SlideShare a Scribd company logo
1
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (5)
2.2. Mobile Computing
 Mobile Computing
 The early 1990s - full-function laptops + wireless LANs
 Early mobile computing systems:
A distributed system with mobile clients
 [LL:] Current mobile computing systems:
Any nodes can be mobile
 Solutions from MOBI
 Many basic principles of DIST design continued to apply to MOBI
BUT
 Four key constraints of mobility required specialized techniques [31] for
MOBI:
 Unpredictable variation in network quality
 Lowered trust and robustness of mobile elements
 Limitations on local resources imposed by weight and size constraints
 Concern for battery power consumption
 Mobile computing - still a very active and evolving field of research
 Awaits codification in textbooks (as of 2000)
2
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (6)
Mobile Computing (2)
 Specific subarea solutions for MOBI
 Mobile networking
 Incl. mobile IP [2], ad hoc protocols [27], techniques for
improving TCP performance in wireless networks [1, 5]
 Mobile information access
 Incl. disconnected operation [17], bandwidth-adaptive file
access [21], selective control of data consistency [38, 39]
 Support for adaptive applications
 Incl. transcoding by proxies [12], adaptive resource
management [24]
 System-level energy saving techniques
 Incl. energy-aware adaptation [11], variable-speed processor
scheduling [45], energy-sensitive (=adaptive) memory
management [18].
 Location sensitivity
 Incl. location sensing [42, 43], location-aware (=adaptive) system
behavior [32, 35, 41]
3
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (7)
2.3. Pervasive Computing
 Pervasive Computing
 Recall:
Pervasive computing environment - one saturated with
computing & communication capability, yet so gracefully
integrated with users that it becomes a ‘‘technology that
disappears’’
 Since motion is an integral part of everyday life, PERV
must support mobility
 Otherwise, a user will be acutely aware of the technology by its
absence when she moves
 Hence, research in pervasive computing subsumes that
of mobile computing
BUT …
4
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (8)
Pervasive Computing (2)
…
 Research in pervasive computing goes much
further
 PERV includes four additional research thrusts
 Effective Use of Smart Spaces
 Invisibility
 Localized Scalability
 Masking Uneven Conditioning
 See Figure 1 (next slide)
5
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (9)
Pervasive Computing (3)
 Figure 1: Taxonomy of Computer Systems Research Problems in PERV
1) New problems are
encountered as one moves from
left to right in this figure.
2) Solution of many previously-
encountered problems becomes
more complex.
As the modulation symbols
suggest, this increase in
complexity is multiplicative rather
than additive
it is very much more difficult to
design and implement a pervasive
computing system than a simple
distributed system of comparable
robustness and maturity.
Note:This figure describes
logical relationships, not
temporal ones.
The evolution of research effort over
time has loosely followed this picture
BUT
There have been cases where research
effort on some aspect of pervasive
computing began relatively early. E.g.,
work on smart spaces began in the early
1990’s and proceeded relatively
independently of work in MOBI
6
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (10)
Pervasive Computing (4)
2.3.1) Effective Use of Smart Spaces
 A space:
 An enclosed area
 E.g., a meeting room or corridor
OR:
 A well-defined open area
 E.g., a courtyard or a city square
 Smart space = space with embedding computing
infrastructure
 E.g., smart space within buildings
 Created by embedding computing infrastructure within building
infrastructure
 Smart space brings together two worlds disjoint until
now [16]:
 Physical space (physical world)
 Cyberspace
7
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (11)
Pervasive Computing (5)
1) Effective Use of Smart Spaces – cont.
 The fusion of physical world (PHYS) and cyber-world
(CYB) enables sensing and control of one world by the
other
 Example of sensing and control of PHYS by CYB
 Automatic adjustment of heating, cooling and lighting levels in a
room based on an occupant’s electronic profile (incl. presence
patterns)
 Example of sensing and control of CYB by PHYS (the other
direction)
 Software on a user’s computer may behave differently
depending on where the user is currently located
 Note:
Smartness may extend to individual objects, whether
located in a smart space or not
8
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (12)
Pervasive Computing (6)
2.3.2) Invisibility
 The ideal expressed by Weiser: complete disappearance
of pervasive computing technology from a user’s
consciousness = invisible computing
 A reasonable approximation: minimal user distraction
([LTL:] = minimal visibility)
 If a PERV environment continuously meets user expectations and
rarely presents him with surprises, it allows him to interact almost
at a subconscious level [46]
BUT:
 Getting too close to the ideal might not be perfect:
A (small) degree of visibility might be needed
 ([LTL:] I hope that abobe I correctly interpret the following text:
“At the same time, a modicum of anticipation may be essential to
avoiding a large unpleasant surprise later — much as pain alerts a
person to a potentially serious future problem in a normally-
unnoticed body part.”)

More Related Content

PPT
Sec.0a--Intro to pervasive computing 1.ppt
PPT
Sec.0a--Intro to pervasive computing 4.ppt
PPT
Sec.0a--Intro to pervasive computing 9.ppt
PDF
Selected Pervasive Computing edited 01.pdf
PPT
Sec.0a--Intro to pervasive computing 3.ppt
PPT
introduction of pervasive computing .ppt
PPTX
Pervasive Computing
PPT
Sec.0a--Intro to pervasive computing 7.ppt
Sec.0a--Intro to pervasive computing 1.ppt
Sec.0a--Intro to pervasive computing 4.ppt
Sec.0a--Intro to pervasive computing 9.ppt
Selected Pervasive Computing edited 01.pdf
Sec.0a--Intro to pervasive computing 3.ppt
introduction of pervasive computing .ppt
Pervasive Computing
Sec.0a--Intro to pervasive computing 7.ppt

Similar to Sec.0a--Intro to pervasive computing 2.ppt (20)

PPT
Sec.0a--Intro to pervasive computing 8.ppt
PDF
Pervasive Computing: Vision and Challenges
PPT
Sec.0a--Intro to pervasive computing 5.ppt
PPT
Sec.0a--Intro to pervasive computing 6.ppt
PPT
pervasive-computing-09022014092937-pervasive-computing.ppt
PPTX
Pervasive computing.pptx
DOCX
Quality Metrics In Ubiquitous Computing
PDF
Pervasive Computing
PPT
pervasive computing
PPT
Pervasivecomputing 140422034057-phpapp02
PDF
Pervasive computing
PDF
PERVASIVE COMPUTING
PPTX
Pervasive Computing
PPTX
Pervasive Computing
PDF
O017328693
PDF
Pervasive Computing Applications And Its Security Issues & Challenges
PPT
Pervasive computing
PDF
Software Engineering Challenges in Pervasive Computing: A review
PPTX
Chap1 introduction to Pervasive Computing
PPTX
Pervasive computing
Sec.0a--Intro to pervasive computing 8.ppt
Pervasive Computing: Vision and Challenges
Sec.0a--Intro to pervasive computing 5.ppt
Sec.0a--Intro to pervasive computing 6.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
Pervasive computing.pptx
Quality Metrics In Ubiquitous Computing
Pervasive Computing
pervasive computing
Pervasivecomputing 140422034057-phpapp02
Pervasive computing
PERVASIVE COMPUTING
Pervasive Computing
Pervasive Computing
O017328693
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive computing
Software Engineering Challenges in Pervasive Computing: A review
Chap1 introduction to Pervasive Computing
Pervasive computing
Ad

More from ahmadfaisal744721 (13)

PDF
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
PPTX
Intoduction to Graph.pptx
PPT
Introduction to Android.ppt
PPT
Topics-Ch4Ch5.ppt
PPTX
db design and maintenance part 1.pptx
PPTX
Chapter 4v4 Network protocols and standards 2.pptx
PPTX
Chapter 4v4 Network protocols and standards 1.pptx
PPTX
Chapter 3v3 Mobile communication systems.pptx
PPTX
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
PPTX
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
PPTX
write no image.pptx
PPT
Topics-Ch4Ch5.ppt
PPT
javascript-basics.ppt
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Intoduction to Graph.pptx
Introduction to Android.ppt
Topics-Ch4Ch5.ppt
db design and maintenance part 1.pptx
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 3v3 Mobile communication systems.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
write no image.pptx
Topics-Ch4Ch5.ppt
javascript-basics.ppt
Ad

Recently uploaded (20)

PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
L1 - Introduction to python Backend.pptx
PDF
Nekopoi APK 2025 free lastest update
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Introduction to Artificial Intelligence
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
System and Network Administration Chapter 2
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
Upgrade and Innovation Strategies for SAP ERP Customers
Reimagine Home Health with the Power of Agentic AI​
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
L1 - Introduction to python Backend.pptx
Nekopoi APK 2025 free lastest update
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Odoo Companies in India – Driving Business Transformation.pdf
How Creative Agencies Leverage Project Management Software.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PTS Company Brochure 2025 (1).pdf.......
Odoo POS Development Services by CandidRoot Solutions
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Introduction to Artificial Intelligence
CHAPTER 2 - PM Management and IT Context
System and Network Administration Chapter 2
2025 Textile ERP Trends: SAP, Odoo & Oracle
Design an Analysis of Algorithms I-SECS-1021-03
VVF-Customer-Presentation2025-Ver1.9.pptx

Sec.0a--Intro to pervasive computing 2.ppt

  • 1. 1 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (5) 2.2. Mobile Computing  Mobile Computing  The early 1990s - full-function laptops + wireless LANs  Early mobile computing systems: A distributed system with mobile clients  [LL:] Current mobile computing systems: Any nodes can be mobile  Solutions from MOBI  Many basic principles of DIST design continued to apply to MOBI BUT  Four key constraints of mobility required specialized techniques [31] for MOBI:  Unpredictable variation in network quality  Lowered trust and robustness of mobile elements  Limitations on local resources imposed by weight and size constraints  Concern for battery power consumption  Mobile computing - still a very active and evolving field of research  Awaits codification in textbooks (as of 2000)
  • 2. 2 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (6) Mobile Computing (2)  Specific subarea solutions for MOBI  Mobile networking  Incl. mobile IP [2], ad hoc protocols [27], techniques for improving TCP performance in wireless networks [1, 5]  Mobile information access  Incl. disconnected operation [17], bandwidth-adaptive file access [21], selective control of data consistency [38, 39]  Support for adaptive applications  Incl. transcoding by proxies [12], adaptive resource management [24]  System-level energy saving techniques  Incl. energy-aware adaptation [11], variable-speed processor scheduling [45], energy-sensitive (=adaptive) memory management [18].  Location sensitivity  Incl. location sensing [42, 43], location-aware (=adaptive) system behavior [32, 35, 41]
  • 3. 3 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (7) 2.3. Pervasive Computing  Pervasive Computing  Recall: Pervasive computing environment - one saturated with computing & communication capability, yet so gracefully integrated with users that it becomes a ‘‘technology that disappears’’  Since motion is an integral part of everyday life, PERV must support mobility  Otherwise, a user will be acutely aware of the technology by its absence when she moves  Hence, research in pervasive computing subsumes that of mobile computing BUT …
  • 4. 4 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (8) Pervasive Computing (2) …  Research in pervasive computing goes much further  PERV includes four additional research thrusts  Effective Use of Smart Spaces  Invisibility  Localized Scalability  Masking Uneven Conditioning  See Figure 1 (next slide)
  • 5. 5 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (9) Pervasive Computing (3)  Figure 1: Taxonomy of Computer Systems Research Problems in PERV 1) New problems are encountered as one moves from left to right in this figure. 2) Solution of many previously- encountered problems becomes more complex. As the modulation symbols suggest, this increase in complexity is multiplicative rather than additive it is very much more difficult to design and implement a pervasive computing system than a simple distributed system of comparable robustness and maturity. Note:This figure describes logical relationships, not temporal ones. The evolution of research effort over time has loosely followed this picture BUT There have been cases where research effort on some aspect of pervasive computing began relatively early. E.g., work on smart spaces began in the early 1990’s and proceeded relatively independently of work in MOBI
  • 6. 6 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (10) Pervasive Computing (4) 2.3.1) Effective Use of Smart Spaces  A space:  An enclosed area  E.g., a meeting room or corridor OR:  A well-defined open area  E.g., a courtyard or a city square  Smart space = space with embedding computing infrastructure  E.g., smart space within buildings  Created by embedding computing infrastructure within building infrastructure  Smart space brings together two worlds disjoint until now [16]:  Physical space (physical world)  Cyberspace
  • 7. 7 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (11) Pervasive Computing (5) 1) Effective Use of Smart Spaces – cont.  The fusion of physical world (PHYS) and cyber-world (CYB) enables sensing and control of one world by the other  Example of sensing and control of PHYS by CYB  Automatic adjustment of heating, cooling and lighting levels in a room based on an occupant’s electronic profile (incl. presence patterns)  Example of sensing and control of CYB by PHYS (the other direction)  Software on a user’s computer may behave differently depending on where the user is currently located  Note: Smartness may extend to individual objects, whether located in a smart space or not
  • 8. 8 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (12) Pervasive Computing (6) 2.3.2) Invisibility  The ideal expressed by Weiser: complete disappearance of pervasive computing technology from a user’s consciousness = invisible computing  A reasonable approximation: minimal user distraction ([LTL:] = minimal visibility)  If a PERV environment continuously meets user expectations and rarely presents him with surprises, it allows him to interact almost at a subconscious level [46] BUT:  Getting too close to the ideal might not be perfect: A (small) degree of visibility might be needed  ([LTL:] I hope that abobe I correctly interpret the following text: “At the same time, a modicum of anticipation may be essential to avoiding a large unpleasant surprise later — much as pain alerts a person to a potentially serious future problem in a normally- unnoticed body part.”)