SlideShare a Scribd company logo
1 of 8
1
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (34)
Drilling Down - The Difficult Problems (11)
 4.3) Adaptation Strategy
 Adaptation is necessary when there is a significant
mismatch between the supply and demand of a resource
 Examples of resources: wireless network bandwidth, energy,
computing cycles, memory, …
 Three alternative adaptation strategies for adaptation in
PERV
 Recall: UPCS is a client of a smart space (3 interacting entities)
 UPCS = user’s personal computing space
 Strategy 1 (reservation): Client can ask the environment for
guarantee of a certain level of a resource
 Typically used by reservation-based QoS systems [22]
 QoS – quality of service
 This effectively increases the supply of a scarce resource to
meet the client’s demand
[LTL: Client able to reserve is privileged in some sense]
 Strategy 2 (reduction): Client can guide applications in changing
their behavior so that they use less of a scarce resource
 This change usually reduces the user-perceived quality, or
fidelity, of an application
 E.g., Odyssey [11, 24] uses this strategy
2
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (35)
Drilling Down - The Difficult Problems (12)
 4.3. Adaptation Strategy –cont.
 Three alternative strategies for adaptation in PERV – cont.
 Strategy 3 (correction): Client can suggest a corrective action to
its user
 If the user complies with it, resource supply will likely (but
without certainty) become adequate to meet demand
 E.g.., in Scenario 1, Aura advised Jane to walk to Gate 15 in
order to obtain adequate wireless bandwidth.
 Conceptually promising, but not implemented by any real
system yet (2001)
 All three strategies are important in pervasive computing
 Some smart spaces capable of accepting resource reservations
(Strategy 1 - reservation)
 In some smart spaces [some] clients can’t reserve resources —
must ask applications to reduce their fidelities (Strategy 2 -
reduction)
 Happens when space is uncooperative or resource-impoverished
 Corrective actions may be particularly useful when reduction of
fidelity is unacceptable (Strategy 3 - correction)
 Broaden the range of possibilities for adaptation by involving the
user
3
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (36)
Drilling Down - The Difficult Problems (13)
 Adaptation Strategy – some research questions
 How does a client choose the best adaptation strategy?
 What factors should a good decision procedure take into account?
How should different factors be weighted? What role, if any,
should the user play in making this decision? How can smooth and
seamless transitions between strategies be ensured as a user
moves between different spaces?
 Reservation strategy might appear superior for a user
 User neither required to accept lower fidelity nor perform a
corrective action
Is this true in all circumstances?
 What are the hidden costs and ‘‘gotchas,’’ if any, in a widely-
deployed system using Strategy 2?
 How will the implementation of a smart space honor
resource reservations?
 What are the most appropriate admission control policies when
there are competing requests from multiple clients? What
resources, beside wireless network bandwidth, is it meaningful
and useful for a smart space to reserve? What are the APIs and
protocols necessary to negotiate these reservations?
4
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (37)
Drilling Down - The Difficult Problems (14)
 Adaptation Strategy – some research questions – cont.
 Issues for corrective strategy
 Is corrective adaptation practically feasible? Do users find it
intrusive or annoying? What is the best way to communicate
potential corrective actions to users? What are the programming
models and APIs necessary to support corrective actions?
 Legacy problem: Can existing applications use this approach? If
so, how substantial are the modifications to them?
 Issues for reduction strategy
 What are the different ways in which fidelity can be lowered for a
broad range of applications? Are existing APIs, such as that of
Odyssey [24], adequate?
 How should those APIs and programming models be revised based
on extensive usage experience?
 What is the negative impact of lowered fidelity on users and how
can this be minimized?
5
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (38)
Drilling Down - The Difficult Problems (15)
 4.4) High-level Energy Management
 Sophisticated software capabilities increase the energy
demand of an MC (= mobile computer)
 Examples of sophisticated capabilities: as proactivity / self-tuning
 At the same time: pressure to make MCs lighter and more
compact places severe restrictions on battery capacity
 Growing consensus:
 Advances in battery technology and low-power circuit design
cannot, by themselves, reconcile these opposing constraints
 The higher levels of the system must also be involved [10, 25]
 How does one involve the higher levels of a system in
energy management?
 Example 1: Energy-aware memory management [18]
 OS dynamically controls the amount of physical memory that
has to be refreshed
 Example 2: Energy-aware adaptation [11]
 Under OS control, individual applications switch to modes of
operation with lower fidelity and energy demand
6
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (39)
Drilling Down - The Difficult Problems (16)
 High-level Energy Management – some research questions
 In what ways can the higher levels of a system contribute to
managing energy?
 What are the relative strengths and weaknesses of these approaches?
When should one method be used in preference to another?
 How does high-level energy management impact the goal of
invisibility in pervasive computing?
 How intrusive or distracting to users are such techniques?
 Can knowledge of user intent be exploited in energy management?
 If so, how robust is this approach in the face of imperfection in this
knowledge?
 Can smart spaces and surrogates be used to reduce energy demand
on a mobile computer?
 What are possible approaches, and what are their relative merits?
 What is the role of remote execution in extending battery life?
 Under what circumstances does its energy savings exceed the energy
cost of wireless communication? Can a system predict these savings and
costs accurately enough in practice to make a significant difference?
7
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (40)
Drilling Down - The Difficult Problems (17)
 4.5) Client Thickness
 Types of clients
 Thick client = a powerful client
 Thin client = a minimal client
 Thick clients have many negative features from the user’s viewpoint
 Larger / heavier / with bigger & heavier battery / dissipate more
heat
 Over time, physical size and weight of a thick client are reduced
 Due to improvements in VLSI and packaging technology
 The same improvements shrinking thick clients produce
even smaller and lighter thin clients
 Q: How powerful MC is needed for a pervasive computing
environment?
 How much CPU power, memory, disk capacity, … does it need?
 The answer determines many of the key constraints imposed
on the hardware design of the client
 A: For a user, a client can never be too powerful, too
small, too light or have too long battery life!
8
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (41)
Drilling Down - The Difficult Problems (18)
 4.5. Client Thickness – cont.1
 A wide range of client designs
 One extreme: Ultra-thin clients
 Bare-bones devices
 E.g., Infopad [6, 40], SLIM [33]
 Can’t operate in isolation
 Little more than high-resolution displays connected through
high-bandwidth wireless links to nearby compute servers
 In-between: Midsize clients
 Handheld computers
 E.g., PalmPilot
 Can operate in isolation
 But run a limited range of applications
 Other apps run on compute servers of smart spaces
 The other extreme: Full-function clients
 Wearable computers and laptops
 E.g., the Navigator family of wearable computers [34], laptops
running as clients of the Coda File System [17]
 Capable of standalone or disconnected operation
 Make use of wireless connectivity when available
 Not critically dependent on it

More Related Content

Similar to Sec.0a--Intro to pervasive computing 6.ppt

Sec.0a--Intro to pervasive computing 2.ppt
Sec.0a--Intro to pervasive computing 2.pptSec.0a--Intro to pervasive computing 2.ppt
Sec.0a--Intro to pervasive computing 2.pptahmadfaisal744721
 
Applying user modelling to human computer interaction design
Applying user modelling to human computer interaction designApplying user modelling to human computer interaction design
Applying user modelling to human computer interaction designNika Stuard
 
V1_I2_2012_Paper2.docx
V1_I2_2012_Paper2.docxV1_I2_2012_Paper2.docx
V1_I2_2012_Paper2.docxpraveena06
 
Green Computing - Maturity Model for Virtualization
Green Computing - Maturity Model for VirtualizationGreen Computing - Maturity Model for Virtualization
Green Computing - Maturity Model for Virtualizationijdmtaiir
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes SAhammedShakil
 
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...IJITCA Journal
 
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...IJITCA Journal
 
DISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docxDISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docxvinaypandey170
 
Chapter 1 Introduction- DS.pptx
Chapter 1 Introduction- DS.pptxChapter 1 Introduction- DS.pptx
Chapter 1 Introduction- DS.pptxTadeseBeyene
 
Situation Normal, Everything Must Change
Situation Normal, Everything Must ChangeSituation Normal, Everything Must Change
Situation Normal, Everything Must ChangeEduserv
 
A New Way Of Distributed Or Cloud Computing
A New Way Of Distributed Or Cloud ComputingA New Way Of Distributed Or Cloud Computing
A New Way Of Distributed Or Cloud ComputingAshley Lovato
 
fault tolerance management in cloud computing
fault tolerance management in cloud computingfault tolerance management in cloud computing
fault tolerance management in cloud computingKruthikka Palraj
 
A Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud ComputingA Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud ComputingIJTET Journal
 
Clound computing
Clound computingClound computing
Clound computingWGroup
 
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Saeid Abolfazli
 
DER Program Overview Presentation
DER Program Overview PresentationDER Program Overview Presentation
DER Program Overview PresentationLakisha Johnson
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySusan Cox
 

Similar to Sec.0a--Intro to pervasive computing 6.ppt (20)

Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Sec.0a--Intro to pervasive computing 2.ppt
Sec.0a--Intro to pervasive computing 2.pptSec.0a--Intro to pervasive computing 2.ppt
Sec.0a--Intro to pervasive computing 2.ppt
 
Applying user modelling to human computer interaction design
Applying user modelling to human computer interaction designApplying user modelling to human computer interaction design
Applying user modelling to human computer interaction design
 
Adidrds
AdidrdsAdidrds
Adidrds
 
V1_I2_2012_Paper2.docx
V1_I2_2012_Paper2.docxV1_I2_2012_Paper2.docx
V1_I2_2012_Paper2.docx
 
Green Computing - Maturity Model for Virtualization
Green Computing - Maturity Model for VirtualizationGreen Computing - Maturity Model for Virtualization
Green Computing - Maturity Model for Virtualization
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes
 
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...
 
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...
 
DISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docxDISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docx
 
Chapter 1 Introduction- DS.pptx
Chapter 1 Introduction- DS.pptxChapter 1 Introduction- DS.pptx
Chapter 1 Introduction- DS.pptx
 
Situation Normal, Everything Must Change
Situation Normal, Everything Must ChangeSituation Normal, Everything Must Change
Situation Normal, Everything Must Change
 
4
44
4
 
A New Way Of Distributed Or Cloud Computing
A New Way Of Distributed Or Cloud ComputingA New Way Of Distributed Or Cloud Computing
A New Way Of Distributed Or Cloud Computing
 
fault tolerance management in cloud computing
fault tolerance management in cloud computingfault tolerance management in cloud computing
fault tolerance management in cloud computing
 
A Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud ComputingA Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud Computing
 
Clound computing
Clound computingClound computing
Clound computing
 
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...
 
DER Program Overview Presentation
DER Program Overview PresentationDER Program Overview Presentation
DER Program Overview Presentation
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh Essay
 

More from ahmadfaisal744721

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfahmadfaisal744721
 
db design and maintenance part 1.pptx
db design and maintenance part 1.pptxdb design and maintenance part 1.pptx
db design and maintenance part 1.pptxahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptxahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptxahmadfaisal744721
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxahmadfaisal744721
 
Sec.0a--Intro to pervasive computing 9.ppt
Sec.0a--Intro to pervasive computing 9.pptSec.0a--Intro to pervasive computing 9.ppt
Sec.0a--Intro to pervasive computing 9.pptahmadfaisal744721
 
Sec.0a--Intro to pervasive computing 4.ppt
Sec.0a--Intro to pervasive computing 4.pptSec.0a--Intro to pervasive computing 4.ppt
Sec.0a--Intro to pervasive computing 4.pptahmadfaisal744721
 
Sec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.pptSec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.pptahmadfaisal744721
 
Sec.0a--Intro to pervasive computing 1.ppt
Sec.0a--Intro to pervasive computing 1.pptSec.0a--Intro to pervasive computing 1.ppt
Sec.0a--Intro to pervasive computing 1.pptahmadfaisal744721
 

More from ahmadfaisal744721 (17)

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
 
Intoduction to Graph.pptx
Intoduction to Graph.pptxIntoduction to Graph.pptx
Intoduction to Graph.pptx
 
Introduction to Android.ppt
Introduction to Android.pptIntroduction to Android.ppt
Introduction to Android.ppt
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
db design and maintenance part 1.pptx
db design and maintenance part 1.pptxdb design and maintenance part 1.pptx
db design and maintenance part 1.pptx
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptx
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptx
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
 
Sec.0a--Intro to pervasive computing 9.ppt
Sec.0a--Intro to pervasive computing 9.pptSec.0a--Intro to pervasive computing 9.ppt
Sec.0a--Intro to pervasive computing 9.ppt
 
Sec.0a--Intro to pervasive computing 4.ppt
Sec.0a--Intro to pervasive computing 4.pptSec.0a--Intro to pervasive computing 4.ppt
Sec.0a--Intro to pervasive computing 4.ppt
 
Sec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.pptSec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.ppt
 
Sec.0a--Intro to pervasive computing 1.ppt
Sec.0a--Intro to pervasive computing 1.pptSec.0a--Intro to pervasive computing 1.ppt
Sec.0a--Intro to pervasive computing 1.ppt
 
write no image.pptx
write no image.pptxwrite no image.pptx
write no image.pptx
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
javascript-basics.ppt
javascript-basics.pptjavascript-basics.ppt
javascript-basics.ppt
 

Recently uploaded

Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Pooja Nehwal
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Delhi Call girls
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCamilleBoulbin1
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 

Recently uploaded (20)

Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 

Sec.0a--Intro to pervasive computing 6.ppt

  • 1. 1 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (34) Drilling Down - The Difficult Problems (11)  4.3) Adaptation Strategy  Adaptation is necessary when there is a significant mismatch between the supply and demand of a resource  Examples of resources: wireless network bandwidth, energy, computing cycles, memory, …  Three alternative adaptation strategies for adaptation in PERV  Recall: UPCS is a client of a smart space (3 interacting entities)  UPCS = user’s personal computing space  Strategy 1 (reservation): Client can ask the environment for guarantee of a certain level of a resource  Typically used by reservation-based QoS systems [22]  QoS – quality of service  This effectively increases the supply of a scarce resource to meet the client’s demand [LTL: Client able to reserve is privileged in some sense]  Strategy 2 (reduction): Client can guide applications in changing their behavior so that they use less of a scarce resource  This change usually reduces the user-perceived quality, or fidelity, of an application  E.g., Odyssey [11, 24] uses this strategy
  • 2. 2 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (35) Drilling Down - The Difficult Problems (12)  4.3. Adaptation Strategy –cont.  Three alternative strategies for adaptation in PERV – cont.  Strategy 3 (correction): Client can suggest a corrective action to its user  If the user complies with it, resource supply will likely (but without certainty) become adequate to meet demand  E.g.., in Scenario 1, Aura advised Jane to walk to Gate 15 in order to obtain adequate wireless bandwidth.  Conceptually promising, but not implemented by any real system yet (2001)  All three strategies are important in pervasive computing  Some smart spaces capable of accepting resource reservations (Strategy 1 - reservation)  In some smart spaces [some] clients can’t reserve resources — must ask applications to reduce their fidelities (Strategy 2 - reduction)  Happens when space is uncooperative or resource-impoverished  Corrective actions may be particularly useful when reduction of fidelity is unacceptable (Strategy 3 - correction)  Broaden the range of possibilities for adaptation by involving the user
  • 3. 3 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (36) Drilling Down - The Difficult Problems (13)  Adaptation Strategy – some research questions  How does a client choose the best adaptation strategy?  What factors should a good decision procedure take into account? How should different factors be weighted? What role, if any, should the user play in making this decision? How can smooth and seamless transitions between strategies be ensured as a user moves between different spaces?  Reservation strategy might appear superior for a user  User neither required to accept lower fidelity nor perform a corrective action Is this true in all circumstances?  What are the hidden costs and ‘‘gotchas,’’ if any, in a widely- deployed system using Strategy 2?  How will the implementation of a smart space honor resource reservations?  What are the most appropriate admission control policies when there are competing requests from multiple clients? What resources, beside wireless network bandwidth, is it meaningful and useful for a smart space to reserve? What are the APIs and protocols necessary to negotiate these reservations?
  • 4. 4 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (37) Drilling Down - The Difficult Problems (14)  Adaptation Strategy – some research questions – cont.  Issues for corrective strategy  Is corrective adaptation practically feasible? Do users find it intrusive or annoying? What is the best way to communicate potential corrective actions to users? What are the programming models and APIs necessary to support corrective actions?  Legacy problem: Can existing applications use this approach? If so, how substantial are the modifications to them?  Issues for reduction strategy  What are the different ways in which fidelity can be lowered for a broad range of applications? Are existing APIs, such as that of Odyssey [24], adequate?  How should those APIs and programming models be revised based on extensive usage experience?  What is the negative impact of lowered fidelity on users and how can this be minimized?
  • 5. 5 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (38) Drilling Down - The Difficult Problems (15)  4.4) High-level Energy Management  Sophisticated software capabilities increase the energy demand of an MC (= mobile computer)  Examples of sophisticated capabilities: as proactivity / self-tuning  At the same time: pressure to make MCs lighter and more compact places severe restrictions on battery capacity  Growing consensus:  Advances in battery technology and low-power circuit design cannot, by themselves, reconcile these opposing constraints  The higher levels of the system must also be involved [10, 25]  How does one involve the higher levels of a system in energy management?  Example 1: Energy-aware memory management [18]  OS dynamically controls the amount of physical memory that has to be refreshed  Example 2: Energy-aware adaptation [11]  Under OS control, individual applications switch to modes of operation with lower fidelity and energy demand
  • 6. 6 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (39) Drilling Down - The Difficult Problems (16)  High-level Energy Management – some research questions  In what ways can the higher levels of a system contribute to managing energy?  What are the relative strengths and weaknesses of these approaches? When should one method be used in preference to another?  How does high-level energy management impact the goal of invisibility in pervasive computing?  How intrusive or distracting to users are such techniques?  Can knowledge of user intent be exploited in energy management?  If so, how robust is this approach in the face of imperfection in this knowledge?  Can smart spaces and surrogates be used to reduce energy demand on a mobile computer?  What are possible approaches, and what are their relative merits?  What is the role of remote execution in extending battery life?  Under what circumstances does its energy savings exceed the energy cost of wireless communication? Can a system predict these savings and costs accurately enough in practice to make a significant difference?
  • 7. 7 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (40) Drilling Down - The Difficult Problems (17)  4.5) Client Thickness  Types of clients  Thick client = a powerful client  Thin client = a minimal client  Thick clients have many negative features from the user’s viewpoint  Larger / heavier / with bigger & heavier battery / dissipate more heat  Over time, physical size and weight of a thick client are reduced  Due to improvements in VLSI and packaging technology  The same improvements shrinking thick clients produce even smaller and lighter thin clients  Q: How powerful MC is needed for a pervasive computing environment?  How much CPU power, memory, disk capacity, … does it need?  The answer determines many of the key constraints imposed on the hardware design of the client  A: For a user, a client can never be too powerful, too small, too light or have too long battery life!
  • 8. 8 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (41) Drilling Down - The Difficult Problems (18)  4.5. Client Thickness – cont.1  A wide range of client designs  One extreme: Ultra-thin clients  Bare-bones devices  E.g., Infopad [6, 40], SLIM [33]  Can’t operate in isolation  Little more than high-resolution displays connected through high-bandwidth wireless links to nearby compute servers  In-between: Midsize clients  Handheld computers  E.g., PalmPilot  Can operate in isolation  But run a limited range of applications  Other apps run on compute servers of smart spaces  The other extreme: Full-function clients  Wearable computers and laptops  E.g., the Navigator family of wearable computers [34], laptops running as clients of the Coda File System [17]  Capable of standalone or disconnected operation  Make use of wireless connectivity when available  Not critically dependent on it