1 Towards Pervasive Connectivity in Mobile Computing Frank Siegemund European Microsoft Innovation Center November 2006.

Slides:



Advertisements
Similar presentations
The Access Grid Ivan R. Judson 5/25/2004.
Advertisements

Doc.: IEEE /0046r0 Submission July 2009 Ari Ahtiainen, NokiaSlide 1 A Cooperation Mechanism for Coexistence between Secondary User Networks on.
UNIVERSITY OF JYVÄSKYLÄ Mobile Chedar – A Peer-to-Peer Middleware for Mobile Devices Presentation for International Workshop on Mobile Peer-to- Peer Computing.
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Digital Fountains: Applications and Related Issues Michael Mitzenmacher.
Roma 17/10/08 WORLD Project KO Meeting Laura Galluccio WORLD Project – KO Meeting University of Catania.
Sharing Content and Experience in Smart Environments Johan Plomp, Juhani Heinila, Veikko Ikonen, Eija Kaasinen, Pasi Valkkynen 1.
A component- and message-based architectural style for GUI software
Introduction of iVMS-4200 v2.0
By shooting 2009/10/1. outline imTop overview imTop detection Finger Mobile Finger detection evaluation Mobile detection improvement.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
The Online Library Environment Projects and Challenges at The University of Alabama Libraries Jason J. Battles Head, Web Services Department.
Korsan Yazılım Adaptive User Interface.  Team Members  Problem Definition  Market Research  Our Motivation & Solution  System Features  Demo Video.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
JXTA P2P Platform Denny Chen Dai CMPT 771, Spring 08.
Supervised by Prof. LYU, Rung Tsong Michael Department of Computer Science & Engineering The Chinese University of Hong Kong Prepared by: Chan Pik Wah,
Supporting Mobile Sensors and Typed Data Exchange Through the JXTA p2p Framework Supporting Mobile Sensors and Typed Data Exchange Through the JXTA p2p.
Department of Computer Science and Engineering, CUHK 1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal Video Conference Archives Indexing System.
ICPCA 2008 Research of architecture for digital campus LBS in Pervasive Computing Environment 1.
7DS: Node Cooperation in Mostly Disconnected Networks Henning Schulzrinne (joint work with Arezu Moghadan, Maria Papadopouli, Suman Srinivasan and Andy.
Sujeeth Narayan1 Smartphones Security CS 691 Sujeeth Narayan.
Basic Data Communication
Your Interactive Guide to the Digital World Discovering Computers 2012.
CHAPTER 5 : COMMUNICATIONS AND THE INTERNET (PART 1) INFORMATION TECHNOLOGY AND ITS APPLICATIONS SSK3000 Faculty of Computer Science and Information Technology,
Your Interactive Guide to the Digital World Discovering Computers 2012 Edited by : Noor Al-Hareqi.
1 NETWORKS AND COMMUNICATIONS Chapter Four. Communications Computer communication describes a process in which two or more computers or devices transfer.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 9 Communications and Networks.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Modern Software Engineering for Distributed Embedded Systems Joseph Voelmle, Carlos Daboin, Joanne Sirois, Josh Gallegos Mentor: Dr. Janusz Zalewski.
Kutscher / Ott / Bartsch Supporting Network Access and Service Location in Dynamic Environments Dirk Kutscher Jörg Ott Steffen Bartsch TNC.
2003Lenko Grigorov, CISC 839 eyePROXY Lenko Grigorov, CISC 839 Supervisor: Roel Vertegaal Additional support by Skaburskis A and Changuk S.
Robot Autonomous Perception Model For Internet-Based Intelligent Robotic System By Sriram Sunnam.
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
Department of Computer Science and Engineering, CUHK 1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal Video Conference Archives Indexing System.
1999 Final Year Projects Prof. Michael R. Lyu. Lyu9901: TravelNet Design a Web-based travel manager to reserve airplane tickets and hotel. A distributed.
Master Thesis Defense Jan Fiedler 04/17/98
X-Internet COMS E Web-enHanced Information Management Hyun Min Lee
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
Architectures of distributed systems Fundamental Models
Department of Computer Science and Engineering, CUHK 1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal VideoConference Archives Indexing System.
Fast Handoff for Seamless wireless mesh Networks Yair Amir, Clauiu Danilov, Michael Hilsdale Mobisys’ Jeon, Seung-woo.
1 Chapter 8 Communications & Networks. Objectives Overview Discuss the purpose of the components required for successful communications Describe these.
Akbar Rahman Juan Carlos Zúñiga Guang Lu IETF 78, July P2P Streaming for Mobile Nodes: Scenarios.
Real-Time Cyber Physical Systems Application on MobilityFirst Winlab Summer Internship 2015 Karthikeyan Ganesan, Wuyang Zhang, Zihong Zheng Shantanu Ghosh,
Jini Architecture Introduction System Overview An Example.
Computer supported cooperative work -Basic concepts
Author: Tatsuya Yamazaki National institute of Information and Communications Technology Presenter: Samanvoy Panati.
A Grid-enabled Multi-server Network Game Architecture Tianqi Wang, Cho-Li Wang, Francis C.M.Lau Department of Computer Science and Information Systems.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Networks & Communications Diambil dari : Module Application Training Institut Teknologi Bandung
Su-ting, Chuang 1. Outline Introduction Related work Hardware configuration Detection system Optimal parameter estimation framework Conclusion 2.
Web Services Using Visual.NET By Kevin Tse. Agenda What are Web Services and Why are they Useful ? SOAP vs CORBA Goals of the Web Service Project Proposed.
An Overview of Scientific Workflows: Domains & Applications Laboratoire Lorrain de Recherche en Informatique et ses Applications Presented by Khaled Gaaloul.
Application Level QoS in Multimedia Peer-to-Peer (P2P) Networks Alireza Goudarzi Nematiy and Makoto Takizawa¤ Tokyo Denki University
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
Tshilidzi Tshiredo. Introduction Long time ago even before technologies, social networking platforms and mobile devices, Dewey, J.( ) stated that.
Su-ting, Chuang 1. Outline Introduction Related work Hardware configuration Finger Detection system Optimal parameter estimation framework Conclusion.
Communities and Portals Lan Zhang School of Information University of Texas at Austin.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Wireless Mesh Networking or Peer to Peer Technology Andre Lukito – Johnsonsu – Wednesday, 9.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Building Distributed Educational Applications using P2P
Zueyong Zhu† and J. William Atwood‡
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Trends and developments in eGOVwork – a resesearch perspective
Presentation transcript:

1 Towards Pervasive Connectivity in Mobile Computing Frank Siegemund European Microsoft Innovation Center November 2006

2 Outline  Motivation  Related Work  System Architecture  Implementation  Application  Conclusions

3 Motivation  Most middleware assumes basic connectivity –Web Services –Jini –Corba  Problematic in mobile scenarios –Mobile P2P systems –Mobile CSCW  Heterogeneity –Bluetooth, WLAN, IrDA, GPRS –IPv4 vs. IPv6 –NATs and firewalls

4 Mobile P2P  Bootstrapping problem  Establish connectivity between mobile users  Mobile devices as first- class citizens in P2P applications  Exploit knowledge about connectivity in the group  More reliable/robust group establishment

5 Scenario  Content sharing between mobile users  Conference scenario  Skiing trip  Existing group collects connectivity parameters  Sharing by means of visual tags/glyphs  Handheld-embedded cameras for capturing tags

6 Outline  Motivation  Related Work  System Architecture  Implementation  Application  Conclusions

7 Related Work  Capturing visual tags with handheld devices and low-cost cameras –Rekimoto et al.  Visual tags in Pervasive Computing –Rohs and Zweifel –Many interesting scenarios  Visual tags to bypass Bluetooth device discovery –Scott et al.

8 Related Approaches  Out-of-band discovery for Bluetooth –IrDA –RFID  Collaborative approaches for device discovery –Siegemund and Rohs  Manual configuration  Send SMS with information about group –Complicated from user perspective

9 Outline  Motivation  Related Work  System Architecture  Implementation  Application  Conclusions

10 System Architecture

11 Collecting Connectivity Data  Overlay between group members  Exploit heterogeneity –Various communication technologies in group –Different security constraints  Construct group connectivity profile  Create tags to transmit connectivity profile  Candidate group member captures tags  Simplified user interaction

12 Group Overlay  Overlay can contain both mobile and stationary nodes  Overlay provides multicast group  Nodes in group have synchronized state  Connectivity properties of nodes shared between group members  NATs can be dealt with via different group peers  Direct connections not always possible  Group used to circumvent connectivity constraints

13 Visual Tags  Tags captured from video stream  Captured by handheld- embedded digital cameras  Direct user feedback about detected tags possible  Small video resolution requires displaying multiple tags  Concrete tag layout unimportant

14 Outline  Motivation  Related Work  System Architecture  Implementation  Application  Conclusions

15 Implemenation  Heterogeneous environment –Windows Mobile 5.0 smartphones –Window XP/Vista desktops  Implementation on desktops using Windows P2P Infrastructure  Mobile devices join/create P2P overlay –Socket interface –Lightweight database for data synchronization  Native implementation

16 Visual Tags  Tag detection in DirectShow  Analyze single video frames  Basic algorithm –Black and white conversion –Region detection –Identify guide bars –Decode tags –Determine tag index –Finish if all tags have been decoded –Join group Similar to Rekimoto et al.

17 Improvements  Determine threshhold for black/white conversion in feedback loop –Different lightning conditions  Mark tag in video frame to provide feedback to users –Tag detected or not  Synchronization –Tag contains time a single tag is displayed –Capturing device can calculate schedule for reading tags

18 Evaluation  240 x 320 video frame resolution  Implementation on 195 Mhz smartphone –State of the art (no high-end model)  400 ms per frame –Can be improved significantly !!! –Copy filter  90 ms for thresholding  250 ms for region detection  Algorithm deals with small rotations of the tag  More sophisticated tag detection systems available

19 Outline  Motivation  Related Work  System Architecture  Implementation  Application  Conclusions

20 Example Application  Mobile P2P chat application  Messaging for user groups on mobile devices  Overlay to distribute connectivity parameters  Tags to exchange connectivity profiles  Deal with NATs and connectivity constraints

21 Outline  Motivation  Related Work  System Architecture  Implementation  Application  Conclusions

22 Conclusions  Basic connectivity problematic in mobile scenarios  Current middleware solutions insufficiently address this problem  Facilitate groups to establish connectivity in mobile scenarios  Groups create finger print of network environment  NATs and security constraints can be dealt with  Visual tags user friendly way to communicate connection properties  Useful for mobile P2P and CSCW scenarios  Real-life applications

23 Contact Frank Siegemund European Microsoft Innovation Center Ritterstrasse 23, Aachen