.
• This has severe bandwidth, energy for a wireless mobile user
• Scalability is a critical problem in PerCom• Traditional scalability has ignored physical
distance (web server)
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 21: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/21.jpg)
Page 21
Masking Uneven Conditioning• There will persist huge differences in the
smartness of different environments• This large dynamic range of smartness can
reduce invisibility of PerCom to users• Solving problem
– Reduce the variability (to compensate space, dumb environment)
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 22: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/22.jpg)
Page 22
Pervasive Computing Framework
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 23: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/23.jpg)
Page 23
Pervasive Devices• Traditional input/output devices
– Keyboard, speaker, light-emitting diode• Wireless mobile devices
– Pager, PDA, cell phone, palmtop, Laptop• Smart devices
– Intelligent appliance, floor tiles with embedded sensor, biosensors
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 24: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/24.jpg)
Page 24
Pervasive Networking• IEEE 802.11• Bluetooth• Internet
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 25: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/25.jpg)
Page 25
Pervasive middleware• Interface between the network kernel and the
end-user applications running on pervasive devices
• keep users immersed in the pervasive computing space
• Consist mostly firmware and software bundles executing in client-server or Peer to peer
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 26: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/26.jpg)
Page 26
User interface and application• User interface
– Web browser– Micro browser
• Pervasive applications– more environment-centric than either web-based
or mobile computing applications
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 27: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/27.jpg)
Page 27
Applications
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 28: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/28.jpg)
Page 28
Daily Life Application• Smart Home
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 29: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/29.jpg)
Page 29
Public Service Application• Healthcare: Embedded Sensor networking for
patient monitoring
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 30: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/30.jpg)
Page 30
Transportation Application• Smart Cars
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 31: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/31.jpg)
Page 31
Environment Applications• Environmental Monitoring
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 32: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/32.jpg)
Page 32
National Defense Applications• Surveillance Platform
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 33: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/33.jpg)
Page 33
Industrial Business Applications
• Supply Chain Management
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 34: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/34.jpg)
Page 34
Challenges• User intent• Cyber Foraging• Adaptability• High Level Energy Management• Context awareness• Trust • Privacy• Security
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 35: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/35.jpg)
Page 35
User Intent• PerCom system must track user intent for
Proactivity• Challenges:
– Can user intent be inferred?– How is it handled in dynamic interactions?– When and how is it updated?– Will it hurt usability and performance unacceptably?
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 36: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/36.jpg)
Page 36
Cyber Foraging• The need to make mobile devices smaller, lighter
and longer battery life, reduce computing capabilities
• Solution:– Exploiting wired hardware infrastructure in a neighborhood
that it play surrogate role– The mobile computer ships the computation to the
surrogate• Challenges:
– Discover the presence of surrogate – Load balancing – Minimal delay
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 37: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/37.jpg)
Page 37
Adaptability• Significant mismatch between the supply and
demand of a resource • New user’s requirements • Change Requirements
• Challenge– Reduce human intervention– Configuration– Run time Reconfiguration
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 38: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/38.jpg)
Page 38
High Level Energy Management• Proactivity and self-tuning increase the energy
demand of software on mobile devices• The attempts to make such devices lighter and
smaller, reduce the battery capacity• The higher level of must be involved to save
energy.– Energy aware memory management– Energy aware adaptation
• Challenges– Impact of invisibility– Exploit of knowledge of user intent
December 2006
Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 39: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/39.jpg)
Page 39
Context Awareness“Context is any evidence that can be used to
support arguments for the conditions of the situation of any subject or target, which influences their interactive behavior”
• PerCom to be minimally intrusive, has to be context aware.
• User, system and environment context• Challenges:
– How does system obtain these information?– Where is context stored?– How frequently does context have to be consulted?
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 40: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/40.jpg)
Page 40
Trust• Enable systems to exchange information even
without the intervention of administrators to authorize these interactions
• How to grant users access to resources and information based on their trustworthiness rather than the application of conventional techniques that map authorizations to access rights.
• Challenges:– Unsavory uses (targeted spam, blackmail)
password-based protocols or biometric authentication?
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 41: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/41.jpg)
Page 41
Privacy• Huge amounts of information will be shared and
exchanged in pervasive computing environments
• With context-based services this question arise:
– Do you want this information shared?– How can you trust the technology?– What does the environment itself do?– How can you secure the access to private information?
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 42: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/42.jpg)
Page 42
Security• Security mechanisms for pervasive environments
must be– scalable to the small resource– able to deal with devices and environments of unknown
origin– adaptive to the dynamics of mobile computing
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing
![Page 43: Introduction to Pervasive Computing](https://reader036.vdocuments.us/reader036/viewer/2022081505/5a4d1af47f8b9ab059980a4b/html5/thumbnails/43.jpg)
Page 43
Context, Trust, Privacy and Security
December 2006Iran University of Science and TechnologyOf 43
Introduction to Pervasive Computing