A system architecture for pervasive computing

Pervasive computing, with its focus on users and their tasks rather than on computing devices and technology, provides an attractive vision for the future of computing. But, while hardware and networking infrastructure to realize this vision are increasingly becoming a reality, precious few applications run in this infrastructure. We believe that this lack of applications can be attributed to three characteristics that are inadequately addressed by existing systems. First, devices are heterogeneous, ranging from wearable devices to conventional computers. Second, network connectivity often is limited and intermittent. And, third, interactions typically involve several autonomous administrative domains. In this paper, we introduce a system architecture that directly addresses these challenges. Our architecture is targeted at application developers and administrators, and it supports mobile computations, persistent storage, and resource discovery within a single, comprehensive framework.

[1]  David R. Cheriton,et al.  Leases: an efficient fault-tolerant mechanism for distributed file cache consistency , 1989, SOSP '89.

[2]  Gaetano Borriello,et al.  Next century challenges: data-centric networking for invisible computing: the Portolano project at the University of Washington , 1999, MobiCom.

[3]  R. Wilder,et al.  Wide-area Internet traffic patterns and characteristics , 1997, IEEE Netw..

[4]  Marvin Theimer,et al.  Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.

[5]  Ken Arnold,et al.  JavaSpaces¿ Principles, Patterns, and Practice , 1999 .

[6]  Andrew S. Tanenbaum,et al.  Globe: a wide area distributed system , 1999, IEEE Concurr..

[7]  Ian T. Foster,et al.  Globus: a Metacomputing Infrastructure Toolkit , 1997, Int. J. High Perform. Comput. Appl..

[8]  Butler W. Lampson,et al.  SPKI Certificate Theory , 1999, RFC.

[9]  Andrew S. Grimshaw,et al.  The core Legion object model , 1996, Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing.

[10]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[11]  Mike Hibler,et al.  Microkernels meet recursive virtual machines , 1996, OSDI '96.

[12]  Dennis Shasha,et al.  The dangers of replication and a solution , 1996, SIGMOD '96.

[13]  John K. Ousterhout,et al.  The Role of Distributed State , 1991 .

[14]  Craig Partridge,et al.  Mail routing and the domain system , 1986, RFC.

[15]  Peter D. Stout Wax: A Wide Area Computation System. , 1994 .

[16]  Tobin J. Lehman,et al.  T Spaces , 1998, IBM Syst. J..

[17]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[18]  Jay Lepreau,et al.  Nested Java processes: OS structure for mobile code , 1998, ACM SIGOPS European Workshop.

[19]  Jim Waldo,et al.  The Jini Specification , 1999 .

[20]  David E. Culler,et al.  WebOS: operating system services for wide area applications , 1998, Proceedings. The Seventh International Symposium on High Performance Distributed Computing (Cat. No.98TB100244).

[21]  Vern Paxson,et al.  End-to-end routing behavior in the Internet , 1996, TNET.

[22]  V. Paxson End-to-end routing behavior in the internet , 2006, CCRV.

[23]  Frank Yellin,et al.  The Java Virtual Machine Specification , 1996 .

[24]  Emin Gün Sirer,et al.  Design and implementation of a distributed virtual machine for networked computers , 1999, SOSP.

[25]  Rich Salz,et al.  UUIDs and GUIDs , 1998 .

[26]  Peter J. Keleher,et al.  Decentralized replicated-object protocols , 1999, PODC '99.

[27]  Guy L. Steele,et al.  The Java Language Specification , 1996 .

[28]  Luca Cardelli,et al.  Mobile Ambients , 1998, FoSSaCS.

[29]  David Mazières,et al.  Separating key management from file system security , 1999, SOSP.

[30]  Farnam Jahanian,et al.  Experimental Study of Internet Stabil-ity and Wide-Area Backbone Failures , 1998 .

[31]  Per Brinch Hansen,et al.  The nucleus of a multiprogramming system , 1970, CACM.

[32]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[33]  Fred Douglis,et al.  Mobility: Processes, Computers, and Agents , 1999 .

[34]  M. Weiser The Computer for the Twenty-First Century , 1991 .