First Year Ph.D. Presentation Daniel Fitton Exploring the Design and Use of Messaging and Context Sharing with Situated Displays.

Slides:



Advertisements
Similar presentations
Basic Concepts of a Computer Network
Advertisements

UNCLASSIFIED – APPROVED FOR PUBLIC RELEASE Why Current Middleware Fails for Mobile Peer-to-Peer Computing Thomas Kunz Systems and Computer Engineering.
Distributed Data Processing
University of Baltimore Telecommunications Technology
Mobile Application Architectures
Handheld Contact Wireless syncing ACT! Blackberry and Windows Mobile 5/6.
Knowledge Pathways in IT
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Exploring the Functions of Networking.
A Pervasive Reminder System for Smart Homes Sylvain GIROUX and Simon GUERTIN Département d’informatique, Université de Sherbrooke 2500 boul. Université,
Optimizing the User Experience Throughout the Infrastructure Consolidation Process Dan Smith, Enterprise Solutions Manager, GTSI Chris Theon, Practice.
PZ13B Programming Language design and Implementation -4th Edition Copyright©Prentice Hall, PZ13B - Client server computing Programming Language.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Study of mobile collaborative information system using distributed database architecture Mahmoud Abaza, Duane Cato A THABASCA U NIVERSITY.
02/12/00 E-Business Architecture
490dp Introduction Robert Grimm. The Computer for the 21 st Century “The most profound technologies are those that disappear. They weave themselves into.
One.box Distributed home service interface. Core Components Pop3 client Router Storage Pop3 Server.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Chapter 3 : Distributed Data Processing
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
SM3121 Software Technology Mark Green School of Creative Media.
Introduction to client/server architecture
Back to Start 1 of 10 Connect with a Mobile Device You can use your company’s Windows SBS computer network to extend your connectivity by using mobile.
Data Storage Willis Kim 14 May Types of storages Direct Attached Storage – storage hardware that connects to a single server Direct Attached Storage.
College Collaboration System User Office Desktop USC Mail Server College Mail Server User Home Desktop Net USC College.
Building an Application Server for Home Network based on Android Platform Yi-hsien Liao Supervised by : Dr. Chao-huang Wei Department of Electrical Engineering.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Large Enterprise with Multiple Locations Source: Avaya.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Computing Fundamentals Module A Unit 2: Using Windows Vista LessonTopic 8Looking at Operating Systems 9Looking at the Windows Desktop 10Starting Application.
1 NETE4631 Mobile Cloud Computing Lecture Notes #10.
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
ESubnet Enterprises Inc. Richard Danielli, eSubnet Higher sales volumes through high network availability INTIX 2010.
1 1.What Pervasive Computing Is All About 1.1 Times Are Changing Industrial Revolution (19th) The engine and machine were concentrated at those location.
Exercises for Chapter 2: System models
1 Vrijendra Gokhale, Bernard Menezes K. R. School of Information Technology IIT Bombay User Interfaces for Jini Services The Jini Pattern Language Workshop.
NAS Last Update Copyright Kenneth N. Chipps Ph.D. 1.
Chapter 8-3 : Distributed Systems Distributed systems Distributed systems Document-based middleware Document-based middleware Coordination-based middleware.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
MobileMAN Internal meetingHelsinki, June 8 th 2004 NETikos activity in MobileMAN project Veronica Vanni NETikos S.p.A.
Chapter 2: System Models. Objectives To provide students with conceptual models to support their study of distributed systems. To motivate the study of.
Jini tm NetworkingTechnology Directions Jim Waldo Jini Architect Sun Microsystems, Inc.
Scott Butson District Technology Manager. Provide professional to all district staff Professional development has been provided on a regular basis to.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
Programming of Handheld and Mobile Devices Lecture 2 What is a MID? Rob Pooley
Chapter 2 Securing Network Server and User Workstations.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
JINI Coordination-Based System By Anthony Friel * David Kiernan * Jasper Wood.
Jini Architecture Introduction System Overview An Example.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Introducing… Conferencing Manager. Agenda Citrix MetaFrame Conferencing Manager Solving business challenges Value to our channel Citrix MetaFrame Conferencing.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Introduction to Networking. What is a Network? Discuss in groups.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Lecture 1: Network Operating Systems (NOS)
Network - definition A network is defined as a collection of computers and peripheral devices (such as printers) connected together. A local area network.
McGraw-Hill Technology Education
Introduction to Networks
Advanced Operating Systems
Dev Test on Windows Azure Solution in a Box
Mobile Agents.
McGraw-Hill Technology Education
McGraw-Hill Technology Education
Technology Department Annual Update
Click to add notes McGraw-Hill Technology Education
Presentation transcript:

First Year Ph.D. Presentation Daniel Fitton Exploring the Design and Use of Messaging and Context Sharing with Situated Displays

Situated Public Display Appliances Deploying and developing in the long term. Exploring patterns of use Patterns that do (or do not) occur Integration with existing patterns of use Dependability Performing a few simple tasks well Continual use 24/7 User involvement during development

Current Work Two Case studies Hermes (messenger to the gods in Greek Mythology) Deployed outside offices in computing Department Provide messaging similar to traditional post-it notes SPAM (SMS Public Asynchronous Messaging) Assist care staff at different locations Provide additional channel of communication

Hermes Enhance current paper based system with digital equivalent. Typical Scenario: Working at home today (car troubles), will be checking .

Hermes Augments current paper based systems Contrasts with post-it notes/message ‘whilers’.. Private message left at public device Security – Harder to remove/change message Remote Interaction – SMS, Web portal, (MMS) Creation of message mirrors creation of paper post-it note Draw on touch sensitive screen with pen Similar yellow colour!

Initial Requirements Had to use LV equipment for installation in corridor. Comply with disabilities legislation. Easy to deploy Self contained, no extra PC (etc) required Wireless communication Security Dependability Development Phased development process Feedback from users – Participatory design

Current System Architecture Client-Server Design No information stored at Hermes Client Appliances. All information stored at the server. Updates and UI actions involve communication with server. Uses Java RMI for synchronous communication. Problems Speed of UI dependent on communication with server b signal blocked by standing next to device. Low signal strength means slow/no service. What to do when communication fails?

Planned System Architecture Use tuple-space approach to store and distribute data Every node contains a tuple-space Any space can be updated Updates ‘percolate’ to all other spaces Implemented using replicated JavaSpaces with Jini. JavaSpace at every node Distributed storage & replication across all nodes Improve Dependability Hermes Appliances far less dependant on server Network and server failure has less impact on function

Patterns of Use Initially can only view messages through web portal or Hermes appliance Authentication process too time consuming. Users didn’t bother reading new messages Introduced ing of messages to users Considering other methods Initially only a single public message Cost of changing message (then changing back) too high. Users didn’t bother updating messages Introduced Temporary and Default public messages Will allow user to remove and select a temporary message on appliance.