Slides For Chapter 19: Mobile and Ubiquitous Computing: Distributed Systems: Concepts and Design
Slides For Chapter 19: Mobile and Ubiquitous Computing: Distributed Systems: Concepts and Design
Users ID
3. Display responds Hello Roy 1. User enters room wearing
to user active badge
Infrared
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012
Figure 19.2
Examples of pre-configured versus spontaneous association
Pre-configured Spontaneous
Human-driven:
Service-driven: web browser and web servers
email client and server
Data-driven:
P2P file-sharing applications
Physically-driven:
mobile and ubiquitous systems
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012
Figure 19.3
The interface to a discovery service
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012
Figure 19.4
Service discovery in Jini
admin
Lookup Client
service
4. Use printing Network 2. Here I am: .....
service admin, finance
3. Request Lookup
Corporate Printing printing service
infoservice service
finance
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012
Figure 19.5
The IdentityPresence widget class of the Context Toolkit
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012
Figure 19.6
A PersonFinder widget constructed using IdentityPresence widgets
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012
Figure 19.7
Directed diffusion
sink
sink sink
source
source source
source
source source
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012
Figure 19.8 Some location-sensing technologies
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012
Figure 19.10
Secure device association using physical contact
W
K
1. Fresh secret key K exchanged by physical contact 2. Devices communicate using secure channel
constructed over W using K
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012
Figure 19.11
Detecting a man-in-the-middle
hash=0x6F9E...
K2
2. User(s) compare hashes of keys displayed on
1. Keys exchanged by devices by sight or with an integrated imaging
Man-in-the-middle device. Since they differ, they conclude that
Diffie-Hellman
protocol there is a man-in-the-middle or that accidental
K1 mis-association has occurred
hash=0xD57C...
Device displaying hash of key
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012
Figure 19.12
Cooltown layers
Web presences
Physical hyperlinks
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012
Figure 19.13
Capturing and printing the web presence of a painting
painting
beacon
PDA or phone
<link title=Chop Suey href= http..> <link title=Chop Suey href= http..>
Instructors Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5
Pearson Education 2012