You are on page 1of 23

Ubiquitous Computing

Presented by: Apoorv Sharma Roll No. 1, IT & Tele.

Ubiquitous Computing
Definitions
Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user Mark Weiser
Ubiquitous computing, or calm technology, is a paradigm shift where technology becomes virtually invisible in our lives. -- Marcia Riley
(Georgia Institute of Technology, Atlanta.)

Timeline of Computing

"Ubiquitous computing names the third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives."

System Architecture Requirements


Increase in hardware and network infrastructure. Major focus on Users & there tasks. Lack of applications in existing systems. Architecture needs to : be simple integrate support for mobile computations and persistent storage. be easy to encapsulate.

Features
Generic Features TRANSPARENT INTERFACES - hide their presence from user - Provide interaction between user and application.

Examples: Gesture recognition speech recognition free form pen interaction computational perception etc.

Contd...
Generic Features CONTEXT AWARENESS Context information about the environment with which the application is associated. LOCATION and TIME are simple examples of context !

Contd...
Generic Features AUTOMATED CAPTURE To capture our day-to-day experience and make it available for future use. Constraints: - Multiple streams of information - Their time synchronization - Their correlation and integration Need: Automated tools that support capture, integration and future access of info.

Users Interface
The multitude of different Ubicomp devices with their different sizes of displays and interaction capabilities represents another challenge.

Mouse keyboard

Pen Gesture recognition

Networking

Another key driver for the final transition will be the use of shortrange wireless as well as traditional wired technologies.

Wireless computing refers to the use of wireless technology to connect computers to a network.

Mobility

Mobility is made possible through wireless communication technologies.

Problem of disconnectivity!!!

This behaviour is an inherent property of the ubicomp concept and it should not be treated as a failure.

Scalability
In a ubiquitous computing environment where possibly thousands and thousands of devices are part of scalability of the whole system is a key requirement.

All the devices are autonomous and must be able to operate independently a decentralized management will most likely be most suitable.

Reliability

The reliability of ubiquitous services and devices is a crucial requirement.

In order to construct reliable systems self-monitoring, selfregulating and self-healing features like they are found in biology might be a solution.

Interoperability
This will probably be one of the major factors for the success or failure of the Ubicomp vision.

Use of technology just existed: JINI,CORBA,ecc

This diversity will make it impossible that there is only one agreed standard.

Privacy and Security


In a fully networked world with ubiquitous, sensor-equipped devices several privacy and security issues arise.

the people in this environment will be worried about their privacy since there is the potential of total monitoring.
must be understandable by the user and it must be modelled into the system architecture.

Example Projects : Oxygen


Oxygen (MIT)
Pervasive human-centered computing. Goal of Oxygen is bringing abundant computation and communication, as pervasive and free as air, naturally into people's lives.

Example Projects : Oxygen (2)


To support highly dynamic and varied human activities, the Oxygen system is pervasive it is everywhere, with every portal reaching into the same information base; embedded it live in our world, sensing and affecting it; nomadic it allows users and computations to move around freely, according to their needs; adaptable it provides flexibility and spontaneity, in response to changes in user requirements and operating conditions; powerful, yet efficient it frees itself from constraints imposed by bounded hardware resources, addressing instead system constraints imposed by user demands and available power or communication bandwidth; intentional it enable people to name services and software objects by intent, for example, "the nearest printer," as opposed to by address; eternal it never shuts down or reboot; components may come and go in response to demand, errors, and upgrades, but Oxygen as a whole must be available all the time.

Other Scenarios
Buy drinks by Friday (1)
Take out the last can of soda.
Swipe the cans UPC label, which adds soda to your shopping list. Make a note that you need soda for the guests you are having over this weekend.

Other Scenarios
Buy drinks by Friday (2)
Approach a local supermarket.
AutoPC informs you that you are near a supermarket. Opportunistic reminder: If it is convenient, stop by to buy drinks.

Other Scenarios
Buy drinks by Friday (3)
- Friday rolls around and you have not bought drinks.
- Deadline-based reminder sent to your smartphone.

Other Scenarios
Screen Fridge
Provides:
Email Video messages Web surfing Food management TV Radio Virtual keyboard Digital cook book Surveillance camera

Management the nightmare!


Huge, complex systems
Billions of processors Multiple organisations Managing physical world

controlling sensors, actuators


Humans will be in the way Errors propagate to bring down complete regions Hacker and virus paradise System propagates false information about Individuals or organisation Complexity of s/w installation on a workstation or

server how do you cope with billions?

Management Solutions
Intelligent agents, mobile agents, policy QoS Management Fat pipes and large storage can convert media streams to short

traffic bursts in core network but still needed for wireless links
Adaptive self-management is the only answer Partitioned domains of responsibility Genetic algorithms may be suitable for long-term strategy but need

more deterministic solutions for short term decision making


Remove human from the loop

Ubiquitous Computing
Conclusion
Universal PDA/communicator Explosion in embedded sensors/actuators Context-aware intelligent environment Privacy will be a major issue Out of the box security Adaptive self-management is needed.

You might also like