Team 4 Pervasive Computing __________________________________ Abe El-Dewak Sheb Findik Kenneth Brancik Tom Lombardi.

Slides:



Advertisements
Similar presentations
Agents & Mobile Agents.
Advertisements

Global MP3 Geoffrey Beers Deborah Ford Mike Quinn Mark Ridao.
A Pervasive Reminder System for Smart Homes Sylvain GIROUX and Simon GUERTIN Département d’informatique, Université de Sherbrooke 2500 boul. Université,
Your Interactive Guide to the Digital World Discovering Computers 2012.
Your Interactive Guide to the Digital World Discovering Computers Fundamentals, 2012 Edition.
Introduction to the World of Computers
Your Interactive Guide to the Digital World Discovering Computers Fundamentals, 2012 Edition.
Chapter 1 Introduction to Computers p. 6.
By Adam Balla & Wachiu Siu
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
“Turn you Smart phone into Business phone “
Think. Learn. Succeed. Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments Presented by: Ashirvad Naik April 20, 2010.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
AgentOS: The Agent-based Distributed Operating System for Mobile Networks Salimol Thomas Department of Computer Science Illinois Institute of Technology,
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Client/Server Architecture
Discovering Computers Chapter 1 Discovering Computers & Microsoft Office 2010.
CHAPTER 2 Input & Output Prepared by: Mrs.sara salih 1.
What is Computer? A computer is an electronic device that stores, retrieves and processes data. A computer is an electronic device that processes data.
Finding Nearby Wireless Hotspots CSE 403 LCA Presentation Team Members: Chris Scoville Tessa MacDuff Matt Mohebbi Aiman Erbad Khalil El Haitami.
Large Enterprise with Multiple Locations Source: Avaya.
Time Matters ® A Practice Management, Client Relationship Management, and Document Management System Presented by Alana Seibert.
MOBILE CLOUD COMPUTING
Your Interactive Guide to the Digital World Discovering Computers 2012.
Lesson 6 Operating Systems and Software
Introduction to Computers. Objectives Overview Describe the five components of a computer Discuss the advantages and disadvantages that users experience.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
Lector: Aliyev H.U. Lecture №15: Telecommun ication network software design multimedia services. TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES THE DEPARTMENT.
Distributed Systems: Concepts and Design Chapter 1 Pages
Rak na ituu!!! CHAPTER 1 ALL ABOUT COMPUTER.
Chapter 34 Java Technology for Active Web Documents methods used to provide continuous Web updates to browser – Server push – Active documents.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Types of Operating Systems
Issues in (Financial) High Performance Computing John Darlington Director Imperial College Internet Centre Fast Financial Algorithms and Computing 4th.
Basic Introduction to Computers
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Of 50 E GOV Universal Access Ahmed Gomaa CIMIC Rutgers University.
Rover Technology Enabling Scalable Location Aware Computing ( Wireless ) Myoung – Seo Kim Super Computing Lab
Types of Operating Systems 1 Computer Engineering Department Distributed Systems Course Assoc. Prof. Dr. Ahmet Sayar Kocaeli University - Fall 2015.
CSIT 220 (Blum)1 Remote Procedure Calls Based on Chapter 38 in Computer Networks and Internets, Comer.
NetTech Solutions Resolving Issues with Locally Attached Devices Lesson Twelve.
Chapter 8 – Cloud Computing
Introduction TO Network Administration
30 Copyright © 2009, Oracle. All rights reserved. Using Oracle Business Intelligence Delivers.
Discovering Computers 2010
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Virtual Machine Abstractions for Nomadic Pervasive Computing (NPC) Environment Presented by: Hen-I Yang, Nov. 29, 2006.
Living in a Digital World Discovering Computers Fundamentals, 2011 Edition.
Wifi Based Menu Ordering By Samiksha Patil Shalini Yethendran Anitta Eaphen.
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
Component 8/Unit 1bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical.
1 Seminar: Pervasive Computing 2004 Automatic mobile device configuration: Status & open challenges Stefan Hoferer Supervisor: Andreas Fasbender.
Discovering Computers 2009 Chapter 1 Introduction to Computers.
Discovering Computers 2009 Chapter 1 Introduction to Computers.
 Background  Introduction  Purpose  Basic rover services  Physical architecture of Rover System  Server operation  Logical Architecture of A Rover.
Chapter 1 Introduction to Computers Lesson 1A. 1.1 What is a Computer? In the simplest terms, a computer is a machine that accepts some kind of input,
Application Sharing Bhavesh Amin Casey Miller Casey Miller Ajay Patel Ajay Patel Bhavesh Thakker Bhavesh Thakker.
What is a Computer?.
Multi-Device UI Development for Task-Continuous Cross-Channel Web Applications Enes Yigitbas, Thomas Kern, Patrick Urban, Stefan Sauer
A SEMINAR ON ROVER TECHNOLOGY
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Fundamental of Information Communication Technology (ICT)
Introduction to Cloud Computing
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Principles/Paradigms Of Pervasive Computing
WELCOME TO SEMINAR.
Presentation transcript:

Team 4 Pervasive Computing __________________________________ Abe El-Dewak Sheb Findik Kenneth Brancik Tom Lombardi

Introduction to Pervasive computing Pervasive computing is an emerging field that suggests the capability for users to perform daily computer activities on any device, at any time, and at any location Pervasive computing definition is broad to encompass a variety of technologies and applications

Introduction to Pervasive computing We see networked computers everywhere. For instance: At work we may interact daily with an Ethernet-connected desktop PC, a laptop with IEEE wireless connectivity stored in the briefcase, a Bluetooth-enabled PDA in the jacket, and a cell phone or pager with an integrated CDPD modem clipped on the belt At Home, we may find another desktop PC, a smart digital cable receiver box on top of the TV, and a 4 th –generation video game console next to the intelligent digital video recorder

Approach to utilize pervasive computing Leverage the existing variety of computing hardware that already surrounds us. We can enrich our lives by enabling applications and their session states to move seamlessly and automatically among these machines while providing service to the user regardless of location, time or platform The consolidation of user interactivity on these platforms into continuous, uninterrupted computing experience can get the public towards more sophisticated and useful mobile computing

System architecture to support this vision This architecture should provide a runtime system that allows a client application to move its state across heterogeneous client devices This capability can be implemented with known process migration or simple device “syncing” commonly used to synchronize PDA and a PC

Issues with common “syncing” approach 1. PDA or laptops may lack the hardware, software, or network bandwidth to handle data objects over the network coming from application server 2. Supporting data trans coding and dynamic user interactivity. (In many application the user is allowed to perform dynamic interactive operations which later is committed back to the application server. This scenario creates difficulties) Maintaining scalable service for large numbers of Heterogeneous clients

Application Session Handoff The answer to this challenge suggest the notion of a pervasive application that seamlessly and automatically follows a user over the network between heterogeneous client devices by utilizing a mechanism of “Application Session Handoff” This approach is suggested in a dissertation submitted by : “Thomas Phan”, the university of California. “Utilizing Application Session Handoff to support the Pervasive Computing vision in the Nascent Millennium”

Application Session Handoff (ASH) With Application Session Handoff (ASH), all interactivity appears to the user to be part of on single continuous application even when running on different machines Application is able to run by following its thread of execution and maintaining a stable set of data In the case of the pervasive application, its execution can be suspended even indefinitely as long as its session state can be saved and resumed at some point

ASH Session State Session state is a minimal set of application level data structures, files, and network connections required to encapsulate the current temporal and spatial location of the program during its execution Session state can be generated internally within the program from an application server or peer, or both Session state can follow the user from platform to platform while providing its services until it is explicitly ended by the user. At each device, the state is transcoded to fit the software, hardware, or bandwidth limitations of the platform

ASH development & architecture to support it With ASH users will be able to run their typical applications continuously across client devices which communicate with an application server acting as a data repository The clients may be some set of desktop workstations, laptops, display tablets, handheld pocket computers, or PDA. Each with its own bandwidth and computation characteristics Despite this degree of client heterogeneity, users will be able to seamlessly move an application’s sessions from one machine to another machine running some version of the same application

ASH development & architecture to support it This session transfer will use the network as a conduit allowing sessions to be suspended and restored from any network connected location A middleware proxy servers are placed between the clients and the application server to shield the user from any complexities and provides near instantaneous and uninterrupted computing convergence between platforms As an example: consider how client outfitted with the properties of ASH. If the user wants to move between different client devices, instead of having to Resynchronize information between devices the handoff capability of ASH seamlessly and automatically manages the transfer of information from one client to another via the proxy When user moves to another device, the program starts up in a similar, if not exact state as he had left it on the previous machine

ASH development & architecture to support it By moving from machine to machine along with the user, the pervasive application provides an assistive and comforting level of familiarity for the user in the face of extreme platform heterogeneity. The outcome is that a person can concentrate on work while moving between platforms because the user becomes accustomed to data availability rather than aware of its conspicuous absence among different machines

Other related work to ASH Other research work looked into mechanisms to move an application’s state across devices as: Process migration [Milojicic] File hoarding [Alonso] Network layer indirection [Perkins] Mobile agents [Rothermel] Handoff-like method [Bharat], [Richardson], [Banavar]

Pervasive application enabled with ASH moves its session state from one device to another. Session can be suspended when the session is not active and resumed when the user wishes to utilize it again

Application Session Handoff ASH The session appears to the user as one single continuous application even when running on different machines The application DO NOT move between devices ( that will require binary executable compatibility and homogeneous platforms) Instead, the session state in the form of encapsulated data is moved Each client may be running a different version of executable program so long as each properly suspend and/or resume the session state

illustrate ASH functionality A user working on a word processing document on a desktop PC in his office decides to go home. The use click a button the application encapsulates and suspends its session Transfers the session state to a local middleware proxy on the network The user reached home and decides to resume his work on a laptop connected to a dial-up modem User starts his word processing which in turn find a proxy to download the state and then reinstate the session to the same point the user had left it Unlike file transfer, the handoff capability allows programmers and service providers the flexibility to define a session state that contains all the necessary runtime data of the program in order to cleanly suspend, transfer, and resume the session