16
1 Pervasive Computing: Vision and Challenges Myungchul Kim [email protected] Tel: 042-866-6127

1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

Embed Size (px)

DESCRIPTION

3 –Distributed systems PC and LAN From the mid-1970s through the early 1990s –Mobile computing Laptop and wireless LAN Unpredictable variation in network quality, lowered trust and robustness of mobile elements, limitations on local resources imposed by weight and size constraints, and concern for battery power consumption –Pervasive computing Effective use of smart spaces –Embedding computing infra in building infra -> smart space –The fusion of these worlds enables sensing and control of one world by the other –Ex: automatic adjustment of heating, cooling, and lighting levels in a room based on an occupant’s electronic profile Invisibility –Minimal user distraction

Citation preview

Page 1: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

1

Pervasive Computing: Vision and Challenges

Myungchul [email protected]: 042-866-6127

Page 2: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

2

• IEEE Personal Comm., August 2001.– The most profound technologies are those that

disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.

– Mark Weiser’s 1991 paper: ubiquitous computing or pervasive computing: create environments saturated with computing and communication capability and gracefully integrated with human users.

– HW: handheld and wearable computers, wireless LANs and devices to sense and control appliances

– SW: Aura (CMU), Endeavor (UC Berkeley), Oxygen (MIT), Portalano (U of W)

• Related Fields– Distributed systems -> mobile computing -> pervasive

computing

Page 3: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

3

– Distributed systems• PC and LAN• From the mid-1970s through the early 1990s

– Mobile computing• Laptop and wireless LAN• Unpredictable variation in network quality, lowered trust and

robustness of mobile elements, limitations on local resources imposed by weight and size constraints, and concern for battery power consumption

– Pervasive computing• Effective use of smart spaces

– Embedding computing infra in building infra -> smart space– The fusion of these worlds enables sensing and control of one

world by the other– Ex: automatic adjustment of heating, cooling, and lighting levels

in a room based on an occupant’s electronic profile• Invisibility

– Minimal user distraction

Page 4: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

4

• Localized scalability– Intensive interactions between a user’s personal computing space

and his/her surroundings -> severe bandwidth, energy, and distraction implications for a wireless mobile users

– Achieve scalability by severely reducing interactions between distant entities <-> “death of distance”

• Masking uneven conditioning– Huge differences in the “smartness” of different environments– Ex: a system that is capable of disconnected operation is able to

mask the absence of wireless coverage in its environment– Reduced invisibility

Page 5: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

5

Page 6: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

6

• Example scenarios– Aura observes that at the current bandwidth Jane

won’t be able to finish sending her documents before her flight departs. Consulting the airport’s network weather service and flight schedules service, Aura discovers that wireless bandwidth is excellent at nearby gates for half and hour. A dialog box pops up on Jane’s screen suggesting that she go to Gate 15, which is only three minutes away. It also asks her to prioritize her e-mail, so that the most critical messages are transmitted first. Jane accepts Aura’s advice and walks to Gate 15. She watches CNN on the TV there until Aura informs her that it is close to being done with her messages, and that she can start walking back. The last message is transmitted during her walk, and she is back at Gate 23 in time for her boarding call.

Page 7: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

7

Page 8: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

8

– Missing capabilities• Scenario 1

– Proactivity– Combining knowledge from different layers of the system– Smart space

• Scenario 2– The ability to move execution state effortlessly across diverse

platforms– Self-tuning: e.g. editing on the handheld using speech input

rather than keyboard and mouse– Proactivity– Smart spaces: location tracking and online calendar services

• The hardware and software technologies are all here today• Seamless integration of component technologies into a

system: architecture, component synthesis, and system-level engineering

Page 9: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

9

• Drilling down

Page 10: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

10

– User intent• User intent -> proactivity

Page 11: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

11

– Cyber foraging• Dynamically augment the computing resources of a wireless

mobile computer by exploiting wired hardware infra• Surrogate of mobile computers

Page 12: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

12

Page 13: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

13

– Adaptation strategy• Significant mismatch between the supply and demand of a

resource• Strategies

– A client can guide application, e.g., reducing the fidelity of an application

– A client can ask the environment to guarantee a certain level of a resource

– A client can suggest a corrective action to the user

Page 14: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

14

Page 15: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

15

– High-level energy management• Energy-aware memory management• Energy-aware adaptation of applications

– Client thickness• Thick vs thin• The min acceptable thickness of a client is determined by the

worst-case environmental conditions under which the application must run satisfactorily.

• Speech recognition in Odyssey– Context awareness

• Physical location, physiological state, emotional state, personal history, daily behavioral patterns, schedules, personal calendars, address books, contact lists, to-do lists, …

– Balancing proactivity and transparency• E.g., caching

Page 16: 1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127

16

– Privacy and trust• Location tracking, smart spaces, user of surrogate monitor

user actions, user’s movement, behavior patterns, habits, …– Impact on Layering

• Conclusion– Human-computer interaction– Software agents– Expert systems and artificial intelligence