1 / 33

An Introduction to Ubiquitous and Pervasive Computing

An Introduction to Ubiquitous and Pervasive Computing. Lionel Brunie National Institute of Applied Sciences (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS 5205 Lyon, France http://liris.cnrs.fr/lionel.brunie. Contents of the Course. Definitions and Main Characteristics Basic Issues

jerij
Télécharger la présentation

An Introduction to Ubiquitous and Pervasive Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. An Introduction to Ubiquitous and Pervasive Computing Lionel Brunie National Institute of Applied Sciences (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS 5205 Lyon, France http://liris.cnrs.fr/lionel.brunie

  2. Contents of the Course • Definitions and Main Characteristics • Basic Issues • Overview of some Research Propositions • A Focus on Context Modeling and Context-Awareness Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  3. Definitions • Mobile • Includes mobile devices • Context-aware • Considers the execution context • Ubiquitous • Accessible from everywhere • Pervasive • Associates ubiquity, mobility and context-awareness • Ambient (intelligence) • Integrated within everyday life Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  4. From S. Frénot A Pervasive System is First, a Distributed System! • Data persistence • Data delivery/exchange • Data distribution • Replication and consistence • Interoperability • Concurrent accesses • “Legacy” systems integration • Security and privacy Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  5. A Pervasive System is also a Mobile System (and a Sensor Network) • Discovery of the environment (services, devices, software…) • Routing and delivery protocols • Fault tolerance • Auto-organization • Service integration • Security, Trust and Privacy • … Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  6. A Pervasive System is also a « User Centric » System • Invisible • « Smart » (do not interrupt me for nothing !) • User preferences aware • Context aware • Self learning • Pro-active • Secure and privacy keeping Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  7. A Pervasive System is also a Collaborative System Mobile/Ambient Social Networks • Ambient social interactions • Heterogeneity • Mobility management • Announces: • Modeling • Scalability and filtering • Semantics • Matching (publish-subscribe ?) • Context • Privacy Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  8. A Pervasive System is also a Collaborative SystemCollective Intelligence - Community • Context awareness and context sensibility • Information fusion → alarms • Sharing and confrontation of knowledge • Provisioning/composition/integration of services • Collaborative learning: histories, execution traces • Semantic emergence • Recommendation Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  9. Basic Issues • Discovery • (Auto-)Organization and routing • Security and privacy • Context-awareness and user awareness (and modeling) • Composition, execution and migration of services • Adaptation (data, services, HMI) • Data availability, delivery and access (cache, replication, persistence…) • Mediation (data, services) and information/service sharing • Traceability and history • HMI – augmented reality • Collective “intelligence”, semantic emergence, social networks • (scalability – low energy consumption – “calm”) Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  10. An Overview of Some Research Propositions Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  11. context Models Adaptation Pervasive Middleware: the PerSE MW • Context-awareness • Proactivity • Service composition Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  12. Architecture of a PerSE Base Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  13. PerSE Layers Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  14. Access Control for Mobile Users: The Chameleon • Chains of trust certificates: if A trusts B and B trusts C then A trusts C… to some level (and while considering subjectivity and access rights mapping) • Multi-layered adaptive certificates (X316 certificate + FeMoS signature) • protection of sensible information • dynamic construction of the certificate and its signature • Trust computing and reputation: cf. further course Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  15. The Chameleon: Architecture Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  16. Interface Adaptation and Context-aware Browsing Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  17. Multimedia Content Adaptation Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  18. A Special Focus onContext Modeling and Context-Awareness Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  19. Context-awareness: Challenges • Environment sensing • sensing • storage • communication Context data & its semantics • Context management • collection • organization • representation • storage • presentation Action Context models • Context-aware service • context reasoning • decision making • action trigger • collaboration Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  20. Context representation • What is context? (complementing definitions by Dey and Winogard) • Context: characteristics, relationships, properties • Context: interpretation (operational term) • Eg. Device has battery life of 3hrs: important only when we are on a trip => Context:How, Where, When, What, Who, and Which • Examples • Bob locatedIn ReadingRoomreportedBy Sensor5 (whoreported it) • Bob locatedIn ReadingRoomhasPrecision 85% (howaccurateis it) • ReadingRoom locatedIn Library (where is it) • locatedIn isTransitive => Bob locatedIn Library Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  21. Context: Issues and Approaches • Context Representation • Markup scheme based approaches • Ontology based approaches • Context Manipulation • Agent and widget based approach • Broker middleware based approach • Service oriented middleware based approach Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  22. GenericLayer Entity(& literals) isA isA isA locatedWith Hierarchicalrelation locatedWith(by symmetric axiom) engagedIn DomainLayer Relation(entity & attribute type relationships) isA isA isA isA attends Axiomaticrelation InstanceOf InstanceOf InstanceOf InstanceOf owns attends hasProfessor hasOwner(by inverse axiom) Metadatarelation hasMemory hasAccuracy The EHRAM Model: an Example Context Entity Person Activity Device Lecture Student Professor Phone Geography Bob Alice SPhone095 1024 85% Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  23. Context management • Objective: serialization of the EHRAM model for storage and processing of context data and its semantics Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  24. Context management       Can we combine the best of the two worlds? Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  25. HCOM: Hybrid modeling approach Context data Process(Database) An hybrid approach Join the results To separate Context semantics Process(Ontology) • HCoM: a Hybrid Context Management model • HCoM separates data from the EHRAM model into Context data Context semantics Rules Context database • HCoM filters out context data before integration (pruning) Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  26. HCoM System Architecture Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  27. Context Usage – Context Exchange – Context-Awareness • Objective: domain independent context-aware platform • CoCA: Collaborative Context-Aware service platform • CoCA consists of • The context data models - HCoM/EHRAM • The RAID-Action engine • The collaboration manager Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing Context-Awareness Motivations State of the Art Context Representation Context Management Discussion/Conclusion

  28. The RAID-Action engine in CoCA • Reasoning • The process of deriving new knowledge using rules, context data and its semantics. • Reasoning rules may be derived from the context semantics or can be defined based on domain policies, rules and regulations. • Aggregation and Interpretation • Integrating numerous contexts into one to raise its level of abstraction. • Decision • Decisions follow from reasoning and they are the major outcomes of the CoCA service. • Actions • Actions are results of decisions and are executed by applications. • Example Given: Students (>1) and a professor in a class room with a video projector switched on and connected to a PC running a power point application! Conclude: Lecture is going on in the room! Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing Context-Awareness Motivations State of the Art Context Representation Context Management Discussion/Conclusion

  29. Peer22 Rendezvous (Router)Peer2 Peer23 Peer12 Collaborations in CoCA – using JXTA protocols Bob’s hand held device (Bob_Smartphone) has got a context message that says Bob’s professor is now in «Coffee Room» . In order to perform reasoning and suggest some action to Bob, Bob_Smartphone needs some semantics on the concept “Coffee Room”. Now, Bob_Smartphone has the necessary information about the concept «Coffee Room» to perform reasoning and to suggest actions to its owner BoB Context Data Transfer Discovery? Response+ Peer21 Bob_ Smartphone Discovery? Discovery? Discovery? Discovery? Discovery? Rendezvous(Router) Peer1 CoCA peers • Self-organize into peer groups • Discover each other • Discover each other’s services and resources • Uses JXTA P2P protocol Peer Group2 Peer Group1 Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing Context-Awareness Motivations State of the Art Context Representation Context Management Discussion/Conclusion

  30. CoCA Architecture Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  31. Feedback on Context Modeling and Awareness • A good point: it works • It could work • It can work in a closed/well-defined environment • interoperability issues • no lingua franca • semantic gap • trust and security issues • low resources devices • scalability • large intersection with the agenda of the Internet of Things! • Handling uncertainty • Handling trust and privacy Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  32. Conclusion • Ubiquitous computing => user centricity => context-awareness • Ubiquitous computing => user centricity => content adaptation (cf. keynote) • Key issues • application adaptability/flexibility • interoperability • scalability • standardization • identity • privacy Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

  33. Open Discussion (from keynote) • The User Intention (i.e., the Why question): the Holy Graal of “calm IT”? • Sensing the environment • Embedded sensors • Internet of Things? Next-Generation Internet? • Still widely open issues, esp. wrt inter-operability • Modeling the context • The Babel Tower • Context-Awareness, Tracing, Pro-Activity, Calm • sine qua non condition to a seamless integration into the user life • Quality of Experience? • User privacy? User control? • Personalization vs privacy • Pro-Activity ? • Calm: a technological issue or a psycho-social issue? Master Course, Lyon, January 2015 - Ubiquitous and Pervasive Computing

More Related