An Analysis of Ubiquitous Computing Communication Frameworks for RFID-type Applications Adam Raby CMSC 691b.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

BY MAULIK PATEL CED, GPERI Computing Architecture.
Sharing Content and Experience in Smart Environments Johan Plomp, Juhani Heinila, Veikko Ikonen, Eija Kaasinen, Pasi Valkkynen 1.
Martin Wagner and Gudrun Klinker Augmented Reality Group Institut für Informatik Technische Universität München December 19, 2003.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
A Context Aware Framework Mark Assad Supervisor: Bob Kummerfeld.
Exercises for Chapter 19: Mobile and Ubiquitous Computing
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Brent Dingle Marco A. Morales Texas A&M University, Spring 2002
Mobile and Ubiquitous Computing. Overview Attributes Discussion.
Revision Week 13 – Lecture 2. The exam 5 questions Multiple parts Read the question carefully Look at the marks as an indication of how much thought and.
Localization in Maze by RFID Team member: 林書帆 周佳欣.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Expanding the Horizons of Location-Aware Computing Expanding the Horizons of Location-Aware Computing Using and determining location in a context sensitive.
1 3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
WALRUS: Wireless Active Location Resolver with Ultrasound Tony Offer, Christopher Palistrant.
Basic Data Communication
A Comparative Evaluation of HTML5 as a Pervasive Media Platform By Tom Melamed HP Ben Clayton HP Labs.
Ch. 1. The Third ICT Wave The Third ICT Wave.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-in 5 NETWORKS and TELECOMMUNICATIONS.
Modern Software Engineering for Distributed Embedded Systems Joseph Voelmle, Carlos Daboin, Joanne Sirois, Josh Gallegos Mentor: Dr. Janusz Zalewski.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
IT 351 Mobile &Wireless Computing Semester 2, Dr. Hala Mokhtar Room 79- 2nd floor.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
An Integration Framework for Sensor Networks and Data Stream Management Systems.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Computing Fundamentals Module Lesson 19 — Using Technology to Solve Problems Computer Literacy BASICS.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Architectures of distributed systems Fundamental Models
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
“ Getting to Know Networks”. What Is a Network? n A network is a collection of computers hooked up together, usually by cables or telephone wires, for.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Workshop on Future Learning Landscapes: Towards the Convergence of Pervasive and Contextual computing, Global Social Media and Semantic Web in Technology.
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Cloud Networked Robotics Speaker: Kai-Wei Ping Advisor: Prof Dr. Ho-Ting Wu 2013/04/08 1.
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
1 Ubiquitous Computing Nov. 15, 2006 Ki-Joune Li.
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Computing Fundamentals Module Lesson 6 — Using Technology to Solve Problems Computer Literacy BASICS.
Improving TCP Performance over Wireless Networks
Chapter -08 Process technology. PROCESS TECHNOLOGY In general process technologies are devices or machines that we use every day in operations. Two key.
STREP Research Project HOBNET (FP7- ICT , ) HOlistic Platform Design for Smart Buildings of the Future InterNET (
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Mobile Computing and Wireless Communication Pisa 26 November 2002 Roberto Baldoni University of Roma “La Sapienza”
A Framework with Behavior-Based Identification and PnP Supporting Architecture for Task Cooperation of Networked Mobile Robots Joo-Hyung Kiml, Yong-Guk.
An Intelligent Expert System for Proactive Services Deploying Ubiquitous Computing Technologies IEEE 2005 Proceedings of the 38th Hawaii International.
Mobile Analyzer A Distributed Computing Platform Juho Karppinen Helsinki Institute of Physics Technology Program May 23th, 2002 Mobile.
BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS (WINS) By B.S.Indrani (07841A0406) Aurora’s Technological and Research Institute.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
WEB BASED MONITORING AND CONTROLING OF INDUSTRIAL PROCESSES PRESENTED BY: Bhagyawant (3AE07EC018) Kushal (3AE07EC032) Mahantesh (3AE07EC034) Mallinath.
Internet of Things – Getting Started
Mobile Computing.
Principles/Paradigms Of Pervasive Computing
Ubiquitous Computing By: Patrick Yienger.
3rd Studierstube Workshop TU Wien
Computer Literacy BASICS
Architectures of distributed systems
Mobile Commerce and Ubiquitous Computing
Ubiquitous Computing Vision - continued
Presentation transcript:

An Analysis of Ubiquitous Computing Communication Frameworks for RFID-type Applications Adam Raby CMSC 691b

Outline Motivation & Background My Proposal Related Work Result Expectations Future Work Conclusions Adam Raby, CMSC 691b

Ubiquitous Computing is the Integration of Computing into all aspects of every-day life First defined by Mark Weiser (1991) Think of the ubiquity of written languages Requires Mobility Pervasiveness Transparency Consider Weiser's example of the relative disappearance of electric motors We can’t assume that our currently technologies and architectures are optimal Adam Raby, CMSC 691b

Ubiquitous Computing Technologies are Everywhere! Consider RFID With high levels of integration of RFID-like technology into everyday life, there needs to be a sound communication framework Adam Raby, CMSC 691b

This analysis has to be done before Ubiquitous Computing can become a reality Miniaturization Decreasing Power Requirements Increasing Wireless Connectivity Increasing Pervasiveness = A Need for a Well-Defined and Empirically Evaluated Connectivity Framework Adam Raby, CMSC 691b

My Proposal: 1. Gather existing approaches to connectivity frameworks in ubiquitous computing environments 2. Compare them empirically 3. Extract and formally describe important concepts and features 4. Propose ideal frameworks and formally explain any relevant design decisions Adam Raby, CMSC 691b

Related Work Römer (2003) Investigated the development of a framework for a "smart" approach to identifying RFID-tagged objects in a Ubiquitous Computing environment “Smart" behavior = a computing environment's ability to pair objects with their functions, anticipate events, and monitor object locations "Smart Toolbox“ Adam Raby, CMSC 691b Kay Römer, Thomas Schoch, Friedemann Mattern, and Thomas Dbendor- fer. Smart identi¯cation frameworks for ubiquitous computing applications, 2003.

Römer: The Framework Matters Two Approaches Jini – Distributed Java Objects (Winner) Web Services Neither did well under heavy-loads Adam Raby, CMSC 691b Kay Römer, Thomas Schoch, Friedemann Mattern, and Thomas Dbendor- fer. Smart identi¯cation frameworks for ubiquitous computing applications, 2003.

My Proposal: 1. Gather existing approaches to connectivity frameworks in ubiquitous computing environments 2. Compare them empirically 3. Extract and formally describe important concepts and features 4. Propose ideal frameworks and formally explain any relevant design decisions Adam Raby, CMSC 691b

Many Models Use RFID Technology to Bridge the Real and Virtual Worlds Radio Frequency Identifier (RFID) Small, versatile transponders capable of storing a small fixed number of bits There are several different types Each type has unique range, power consumption, and transmission characteristics The most common forms of these tags are inexpensive, reliable, and passive They provide a standardized medium Adam Raby, CMSC 691b

RFID Solves Several Problems Facing the Achievement of Ubiquitous Computing Often, attempts to connect the real and virtual world through specialized input devices and gadgets are expensive and too application-specific (Want, 99) Properly distributing the burden of complexity is a key issue in ubiquitous computing (Want, 99) Is it really necessary for a light to know when someone has entered the room, or is it enough for something else to know that there is a light and a person in the room? Adam Raby, CMSC 691b Roy Want, Kenneth P. Fishkin, Anuj Gujar, and Beverly L. Harrison. “Bridging physical and virtual worlds with electronic tags,” In CHI, pages , 1999.

Cooltown Designed upon three principles Ubiquitous access Users are able to access outside resources, like the internet, from virtually any device, using common protocols Just enough middleware Much less platform and capability dependent Locality the technology's ability to be aware of its environment and act accordingly Uses handheld devices, infrared beacons, barcodes, and RFID tags to situate its users The infrared beacons, barcodes, and RFID tags resolve to URLs for webservers which provide contextual information about the users environment A large wired infrastructure supports the CoolTown system, managing information about all the "tagged" people, places, and things Adam Raby, CMSC 691b Tim Kindberg and John Barton. A web-based nomadic computing sys- tem. Computer Networks (Amsterdam, Netherlands: 1999), 35(4): , 2001.

Cooltown CoolTown's researchers rely on several different technologies to combat some of the shortcomings of RFID, primarily range Demonstrates the need for support of Heterogeneity in Ubiquitous Computing Frameworks Adam Raby, CMSC 691b Tim Kindberg and John Barton. A web-based nomadic computing sys- tem. Computer Networks (Amsterdam, Netherlands: 1999), 35(4): , 2001.

Hähnel And Colleagues Developed An Approach To Mapping And Localization Using RFID A RFID sensor-equipped robot is able to navigate and map environments using a laser sensor and a RFID sensor Adam Raby, CMSC 691b D. Hähnel, W. Burgard, D. Fox, K. Fishkin, and M. Philipose. “Mapping and localization with RFID technology.” In Proc. of the IEEE International Conference on Robotics and Automation (ICRA), 2004

Hähnel’s Work Demonstrated Several Important Aspects of RFID- Type Systems They often require secondary systems (e.g. lasers) They’re highly susceptible to instrumentation They require a lot of the receiver Are we already leaning towards a system with a heavily loaded client? And again, demonstrates the need for Heterogeneity in Ubiquitous Computing Frameworks Adam Raby, CMSC 691b D. Hähnel, W. Burgard, D. Fox, K. Fishkin, and M. Philipose. “Mapping and localization with RFID technology.” In Proc. of the IEEE International Conference on Robotics and Automation (ICRA), 2004

“Websigns” is an Example of a Completely Virtual System GPS data is used to situate a user in their environment Once the Websigns system determines a users location, it returns any relevant contextual information to the user based on the Websigns in their vicinity Users are expected to have constant access to GPS data as well as internet access A central site for maintaining Websigns also introduces a central point of failure and difficulties in scalability In a system that uses actual RFID tags, offline users would be able to cache data for later resolution Real tags provide another level of user interaction and control Adam Raby, CMSC 691b Salil Pradhan, Cyril Brignone, Jun-Hong Cui, Alan McReynolds, and Mark T. Smith. “Websigns: Hyperlinking physical locations to the Web,” Computer, 34(8):42-48, 2001.

There’s A Lot to Learn Just By Gathering Current Frameworks What Next? Adam Raby, CMSC 691b

My Proposal: 1. Gather existing approaches to connectivity frameworks in ubiquitous computing environments 2. Compare them empirically 3. Extract and formally describe important concepts and features 4. Propose ideal frameworks and formally explain any relevant design decisions Adam Raby, CMSC 691b

These Systems Can Be Analyzed Using Network Analysis Tools Adam Raby, CMSC 691b Virtual Inter-Network Testbed (VINT)

Model Ubiquitous Frameworks as Computer Networks Adam Raby, CMSC 691b Cooltown: Internet User Tagged Artifact Web Service Internet

This Approach Provides Several Common Methods of Evaluation Adam Raby, CMSC 691b Metrics Throughput Latency Message Complexity Error Rates Bottlenecks Behavior Under the Atypical Loads of a Ubiquitous Computing Environment

Adam Raby, CMSC 691b

My Proposal: 1. Gather existing approaches to connectivity frameworks in ubiquitous computing environments 2. Compare them empirically 3. Extract and formally describe important concepts and features 4. Propose ideal frameworks and formally explain any relevant design decisions Adam Raby, CMSC 691b

I Expect to Find: 1. High dependency on individual users’ capabilities 2. Major performance characteristics of various frameworks (Existing, Cellular, P2P, etc.) 3. Bottlenecks can be optimized using DNS- style name resolution caching 4. A large potential for P2P-based optimizations This may introduce security and coherence issues Adam Raby, CMSC 691b

Questions? Thanks Adam Raby, CMSC 691b