Lecture 2: Introduction to Pervasive Computing PDF
Document Details
Uploaded by PoisedProtagonist3427
Ain Shams University
Heba KH. Ahmed
Tags
Summary
This document presents a lecture on pervasive computing, explaining its key concepts, characteristics, and real-world applications. The lecture covers topics such as shift in paradigms, physical integration, context awareness, and characteristics of pervasive computing applications.
Full Transcript
CSY450. Pervasive Computing Lecture 2: Introduction to Pervasive Computing Heba KH. Ahmed, Ph.D. Associate Professor, Computer Systems Department. Faculty of Computer & Information Science. Agenda ✓Overview ✓What is Pervasive Computing? ✓Evolution of Pervasive Computing ✓Key Components of P...
CSY450. Pervasive Computing Lecture 2: Introduction to Pervasive Computing Heba KH. Ahmed, Ph.D. Associate Professor, Computer Systems Department. Faculty of Computer & Information Science. Agenda ✓Overview ✓What is Pervasive Computing? ✓Evolution of Pervasive Computing ✓Key Components of Pervasive Systems ✓Real-World Examples 1. Shift in Paradigms. 2. Characteristic of Pervasive Computing App. 3. Principles of Pervasive Computing 4. Benefits and Challenges 5. Discussion Questions 6- Shift in Paradigms ❖ Interaction with Computers Human Integration (From Mainframe to PC) ❖ Paradigm Shift to Personal Computing ▪ Taking the Human in the Loop ▪ User interface software as main concern ▪ Human-Computer Interaction as discipline ❖ Personal Computing ▪ Direct manipulation ▪ Isolated: not aware of context Physical Integration (From PC to Ubicomp) ❖ Paradigm Shift to Ubiquitous Computing ▪ Taking context of human-computer use into the loop ▪ Context Aware: “what surrounds” i.e. the location, the environment, the user’s activity, the situation Physical Integration ❖ Context Awareness: ▪ It is hard to model the device’s context awareness because it has many dimensions: The identity of the device Who else is present The time Environmental factors – Sound , motion, temperature , orientation. It is essential in pervasive computing systems , that the object is capable to, ❖ Identify (sensing the identity of a real world object), ❖ Localize (sensing its position and movement in space), and ❖ Track to Coordinate (relating it semantically to other objects and behavioral rules) its activities with respect to and relative to the other objects Physical Integration 2-7 Framework for Context-Aware Applications Physical Integration ❖ How physical integration could help to make the technology invisible, or to disappear in the surrounding environment ? Shrink and Design Sensor based and embed/distribute interactions that context based it in the physical don’t demand aware interaction world our intention nor attention Size Interaction Sensor Physical Integration ❖ Invisible Computing ▪ Computation could be integrated with common objects that you might already be using for everyday work practices, rather than forcing computation to be separate activity. 2-9 Physical Integration ❖ Ubicomp pushes the computerized versions of these technologies back into the physical world. ▪ Example e-book is coming back to real book again (Calm technology) ▪ Smart homes are an extension of calm technology due to their emphasis on awareness and adaptability to the user's needs. ▪ From 2001-2003, the EU funded 17 projects under an initiative called "The Disappearing Computer." The goal of this initiative was to explore new concepts and techniques that would lead to the development of calm technologies for people-friendly environments. 2-10 7- Characteristic of Pervasive Computing App. ❖ Pervasive computing applications are characterized by the following basic elements: 1. Ubiquitous access, 2. Context awareness, 3. Intelligence 4. Natural interaction. 12 7- Characteristic of Pervasive Computing App. (Cont.) 1. Ubiquitous access, Interconnected embedded systems, invisible and weaved into the background of the surrounding Able to sense the setting and state of physical world objects via a multitude of sensors. Sensors, as the key enablers for implicit input from a “physical world” into a “virtual world”, will be operated in a time-driven or event-driven way, and actuators, as the generic means for implicit output from the “virtual” to the “physical world”, Actuators will respond to the surrounding in either a reactive or proactive fashion. 13 7- Characteristic of Pervasive Computing App. (Cont.) 2. Context awareness, Refers to the ability of the system to recognise and localise objects as well as people and their intentions. The context of an application is understood as “any information that can be used to characterize the situation of an entity” Developers should not be concerned with how, when and where context information is sensed. Sensing context must happen in an application independent way, and context representation must be generic for all possible applications 14 7- Characteristic of Pervasive Computing App. (Cont.) 3. Intelligence Refers to the fact that a technology-rich environment can adapt itself to the people that live in it, learn from their behavior, and possibly recognize as well as show emotion. 15 7- Characteristic of Pervasive Computing App. (Cont.) 4. Natural interaction. Natural speech Gesture recognition, Speech synthesis which will allow a much more human-like communication with the digital environment than is possible today. 16 8- Principles of Pervasive Computing ❖ Decentralization ❖ Connectivity ❖ Diversification ❖ Simplicity 17 Decentralization ❖ The shift from a centralized view to a strongly decentralized computing landscape is the first Principle of Pervasive computing. ❖ Computing power shifted from server systems to client workstations. ▪ Distributed Systems ▪ Synchronizing information ▪ Managing applications Decentralization ❖ Distributed Systems ▪ logic, database, control in a distributed style, not in a single machine-centralized controller ❖ Synchronizing information Synchronizing Information consistent Databases Synchronizing applications on different devices. ❖ Managing applications Service providers should control their deployed software They must keep track of individual user profiles and different device. Connectivity ❖ The second principle for pervasive computing is the strong demand to connectivity ▪ A vision of boundless connectivity ▪ Agreeing on common standards Diversification ❖ In today’s IT world, the customer requires a universal computer that has all the software that satisfy his needs ❖ The user usually performs all his tasks with one all-purpose workstation ❖ Applications are implemented by software ▪ Targeting specific needs ▪ Alternatives to surf the web ▪ Managing the diversity Simplicity ❖ Pervasive devices are specialized tools that are not optimized for general use. ❖ They perform tasks they have been designed for from a usability point of view. ❖ Thus, Pervasive computing aims at simplicity of usage ▪ Convenient, intuitive, self evident ▪ Mature human computer interfaces Design and Implementation Problems ❖ Design and Implementation problems in pervasive computing ▪ User intent ▪ Cyber foraging ▪ Adaptation Strategy ▪ High-level energy management ▪ Client thickness ▪ Context Awareness ▪ Privacy and Trust 23 Design and Implementation Problems ❖ Design and Implementation problems in pervasive computing ▪ User intent it is crucial that a pervasive computing system track user intent. Otherwise, it will be almost impossible to determine which system actions will help rather than hinder the user. For example, suppose a user is viewing video over a network connection whose bandwidth suddenly drops. Should the system a) reduce the fidelity of the video, b) pause briefly to find another higher-bandwidth connection c) advise the user that the task can no longer be accomplished? The correct choice will depend on what the user is trying to accomplish. 24 Design and Implementation Problems ❖ Design and Implementation problems in pervasive computing ▪ Cyber Foraging Mobile users may require computing and data manipulation capabilities well beyond those of a lightweight mobile computer with long battery life. Cyber foraging, The idea is to dynamically augment the computing resources of a wireless mobile computer by exploiting wired hardware infrastructure. As computing becomes cheaper and more plentiful, it makes economic sense to ‘‘waste’’ computing resources to improve user experience 25 Design and Implementation Problems ❖ Design and Implementation problems in pervasive computing ▪ Adaptation Strategy Adaptation is necessary when there is a significant mismatch between the supply and demand of a resource. The resource in question may be wireless network bandwidth, energy, memory, and so on. The system ability to dynamically adjust their behavior or resource usage based on the current context, environment, or available resources. These strategies are essential for maintaining system performance, user satisfaction, and resource efficiency 26 Design and Implementation Problems ❖ Design and Implementation problems in pervasive computing ▪ Adaptation Strategy There are some alternative strategies for adaptation in pervasive computing. – First, a client can guide applications in changing their behavior so that they use less of a scarce resource. This change usually reduces the user-perceived quality. – Second, a client can ask the environment to guarantee a certain level of a resource. From the viewpoint of the client, this effectively increases the supply of a scarce resource to meet the client’s demand (QoS) 27 Design and Implementation Problems ❖ Design and Implementation problems in pervasive computing ▪ High-level Energy Management Pressure to make such computers lighter and more compact places severe restrictions on battery capacity. There is growing consensus that advances in battery technology and low-power circuit design cannot, by themselves, reconcile these opposing constraints, the higher levels of the system must also be involved 28 Design and Implementation Problems ❖ Design and Implementation problems in pervasive computing ▪ High-level Energy Management One example is energy-aware memory management, where the operating system dynamically controls the amount of physical memory that must be refreshed. Another example is energy-aware adaptation, where individual applications switch to modes of operation with lower fidelity and energy demand under operating system control 29 Design and Implementation Problems ❖ Design and Implementation problems in pervasive computing ▪ Client Thickness How powerful does a mobile client need to be for a pervasive computing environment? In other words, how much CPU power, memory, disk capacity and so on should it have? The answer will determine many of the key constraints imposed on the hardware design of the client. – A thick client is a powerful client, – A thin client is a minimal one. 30 Design and Implementation Problems ❖ Design and Implementation problems in pervasive computing ▪ Context Awareness A pervasive computing system that strives to be minimally intrusive has to be context-aware. In other words, it must be cognizant of its user’s state and surroundings, and must modify its behavior based on this information A user’s context can be quite rich, consisting of attributes such as – physical location, – physiological state (such as body temperature and heart rate), – emotional state (such as angry, distraught, or calm), – personal history, daily behavioral patterns, and so on 31 Design and Implementation Problems ❖ Design and Implementation problems in pervasive computing ▪ Privacy and Trust As a user becomes more dependent on a pervasive computing system, it becomes more knowledgeable about that user’s movements, behavior patterns and habits. Exploiting this information is critical to successful proactivity and self-tuning. At the same time, it may cause serious loss of privacy. 32 9- Benefits and Challenges ❖Benefits: o Convenience, efficiency, personalization ❖Challenges: o Security, privacy, complexity References Pervasive Computing: Vision and Challenges, M. Satyanarayanan What is Pervasive Computing? , Alois Ferscha 34 Thank You ☺ 35