SlideShare a Scribd company logo
1
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (13)
Pervasive Computing (7)
2.3.3) Localized Scalability
 Basic model of pervasive computing interactions:
 User’s personal computing space (UPCS)
 User’s surroundings (US)
 Interactions between UPCS & US
 Scalability problems in pervasive computing
 The smarter is the space, the larger is interaction intensity
 This has severe bandwidth, energy and distraction implications for
a wireless mobile user.
 The more users in the smart space the more interactions
2
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (14)
Pervasive Computing (8)
3) Localized Scalability – cont.
 Scalability research
 Previous work typically ignored physical distance
 A web server or file server should ignore distance
 Handle as many clients as possible, regardless of whether they
are located next door or overseas
 Scalability in PERV must consider physical distance
 Interaction density has to fall off with distance
 Otherwise both the user and his computing system will be
overwhelmed by distant interactions that are of little relevance
 A mobile user far from home will still generate some distant
interactions with sites relevant to him
 But the preponderance of his interactions will be local
3
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (15)
Pervasive Computing (9)
3) Localized Scalability – cont.
 Good PERV design: scalability achieved by
severely reducing distant interactions
 Like the inverse square laws of nature
 .g., the inverse square law for gravitation)
 This directly contradicts the current ‘‘death of
distance’’ ethos of the Internet
4
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (16)
Pervasive Computing (10)
2.3.4) Masking Uneven Conditioning
 ‘‘Smartness’’ of different spaces varies significantly
(“The rate of penetration of pervasive computing technology into the infrastructure will vary
considerably […]”)
 Well-equipped conference room, office, or classroom smarter
than other locations
 Space smartness depends on:
 Technical factors
 How well the space is saturated with smart devices
 Non-technical factors
 Organizational structure, economics and business models, …
 Uniform ‘‘smartness’’ of spaces is years or decades away
(if ever achieved)
5
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (17)
Pervasive Computing (11)
4) Masking Uneven Conditioning – cont.
 Differences in ‘‘smartness’’ can be distracting
 Can detract from the goal of invisible pervasive computing
 One idea: Reduce the amount of variation in smartness
seen by a user
 Example implementation of the idea:
User’s personal computing space (UPCS) compensates
for ‘‘dumbness’’ of its environments
 E.g., a laptop masks the absence of wireless coverage
 The laptop notices me leaving the CEAS building and downloads
my mail as I leave the area covered by CEAS hot spots
 I can read my new mail at a restaurant without a hot spot
 Complete compensation (achieving complete invisibility) may be
impossible
 But reduced variability of space smartness within reach
Sec.0a--Intro to pervasive computing 3.ppt
7
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (18)
3. Example Scenarios
 What would it be like to live in a world with
pervasive computing?
 Two hypothetical ‘‘look and feel’’ scenarios follow
 Deliberately chosen simple scenarios that appear
feasible soon (in just a few years)
 Examples use [CMU’s] Aura (http://www.cs.cmu.edu/~aura/)
as the pervasive computing system
 But the illustrated concepts are of broad relevance
8
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (19)
Example Scenarios (2)
3.1) Scenario 1
 Jane is at Gate 23 in the Pittsburgh airport, waiting for her flight.
 She has edited many large documents, and would like to use her
wireless connection to e-mail them. Unfortunately, bandwidth is
miserable since many passengers at Gate 23 and nearby gates are
surfing the web.
 Aura observes that at the current bandwidth Jane won’t be able to
finish sending her documents before her flight departs.
 Consulting the airport network’s flight schedule service, Aura
discovers that wireless bandwidth is excellent at Gate 15, and that
there are no departing or arriving flights at nearby gates for 30 min.
 Aura displays a dialog box on Jane’s screen suggesting that she
goes to Gate 15, which is only three minutes away. It also asks her
to prioritize her e-mail, so that the most critical messages are
transmitted first.
 Jane accepts Aura’s advice and walks to Gate 15. She watches CNN
on the TV there until Aura informs her that it is close to being done
with her messages, and that she can start walking back.
 Jane starts walking back to Gate 23.
 The last message is transmitted during her walk, and she is back at
Gate 23 in time for her boarding call.

More Related Content

PPT
Sec.0a--Intro to pervasive computing 4.ppt
PPT
Sec.0a--Intro to pervasive computing 2.ppt
PDF
Pervasive Computing: Vision and Challenges
PPT
Sec.0a--Intro to pervasive computing 5.ppt
PPT
Sec.0a--Intro to pervasive computing 7.ppt
PPT
Sec.0a--Intro to pervasive computing 1.ppt
PPT
Sec.0a--Intro to pervasive computing 9.ppt
PDF
Towards Pervasive Computing Environments With Cloud Services
Sec.0a--Intro to pervasive computing 4.ppt
Sec.0a--Intro to pervasive computing 2.ppt
Pervasive Computing: Vision and Challenges
Sec.0a--Intro to pervasive computing 5.ppt
Sec.0a--Intro to pervasive computing 7.ppt
Sec.0a--Intro to pervasive computing 1.ppt
Sec.0a--Intro to pervasive computing 9.ppt
Towards Pervasive Computing Environments With Cloud Services

Similar to Sec.0a--Intro to pervasive computing 3.ppt (20)

PPT
Sec.0a--Intro to pervasive computing 8.ppt
PDF
Selected Pervasive Computing edited 01.pdf
PPTX
UBIQUITOUS COMPUTING
PPTX
Pervasive Computing
DOCX
Quality Metrics In Ubiquitous Computing
PDF
PERVASIVE COMPUTING
PDF
Chapter Two.pdf
PPT
introduction of pervasive computing .ppt
PDF
Review Of Energy Harvesting Technologies For Sustainable Wsn
PDF
A Survey: DDOS Attack on Internet of Things
PDF
Efficient mobilenet architecture_as_image_recognit
DOCX
Distributed computing
DOCX
Chapter 2Network ArchitectureTo engineer and build a s
PDF
Introducing Computer Networks and Loval Area Networks
DOCX
Wed22april
PPTX
Ubiquitous computing
DOCX
Computer network solution
PDF
Data Communication Networking Issues in Real World
PDF
Internet of Things for Underground Drainage and Manhole monitoring System for...
PPTX
Pervasive Computing
Sec.0a--Intro to pervasive computing 8.ppt
Selected Pervasive Computing edited 01.pdf
UBIQUITOUS COMPUTING
Pervasive Computing
Quality Metrics In Ubiquitous Computing
PERVASIVE COMPUTING
Chapter Two.pdf
introduction of pervasive computing .ppt
Review Of Energy Harvesting Technologies For Sustainable Wsn
A Survey: DDOS Attack on Internet of Things
Efficient mobilenet architecture_as_image_recognit
Distributed computing
Chapter 2Network ArchitectureTo engineer and build a s
Introducing Computer Networks and Loval Area Networks
Wed22april
Ubiquitous computing
Computer network solution
Data Communication Networking Issues in Real World
Internet of Things for Underground Drainage and Manhole monitoring System for...
Pervasive Computing

More from ahmadfaisal744721 (14)

PDF
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
PPTX
Intoduction to Graph.pptx
PPT
Introduction to Android.ppt
PPT
Topics-Ch4Ch5.ppt
PPTX
db design and maintenance part 1.pptx
PPTX
Chapter 4v4 Network protocols and standards 2.pptx
PPTX
Chapter 4v4 Network protocols and standards 1.pptx
PPTX
Chapter 3v3 Mobile communication systems.pptx
PPTX
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
PPTX
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
PPT
Sec.0a--Intro to pervasive computing 6.ppt
PPTX
write no image.pptx
PPT
Topics-Ch4Ch5.ppt
PPT
javascript-basics.ppt
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Intoduction to Graph.pptx
Introduction to Android.ppt
Topics-Ch4Ch5.ppt
db design and maintenance part 1.pptx
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 3v3 Mobile communication systems.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Sec.0a--Intro to pervasive computing 6.ppt
write no image.pptx
Topics-Ch4Ch5.ppt
javascript-basics.ppt

Recently uploaded (20)

PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
Introduction to Artificial Intelligence
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Transform Your Business with a Software ERP System
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
assetexplorer- product-overview - presentation
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
medical staffing services at VALiNTRY
Odoo Companies in India – Driving Business Transformation.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Introduction to Artificial Intelligence
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Operating system designcfffgfgggggggvggggggggg
L1 - Introduction to python Backend.pptx
Transform Your Business with a Software ERP System
Computer Software and OS of computer science of grade 11.pptx
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PTS Company Brochure 2025 (1).pdf.......
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Reimagine Home Health with the Power of Agentic AI​
2025 Textile ERP Trends: SAP, Odoo & Oracle
CHAPTER 2 - PM Management and IT Context
assetexplorer- product-overview - presentation
Upgrade and Innovation Strategies for SAP ERP Customers
wealthsignaloriginal-com-DS-text-... (1).pdf
How to Migrate SBCGlobal Email to Yahoo Easily
medical staffing services at VALiNTRY

Sec.0a--Intro to pervasive computing 3.ppt

  • 1. 1 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (13) Pervasive Computing (7) 2.3.3) Localized Scalability  Basic model of pervasive computing interactions:  User’s personal computing space (UPCS)  User’s surroundings (US)  Interactions between UPCS & US  Scalability problems in pervasive computing  The smarter is the space, the larger is interaction intensity  This has severe bandwidth, energy and distraction implications for a wireless mobile user.  The more users in the smart space the more interactions
  • 2. 2 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (14) Pervasive Computing (8) 3) Localized Scalability – cont.  Scalability research  Previous work typically ignored physical distance  A web server or file server should ignore distance  Handle as many clients as possible, regardless of whether they are located next door or overseas  Scalability in PERV must consider physical distance  Interaction density has to fall off with distance  Otherwise both the user and his computing system will be overwhelmed by distant interactions that are of little relevance  A mobile user far from home will still generate some distant interactions with sites relevant to him  But the preponderance of his interactions will be local
  • 3. 3 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (15) Pervasive Computing (9) 3) Localized Scalability – cont.  Good PERV design: scalability achieved by severely reducing distant interactions  Like the inverse square laws of nature  .g., the inverse square law for gravitation)  This directly contradicts the current ‘‘death of distance’’ ethos of the Internet
  • 4. 4 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (16) Pervasive Computing (10) 2.3.4) Masking Uneven Conditioning  ‘‘Smartness’’ of different spaces varies significantly (“The rate of penetration of pervasive computing technology into the infrastructure will vary considerably […]”)  Well-equipped conference room, office, or classroom smarter than other locations  Space smartness depends on:  Technical factors  How well the space is saturated with smart devices  Non-technical factors  Organizational structure, economics and business models, …  Uniform ‘‘smartness’’ of spaces is years or decades away (if ever achieved)
  • 5. 5 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (17) Pervasive Computing (11) 4) Masking Uneven Conditioning – cont.  Differences in ‘‘smartness’’ can be distracting  Can detract from the goal of invisible pervasive computing  One idea: Reduce the amount of variation in smartness seen by a user  Example implementation of the idea: User’s personal computing space (UPCS) compensates for ‘‘dumbness’’ of its environments  E.g., a laptop masks the absence of wireless coverage  The laptop notices me leaving the CEAS building and downloads my mail as I leave the area covered by CEAS hot spots  I can read my new mail at a restaurant without a hot spot  Complete compensation (achieving complete invisibility) may be impossible  But reduced variability of space smartness within reach
  • 7. 7 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (18) 3. Example Scenarios  What would it be like to live in a world with pervasive computing?  Two hypothetical ‘‘look and feel’’ scenarios follow  Deliberately chosen simple scenarios that appear feasible soon (in just a few years)  Examples use [CMU’s] Aura (http://www.cs.cmu.edu/~aura/) as the pervasive computing system  But the illustrated concepts are of broad relevance
  • 8. 8 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (19) Example Scenarios (2) 3.1) Scenario 1  Jane is at Gate 23 in the Pittsburgh airport, waiting for her flight.  She has edited many large documents, and would like to use her wireless connection to e-mail them. Unfortunately, bandwidth is miserable since many passengers at Gate 23 and nearby gates are surfing the web.  Aura observes that at the current bandwidth Jane won’t be able to finish sending her documents before her flight departs.  Consulting the airport network’s flight schedule service, Aura discovers that wireless bandwidth is excellent at Gate 15, and that there are no departing or arriving flights at nearby gates for 30 min.  Aura displays a dialog box on Jane’s screen suggesting that she goes to Gate 15, which is only three minutes away. It also asks her to prioritize her e-mail, so that the most critical messages are transmitted first.  Jane accepts Aura’s advice and walks to Gate 15. She watches CNN on the TV there until Aura informs her that it is close to being done with her messages, and that she can start walking back.  Jane starts walking back to Gate 23.  The last message is transmitted during her walk, and she is back at Gate 23 in time for her boarding call.