SlideShare a Scribd company logo
CS 6910 – Pervasive Computing
Section 0.A:
Introduction to Pervasive Computing
Dr. Leszek Lilien
Department of Computer Science
Western Michigan University
Slides based on the article “Pervasive Computing: Vision and Challenges”
by Prof. M. Satyanarayanan, Carnegie Mellon University,
IEEE Personal Communications, 2001
[Possible mistakes and omissions are all mine. – LTL]
Slides are © 2007 by Leszek T. Lilien
Requests to use original slides for non-profit purposes will be gladly granted upon a written request.
2
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
1. Introduction
 Vision of pervasive computing /ubiquitous
computing [Mark Weiser, 1991]
 ‘‘The most profound technologies are those that
disappear. They weave themselves into the fabric of
everyday life until they are indistinguishable from it.’’
 The essence of that vision:
 Creation of environments saturated with computing and
communication capabilities, yet gracefully integrated with
human users
 A vision too far ahead of its time (1991)
 The required hardware technology simply did not exist
 The implementation attempted by Weiser and his
colleagues at Xerox PARC fell short
3
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Introduction (2)
 Critical hardware elements of pervasive computing are now
(2001) available
 Are now viable commercial products
 Examples:
 Handheld computers / wearable computers
 Wireless LANs
 Sensing devices
 Control appliances
 We can begin the quest for pervasive computing vision.
 Examples of pervasive computing projects
 At universities:
 Project Aura at Carnegie Mellon / Endeavour at UC Berkeley
 Oxygen at MIT / Portolano at Washington
 In the industry:
 AT&T Research in Cambridge, U.K.
 IBM TJ Watson Research Center
4
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Introduction (3)
 The goal of this paper:
Understand the challenges in computer systems
research posed by pervasive computing
 Outline:
 Relationship of pervasive computing to the closely-
related fields of distributed systems and mobile
computing
 Two pervasive computing scenarios
 Why they are fiction rather than fact today.
 Selected key research problems
 With focus on computer systems issues
 Avoiding other areas important to pervasive computing
 E.g., human-computer interaction, expert systems, software
agents
5
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
2. Related Fields:
Pervasive Computing vs.
Distributed Systems & Mobile Computing
 Evolutionary history of pervasive computing
 Distributed systems (DIST)
 Mobile computing (MOBI)
 [LL:] Ad hoc systems is MOBI’s superset, VANs – its subset
 Pervasive computing (PERV)
 Technical problems in PC
 “Old” problems - already studied & solved at earlier evolution
steps
 Some earlier solutions apply directly for pervasive computing
 Some earlier solutions are inadequate for pervasive computing
 New problems - no obvious mapping to problems studied at
earlier evolution steps
6
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (2)
 Next:
 Sort out complex intellectual relationship
 Between problems/solutions for DIST, MOBI, PERV
 Develop a taxonomy of research issues for each
phase of the evolution (DIST -> MOBI -> PERV)
7
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (3)
2.1. Distributed Systems
 Distributed Systems
 Any computers connected by any networks
 [The paper: Intersection of personal computers and LANs]
 Research from the mid-1970’s through the early 1990’s
 Created a conceptual framework and algorithmic base
 Enduring value in all work involving >= 2 computers connected by
a network — whether mobile or static, wired or wireless, sparse or
pervasive
 Solutions from DIST
 Span many areas that are foundational to pervasive
computing
 Well codified in textbooks (e.g.,: [8, 19, 20])
8
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (4)
Distributed Systems (2)
 Specific subarea solutions for DIST
 Remote communication
 Incl. protocol layering, remote procedure call [3], use of
timeouts, use of end-to-end arguments in placement of
functionality [28]
 Fault tolerance
 Incl. atomic transactions, distributed and nested transactions,
two-phase commit [13]
 High availability
 Incl. optimistic and pessimistic replica control [9], mirrored
execution [4], optimistic recovery [37]
 Remote information access
 Incl. caching, function shipping, distributed file systems,
distributed databases [30]
 Security
 Incl. encryption-based mutual authentication and privacy [23]

More Related Content

Similar to Sec.0a--Intro to pervasive computing 1.ppt

Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
thetechnicalzone
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Ankita Gupta
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Anshuman Biswal
 
Network Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and ApplicationsNetwork Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and Applications
Biocomplexity Institute of Virginia Tech
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...
IJECEIAES
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write upWhoGoesThere
 
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...
CrimsonpublishersMedical
 
Software Ecosystem Evolution. It's complex!
Software Ecosystem Evolution. It's complex!Software Ecosystem Evolution. It's complex!
Software Ecosystem Evolution. It's complex!
Tom Mens
 
From Awareness to Adaptation
From Awareness to AdaptationFrom Awareness to Adaptation
Visualizing Networked Collaboration
Visualizing Networked CollaborationVisualizing Networked Collaboration
Visualizing Networked Collaboration
Ahmet Soylu
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
acijjournal
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
journal ijrtem
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
ijsptm
 
International journal of engineering issues vol 2015 - no 1 - paper3
International journal of engineering issues   vol 2015 - no 1 - paper3International journal of engineering issues   vol 2015 - no 1 - paper3
International journal of engineering issues vol 2015 - no 1 - paper3
sophiabelthome
 
Augmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware ApproachAugmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware ApproachAditya Yudiantika
 
Web Science Framework and InterDataNet
Web Science Framework and InterDataNetWeb Science Framework and InterDataNet
Web Science Framework and InterDataNet
maria chiara pettenati
 
Networking overview
Networking overviewNetworking overview
Networking overviewmaxminhaj1
 
Mobsens -Journal paper
Mobsens -Journal paperMobsens -Journal paper
Mobsens -Journal paper
Eman Kanjo
 
Interaction styles
Interaction stylesInteraction styles
Interaction styles
David Lamas
 

Similar to Sec.0a--Intro to pervasive computing 1.ppt (20)

Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Network Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and ApplicationsNetwork Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and Applications
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write up
 
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...
 
Software Ecosystem Evolution. It's complex!
Software Ecosystem Evolution. It's complex!Software Ecosystem Evolution. It's complex!
Software Ecosystem Evolution. It's complex!
 
From Awareness to Adaptation
From Awareness to AdaptationFrom Awareness to Adaptation
From Awareness to Adaptation
 
Visualizing Networked Collaboration
Visualizing Networked CollaborationVisualizing Networked Collaboration
Visualizing Networked Collaboration
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
International journal of engineering issues vol 2015 - no 1 - paper3
International journal of engineering issues   vol 2015 - no 1 - paper3International journal of engineering issues   vol 2015 - no 1 - paper3
International journal of engineering issues vol 2015 - no 1 - paper3
 
Augmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware ApproachAugmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware Approach
 
Web Science Framework and InterDataNet
Web Science Framework and InterDataNetWeb Science Framework and InterDataNet
Web Science Framework and InterDataNet
 
Networking overview
Networking overviewNetworking overview
Networking overview
 
Mobsens -Journal paper
Mobsens -Journal paperMobsens -Journal paper
Mobsens -Journal paper
 
Interaction styles
Interaction stylesInteraction styles
Interaction styles
 
SM2701 Class 10
SM2701 Class 10SM2701 Class 10
SM2701 Class 10
 

More from ahmadfaisal744721

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
ahmadfaisal744721
 
Intoduction to Graph.pptx
Intoduction to Graph.pptxIntoduction to Graph.pptx
Intoduction to Graph.pptx
ahmadfaisal744721
 
Introduction to Android.ppt
Introduction to Android.pptIntroduction to Android.ppt
Introduction to Android.ppt
ahmadfaisal744721
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
ahmadfaisal744721
 
db design and maintenance part 1.pptx
db design and maintenance part 1.pptxdb design and maintenance part 1.pptx
db design and maintenance part 1.pptx
ahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptx
ahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptx
ahmadfaisal744721
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptx
ahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
ahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
ahmadfaisal744721
 
Sec.0a--Intro to pervasive computing 6.ppt
Sec.0a--Intro to pervasive computing 6.pptSec.0a--Intro to pervasive computing 6.ppt
Sec.0a--Intro to pervasive computing 6.ppt
ahmadfaisal744721
 
write no image.pptx
write no image.pptxwrite no image.pptx
write no image.pptx
ahmadfaisal744721
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
ahmadfaisal744721
 
javascript-basics.ppt
javascript-basics.pptjavascript-basics.ppt
javascript-basics.ppt
ahmadfaisal744721
 

More from ahmadfaisal744721 (14)

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
 
Intoduction to Graph.pptx
Intoduction to Graph.pptxIntoduction to Graph.pptx
Intoduction to Graph.pptx
 
Introduction to Android.ppt
Introduction to Android.pptIntroduction to Android.ppt
Introduction to Android.ppt
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
db design and maintenance part 1.pptx
db design and maintenance part 1.pptxdb design and maintenance part 1.pptx
db design and maintenance part 1.pptx
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptx
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptx
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
 
Sec.0a--Intro to pervasive computing 6.ppt
Sec.0a--Intro to pervasive computing 6.pptSec.0a--Intro to pervasive computing 6.ppt
Sec.0a--Intro to pervasive computing 6.ppt
 
write no image.pptx
write no image.pptxwrite no image.pptx
write no image.pptx
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
javascript-basics.ppt
javascript-basics.pptjavascript-basics.ppt
javascript-basics.ppt
 

Recently uploaded

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 

Recently uploaded (20)

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 

Sec.0a--Intro to pervasive computing 1.ppt

  • 1. CS 6910 – Pervasive Computing Section 0.A: Introduction to Pervasive Computing Dr. Leszek Lilien Department of Computer Science Western Michigan University Slides based on the article “Pervasive Computing: Vision and Challenges” by Prof. M. Satyanarayanan, Carnegie Mellon University, IEEE Personal Communications, 2001 [Possible mistakes and omissions are all mine. – LTL] Slides are © 2007 by Leszek T. Lilien Requests to use original slides for non-profit purposes will be gladly granted upon a written request.
  • 2. 2 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 1. Introduction  Vision of pervasive computing /ubiquitous computing [Mark Weiser, 1991]  ‘‘The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.’’  The essence of that vision:  Creation of environments saturated with computing and communication capabilities, yet gracefully integrated with human users  A vision too far ahead of its time (1991)  The required hardware technology simply did not exist  The implementation attempted by Weiser and his colleagues at Xerox PARC fell short
  • 3. 3 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Introduction (2)  Critical hardware elements of pervasive computing are now (2001) available  Are now viable commercial products  Examples:  Handheld computers / wearable computers  Wireless LANs  Sensing devices  Control appliances  We can begin the quest for pervasive computing vision.  Examples of pervasive computing projects  At universities:  Project Aura at Carnegie Mellon / Endeavour at UC Berkeley  Oxygen at MIT / Portolano at Washington  In the industry:  AT&T Research in Cambridge, U.K.  IBM TJ Watson Research Center
  • 4. 4 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Introduction (3)  The goal of this paper: Understand the challenges in computer systems research posed by pervasive computing  Outline:  Relationship of pervasive computing to the closely- related fields of distributed systems and mobile computing  Two pervasive computing scenarios  Why they are fiction rather than fact today.  Selected key research problems  With focus on computer systems issues  Avoiding other areas important to pervasive computing  E.g., human-computer interaction, expert systems, software agents
  • 5. 5 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 2. Related Fields: Pervasive Computing vs. Distributed Systems & Mobile Computing  Evolutionary history of pervasive computing  Distributed systems (DIST)  Mobile computing (MOBI)  [LL:] Ad hoc systems is MOBI’s superset, VANs – its subset  Pervasive computing (PERV)  Technical problems in PC  “Old” problems - already studied & solved at earlier evolution steps  Some earlier solutions apply directly for pervasive computing  Some earlier solutions are inadequate for pervasive computing  New problems - no obvious mapping to problems studied at earlier evolution steps
  • 6. 6 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (2)  Next:  Sort out complex intellectual relationship  Between problems/solutions for DIST, MOBI, PERV  Develop a taxonomy of research issues for each phase of the evolution (DIST -> MOBI -> PERV)
  • 7. 7 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (3) 2.1. Distributed Systems  Distributed Systems  Any computers connected by any networks  [The paper: Intersection of personal computers and LANs]  Research from the mid-1970’s through the early 1990’s  Created a conceptual framework and algorithmic base  Enduring value in all work involving >= 2 computers connected by a network — whether mobile or static, wired or wireless, sparse or pervasive  Solutions from DIST  Span many areas that are foundational to pervasive computing  Well codified in textbooks (e.g.,: [8, 19, 20])
  • 8. 8 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (4) Distributed Systems (2)  Specific subarea solutions for DIST  Remote communication  Incl. protocol layering, remote procedure call [3], use of timeouts, use of end-to-end arguments in placement of functionality [28]  Fault tolerance  Incl. atomic transactions, distributed and nested transactions, two-phase commit [13]  High availability  Incl. optimistic and pessimistic replica control [9], mirrored execution [4], optimistic recovery [37]  Remote information access  Incl. caching, function shipping, distributed file systems, distributed databases [30]  Security  Incl. encryption-based mutual authentication and privacy [23]