SlideShare a Scribd company logo
1
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (5)
2.2. Mobile Computing
 Mobile Computing
 The early 1990s - full-function laptops + wireless LANs
 Early mobile computing systems:
A distributed system with mobile clients
 [LL:] Current mobile computing systems:
Any nodes can be mobile
 Solutions from MOBI
 Many basic principles of DIST design continued to apply to MOBI
BUT
 Four key constraints of mobility required specialized techniques [31] for
MOBI:
 Unpredictable variation in network quality
 Lowered trust and robustness of mobile elements
 Limitations on local resources imposed by weight and size constraints
 Concern for battery power consumption
 Mobile computing - still a very active and evolving field of research
 Awaits codification in textbooks (as of 2000)
2
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (6)
Mobile Computing (2)
 Specific subarea solutions for MOBI
 Mobile networking
 Incl. mobile IP [2], ad hoc protocols [27], techniques for
improving TCP performance in wireless networks [1, 5]
 Mobile information access
 Incl. disconnected operation [17], bandwidth-adaptive file
access [21], selective control of data consistency [38, 39]
 Support for adaptive applications
 Incl. transcoding by proxies [12], adaptive resource
management [24]
 System-level energy saving techniques
 Incl. energy-aware adaptation [11], variable-speed processor
scheduling [45], energy-sensitive (=adaptive) memory
management [18].
 Location sensitivity
 Incl. location sensing [42, 43], location-aware (=adaptive) system
behavior [32, 35, 41]
3
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (7)
2.3. Pervasive Computing
 Pervasive Computing
 Recall:
Pervasive computing environment - one saturated with
computing & communication capability, yet so gracefully
integrated with users that it becomes a ‘‘technology that
disappears’’
 Since motion is an integral part of everyday life, PERV
must support mobility
 Otherwise, a user will be acutely aware of the technology by its
absence when she moves
 Hence, research in pervasive computing subsumes that
of mobile computing
BUT …
4
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (8)
Pervasive Computing (2)
…
 Research in pervasive computing goes much
further
 PERV includes four additional research thrusts
 Effective Use of Smart Spaces
 Invisibility
 Localized Scalability
 Masking Uneven Conditioning
 See Figure 1 (next slide)
5
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (9)
Pervasive Computing (3)
 Figure 1: Taxonomy of Computer Systems Research Problems in PERV
1) New problems are
encountered as one moves from
left to right in this figure.
2) Solution of many previously-
encountered problems becomes
more complex.
As the modulation symbols
suggest, this increase in
complexity is multiplicative rather
than additive
it is very much more difficult to
design and implement a pervasive
computing system than a simple
distributed system of comparable
robustness and maturity.
Note:This figure describes
logical relationships, not
temporal ones.
The evolution of research effort over
time has loosely followed this picture
BUT
There have been cases where research
effort on some aspect of pervasive
computing began relatively early. E.g.,
work on smart spaces began in the early
1990’s and proceeded relatively
independently of work in MOBI
6
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (10)
Pervasive Computing (4)
2.3.1) Effective Use of Smart Spaces
 A space:
 An enclosed area
 E.g., a meeting room or corridor
OR:
 A well-defined open area
 E.g., a courtyard or a city square
 Smart space = space with embedding computing
infrastructure
 E.g., smart space within buildings
 Created by embedding computing infrastructure within building
infrastructure
 Smart space brings together two worlds disjoint until
now [16]:
 Physical space (physical world)
 Cyberspace
7
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (11)
Pervasive Computing (5)
1) Effective Use of Smart Spaces – cont.
 The fusion of physical world (PHYS) and cyber-world
(CYB) enables sensing and control of one world by the
other
 Example of sensing and control of PHYS by CYB
 Automatic adjustment of heating, cooling and lighting levels in a
room based on an occupant’s electronic profile (incl. presence
patterns)
 Example of sensing and control of CYB by PHYS (the other
direction)
 Software on a user’s computer may behave differently
depending on where the user is currently located
 Note:
Smartness may extend to individual objects, whether
located in a smart space or not
8
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (12)
Pervasive Computing (6)
2.3.2) Invisibility
 The ideal expressed by Weiser: complete disappearance
of pervasive computing technology from a user’s
consciousness = invisible computing
 A reasonable approximation: minimal user distraction
([LTL:] = minimal visibility)
 If a PERV environment continuously meets user expectations and
rarely presents him with surprises, it allows him to interact almost
at a subconscious level [46]
BUT:
 Getting too close to the ideal might not be perfect:
A (small) degree of visibility might be needed
 ([LTL:] I hope that abobe I correctly interpret the following text:
“At the same time, a modicum of anticipation may be essential to
avoiding a large unpleasant surprise later — much as pain alerts a
person to a potentially serious future problem in a normally-
unnoticed body part.”)

More Related Content

Similar to Sec.0a--Intro to pervasive computing 2.ppt

Sec.0a--Intro to pervasive computing 6.ppt
Sec.0a--Intro to pervasive computing 6.pptSec.0a--Intro to pervasive computing 6.ppt
Sec.0a--Intro to pervasive computing 6.ppt
ahmadfaisal744721
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Ankita Gupta
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
Rutvik Pensionwar
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Sangeetha Sg
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
Rutvik Pensionwar
 
1 deus leaflet wp0
1 deus leaflet wp01 deus leaflet wp0
1 deus leaflet wp0
imec.archive
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...
Fread Mzee
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
Dhiraj Shinde
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
thetechnicalzone
 
(R)evolution of the computing continuum - A few challenges
(R)evolution of the computing continuum  - A few challenges(R)evolution of the computing continuum  - A few challenges
(R)evolution of the computing continuum - A few challenges
Frederic Desprez
 
insect monitoring through wsn
insect monitoring through wsninsect monitoring through wsn
insect monitoring through wsn
nehasharma12345
 
Insect Mointoring
Insect MointoringInsect Mointoring
Insect Mointoring
nehasharma12345
 
Chapter 1 of insect monitoring using wsn sensor
Chapter 1 of insect monitoring using wsn sensorChapter 1 of insect monitoring using wsn sensor
Chapter 1 of insect monitoring using wsn sensor
nehasharma12345
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
Naseeba P P
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
journal ijrtem
 
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
AlAtfat
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
IJCNCJournal
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Anshuman Biswal
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’s
IOSR Journals
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Final
pbihler
 

Similar to Sec.0a--Intro to pervasive computing 2.ppt (20)

Sec.0a--Intro to pervasive computing 6.ppt
Sec.0a--Intro to pervasive computing 6.pptSec.0a--Intro to pervasive computing 6.ppt
Sec.0a--Intro to pervasive computing 6.ppt
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
1 deus leaflet wp0
1 deus leaflet wp01 deus leaflet wp0
1 deus leaflet wp0
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
(R)evolution of the computing continuum - A few challenges
(R)evolution of the computing continuum  - A few challenges(R)evolution of the computing continuum  - A few challenges
(R)evolution of the computing continuum - A few challenges
 
insect monitoring through wsn
insect monitoring through wsninsect monitoring through wsn
insect monitoring through wsn
 
Insect Mointoring
Insect MointoringInsect Mointoring
Insect Mointoring
 
Chapter 1 of insect monitoring using wsn sensor
Chapter 1 of insect monitoring using wsn sensorChapter 1 of insect monitoring using wsn sensor
Chapter 1 of insect monitoring using wsn sensor
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’s
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Final
 

More from ahmadfaisal744721

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
ahmadfaisal744721
 
Intoduction to Graph.pptx
Intoduction to Graph.pptxIntoduction to Graph.pptx
Intoduction to Graph.pptx
ahmadfaisal744721
 
Introduction to Android.ppt
Introduction to Android.pptIntroduction to Android.ppt
Introduction to Android.ppt
ahmadfaisal744721
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
ahmadfaisal744721
 
db design and maintenance part 1.pptx
db design and maintenance part 1.pptxdb design and maintenance part 1.pptx
db design and maintenance part 1.pptx
ahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptx
ahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptx
ahmadfaisal744721
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptx
ahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
ahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
ahmadfaisal744721
 
write no image.pptx
write no image.pptxwrite no image.pptx
write no image.pptx
ahmadfaisal744721
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
ahmadfaisal744721
 
javascript-basics.ppt
javascript-basics.pptjavascript-basics.ppt
javascript-basics.ppt
ahmadfaisal744721
 

More from ahmadfaisal744721 (13)

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
 
Intoduction to Graph.pptx
Intoduction to Graph.pptxIntoduction to Graph.pptx
Intoduction to Graph.pptx
 
Introduction to Android.ppt
Introduction to Android.pptIntroduction to Android.ppt
Introduction to Android.ppt
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
db design and maintenance part 1.pptx
db design and maintenance part 1.pptxdb design and maintenance part 1.pptx
db design and maintenance part 1.pptx
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptx
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptx
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
 
write no image.pptx
write no image.pptxwrite no image.pptx
write no image.pptx
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
javascript-basics.ppt
javascript-basics.pptjavascript-basics.ppt
javascript-basics.ppt
 

Recently uploaded

Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 

Recently uploaded (20)

Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 

Sec.0a--Intro to pervasive computing 2.ppt

  • 1. 1 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (5) 2.2. Mobile Computing  Mobile Computing  The early 1990s - full-function laptops + wireless LANs  Early mobile computing systems: A distributed system with mobile clients  [LL:] Current mobile computing systems: Any nodes can be mobile  Solutions from MOBI  Many basic principles of DIST design continued to apply to MOBI BUT  Four key constraints of mobility required specialized techniques [31] for MOBI:  Unpredictable variation in network quality  Lowered trust and robustness of mobile elements  Limitations on local resources imposed by weight and size constraints  Concern for battery power consumption  Mobile computing - still a very active and evolving field of research  Awaits codification in textbooks (as of 2000)
  • 2. 2 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (6) Mobile Computing (2)  Specific subarea solutions for MOBI  Mobile networking  Incl. mobile IP [2], ad hoc protocols [27], techniques for improving TCP performance in wireless networks [1, 5]  Mobile information access  Incl. disconnected operation [17], bandwidth-adaptive file access [21], selective control of data consistency [38, 39]  Support for adaptive applications  Incl. transcoding by proxies [12], adaptive resource management [24]  System-level energy saving techniques  Incl. energy-aware adaptation [11], variable-speed processor scheduling [45], energy-sensitive (=adaptive) memory management [18].  Location sensitivity  Incl. location sensing [42, 43], location-aware (=adaptive) system behavior [32, 35, 41]
  • 3. 3 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (7) 2.3. Pervasive Computing  Pervasive Computing  Recall: Pervasive computing environment - one saturated with computing & communication capability, yet so gracefully integrated with users that it becomes a ‘‘technology that disappears’’  Since motion is an integral part of everyday life, PERV must support mobility  Otherwise, a user will be acutely aware of the technology by its absence when she moves  Hence, research in pervasive computing subsumes that of mobile computing BUT …
  • 4. 4 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (8) Pervasive Computing (2) …  Research in pervasive computing goes much further  PERV includes four additional research thrusts  Effective Use of Smart Spaces  Invisibility  Localized Scalability  Masking Uneven Conditioning  See Figure 1 (next slide)
  • 5. 5 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (9) Pervasive Computing (3)  Figure 1: Taxonomy of Computer Systems Research Problems in PERV 1) New problems are encountered as one moves from left to right in this figure. 2) Solution of many previously- encountered problems becomes more complex. As the modulation symbols suggest, this increase in complexity is multiplicative rather than additive it is very much more difficult to design and implement a pervasive computing system than a simple distributed system of comparable robustness and maturity. Note:This figure describes logical relationships, not temporal ones. The evolution of research effort over time has loosely followed this picture BUT There have been cases where research effort on some aspect of pervasive computing began relatively early. E.g., work on smart spaces began in the early 1990’s and proceeded relatively independently of work in MOBI
  • 6. 6 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (10) Pervasive Computing (4) 2.3.1) Effective Use of Smart Spaces  A space:  An enclosed area  E.g., a meeting room or corridor OR:  A well-defined open area  E.g., a courtyard or a city square  Smart space = space with embedding computing infrastructure  E.g., smart space within buildings  Created by embedding computing infrastructure within building infrastructure  Smart space brings together two worlds disjoint until now [16]:  Physical space (physical world)  Cyberspace
  • 7. 7 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (11) Pervasive Computing (5) 1) Effective Use of Smart Spaces – cont.  The fusion of physical world (PHYS) and cyber-world (CYB) enables sensing and control of one world by the other  Example of sensing and control of PHYS by CYB  Automatic adjustment of heating, cooling and lighting levels in a room based on an occupant’s electronic profile (incl. presence patterns)  Example of sensing and control of CYB by PHYS (the other direction)  Software on a user’s computer may behave differently depending on where the user is currently located  Note: Smartness may extend to individual objects, whether located in a smart space or not
  • 8. 8 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (12) Pervasive Computing (6) 2.3.2) Invisibility  The ideal expressed by Weiser: complete disappearance of pervasive computing technology from a user’s consciousness = invisible computing  A reasonable approximation: minimal user distraction ([LTL:] = minimal visibility)  If a PERV environment continuously meets user expectations and rarely presents him with surprises, it allows him to interact almost at a subconscious level [46] BUT:  Getting too close to the ideal might not be perfect: A (small) degree of visibility might be needed  ([LTL:] I hope that abobe I correctly interpret the following text: “At the same time, a modicum of anticipation may be essential to avoiding a large unpleasant surprise later — much as pain alerts a person to a potentially serious future problem in a normally- unnoticed body part.”)