Upload
jane-fletcher
View
225
Download
0
Tags:
Embed Size (px)
Citation preview
Ubiquitous and Pervasive Computing
Prabhaker Mateti
Mateti 2
Networked Computing
• Send-Receive Message Passing paradigm• Independent computer systems as Nodes• Aware of other nodes and networks of nodes– Loss of messages, a serious concern– Ordered delivery, a serious concern– A snapshot of “global state” is not possible– global time stamps not available– define a “happened before” relation
• Client-Server computing• Master-Slave computingCEG4900: Android Internals and Security
Mateti 3
Distributed Computing
• Def: Computation based on send-receive of messages without shared memory state but with synergy.– Networked computing with “synergy”– Many variations loosen up the definition.
• Peer-to-Peer computing• Spreading out and shrinking back on the
network• “Distributed Shared Memory”CEG4900: Android Internals and Security
Mateti 4
Distributed Computing Software• Cluster Computing• Grid Computing• PVM (Parallel Virtual Machine)
– in spite of the name, a distributed computing paradigm– http://www.csm.ornl.gov/pvm/
• MPI (Message Passing Interface)– http://www.mpi-forum.org/
• Condor – use idle machines– http://www.cs.wisc.edu/condor/
• OpenMP is for parallel computing http://openmp.org/• Distributed OS exist but have not gained a foothold. CEG4900: Android Internals and Security
Mateti 5
Parallel Computing
• Def: Computation based on shared memory state and with synergy.– Many variations loosen up the definition.– “Strongly coupled” nodes– Mutual exclusion a serious concern
• MIMD, SIMD, …• Parallel Fortran, … languages• Scientific computing• Multi-Core CPUs• Cellular Computing: PlayStation4CEG4900: Android Internals and Security
Mateti 6
Ubiquitous Computing
• Mainframe: Many people share one computer.• Personal Computer: One person with one computer.• Ubiquitous Computing: Many computers serve each
person.• “the age of calm technology, when technology
recedes into the background of our lives.” • roughly the opposite of virtual reality• From: Mark Weiser, sandbox.xerox.com/ ubicomp/,
1996
CEG4900: Android Internals and Security
Mateti 7
Ubiquitous Computing Scenario
• Provide hundreds of wireless computing devices per person per office, of all scales– from 1 in displays to wall sized. – This will require new work in operating systems, GUI,
networks, wireless, displays, …• This is different from PDA's, dynabooks, or
information at your fingertips. • It is invisible, everywhere computing that does not
live on a personal device of any sort, but is in the woodwork everywhere.
CEG4900: Android Internals and Security
Mateti 8
Ubiquitous Computing Scenario
• small, inexpensive, robust networked processing devices• distributed at all scales throughout everyday life and
generally tuned to distinctly common-place ends. • For example, a domestic ubiquitous computing
environment might interconnect lighting and environmental controls with personal biometric monitors woven into clothing so that illumination and heating conditions in a room might be modulated, continuously and imperceptibly.
• Way beyond “Internet of Things”
CEG4900: Android Internals and Security
Mateti 9
Ubiquitous Computing Definitions
• “machines that fit the human environment instead of forcing humans to enter theirs.”
• “Computing without computers, where information processing has diffused into everyday life, and virtually disappeared from view.” -- Adam Greenfield, Everyware: The Dawning Age of Ubiquitous Computing, 2006
CEG4900: Android Internals and Security
Mateti 10
Weiser’s Ubiquitous Devices 1996
• Tabs: wearable centimeter sized devices• Pads: hand-held decimeter-sized devices• Boards: meter sized interactive display
devices.
CEG4900: Android Internals and Security
Mateti 11
More Ubiquitous Devices
• “like pigment in the wall paint”• Dust: miniaturized devices can be without visual
output displays, – Micro Electro-Mechanical Systems (MEMS), – nanometers to millimeters.
• Skin: fabrics based upon light emitting and conductive polymers, or organic computer devices
• Clay: ensembles of MEMS can be formed into arbitrary three dimensional shapes as artifacts
CEG4900: Android Internals and Security
Mateti 12
MicroSoft “Old Surface” PixelSense
CEG4900: Android Internals and Security
http://www.microsoft.com/en-us/pixelsense/gettingstarted.aspx
Mateti 13
Google Glass
• https://glass.google.com/getglass/shop/glass • $1500 July 2014
CEG4900: Android Internals and Security
14
MIT Sixth Sense
CEG436: Mobile Computing
15
MIT Sixth Sense
CEG436: Mobile Computing
Mateti 16
Typical Cloud Computing
• File storage accessible via Internet to PCs, …, mobile devices– GoogleDrive, DropBox, OneDrive, …
• Shipping off a well-defined computation and data to an outsource provider– Google Apps– Amazon Elastic Compute Cloud (EC2)
CEG4900: Android Internals and Security
Mateti 17
Cloud computing
CEG4900: Android Internals and Security
http://en.wikipedia.org/wiki/File:Cloud_computing.svg
Mateti 18
Cloud Computing
• “Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services.”
• Cloud computing characteristics: Agility, Reduced Cost, Device And Location Independence, On-demand Scalability And Performance
CEG4900: Android Internals and Security
Mateti 19
Pervasive Computing
• Invisible Computing Everywhere: A world in which virtually every object has processing power with (wireless or wired) connections to a global network.
• Devices– RFID (radio frequency identification) tags– Active badges worn as ID cards.– Memory buttons that store information.
• Contextual computingCEG4900: Android Internals and Security
Mateti 20
Pervasive Computing
• Internet as the start of a pervasive computing system.• “Pervasive computing envisions environments richly
lathered with computation, communication and networked devices, mobile users interacting with their environment using speech and vision, with secure access to personal or public data. Pervasive computing environments will … immerse their users in a triad of invisible computation, communication and devices, working in concert to satisfy user requirements according to the facilities available in the environment.” -- http://groups.csail.mit.edu/cag/classes/6.898/
CEG4900: Android Internals and Security
Mateti 21
Applications of Pervasive Computing
• Smart Homes– appliances communicate with each other– television, lighting, heating and home security
• Smart Cars– controlling the radio, transmission, remembering your seat position, adjusting the
temperature, making the suspension work better, helping you see in the dark, and warning when tire pressure is low.
• Smart “Things” – Barcodes, Auto Identification (Auto-ID)– RFID tollbooth systems, such as E-Z Pass.
• Large-scale pervasive computing– Smart Schools– Intelligent Elder- Care– Smart Offices – Digital Cities
CEG4900: Android Internals and Security
Mateti 22
Goals of Project Oxygen• pervasive—it must be everywhere, with every portal reaching into the same
information base; • embedded—it must live in our world, sensing and affecting it; • nomadic—it must allow users and computations to move around freely, according to
their needs; • adaptable—it must provide flexibility and spontaneity, in response to changes in user
requirements and operating conditions; • powerful, yet efficient—it must free itself from constraints imposed by bounded
hardware resources, addressing instead system constraints imposed by user demands and available power or communication bandwidth;
• intentional—it must enable people to name services and software objects by intent, for example, "the nearest printer," as opposed to by address;
• eternal—it must never shut down or reboot; components may come and go in response to demand, errors, and upgrades, but Oxygen as a whole must be available all the time.
• http://oxygen.lcs.mit.edu/Overview.html CEG4900: Android Internals and Security
Mateti 23
Conferences
• http://www.ubicomp.org/ Annual UbiComp International Conferences
• http://www.percom.org/ IEEE Pervasive Computing and Communication (PerCom) conferences
• http://distributedcomputing.info/conferences.html Many.
• http://www.sigmobile.org/mobicom/ MobiCom 20xx
• International Symposium on Wearable Computers http://iswc.net/iswc14/
CEG4900: Android Internals and Security
Mateti 24
References
• M Satyanarayanan, Pervasive computing: Vision and challenges, IEEE Personal Communications, IEEE, 2001, ieeexplore.ieee.org
• Frank Stajano, “Security Issues in Ubiquitous Computing”, Handbook of Ambient Intelligence and Smart Environments, 2010, Part III, 281-314
• Jin Nakazawa, et al., A Description Language for Universal Understandings of Heterogeneous Services in Pervasive Computing, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.
CEG4900: Android Internals and Security