Introduction to Ubiquitous Computing
-
Upload
honeyson-joseph -
Category
Technology
-
view
6.378 -
download
65
description
Transcript of Introduction to Ubiquitous Computing
![Page 1: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/1.jpg)
Ubiquitous Ubiquitous ComputingComputing
![Page 2: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/2.jpg)
Back GroundBack Ground A technology trying to embed the PCs into A technology trying to embed the PCs into
everyday objects to make the PCs invisible.everyday objects to make the PCs invisible. Ubiquitous: Being or seeming to be Ubiquitous: Being or seeming to be
everywhere at the same time (omnipresent). everywhere at the same time (omnipresent). Later this was renamed as pervasive Later this was renamed as pervasive
computing.computing. Pervasive: Capability to spread through ought.Pervasive: Capability to spread through ought. Meaning Spreading the computation power Meaning Spreading the computation power
into everything around us.into everything around us. The name ubiquitous computing was coined The name ubiquitous computing was coined
by Mark Weiser (Father of Ubiquitous by Mark Weiser (Father of Ubiquitous Computing).Computing).
http://www.facebook.com/honeydev
![Page 3: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/3.jpg)
The Major Trends in The Major Trends in ComputingComputing
Mainframe : many people share Mainframe : many people share a computera computer
Personal Computer : one Personal Computer : one computer, one personcomputer, one person
Ubiquitous Computing : many Ubiquitous Computing : many computers share each of uscomputers share each of us
http://www.facebook.com/honeydev
![Page 4: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/4.jpg)
http://www.facebook.com/honeydev
![Page 5: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/5.jpg)
Pervasive/Ubiquitous Pervasive/Ubiquitous ComputingComputing
Pervasive (or ubiquitous)Pervasive (or ubiquitous) computing which computing which is a concept based on a vision described is a concept based on a vision described by by Mark WeiserMark Weiser nearly a decade ago nearly a decade ago
Move beyond desktop machineMove beyond desktop machine Ubiquitous computing environments Ubiquitous computing environments
involve the interaction, coordination, and involve the interaction, coordination, and cooperation of numerous, casually cooperation of numerous, casually accessible, and often invisible computing accessible, and often invisible computing devices.devices.
Computing is embedded everywhere in the Computing is embedded everywhere in the environmentenvironment
http://www.facebook.com/honeydev
![Page 6: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/6.jpg)
Ubicomp NotionsUbicomp Notions
The "authorized access to anytime-anywhere-any device-any network-any data"
““Invisible” resourcesInvisible” resources it is computation that's freely
available everywhere Machines sense users’ presence and Machines sense users’ presence and
act accordinglyact accordingly
http://www.facebook.com/honeydev
![Page 7: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/7.jpg)
BEGINNINGS OF UBIQUITOUS COMPUTING
While working atXEROX Palo Alto Research Center (PARC) as Chief Technologist, Weiser envisioned the third era of computing in 1985.
Weiser produced three types of wirelesscomputing devices
Tabs pads boards.
http://www.facebook.com/honeydev
![Page 8: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/8.jpg)
Pervasive computing technologiesPervasive computing involves three converging areas of
ICT computing (‘devices’) - PCS devices are likely to
assume many different forms and sizes, from handheld units (similar to mobile phones)to near-invisible devices set into ‘everyday’ objects (like furniture and clothing).
Communications (‘connectivity’)- This can be achieved via both wired (such as Broadband (ADSL) or Ethernet) and wireless networking technologies (such as WiFi or Bluetooth)
‘user interfaces’- new user interfaces are being developed that will be capable of sensing and supplying more information about users, and the broader environment, to the computer for processing
http://www.facebook.com/honeydev
![Page 9: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/9.jpg)
http://www.facebook.com/honeydev
![Page 10: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/10.jpg)
Embedded TechnologyEmbedded Technology
is the process of introducing computing is the process of introducing computing power to various appliances. power to various appliances.
Computers are hidden in numerous Computers are hidden in numerous information appliances which we use in information appliances which we use in our day-to-day life. our day-to-day life.
common scenario posits refrigerators common scenario posits refrigerators "aware" of their suitably-tagged "aware" of their suitably-tagged contents, able to both plan a variety of contents, able to both plan a variety of menus from the food actually on hand, and menus from the food actually on hand, and warn users of stale or spoiled food.warn users of stale or spoiled food.
http://www.facebook.com/honeydev
![Page 11: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/11.jpg)
Sentilla SoftwareSentilla Software
Sentilla Point - Java-Powered Sentilla Point - Java-Powered software platform for pervasive-class software platform for pervasive-class computers computers
Sentilla Work - Eclipse-based Sentilla Work - Eclipse-based Integrated Development Environment Integrated Development Environment
Sentilla Server - PC-class software Sentilla Server - PC-class software that enables the pervasive computers that enables the pervasive computers in your network to connect to your in your network to connect to your enterprise infrastructure enterprise infrastructure
http://www.facebook.com/honeydev
![Page 12: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/12.jpg)
http://www.facebook.com/honeydev
![Page 13: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/13.jpg)
Sentilla HardwareSentilla Hardware
Sentilla Mini is the core of pervasive Sentilla Mini is the core of pervasive computing solution. computing solution.
. Combining the MSP430 microcontroller . Combining the MSP430 microcontroller with a TI/Chipcon CC2420 low-power with a TI/Chipcon CC2420 low-power wireless radio wireless radio
each Mini comes pre-bundled with each Mini comes pre-bundled with Sentilla Point, the world’s only Java-Sentilla Point, the world’s only Java-compliant software platform for pervasive compliant software platform for pervasive computers. computers.
http://www.facebook.com/honeydev
![Page 14: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/14.jpg)
Sentilla LabSentilla Lab
Three categories of applicationsThree categories of applications
Bite-sized version of large-scale Bite-sized version of large-scale industry applicationsindustry applications
Developer applications and Developer applications and prototype hardwareprototype hardware
Fun applicationsFun applications
http://www.facebook.com/honeydev
![Page 15: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/15.jpg)
Applications of UbicompApplications of Ubicomp
Health care home care transport environmental monitoring
http://www.facebook.com/honeydev
![Page 16: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/16.jpg)
1. Health care
Pervasive computing offers opportunities for future healthcare provision both for treating and managing disease, and for patient administration
remote sensors and monitoring technology might allow the continuous capture and analysis of patients’ physiological data
Medical staff could beimmediately alerted to any detected irregularities
http://www.facebook.com/honeydev
![Page 17: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/17.jpg)
http://www.facebook.com/honeydev
![Page 18: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/18.jpg)
2. Environmental monitoring
Pervasive computing provides improved methods to monitor the environment
It will allow for continuous realtime data collection and analysis via remote, wireless devices
this poses significant challenges for PCS developers. Devices may be required to withstand harsh environmental conditions (such as heat, cold and humidity
http://www.facebook.com/honeydev
![Page 19: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/19.jpg)
3. 3. Intelligent transport systems
Such systems seek to bring together information and telecommunications technologies in a collaborative scheme to improve the safety, efficiency and productivity of transport networks
Electronic devices could be directly integrated into the transport infrastructure, and into vehicles themselves, with the aim of better monitoring and managing the movement of vehicles within road, rail, air and sea transport systems.
http://www.facebook.com/honeydev
![Page 20: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/20.jpg)
ChallengesChallenges
The “Accidentally” Smart Environment Impromptu Interoperability No Systems Administrator Social Implications of Aware
Technologies Reliability Inference in the Presence of Ambiguity
http://www.facebook.com/honeydev
![Page 21: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/21.jpg)
1. 1. The “Accidentally” Smart Environment
If you walk into an environment anywhere in the world, you would probably not find an infrastructure suitable for ubiquitous computing
Instead, you would find an infrastructure suited towards established and well-grounded technologies
the environments of users must be “upgraded,” to support this new technology
http://www.facebook.com/honeydev
![Page 22: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/22.jpg)
2. 2. Impromptu Interoperability
Ubiquitous computing must not just have interoperable devices, they must have impromptu interoperability – the ability to interconnect and communicate with little or no advance planning.
This presents a problem because every device must be written to understand the software of every other device
http://www.facebook.com/honeydev
![Page 23: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/23.jpg)
3. 3. Social Implications of Aware Technologies
Pervasive computing systems may have implications for privacy, security and safety, as a result of their ability to: gather sensitive data, for example on users' everyday interactions, movements, preferences and attitudes, without user intervention or consent
The advent of pervasive computing may mean that data can be collected without a person’s knowledge or consent. Some argue that this could violate existing data protection law
http://www.facebook.com/honeydev
![Page 24: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/24.jpg)
4. 4. Reliability
Since ubiquitous computing devices will be everywhere, it makes sense for them to be reliable.
Owners and developers will not want to be constantly bombarded by failing devices or insecure software.
http://www.facebook.com/honeydev
![Page 25: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/25.jpg)
CONCEPTS AND CONCEPTS AND TECHNOLOGY FOR THE TECHNOLOGY FOR THE
FUTUREFUTURE Ubiquitous computing is the next Ubiquitous computing is the next
generation computing environments generation computing environments with information & communication with information & communication technology everywhere, for technology everywhere, for everyone, at all times.everyone, at all times.
Information and communication Information and communication technology will be an integrated part technology will be an integrated part of our environments of our environments
http://www.facebook.com/honeydev
![Page 26: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/26.jpg)
ConclusionConclusion This seminar presents a vision of a This seminar presents a vision of a
future computing landscape future computing landscape characterized by the ubiquity of characterized by the ubiquity of computing devices, the autonomy, computing devices, the autonomy, dynamicity and the heterogeneity of dynamicity and the heterogeneity of system components. system components.
Machines that fit the human Machines that fit the human environment, instead of forcing humans environment, instead of forcing humans to enter theirs, will make using a to enter theirs, will make using a computer as refreshing as taking a walk computer as refreshing as taking a walk in the woods.in the woods.
http://www.facebook.com/honeydev
![Page 27: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/27.jpg)
Yesterday's Computers Yesterday's Computers Filled Rooms …Filled Rooms …
http://www.facebook.com/honeydev
![Page 28: Introduction to Ubiquitous Computing](https://reader034.fdocuments.net/reader034/viewer/2022042421/554a1cb7b4c90507558b575e/html5/thumbnails/28.jpg)
… … So Will Tomorrow’sSo Will Tomorrow’s
http://www.facebook.com/honeydev