SlideShare a Scribd company logo
1 of 8
1
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (20)
Example Scenarios (3)
3.2) Scenario 2
 Fred is in his office, frantically preparing for a meeting at which he will
give a presentation and a software demonstration. The meeting room
is a 10-minute walk across campus.
 It is time to leave, but Fred is not quite ready. He grabs his PalmXXII
wireless handheld computer & walks out of the door.
 Aura transfers the state of his work from his desktop to his handheld,
& allows him to make edits using voice commands during his walk.
 Aura infers where Fred is going from his calendar & the campus
location tracking service. It downloads the presentation & the
demonstration software to the projection computer, & warms up the
projector.
 Fred finishes his edits just before he enters the meeting room.
 As he walks in, Aura transfers his final changes to the projection
computer.
 As the presentation proceeds, Fred is about to display a slide with
highly sensitive budget information. Aura senses that this might be a
mistake: the room’s face detection and recognition capability indicates
that there are some unfamiliar faces present. It therefore warns Fred.
 Realizing that Aura is right, Fred skips the slide. He moves on to other
topics and ends on a high note, leaving the audience impressed by his
polished presentation.
2
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (21)
Example Scenarios (4)
3.3) Missing capabilities needed for implementing PERV
 Scenarios embody many key ideas in PERV
 Scenario 1 shows importance of:
 Proactivity
 Jane able to e-mail her work only because Aura predicts
(estimates) how long the whole process would take
 Jane able to begin walking back to her departure gate before
transmission completes because Aura looks ahead on her behalf
 Combining knowledge from different layers of the system
 Information on wireless congestion comes from a low level of the
system
 Knowledge of boarding time is a high-level (application- or user-
level) information
 Aura helps Jane only by combining these disparate pieces of
knowledge
 Smart space
 Aura is able to obtain from the smart environment information on
wireless conditions at other gates, flight arrival/departure times at
different gates, and distances between gates
3
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (22)
Example Scenarios (5)
 Missing capabilities needed for implementing PERV – cont. 1
 Scenario 2 illustrates importance of:
 Moving execution state effortlessly across diverse platforms
 Moving from a desktop to a handheld machine
 Moving from the handheld to a projection computer
 Self-tuning (=automatically adjusting behavior to fit circumstances)
 Ability to edit on the handheld using speech input rather than
keyboard and mouse.
 Proactivity
 Inferring that Fred is headed for the room across campus, warming
up the projector, transferring the presentation and demonstration
 Anticipating that the budget slide might be displayed next, and
sensing danger by combining this knowledge with the inferred
presence of strangers in the room.
 Smart space
 The location tracking and online calendar services are what enable
Aura to infer where Fred is heading
 The software-controlled projector enables warmup ahead of time
 The camera-equipped room with continuous face recognition is key
to warning Fred about the anticipated privacy violation
4
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (23)
Example Scenarios (6)
 Missing capabilities needed for implementing PERV – cont. 2
 Perhaps the biggest surprise:
How simple and basic are all the component technologies
in these scenarios
 The hardware technologies are available (in 2001!)
 Laptops, handhelds, wireless communication, software-controlled
appliances, room cameras, …
 Software technologies have also available (in 2001!)
 Location tracking, face recognition, speech recognition, online
calendars, ...
 So why then do these scenarios seem like science fiction
today? (in 2001 and still in 2006)
 The answer: The whole is much greater than the sum of its parts
 The real challenge is in the seamless integration of h/w s/w
technologies into a PERV system
 Difficult problems to solve:
 Architecture / Component synthesis / System-level engineering
6
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (24)
4. Solving Difficult Problems (“Drilling Down”)
 Drilling down – solving the above difficult problems
 Practical realization of PERV requires solving many difficult
design & implementation problems
 Let’s look at some of these problems at the next level of
detail (“Our goal is only to convey an impressionistic picture of the road
ahead.”)
 No claim of completeness or exclusiveness
 Set of topics is merely a sampling of the problem space:
 4.1. User Intent / 4.2. Cyber Foraging
 4.3. Adaptation Strategy / 4.4. High-level Energy Management
 4.5. Client Thickness / 4.6. Context Awareness
 4.7. Balancing Proactivity and Transparency
 4.8. Privacy and Trust / 4.9. Impact on Layering
7
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (25)
Drilling Down - The Difficult Problems (2)
 Drilling down - The difficult problems – cont. 1
 Assumed:
Each user immersed in a user’s personal computing space
(UPCS) that accompanies him everywhere and mediates
all interactions with the pervasive computing elements in
her surroundings
 UPCS likely implemented on a body-worn or handheld computer
(or a collection of these acting as a single entity)
 UPCS is a ‘‘client’’ of its PERV environment
 Even though many of its interactions may be peer-to-peer rather
than strictly client-server
 Client needs to be quite sophisticated hence complex
 As indicated by the discussion below
 Figure 2, illustrating the structure of an Aura client, gives
a concrete example of this complexity
8
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (26)
Drilling Down - The Difficult Problems (3)
 Figure 2: Structure of an Aura Client
This figure shows the components of an
Aura client and their logical relationships.
The text in italics indicates the role played
by each component
Coda and Odyssey were created prior to
Aura, but are being modified substantially
to meet the demands of pervasive
computing
In the case of Odyssey, these changes are
sufficiently extensive that they will result in
Chroma, a replacement
Other components are being created
specifically for use in Aura
Such as Prism and Spectra
Additional components are likely to be
added over time
Since Aura is relatively early in its design at
the time of this writing (2001)
Server and infrastructure support for Aura
are not shown

More Related Content

Similar to Sec.0a--Intro to pervasive computing 4.ppt

Sec.0a--Intro to pervasive computing 9.ppt
Sec.0a--Intro to pervasive computing 9.pptSec.0a--Intro to pervasive computing 9.ppt
Sec.0a--Intro to pervasive computing 9.ppt
ahmadfaisal744721
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
Sharon Rozov
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud Resources
Niranjana Padmanabhan
 

Similar to Sec.0a--Intro to pervasive computing 4.ppt (20)

Sec.0a--Intro to pervasive computing 9.ppt
Sec.0a--Intro to pervasive computing 9.pptSec.0a--Intro to pervasive computing 9.ppt
Sec.0a--Intro to pervasive computing 9.ppt
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
DETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWARE
DETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWAREDETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWARE
DETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWARE
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
Mobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningMobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online Learning
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our Future
 
Ch02
Ch02Ch02
Ch02
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud Resources
 
SDN Abstractions
SDN AbstractionsSDN Abstractions
SDN Abstractions
 
Chapter Two.pdf
Chapter Two.pdfChapter Two.pdf
Chapter Two.pdf
 
102 105
102 105102 105
102 105
 
102 105
102 105102 105
102 105
 
Distribution systems efficiency
Distribution systems efficiencyDistribution systems efficiency
Distribution systems efficiency
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 

More from ahmadfaisal744721

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
ahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptx
ahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptx
ahmadfaisal744721
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptx
ahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
ahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
ahmadfaisal744721
 

More from ahmadfaisal744721 (14)

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
 
Intoduction to Graph.pptx
Intoduction to Graph.pptxIntoduction to Graph.pptx
Intoduction to Graph.pptx
 
Introduction to Android.ppt
Introduction to Android.pptIntroduction to Android.ppt
Introduction to Android.ppt
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
db design and maintenance part 1.pptx
db design and maintenance part 1.pptxdb design and maintenance part 1.pptx
db design and maintenance part 1.pptx
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptx
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptx
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
 
Sec.0a--Intro to pervasive computing 6.ppt
Sec.0a--Intro to pervasive computing 6.pptSec.0a--Intro to pervasive computing 6.ppt
Sec.0a--Intro to pervasive computing 6.ppt
 
write no image.pptx
write no image.pptxwrite no image.pptx
write no image.pptx
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
javascript-basics.ppt
javascript-basics.pptjavascript-basics.ppt
javascript-basics.ppt
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Recently uploaded (20)

AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 

Sec.0a--Intro to pervasive computing 4.ppt

  • 1. 1 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (20) Example Scenarios (3) 3.2) Scenario 2  Fred is in his office, frantically preparing for a meeting at which he will give a presentation and a software demonstration. The meeting room is a 10-minute walk across campus.  It is time to leave, but Fred is not quite ready. He grabs his PalmXXII wireless handheld computer & walks out of the door.  Aura transfers the state of his work from his desktop to his handheld, & allows him to make edits using voice commands during his walk.  Aura infers where Fred is going from his calendar & the campus location tracking service. It downloads the presentation & the demonstration software to the projection computer, & warms up the projector.  Fred finishes his edits just before he enters the meeting room.  As he walks in, Aura transfers his final changes to the projection computer.  As the presentation proceeds, Fred is about to display a slide with highly sensitive budget information. Aura senses that this might be a mistake: the room’s face detection and recognition capability indicates that there are some unfamiliar faces present. It therefore warns Fred.  Realizing that Aura is right, Fred skips the slide. He moves on to other topics and ends on a high note, leaving the audience impressed by his polished presentation.
  • 2. 2 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (21) Example Scenarios (4) 3.3) Missing capabilities needed for implementing PERV  Scenarios embody many key ideas in PERV  Scenario 1 shows importance of:  Proactivity  Jane able to e-mail her work only because Aura predicts (estimates) how long the whole process would take  Jane able to begin walking back to her departure gate before transmission completes because Aura looks ahead on her behalf  Combining knowledge from different layers of the system  Information on wireless congestion comes from a low level of the system  Knowledge of boarding time is a high-level (application- or user- level) information  Aura helps Jane only by combining these disparate pieces of knowledge  Smart space  Aura is able to obtain from the smart environment information on wireless conditions at other gates, flight arrival/departure times at different gates, and distances between gates
  • 3. 3 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (22) Example Scenarios (5)  Missing capabilities needed for implementing PERV – cont. 1  Scenario 2 illustrates importance of:  Moving execution state effortlessly across diverse platforms  Moving from a desktop to a handheld machine  Moving from the handheld to a projection computer  Self-tuning (=automatically adjusting behavior to fit circumstances)  Ability to edit on the handheld using speech input rather than keyboard and mouse.  Proactivity  Inferring that Fred is headed for the room across campus, warming up the projector, transferring the presentation and demonstration  Anticipating that the budget slide might be displayed next, and sensing danger by combining this knowledge with the inferred presence of strangers in the room.  Smart space  The location tracking and online calendar services are what enable Aura to infer where Fred is heading  The software-controlled projector enables warmup ahead of time  The camera-equipped room with continuous face recognition is key to warning Fred about the anticipated privacy violation
  • 4. 4 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (23) Example Scenarios (6)  Missing capabilities needed for implementing PERV – cont. 2  Perhaps the biggest surprise: How simple and basic are all the component technologies in these scenarios  The hardware technologies are available (in 2001!)  Laptops, handhelds, wireless communication, software-controlled appliances, room cameras, …  Software technologies have also available (in 2001!)  Location tracking, face recognition, speech recognition, online calendars, ...  So why then do these scenarios seem like science fiction today? (in 2001 and still in 2006)  The answer: The whole is much greater than the sum of its parts  The real challenge is in the seamless integration of h/w s/w technologies into a PERV system  Difficult problems to solve:  Architecture / Component synthesis / System-level engineering
  • 5.
  • 6. 6 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (24) 4. Solving Difficult Problems (“Drilling Down”)  Drilling down – solving the above difficult problems  Practical realization of PERV requires solving many difficult design & implementation problems  Let’s look at some of these problems at the next level of detail (“Our goal is only to convey an impressionistic picture of the road ahead.”)  No claim of completeness or exclusiveness  Set of topics is merely a sampling of the problem space:  4.1. User Intent / 4.2. Cyber Foraging  4.3. Adaptation Strategy / 4.4. High-level Energy Management  4.5. Client Thickness / 4.6. Context Awareness  4.7. Balancing Proactivity and Transparency  4.8. Privacy and Trust / 4.9. Impact on Layering
  • 7. 7 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (25) Drilling Down - The Difficult Problems (2)  Drilling down - The difficult problems – cont. 1  Assumed: Each user immersed in a user’s personal computing space (UPCS) that accompanies him everywhere and mediates all interactions with the pervasive computing elements in her surroundings  UPCS likely implemented on a body-worn or handheld computer (or a collection of these acting as a single entity)  UPCS is a ‘‘client’’ of its PERV environment  Even though many of its interactions may be peer-to-peer rather than strictly client-server  Client needs to be quite sophisticated hence complex  As indicated by the discussion below  Figure 2, illustrating the structure of an Aura client, gives a concrete example of this complexity
  • 8. 8 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (26) Drilling Down - The Difficult Problems (3)  Figure 2: Structure of an Aura Client This figure shows the components of an Aura client and their logical relationships. The text in italics indicates the role played by each component Coda and Odyssey were created prior to Aura, but are being modified substantially to meet the demands of pervasive computing In the case of Odyssey, these changes are sufficiently extensive that they will result in Chroma, a replacement Other components are being created specifically for use in Aura Such as Prism and Spectra Additional components are likely to be added over time Since Aura is relatively early in its design at the time of this writing (2001) Server and infrastructure support for Aura are not shown