mobile computing - keynote speech
TRANSCRIPT
-
7/30/2019 Mobile Computing - Keynote Speech
1/55
Mahamod Ismail
[email protected], [email protected] Dec. 2012, Mine Wellness Seri KembanganSelangor
Mobile Computing- Challenges and the Way
Forward
2012 IACSIT MALAYSIA CONFERENCES
Mines Wellness Kuala Lumpur Malaysia
-
7/30/2019 Mobile Computing - Keynote Speech
2/55
Presentation Outline
IntroductionComputing Technologies
Challenges
Case Study Advanced ComputingEnvironment to Enhance InnovativeDigital Economy (ACE2EIDE)
The Way Forward
2
-
7/30/2019 Mobile Computing - Keynote Speech
3/55
Introduction
-
7/30/2019 Mobile Computing - Keynote Speech
4/55
Introduction
-
7/30/2019 Mobile Computing - Keynote Speech
5/55
Introduction
5
-
7/30/2019 Mobile Computing - Keynote Speech
6/55
Introduction
Wireless Computing, Nomadic Computing, Mobile Computing, Ubiquitous/Pervasive Computing, Invisible Computing
Source: Senthivel 2011
6
-
7/30/2019 Mobile Computing - Keynote Speech
7/55
Introduction
Source: Senthivel 2011
7
-
7/30/2019 Mobile Computing - Keynote Speech
8/55
Introduction
1995-2005
Internet ComputingEnvironment
Computers connected tothe Internet.
1950-1980Centralized ComputingEnvironmentSeveral terminals
connected to the
mainframe
1980-1995Client-serverEnvironmentSeveral PCs connected to a
server through Local Area
Network (LAN)
Internet
LAN
mainframe
terminals
server
computer
computer
1st Wave 2nd
Wave 3rd Wave
8
Computing Environment
-
7/30/2019 Mobile Computing - Keynote Speech
9/55
Introduction
2005-2012
Pervasive/UbiquitousComputing Environment
Computers and mobile devicesare connected to the Internetthrough a wireless
communication
2012-
Ensemble ComputingEnvironment
Computers and mobile devices
are connected to the Internet and
can also build an ad hoc networkbetween them
InternetInternet
computer
computer
Mobile device
Mobile device
computer
Wirelessnetwork
server
videoca
m
computer
sensors
4th
Wave 5th
Wave
Wireless
network
9
Computing Environment
-
7/30/2019 Mobile Computing - Keynote Speech
10/55
Introduction
10
-
7/30/2019 Mobile Computing - Keynote Speech
11/55
What is Mobile Computing?
getting more
mobile
becoming more like a11
-
7/30/2019 Mobile Computing - Keynote Speech
12/55
Why Mobile Computing?
People are mobile
Devices are mobile
12
-
7/30/2019 Mobile Computing - Keynote Speech
13/55
What is Mobility?
A person who moves
between different geographical locations
between different networks
between different communication devices between different applications
13
-
7/30/2019 Mobile Computing - Keynote Speech
14/55
What is Mobility?
Mobile computing is about both physical and
logical computing entities that move
Physical entities
computers change locations
Logical entities
a running user application or a mobile agent migrating
over internet
14
-
7/30/2019 Mobile Computing - Keynote Speech
15/55
Enable the business initiatives by supporting mobility of Customers, Suppliers and Businesses, Employees
Mobile computing applications
Wireless messaging (e.g., SMS)
Mobile ecommerce (M-Commerce) and its variants Positional commerce (p-commerce) . Voice commerce (v-commerce). Television commerce (T-Commerce)
Mobile ebusiness applications (MEBAs), e.g., M-CRM,
M-portal Specialized applications
Location sensitive apps, Wireless sensor network apps, Mobileagent apps
Two views: Mobile applications are fundamentally new
Mobile Computing Application
15
-
7/30/2019 Mobile Computing - Keynote Speech
16/55
Nomadic computing
refers to limited migration
migration is within a building at a pedestrian
speed
interleaved pattern of user relocation and indoor
connections
users carrying laptop with wireless access are
engaged in nomadic computing
Computing Technology
16
-
7/30/2019 Mobile Computing - Keynote Speech
17/55
Computing Technology
Nomadicity is defined as the tendency of a person, or group of
people, to move with relative frequency.
Nomadic Computing
refers to mobile users who need access to e-mail,
company data and the Internet at all times no
matter where they are in the world at any given
moment.
also termed: as Wireless Networking, MobileComputing, Mobile Enterprise, Portable Computing
'technomads - people using such a system
'nomadicity - people ability to use that system17
-
7/30/2019 Mobile Computing - Keynote Speech
18/55
Mobile computing
requires wireless h/w to support outdoor mobility
and handoff from one h/w to the next at a
pedestrian or vehicular speed
traveler in car using laptop / smart phone / mobile
device connected with a GSM/WCDMA/HSPA
phone engaged in mobile computing
Ubiquitous computing or pervasive computing
refers to access to computer network all the time
at any location by any person
can not be realized unless mobile computing
matures
Computing Technology
18
-
7/30/2019 Mobile Computing - Keynote Speech
19/55
Computing Technology
Ubiquitous Computing Ubicomp Notions
Computing capabilities, any time, any place
Invisible resources
Machines sense users presence and act
accordingly
Components of ubiquitous communications
Service discovery discover devices
Service mobility configuration information moves
to new devices
Event notification for context awareness
Context-awareness location, user actions,
location properties, 19
-
7/30/2019 Mobile Computing - Keynote Speech
20/55
Ubiquitous Computing
Ubiquitous computingis the method ofenhancing
computer use by making many computers
availablethroughout the physical environment, but
making them
effectively invisible to the user
Mark Weiser
Pervasive Computingis the ability to accessinformation and software applications anytime
and anywhere.20
-
7/30/2019 Mobile Computing - Keynote Speech
21/55
Ubiquitous Computing
21
-
7/30/2019 Mobile Computing - Keynote Speech
22/55
Ubiquitous Computing
Transparent Interfaces Hide their presence from user
Provide interaction between user and application
Examples:
Gesture recognition
Speech recognition
Free form pen interaction
Computational perception etc.
22
-
7/30/2019 Mobile Computing - Keynote Speech
23/55
Ubiquitous Computing
Context awareness Context information about the environment with
which the application is associated.
Provide interaction between user and application
Context aware application: Location and Time
Is one which can capture the context
Assign meaning to it
Change behaviour accordingly
Applications that are context aware allow rapid
personalization of their services
23
-
7/30/2019 Mobile Computing - Keynote Speech
24/55
Ubiquitous Computing
Automated Capture To capture our day-to-day experience and make it
available for future use.
Constraints
Multiple streams of information
Their time synchronization
Their correlation and integration
Need: Automated tools that support capture,
integration and future access of info.
24
-
7/30/2019 Mobile Computing - Keynote Speech
25/55
Ubiquitous Computing
What make this possible?
Processing cheaper, faster, smaller, more energy efficient
Storage big and fast
Networking global, local, ad-hoc, low-power, high bandwidth, low latencies
Displays projection, flexible materials, power consumption
25
-
7/30/2019 Mobile Computing - Keynote Speech
26/55
Computing Technology
26
-
7/30/2019 Mobile Computing - Keynote Speech
27/55
Nomadic, Mobile & Ubiquitous
No
Network
Mobile ComputingNomadicComputing
Wireless
Network
(B)
Fixed
Network
Wireless
Network
(A)
Fixed
Wireless
Network
Ubiquitous Computing
27
-
7/30/2019 Mobile Computing - Keynote Speech
28/55
Computing Technology
28 http://www.csd.cs.cmu.edu/research/areas/mopercomp/
-
7/30/2019 Mobile Computing - Keynote Speech
29/55
Ensemble Computing
Device Ensembles Coordinated collections of computers, which include
both mobile and infrastructure components, DeviceEnsembles [3]
Ensemble Computing The techniques for programming and
orchestrating their applications,
Want et
al. 201029
-
7/30/2019 Mobile Computing - Keynote Speech
30/55
Challenges
MobileComputing
UbiquitousComputing
TraditionalComputing
PervasiveComputing
Low
L
ow
High
High
Embeddedness
Mobility
Source:
Lyytinen 200330
-
7/30/2019 Mobile Computing - Keynote Speech
31/55
Challenges
Manageability Challenges homogeneity, i.e., that all machines agree on the
same software, protocols, formats, and versioning
New Programming Models
Adapting platform-independent programming such
as Java, Flash, and Silverlight to ensemble
programming
Context-aware programming models can also be
useful to write ensemble applications.
Wireless Limitations
Reliable connectivity signal blockage, RFI
Form factors - increasingly mobile devices size to
support various communication technologies31
-
7/30/2019 Mobile Computing - Keynote Speech
32/55
Challenges
Usability Issues broad availability and spectrum of devices that can
form an ensemble, and do so with minimal user
intervention, will dictate the usability and
pervasiveness of the technology. Power Constraints
Mobility of Tasks within Ensembles Based on Power
Availability
Mobility of Physical Power among EnsembleMembers
Security and Privacy
Ensemble formation
Ensemble computation32
-
7/30/2019 Mobile Computing - Keynote Speech
33/55
HETEROGENEOUS WIRELESS COMMUNICATION
WORLDDAB: Digital Audio Broadcast
VHE: Virtual Home Environment
DVB-T: Digital Video Broadcast Terrestrial
UMTS: Universal Mobile Telecommunication System
Challenges
33
-
7/30/2019 Mobile Computing - Keynote Speech
34/55
Challenges
34
-
7/30/2019 Mobile Computing - Keynote Speech
35/55
35
-
7/30/2019 Mobile Computing - Keynote Speech
36/55
Challenges
..Rather than supporting the device, ITorganizations would be better served bysupporting specific mobile computingapplications
Ty Rollin, Chief architect of Mobiquity
36
-
7/30/2019 Mobile Computing - Keynote Speech
37/55
ACE2EIDE
Innovative Digital Economy. Initiatives Digital Malaysia or Digital ASEAN.
One of the focus area Smart City Smart Village.
Challenge for Malaysia and ASEAN low in ICTadoption, especially in connectivity.
Role of the university to carry out research in
order to solve this problem.
Our idea - HoneyBee computing. Case Study Advanced Computing
Environment to Enhance Innovative Digital
Economy (ACE2EIDE)37
-
7/30/2019 Mobile Computing - Keynote Speech
38/55
ACE2EIDE
The whole project is funded by the Malaysiangovernment through the Long Term Research
Grant (LRGS)
Amount of fund: RM6 million over 3-5 years.
Currently still under development.
First release end of 2013.
38
-
7/30/2019 Mobile Computing - Keynote Speech
39/55
ACE2EIDE
Malaysian initiative for Innovative Digital Economy
1990 2010
39
-
7/30/2019 Mobile Computing - Keynote Speech
40/55
Overall Connectivity
Business
Env
Social &
Culture Legal
Gov Policy
& Vision
Business
Adoption1 Sweden 8.49 8.20 8.13 8.53 8.25 8.90 8.75
2 Denmark 8.41 7.85 8.18 8.47 8.10 8.70 8.90
3 United States 8.41 7.35 7.85 9.00 8.70 9.25 8.90
4 Finland 8.36 8.00 8.3 8.47 8.35 8.00 8.85
7 Hong Kong 8.22 7.65 8.4 7.27 9.00 9.18 8.28
8 Singapore 8.22 7.35 8.63 7.33 8.70 9.13 8.489 Australia 8.21 7.35 8.24 8.53 8.50 8.85 8.18
10 New Zealand 8.07 6.80 8.17 8.6 8.45 8.50 8.29
12 Taiwan 7.99 7.00 7.95 8.4 8.15 8.55 8.15
13 South Korea 7.94 7.90 7.32 8.8 7.65 9.20 7.18
14 United Kingdom 7.89 7.65 7.40 7.73 8.10 8.55 8.00
16 Japan 7.85 7.70 7.16 7.8 7.43 8.75 8.04
36 Malaysia 5.93 4.35 7.36 5.47 6.88 6.65 5.80
49 Thailand 4.86 3.20 6.83 4.50 6.60 5.00 4.08
54 Philippines 4.47 2.60 6.35 4.27 4.85 5.20 4.38
56 China 4.28 2.65 6.36 5.40 5.20 4.60 3.11
58 India 4.11 2.15 6.27 4.67 5.60 5.10 2.88
62 Vietnam 3.87 3.20 5.70 3.60 4.65 4.60 2.71
65 Indonesia 3.60 2.6o 6.04 3.60 4.20 3.88 2.5540
ACE2EIDE
Smart Cit Smart Village (SCSV)
-
7/30/2019 Mobile Computing - Keynote Speech
41/55
Smart City Smart Village (SCSV)
)
One of the initiative under Digital Malaysiaor may be Digital ASEAN.
The main aim - to balance development in
the urban and rural areas. The goal - to improve everything from
energy use to healthcare, education, traffic
and shopping by doing it smart with the
help of ICT and green technology.
Contribute to the national economy.
41
-
7/30/2019 Mobile Computing - Keynote Speech
42/55
Ensemble Computing
Our proposed model of connectivity to supportSmart City Smart Village is based on the
concept of Ensemble computing as suggested
by European Union Interlink WG1.
Computing devices can communicate and
work together to complete a certain task
based on peer-to-peer protocol and
supporting services. Modes : Swarm of bats and Bee hive
42
-
7/30/2019 Mobile Computing - Keynote Speech
43/55
HoneyBee Computing
The Bee any computing
devices (mobile, PC,
sensors, device with
embedded software).
The bee can communicate tothe Internet via the wireless
network.
Some of the bees (from two
to a thousand) can create ad-hoc communication between
them to implement a certain
task.
43
-
7/30/2019 Mobile Computing - Keynote Speech
44/55
HoneyBee Computing
HoneyBee Computing is a software systemthat provides an environment for ad-hoc peer
to peer communication between people and
between devices.
In this environment, devices will constantly be
entering and leaving the ad-hoc network.
By joining an ad-hoc network, a HoneyBee
Computing enabled device would be able tocommunicate, and exchange information with
other devices within the network.
44
-
7/30/2019 Mobile Computing - Keynote Speech
45/55
HoneyBee Computing
Main emphasis - security and trust. Two types of ad-hoc network:
Open network, that allows any devices to join and
communicate.
Trusted network, that only allows trusted devices to
join.
Communication between devices can be done
through: Bluetooth
Wifi
3G
RFID45
H B C ti
-
7/30/2019 Mobile Computing - Keynote Speech
46/55
HoneyBee Computing
Applications
Simple applications, such as: Finding and communicating with friends
Controlling devices such as home devices from
remote.
Smart mapping software
Complicated applications depends on the
availability of the suitable ecosystem.
For SCSV, we are looking at:
Smart waste control
Secure neighbourhood
Smart farming
Smart community46
-
7/30/2019 Mobile Computing - Keynote Speech
47/55
O ll E t t
-
7/30/2019 Mobile Computing - Keynote Speech
48/55
Overall Ecosystem to
Support SCSV
To support SCSV application development, anumber of other systems need to be provided:
Semantic knowledge tool that will gather and
represent knowledge about a particular domain.
Semantic search engine.
Predictive analytic engine that uses a variety of
statistical techniques, machine learning and data
mining to analyze current and historical data to
make prediction about future events.
48
ENSEMBLE PLATFORM
-
7/30/2019 Mobile Computing - Keynote Speech
49/55
ENSEMBLE PLATFORM
Application
Platform
Predictive
Analytic
Semantic
Security Agent Env. Comm. Resource
Mgmt
Apps
Implemented by Using Java
Security Apps
APIs
To Support Java
Hardware
Android
Operating System Communication
Trusted
MIDDLEWARE
Forensic Tool
49
-
7/30/2019 Mobile Computing - Keynote Speech
50/55
Note on Item 4 : Develop middleware/apps on Android platform as lightweight OS
50
-
7/30/2019 Mobile Computing - Keynote Speech
51/55
The Way Forward
51
-
7/30/2019 Mobile Computing - Keynote Speech
52/55
Top 10 IT Tech 20121. Media tablets and beyond
2. Mobile-centric applications and interfaces (touch, gesture and voice search) .
3. Social and contextual user experience.
4. Application stores and marketplace.
5. The Internet of everything: pervasive computing (cameras, sensors,
microphones, image recognition)
6. Next-generation analytics
7. Big data8. In-memory computing
9. Extreme low-energy servers
10. Cloud computing
The Way Forward
52
-
7/30/2019 Mobile Computing - Keynote Speech
53/55
The Way Forward
Top 10 Strategic Technology Trends for 2013(Gartner 2012)
Mobile Devices Battles
Mobile Applications & HTML5
Personal Cloud Internet of Things
Hybrid IT & Cloud Computing
Strategic Big Data
Actionable Analytics
Mainstream In-Memory Computing
Integrated Ecosystems
Enterprise App Stores53
-
7/30/2019 Mobile Computing - Keynote Speech
54/55
REFERENCES
Cristian Borcea, 2011, Mobile Computing: State-of-the-Art and Future Trends.
(http://www.cs.njit.edu/~borcea)
Ganesan Senthivel, 2011, Cloud Programming
Concepts(http://www.codeproject.com/Articles/250543/Clou
d-Programming-Concepts)
Roy Want, Eve Schooler, Lenka Jelinek, Jaeyeon
Jung, Dan Dahle, and Uttam Sengupta, 2010,Ensemble Computing: Opportunities and
Challenges, Intel Technology Journal | Volume14, Issue 1.
Riri Fitri Sari, 2012, Protocol En ineerin in54
-
7/30/2019 Mobile Computing - Keynote Speech
55/55