0% found this document useful (0 votes)
25 views

Lecture 9 - Mobile and Ubiquitous Computing

Uploaded by

flowerinthedawnn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Lecture 9 - Mobile and Ubiquitous Computing

Uploaded by

flowerinthedawnn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Mobile and

Ubiquitous Computing
Objectives
❖ Introduce the volatility of mobile and
ubiquitous systems
❖ Software components associate and
interoperate with one another
❖ Systems integrated with physical world
through sensing and context awareness
❖ Security and privacy issues
❖ Techniques for adapting to small devices
Main Content

❖ Concepts and definitions


❖ Association
❖ Sensing and context awareness
❖ Security and privacy
❖ Adaption
❖ A case-study: Cooltown (Tutorial)
Concepts &
Definition
Mobile & ubiquitous computing

❖ Mobile and handheld computing


▪ Carrying personal devices and retaining
connectivities to others.
▪ Personal computer vs. “fit-in-hand”
devices
▪ Problems:
• Continuous connectivity
• Communication without infrastructure
❖ Ubiquitous computing
▪ ‘Ubiquitous’ means ‘to be found
everywhere’
▪ Idea of “One person – Many computer”
Mobile & ubiquitous computing

❖ Wareable computing with specialized


functionality
▪ Operate without the user having to
manipulate them
▪ Context-aware computing
Volatile system

❖ Volatile system (Changing easily)


▪ Highly dynamic and changes
unpredictably (both Soft. And Hard.)
▪ Relevant forms of volatility include
• failures of devices and communication links;
• changes in the characteristics of
communication (bandwith for instance)
• creation and destruction of associations
❖ Smart space
▪ any physicalplace with embedded
services
▪ physical mobility vs. logical mobility
Volatile system

❖ Device model
▪ Limited energy
▪ Resource constraints
▪ Sensors and actuators
❖ Volatile connectivity
▪ Disconnection:
▪ Variable bandwidth and latency
❖ Spontaneous interoperation
❖ Lowered trust and privacy
Association
Association
❖ Volatile components need to interoperate
– preferably without user intervention
▪ Network bootstrapping:
• communication takes place over a local network
• device must first acquire an address on the local
network
▪ Association
• associate to services in the smart space
• provide services to components
Association
❖ Discovery services
▪ Clients find out about the services provided in
a smart space using a discovery service
▪ Design issues
• Low-effort, appropriate association
• Service description and query language
• Smart-space-specific discovery
• Directory implementation
• Service volatility
Association
❖ Physical association
▪ Human input to scope discovery
▪ Sensing and physically constrained channels
to scope discovery
▪ Direct association
• Address-sensing
• Physical stimulus
• Temporal or physical correlation
Sensing & context
awareness
Sensing & context awareness

❖ The context of a entity is an aspect of its


physical circumstances of relevance to system
behavior.
❖ A contextual value begins with sensors, which
are combinations of hardware and/or software
used to measure contextual values:
▪ Location, velocity and orientation sensors
▪ Ambient condition sensors
▪ Presence sensor
❖ All sensors produce values with some degree
of error
Sensing & context awareness

❖ Sensing architecture design challenges


▪ Integration of idiosyncratic sensors
▪ Abstracting from sensor data
▪ Sensor outputs may need to be combined
▪ Context is dynamic
❖Wireless sensor networks
▪ a (typically large) number of small, low-cost devices
or nodes, each with facilities for sensing, computing
and wireless communication
❖Location sensing
▪ designed to obtain data about the position of entities
Sensing & context awareness
Security & Privacy
Security & Privacy

❖ Hardware-related issues
▪ Portable devices can be more easily stolen
▪ Devices do not have sufficient computing resources asymmetric
cryptography
▪ Low energy
▪ Disconnected operation
❖ New types of resource-sharing require new security
designs. For example,
▪ Admin of smart spaces sending slides in a meeting room
▪ Employees exchange documents between mobiles and portable
devices
▪ Wireless heart-rate monitoring associated to clinic data-logging
service
➢ None is quite like the resource-sharing patterns normally
encountered within firewall-protected intranets or Internet
Security & Privacy

❖ Some solutions
▪ Secure spontaneous device association
• create a secure channel between two devices by
securely exchanging a session key between those
two devices and using it to encrypt their
communication
▪ Location-based authentication
• base access control on the location of the
services’ clients, rather than their identity
▪ Privacy protection
• Safeguard for previous solutions
Adaption
Adaption

❖ Context-aware adaptation of content


▪ Send the same content & render the content appropriately for
needs and limitations
▪ Adapt the original data programmatically into a suitable form of
rendering devices
❖ Adapting to changing system resources
▪ OS support for adaptation to volatile resources
• For applications to request and obtain resource reservations
• Notify the user of changed levels of resource availability
• For the OS to notify the application of changing resource
conditions, and for the application to adapt according to its
particular needs.
▪ Taking advantage of smart space resources
• Offloading some processing load to computer server
• Dividing up the application
Thank You !

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy