28-07-2012, 03:33 PM
ROVER TECHNOLOGY
ROVER BEST AFTER PROGRESS.ppt (Size: 2.4 MB / Downloads: 31)
ROVER TECHNOLOGY
BACKGROUND
At the core of invisible computing is context awareness, the concept of sensing and reacting to dynamic environments and activities. Location is a crucial component of context, and much research in the past decade has focused on location-sensing technologies, location-aware application
CONT….
support, and location-based applications. With numerous factors driving deployment of sensing technologies, location-aware computing may soon become a part of everyday life.
ROVER TECHNOLOGY
INTRODUCTION
The technology which enables the scalable location-aware computing. This involves automatic availability of information and services based on a current location of the user. The user make avail location-aware computing through his PDA (Personal Digital Assistance).
CONT…..
Available via a variety of wireless access technologies (IEEE 802.11 wireless LANs, Bluetooth, Infrared, cellular services, etc.) and devices (laptop, PDA, cellular phone, etc.), and allows roaming between the different wireless and device types. Rover dynamically chooses between different wireless links and tailors application-level information based on the device and link layer technology.
PURPOSE
To provide service and information based on the current location of the user.
Available service and information for user at anytime and anywhere.
Client can communicate easily with suppliers.
Provide clearly service information to the client.
BASIC ROVER SERVICES
1.Basic data services: Rover enables a basic set of data services in different media formats, including text, graphics, audio, and video.
2. Transactional services:These services have commit semantics that require coordination of state between the clients and the Rover servers. A typical example is e-commerce interactions.
Cont…
3.LOCATION-AWARE
4 .WIRELESS ACCESS TECHNOLOGIES
5. BASIC DATA SERVICES
6. TRANSACTIONAL SERVICES
7. FILTER
8. ZOOM
9 .TRANSLATE
ROVER ARCHITECTURE
END USERS of the system. Rover maintains a user profile for each end-user, that defines specific interests of the user and is used to customize the content served.
ROVER CLIENTS:are the client devices through which users interact with Rover. They are typically small wireless handheld units with great diversity of capabilities in regard to processing, memory and storage, graphics and display, and network interface.
WIRELESS INFRASTRUCTURE:provides wireless connectivity to the Rover clients. Possible wireless access technologies include IEEE 802.11 based wireless LANs, Bluetooth and Cellular services.
CONT…
SERVERS:implement and manage the various services provided to the end-users. The servers consist of the following:-
Rover Controller: is the “brain” of the Rover system. It provides and manages the different services requested by the Rover clients.
Location Server: is a dedicated unit responsible for managing the client device location services within the Rover system.
CONT..
Media Streaming Unit: provides the streaming of audio and video content to the clients.
Rover Database: stores all content delivered to the Rover clients.
Logger: interacts with all the Rover server devices and receives log messages from their instrumentation modules.
SERVER OPERATION
The transaction is called SERVER OPERATION when a client interacts with the Rover controller. A server operation is a sequence of actions.
SERVER OPERATION
A Server operation is in one of the following three states. They are:-
Ready-to-run: At least one action is eligible to be executed but no action is executing.
Running: One action is executing
Blocked: Server operation is waiting for some I/O response
ROVER CONTROLER
Rover controller interacts with other components of the system through the following interfaces:-
Location Interface
Admin Interface
Content Interface
Back-end Interface
Server Assistants Interface
Transport Interface
System Functionality
The Rover system provides different capabilities to the users, which can be categorized as follows:
System Admin Operations are available only to the authorized system administrator. These set of operations are—register new user/device, update user/device attributes and de-register user/device. The administrator is also able to query the Rover server system about the state and information specific to any and all Rover clients in the system.
User Access Operations are the basic set operations that every user avails to access theRover system. They include the user login and user logout operations.
Trigger Operations allow users to set context-specific alerts. The triggers are activated based on user interests and depend on current time and/or location of the user. An user can enable triggers by specifying the relevant time or space-dependent condition.
Query Operations allow users to acquire information about different aspects of the system and the environment.
Location Update Operation inform the server system about the client’s location using.
Cont..
User activation/deactivation
Device registration /deregistration
Periodic broadcast of events from the rover controller
Interaction between users by text messaging/voice chat
MULTI-ROVER SYSTEM
The multi-rover system is a collection of independent rover systems that peer with each other to provide the seamless connectivity to the users.
The design of a multi-rover system is similar to the Mobile IP solution to provide network mobility to devices.
State of the art
The current implementation of the Rover system has been developed under the Linux operating system. The Rover controller is implemented on a Intel Pentium machine running RedHat Linux 7.1 and the clients are implemented on Compaq iPAQ Pocket PC(model H3650) running the Familiar distribution (release versions 0.4 and 0.5) of Linux for PDAs1.