Alberto Grillo Software Engineering II. Introduction to Ubiquitous Computing History of Ubiquitous Computing Challenges and Requirements Comparison of.

Slides:



Advertisements
Similar presentations
P2 – Describe the purpose of different types of computer systems
Advertisements

Composite Device Computing Environment: A Framework for Situated Interaction Using Small Screen Devices Thai-Lai Pham, Georg Schneider, Stuart Goose and.
Mobile and ubiquitous computing Chapter 16 Distributed systems, concepts and design, 4th edition, 2005, Coulouris et al Ylva-Li Lindh Gabriella Hammarin.
Location-aware Computing By Bonam Kim. Outline Introduction Motivation Location Determination Techniques Location-aware Services Example for Implementation.
1 The Ubiquitous Web Eunchae Yoon. School of Engineering, Eunchae Yoon 2 Contents What is Ubiquitous computing? What is Ubiquitous Web? Ubiquitous computing.
Introduction to Pervasive and Ubiquitous Computing Dr. Tarek Sheltami COE 482.
Your Interactive Guide to the Digital World Discovering Computers Fundamentals, 2012 Edition.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
1 Ubiquitous Computing CS376 Reading Summary Taemie Kim.
HCI Futures UQI120S2. What are the challenges? New hardware devices New software techniques New user expectations Better psychology More connectivity.
An Analysis of The Mobile Market and Location-Based Services What About Wireless…?
Software Engineering Issues for Ubiquitous Computing Author: Gregory D. Abowd, Georgia Institute of Technology CSCI 599 Week 4 Paper 3 September
Mobile and Ubiquitous Computing. Overview Attributes Discussion.
Ubiquitous Computing Computers everywhere. Agenda Old future videos
Patrik Werle Gregory D. Abowd The Future Computing Environments (FCE) Group, Georgia Institute of Technology Ubiquitous Computing: Research.
Leticia Pacheco Information, Technology, The Internet, and You Chapter 1 Information, Technology, The Internet, and You Chapter 1.
Ubiquitous Computing Computers everywhere.
Chapter 2 Introduction to Systems Architecture. Chapter goals Discuss the development of automated computing Describe the general capabilities of a computer.
Discovering Computers Chapter 1 Discovering Computers & Microsoft Office 2010.
Mobile Computing Applications Nour El Kadri Based on Jani Kurhinen Notes.
DCS 891C Research Seminar Summer 2004 July 16, 2004 Richard Harvey
Jan 11, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements Class participation is very important. You will be graded on your involvement in class discussions.
Computers history Created by Magdalena Sarzyńska.
DECT Data Applications Contents DECT Data Application Scenarios DECT Data Interoperability DECT Data Standards DECT Data Trends Conclusions.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Some Computer Science Issues in Ubiquitous Computing Presenter : Junghee-Han Mark Weiser Communications of the ACM, July 1993.
Fall 2002CS/PSY Pervasive Computing Ubiquitous computing resources Agenda Area overview Four themes Challenges/issues Pervasive/Ubiquitous Computing.
Charting Past, Present, and Future Research in Ubiquitous Computing Gregory D. Abowd and Elizabeth D. Mynatt Georgia Institute of Technology LEE SEMUN.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
Lecture 3: Sun: 16/4/1435 Distributed Computing Technologies and Middleware Lecturer/ Kawther Abas CS- 492 : Distributed system.
Information Technology HARDWARE Dr. GUVEN Aerospace Engineer (P.hD) Nuclear Science and Technology Engineer (M.Sc)
Operating Systems. Without an operating system your computer would be useless! A computer contains an Operating System on its Hard Drive. This is loaded.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
Ubiquitous Computing Software Systems.
1 Chapter 7 Designing for the Human Experience in Smart Environments.
Comp 15 - Usability & Human Factors Unit 9 - Ubiquitous Computing in Healthcare This material was developed by Columbia University, funded by the Department.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of 1-1 HCI Human Computer Interaction Week 8.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Human-Computer Interaction
Challenges in UbiComp Take 2 Sushmita Subramanian.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Trends in Embedded Computing The Ubiquitous Computing through Sensor Swarms.
Dr Theodoros N Arvanitis Senior Lecturer, Head of Biomedical Informatics, Signals & Systems Research Laboratory, Department of Electronic, Electrical &
Semantic Gadgets Pervasive Computing Meets the Semantic Web Reza Zakeri Sharif University of Technology.
Some Computer Science Issues in Ubiquitous Computing
Chapter 2 Introduction to Systems Architecture. Chapter goals Discuss the development of automated computing Describe the general capabilities of a computer.
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Living in a Digital World Discovering Computers Fundamentals, 2011 Edition.
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
History of computers By tynan roach Apple  Apple Computer, Inc., is a multinational corporation that creates consumer electronics, personal computers,
COMPSCI 110 Operating Systems
CS6501/ECE6501 IoT Sensors and Systems
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 29 Emerging Technologies and the Generation of Knowledge
Basic Introduction to Computers
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Distributed Systems Bina Ramamurthy 11/12/2018 From the CDK text.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Ambient Intelligence.
Mobile Computing.
Mobile Commerce and Ubiquitous Computing
Principles/Paradigms Of Pervasive Computing
Pervasive Computing Ubiquitous computing resources
Ubiquitous Computing By: Patrick Yienger.
Sensor Networks – Motes, Smart Spaces, and Beyond
Presentation transcript:

Alberto Grillo Software Engineering II

Introduction to Ubiquitous Computing History of Ubiquitous Computing Challenges and Requirements Comparison of Technologies Software Engineering References Summary

What is Characteristics Goals Introduction to Ubiquitous Computing

What is (1/3) the method of enhancing computing use by making many devices (services) available throughout the physical environment, but making them effectively invisible to the user (Mark Weiser)

What is (2/3) tries to construct a universal computing environment (UCE) that conceals:UCE computing instruments devices resources technology invisible to users from applications or customers

computing everywherecomputing everywhere many embedded, wearable, handheld devices communicate transparently to provide different services to the users devices mostly have low power and short- range wireless communication capabilities devices utilize multiple on-board sensors to gather information about surrounding environments What is (3/3)

Characteristics of Ubicomp Applications context-awareness impromptu and volatile interaction interactions among applications are based on specific context

Goals the promise of ubiquitous computing: a life in which our endeavours are powerfully, though subtly, assisted by computers the idealistic visions painted by the ubiquitous computing movement stand in stark contrast to what we see when we boot up our computers each day

Introduction to Ubiquitous Computing History of Ubiquitous Computing Challenges and Requirements Comparison of Technologies Software Engineering Références Summary

History Mark Weiser Experiments History of Ubiquitous Computing

History Active Badge Andy Hopper Xerox PARC Xerox PARC Mark Weiser (until, sadly,April 1999) Calm Technology

Mark Weiser: the father of ubiquitous computing researcher in the Computer Science Lab at Xerox’s PARC (Palo Alto Research Center) first articulated the idea of ubiquitous computing in 1988 has called UC “…highest ideal is to make a computer so imbedded, so fitting, so natural, that we use it without even thinking about it.”

Experiments Tabs Pads Boards Classroom 2000Classroom 2000 SAAMPad (Software Architecture Analysis Method Pad) The Conference Assistant 1988 – 1994 at PARC Xerox

Introduction to Ubiquitous Computing History of Ubiquitous Computing Challenges and Requirements Comparison of Technologies Software Engineering Références Summary

Challenges and Requirements Hardware Applications User Interfaces Networking Mobility Scalability Reliability Interoperability Resource Discovery Privacy and Security

Nanotechnology (1/2) The trend toward miniaturization of computer components down to an atomic scale is known as nanotechnology

Nanotechnology (2/2) Mobile data technology – GSM, GPRS, UMTS, CDMA, WAP, Imode Wireless data technology – Bluetooth, b Internet data technology – IP over optical, Broadband Content services – Web & WAP Applications – Multimedia, Internet messaging

Applications need to have an awareness of their context: main motivation of ubiquitous computing (Weiser 1993) a combination of several factors, including the current location, the current user or if there are any other Ubicomp devices present in the near surroundings

Users Interface The multitude of different Ubicomp devices with their different sizes of displays and interaction capabilities represents another challenge Pen Gesture recognition … Mouse keyboard

Networking WirelessWireless computing refers to the use of wireless technology to connect computers to a network Another key driver for the final transition will be the use of short-range wireless as well as traditional wired technologies

Mobility This behaviour is an inherent property of the ubicomp concept and it should not be treated as a failure Mobility is made possible through wireless communication technologies Problem of disconnectivity!!!

Scalability In a ubiquitous computing environment where possibly thousands and thousands of devices are part of scalability of the whole system is a key requirement All the devices are autonomous and must be able to operate independently a decentralized management will most likely be most suitable

Reliability Thus the reliability of ubiquitous services and devices is a crucial requirement In order to construct reliable systems self- monitoring, self-regulating and self-healing features like they are found in biology might be a solution

Interoperability This will probably be one of the major factors for the success or failure of the Ubicomp vision Use of technology just existed: JINI,CORBA,ecc… This diversity will make it impossible that there is only one agreed standard

Resource Discovery The ability of devices to describe their behaviour to the network is a key requirement. On the other hand, it can not be assumed that devices in a ubiquitous environment have prior knowledge of the capabilites of other occupants.

Privacy and Security In a fully networked world with ubiquitous, sensor-equipped devices several privacy and security issues arise the people in this environment will be worried about their privacy since there is the potential of total monitoring must be understandable by the user and it must be modelled into the system architecture

Introduction to Ubiquitous Computing History of Ubiquitous Computing Challenges and Requirements Comparison of Technologies Software Engineering References Summary

Comparison of Technologies Table shows a list of these APIs and technologies. The original comparison made by Olstad, Ramirez, Brady and McHollan. Without Bluetooth or IrDA.

Introduction to Ubiquitous Computing History of Ubiquitous Computing Challenges and Requirements Comparison of Technologies Software Engineering References Summary

Software Engineering research is inherently empirical and relies on a rapid prototyping development cycle information should be pushed to user based on current task, inferences made about user’s situation as user moves into different environments

Introduction to Ubiquitous Computing History of Ubiquitous Computing Challenges and Requirements Comparison of TechnologiesComparison of Technologies Software Engineering Références Summary

References Mario-Leander Reimer Ubiquitous Computing: Challenges, Requirements and Technologies Staffordshire University April 3, Abowd, G. D. (1999) Software Engineering Issues for Ubiquitous Computing

References Weiser, Gold and Brown The origins of ubiquitous computing research at PARC in the late 1980s IBM Systems Journal, VOL 38, NO 4, Weiser, M. (1991) The Testbed Devices of the Infrastructure for Ubiquitous Computing Project Testbed Devices of the Infrastructure for Ubiquitous Computing Project.htm

References Weiser, M. A complete movie about ubiquitous computing at Xerox PARC Computing Movies.htm Weiser, M. Ubiquitous Computing

References Weiser, Mark The Computer for the 21st Century Scientific American September Weiser, Mark Some Computer Science Issues in Ubiquitous Computing CACM July

References Gregory D. Abowd and Elizabeth D. Mynatt Charting Past, Present, and Future Research in Ubiquitous Computing Georgia Institute of Technology htpp://cc.gatech.edu/fce/pubs/tochi-millenium.pdf

THANKS

Xerox PARC virtual UCE with several interconnected devices such as notepads, blackboards and electronic scrap papers difference from a standard PC: people using these devices do not perceive them as computers anymore and can therefore focus on the actual tasks PARC = Palo Alto Research Center 41 people immersed in ubiquitous computing environment

Experiment at PARC – TAB TAB

Experiment at PARC - PAD Pad

Experiment at PARC – BOARD Liveboard

Tab prototype handheld computer was 2x3x0.5", had a 2 week battery life on rechargeable batteries, and weighed 7 oz used a Phillips 8051 processor with 128k NVRAM featured an external I 2 C external bus, a custom resistive touch screen, and a 128x64 mono display included an infrared base station in the ceiling for LAN connectivity The Tab project is consider by many to be the most significant of the three prototyping efforts

Classroom 2000 Instructors are given the ability to present more information during each lecture, with the goal of providing a deeper learning experience. As a result, students are often drowned with information and forced into a “heads down” approach to learning.

Computing Everywhere Ubiquitous means: present everywhere simultaneously encountered in numerous different instances computers become a useful but invisible force, assisting the user in meeting his needs without getting lost in the way

Wireless Infrastructure (1/2) Technology Advancement – Wide adoption of wireless technology: 67 million mobile professionals by 2002 – Cost for wireless access: comparable to wired networks What does the new Internet provide? – Mobility – Ubiquitous access

Wireless Infrastructure (2/2) What is mobile Internet? – Extension of Internet – Extension of Wireless Services

Wireless Infrastructure – Key Components Mobile data technology – GSM, GPRS, UMTS, CDMA, WAP, Imode Wireless data technology – Bluetooth, b Internet data technology – IP over optical, Broadband Content services – Web & WAP Applications – Multimedia, Internet messaging

Universal Computing Environment The infrastructure of the ubiquitous computing environment may be organized and structured as a cyber equivalent of an ecosystem, a very complex, dynamic infrastructure. A ubiquitous computing system is a integrated system of computing resources, devices, services, and the ubiquitous computing environment (UCE) that provides a communication framework to connect all of the components.

Universal Computing Environment Games Audio DVD PDA PC Wash Machine Lighting Cooker Digital Camera Printer Scanner Disk Drives NOTEBOOK

Universal Computing Environment this architecture was used as the basis for the implementation of BEACH it provides the functionality for synchronous cooperation and interaction with room ware components

Active Badge 1988 smart telephone networks problem of automatically routing telephone calls to the correct place in a building opened up a whole new area of research and helped to realize a new opportunity for context based computing

Calm Technology (1/3) The Major Trends in Computing Mainframe Personal Computer Internet - Widespread Distributed Computing Ubiquitous Computing many people share a computer one computer, one person many computers share each of us... transition to...

Calm Technology (2/3)

Calm Technology (3/3) Today Internet is carrying us through an era of widespread distributed computing towards the relationship of ubiquitous computing, characterized by deeply embedding computation in the world. Ubiquitous computing will require a new approach to fitting technology to our life, an approach we call "calm technology".

Context-Awareness computers will be able to understand enough of a user’s current situation to offer services, resources, or information relevant to the particular context the attributes of context to a particular situation vary widely, and may include the user’s location, current role and other elements the application of context may include any combination of these elements