Professional Documents
Culture Documents
Ubiquitous Computing
Definitions
Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user Mark Weiser
Ubiquitous computing, or calm technology, is a paradigm shift where technology becomes virtually invisible in our lives. -- Marcia Riley
(Georgia Institute of Technology, Atlanta.)
Timeline of Computing
"Ubiquitous computing names the third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives."
Features
Generic Features TRANSPARENT INTERFACES - hide their presence from user - Provide interaction between user and application.
Examples: Gesture recognition speech recognition free form pen interaction computational perception etc.
Contd...
Generic Features CONTEXT AWARENESS Context information about the environment with which the application is associated. LOCATION and TIME are simple examples of context !
Contd...
Generic Features AUTOMATED CAPTURE To capture our day-to-day experience and make it available for future use. Constraints: - Multiple streams of information - Their time synchronization - Their correlation and integration Need: Automated tools that support capture, integration and future access of info.
Users Interface
The multitude of different Ubicomp devices with their different sizes of displays and interaction capabilities represents another challenge.
Mouse keyboard
Networking
Another key driver for the final transition will be the use of shortrange wireless as well as traditional wired technologies.
Wireless computing refers to the use of wireless technology to connect computers to a network.
Mobility
Problem of disconnectivity!!!
This behaviour is an inherent property of the ubicomp concept and it should not be treated as a failure.
Scalability
In a ubiquitous computing environment where possibly thousands and thousands of devices are part of scalability of the whole system is a key requirement.
All the devices are autonomous and must be able to operate independently a decentralized management will most likely be most suitable.
Reliability
In order to construct reliable systems self-monitoring, selfregulating and self-healing features like they are found in biology might be a solution.
Interoperability
This will probably be one of the major factors for the success or failure of the Ubicomp vision.
This diversity will make it impossible that there is only one agreed standard.
the people in this environment will be worried about their privacy since there is the potential of total monitoring.
must be understandable by the user and it must be modelled into the system architecture.
Other Scenarios
Buy drinks by Friday (1)
Take out the last can of soda.
Swipe the cans UPC label, which adds soda to your shopping list. Make a note that you need soda for the guests you are having over this weekend.
Other Scenarios
Buy drinks by Friday (2)
Approach a local supermarket.
AutoPC informs you that you are near a supermarket. Opportunistic reminder: If it is convenient, stop by to buy drinks.
Other Scenarios
Buy drinks by Friday (3)
- Friday rolls around and you have not bought drinks.
- Deadline-based reminder sent to your smartphone.
Other Scenarios
Screen Fridge
Provides:
Email Video messages Web surfing Food management TV Radio Virtual keyboard Digital cook book Surveillance camera
Management Solutions
Intelligent agents, mobile agents, policy QoS Management Fat pipes and large storage can convert media streams to short
traffic bursts in core network but still needed for wireless links
Adaptive self-management is the only answer Partitioned domains of responsibility Genetic algorithms may be suitable for long-term strategy but need
Ubiquitous Computing
Conclusion
Universal PDA/communicator Explosion in embedded sensors/actuators Context-aware intelligent environment Privacy will be a major issue Out of the box security Adaptive self-management is needed.