pervasive and mobile computing - csit.uob.edu.pk

8
P&MC Dr. Atiq Ahmed Pervasive Computing Pervasive Computing Wireless and Mobile Computing Introduction WiNet Types 1/34 Pervasive and Mobile Computing Dr. Atiq Ahmed [email protected] Department of Computer Science & Information Technology University of Balochistan Lecture 04 P&MC Dr. Atiq Ahmed Pervasive Computing Pervasive Computing Wireless and Mobile Computing Introduction WiNet Types 2/34 Outline 1 Pervasive Computing Pervasive Computing 2 Wireless and Mobile Computing Introduction WiNet Types P&MC Dr. Atiq Ahmed Pervasive Computing Pervasive Computing Wireless and Mobile Computing Introduction WiNet Types 3/34 Related Fields Mobile Computing Solutions from MOBI Many basic principles of DIST design continued to apply to MOBI BUT Four key constraints of mobility required specialized techniques for MOBI Unpredictable variation in network quality Lowered trust and robustness of mobile elements Limitations on local resources imposed by weight and size constraints Concern for battery power consumption Mobile computing - still a very active and evolving field of research P&MC Dr. Atiq Ahmed Pervasive Computing Pervasive Computing Wireless and Mobile Computing Introduction WiNet Types 4/34 Related Fields Specific subarea solutions for MOBI Mobile Networking Incl. mobile IP, ad hoc protocols, techniques for improving TCP performance in wireless networks Mobile Information Access Incl. disconnected operation, bandwidth-adaptive file access, selective control of data consistency Support for Adaptive Applications Incl. transcoding by proxies, adaptive resource management System-level Energy Saving Techniques Incl. energy-aware adaptation, variable-speed processor scheduling, energy-sensitive (=adaptive) memory management Location Sensitivity Incl. location sensing, location-aware (=adaptive) system behavior

Upload: others

Post on 24-Jan-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Pervasive and Mobile Computing - csit.uob.edu.pk

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

1/34

Pervasive and Mobile Computing

Dr. Atiq [email protected]

Department of Computer Science & Information TechnologyUniversity of Balochistan

Lecture 04

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

2/34

Outline

1 Pervasive ComputingPervasive Computing

2 Wireless and Mobile ComputingIntroductionWiNet Types

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

3/34

Related FieldsMobile Computing

Solutions from MOBIMany basic principles of DIST design continued to apply toMOBI

BUT

Four key constraints of mobility required specializedtechniques for MOBI

Unpredictable variation in network qualityLowered trust and robustness of mobile elementsLimitations on local resources imposed by weight and sizeconstraintsConcern for battery power consumption

Mobile computing - still a very active and evolving field ofresearch

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

4/34

Related FieldsSpecific subarea solutions for MOBI

Mobile NetworkingIncl. mobile IP, ad hoc protocols, techniques for improving TCPperformance in wireless networks

Mobile Information AccessIncl. disconnected operation, bandwidth-adaptive file access,selective control of data consistency

Support for Adaptive ApplicationsIncl. transcoding by proxies, adaptive resource management

System-level Energy Saving TechniquesIncl. energy-aware adaptation, variable-speed processorscheduling, energy-sensitive (=adaptive) memorymanagement

Location SensitivityIncl. location sensing, location-aware (=adaptive) systembehavior

Page 2: Pervasive and Mobile Computing - csit.uob.edu.pk

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

5/34

Related FieldsMobile Computing Issues

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

7/34

Pervasive Computing

RECALL

PERV environment - one saturated with computing &communication capability, yet so gracefully integrated withusers that it becomes a “ technology that disappears”

Since motion is an integral part of everyday life, PERV mustsupport mobility

Otherwise, a user will be acutely aware of the technology by itsabsence when he/she moves

Hence, research in pervasive computing subsumes that ofMOBI

BUTResearch in PERV goes much further

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

8/34

Pervasive Computing

PERV includes four additional research thrusts

Effective Use of Smart SpacesInvisibilityLocalized ScalabilityMasking Uneven Conditioning

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

9/34

Pervasive ComputingPervasive Computing Issues

Page 3: Pervasive and Mobile Computing - csit.uob.edu.pk

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

10/34

Pervasive ComputingPervasive Computing Research Lines

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

11/34

Pervasive ComputingEffective Use of Smart Spaces

A space

An enclosed area E.g., a meeting room or corridor

OR

A well-defined open area E.g., a courtyard or a city square

Smart space = space with embedded computinginfrastructure

E.g., smart space within buildings created by embeddingcomputing infrastructure within building infrastructure

Smart space brings together two worlds disjoint until now

Physical space (physical world)Cyberspace

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

12/34

Pervasive ComputingEffective Use of Smart Spaces

The fusion of physical world (PHYS) and cyber-world (CYB)enables sensing and control of one world by the other

Example of sensing and control of PHYS by CYB Automaticadjustment of heating, cooling and lighting levels in a roombased on an occupant’s electronic profile (incl. presencepatterns)Example of sensing and control of CYB by PHYS Softwareon a user’s computer may behave differently depending onwhere the user is currently located

Note

Smartness may extend to individual objects, whether located in asmart space or not

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

13/34

Pervasive ComputingInvisibility

Complete disappearance of pervasive computing technologyfrom a user’s consciousness = invisible computing [Weiser]

A reasonable approximation: minimal user distraction

BUT

Getting too close to the ideal might not be perfect: A (small)degree of visibility might be needed

Page 4: Pervasive and Mobile Computing - csit.uob.edu.pk

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

14/34

Pervasive ComputingLocalized Scalability

Basic model of pervasive computing interactions

User’s personal computing space (UPCS)User’s surroundings (US)Interactions between UPCS & US

Scalability problems in pervasive computingThe smarter is the space, the larger is interaction intensity

This has severe bandwidth, energy and distraction implicationsfor a wireless mobile user

The more users in the smart space the more interactions

Previous work typically ignored physical distance but PERVmust consider that

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

15/34

Pervasive ComputingMasking Uneven Conditioning

“Smartness” of different spaces varies significantly

Well-equipped conference room, office, or classroom smarterthan other locationsSpace smartness depends on

Technical factors: How well the space is saturated with smartdevicesNon-technical factors: Organizational structure, economics andbusiness models, . . .

Uniform “smartness” of spaces is years or decades away (ifever achieved)

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

17/34

Few words about history . . .

1896: Guglielmo MarconiFirst demonstration of wireless telegraphyBased on long wave, requiring very large transmitters

1907: Commercial Trans-Atlantic Wireless ServiceHuge ground stations: 30 x 100m antenna masts

1920: Discovery of short waves by MarconiCheaper, smaller, better quality transmitters by vacuum tube

1982: Start of GSM in Europe (1G analog)

1983: Start of AMPS in America (1G analog)

1992: Start of GSM (2G digital)

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

18/34

Few words about history . . .

1997: Wireless LAN - IEEE802.11

1998: Iridium satellite system66 satellites

1999: Standardization of additional WLANsIEEE standard 802.11bBluetoothWAP (Wireless Application Protocol): access to many servicesvia the mobile phone

2000: GSM with higher data rates (2.5G digital)HSCSD offers up to 57.6kbit/sFirst GPRS trials with up to 50 kbit/s

2001: Start of 3G systemsIMT - 2000, several members of a family, CDMA2000 in Korea,UMTS tests in Europe

Page 5: Pervasive and Mobile Computing - csit.uob.edu.pk

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

19/34

Fantastic Breakthrough Technology

Wireless communication networks

multiple networks “covering” the globeworld-wide deregulation and spectrum auctionsstandard communication systems and air link interfaces

Portable information appliances

laptops, notebooks, sub-notebooks, and MNCshand-held computersPDAs and Smartphones

Internet

TCP/IP & de-facto application protocolsubiquitous web content

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

20/34

New Forms of Computing

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

21/34

Mobile Computing

Using:

small size portable computers, hand-helds, MNC, and othersmall wearable devices,

To run stand-alone applications (or access remoteapplications) via:

wireless networks: IR, BlueTooth, WiLANs, Cellular, W-PacketData networks, SAT. etc.

By:

nomadic and mobile users (animals, agents, trains, cars, cellphones,. . . .)

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

22/34

Nomadic, Mobile & Ubiquitous

Page 6: Pervasive and Mobile Computing - csit.uob.edu.pk

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

23/34

Mark Weiser’s views

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

24/34

Impressive Wireless Infrastructure!

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

25/34

Wireless Network Convergence2G/3G Mobility-Bandwidth Trade-off

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

26/34

Wireless Network Overlay

Page 7: Pervasive and Mobile Computing - csit.uob.edu.pk

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

28/34

Wireless LAN

IEEE 802.11 standard: a family of specifications for WLANtechnology accepted in 1997

802.11 specifies an over-the-air interface between a Wi-clientand a base station or between two Wi-clients

802.11: up to 2 Mbps in the 2.4 GHz band802.11b: up to 11 Mbps in the 2.4 GHz band802.11a/g: up to 54 Mbps in the 5/2.4 GHz band802.11n: up to 220+ Mbps in the 2.4/5 GHz band (twoproposals not approved yet). Vendors already selling802.11pre-n devices

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

29/34

Wireless LANWiLAN Security

WEP: Wired Equivalent Privacy

A basic wireless LAN security mechanism which is easy to setup & commonly usedDon’t rely on WEP for Wi-security due to number of flaws in itMany wireless home networks don’t even use WEP, whichmakes bad situation worseMAC address based access control mechanism doesn’t work

Use other security mechanisms such as

VPN (Virtual Private Network)PEAP (Protected Extensible Authentication Protocol)TTLS (Tunneled Transport Layer Security)

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

30/34

Wireless Ad Hoc Networks

Wireless Ad Hoc Network (peer to peer)

A collection of autonomous nodes that communicate with eachother by forming a multi-hop radio network in a decentralizedmannerNo infrastructure, no default router available“every” node needs to be a router

Mobile Ad Hoc Networks (MANET)

Host movement frequentTopology change frequent

Wireless Ad Hoc Sensor Networks

A number of sensors spread across a geographical areaLimited resources on sensors

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

31/34

Bluetooth

Used to connect and exchange information between deviceslike PDAs, mobile phones, laptops, PCs, printers & digitalcameras

Named after a Denmark king Harold Bluetooth, who is knownfor his unification of previously warring tribes

Low-cost, short range (up to 10m), low power consumption,license-free 2.45 GHz band

Using the same frequency range, Bluetooth differs from Wi-Fiin that

Different multiplexing schemesWi-Fi with higher throughput, greater distances, moreexpensive hardware, and higher power consumption

Page 8: Pervasive and Mobile Computing - csit.uob.edu.pk

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

32/34

Bluetooth

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

33/34

RFID

Method of remotely storing and retrieving data using devicescalled RFID tags

Tag is a small object that can be attached to or incorporatedinto a productTags contain antennas to receive and respond to RF queriesfrom an RFID transceiverNo line-of sightWithstand difficult environmental conditions (cold, frost etc.)

Categories

Active TagsSemi-passivePassive

Applications

SCM, Automated toll collection, . . .

P & M C

Dr. Atiq Ahmed

PervasiveComputingPervasive Computing

Wireless andMobileComputingIntroduction

WiNet Types

34/34

RFID