introduction to pervasive computing

43
Introduction to Pervasive Computing By H. Momeni Computer Engineering Department Iran University of Science and Technology December 2006

Upload: brianna-jordan

Post on 08-Jan-2018

233 views

Category:

Documents


3 download

DESCRIPTION

Introduction to Pervasive Computing Agenda History and Evolution Vision Pervasive Computing Features System View and Support Framework Applications Challenges Of 43 Iran University of Science and Technology December 2006

TRANSCRIPT

Page 1: Introduction to Pervasive Computing

Introduction to Pervasive Computing

By H. Momeni Computer Engineering Department Iran University of Science and Technology

December 2006

Page 2: Introduction to Pervasive Computing

Page 2

Agenda• History and Evolution• Vision• Pervasive Computing Features• System View and Support• Framework• Applications• Challenges

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 3: Introduction to Pervasive Computing

Page 3

Remote communication

Fault tolerance

High Availability

Remote information access

Distributed security

Distributed Systems

(mid-1970s)

Mobile networking

Mobile information access

Adaptive applications

Energy-aware systems

Location sensitivity

Mobile Computing(early 1990s)

Smart spaces

Invisibility

Localized scalability

Uneven conditioning

Pervasive Computing

(2000)

History and Evolution

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 4: Introduction to Pervasive Computing

Page 4

Comparison

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 5: Introduction to Pervasive Computing

Page 5

Pervasive Technologies• Ubiquitous Computing (Mark Weiser, Xerox PARC

1990)• Calm Computing (John Brown, Xerox PARC 1996)• Tangible Computing (Ishii, 1997)• Universal Computing (James Landay, Berkeley

1998)• Invisible Computing (G. Barriello, UoWashington

1999)• Context Based Computing (Berkeley/IBM 1999)

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 6: Introduction to Pervasive Computing

Page 6

Pervasive Technologies cont’d• Hidden Computing (Toshiba 1999)• Pervasive Computing (Academia, IBM 1999, SAP

2000)• Everyday Computing (Georgia Tech, 2000)• Sentient Computing (AT&T, 2002)• Autonomous Computing (IBM, 2002)• Amorphous Computing (DARPA, 2002)• Spray Computing (Zambonelli, 2003)

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 7: Introduction to Pervasive Computing

Page 7

Vision“The most profound technologies are those

that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it”. [1991]

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 8: Introduction to Pervasive Computing

Page 8

Computer Evolution• Weiser’s idea was a vision too far ahead of its time• The hardware technology did not exit• After a decade hardware progress, PerCom are viable

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 9: Introduction to Pervasive Computing

Page 9

The State of the Art in Pervasive Computing• The term “Pervasive Computing” emerged from

research at IBM during 1996 – 97

• vision: computing services available anytime, anywhere and on demand

• Mark Weiser at Xerox PARC was leading research labeled as “Ubiquitous Computing in 1991

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 10: Introduction to Pervasive Computing

Page 10

The State of the Art… cont’d• UbiComp’s initial focus was not on making

infrastructure available everywhere

• UbiComp’ initial focus was on user centric

• PerCom’s initiative to exploit the existing wide scale deployment of computing technology

• UbiComp’s initiatives were to effectively make this complex mass of technology transparent to the human user’s

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 11: Introduction to Pervasive Computing

Page 11

Research Areas in Pervasive Computing• mobile computing• wireless networking• embedded computing• human computer interaction (HCI)• Context awareness with sensor technology

other terms tend to be an overlap of these five themes

Wearable Computing=Mobile Computing+Embedded Computing+HCI

Nomadic Computing=Mobile Computing+wireless networking

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 12: Introduction to Pervasive Computing

Page 12

Page 13: Introduction to Pervasive Computing

Page 13

A Pervasive Computing Model• five-layered model (from the perspective of the

human)– physical layer– Perceptive layer

• Composed of sensor (input for physical layer) and actuator (output for physical layer)

– Analog/Digital conversion layer• Converting between analog and digital signals

– Computational layer– Communicational Layer

Primary functions• coordination of environments(Os, protocol)

Secondary functions•actual applications within environment

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 14: Introduction to Pervasive Computing

Page 14 December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 15: Introduction to Pervasive Computing

Page 15

Pervasive computing Features• A Device : portal into an application-data space

• Computing environment : an information-enhanced physical space

• Connected devices provide services without user’s interventions by using sensed data in physical space.

• Providing services for users anytime, anywhere by any devices

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 16: Introduction to Pervasive Computing

Page 16

System view of pervasive computing

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 17: Introduction to Pervasive Computing

Page 17

Pervasiveness Support• Effective Use of smart spaces• Invisibility• Localized scalability• Masking uneven conditioning

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 18: Introduction to Pervasive Computing

Page 18

Effective use of Smart Spaces• Embedding computing infrastructure in

building infra.• Smart spaces brings together two world that

have been disjoint until now• The fusion of these worlds enables sensing and

control one of world by the other

Smart coffee cup

Automatic meeting transcription

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 19: Introduction to Pervasive Computing

Page 19

Invisibility• Weiser’s ideal: complete disappearance of

technology• minimal user distraction• system meets user expectations continuously• proactivity may sometimes be valuable

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 20: Introduction to Pervasive Computing

Page 20

Localized Scalability• With increase of complexity of smart spaces,

number of interactions between user’s computer and environment will be increased.

• This has severe bandwidth, energy for a wireless mobile user

• Scalability is a critical problem in PerCom• Traditional scalability has ignored physical

distance (web server)

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 21: Introduction to Pervasive Computing

Page 21

Masking Uneven Conditioning• There will persist huge differences in the

smartness of different environments• This large dynamic range of smartness can

reduce invisibility of PerCom to users• Solving problem

– Reduce the variability (to compensate space, dumb environment)

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 22: Introduction to Pervasive Computing

Page 22

Pervasive Computing Framework

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 23: Introduction to Pervasive Computing

Page 23

Pervasive Devices• Traditional input/output devices

– Keyboard, speaker, light-emitting diode• Wireless mobile devices

– Pager, PDA, cell phone, palmtop, Laptop• Smart devices

– Intelligent appliance, floor tiles with embedded sensor, biosensors

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 24: Introduction to Pervasive Computing

Page 24

Pervasive Networking• IEEE 802.11• Bluetooth• Internet

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 25: Introduction to Pervasive Computing

Page 25

Pervasive middleware• Interface between the network kernel and the

end-user applications running on pervasive devices

• keep users immersed in the pervasive computing space

• Consist mostly firmware and software bundles executing in client-server or Peer to peer

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 26: Introduction to Pervasive Computing

Page 26

User interface and application• User interface

– Web browser– Micro browser

• Pervasive applications– more environment-centric than either web-based

or mobile computing applications

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 27: Introduction to Pervasive Computing

Page 27

Applications

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 28: Introduction to Pervasive Computing

Page 28

Daily Life Application• Smart Home

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 29: Introduction to Pervasive Computing

Page 29

Public Service Application• Healthcare: Embedded Sensor networking for

patient monitoring

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 30: Introduction to Pervasive Computing

Page 30

Transportation Application• Smart Cars

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 31: Introduction to Pervasive Computing

Page 31

Environment Applications• Environmental Monitoring

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 32: Introduction to Pervasive Computing

Page 32

National Defense Applications• Surveillance Platform

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 33: Introduction to Pervasive Computing

Page 33

Industrial Business Applications

• Supply Chain Management

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 34: Introduction to Pervasive Computing

Page 34

Challenges• User intent• Cyber Foraging• Adaptability• High Level Energy Management• Context awareness• Trust • Privacy• Security

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 35: Introduction to Pervasive Computing

Page 35

User Intent• PerCom system must track user intent for

Proactivity• Challenges:

– Can user intent be inferred?– How is it handled in dynamic interactions?– When and how is it updated?– Will it hurt usability and performance unacceptably?

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 36: Introduction to Pervasive Computing

Page 36

Cyber Foraging• The need to make mobile devices smaller, lighter

and longer battery life, reduce computing capabilities

• Solution:– Exploiting wired hardware infrastructure in a neighborhood

that it play surrogate role– The mobile computer ships the computation to the

surrogate• Challenges:

– Discover the presence of surrogate – Load balancing – Minimal delay

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 37: Introduction to Pervasive Computing

Page 37

Adaptability• Significant mismatch between the supply and

demand of a resource • New user’s requirements • Change Requirements

• Challenge– Reduce human intervention– Configuration– Run time Reconfiguration

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 38: Introduction to Pervasive Computing

Page 38

High Level Energy Management• Proactivity and self-tuning increase the energy

demand of software on mobile devices• The attempts to make such devices lighter and

smaller, reduce the battery capacity• The higher level of must be involved to save

energy.– Energy aware memory management– Energy aware adaptation

• Challenges– Impact of invisibility– Exploit of knowledge of user intent

December 2006

Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 39: Introduction to Pervasive Computing

Page 39

Context Awareness“Context is any evidence that can be used to

support arguments for the conditions of the situation of any subject or target, which influences their interactive behavior”

• PerCom to be minimally intrusive, has to be context aware.

• User, system and environment context• Challenges:

– How does system obtain these information?– Where is context stored?– How frequently does context have to be consulted?

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 40: Introduction to Pervasive Computing

Page 40

Trust• Enable systems to exchange information even

without the intervention of administrators to authorize these interactions

• How to grant users access to resources and information based on their trustworthiness rather than the application of conventional techniques that map authorizations to access rights.

• Challenges:– Unsavory uses (targeted spam, blackmail)

password-based protocols or biometric authentication?

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 41: Introduction to Pervasive Computing

Page 41

Privacy• Huge amounts of information will be shared and

exchanged in pervasive computing environments

• With context-based services this question arise:

– Do you want this information shared?– How can you trust the technology?– What does the environment itself do?– How can you secure the access to private information?

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 42: Introduction to Pervasive Computing

Page 42

Security• Security mechanisms for pervasive environments

must be– scalable to the small resource– able to deal with devices and environments of unknown

origin– adaptive to the dynamics of mobile computing

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing

Page 43: Introduction to Pervasive Computing

Page 43

Context, Trust, Privacy and Security

December 2006Iran University of Science and TechnologyOf 43

Introduction to Pervasive Computing