Ubiquitous computing Spring 2008 Presented By: Ishita Trivedi.

Slides:



Advertisements
Similar presentations
P2 – Describe the purpose of different types of computer systems
Advertisements

Automation of the home, housework or household activity. Linked systems/appliances to centralized control. Remote monitoring of the home from a tabletop.
Sharing Content and Experience in Smart Environments Johan Plomp, Juhani Heinila, Veikko Ikonen, Eija Kaasinen, Pasi Valkkynen 1.
Integrating Educational Technology into the Curriculum
Ying Wang EDN 303 Fall Objectives Define curriculum-specific learning Explain the difference between computer, information, and integration literacy.
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
Component-Based Software Engineering Oxygen Paul Krause.
Computing Fundamentals Module A © CCI Learning Solutions Inc. 1 Unit 1: Recognizing Computers Lesson Topic 1Computers All Around Us 2Elements of a Personal.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
HCI Futures UQI120S2. What are the challenges? New hardware devices New software techniques New user expectations Better psychology More connectivity.
Ubiquitous Computing Computers everywhere. Agenda Old future videos
Patrik Werle Gregory D. Abowd The Future Computing Environments (FCE) Group, Georgia Institute of Technology Ubiquitous Computing: Research.
Finale’ cs294-8 Design of Deeply Networked Systems Spring 2000 David Culler & Randy Katz U.C. Berkeley
Ubiquitous Computing Computers everywhere.
B1051 Fundementals of Information Technology (Intro)
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
Personalized Medicine Research at the University of Rochester Henry Kautz Department of Computer Science.
Learning Micro-Behaviors In Support of Cognitive Assistance AlarmNet is a wireless sensor network (WSN) system for smart health-care that opens up new.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
Lecture 4: Mobile Computing
Hardware -Computer Organization. Hardware & Software A computer system consists of A computer system consists of –Hardware: anything you can touch, smell,
Introduction to Computers
Your Interactive Guide to the Digital World Discovering Computers 2012.
Pervasive & Ubiquitous Computing
Alternative Input Devices Part B There will be a test on this information (both part a & b).
1 10 THE INTERNET AND THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE.
Integrating Educational Technology into the Curriculum
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
Information Technology Ms. Rocío Acevedo August 2006.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Some Computer Science Issues in Ubiquitous Computing Presenter : Junghee-Han Mark Weiser Communications of the ACM, July 1993.
CHAPTER FOUR COMPUTER SOFTWARE.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
Introduction to Interactive Media Interactive Media Tools: Software.
Information Technology HARDWARE Dr. GUVEN Aerospace Engineer (P.hD) Nuclear Science and Technology Engineer (M.Sc)
1 Chapter 7 Designing for the Human Experience in Smart Environments.
Comp 15 - Usability & Human Factors Unit 9 - Ubiquitous Computing in Healthcare This material was developed by Columbia University, funded by the Department.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
$20 billion business 230 million printers sold  170 million inkjet  60 million laserjet #1 in ink, laser, scanners, designjet, print servers Consistent.
Trends in Embedded Computing The Ubiquitous Computing through Sensor Swarms.
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
Computer Architecture and Embedded Systems Paul Havinga University of Twente.
Ubiquitous computing. Types of Computing 1. Mainframe era (many people, one computer) 2. PC era (one person, one computer) transition phase ( the internet,
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Defining the terms assignment. I will define the following terms: computer literate, computer, storage, Data, Information, input, output, information processing.
Ubiquitous Computing Computers everywhere. Wednesday: presentations Ideal Concepts T.H.E. Team Infused Industries CommuniCORP Part 3 DUE!
An Intelligent Expert System for Proactive Services Deploying Ubiquitous Computing Technologies IEEE 2005 Proceedings of the 38th Hawaii International.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
New Human-Computer Paradigms. New Realities 2 Augmented Reality Enhanced view of a physical world Augmented by computer generated input – Data/Graphics/GPS.
VIRTUAL KEYBOARD By Parthipan.L Roll. No: 36 1 PONDICHERRY ENGINEERING COLLEGE, PUDUCHERRY.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education 1A-1 Chapter 1 Introducing Computer Systems Instructor.
PRESENTED BY : DIPTIMAYEE PADHIHARI  Introduction to wearable computers  Aim of wearable computing  History of wearable computers  Wearable computing.
Internet of Things – Getting Started
Mobile Networks & Computing Mobile computing : Some Definitions 1 NYANZI A CCNP,CCNAI,CCNA, A+, MIT-SANA, MBA_IT.
Computer Information Systems
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
1st Draft for Defining IoT (1)
Mobile Computing.
Principles/Paradigms Of Pervasive Computing
Ubiquitous Computing By: Patrick Yienger.
Smart Learning concepts to enhance SMART Universities in Africa
Sensor Networks – Motes, Smart Spaces, and Beyond
Presentation transcript:

Ubiquitous computing Spring 2008 Presented By: Ishita Trivedi

What is Ubiquitous Computing (ubicomp)  Ubicomp is a post-desktop model of human computer interaction in which information processing has been thoroughly integrated into everyday objects and activities.  Integrate computers seamlessly into the world – invisible, everywhere computing. – Often called pervasive/invisible computing.  Computers are mostly not invisible, t hey dominate interaction with them.  Ubicomp is about making computers invisible.

Ubiquitous computing = mobile computing + intelligent environment. Technology View  Computers everywhere – embedded into fridges, washing machines, door locks, cars, furniture.  Intelligent environment.  Mobile portable computing devices  Wireless communication – seamless mobile/fixed. User View  Invisible – implicit interaction with your environment.  Augmenting human abilities in context of tasks

Ubicomp vs. Virtual Reality  Should we live in virtual computing world? Or should computing come out and live in our physical world?  VR is about simulating physical world & putting people inside virtual computing world. (Limited applications & activities.).  Ubicomp is about bringing computing to people’s physical world, integrating with everyday objects and activities.  Ubiquitous computing is an integration of human factors, computer science, engineering, and social sciences.

Ubiquitous, Mobile, and Nomadic Computing  Nomadic computing: “portable”; no mobility while connected.  Mobile computing: “on-the-go”, e.g., while sitting on a train; possibility of network connections remaining open.  Ubiquitous computing: computing everywhere… OR computers everywhere…most of them invisible

Intelligence  Computing embedded and enhancing physical objects.  Achieve intelligence through interconnection of physical objects.  Achieve intelligence through location awareness (without AI) For example: Automated call forwarding (context awareness – should where the person is) lighting control  smart sensor wall -  control heating and lighting.

Early work Tabs:  very small – smart badge with user info, calendar, diary, etc.  allow personalized settings to follow a user  Carried around by a person  Hundreds in a room  Remote controllers  Badges  Tags / Labels (RFID)  Locating system (tags as library catalogs)  Animate static physical objects (active calendar, active map)

Pads:  Foot-scale Ubicomp devices  A sheet of paper / tablet PC.  Portable computers but not laptop metaphor  Tens in a room  Like scrap papers that can be grabbed and used anywhere, no unique ID.

Boards:  larger display – whiteboard size.  Personalized electronic bulletin boards.  Multiple pens.  Meeting capture.  Lots of bandwidth available because they’re plugged into the wall  White board with e-chalk Shared white board with remote participants.  Video screen.  Electronic Bookcases

Current technology Portable information appliances – laptops, notebooks, and sub-notebooks – hand-held computers – PDAs and smart phones Wireless communication networks – multiple networks “covering” the globe Internet: – TCP/IP& de-facto application protocols

Usability  Common user interface for workstation and mobile device applications.  Adaptive information display.  Flexible voice based input-output.  Voice recognition + text to speech conversion.  Gesture recognition.  Intelligent agents

Mobile computing  Mobile computing -  wireless transmission.  Uses a computing device.  Many types of mobile computers have been introduced since the 1990s, including the: Personal digital assistant Enterprise digital assistant Smart phone UMPC

Mobile computing Vision  Universal connectivity – anywhere, anytime  Accommodate heterogeneity of networks and communicators.  Ubiquitous intelligent environment - embedded computers everywhere  Easy user interaction  Context independent access to services + context dependent information

Issues  How to integrate mobile communicators into complex information infrastructures?  What effect will they have on work and leisure?  Privacy  How to develop and manage adaptable, context-aware software systems?  What support is needed within the network?  Power supplies

Integration of Mobile Systems  Not stand alone devices. Need to interact with complex legacy information systems eg large databases – merging updates, displaying tables etc.  Systems development Requirements specification for adaptable systems Component composition to meet global QoS, security, reliability & performance requirements.  Mobility models Behaviour specification and analysis Modelling context aware systems

Context Aware Computing It is powerful and longlasting, concept in human computer interaction. Interaction with computation is by explicit acts of communication (e.g. pointing to a menu item), context is implicit (e.g. default setting). Goal of context-aware computing is to acquire and utilize information about the context of a device to provide services that are appropriate to the particular people, place, time, events, etc. For example, a cell phone will always vibrate and never beep in a concert, if the system can know the location of the cell phone and the concert schedule

Context Adaptation A context adaptive system enables the user to maintain a Certain application (in different forms) while roaming between different wireless access technologies, locations, devices and even simultaneously executing everyday tasks like meetings, driving a car etc.

Issues : Context Awareness  Current location Need location detection e.g. GPS or base station Indoors – radio beacon, IR.  User activity Walking, driving a car, running for a bus – how to detect this?  Ambient environment In theatre, alone, in meeting  Local resources or services available Device capabilities  Screen, input, processing power, battery life ….  Current QoS availability – particularly for radio links

Intelligent Environment  An intelligent environment is a location (e.g. home, office, hospital, etc) that is equipped with sensors, actuators and computers that are networked with each other and the internet.  The components are controlled by "intelligent agent" software that knows the preferences of the occupants.  It tailors the environment to suit them.  The occupants can talk to the environment using speech and natural language and the sensors can monitor the environment.

Smart Dust  Autonomous sensing and communication in a cubic millimeter – “dust motes”.  "Smart dust" devices are tiny wireless micro electro mechanical sensors (MEMS) that can detect everything from light to vibrations.  Sensors for temperature, humidity, light, motion …. with bidirectional radio or laser + battery.  Typical Applications: -- Defence related battlefield sensors, motion detectors etc. -- Inventory control on boxes which communicate with trucks, plane etc to tell you where they are. -- Product quality monitoring – vibration, humidity, overheating. -- Car component monitoring.

Smart Dust Components

Smart Dust  Smart paint monitors vibrations and detect intruders.  Changes colour to react to temperature, lighting etc.  Intelligent glass can filter sunlight, become opaque no need for curtains.  Smart garments or injectable sensors for people monitoring.

Issues  What means of communication? Radio Light based  Batteries would be impractical power source for 100K processors per person.  Solar cells are not suitable for all environments.  Solar cells, fuel cells, body heat power?  Power not speed is the key issue for future processor designs.

Major Challenges Hardware Prototype Issue: Power consumption: impossible to change batteries to many ubicomp devices frequently.  Balance of HW/SW feature: display, network, processing, memory, storage capability, multitasking, QoS, etc.  Ease of expansion & modification (integration vs. modular design).

Network Issue:  Wireless Media Access (802.11, Bluetooth, Cellular Networks).  Quality of Services (RSVP, etc).  Ubicomp devices changing network attachment (Mobile IP).

Application Issue:  “Applications are of course the whole point of ubiquitous computing”.  Locating people (active badges) Automated call forwarding Tracking down people for meeting Watching general activity in a building (feel in touch with surrounding environments)  Shared drawing in virtual meeting Scalability to 5000 peoples (multicast for bandwidth efficiency)

Security  Interactions will be cross multiple organisational boundaries specification, analysis and integration for heterogeneous OS, databases, firewalls, routers.  Everything worth hacking gets hacked.  Need for secure ‘out of the box’ set up that can identify friend or foe -  level of trust.  Small communicators, with confidential data, are easily lost or stolen – biometric authentication.  Necessary security technology exists.

Privacy  Location service tracks movement to within metres.  Clearly indicate you are being sensed or recorded + user control to stop recording or control distribution of information.  You are now predictable System can co-relate location, context and behaviour patterns  Do you want employer, colleagues or insurance company to know you carry a medical monitor?  Tension between authentication and anonymity – business want to authenticate you for financial transactions and to provide ‘personalized’ service web sites.  Constant spam of context dependent advertising

Management  Huge, complex systems Billions of processors Multiple organisations Managing physical world, controlling sensors, actuators  Hacker and virus paradise  System propagates false information about individuals or organisation.  Complexity of s/w installation on a workstation or server – how do you cope with billions?

Proposed Management Solution  Intelligent agents, mobile agents, policy.  QoS Management Fat pipes and large storage can convert media streams to short traffic bursts in core network but still needed for wireless links.  Adaptive self-management is the only answer Partitioned domains of responsibility Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions for short term decision making

Video Links Presentation – The dawning age of ubiquitous computing By Adam Greenfield        

Questions???

References