View File - University of Engineering and Technology, Taxila
Download
Report
Transcript View File - University of Engineering and Technology, Taxila
Mobile and Pervasive
Computing - 1
(TE-8019)
Introductory Lecture
Presented by: Dr. Adeel Akram
University of Engineering and Technology,
Taxila, Pakistan
http://web.uettaxila.edu.pk/CMS/SP2014/teMPCms
What is Ubiquitous Computing
(ubicomp)
Ubicomp is a post-desktop model of human computer interaction in
which information processing has been thoroughly integrated into
everyday objects and activities.
Integrate computers seamlessly into the world
– invisible, everywhere computing.
– Often called pervasive/invisible computing.
Computers are mostly not invisible , they dominate interaction with
Ubicomp is about making computers invisible.
them.
Ubiquitous computing = mobile computing + intelligent
environment.
Technology View
Computers everywhere – embedded into fridges, washing
machines, door locks, cars, furniture.
Intelligent environment.
Mobile portable computing devices
Wireless communication – seamless mobile/fixed.
User View
Invisible – implicit interaction with your environment.
Augmenting human abilities in context of tasks
Ubicomp vs. Virtual Reality
Should we live in virtual computing world? Or should
computing come out and live in our physical world?
VR is about simulating physical world & putting people inside
virtual computing world. (Limited applications & activities.).
Ubicomp is about bringing computing to people’s physical world,
integrating with everyday objects and activities.
Ubiquitous computing is an integration of human factors,
computer science, engineering, and social sciences.
Ubiquitous, Mobile, and
Nomadic Computing
Nomadic computing: “portable”; no mobility while
connected.
Mobile computing: “on-the-go”, e.g., while sitting
on a train; possibility of network connections
remaining open.
Ubiquitous computing:
computing everywhere… OR
computers everywhere…most of them
invisible
State of Art and
The Future of Computing
Section 1: Pervasive Computing
Golden Richard. Fundamentals of Mobile and Pervasive
Computing. McGraw-Hill Professional Publishing ; December
2004. (with special emphasis on security issues)
Uwe Hansmann, Lothar Merk, Martin S. Nicklous, T. Stober.
(Edt.) Pervasive Computing, 2nd Edition. Springer-Verlag
Telos; May 2003.
Jochen Burkhardt, Horst Henn, Stefan Hepper, Klaus
Rindtorff and Thomas Schaeck. Pervasive Computing: A New
Class of Computing Devices. Addison-Wesley Pub Co;
January, 2002.
Uwe Hansmann, Lothar Merk, Martin S. Nicklous, and
Thomas Stober. Pervasive Computing Handbook. SpringerVerlag, 2001.
Section 2: Mobile Computing
Reza B'Far. Mobile Computing Principles: Designing and
Developing Mobile Applications with UML and XML. Cambridge
University Press, 2005.
Evaggelia Pitoura, George Samaras. Data Management for
Mobile Computing (Advances in Database Systems). Kluwer
Academic Publishers, 2004.
Dharma P. Agrawal and Qing-An Zeng. Introduction to Wireless
and Mobile Systems. Brooks/Cole-Thomson Learning, 2003.
Ivan Stojmenovic, Edt. Handbook of Wireless Networks and
Mobile Computing. Kluwer Academic Publishers, Boston ,
February 2002.
Evaggelia Pitoura and George Samaras. Data Management for
Mobile Computing. January 1998.
Tomasz Imielinski, Tamasz Imielinski, and Henry F. Korth.
Mobile Computing. Kluwer Academic Publishers, Boston ,
January 1996.
Section 3: Distributed Systems
George Coulouris, Jean Dollimore and Tim Kindberg.
Distributed Systems: Concepts and Design, 4th Edition.
Addison-Wesley, 2005.
Andrew S. Tanenbaum and Maarten van Steen.
Distributed Systems: Principles and Paradigms. Prentice
Hall, 2002.
Randy Chow and Theodore Johnson. Distributed
Operating Systems and Algorithms. Addison Wesley,
1997.
Kenneth P. Birman. Building Secure and Reliable
Network Applications. Manning Publications Co., 1996.
Sape Mullenter (ed.), Distributed Systems, 2nd Edition,
ACM Press, 1993.
Papers: Introduction to Mobile
and Pervasive Computing
Mark Weiser, "The Computer for the 21st Century," Scientific American,
September 1991. (HTML, PDF)
Mark Weiser, "Some Computer Science Issues in Ubiquitous Computing",
Communications of the ACM 36(7):75-84, July 1993. (PDF)
M. Satyanarayanan, "Pervasive Computing: Vision and Challenges," IEEE
Personal Communications, August 2001. (PDF)
D. Saha, A. Mukherjee, "Pervasive Computing: A Paradigm for the 21th
Century," IEEE Computer, March 2003, pp. 25-33. (PDF)
G. H. Forman and J. Zahorjan, "The Challenges of Mobile Computing,"
IEEE Computer 27(4):38-47, April 1994. (PDF)
J. Barton and T. Kindberg, "The Challenges and Opportunities of
Integrating the Physical World and Networked Systems," HP Labs
Technical Report, Jan 31, 2001. (PDF)
G. Banavar, J. Beck, E. Gluzberg, J. Munson, J. Sussman, and D.
Zukowski, "Challenges: An Application Model for Pervasive Computing,"
Proc. 6th ACM MobiCom, Boston, MA, Aug 2000. (PDF)
Andrew C. Huang, Benjamin C. Ling and Shankar Ponnekanti, "Pervasive
Computing: What is it Good for?" MobiDE, pp. 84-91, 1999. (HTML)
Papers: Context-Aware Computing
and Location-Based Services
H. Lieberman and T. Selker, "Out of Context: Computer
Systems That Adapt to, and Learn from, Context, IBM
System Journal 39(3-4), 2000. (PDF)
G. Chen and D. Kotz, "PA Survey of Context-Aware
Mobile Computing Research," Dartmouth College, 2000.
(PDF)
M. Korkea-aho, "Context-Aware Applications Survey,"
Helsinki University of Technology, 2000. (HTML)
Sven Meyer and Andry Rakotonirainy, "A Survey of
Research on Context-Aware Homes," 2003. (PDF)
Papers: Sensor Networks
Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam,
and Erdal Cayirci, "A Survey on Sensor Networks", IEEE
Communication, 102-114, Aug 2002. (PDF)
Chee-Yee Chong and Srikanta P. Kumar, "Sensor
Networks: Evolution, Opportunities, and Challenges,"
Proceedings of the IEEE 91(8), Aug 2003. (PDF)
Archana Bharathidasan and Vijay Anand Sai Ponduru,
"Sensor Networks: An Overview," Technical Report, Dept.
of Computer Science, University of California at Davis,
2002. (PDF)
Heinzelman, W.B., Murphy, A.L., Carvalho, H.S. and
Perillo, M.A., "Middleware to support sensor network
applications," IEEE Network 18:6-14, 2004.(PDF)
Deepak Ganesan, Alberto Cerpa, Yan Yu and Deborah
Estrin, "Networking Issues inWireless Sensor Networks,"
Journal of Parallel and Distributed Computing 64(7):799814, July 2004.(PDF)
Case Studies
MIT
Carnigie Mellon University
Aura Project
University of Washington
OXYGEN Project
http://ubicomplab.cs.washington.edu/wiki/Projects
University of California, San Diego
Active Campus http://activecampus.ucsd.edu/
Case Studies
Georgia Tech University
Aware Home Research Initiative
http://awarehome.imtc.gatech.edu/
Cyber Desk
http://www.cc.gatech.edu/fce/cyberdesk/index.html
Cyber Guide
http://www.cc.gatech.edu/fce/cyberguide/index.html
NUCES Fast Karachi
Ubiquitous Computing Research Group
http://cruc.khi.nu.edu.pk/ ( http://archive.is/j0tyO )
Seminar Presentations
https://wiki.engr.illinois.edu/displa
y/cs598rhc/Ubiquitous+Computing+
WebSites+and+Projects
Students will select their project of
interest and give presentation and
formal report on them
Text Book
Title: Ubiquitous Computing Fundamentals
Author: John Krumm, PhD
Affiliation: Microsoft Research
Published in: Redmond, Washington, USA
Publisher: Chapman and Hall/CRC
Publication year = 2010
Editor: John Krumm
ISBN: 978-1-4200-9360-5
Reference Books
Title: Fundamentals of
Mobile and Pervasive
Computing
Author: Frank Adelstein,
Golden Richard III, PhD
ISBN: 0071412379
Publisher: McGraw-Hill Professional
Publication Year: 2004
History of Ubicomp
Mark Weiser coined the phrase "ubiquitous computing"
around 1988, during his tenure as Chief Technologist of
the Xerox Palo Alto Research Center (PARC).
Both alone and with PARC Director and Chief Scientist
John Seely Brown, Weiser wrote some of the earliest
papers on the subject, largely defining it and sketching
out its major concerns.
Andy Hopper from Cambridge University UK proposed
and demonstrated the concept of "Teleporting" - where
applications follow the user wherever he/she moves.
Bill Schilit (now at Google) also did some earlier work in
this topic, and participated in the early Mobile
Computing workshop held in Santa Cruz in 1996.
History of Ubicomp
Dr. Ken Sakamura of the University of Tokyo, Japan
leads the Ubiquitous Networking Laboratory (UNL),
Tokyo as well as the T-Engine Forum.
The joint goal of Sakamura's Ubiquitous Networking
specification and the T-Engine forum, is to enable any
everyday device to broadcast and receive information.
Roy Want, while a researcher and student working under
Andy Hopper at Cambridge University, worked on the
"Active Badge System", which is an advanced location
computing system where personal mobility that is
merged with computing.
History of Ubicomp
MIT has also contributed significant research in this
field, notably Things That Think consortium at the
Media Lab and the CSAIL effort known as Project
Oxygen.
Other major contributors include University of
Washington's Ubicomp Lab, Georgia Tech's College of
Computing, Cornell University's People Aware Computing
Lab, NYU's Interactive Telecommunications Program, UC
Irvine's Department of Informatics, Microsoft Research,
Intel Research.
History of Ubicomp
Mark Weiser Father of Ubicomp
http://www.ubiq.com/weiser
History of Ubicomp
Ubiquitous computing (ubicomp) is an advanced
computing concept where computing is made to appear
everywhere and anywhere.
In contrast to desktop computing, ubiquitous computing
can occur using any device, in any location, and in any
format.
A user interacts with the computer, which can exist in
many different forms, including laptop computers,
tablets, terminals and phones.
The underlying technologies to support ubiquitous
computing include Internet, advanced middleware,
operating system, mobile code, sensors,
microprocessors, new I/O and user interfaces,
networks, mobile protocols, location and positioning
and even new materials.
Ubicomp core concepts
At their core, all models of ubiquitous computing share
a vision of small, inexpensive, robust networked
processing devices, distributed at all scales throughout
everyday life and generally turned to distinctly
common-place ends.
For example, a domestic ubiquitous computing
environment might interconnect lighting and
environmental controls with personal biometric
monitors woven into clothing so that illumination and
heating conditions in a room might be modulated,
continuously and imperceptibly.
Another common scenario posits refrigerators "aware" of
their suitably tagged contents, able to both plan a
variety of menus from the food actually on hand, and
warn users of stale or spoiled food.
Ubicomp core concepts
Ubiquitous computing presents challenges across
computer science: in systems design and engineering, in
systems modelling, and in user interface design.
Contemporary human-computer interaction models,
whether command-line, menu-driven, or GUI-based, are
inappropriate and inadequate to the ubiquitous case.
This suggests that the "natural" interaction paradigm
appropriate to a fully robust ubiquitous computing has
yet to emerge - although there is also recognition in the
field that in many ways we are already living in an
Ubicomp world.
Ubicomp core concepts
Ubiquitous computing may be seen to consist of many layers,
each with their own roles, which together form a single
system:
Layer 1: task management layer
Monitors user task, context and index
Map user's task to need for the services in the environment
To manage complex dependencies
Layer 2: environment management layer
To monitor a resource and its capabilities
To map service need, user level states of specific capabilities
layer 3: environment layer
To monitor a relevant resource
To manage reliability of the resources
Intelligence
Embedded Computing for enhancing physical objects.
Achieve intelligence through interconnection of physical objects.
Achieve intelligence through location awareness (without AI)
For example:
Automated call forwarding (context awareness – should know
where the person is)
lighting control smart sensor wall - control heating and lighting.
Early work
Tabs:
very small – smart badge with user info, calendar, diary, etc.
allow personalized settings to follow a user
Carried around by a person
Hundreds in a room
Remote controllers
Badges
Tags / Labels (RFID)
Locating system (tags as library catalogs)
Animate static physical objects (active calendar, active map)
Current Trends
Touch Pads:
Foot-scale Ubicomp devices
A sheet of paper / tablet PC.
Portable computers but not laptop metaphor
Tens in a room
Like scrap papers that can be grabbed and
used anywhere, no unique ID.
Currently in use in Academia
and Enterprise
Boards:
larger display – whiteboard size.
Personalized electronic bulletin boards.
Multiple pens.
Meeting capture.
Lots of bandwidth available because they’re plugged
into the wall (LAN Network)
White board with e-chalk
Shared white board with remote participants.
Video screen.
Electronic Bookcases
Current Technology
Portable information appliances
– laptops, notebooks, and sub-notebooks
– hand-held computers
– PDAs and smart phones
Wireless communication networks
– multiple networks “covering” the globe
Internet:
– TCP/IP& de-facto application protocols
Usability
Common user interface for workstation and mobile device
applications.
Adaptive information display.
Flexible voice based input-output.
Voice recognition + text to speech conversion.
Gesture recognition.
Intelligent agents
Mobile computing
Mobile computing - wireless transmission.
Uses a computing device.
Many types of mobile computers have been
introduced since the 1990s, including the:
Personal Digital Assistant
Enterprise Digital Assistant
Smart phones
UMPC
Mobile computing Vision
Universal connectivity – anywhere, anytime
Accommodate heterogeneity of networks and communicators.
Ubiquitous intelligent environment - embedded computers
everywhere
Easy user interaction
Context independent access to services + context dependent
information
Issues
How to integrate mobile communicators into complex
information infrastructures?
What effect will they have on work and leisure?
Privacy
How to develop and manage adaptable, context-aware
software systems?
What support is needed within the network?
Power supplies
Integration of Mobile Systems
Not stand alone devices.
Need to interact with complex legacy information systems
eg large databases – merging updates, displaying tables etc.
Systems development
Requirements specification for adaptable systems
Component composition to meet global QoS, security,
reliability & performance requirements.
Mobility models
Behaviour specification and analysis
Modelling context aware systems
Context Aware Computing
It is a powerful and long-lasting, concept in human computer
interaction.
Interaction with computation is by explicit acts of communication
(e.g. pointing to a menu item), context is implicit (e.g. default
setting).
Goal of context-aware computing is to acquire and utilize
information about the context of a device to provide services that
are appropriate to the particular people, place, time, events, etc.
For example, a cell phone will always vibrate and never beep in a
concert, if the system can know the location of the cell phone and
the concert schedule
Context Adaptation
A context adaptive system enables the user to
maintain a Certain application (in different forms)
while roaming between different wireless access
technologies, locations, devices and even
simultaneously executing everyday tasks like
meetings, driving a car etc.
Issues : Context Awareness
Current location
Need location detection e.g. GPS or base station Indoors – radio beacon, IR.
User activity
Walking, driving a car, running for a bus – how to detect this?
Ambient environment
In theatre, alone, in meeting
Local resources or services available
Device capabilities
Screen, input, processing power, battery life ….
Current QoS availability – particularly for radio links
Intelligent Environment
An intelligent environment is a location (e.g. home, office,
hospital, etc) that is equipped with sensors, actuators and
computers that are networked with each other and the internet.
The components are controlled by "intelligent agent" software
that knows the preferences of the occupants.
It tailors the environment to suit them.
The occupants can talk to the environment using speech and
natural language and the sensors can monitor the environment.
Smart Dust
Autonomous sensing and communication in a cubic millimetre – “dust
motes”.
"Smart dust" devices are tiny wireless Micro Electro Mechanical Sensors
(MEMS) that can detect everything from light to vibrations.
Sensors for temperature, humidity, light, motion …. with bidirectional radio
or laser + battery.
Typical Applications:
-- Defence related battlefield sensors, motion detectors etc.
-- Inventory control on boxes which communicate with trucks, plane etc.
to tell you where they are.
-- Product quality monitoring – vibration, humidity, overheating.
-- Car component monitoring.
Smart Dust Components
Smart Dust
Smart paint monitors vibrations and detect
intruders.
Changes colour to react to temperature, lighting
etc.
Intelligent glass can filter sunlight, become
opaque no need for curtains.
Smart garments or injectable sensors for people
monitoring.
Issues
What means of communication?
Radio
Light based
Batteries would be impractical power source for
100K processors per person.
Solar cells are not suitable for all environments.
Solar cells, fuel cells, body heat power?
Power not speed is the key issue for future processor
designs.
Major Challenges
Hardware Prototype Issue:
Power consumption: impossible to change batteries to
many Ubicomp devices frequently.
Balance of HW/SW feature: display, network, processing,
memory, storage capability, multitasking, QoS, etc.
Ease of expansion & modification (integration vs. modular).
Major Challenges
Network Issue:
Wireless Media Access (802.11, Bluetooth, Cellular Networks).
Quality of Services (RSVP, etc.).
Ubicomp devices changing network attachment points
(Mobile IP).
Major Challenges
Application Issue:
“Applications are of course the whole point of ubiquitous computing”.
Locating people (active badges)
Automated call forwarding
Tracking down people for meeting
Watching general activity in a building (feel in touch with
surrounding environments)
Shared drawing in virtual meeting
Scalability to 5000 peoples (multicast for bandwidth efficiency)
Security
Interactions will be cross multiple organisational
boundaries specification, analysis and integration for
heterogeneous OS, databases, firewalls, routers.
Everything worth hacking gets hacked.
Need for secure ‘out of the box’ set up that can identify
friend or foe - level of trust.
Small communicators, with confidential data, are easily
lost or stolen – biometric authentication.
Necessary security technology exists.
Privacy
Location service tracks movement to within metres.
Clearly indicate you are being sensed or recorded + user control
to stop recording or control distribution of information.
You are now predictable System can co-relate location, context
and behaviour patterns
Do you want employer, colleagues or insurance company to know
you carry a medical monitor?
Tension between authentication and anonymity – business want
to authenticate you for financial transactions and to provide
‘personalized’ service web sites.
Constant spam of context dependent advertising
Management
Huge, complex systems
Billions of processors
Multiple organisations
Managing physical world, controlling sensors, actuators
Hacker and virus paradise
System propagates false information about
individuals or organisation.
Complexity of s/w installation on a workstation or
server – how do you cope with billions?
Proposed Management
Solution
Intelligent agents, mobile agents, policy.
QoS Management
Fat pipes and large storage can convert media streams to
short traffic bursts in core network but still needed for wireless
links.
Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term
strategy but need more deterministic solutions for
short term decision making
Video Links
Presentation – The dawning age of ubiquitous computing
By Adam Greenfield
http://www.youtube.com/watch?v=RMXox8IJvmE&feature=related
http://www.youtube.com/watch?v=eubo2AIBiBw&feature=related
http://www.youtube.com/watch?v=oS0DBLFtAfQ&feature=related
http://www.youtube.com/watch?v=5GRyEnZMaig&feature=related
http://www.youtube.com/watch?v=e-zBZh-eLBY&feature=related
http://www.youtube.com/watch?v=uiS5Z-yRczY&feature=related
http://www.youtube.com/watch?v=SFISKd6xef0&feature=related
http://www.youtube.com/watch?v=v8iGGP8uCa4&feature=related
Questions???
References
http://www.media.mit.edu/
http://cooltown.hp.com/
http://portolano.cs.washington.edu/
http://computer.org/dsonline/
http://computer.org/pervasive
http://www.comp.lancs.ac.uk/computing/research/mpg/most/
www.wikipedia.com