© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of 1-1 HCI Human Computer Interaction Week 8.

Slides:



Advertisements
Similar presentations
INFORMATION TECHNOLOGY, THE INTERNET, AND YOU
Advertisements

P2 – Describe the purpose of different types of computer systems
Composite Device Computing Environment: A Framework for Situated Interaction Using Small Screen Devices Thai-Lai Pham, Georg Schneider, Stuart Goose and.
Chapter 1:Introduction to the world of computers
Mobile and ubiquitous computing Chapter 16 Distributed systems, concepts and design, 4th edition, 2005, Coulouris et al Ylva-Li Lindh Gabriella Hammarin.
Introduction to Pervasive and Ubiquitous Computing Dr. Tarek Sheltami COE 482.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
HCI Futures UQI120S2. What are the challenges? New hardware devices New software techniques New user expectations Better psychology More connectivity.
An Analysis of The Mobile Market and Location-Based Services What About Wireless…?
Software Engineering Issues for Ubiquitous Computing Author: Gregory D. Abowd, Georgia Institute of Technology CSCI 599 Week 4 Paper 3 September
Ambient Computational Environments Sprint Research Symposium March 8-9, 2000 Professor Gary J. Minden The University of Kansas Electrical Engineering and.
Alberto Grillo Software Engineering II. Introduction to Ubiquitous Computing History of Ubiquitous Computing Challenges and Requirements Comparison of.
Leticia Pacheco Information, Technology, The Internet, and You Chapter 1 Information, Technology, The Internet, and You Chapter 1.
Location Systems for Ubiquitous Computing Jeffrey Hightower and Gaetano Borriello.
Computing ESSENTIALS     Copyright 2003 The McGraw-Hill Companies, Inc CHAPTER Information Technology, the Internet, and You computing ESSENTIALS.
Information Technology, the Internet, and You © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Chapter 2 Introduction to Systems Architecture. Chapter goals Discuss the development of automated computing Describe the general capabilities of a computer.
REVIEW COMPUTER SYSTEMS
A computer is a machine that manipulates data according to a list of instructions There are a lot of terms can be found over the internet related to computer.
Hardware -Computer Organization. Hardware & Software A computer system consists of A computer system consists of –Hardware: anything you can touch, smell,
Mobile Computing Applications Nour El Kadri Based on Jani Kurhinen Notes.
Jan 11, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements Class participation is very important. You will be graded on your involvement in class discussions.
DECT Data Applications Contents DECT Data Application Scenarios DECT Data Interoperability DECT Data Standards DECT Data Trends Conclusions.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
1 1.What Pervasive Computing Is All About 1.1 Times Are Changing Industrial Revolution (19th) The engine and machine were concentrated at those location.
IT 351 Mobile &Wireless Computing Semester 2, Dr. Hala Mokhtar Room 79- 2nd floor.
Some Computer Science Issues in Ubiquitous Computing Presenter : Junghee-Han Mark Weiser Communications of the ACM, July 1993.
Fall 2002CS/PSY Pervasive Computing Ubiquitous computing resources Agenda Area overview Four themes Challenges/issues Pervasive/Ubiquitous Computing.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
Lecture 3: Sun: 16/4/1435 Distributed Computing Technologies and Middleware Lecturer/ Kawther Abas CS- 492 : Distributed system.
Information Technology HARDWARE Dr. GUVEN Aerospace Engineer (P.hD) Nuclear Science and Technology Engineer (M.Sc)
Operating Systems. Without an operating system your computer would be useless! A computer contains an Operating System on its Hard Drive. This is loaded.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
Ubiquitous Computing Software Systems.
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Human-Computer Interaction
Challenges in UbiComp Take 2 Sushmita Subramanian.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Trends in Embedded Computing The Ubiquitous Computing through Sensor Swarms.
Dr Theodoros N Arvanitis Senior Lecturer, Head of Biomedical Informatics, Signals & Systems Research Laboratory, Department of Electronic, Electrical &
Semantic Gadgets Pervasive Computing Meets the Semantic Web Reza Zakeri Sharif University of Technology.
1 11 CHAPTER Information Technology, the Internet, and You computing ESSENTIALS.
Some Computer Science Issues in Ubiquitous Computing
Chapter 2 Introduction to Systems Architecture. Chapter goals Discuss the development of automated computing Describe the general capabilities of a computer.
Welcome to CPS 210 Graduate Level Operating Systems –readings, discussions, and programming projects Systems Quals course –midterm and final exams Gateway.
Describe the characteristics of a personal/desktop computer and its uses, both as a standalone and networked computer Describe the characteristics of a.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
1 Seamless Mobility Tom MacTavish, Vice President The Center for Human Interaction Research Motorola Labs.
computing ESSENTIALS    11 CHAPTER Information Technology, the Internet, and You computing ESSENTIALS
COMPSCI 110 Operating Systems
Computer Information Systems
CS6501/ECE6501 IoT Sensors and Systems
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Desktop/Personal Computer
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Distributed Systems Bina Ramamurthy 11/12/2018 From the CDK text.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Ambient Intelligence.
Information Technology, the Internet, and You
Mobile Computing.
Mobile Commerce and Ubiquitous Computing
Principles/Paradigms Of Pervasive Computing
Ubiquitous Computing By: Patrick Yienger.
Sensor Networks – Motes, Smart Spaces, and Beyond
Presentation transcript:

© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of 1-1 HCI Human Computer Interaction Week 8

What is Ubiquitous Computing the method of enhancing computing use by making many devices (services) available throughout the physical environment, but making them effectively invisible to the user (Mark Weiser)

What is Ubiquitous Computing tries to construct a universal computing environment (UCE) that conceals:UCE computing instruments devices resources technology invisible to users from applications or customers

computing everywherecomputing everywhere many embedded, wearable, handheld devices communicate transparently to provide different services to the users devices mostly have low power and short- range wireless communication capabilities devices utilize multiple on-board sensors to gather information about surrounding environments What is Ubiquitous Computing

Mark Weiser: the father of ubiquitous computing researcher in the Computer Science Lab at Xerox’s PARC (Palo Alto Research Center) first articulated the idea of ubiquitous computing in 1988 has called UC “…highest ideal is to make a computer so imbedded, so fitting, so natural, that we use it without even thinking about it.”

Experiments Tabs Pads Boards Classroom 2000Classroom 2000 SAAMPad (Software Architecture Analysis Method Pad) The Conference Assistant 1988 – 1994 at PARC Xerox

Challenges and Requirements Hardware Applications User Interfaces Networking Mobility Scalability Reliability Interoperability Resource Discovery Privacy and Security

Nanotechnology (1/2) The trend toward miniaturization of computer components down to an atomic scale is known as nanotechnology

Nanotechnology (2/2) Mobile data technology – GSM, GPRS, UMTS, CDMA, WAP, Imode Wireless data technology – Bluetooth, b Internet data technology – IP over optical, Broadband Content services – Web & WAP Applications – Multimedia, Internet messaging

Users Interface The multitude of different Ubicomp devices with their different sizes of displays and interaction capabilities represents another challenge Pen Gesture recognition … Mouse keyboard

Networking WirelessWireless computing refers to the use of wireless technology to connect computers to a network Another key driver for the final transition will be the use of short-range wireless as well as traditional wired technologies

Mobility This behaviour is an inherent property of the ubicomp concept and it should not be treated as a failure Mobility is made possible through wireless communication technologies Problem of disconnectivity!!!

Scalability In a ubiquitous computing environment where possibly thousands and thousands of devices are part of scalability of the whole system is a key requirement All the devices are autonomous and must be able to operate independently a decentralized management will most likely be most suitable

Reliability Thus the reliability of ubiquitous services and devices is a crucial requirement In order to construct reliable systems self- monitoring, self-regulating and self-healing features like they are found in biology might be a solution

Interoperability This will probably be one of the major factors for the success or failure of the Ubicomp vision Use of technology just existed: JINI,CORBA,ecc… This diversity will make it impossible that there is only one agreed standard

Resource Discovery The ability of devices to describe their behaviour to the network is a key requirement. On the other hand, it can not be assumed that devices in a ubiquitous environment have prior knowledge of the capabilites of other occupants.

Privacy and Security In a fully networked world with ubiquitous, sensor-equipped devices several privacy and security issues arise the people in this environment will be worried about their privacy since there is the potential of total monitoring must be understandable by the user and it must be modelled into the system architecture

Comparison of Technologies Table shows a list of these APIs and technologies. The original comparison made by Olstad, Ramirez, Brady and McHollan. Without Bluetooth or IrDA.

Software Engineering research is inherently empirical and relies on a rapid prototyping development cycle information should be pushed to user based on current task, inferences made about user’s situation as user moves into different environments

Experiment at PARC – TAB TAB

Experiment at PARC - PAD Pad

Experiment at PARC – BOARD Liveboard

Tab prototype handheld computer was 2x3x0.5", had a 2 week battery life on rechargeable batteries, and weighed 7 oz used a Phillips 8051 processor with 128k NVRAM featured an external I 2 C external bus, a custom resistive touch screen, and a 128x64 mono display included an infrared base station in the ceiling for LAN connectivity The Tab project is consider by many to be the most significant of the three prototyping efforts

Classroom 2000 Instructors are given the ability to present more information during each lecture, with the goal of providing a deeper learning experience. As a result, students are often drowned with information and forced into a “heads down” approach to learning.

Computing Everywhere Ubiquitous means: present everywhere simultaneously encountered in numerous different instances computers become a useful but invisible force, assisting the user in meeting his needs without getting lost in the way

Wireless Infrastructure (1/2) Technology Advancement – Wide adoption of wireless technology: 67 million mobile professionals by 2002 – Cost for wireless access: comparable to wired networks What does the new Internet provide? – Mobility – Ubiquitous access

Wireless Infrastructure (2/2) What is mobile Internet? – Extension of Internet – Extension of Wireless Services

Wireless Infrastructure – Key Components Mobile data technology – GSM, GPRS, UMTS, CDMA, WAP, Imode Wireless data technology – Bluetooth, b Internet data technology – IP over optical, Broadband Content services – Web & WAP Applications – Multimedia, Internet messaging

Universal Computing Environment The infrastructure of the ubiquitous computing environment may be organized and structured as a cyber equivalent of an ecosystem, a very complex, dynamic infrastructure. A ubiquitous computing system is a integrated system of computing resources, devices, services, and the ubiquitous computing environment (UCE) that provides a communication framework to connect all of the components.

Universal Computing Environment Games Audio DVD PDA PC Wash Machine Lighting Cooker Digital Camera Printer Scanner Disk Drives NOTEBOOK

Universal Computing Environment this architecture was used as the basis for the implementation of BEACH it provides the functionality for synchronous cooperation and interaction with room ware components

Calm Technology (1/3) The Major Trends in Computing Mainframe Personal Computer Internet - Widespread Distributed Computing Ubiquitous Computing many people share a computer one computer, one person many computers share each of us... transition to...

Calm Technology (2/3)

Calm Technology (3/3) Today Internet is carrying us through an era of widespread distributed computing towards the relationship of ubiquitous computing, characterized by deeply embedding computation in the world. Ubiquitous computing will require a new approach to fitting technology to our life, an approach we call "calm technology".

Context-Awareness computers will be able to understand enough of a user’s current situation to offer services, resources, or information relevant to the particular context the attributes of context to a particular situation vary widely, and may include the user’s location, current role and other elements the application of context may include any combination of these elements