Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
1@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Pervasive Computing:Issues & Challenges
Debashis Saha, Debashis Saha, Ph. D.Ph. D.
MIS & Computer Science GroupIndian Institute of Management (IIM), Calcutta, India
Joka, D. H. Road, Calcutta 700 104, [email protected]
2@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Source Article““Pervasive Computing: A ParadigmPervasive Computing: A Paradigm
for the 21for the 21stst Century Century””
ByDebashis Saha & Amitava Mukherjee,
IEEE Computer Magazine,Vol. 36, No. 3, pp. 25-31, March 2003
3@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Source Book““Networking Infrastructure forNetworking Infrastructure for
Pervasive Computing:Pervasive Computing:Enabling Technologies and SystemsEnabling Technologies and Systems””
ByDebashis Saha,
Amitava Mukherjee &Somprakash Bandyopadhyay
Kluwer Academic Publishers (KAP),Boston, USA, October 2002
ISBN: 1-4020-7429-X, 320 pp, Oct. 2002
4@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Outline� Introduction
� What is “Pervasive” ?
�Evolution of Computing� Personal, Distributed, Web, Mobile, Pervasive …..
�Pervasive Computing Model� PerNet, PerWare, PerApp
�Issues & Challenges� Scalability, Heterogeneity, Perception, etc…….
� Recent Achievements� Research Initiatives
� Conclusion
5@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Introduction
Indian Institute of ManagementIndian Institute of ManagementCalcutta (IIM-C)Calcutta (IIM-C)
6@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
What is Pervasive Computing?• An overall infrastructural support to provide
proactively a rich set of computing capabilities andservices to a user (may be a nomad) every timeeverywhere in a transparent, integrated andconvenient way.
• A convenient interface (not only access), through anew class of appliances, to relevant information– with the ability to either take action on it or get acted upon
by it, whenever and wherever necessary.• A tool to quickly, efficiently, and effortlessly help
manage information,– the new currency of the global economy.
7@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
We begin with ……………
“the vision”
……….…..of Mark Weiser
The Story of Sal
Ref: Weiser M., “The Computer for the 21st Century”, ScientificAmerican, September, 1991, (reprinted in IEEE Pervasive(reprinted in IEEE PervasiveComputing, Vol. 1, No. 1, pp. 19-25, Jan-Mar 2002).Computing, Vol. 1, No. 1, pp. 19-25, Jan-Mar 2002).
8@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Motivation• To build up computers“that fit the human
environment, instead of forcing humans to entertheir”
• Ultimate goal is to “make using computer asrefreshing as taking a walk in the woods”““The most profound technologies are thoseThe most profound technologies are those
that disappear. They weave themselvesthat disappear. They weave themselvesinto the fabric of everyday life until they areinto the fabric of everyday life until they are
indistinguishable from it.indistinguishable from it.”” – Mark Weiser
9@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Bottomline
“….a new way of thinking about computers in theworld, one that takes into account the naturalhuman environment and allows the computersthemselves to vanish into the background…….”
- Mark Weiser of Xerox PARC (1991).
10@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Objectives• Leverage proliferation of cheap smart devices
with computing resources:• handhelds, micro-ovens, smart cards, displays, cell-phones,
etc.
• Take advantage of the Internet (a global self-adaptive system)
• Utilize resources wherever possible
• Harness mobile cellular infrastructure(terminal mobility)
• Small handheld smart devices
11@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
“Smart Devices”
12@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Pervasiveness• Computing will be everywhere: pens, cans, pads,
boards, coffee machines, alarm watches, etc.– Invisible and sublime
• Communication will be everywhere: among alldevices– Wired and/or wireless– Single-hop or multi-hop
• Some of the devices (like traffic lights, ovens, etc.)already have computers incorporated, but withoutthe possibility of communicating between eachother,– which is very important as shown in next example
13@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Intelligent Refrigerator• Take out last can of
milk
• Swipe can’s UPC label,which adds milk toyour shopping list forFriday afternoon
• Make a note that youneed milk for theguests you are havingover this weekend
14@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Reminder to Pager• Friday rolls around
and you have notbought milk
• You are on yourway back fromoffice
• Deadline-basedreminder is sent bythe refrigerator toyour pager
15@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Helpful AutoPC• AutoPC informs
you that you arenow near asupermarket
• Opportunisticreminder: “If it isconvenient, stopto buy milk”
16@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Paradigm Shift PervComp defines a major paradigm shift
from“anytime anywhere” computing
(which is essentially a reactive approach)to
“all-time everywhere” computing(which is a proactive approach for computing).
Simply speaking, it is Simply speaking, it is ““omni-computingomni-computing””
17@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Proactive Computing• Able to read your mind and environment:
– Can dynamically reconfigure to match availableresources
– May suspend/resume on different platforms andlocations
– Can receive active guidance from system– Can do corrections, alternatives on its own– …………..
• Something similar to the Screen Fridge shownnext
18@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Screen Fridge• Screen Fridge provides:– food management,– digital cook book,– TV,– radio,– surveillance camera,– web surfing,– virtual key board,– video messages,– Email,– ……..
19@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Evolution of PerCom
With this introduction, let’s now lookinto ……
Indian Institute of ManagementIndian Institute of ManagementCalcutta (IIM-C)Calcutta (IIM-C)
20@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Evolutionary Path
(Ref :Satyanarayanan, IEEE Personal Comm., Aug 2001)
21@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Historical Evolution• Personal Computing
– visibly distinguishable from our daily life,• apart from its complex user interface problem
• Distributed Computing– advent of networking, in particular LANs
• Web Computing– World Wide Web (WWW) following the Internet
• Mobile Computing (MobiCom)– cellular mobile technology
• Pervasive Computing (PerCom)
22@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Pervasive ComputingPervasive Computing
Pervasive Middleware
MOBILE SYSTEM
MOBILECOMPUTING
PERVASIVENESSSUPPORT
Pervasive Network
+
23@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
IssuesSupport for pervasiveness will come from
interoperability,uneven conditioning,
scalability,smartness, &invisibility,
on top of mobility
24@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
PerCom Model
Indian Institute of ManagementIndian Institute of ManagementCalcutta (IIM-C)Calcutta (IIM-C)
25@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Four Components• Four main parts
– Cheap, low-power computers that include convenientdisplays
• Pervasive Devices– A network to tie them together
• PerNet– Software systems to implement ubiquitous applications
• PerWare– Software systems to implement ubiquitous applications
• PerApp
26@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
PerCom Architecture• PerCom architecture can be framed into three broad
areas:– PerNet
• networking,– PerWare
• middleware,– PerApp
• applications
• To implement this architecture, all the three sets oftechnologies must be used judiciously
27@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
PerCom Model
Applications
Middlewares
Network (PerNet)
user
user
user
user
28@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Low-power Computers• The first requirement is not so difficult to be
met• Even at the time when Weiser’s paper was written such
devices existed– Today there are mobile devices with processors of 1.8 GHz
(maybe more), RAM of 256 Mb and color displays– Moore’s Law reign supreme
• The devices should be simple and multi-functional
• No complex technologies– Easy to use– May be solved by midlewaresmidlewares
29@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
PerNet• The basic idea behind PerCom is to deploy a wide
variety of smart devices throughout our working andliving spaces.
• These devices coordinate with each other using apervasive network, called PerNet– to provide users with universal and immediate access to
information and support users in completing their tasks.• Fortunately, this networking infrastructure, which is
necessary to realize the vision of PerCom, isincreasingly becoming a reality– See the next slide
30@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Network ViewWIRED BACKBOME NETWORK
WIRED over WIRELESS NETWORK
PERVASIVE NETWORK
PERVASIVE COMPUTING SYSTEM
WIRELESS ACCESS
PERVASIVENESS MANAGEMENT
MIDDLEWARE SUPPORT
31@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Potential Structure of PerNet• PerNet may consist of:– a core of backbone (probably wired) and– a shell of access (invariably wireless).• From the current pattern of network
deployment, it is emerging as the most naturalarchitecture
– Popularly known as “last/first mile (hop) wireless”architecture, also called it as “wireless over wired”.
– The last/first mile of access has to be wirelessbecause of the requirement to support mobility
32@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Structure (contd.)
Backbone(core)
Access (shell)
user
user
user
33@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Structure (contd.)• The backbone may be either wired (say, optical) or
wireless (say, satellite).• A popular implementation of PervNet structure could
be “cellular over optical”– Since optical transmission is the preferred technology for
high speed high bandwidth backbone and– single hop cellular is the common access technology,
• It indicates that these two technologies, namely opticaland cellular, are the dominant ones from the point ofboth penetration rate and technological maturity
34@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Existing Building Blocks• The Internet
– IPv4, IPv6, Mobile IPv6• provides some of the links in which a distributed federation
forms
• Mobile Wireless Networks– Cellular technology– MANET, sensor-net
• Smart sensor nodes will form ad hoc networks dynamically
• WDM Optical Networks– GMPLS
• Fiber-optic technology can be considered to meeting the hugedemand in future backbone networks
• Satellite Networks
35@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
PerWare• A shell of middleware
– essential to interface between the PerNet kernel and theend-user applications running on pervasive devices.
• Responsible for keeping the users immersed in thePerCom space– and for mediating all interactions with the PerNet kernel
on behalf of the user.
• Mostly be a bundle of firmwares and/or softwares– executing in either client-server or peer-to-peer mode.
36@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Issues
Indian Institute of ManagementIndian Institute of ManagementCalcutta (IIM-C)Calcutta (IIM-C)
37@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Why Difficult?When applied to PerCom, existing approaches to
conventional distributed computing are insufficient:– Due to its dynamic and distributed nature
• applications need to be able to acquire any resource they need atany time,
– so that they can continuously provide their services in a highly dynamicenvironment.
– Need of a common system platform,• allowing applications to be run across the range of devices and to
be automatically distributed, installed and configured.
– Data and functionality need to be kept separate,• so that they can evolve gracefully in the global PervComp
infrastructure.
38@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Global Dimension• PerCom aims for a world in which every object, every
building, and every body becomes part of a networkservice– That is PerNet
• PerCom space is a combination of mobile andstationary devices– that draw on powerful services embedded in the underlying
PerNet to achieve users’ tasks.
• The result is a giant ad-hoc mobile distributed systemgiant ad-hoc mobile distributed system,– with tens of thousands of devices and services coming in
and going out.
39@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Networking is the key• The devices are available• What is missing is the right network
architecture that• Incorporates pervasive computing devices into
the system as information managers, and• Introduces an abstraction to describe context-
sensitive information– i.e., addresses the information management
problem
40@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Role of PerWare• PerNet will pass onto PerWare the responsibilities it
can not provide to get the required functionalities• PerWare has to absorb the differences and emulate
the missing capabilities wherever needed• New systems that have to deal with the diversity of
inputs from the user• New middleware ideas are required
– that does not assume a relatively fixed configuration ofhardware and software
41@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Classification of Issues• Integration
– Heterogeneity
• Scalability– Global
• Context awareness– or perception
• Context management– or smartness
• Invisibility– Self-tuning and anticipation
PerNet Level
PerWare Level
42@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Challenges
Indian Institute of ManagementIndian Institute of ManagementCalcutta (IIM-C)Calcutta (IIM-C)
43@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Strategy• We have identified the issues and classified
them under broad headings• We have tried to understand at what level these
issues are to be addressed• Now let us find out the potential solution
strategies and the challenges therein– Remember, we have seen only the tip of the
iceberg– More research is needed to understand it
compeletly
44@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Recap of Issues• Integration
– Heterogeneity
• Scalability– Global
• Context awareness– or perception
• Context management– or smartness
• Invisibility– Self-tuning and anticipation
PerNet Level
PerWare Level
45@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Potential Solutions• Adaptation
– Possible three strategies
• Smart Spaces– Embedded technology
• Scalability– Localization
• Invisibility– Minimal user distraction
• Integration– Seamless interoperability
46@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Perception• Implementing perception introduces significant
complications:– location monitoring, uncertainty modeling, real-time
information processing, and merging data from multipleand possibly disagreeing sensors.
• information that defines context awareness must be accurate;– otherwise, it can confuse or intrude on the user experience.
• Examples:– ComMotion under development at the MIT Media Lab
• www.media.mit.edu/~nmarmas/comMotion.html– Microsoft Research is investigating Radar
• an in-building location-aware system.
47@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Smartness• Smartness involves accurate sensing (input) followed
by intelligent control or action (output) between twoworlds– namely machine and human
• E.g., a pervasive computing system that automaticallyadjusts heating, cooling, and lighting levels in a roomdepending on an occupant’s electronic profile must have– some form of perception to track the person and also– some form of control to adjust the ventilation and lighting
systems
48@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Anticipatory Self-tuning• To meet user expectations continuously, the
environment and the objects in it must be able to– tune themselves without distracting users at a conscious
level.
• A system that requires minimal human interventionoffers a reasonable approximation of invisibility.
• Humans can intervene to tune smart environments when theyfail to meet user expectations automatically.– Such intervention might also be part of a continuous learning cycle for
the environment.– AI has some role to play here!
49@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Adaptation• Adaptation is necessary whenever– there is a significant mismatch between the supply
and demand of a resource• The resource may be– wireless network bandwidth,– energy,– computing cycles,– memory,– and so on
50@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Three Strategies• Client guides applications in changing their behavior
– so that they use less of a scarce resource• This change usually reduces the user-perceived quality, or
fidelity, of an application
• Client asks the environment to guarantee a certainlevel of a resource– This is the approach typically used by reservation-based
quality of service (QoS) systems• From the viewpoint of the client, this effectively increases the
supply of a scarce resource to meet the client’s demand
• Environment suggests a corrective action to the user• If the user acts on this suggestion, it is likely (but not certain)
that resource supply will become adequate to meet demand
51@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Immediate Questions• How does a client choose between adaptation
strategies?• What factors should a good decision procedure
take into account?• How should different factors be weighted?• What role, if any, should the user play in
making this decision?• How can smooth and seamless transitions
between strategies be ensured as a usermoves?
52@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Smart Spaces• By embedding computing infrastructure in building
infrastructure, a smart space brings together twoworlds
• Physical & Logical
• Fusion of these worlds enables sensing and controlof one world by the other
• E.g., automatic adjustment of heating, cooling, and lighting levels ina room based on an occupant’s electronic profile
• Influence in the other direction is also possible• software on a user’s computer may behave differently depending on
where the user is currently located
53@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
• Complete disappearance of pervasivecomputing technology from a user’sconsciousness
• In practice, a reasonable approximation to thisideal is minimal user distraction
• If an environment continuously meets userexpectations and rarely presents him withsurprises, it allows him to interact almost at asubconscious level
Invisibility
54@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Localized Scalability• Scalability, so far, has ignored physical distance
• a Web server or file server should handle as many clients as possible,– regardless of whether they are located next door or across the
country
• In PerNet, the density of interactions has to fall offas one moves away;
• otherwise, both the user and his computing system will beoverwhelmed by distant interactions that are of little relevance
• Although a mobile user far from home will stillgenerate some distant interactions with sites relevantto him, the preponderance of his/her interactionswill be local
55@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Current Status
Indian Institute of ManagementIndian Institute of ManagementCalcutta (IIM-C)Calcutta (IIM-C)
56@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Research Initiatives• ParcTab project of Xerox :: Mark Weiser• Project Aura at Carnegie Mellon University (CMU)
(http://www-2.cs.cmu.edu/~aura/)• Endeavour Project in the University of California at
Berkeley (http://endeavour.cs.berkeley.edu/)• Project Oxygen of MIT
(http://www.oxygen.lcs.mit.edu/)• Portolano Project of the University of Washington
(http://portolano.cs.washington.edu/).• Sentient computing at AT&T Laboratories, Cambridge,
UK (http://www.cam-orl.co.uk/spirit/)
57@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Initiatives (contd.)• CoolTown project of HP Laboratory
(http://www.cooltown.com),• EasyLiving project of the Vision Group at Microsoft
Research (http://research.microsoft.com/easyliving/),• pvc@IBM (http://www-3.ibm.com/pvc/),• eBiquity Group, at University of Maryland at
Baltimore County (http://research.ebiquity.org/),• one.world at University of Washington
(http://one.cs.washington.edu/)• And many more ……….
58@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Aura“distraction free ubiquitous computingdistraction free ubiquitous computing”
• It emphasizes PerWare and PerApp design• It aims to implement a large scale computing system
demonstrating a “personal information aura”– that spans wearable, handheld, desktop, and infrastructure
computers.• A large umbrella project with sub-areas like:
– Darwin: an intelligent network at Aura’s core.– Coda: a distributed file management system that supports
nomadic file access, and– Odyssey: operating system support for resource adaptation.
59@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Endeavour• A planet-scale, self-organizing, and adaptive
“information utility.”• Components flow through the infrastructure, shape
themselves to adapt to their usage, and cooperate ontasks– over a PerNet
• Key innovative technological capability– support for fluid software
• The system can compose itself from preexisting hardwareand software components to satisfy a service request– while advertising the services it can provide to others.
60@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Oxygen• Computation will be freely available everywhere
– like oxygen in the air we breathe.
• The project rests on an infrastructure of mobile andstationary devices– connected by a self-configuring network.
• It is focusing on eight environment-enablingtechnologies.
• Its emphasis is on understanding “what turns anotherwise dormant environment into an empoweredone to which users shift parts of their tasks”.
61@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Portolano• An infrastructure based on mobile agents
– that interact with applications and users.• It emphasizes invisible, intent-based computing,
– which infers users’ intentions via their actions in the environmentand their interactions with everyday objects.
• Project devices are highly optimized to particular tasks– so that they blend into the world and require little technical
knowledge on the user’s part.• Data-centric routing automatically migrates data among
applications on the user’s behalf.– Data thus becomes “smart,” and serves as an interaction
mechanism within the environment.
62@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Conclusion
Indian Institute of ManagementIndian Institute of ManagementCalcutta (IIM-C)Calcutta (IIM-C)
63@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Imminent Research Issues• Scalability
• All pervasive IP
• Signaling overhead
• Location and mobility awareness
• Context Awareness & Sensitiveness
• Sophisticated resource management
• Privacy, Security and Manageability
64@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Near FutureInternational Data Corp. (IDC) has predicted that,
by the end of 2003, the number of pervasive devices willexceed the estimated number of people (6 billion)worldwide.
Specifically, there will be more than• 300 million PDAs,• 2 billion consumer electronic devices,
– such as wireless phones, pagers and set top boxes, and• 5 billion additional everyday devices,
– such as vending machines, refrigerators, and washingmachines,
all embedded with chips connected to the PerNet !!!
65@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Seamless Integration• The biggest surprise is how simple and basic all the
component technologies are:• The hardware technologies: laptops, handhelds, wireless
communication, software-controlled appliances, room cameras, etc.• The component software technologies: location tracking, face
recognition, speech recognition, online calendars, and so on
• The answer lies in the fact that the whole is muchgreater than the sum of its parts
• In other words, the real research is in the seamlessintegration of component technologies into a system
• The difficult problems lie in architecture, componentsynthesis, and system-level engineering
66@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Conclusion• PerCom is the crucible in which many disjoint areas of
research are fused– Capabilities from different areas will need to be integrated
with the kinds of computer systems capabilities• PerNet will be a fertile source of challenging research
problems for many years to come– Solving these problems will broaden the discourse on some
topics, and revisit long-standing design assumptions• The early decades of the 21st century will be a period
of excitement and ferment,– as new hardware technologies converge with research
progress on the many fundamental problems
67@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Indian Institute of ManagementIndian Institute of ManagementCalcutta (IIM-C)Calcutta (IIM-C)
68@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Any Question ?•• Please feel free to write to me forPlease feel free to write to me for
any doubt:any doubt:
[email protected]@iimcal.ac.in
69@ 2003, D. Saha, Indian Institute of Management Calcutta (IIM-C), India
October 08, 2003Division of IT, Karlstad University
Other References• M. Satyanarayanan, “Pervasive Computing: Vision and
Challenges”, IEEE Personal Communications, Aug 2001, pp10-17
• Special inaugural issue on Reaching for Weiser’s Vision, IEEEPervasive Computing, Vol. 1, No. 1, Jan-Mar 2002.
• Archan Misra, Subir Das, Anthony Mcauley and Sajal Das,“Autoconfiguration, Registration and Mobility Managementfor Pervasive Computing”, IEEE Personal Communications,Aug 2001, pp 24-31
• C. Perkins, “IP Mobility Support,” IETF RFC 2002, Oct. 1996• Charles E. Perkins, “Mobile IP”, IEEE Communications
Magazine, May 1997, pp 84-99