sponsored by the u.s. department of defense © 2008 by carnegie mellon university page 1 pittsburgh,...

8
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA 15213-3890 The Implications of a Single Mobile Computing Device Len Bass and John Klein

Upload: louise-rodgers

Post on 19-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA 15213-3890 The Implications of a Single Mobile Computing

Sponsored by the U.S. Department of Defense© 2008 by Carnegie Mellon University

page 1

Pittsburgh, PA 15213-3890

The Implications of a Single Mobile Computing Device

Len Bass and John Klein

Page 2: Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA 15213-3890 The Implications of a Single Mobile Computing

© 2002 by Carnegie Mellon University page 2

Outline

Convergence

Issues• User Interface Software• Security• Reliability

Page 3: Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA 15213-3890 The Implications of a Single Mobile Computing

© 2002 by Carnegie Mellon University page 3

Convergence - 1

Convergence is the use of a single mobile device to manage all of your computing needs

Two models of convergence• Convergence to the “cloud”

- Computation is performed by a collection of services existing on the network “somewhere”

• Convergence to the individual- Computation is performed by a device permanently

and privately associated with an individual.

Two models are the same with respect to communication and sharing with others.

Page 4: Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA 15213-3890 The Implications of a Single Mobile Computing

© 2002 by Carnegie Mellon University page 4

Convergence – 2

Hardware assumptions

Both models assume independent I/O devices. Computer connects to the I/O devices through a wireless mechanism such as blue tooth.

Convergence to the cloud assumes computing device is primarily a communications mechanism

Convergence to the individual assumes computing device has large amounts of primary storage, very fast processors – e.g. cellphone.

Page 5: Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA 15213-3890 The Implications of a Single Mobile Computing

© 2002 by Carnegie Mellon University page 5

User Interface Software

The question for both models is where does the user interface knowledge reside?• If in the I/O devices then knowledge of all potential

applications must be in the I/O devices• If in the applications then must maintain knowledge of

all potential I/O devices in the applications.• If shared (through mobile code) then linkage with I/O

devices must have sufficiently high bandwidth to support code mobility.

Research question is how is I/O knowledge distributed to support efficient development and efficient execution.

Page 6: Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA 15213-3890 The Implications of a Single Mobile Computing

© 2002 by Carnegie Mellon University page 6

Security

Convergence to the cloud.• Assumes all communication to service providers are protected

and data stored by service providers is protected..• Different service providers will likely require different

authentication mechanisms.• Attackers have centralized targets.

Convergence to the individual • Assumes data on device is protected in case of loss or theft.• More susceptible to malware residing on I/O devices.• Trust needed only for back up data service provider.

Research questions: Is there a lightweight protection against malware residing on I/O devices.

Page 7: Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA 15213-3890 The Implications of a Single Mobile Computing

© 2002 by Carnegie Mellon University page 7

Reliability

Convergence to the cloud:• Constant connectivity. Intermittent connectivity will require

synchronization mechanisms.• Replacement of lost or stolen devices is seamless.• Back up is handled by service providers and is unnecessary

for communications device since there is no non-replicated local data.

• The same data in different locations must be synchronized. E.g. address.

Convergence to the individual• Connectivity needed only for backups and collaboration with

others.• Intermittent connectivity can be used for incremental backups• Lost or stolen devices must be reset from back up data.• Two copies of each datum – one local and one in back up

store.

Page 8: Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA 15213-3890 The Implications of a Single Mobile Computing

© 2002 by Carnegie Mellon University page 8

Summary

Convergence is coming

Unclear whether convergence is to the “cloud” or to the individual

Better methods are needed for:• Distributing user interface knowledge• Managing security and trust issues• Managing reliability issues.