SlideShare ist ein Scribd-Unternehmen logo
1 von 217
Ubiquitous / Cloud
Computing
1/30
2/30
3/30
4/30
10
1-Ubiquitous
Uubiquitous computing Calm technology Things that think Everywhere Pervasive
iinternet, Ambient intelligence ,Proactive computing , Augmented reality,
Physical Computing, Ubi comp ,U comp
13/30
Level of Embeddedness
Low
Low
High
High
Pervasive
Computing
Mobile
Computing
Traditional
Business
Computing
Ubiquitous
Computing
Level of Mobility
14
“Ubiquitous Computing is a technology that resides in the
human world and weaves itself into the fabric of everyday
life”
Mark Weiser
15
Pervasive Computing Era
16
Ubiquitous Services
 Care about service, not application
 Want to receive a message using whatever device is handy
nearby
 Message is tailored to work according to device
Issues
 What is software infrastructure for integration?
 Do we get it by just adopting some standard?
Context-Aware Computing
 computers will be able to understand enough of a user’s current
situation to offer services, resources, or information relevant to the
particular context
 Walk into conference room, my email is projected on a big screen
there
 E.g : device will automatically switch itself to “vibrate” instead of
“ring” when it is in the cinema
For example:
Automated call forwarding (context awareness – should where the
person is)
lighting control  smart sensor wall - control heating and lighting.
Issues : Context Awareness
 Current location
Need location detection e.g. GPS or base station Indoors – radio beacon, IR.
 User activity
Walking, driving a car, running for a bus – how to detect this?
 Ambient environment
In theatre, alone, in meeting
 Local resources or services available
Device capabilities
 Screen, input, processing power, battery life ….
 Current QoS availability – particularly for radio links
Intelligent Environment
 An intelligent environment is a location (e.g. home, office, hospital,
etc) that is equipped with sensors, actuators and computers that are
networked with each other and the internet.
 The components are controlled by "intelligent agent" software that
knows the preferences of the occupants.
 It tailors the environment to suit them.
 The occupants can talk to the environment using speech and natural
language and the sensors can monitor the environment.
Business Services
 Ubiquitous Computing will lead to Ubiquitous Commerce (right
message, to the right person, at the right time!)
 Work can occur anytime, anywhere becomes all-the-time, everywhere.
 Ubiquitous will enable people to focus on their tasks and on
interacting with other people.
 Impact on Business Strategy – awareness, accessibility,
responsiveness
 Point of Presence! Context!
 Change in nature of service providers (bursty, point-of-presence value,
service level commitments)
 New services (businesses) will arise…
With Out IOE/With IOE
23
24/30
Demographics
• 314 million visually impaired people in the world today
• 45 million blind
• More than 82% of the visually impaired population is age 50 or older
• The old population forms a group with diverse range of abilities
• The disabled are seldom seen using the street alone or public
transportation
Mobility Requirements
• Being able to avoid obstacles
• Walking in the right direction
• Safely crossing the road
• Knowing when you have reached a destination
• Knowing which is the right bus/train
• Knowing when to get off the bus/train
All require SIGHT as primary sense
Putting all together…
Gill, J. Assistive Devices for People with Visual Impairments.
In A. Helal, M. Mokhtari and B. Abdulrazak, ed., The Engineering Handbook of Smart Technology for Aging, Disability and Independence.
John Wiley & Sons, Hoboken, New Jersey, 2008.
Proposed System Architecture
Wearable Computing
• Wearable computers are an attractive way to deliver a ubiquitous
computing system’s interface to a user, especially in non-office-
building environment.
30/30
31/30
32/30
33/30
34/30
35/30
36/30
37/30
38/30
39/30
40/30
41/30
Wearable Computing & Ubiquitous
Computing
Properties and Problems with Ubiquitous Computing
Privacy issues
Difficulty with personalized information:
I am Tom !
Oh, it’s Tom
Let me check
my databse
Oh, it’s Tom
Let me check
my databse
Tom:
Age: 25
Favorite Song:
My heart will go on
Tom:
Age: 25
Email:
Tt@yahoo.com
OK, let me check
his email
OK, I will play
this song
Hi all, I am Mike,
your new Boss
My god, a new man!
I have to update
my database!
Me Too!
It’s really
troublesome!
Wearable Computing & Ubiquitous Computing
Properties and Problem with Wearable Computing
I am Tom !
Tom:
Age: 25
Favorite Song:
My heart will go on
Email: Tt@yahoo.com
OK, let me check
his email
OK, I will play
this song
Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing
 1. Localized information:
 2. Localized control
I am Tom !
Device Table:
--------------------
1.Computer
2.Recorder
3.Printer
A New device!
It should be
added to my DB.
Where is the
printer’s driver?
should I
install it?
Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing
 Resource management:
Oh my,
What should I do?
I am Tom !
Hi all, I am Mike
Tom:
Age: 25
Favorite Song:
My heart will go on
Email: Tt@yahoo.com
Mike:
Age: 30
Favorite Song:
Salvage Garden
Email: Mm@yahoo.com
A SIMPLE EXAMLPE:
TIC TAC TOE
Ubiquitous/Pervasive Computing
Calm technology: embedded, invisible,
seamlessly, unobtrusive, intelligent.
48/30
Image source:
Friedemann
Mattern
(ETH Zürich)
What is Ubiquitous Computing ?
• Ubiquitous computing is the method of enhancing computer
use by making many computers available throughout the
physical environment, but making them effectively invisible
to the user
– Mark Weiser
• Ubiquitous computing, or calm technology, is a paradigm
shift where technology becomes virtually invisible in our
lives.
- Marcia Riley
Definitions:
50
The communications growth rate is
also amazing
51
Three Waves of Computing
● Mainframe computing (60’s-70’s)
– Massive computers to execute big data processing
applications
– very few computers in the world
● Desktop computing (80’s-90’s)
– one computer at every desk to help in business related
activities
– Computers connected in intranets to a massive global
network
(internet), all wired
● Ubiquitous computing (00’s?)
– Tens/hundreds of computing devices in every room/person,
becoming
“invisible” and part of the environment
53
54
55
What Ubiquitous Computing Isn't
• A Mobile Computer – even if you have access to “everything”
you do it through only one access point.
• Multimedia Computing – while it may employ sound and
video it should fade into the background rather than demand the
focus of your attention.
• Virtual reality - where virtual reality puts people inside a
computer-generated world, ubiquitous computing forces the
computer to live out here in the world with people.
Overview- Issues and Challenges
Other related fields:
• Sensor networks
• Human-computer interaction
• Artificial intelligence
Other related fields:
1-Sensor Networks
• A sensor network consist of a large number
of tiny autonomous computing devices,
each equipped with sensors, a wireless
radio, a processor, and a power source.
• Sensor networks are envisioned to be
deployed unobtrusively in the physical
environment to monitor a wide range of
environmental phenomena
• e.g., environmental pollutions, seismic
activity, wildlife
Other related fields:
2. Human Computer Interaction (HCI)
• HCI is the study of interaction between people (users) and
computers.
• Goal of HCI: to improve the interaction between users and
computers by making computers more user-friendly and
receptive to the user's needs.
• Long term goal of HCI: to design systems that minimize the
barrier between the human's cognitive model of what they want
to accomplish and the computer's understanding of the user's
task.
Other related fields:
3. Artificial Intelligence
• AI can be defined as intelligence exhibited by an artificial
(non-natural, manufactured) entity.
• AI is studied in overlapping fields of computer science,
psychology and engineering, dealing with intelligent
behavior, learning and adaptation in machines, generally
assumed to be computers.
• Research in AI is concerned with producing machines to
automate tasks requiring intelligent behavior.
Monument in
a Museum
environment
with RFID
Lab in
a campus
with RFID
tags
Info for botanical
science students using
RFID - Botanical
environment
Library in
a campus
with RFID
tags
Different Inputs
Capacitive sensing on a table
• Capacitive sensing on a table
Schedule the Seminar
Authenticate User in Space
Files Added to Space
Launch Application
Register Handheld Device
Move Controller to Handheld
Terminate an Application
Example Projects
• Pervasive computing projects have emerged at major universities and in
industry:
o Project Aura (Carnegie Mellon University)
o Oxygen (Massachusetts Institute of Technology)
o Portalano (University of Washington)
o Endeavour (University of California at Berkeley)
o Place Lab (Intel Research Laboratory at Seattle)
Example Projects :
ProjectAura (1)
• Aura (Carnegie Mellon University)
o Distraction-free (Invisible) Ubiquitous Computing.
Example Projects :
Project Aura (2)
• Moore’s Law Reigns Supreme
o Processor density
o Processor speed
o Memory capacity
o Disk capacity
o Memory cost
o ...
• Glaring Exception
o Human Attention
Adam & Eve 2000 AD
Human Attention
Example Projects :
Project Aura (3)
• Aura Thesis:
o The most precious resource in computing is human attention.
• Aura Goals:
o Reduce user distraction.
o Trade -off plentiful resources of Moore’s law for human attention.
o Achieve this scalably for mobile users in a failure -prone, variable-
resource environment.
Example Projects :
Project Aura (4)
 The Airport Scenario
>>Jane wants to send e-mail from the airport before her flight leaves.
– She has several large enclosures
– She is using a wireless interface
>>She has many options.
Simply send the e-mail
 Is there enough bandwidth?
Compress the data first
 Will that help enough?
Pay extra to get reserved bandwidth
 Are reservations available?
Send the “diff” relative to older file
 Are the old versions around?
Walk to a gate with more bandwidth
 Where is there enough bandwidth?
>>How do we choose automatically?76/30
Example Projects :
Project Aura (5)
 The Mobile Task Scenario
 Aura saves Scott’s task.
 Scott enters office and gets strong authentication and
secure access.
 Aura restores Scott’s task on desktop machine and uses a
large display.
 Scott controls application by voice.
 Bradley enters room.
 Bradley gets weak authentication, Scott’s access changes to
insecure.
 Aura denies voice access to sensitive email application.
 Scott has multi-modal control of PowerPoint application.
 Aura logs Scott out when he leaves the room.
77/30
Example Projects:
Oxygen
 Oxygen (MIT)
 Pervasive human-centered
computing.
 Goal of Oxygen is bringing
abundant computation and
communication, as
pervasive and free as air,
naturally into people's lives.
Example Projects :
Oxygen (2)
 To support highly dynamic and varied human activities, the Oxygen system must be
 pervasive— it must be everywhere, with every portal reaching into the same information
base;
 embedded— it must live in our world, sensing and affecting it;
 nomadic— it must allow users and computations to move around freely, according to
their needs;
 adaptable— it must provide flexibility and spontaneity, in response to changes in user
requirements and operating conditions;
 powerful, yet efficient— it must free itself from constraints imposed by bounded
hardware resources, addressing instead system constraints imposed by user demands and
available power or communication bandwidth;
 intentional— it must enable people to name services and software objects by intent, for
example, "the nearest printer," as opposed to by address;
 eternal— it must never shut down or reboot; components may come and go in response
to demand, errors, and upgrades, but Oxygen as a whole must be available all the time.
Related Projects:
Portalano
 Portolano (University of Washington)
 An expedition into invisible computing.
 Expedition goals:
 Connecting the physical world to the world-wide information fabric
 instrument the environment: sensors, locators, actuators
 universal plug-and-play at all levels: devices to services
 optimize for power: computation partitioning, comm. opt.
 intermittent communication: new networking strategies
 Get computers out of the way:
 don't interfere with user’s tasks
 diverse task-specific devices with optimized form-factors
 wide range of input/output modalities
 Robust, trustworthy services:
 high-productivity software development
 Self-organizing, active middleware, maintenance, monitoring
 higher-level, meaningful services
Related Projects:
Portalano (2)
 Scenario
 Alice begins the day with a cup of coffee and her
personalized newspaper.
 When her carpool arrives, she switches to reading the news
on her handheld display, where she notices an advertisement
for a new 3-D digital camera.
 It looks like something that would interest her shutterbug-
friend Bob, so Alice asks her address book to place the call.
Related Projects:
Portalano (4)
 Scenario (3)
 When the camera arrives, Bob snaps some photos of his
neighbor's collection of antique Portuguese navigation
instruments.
 After reviewing the photo album generated automatically by a
web-based service, Bob directs a copy of his favorite image to the
art display in his foyer.
 He also sends a pointer to the photo album to Alice and instructs
his scheduling agent to set up a lunch date so that he can thank
her for the suggestion.
Related Projects:
Portalano (3)
 Scenario (2)
 Bob's home entertainment system softens the volume of his custom
music file as his phone rings.
 Alice begins telling Bob about the camera, and forwards him a copy of
the advertisement which pops up on his home display.
 Bob is sold on the product, and after hanging up with her, he asks his
electronic shopping agent
to check his favorite photography
stores for the lowest price
and make the purchase.
Other Scenarios
 Buy drinks by Friday (1)
 Take out the last can of soda
 Swipe the can’s UPC label, which
adds soda to your shopping list
 Make a note that you need soda for
the guests you are having over this
weekend
Other Scenarios
 Buy drinks by Friday (2)
 Approach a local supermarket
 AutoPC informs you that you are
near a supermarket
 Opportunistic reminder: “If it is
convenient, stop by to buy
drinks.”
Other Scenarios
 Buy drinks by Friday (3)
- Friday rolls around and you have
not bought drinks
- Deadline-based reminder sent to
your pager
Other Scenarios
 Screen Fridge
 Provides :
Email
Video messages
Web surfing
Food management
TV
Radio
Virtual keyboard
Digital cook book
Surveillance camera
Other Scenarios
 Edible computers: The pill-cam
 Miniature camera
 Diagnostic device
 It is swallowed
 Try this with an ENIAC computer!
Other Scenarios
 Artificial Retina
 Direct interface with nervous
system
 Whole new computational
paradigm (who’s the
computer?)
Overview—Third Paradigm Computing
Phase I
 One person many computers
 Advances in
 OS and UI
 Networks
 Wireless
 Microprocessor Cost/Perf. >>
 Displays
 Activated the World
 Results
 100s of wireless computing
devices per person per office
 Displays (1” to wall sized)
 Compact devices to mediate
support & organize all
activities
Phase II
 Computer – A Dramatic M/C
 Path I - Invisible Path
 Growth in Technology
 Tabs
 Pads
 Boards
 Results
 Prototypes failed to be
invisible !
 Ubicomp in Post-Modernism
 Path II (2000—2020) Focus
 New Directions
 Level of Embeddedness
 Dangling String Display !
 Nomadicity
90
Other Scenarios
 The Active Badge
 This harbinger of inch-scale computers contains a small
microprocessor and an infrared transmitter.
 The badge broadcasts the identity of its wearer and so can
trigger automatic doors, automatic telephone forwarding and
computer displays customized to each person reading them.
 The active badge and other networked tiny computers are
called tabs.
Other Scenarios
 The Active Badge
Other Scenarios
 Smart Dust
 Nano computers that couple:
 Sensors
 Computing
 Communication
 Grids of motes (“nano
computers”)
a robot hardware
platform called iCAT
uses a set of logical rules
to convey emotional
states as it makes
decisions, with the goal
of improving human-
robot interaction.
It looks confused if it’s
in trouble, smiles if it
gets something right…
Emotional kitty:
is wirelessly connected to the Internet.
It roams around the home providing
an audio and video link to keep an eye
The Rovio robotic webcam
Gordon Bell , a principal researcher
at Microsoft, aims to amass an archive of
his life by capturing a digital record of all of
his interactions with people and machines. To
help, he wears a device around his neck called
‘SenseCam’, developed at Microsoft’s research
lab in Cambridge, UK. Sense Camis a wearable
camera
containing sensors that result in a picture being
taken whenever there are changes in light,
movement and ambient temperature. The result
is a digital ‘slide show’of many of the events in
everyday life.
A digital life:
A ring worn by electric guitar players
that uses motion sensors and a
wireless transmitter to
create different kinds of sound effects
by various hand gestures.
Hot Hand device:
Animated Textiles developed by
Studio sub Tela at the Hexagram
Institute, Montreal, Canada. These
two jackets ‘synch up’ when the
wearers hold hands, and the
message scrolls from the back of
one person to the other.
(a concept from Philips Design) is based
on stretchable, flexible
electronic substrates that integrate energy
supply, sensors, actuators, and display.
By changing color or even shape
according to your mood, it explores
how wearable technology can
be playful, sensual,
Mood affected, bio-activity
stimulated
Electronic sensing jewelry
The next thing in the digital
economy? Visa Micro Tag
does away with the need to
swipe a credit card or give
your card to the cashier.
Just wave the tag in front
of a secure reader and the
payment is made
The Ubiquitous Computing Challenge
 Society and ubiquitous computing could form an evolutionary
symbiosis
 Research is needed to guide and focus the evolution to the goal:
uncertainty and privacy
 Can systems autonomically adapt to satisfy evolving human needs?
 Ubiquitous Computing is the arena for pervasive computing
champions to fight out for their best ideas
UC – Here And Now
• Most work now is concentrating on the mobile infrastructure
for wireless networking
• TCP/IP and OSI are unprepared for handling mobility
(machine's name, and its network address are variant ).[6]
• “Calm Technology”: Calmness is a new challenge that UC
brings to computing [7]
• “The Periphery”: Calm technology will move easily from the
periphery of our attention, to the center, and back.
“Our computers should be like our childhood:
an invisible foundation that is quickly forgotten,
but always with us,
and effortlessly used throughout our lives.”
Mark Weiser
As Said….
2- Cloud Computing
Cloud Computing:
The Next Revolution in Information Technology
Manjrasoft
Current Installations
The Aleric Global Cloud
120000
Servers
120
Countries
All Major
Continents
Maximilien Brice, © CERN
132
Infrastructure (Mega Datacenters)
Challenges: Agility, Green, and Smart Growth
Gen 4 Modular Datacenter
Video link: Generation 4 Modular Data Center
Companies are still afraid to use clouds
[Chow09ccsw]
137
Source: NY Times (6/14/2006)
The datacenter is the computer!
138
Traditional Computing
THE CLOUD
Unused resources
Economics of Cloud Users
• Pay by use instead of provisioning for peak
Static data center Data center in the cloud
Demand
Capacity
Time
Resources
Demand
Capacity
Time
Resources
141141
The challenge
Add new services for your users quickly and cost effectively
Expand your Infrastructure!
Buy new servers, increase your
software costs, provision more
datacenter capacity!!
Look to the cloud!
Pay for the bandwidth
and server resources
that you need. When
your push is done then
turn the whole thing off!
Several Benefits……
Autonomic
Elastic
Market
Oriented
(Pay As You Go)
Virtualized
Service
Oriented
Dynamic
(& Distributed)
Shared
(Economy of
Scale)
Cloud
Computing
3 Main Types or Personalities
Software-as-a-Service (SaaS): A wide range of
application services delivered via various business
models normally available as public offering
Platform-as-a-Service (PaaS): Application
development platforms provides authoring and
runtime environment
Infrastructure-as-a-Service (IaaS): Also known
as elastic compute clouds, enable virtual hardware
for various uses
Cloud Computing
IaaS
Cloud Programming Environment and
Tools: Web 2.0, Mashups, Concurrent and
Distributed Programming, Workflow
Cloud Hosting Platforms: QoS
Negotiation Admission Control, Pricing,
SLA Management, Monitoring
Cloud Physical Resources: Storage,
virtualized clusters, servers, network.
Scientific Computing, Enterprise ISV,
Social Networking, Gaming
Amazon EC2, GoGrid, RightScale, Jovent
Animoto, Sales Force, Google
Document
User
Applications
User-level and
infrastructure
level Platform
Google AppEngine, MapReduce, Aneka,
Microsoft Azure
Infrastructure
SaaS
PaaS
CloudEconomy
149
Master Node
Private Cloud
(Heterogeneous Resources)
Slave Nodes
Slave Nodes
(Cluster)
User
User
Middleware
Public Cloud
(IaaS)
Hybrid Cloud
What is the cloud?
 IT as a service
 Cloud allows access to services without user technical knowledge or control of
supporting infrastructure
 Best described in terms of what happened to mechanical power over 100 yrs ago
 Now computers are simple devices connected to the larger cloud
 Data processing, storage and software applications that used to run locally are
now being supplied by big central computing stations. They're becoming, in
essence, computing utilities.
What is
Cloud Computing?
157
What is cloud and cloud computing?
Cloud
Demand resources or services over Internet
scale and reliability of a data center.
What is cloud and cloud computing?
Cloud computing
Is a style of computing in which dynamically scalable and often
virtualized resources are provided as a serve over the Internet.
Users need not have knowledge of, expertise in, or control over
the technology infrastructure in the "cloud" that supports them.
Why Cloud Computing?
160
Why Cloud Computing?
• Pay per use
• Instant Scalability
• Security
• Reliability
• APIs
Characteristics of cloud computing
• Virtual
software, databases, Web servers,operating systems, storage
and networking as virtual servers.
• On demand
add and subtract processors, memory, network bandwidth,
storage.
Cloud
Features & Benefits
for Users
Highly virtualized and
standardized infrastructures
Massive scalability
Fault tolerant & highly reliable
Intra- & Inter-cloud load balance
No need to install or update
SW or HW; access from any
browser
Unlimited use
Always on
Access from anywhere
Many services to choose from
163
164
IaaS
Infrastructure as a Service
PaaS
Platform as a Service
SaaS
Software as a Service
SaaS
Software as a Service
Software delivery model:
• Increasingly popular with SMEs
• No hardware or software to manage
• Service delivered through a browser
SaaS
Advantages:
• Pay per use
• Instant Scalability
• Security
• Reliability
• APIs
SaaS
Examples
• CRM
• Financial Planning
• Human Resources
• Word processing
Commercial Services:
• Salesforce.com
• email cloud
SaaS
Examples:
• Your current CRM package is not managing the
load or you simply don’t want to host it in-house.
Use a SaaS provider such as Salesforce.com
• Your email is hosted on an exchange server in your
office and it is very slow. Outsource this using
Hosted Exchange.
170
SaaS
171
PaaS
Platform as a Service
Platform delivery model:
• Platforms are built upon Infrastructure, which is expensive
• Estimating demand is not a science!
• Platform management is not fun!
PaaS
Popular services:
• Storage
• Database
• Scalability
PaaS
Advantages:
• Pay per use
• Instant Scalability
• Security
• Reliability
• APIs
PaaS
Examples:
• Google App Engine
• Mosso
• AWS: S3
PaaS
Examples:
• You need to host a large file (5Mb) on your
website and make it available for 35,000 users
for only two months duration. Use Cloud Front
from Amazon.
• You want to start storage services on your
network for a large number of files and you do
not have the storage capacity…use Amazon S3.
177
PaaS
178
IaaS
Infrastructure as a Service
179
Examples:
• You want to run a batch job but you don’t have the
infrastructure necessary to run it in a timely manner. Use
Amazon EC2.
• You want to host a website, but only for a few days. Use
Flexi scale.
IaaS
180
181
182
183
Administration (ARACNE)
• Hosted in the Databanx
facility in Newcastle
• Over £250,000 invested
• Redundant hardware
184
185
186
187
Advantages of Cloud Computing Instant software updates:
 Another advantage to cloud computing is that you are no longer faced with
choosing between obsolete software and high upgrade costs.
 When the application is web-based, updates happen automatically - available the
next time you log into the cloud.
 When you access a web-based application, you get the latest version - without
needing to pay for or download an upgrade.
 Improved document format compatibility.
 You do not have to worry about the documents you create on your machine being
compatible with other users' applications or operating systems.
 Where Word 2007 documents cannot be opened on a computer running Word
2003, all documents can be read!
 There are potentially no format incompatibilities when everyone is sharing
documents and applications in the cloud.
188
Advantages of Cloud Computing
 Lower computer costs:
 You do not need a high-powered and high-priced computer to run cloud
computing's web-based applications.
 Since applications run in the cloud, not on the desktop PC, your desktop PC
does not need the processing power or hard disk space demanded by
traditional desktop software.
 When you are using web-based applications, your PC can be less expensive,
with a smaller hard disk, less memory, more efficient processor...
 In fact, your PC in this scenario does not even need a CD or DVD drive, as
no software programs have to be loaded and no document files need to be
saved.
189
Advantages of Cloud Computing
 Improved performance:
 With few large programs hogging your
computer's memory, you will see better performance from your PC.
 Computers in a cloud computing system boot and run faster because they have fewer
programs and processes loaded into memory…
 Reduced software costs:
 Instead of purchasing expensive software applications, you can get most of what you
need for free-ish!
 That is right - most cloud computing applications today, such as the Google Docs suite,
are totally free.
 That is a lot better than paying $200+ for similar Microsoft Office software - which
alone may be justification for switching to cloud applications.
190
Advantages of Cloud Computing
 Unlimited storage capacity:
 Cloud computing offers virtually limitless storage.
 Your computer's current 200 Gbyte hard drive is small compared to the hundreds
of Pbytes available in the cloud.
 Whatever you need to store, you can.
 Increased data reliability:
 Unlike desktop computing, in which if a hard disk crashes and destroy all your
valuable data, a computer crashing in the cloud should not affect the storage of
your data.
 That also means that if your personal computer crashes, all your data is still out
there in the cloud, still accessible.
 In a world where few individual desktop PC users back up their data on a regular
basis, cloud computing is a data-safe computing platform!
191
Advantages of Cloud Computing
 Universal document access:
 That is not a problem with cloud computing, because you do not take your
documents with you.
 Instead, they stay in the cloud, and you can access them whenever you have a
computer and an Internet connection.
 All your documents are instantly available from wherever you are.
 Latest version availability:
 Another document-related advantage of cloud computing is that when you edit
a document at home, that edited version is what you see when you access the
document at work.
 The cloud always hosts the latest version of your documents; as long as you
are connected, you are not in danger of having an outdated version.
192
Advantages of Cloud Computing
 Easier group collaboration:
 Sharing documents leads directly to better collaboration.
 Many users do this as it is an important advantages of cloud computing - multiple
users can collaborate easily on documents and projects.
 Because the documents are hosted in the cloud, not on individual computers, all you
need is an Internet connection, and you are collaborating.
 Device independence:
 You are no longer tethered to a single computer or network.
 Changes to computers, applications and documents follow you through the cloud.
 Move to a portable device, and your applications and documents are still available.
193
Disadvantages of Cloud Computing
 Requires a constant Internet connection:
 Cloud computing is impossible if you cannot connect to the Internet.
 Since you use the Internet to connect to both your applications and
documents, if you do not have an Internet connection you cannot access
anything, even your own documents.
 A dead Internet connection means no work and in areas where Internet
connections are few or inherently unreliable, this could be a deal-breaker.
 When you are offline, cloud computing simply does not work.
194
Disadvantages of Cloud Computing
 Does not work well with low-speed connections:
 Similarly, a low-speed Internet connection, such as that found with dial-up
services, makes cloud computing painful at best and often impossible.
 Web-based applications require a lot of bandwidth to download, as do large
documents.
 If you are labouring with a low-speed dial-up connection, it might take
seemingly forever just to change from page to page in a document, let
alone to launch a feature-rich cloud service.
 In other words, cloud computing is not for the broadband-impaired!
195
Disadvantages of Cloud Computing
 Can be slow:
 Even with a fast connection, web-based applications can sometimes be
slower than accessing a similar software program on your desktop PC.
 Everything about the program, from the interface to the current document,
has to be sent back and forth from your computer to the computers in the
cloud.
 If the cloud servers happen to be backed up at that moment, or if the
Internet is having a slow day, you would not get the instantaneous access
you might expect from desktop applications.
196
Disadvantages of Cloud Computing
 Features might be limited:
 This situation is bound to change, but today many web-based applications simply
are not as full-featured as their desktop-based applications.
 For example, you can do a lot more with Microsoft PowerPoint than with Google
Presentation's web-based offering.
 The basics are similar, but the cloud application lacks many of PowerPoint's
advanced features.
 If you are a power user, you might not want to leap into cloud computing just yet.
197
Disadvantages of Cloud Computing
 Stored data might not be secure:
 With cloud computing, all your data is stored on the cloud.
 The questions is How secure is the cloud?
 Can unauthorised users gain access to your confidential data?
 Cloud computing companies say that data is secure, but it is too early to be
completely sure of that.
 Only time will tell if your data is secure in the cloud.
 Stored data can be lost:
 Theoretically, data stored in the cloud is safe, replicated across multiple
machines.
 But on the off chance that your data goes missing, you have no physical or local
backup.
 Put simply, relying on the cloud puts you at risk if the cloud lets you down.198
Disadvantages of Cloud Computing
 HPC Systems:
 Not clear that you can run compute-intensive
 HPC applications that use MPI/OpenMP!
 Scheduling is important with this type of application – as you want all
the VM to be co-located to minimise communication latency!
 General Concerns:
 Each cloud systems uses different protocols and different APIs… so it
may not be possible to run applications between cloud based systems.
 Amazon has created its own DB system (not SQL 92), and workflow
system (many popular workflow systems out there) – so your normal
applications will have to be adapted to execute on these platforms.
199
-Pay-as-you- USE
-Subscription fee is based on the number of
users per month
-Minimal Cost for annual subscription
IT/application resources
-Faster implementation and Productivity
optimization
-More control over relationship with vendor
-Better risk sharing with vendor
-Exit options are simple and easy
200
On premise vs. SaaS
-Capital Expenses- You pay upfront
Annual maintenance costs
-Cost for applications, maintenance, infrastructure,
Database server and IT/application resources
-Time taken to install is much higher & configure
applications
-Not much control over vendor after purchase
-You are responsible for the management of the
software installed
-Customers may be on many different releases
of the software
-Upgrading to the newer version of the software
could cost you
Licensed Software Software-as-a-Service (SaaS) Solutions
Location based service (LBS) will
become a 13B business by 2013
202
203
Top Reasons Why you should consider SaaS?
OPEX not CAPEX:
• “Pay as you go”
operational expense
rather than a capital
expenditure
• A subscription-based
on usage metrics (instead of
a perpetual license)
Lower cost-of-business
solution ownership
Predictability of costs over
time
The management, support,
and upgrading of the software
and the infrastructure that
supports it is the responsibility
of the solution provider
Economic Reasons
More rapid access to state-
of-the-art technology
Highly responsive and
scalable (upwards and
downwards) solutions that
cover entire business
processes
• Greater ability to
scale as business needs
change
User access to the
application
is over the Internet
• Ubiquitous and
relatively inexpensive
Flexible and customizable
solutions
Functional Reasons
Reliable access to data,
anywhere, anytime
Increased risk mitigation
with better support for
compliance
More rapid time-to-
production
Improved security,
performance, and availability
Avoidance of vendor lock-
in
Shift in focus to core
business management, rather
than disproportionate attention
on the computer environment;
redeploy headcount to
strategic IT initiatives
Expected Results
7.Analyzing TCO Cost Drivers.
Cost Drivers Traditional On-Premises Software Cloud Application
Capital Expenses Upfront purchase of software and hardware
May require network infrastructure
enhancements, facilities
Need to support third party monitoring, test
tools,
security products
None
Pay-as-you-go subscription pricing
All inclusive: maintenance, support,
training, and upgrades all hardware,
networking, storage, database,
administration
Design and Deployment May take months to deploy
Professional services can cost up to 3X the
initial
software purchase
Difficult for vendor to build best practices
Requires staff or contract labor to research,
design, integrate, test, tune, launch, and train
Deploy in weeks
Lower cost using consistent set of best
practices
Ongoing Infrastructure Ongoing software maintenance, upgrades
Ongoing hardware replacement once every
three
years
Requires a network monitoring and
management
tools
May require additional networking equipment
and bandwidth to accommodate incremental
traffic
The vendor provides as part of the
subscription
# Item On Premise SAAS
Number Value Number Value
1 Infrastructure 29,000.00 -
1.1 Servers with OS 2 6,000.00 0 -
1.2 Software licenses
( Database)
1 4,000.00 0 -
1.3 Internal server
security
1 2,000.00 0 -
# Item On Premise SAAS
Number Value Number Value
1.4 Backup 1 2,000.00 0 -
1.5 DR site 1 5,000.00 0 -
1.6 Other
overheads
1 10,000.00
2 Software 100,000.00
2.1 License fee 1 80,000.00 0 -
# Item On Premise SAAS
Number Value Number Value
2.2 ESS licenses
(cal)
50 20,000.00 0 -
3 Setup 1 150,000.00 100,000.00
3.1 Installation and
setup
100 150,000.00 60 90,000.00
# Item On Premise SAAS
Number Value Number Value
Total one time
cost
279,000.00 100,000.00
4 Recurring cost 225,000.00 300,000.00
4.1 Annual
maintenance -5
yrs @ 20%
5 80,000.00 0 -
 
# Item On Premise SAAS
Number Value Number Value
4.2 Monthly
subscription -5 yrs
@10 $
0 - 500 300,000.00
4.3 Server
maintenance
5 25,000.00 0
4.5 Resource
overheads
5 120,000.00
Total cost for 5
years
504,000.00 400,000.00
Total saving $ 104,000.00
Thank You
Prepared by: Eng.Assem Abdelhamid Mouse
217

Weitere ähnliche Inhalte

Was ist angesagt?

Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Preethi AKNR
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Kamran Ashraf
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
u065932
 
Iot ppt
Iot pptIot ppt
Iot ppt
piyuu7
 
Sensor networks
Sensor networksSensor networks
Sensor networks
Marc Pous
 
Technology in 2023
Technology in 2023Technology in 2023
Technology in 2023
beezy53
 

Was ist angesagt? (20)

Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
IoT with Arduino
IoT with ArduinoIoT with Arduino
IoT with Arduino
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Green Internet of things for Smart World
Green Internet of things for Smart WorldGreen Internet of things for Smart World
Green Internet of things for Smart World
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
IoT sensor devices
IoT sensor devicesIoT sensor devices
IoT sensor devices
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Technology in 2023
Technology in 2023Technology in 2023
Technology in 2023
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?
 
Internet of everything ppt
Internet of everything pptInternet of everything ppt
Internet of everything ppt
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
Lecture 4: Human-Computer Interaction: Prototyping (2014)
Lecture 4: Human-Computer Interaction: Prototyping (2014)Lecture 4: Human-Computer Interaction: Prototyping (2014)
Lecture 4: Human-Computer Interaction: Prototyping (2014)
 

Andere mochten auch

IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
MachinePulse
 
URECA Research Paper - Mobile Cloud Computing
URECA Research Paper - Mobile Cloud ComputingURECA Research Paper - Mobile Cloud Computing
URECA Research Paper - Mobile Cloud Computing
Ace Zachary
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud Computing
Rajshri Mohan
 
Apache server 2 bible hungry minds
Apache server 2 bible   hungry mindsApache server 2 bible   hungry minds
Apache server 2 bible hungry minds
grregwalz
 

Andere mochten auch (20)

IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
 
Internet of Things, Cloud and Big Data
Internet of Things, Cloud and Big DataInternet of Things, Cloud and Big Data
Internet of Things, Cloud and Big Data
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M Communication
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing and Validated Learning for Accelerating Innovation in IoT
Cloud Computing and Validated Learning for Accelerating Innovation in IoTCloud Computing and Validated Learning for Accelerating Innovation in IoT
Cloud Computing and Validated Learning for Accelerating Innovation in IoT
 
Acknowledgement
AcknowledgementAcknowledgement
Acknowledgement
 
URECA Research Paper - Mobile Cloud Computing
URECA Research Paper - Mobile Cloud ComputingURECA Research Paper - Mobile Cloud Computing
URECA Research Paper - Mobile Cloud Computing
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud Computing
 
Experience Presentation
Experience PresentationExperience Presentation
Experience Presentation
 
Overzicht Foutcodes DTCO VDO Digitale Tachograaf - Engels
Overzicht Foutcodes DTCO VDO Digitale Tachograaf - EngelsOverzicht Foutcodes DTCO VDO Digitale Tachograaf - Engels
Overzicht Foutcodes DTCO VDO Digitale Tachograaf - Engels
 
New Framework for Improving Bigdata Analaysis Using Mobile Agent
New Framework for Improving Bigdata Analaysis Using Mobile AgentNew Framework for Improving Bigdata Analaysis Using Mobile Agent
New Framework for Improving Bigdata Analaysis Using Mobile Agent
 
Apache server 2 bible hungry minds
Apache server 2 bible   hungry mindsApache server 2 bible   hungry minds
Apache server 2 bible hungry minds
 
IoT Product Life Cycle and Security
IoT Product Life Cycle and SecurityIoT Product Life Cycle and Security
IoT Product Life Cycle and Security
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
 
Technology Life Cycle With Mobile Generation Example
Technology Life Cycle With Mobile Generation ExampleTechnology Life Cycle With Mobile Generation Example
Technology Life Cycle With Mobile Generation Example
 
Introduction and Overview of BigData, Hadoop, Distributed Computing - BigData...
Introduction and Overview of BigData, Hadoop, Distributed Computing - BigData...Introduction and Overview of BigData, Hadoop, Distributed Computing - BigData...
Introduction and Overview of BigData, Hadoop, Distributed Computing - BigData...
 
gifi technology ppt
gifi technology pptgifi technology ppt
gifi technology ppt
 

Ähnlich wie cloud of things Presentation

Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
Assem mousa
 
Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014
Marios Kyriazis
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
Pravallika Reddy
 

Ähnlich wie cloud of things Presentation (20)

pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Ubiquitous Computing: an Introduction
Ubiquitous Computing: an IntroductionUbiquitous Computing: an Introduction
Ubiquitous Computing: an Introduction
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 
Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014
 
ubicom-ch02-slides.ppt
ubicom-ch02-slides.pptubicom-ch02-slides.ppt
ubicom-ch02-slides.ppt
 
Telco survival
Telco survivalTelco survival
Telco survival
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Smart Playing Cards A Ubiquitous Computing Game
Smart Playing Cards A Ubiquitous Computing GameSmart Playing Cards A Ubiquitous Computing Game
Smart Playing Cards A Ubiquitous Computing Game
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 

Mehr von Assem mousa

Mehr von Assem mousa (20)

Leadership in The COE Technology of twenty-first century Beyond covid 19 Era
Leadership in The COE Technology of twenty-first century Beyond covid 19 EraLeadership in The COE Technology of twenty-first century Beyond covid 19 Era
Leadership in The COE Technology of twenty-first century Beyond covid 19 Era
 
Dr assem moussa-bio 6 2021
Dr assem moussa-bio 6  2021Dr assem moussa-bio 6  2021
Dr assem moussa-bio 6 2021
 
Cloud of everything :Tech of the 21 century / COE :TECH OF THE 21 CENTURY IN...
Cloud of everything :Tech of the 21 century /  COE :TECH OF THE 21 CENTURY IN...Cloud of everything :Tech of the 21 century /  COE :TECH OF THE 21 CENTURY IN...
Cloud of everything :Tech of the 21 century / COE :TECH OF THE 21 CENTURY IN...
 
Cloud of Everything Tech against Covid 19 in General and in Aviation Particular
Cloud of Everything Tech against Covid 19 in General and in Aviation ParticularCloud of Everything Tech against Covid 19 in General and in Aviation Particular
Cloud of Everything Tech against Covid 19 in General and in Aviation Particular
 
Cloud of everything /COE IN Aviation Beyond COVID 19
Cloud of everything /COE IN Aviation Beyond COVID 19Cloud of everything /COE IN Aviation Beyond COVID 19
Cloud of everything /COE IN Aviation Beyond COVID 19
 
AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19
 
Cloud of everything /COE in Aviation
Cloud of everything /COE in Aviation Cloud of everything /COE in Aviation
Cloud of everything /COE in Aviation
 
AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19
 
Aviation Beyond COVID 19/CLOUT in Aviation Beyond COVID 19
Aviation Beyond COVID 19/CLOUT in Aviation Beyond COVID 19Aviation Beyond COVID 19/CLOUT in Aviation Beyond COVID 19
Aviation Beyond COVID 19/CLOUT in Aviation Beyond COVID 19
 
Entrepreneurship Beyond COVID 19
Entrepreneurship Beyond COVID 19Entrepreneurship Beyond COVID 19
Entrepreneurship Beyond COVID 19
 
Life Beyond COVID 19
Life Beyond COVID 19Life Beyond COVID 19
Life Beyond COVID 19
 
Universal adoption of clout tech in fighting coronavirus spreading in the ent...
Universal adoption of clout tech in fighting coronavirus spreading in the ent...Universal adoption of clout tech in fighting coronavirus spreading in the ent...
Universal adoption of clout tech in fighting coronavirus spreading in the ent...
 
Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030
Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030
Clout efforts-in-reaching-the-17th-and-169th-sdg-goals-by-2030
 
Cloud Objective is to Provide Enhanced Solutions for ECOCITY
Cloud Objective is to Provide Enhanced Solutions for ECOCITY Cloud Objective is to Provide Enhanced Solutions for ECOCITY
Cloud Objective is to Provide Enhanced Solutions for ECOCITY
 
Clout /Cloud of things/COE for Smarter Cities
Clout /Cloud of things/COE for Smarter CitiesClout /Cloud of things/COE for Smarter Cities
Clout /Cloud of things/COE for Smarter Cities
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in Aviation
 
5G
5G5G
5G
 
Artificial Intelligent in Aviation /AI in Aviation/Intelligent Aviation
Artificial Intelligent in Aviation /AI in Aviation/Intelligent AviationArtificial Intelligent in Aviation /AI in Aviation/Intelligent Aviation
Artificial Intelligent in Aviation /AI in Aviation/Intelligent Aviation
 
Application of new technologies and IT in airports-IOT and AI.
Application of new technologies and IT in airports-IOT and AI.Application of new technologies and IT in airports-IOT and AI.
Application of new technologies and IT in airports-IOT and AI.
 
Internet of Aviation
Internet of AviationInternet of Aviation
Internet of Aviation
 

Kürzlich hochgeladen

Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 

Kürzlich hochgeladen (20)

Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
 
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakurbest call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
SMART BANGLADESH I PPTX I SLIDE IShovan Prita Paul.pptx
SMART BANGLADESH  I    PPTX   I    SLIDE   IShovan Prita Paul.pptxSMART BANGLADESH  I    PPTX   I    SLIDE   IShovan Prita Paul.pptx
SMART BANGLADESH I PPTX I SLIDE IShovan Prita Paul.pptx
 
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 

cloud of things Presentation

  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. 10
  • 11.
  • 12.
  • 13. 1-Ubiquitous Uubiquitous computing Calm technology Things that think Everywhere Pervasive iinternet, Ambient intelligence ,Proactive computing , Augmented reality, Physical Computing, Ubi comp ,U comp 13/30
  • 15. “Ubiquitous Computing is a technology that resides in the human world and weaves itself into the fabric of everyday life” Mark Weiser 15
  • 17. Ubiquitous Services  Care about service, not application  Want to receive a message using whatever device is handy nearby  Message is tailored to work according to device Issues  What is software infrastructure for integration?  Do we get it by just adopting some standard?
  • 18. Context-Aware Computing  computers will be able to understand enough of a user’s current situation to offer services, resources, or information relevant to the particular context  Walk into conference room, my email is projected on a big screen there  E.g : device will automatically switch itself to “vibrate” instead of “ring” when it is in the cinema For example: Automated call forwarding (context awareness – should where the person is) lighting control  smart sensor wall - control heating and lighting.
  • 19. Issues : Context Awareness  Current location Need location detection e.g. GPS or base station Indoors – radio beacon, IR.  User activity Walking, driving a car, running for a bus – how to detect this?  Ambient environment In theatre, alone, in meeting  Local resources or services available Device capabilities  Screen, input, processing power, battery life ….  Current QoS availability – particularly for radio links
  • 20. Intelligent Environment  An intelligent environment is a location (e.g. home, office, hospital, etc) that is equipped with sensors, actuators and computers that are networked with each other and the internet.  The components are controlled by "intelligent agent" software that knows the preferences of the occupants.  It tailors the environment to suit them.  The occupants can talk to the environment using speech and natural language and the sensors can monitor the environment.
  • 21. Business Services  Ubiquitous Computing will lead to Ubiquitous Commerce (right message, to the right person, at the right time!)  Work can occur anytime, anywhere becomes all-the-time, everywhere.  Ubiquitous will enable people to focus on their tasks and on interacting with other people.  Impact on Business Strategy – awareness, accessibility, responsiveness  Point of Presence! Context!  Change in nature of service providers (bursty, point-of-presence value, service level commitments)  New services (businesses) will arise…
  • 23. 23
  • 24. 24/30
  • 25. Demographics • 314 million visually impaired people in the world today • 45 million blind • More than 82% of the visually impaired population is age 50 or older • The old population forms a group with diverse range of abilities • The disabled are seldom seen using the street alone or public transportation
  • 26. Mobility Requirements • Being able to avoid obstacles • Walking in the right direction • Safely crossing the road • Knowing when you have reached a destination • Knowing which is the right bus/train • Knowing when to get off the bus/train All require SIGHT as primary sense
  • 27. Putting all together… Gill, J. Assistive Devices for People with Visual Impairments. In A. Helal, M. Mokhtari and B. Abdulrazak, ed., The Engineering Handbook of Smart Technology for Aging, Disability and Independence. John Wiley & Sons, Hoboken, New Jersey, 2008.
  • 29. Wearable Computing • Wearable computers are an attractive way to deliver a ubiquitous computing system’s interface to a user, especially in non-office- building environment.
  • 30. 30/30
  • 31. 31/30
  • 32. 32/30
  • 33. 33/30
  • 34. 34/30
  • 35. 35/30
  • 36. 36/30
  • 37. 37/30
  • 38. 38/30
  • 39. 39/30
  • 40. 40/30
  • 41. 41/30
  • 42. Wearable Computing & Ubiquitous Computing Properties and Problems with Ubiquitous Computing Privacy issues Difficulty with personalized information: I am Tom ! Oh, it’s Tom Let me check my databse Oh, it’s Tom Let me check my databse Tom: Age: 25 Favorite Song: My heart will go on Tom: Age: 25 Email: Tt@yahoo.com OK, let me check his email OK, I will play this song Hi all, I am Mike, your new Boss My god, a new man! I have to update my database! Me Too! It’s really troublesome!
  • 43. Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing I am Tom ! Tom: Age: 25 Favorite Song: My heart will go on Email: Tt@yahoo.com OK, let me check his email OK, I will play this song
  • 44. Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing  1. Localized information:  2. Localized control I am Tom ! Device Table: -------------------- 1.Computer 2.Recorder 3.Printer A New device! It should be added to my DB. Where is the printer’s driver? should I install it?
  • 45. Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing  Resource management: Oh my, What should I do? I am Tom ! Hi all, I am Mike Tom: Age: 25 Favorite Song: My heart will go on Email: Tt@yahoo.com Mike: Age: 30 Favorite Song: Salvage Garden Email: Mm@yahoo.com
  • 46.
  • 48. Ubiquitous/Pervasive Computing Calm technology: embedded, invisible, seamlessly, unobtrusive, intelligent. 48/30 Image source: Friedemann Mattern (ETH Zürich)
  • 49. What is Ubiquitous Computing ? • Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user – Mark Weiser • Ubiquitous computing, or calm technology, is a paradigm shift where technology becomes virtually invisible in our lives. - Marcia Riley Definitions:
  • 50. 50
  • 51. The communications growth rate is also amazing 51
  • 52. Three Waves of Computing ● Mainframe computing (60’s-70’s) – Massive computers to execute big data processing applications – very few computers in the world ● Desktop computing (80’s-90’s) – one computer at every desk to help in business related activities – Computers connected in intranets to a massive global network (internet), all wired ● Ubiquitous computing (00’s?) – Tens/hundreds of computing devices in every room/person, becoming “invisible” and part of the environment
  • 53. 53
  • 54. 54
  • 55. 55
  • 56. What Ubiquitous Computing Isn't • A Mobile Computer – even if you have access to “everything” you do it through only one access point. • Multimedia Computing – while it may employ sound and video it should fade into the background rather than demand the focus of your attention. • Virtual reality - where virtual reality puts people inside a computer-generated world, ubiquitous computing forces the computer to live out here in the world with people.
  • 57. Overview- Issues and Challenges
  • 58. Other related fields: • Sensor networks • Human-computer interaction • Artificial intelligence
  • 59. Other related fields: 1-Sensor Networks • A sensor network consist of a large number of tiny autonomous computing devices, each equipped with sensors, a wireless radio, a processor, and a power source. • Sensor networks are envisioned to be deployed unobtrusively in the physical environment to monitor a wide range of environmental phenomena • e.g., environmental pollutions, seismic activity, wildlife
  • 60. Other related fields: 2. Human Computer Interaction (HCI) • HCI is the study of interaction between people (users) and computers. • Goal of HCI: to improve the interaction between users and computers by making computers more user-friendly and receptive to the user's needs. • Long term goal of HCI: to design systems that minimize the barrier between the human's cognitive model of what they want to accomplish and the computer's understanding of the user's task.
  • 61. Other related fields: 3. Artificial Intelligence • AI can be defined as intelligence exhibited by an artificial (non-natural, manufactured) entity. • AI is studied in overlapping fields of computer science, psychology and engineering, dealing with intelligent behavior, learning and adaptation in machines, generally assumed to be computers. • Research in AI is concerned with producing machines to automate tasks requiring intelligent behavior.
  • 62. Monument in a Museum environment with RFID Lab in a campus with RFID tags Info for botanical science students using RFID - Botanical environment Library in a campus with RFID tags
  • 63.
  • 64. Different Inputs Capacitive sensing on a table • Capacitive sensing on a table
  • 67. Files Added to Space
  • 70. Move Controller to Handheld
  • 72. Example Projects • Pervasive computing projects have emerged at major universities and in industry: o Project Aura (Carnegie Mellon University) o Oxygen (Massachusetts Institute of Technology) o Portalano (University of Washington) o Endeavour (University of California at Berkeley) o Place Lab (Intel Research Laboratory at Seattle)
  • 73. Example Projects : ProjectAura (1) • Aura (Carnegie Mellon University) o Distraction-free (Invisible) Ubiquitous Computing.
  • 74. Example Projects : Project Aura (2) • Moore’s Law Reigns Supreme o Processor density o Processor speed o Memory capacity o Disk capacity o Memory cost o ... • Glaring Exception o Human Attention Adam & Eve 2000 AD Human Attention
  • 75. Example Projects : Project Aura (3) • Aura Thesis: o The most precious resource in computing is human attention. • Aura Goals: o Reduce user distraction. o Trade -off plentiful resources of Moore’s law for human attention. o Achieve this scalably for mobile users in a failure -prone, variable- resource environment.
  • 76. Example Projects : Project Aura (4)  The Airport Scenario >>Jane wants to send e-mail from the airport before her flight leaves. – She has several large enclosures – She is using a wireless interface >>She has many options. Simply send the e-mail  Is there enough bandwidth? Compress the data first  Will that help enough? Pay extra to get reserved bandwidth  Are reservations available? Send the “diff” relative to older file  Are the old versions around? Walk to a gate with more bandwidth  Where is there enough bandwidth? >>How do we choose automatically?76/30
  • 77. Example Projects : Project Aura (5)  The Mobile Task Scenario  Aura saves Scott’s task.  Scott enters office and gets strong authentication and secure access.  Aura restores Scott’s task on desktop machine and uses a large display.  Scott controls application by voice.  Bradley enters room.  Bradley gets weak authentication, Scott’s access changes to insecure.  Aura denies voice access to sensitive email application.  Scott has multi-modal control of PowerPoint application.  Aura logs Scott out when he leaves the room. 77/30
  • 78. Example Projects: Oxygen  Oxygen (MIT)  Pervasive human-centered computing.  Goal of Oxygen is bringing abundant computation and communication, as pervasive and free as air, naturally into people's lives.
  • 79. Example Projects : Oxygen (2)  To support highly dynamic and varied human activities, the Oxygen system must be  pervasive— it must be everywhere, with every portal reaching into the same information base;  embedded— it must live in our world, sensing and affecting it;  nomadic— it must allow users and computations to move around freely, according to their needs;  adaptable— it must provide flexibility and spontaneity, in response to changes in user requirements and operating conditions;  powerful, yet efficient— it must free itself from constraints imposed by bounded hardware resources, addressing instead system constraints imposed by user demands and available power or communication bandwidth;  intentional— it must enable people to name services and software objects by intent, for example, "the nearest printer," as opposed to by address;  eternal— it must never shut down or reboot; components may come and go in response to demand, errors, and upgrades, but Oxygen as a whole must be available all the time.
  • 80. Related Projects: Portalano  Portolano (University of Washington)  An expedition into invisible computing.  Expedition goals:  Connecting the physical world to the world-wide information fabric  instrument the environment: sensors, locators, actuators  universal plug-and-play at all levels: devices to services  optimize for power: computation partitioning, comm. opt.  intermittent communication: new networking strategies  Get computers out of the way:  don't interfere with user’s tasks  diverse task-specific devices with optimized form-factors  wide range of input/output modalities  Robust, trustworthy services:  high-productivity software development  Self-organizing, active middleware, maintenance, monitoring  higher-level, meaningful services
  • 81. Related Projects: Portalano (2)  Scenario  Alice begins the day with a cup of coffee and her personalized newspaper.  When her carpool arrives, she switches to reading the news on her handheld display, where she notices an advertisement for a new 3-D digital camera.  It looks like something that would interest her shutterbug- friend Bob, so Alice asks her address book to place the call.
  • 82. Related Projects: Portalano (4)  Scenario (3)  When the camera arrives, Bob snaps some photos of his neighbor's collection of antique Portuguese navigation instruments.  After reviewing the photo album generated automatically by a web-based service, Bob directs a copy of his favorite image to the art display in his foyer.  He also sends a pointer to the photo album to Alice and instructs his scheduling agent to set up a lunch date so that he can thank her for the suggestion.
  • 83. Related Projects: Portalano (3)  Scenario (2)  Bob's home entertainment system softens the volume of his custom music file as his phone rings.  Alice begins telling Bob about the camera, and forwards him a copy of the advertisement which pops up on his home display.  Bob is sold on the product, and after hanging up with her, he asks his electronic shopping agent to check his favorite photography stores for the lowest price and make the purchase.
  • 84. Other Scenarios  Buy drinks by Friday (1)  Take out the last can of soda  Swipe the can’s UPC label, which adds soda to your shopping list  Make a note that you need soda for the guests you are having over this weekend
  • 85. Other Scenarios  Buy drinks by Friday (2)  Approach a local supermarket  AutoPC informs you that you are near a supermarket  Opportunistic reminder: “If it is convenient, stop by to buy drinks.”
  • 86. Other Scenarios  Buy drinks by Friday (3) - Friday rolls around and you have not bought drinks - Deadline-based reminder sent to your pager
  • 87. Other Scenarios  Screen Fridge  Provides : Email Video messages Web surfing Food management TV Radio Virtual keyboard Digital cook book Surveillance camera
  • 88. Other Scenarios  Edible computers: The pill-cam  Miniature camera  Diagnostic device  It is swallowed  Try this with an ENIAC computer!
  • 89. Other Scenarios  Artificial Retina  Direct interface with nervous system  Whole new computational paradigm (who’s the computer?)
  • 90. Overview—Third Paradigm Computing Phase I  One person many computers  Advances in  OS and UI  Networks  Wireless  Microprocessor Cost/Perf. >>  Displays  Activated the World  Results  100s of wireless computing devices per person per office  Displays (1” to wall sized)  Compact devices to mediate support & organize all activities Phase II  Computer – A Dramatic M/C  Path I - Invisible Path  Growth in Technology  Tabs  Pads  Boards  Results  Prototypes failed to be invisible !  Ubicomp in Post-Modernism  Path II (2000—2020) Focus  New Directions  Level of Embeddedness  Dangling String Display !  Nomadicity 90
  • 91. Other Scenarios  The Active Badge  This harbinger of inch-scale computers contains a small microprocessor and an infrared transmitter.  The badge broadcasts the identity of its wearer and so can trigger automatic doors, automatic telephone forwarding and computer displays customized to each person reading them.  The active badge and other networked tiny computers are called tabs.
  • 92. Other Scenarios  The Active Badge
  • 93. Other Scenarios  Smart Dust  Nano computers that couple:  Sensors  Computing  Communication  Grids of motes (“nano computers”)
  • 94. a robot hardware platform called iCAT uses a set of logical rules to convey emotional states as it makes decisions, with the goal of improving human- robot interaction. It looks confused if it’s in trouble, smiles if it gets something right… Emotional kitty:
  • 95. is wirelessly connected to the Internet. It roams around the home providing an audio and video link to keep an eye The Rovio robotic webcam
  • 96. Gordon Bell , a principal researcher at Microsoft, aims to amass an archive of his life by capturing a digital record of all of his interactions with people and machines. To help, he wears a device around his neck called ‘SenseCam’, developed at Microsoft’s research lab in Cambridge, UK. Sense Camis a wearable camera containing sensors that result in a picture being taken whenever there are changes in light, movement and ambient temperature. The result is a digital ‘slide show’of many of the events in everyday life. A digital life:
  • 97. A ring worn by electric guitar players that uses motion sensors and a wireless transmitter to create different kinds of sound effects by various hand gestures. Hot Hand device:
  • 98. Animated Textiles developed by Studio sub Tela at the Hexagram Institute, Montreal, Canada. These two jackets ‘synch up’ when the wearers hold hands, and the message scrolls from the back of one person to the other.
  • 99. (a concept from Philips Design) is based on stretchable, flexible electronic substrates that integrate energy supply, sensors, actuators, and display. By changing color or even shape according to your mood, it explores how wearable technology can be playful, sensual, Mood affected, bio-activity stimulated Electronic sensing jewelry
  • 100. The next thing in the digital economy? Visa Micro Tag does away with the need to swipe a credit card or give your card to the cashier. Just wave the tag in front of a secure reader and the payment is made
  • 101. The Ubiquitous Computing Challenge  Society and ubiquitous computing could form an evolutionary symbiosis  Research is needed to guide and focus the evolution to the goal: uncertainty and privacy  Can systems autonomically adapt to satisfy evolving human needs?  Ubiquitous Computing is the arena for pervasive computing champions to fight out for their best ideas
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120. UC – Here And Now • Most work now is concentrating on the mobile infrastructure for wireless networking • TCP/IP and OSI are unprepared for handling mobility (machine's name, and its network address are variant ).[6] • “Calm Technology”: Calmness is a new challenge that UC brings to computing [7] • “The Periphery”: Calm technology will move easily from the periphery of our attention, to the center, and back.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127. “Our computers should be like our childhood: an invisible foundation that is quickly forgotten, but always with us, and effortlessly used throughout our lives.” Mark Weiser As Said….
  • 129. Cloud Computing: The Next Revolution in Information Technology Manjrasoft
  • 130.
  • 131. Current Installations The Aleric Global Cloud 120000 Servers 120 Countries All Major Continents
  • 132. Maximilien Brice, © CERN 132
  • 134. Challenges: Agility, Green, and Smart Growth
  • 135. Gen 4 Modular Datacenter Video link: Generation 4 Modular Data Center
  • 136. Companies are still afraid to use clouds [Chow09ccsw]
  • 137. 137
  • 138. Source: NY Times (6/14/2006) The datacenter is the computer! 138
  • 141. Unused resources Economics of Cloud Users • Pay by use instead of provisioning for peak Static data center Data center in the cloud Demand Capacity Time Resources Demand Capacity Time Resources 141141
  • 142.
  • 143.
  • 144. The challenge Add new services for your users quickly and cost effectively
  • 145. Expand your Infrastructure! Buy new servers, increase your software costs, provision more datacenter capacity!!
  • 146. Look to the cloud! Pay for the bandwidth and server resources that you need. When your push is done then turn the whole thing off!
  • 147. Several Benefits…… Autonomic Elastic Market Oriented (Pay As You Go) Virtualized Service Oriented Dynamic (& Distributed) Shared (Economy of Scale) Cloud Computing
  • 148. 3 Main Types or Personalities Software-as-a-Service (SaaS): A wide range of application services delivered via various business models normally available as public offering Platform-as-a-Service (PaaS): Application development platforms provides authoring and runtime environment Infrastructure-as-a-Service (IaaS): Also known as elastic compute clouds, enable virtual hardware for various uses Cloud Computing
  • 149. IaaS Cloud Programming Environment and Tools: Web 2.0, Mashups, Concurrent and Distributed Programming, Workflow Cloud Hosting Platforms: QoS Negotiation Admission Control, Pricing, SLA Management, Monitoring Cloud Physical Resources: Storage, virtualized clusters, servers, network. Scientific Computing, Enterprise ISV, Social Networking, Gaming Amazon EC2, GoGrid, RightScale, Jovent Animoto, Sales Force, Google Document User Applications User-level and infrastructure level Platform Google AppEngine, MapReduce, Aneka, Microsoft Azure Infrastructure SaaS PaaS CloudEconomy 149
  • 150.
  • 151.
  • 152. Master Node Private Cloud (Heterogeneous Resources) Slave Nodes Slave Nodes (Cluster) User User Middleware Public Cloud (IaaS) Hybrid Cloud
  • 153.
  • 154.
  • 155.
  • 156.
  • 157. What is the cloud?  IT as a service  Cloud allows access to services without user technical knowledge or control of supporting infrastructure  Best described in terms of what happened to mechanical power over 100 yrs ago  Now computers are simple devices connected to the larger cloud  Data processing, storage and software applications that used to run locally are now being supplied by big central computing stations. They're becoming, in essence, computing utilities. What is Cloud Computing? 157
  • 158. What is cloud and cloud computing? Cloud Demand resources or services over Internet scale and reliability of a data center.
  • 159. What is cloud and cloud computing? Cloud computing Is a style of computing in which dynamically scalable and often virtualized resources are provided as a serve over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them.
  • 161. Why Cloud Computing? • Pay per use • Instant Scalability • Security • Reliability • APIs
  • 162. Characteristics of cloud computing • Virtual software, databases, Web servers,operating systems, storage and networking as virtual servers. • On demand add and subtract processors, memory, network bandwidth, storage.
  • 163. Cloud Features & Benefits for Users Highly virtualized and standardized infrastructures Massive scalability Fault tolerant & highly reliable Intra- & Inter-cloud load balance No need to install or update SW or HW; access from any browser Unlimited use Always on Access from anywhere Many services to choose from 163
  • 164. 164
  • 165. IaaS Infrastructure as a Service PaaS Platform as a Service SaaS Software as a Service
  • 166. SaaS Software as a Service
  • 167. Software delivery model: • Increasingly popular with SMEs • No hardware or software to manage • Service delivered through a browser SaaS
  • 168. Advantages: • Pay per use • Instant Scalability • Security • Reliability • APIs SaaS
  • 169. Examples • CRM • Financial Planning • Human Resources • Word processing Commercial Services: • Salesforce.com • email cloud SaaS
  • 170. Examples: • Your current CRM package is not managing the load or you simply don’t want to host it in-house. Use a SaaS provider such as Salesforce.com • Your email is hosted on an exchange server in your office and it is very slow. Outsource this using Hosted Exchange. 170 SaaS
  • 171. 171
  • 172. PaaS Platform as a Service
  • 173. Platform delivery model: • Platforms are built upon Infrastructure, which is expensive • Estimating demand is not a science! • Platform management is not fun! PaaS
  • 174. Popular services: • Storage • Database • Scalability PaaS
  • 175. Advantages: • Pay per use • Instant Scalability • Security • Reliability • APIs PaaS
  • 176. Examples: • Google App Engine • Mosso • AWS: S3 PaaS
  • 177. Examples: • You need to host a large file (5Mb) on your website and make it available for 35,000 users for only two months duration. Use Cloud Front from Amazon. • You want to start storage services on your network for a large number of files and you do not have the storage capacity…use Amazon S3. 177 PaaS
  • 178. 178
  • 179. IaaS Infrastructure as a Service 179
  • 180. Examples: • You want to run a batch job but you don’t have the infrastructure necessary to run it in a timely manner. Use Amazon EC2. • You want to host a website, but only for a few days. Use Flexi scale. IaaS 180
  • 181. 181
  • 182. 182
  • 183. 183
  • 184. Administration (ARACNE) • Hosted in the Databanx facility in Newcastle • Over £250,000 invested • Redundant hardware 184
  • 185. 185
  • 186. 186
  • 187. 187
  • 188. Advantages of Cloud Computing Instant software updates:  Another advantage to cloud computing is that you are no longer faced with choosing between obsolete software and high upgrade costs.  When the application is web-based, updates happen automatically - available the next time you log into the cloud.  When you access a web-based application, you get the latest version - without needing to pay for or download an upgrade.  Improved document format compatibility.  You do not have to worry about the documents you create on your machine being compatible with other users' applications or operating systems.  Where Word 2007 documents cannot be opened on a computer running Word 2003, all documents can be read!  There are potentially no format incompatibilities when everyone is sharing documents and applications in the cloud. 188
  • 189. Advantages of Cloud Computing  Lower computer costs:  You do not need a high-powered and high-priced computer to run cloud computing's web-based applications.  Since applications run in the cloud, not on the desktop PC, your desktop PC does not need the processing power or hard disk space demanded by traditional desktop software.  When you are using web-based applications, your PC can be less expensive, with a smaller hard disk, less memory, more efficient processor...  In fact, your PC in this scenario does not even need a CD or DVD drive, as no software programs have to be loaded and no document files need to be saved. 189
  • 190. Advantages of Cloud Computing  Improved performance:  With few large programs hogging your computer's memory, you will see better performance from your PC.  Computers in a cloud computing system boot and run faster because they have fewer programs and processes loaded into memory…  Reduced software costs:  Instead of purchasing expensive software applications, you can get most of what you need for free-ish!  That is right - most cloud computing applications today, such as the Google Docs suite, are totally free.  That is a lot better than paying $200+ for similar Microsoft Office software - which alone may be justification for switching to cloud applications. 190
  • 191. Advantages of Cloud Computing  Unlimited storage capacity:  Cloud computing offers virtually limitless storage.  Your computer's current 200 Gbyte hard drive is small compared to the hundreds of Pbytes available in the cloud.  Whatever you need to store, you can.  Increased data reliability:  Unlike desktop computing, in which if a hard disk crashes and destroy all your valuable data, a computer crashing in the cloud should not affect the storage of your data.  That also means that if your personal computer crashes, all your data is still out there in the cloud, still accessible.  In a world where few individual desktop PC users back up their data on a regular basis, cloud computing is a data-safe computing platform! 191
  • 192. Advantages of Cloud Computing  Universal document access:  That is not a problem with cloud computing, because you do not take your documents with you.  Instead, they stay in the cloud, and you can access them whenever you have a computer and an Internet connection.  All your documents are instantly available from wherever you are.  Latest version availability:  Another document-related advantage of cloud computing is that when you edit a document at home, that edited version is what you see when you access the document at work.  The cloud always hosts the latest version of your documents; as long as you are connected, you are not in danger of having an outdated version. 192
  • 193. Advantages of Cloud Computing  Easier group collaboration:  Sharing documents leads directly to better collaboration.  Many users do this as it is an important advantages of cloud computing - multiple users can collaborate easily on documents and projects.  Because the documents are hosted in the cloud, not on individual computers, all you need is an Internet connection, and you are collaborating.  Device independence:  You are no longer tethered to a single computer or network.  Changes to computers, applications and documents follow you through the cloud.  Move to a portable device, and your applications and documents are still available. 193
  • 194. Disadvantages of Cloud Computing  Requires a constant Internet connection:  Cloud computing is impossible if you cannot connect to the Internet.  Since you use the Internet to connect to both your applications and documents, if you do not have an Internet connection you cannot access anything, even your own documents.  A dead Internet connection means no work and in areas where Internet connections are few or inherently unreliable, this could be a deal-breaker.  When you are offline, cloud computing simply does not work. 194
  • 195. Disadvantages of Cloud Computing  Does not work well with low-speed connections:  Similarly, a low-speed Internet connection, such as that found with dial-up services, makes cloud computing painful at best and often impossible.  Web-based applications require a lot of bandwidth to download, as do large documents.  If you are labouring with a low-speed dial-up connection, it might take seemingly forever just to change from page to page in a document, let alone to launch a feature-rich cloud service.  In other words, cloud computing is not for the broadband-impaired! 195
  • 196. Disadvantages of Cloud Computing  Can be slow:  Even with a fast connection, web-based applications can sometimes be slower than accessing a similar software program on your desktop PC.  Everything about the program, from the interface to the current document, has to be sent back and forth from your computer to the computers in the cloud.  If the cloud servers happen to be backed up at that moment, or if the Internet is having a slow day, you would not get the instantaneous access you might expect from desktop applications. 196
  • 197. Disadvantages of Cloud Computing  Features might be limited:  This situation is bound to change, but today many web-based applications simply are not as full-featured as their desktop-based applications.  For example, you can do a lot more with Microsoft PowerPoint than with Google Presentation's web-based offering.  The basics are similar, but the cloud application lacks many of PowerPoint's advanced features.  If you are a power user, you might not want to leap into cloud computing just yet. 197
  • 198. Disadvantages of Cloud Computing  Stored data might not be secure:  With cloud computing, all your data is stored on the cloud.  The questions is How secure is the cloud?  Can unauthorised users gain access to your confidential data?  Cloud computing companies say that data is secure, but it is too early to be completely sure of that.  Only time will tell if your data is secure in the cloud.  Stored data can be lost:  Theoretically, data stored in the cloud is safe, replicated across multiple machines.  But on the off chance that your data goes missing, you have no physical or local backup.  Put simply, relying on the cloud puts you at risk if the cloud lets you down.198
  • 199. Disadvantages of Cloud Computing  HPC Systems:  Not clear that you can run compute-intensive  HPC applications that use MPI/OpenMP!  Scheduling is important with this type of application – as you want all the VM to be co-located to minimise communication latency!  General Concerns:  Each cloud systems uses different protocols and different APIs… so it may not be possible to run applications between cloud based systems.  Amazon has created its own DB system (not SQL 92), and workflow system (many popular workflow systems out there) – so your normal applications will have to be adapted to execute on these platforms. 199
  • 200. -Pay-as-you- USE -Subscription fee is based on the number of users per month -Minimal Cost for annual subscription IT/application resources -Faster implementation and Productivity optimization -More control over relationship with vendor -Better risk sharing with vendor -Exit options are simple and easy 200 On premise vs. SaaS -Capital Expenses- You pay upfront Annual maintenance costs -Cost for applications, maintenance, infrastructure, Database server and IT/application resources -Time taken to install is much higher & configure applications -Not much control over vendor after purchase -You are responsible for the management of the software installed -Customers may be on many different releases of the software -Upgrading to the newer version of the software could cost you Licensed Software Software-as-a-Service (SaaS) Solutions
  • 201. Location based service (LBS) will become a 13B business by 2013
  • 202. 202
  • 203. 203 Top Reasons Why you should consider SaaS? OPEX not CAPEX: • “Pay as you go” operational expense rather than a capital expenditure • A subscription-based on usage metrics (instead of a perpetual license) Lower cost-of-business solution ownership Predictability of costs over time The management, support, and upgrading of the software and the infrastructure that supports it is the responsibility of the solution provider Economic Reasons More rapid access to state- of-the-art technology Highly responsive and scalable (upwards and downwards) solutions that cover entire business processes • Greater ability to scale as business needs change User access to the application is over the Internet • Ubiquitous and relatively inexpensive Flexible and customizable solutions Functional Reasons Reliable access to data, anywhere, anytime Increased risk mitigation with better support for compliance More rapid time-to- production Improved security, performance, and availability Avoidance of vendor lock- in Shift in focus to core business management, rather than disproportionate attention on the computer environment; redeploy headcount to strategic IT initiatives Expected Results
  • 204. 7.Analyzing TCO Cost Drivers. Cost Drivers Traditional On-Premises Software Cloud Application Capital Expenses Upfront purchase of software and hardware May require network infrastructure enhancements, facilities Need to support third party monitoring, test tools, security products None Pay-as-you-go subscription pricing All inclusive: maintenance, support, training, and upgrades all hardware, networking, storage, database, administration Design and Deployment May take months to deploy Professional services can cost up to 3X the initial software purchase Difficult for vendor to build best practices Requires staff or contract labor to research, design, integrate, test, tune, launch, and train Deploy in weeks Lower cost using consistent set of best practices Ongoing Infrastructure Ongoing software maintenance, upgrades Ongoing hardware replacement once every three years Requires a network monitoring and management tools May require additional networking equipment and bandwidth to accommodate incremental traffic The vendor provides as part of the subscription
  • 205. # Item On Premise SAAS Number Value Number Value 1 Infrastructure 29,000.00 - 1.1 Servers with OS 2 6,000.00 0 - 1.2 Software licenses ( Database) 1 4,000.00 0 - 1.3 Internal server security 1 2,000.00 0 -
  • 206. # Item On Premise SAAS Number Value Number Value 1.4 Backup 1 2,000.00 0 - 1.5 DR site 1 5,000.00 0 - 1.6 Other overheads 1 10,000.00 2 Software 100,000.00 2.1 License fee 1 80,000.00 0 -
  • 207. # Item On Premise SAAS Number Value Number Value 2.2 ESS licenses (cal) 50 20,000.00 0 - 3 Setup 1 150,000.00 100,000.00 3.1 Installation and setup 100 150,000.00 60 90,000.00
  • 208. # Item On Premise SAAS Number Value Number Value Total one time cost 279,000.00 100,000.00 4 Recurring cost 225,000.00 300,000.00 4.1 Annual maintenance -5 yrs @ 20% 5 80,000.00 0 -  
  • 209. # Item On Premise SAAS Number Value Number Value 4.2 Monthly subscription -5 yrs @10 $ 0 - 500 300,000.00 4.3 Server maintenance 5 25,000.00 0 4.5 Resource overheads 5 120,000.00 Total cost for 5 years 504,000.00 400,000.00 Total saving $ 104,000.00
  • 210.
  • 211.
  • 212.
  • 213.
  • 214.
  • 215.
  • 216.
  • 217. Thank You Prepared by: Eng.Assem Abdelhamid Mouse 217

Hinweis der Redaktion

  1. <number>
  2. <number>
  3. <number>
  4. <number> In the Ubiquitous learning campus atmosphere Individualized Learning Environment can also be supported using RFID enabled learning where in RFID tagged Labs, Library etc enable the learner with awareness as well as elaborate learning in that specific area. RFID enabled monuments in any location help in acquiring detailed knowledge pertaining to them. Similarly for a science student with a specialization in botanical sciences RFID enabled botanical environment can be of extensive use in studying various trees present in any botanical environment.
  5. <number> The most precious resource in a computer system is no longer its processor, memory, disk or network. Rather, it is a resource not subject to Moore's law: User Attention. Today's systems distract a user in many explicit and implicit ways, thereby reducing his effectiveness. Project Aura will fundamentally rethink system design to address this problem. Aura's goal is to provide each user with an invisible halo of computing and information services that persists regardless of location. Meeting this goal will require effort at every level: from the hardware and network layers, through the operating system and middleware, to the user interface and applications. Project Aura will design, implement, deploy, and evaluate a large-scale system demonstrating the concept of a “personal information aura” that spans wearable, handheld, desktop and infrastructure computers. PROJECT WEBSITE: http://www.cs.cmu.edu/~aura/
  6. <number> The most precious resource in a computer system is no longer its processor, memory, disk or network. Rather, it is a resource not subject to Moore's law: User Attention. Today's systems distract a user in many explicit and implicit ways, thereby reducing his effectiveness. Project Aura will fundamentally rethink system design to address this problem. Aura's goal is to provide each user with an invisible halo of computing and information services that persists regardless of location. Meeting this goal will require effort at every level: from the hardware and network layers, through the operating system and middleware, to the user interface and applications. Project Aura will design, implement, deploy, and evaluate a large-scale system demonstrating the concept of a “personal information aura” that spans wearable, handheld, desktop and infrastructure computers. PROJECT WEBSITE: http://www.cs.cmu.edu/~aura/
  7. <number> The most precious resource in a computer system is no longer its processor, memory, disk or network. Rather, it is a resource not subject to Moore's law: User Attention. Today's systems distract a user in many explicit and implicit ways, thereby reducing his effectiveness. Project Aura will fundamentally rethink system design to address this problem. Aura's goal is to provide each user with an invisible halo of computing and information services that persists regardless of location. Meeting this goal will require effort at every level: from the hardware and network layers, through the operating system and middleware, to the user interface and applications. Project Aura will design, implement, deploy, and evaluate a large-scale system demonstrating the concept of a “personal information aura” that spans wearable, handheld, desktop and infrastructure computers. PROJECT WEBSITE: http://www.cs.cmu.edu/~aura/
  8. <number> The most precious resource in a computer system is no longer its processor, memory, disk or network. Rather, it is a resource not subject to Moore's law: User Attention. Today's systems distract a user in many explicit and implicit ways, thereby reducing his effectiveness. Project Aura will fundamentally rethink system design to address this problem. Aura's goal is to provide each user with an invisible halo of computing and information services that persists regardless of location. Meeting this goal will require effort at every level: from the hardware and network layers, through the operating system and middleware, to the user interface and applications. Project Aura will design, implement, deploy, and evaluate a large-scale system demonstrating the concept of a “personal information aura” that spans wearable, handheld, desktop and infrastructure computers. PROJECT WEBSITE: http://www.cs.cmu.edu/~aura/
  9. <number> The most precious resource in a computer system is no longer its processor, memory, disk or network. Rather, it is a resource not subject to Moore's law: User Attention. Today's systems distract a user in many explicit and implicit ways, thereby reducing his effectiveness. Project Aura will fundamentally rethink system design to address this problem. Aura's goal is to provide each user with an invisible halo of computing and information services that persists regardless of location. Meeting this goal will require effort at every level: from the hardware and network layers, through the operating system and middleware, to the user interface and applications. Project Aura will design, implement, deploy, and evaluate a large-scale system demonstrating the concept of a “personal information aura” that spans wearable, handheld, desktop and infrastructure computers. PROJECT WEBSITE: http://www.cs.cmu.edu/~aura/
  10. <number> PROJECT WEBSITE:http://portolano.cs.washington.edu/
  11. <number> PROJECT WEBSITE:http://portolano.cs.washington.edu/
  12. <number> PROJECT WEBSITE:http://portolano.cs.washington.edu/
  13. <number> PROJECT WEBSITE:http://portolano.cs.washington.edu/
  14. <number>
  15. 1/16/16 <number> Work on ubiquitous computing is still at an early phase. Most work now is concentrating on the mobile infrastructure for wireless networking. Because ubiquitous computing envisions hundreds of wireless computers in every office, its need for wireless bandwidth is prodigious. A second challenge of the mobile infrastructure is handling mobility. Networking developed over the past twenty years with the assumption that a machine's name, and its network address, were unvarying. However, once a computer can move from network to network this assumption is false. Existing protocols such as TCP/IP and OSI are unprepared for to handle machine mobility without change. A number of committees and researchers are now working on methods of augmenting or replacing existing protocols to handle mobility. A third challenge of the mobile infrastructure is window systems. Most window systems, such as those for the Macintosh and for DOS, are not able to open remote windows over a network. Even window systems designed for networking, such as X, have built into them assumptions about the mobility of people. The X window system protocol, for instance, makes it very difficult to migrate the window of a running application from one screen to another Ubiquitous computing will require a new approach to fitting technology to our lives, an approach we call "calm technology". CALM tech: The most potentially interesting, challenging, and profound change implied by the ubiquitous computing era is a focus on calm. If computers are everywhere they better stay out of the way, and that means designing them so that the people being shared by the computers remain serene and in control. Calmness is a new challenge that UC brings to computing. When computers are used behind closed doors by experts, calmness is relevant to only a few. Computers for personal use have focused on the excitement of interaction. But when computers are all around, so that we want to compute while doing something else and have more time to be more fully human “The Perifery: when driving our attention is centered on the road, the radio, our passenger, but not the noise of the engine. But an unusual noise is noticed immediately, showing that we were attuned to the noise in the periphery, and could come quickly to attend to it. A calm technology will move easily from the periphery of our attention, to the center, and back. This is fundamentally encalming, for two reasons. First, by placing things in the periphery we are able to attune to many more things than we could if everything had to be at the center. Second, by recentering something formerly in the periphery we take control of it. Not all technology need be calm. A calm videogame would get little use; the point is to be excited. We must learn to design for the periphery so that we can most fully command technology without being dominated by it. DANGLING STRING - Created by artist Natalie Jeremijenko, the "Dangling String" is an 8 foot piece of plastic spaghetti that hangs from a small electric motor mounted in the ceiling. The motor is electrically connected to a nearby Ethernet cable, so that each bit of information that goes past causes a tiny twitch of the motor. A very busy network causes a madly whirling string with a characteristic noise; a quiet network causes only a small twitch every few seconds. INNER OFFICE WINDOWS - The hallway window extends our periphery by creating a two-way channel for clues about the environment. Whether it is motion of other people down the hall (its time for a lunch; the big meeting is starting), or noticing the same person peeking in for the third time while you are on the phone (they really want to see me; I forgot an appointment), the window connects the person inside to the nearby world.
  16. <number> And we have one of the largest distributed network in the world -- we have deployed 120000 servers in all major continents and in more than 120 countries.
  17. <number>
  18. Microsoft showed how Gen 4 characteristics could be put in place in both the company's smaller data centers and in its mega-data centers. The portion of the video showing off the Gen 4 mega-data center almost looks like a series of interconnected tiny power plants. <number>
  19. <number>
  20. Cloud computing is a new paradigm and people are saying it will revolutionize the IT industry. It provides all IT needs through three services: SaaS, PaaS and IaaS
  21. <number>
  22. <number>
  23. Aleric partners with Global Enterprises to further their business interests utilizing Cloud Computing. We provide technology and services where cloud-based business applications can be timely deployed and tailored to our partner’s needs - by market or industry. Aleric cloud platform is unique in its formation and history – combining over a decade of industry experience in Global Management, Enterprise Security, and Virtualization. Aleric offers a consulted approach that works in partnership, teamwork, and mutually beneficial ways to ensure the success and best-practice/ROI of our partners. <number>
  24. <number>
  25. Aleric partners with Global Enterprises to further their business interests utilizing Cloud Computing. We provide technology and services where cloud-based business applications can be timely deployed and tailored to our partner’s needs - by market or industry. Aleric cloud platform is unique in its formation and history – combining over a decade of industry experience in Global Management, Enterprise Security, and Virtualization. Aleric offers a consulted approach that works in partnership, and mutually beneficial ways to ensure the success and best-practice/ROI of our partners. <number>
  26. <number>
  27. <number>
  28. <number>