CLICK HERE TO DOWNLOAD PPT ON Ubiquitous Computing
Ubiquitous Computing Presentation Transcript
1.Some Computer Science Issues in Ubiquitous Computing
2.What is Ubiquitous Computing?(1)
The method of enhancing computer by making many computers available throughout the physical environment, But making them effectively invisible to the user.
Computers inside objects which
people use in their everyday
activities.
The method of enhancing computer by making many computers available throughout the physical environment, But making them effectively invisible to the user.
Computers inside objects which
people use in their everyday
activities.
3.What is Ubiquitous Computing?(2)'
Mainframe: many people share on one computer
Personal Computer: one person with one computer
Ubiquitous Computing: many computers serve each person
Main goal was (and still is) to get the computers “out of
the way of everyday activities”
4.What is Ubiquitous Computing(3)? '
Mainframe: many people share on one computer
Personal Computer: one person with one computer
Ubiquitous Computing: many computers serve each person
Main goal was (and still is) to get the computers “out of
the way of everyday activities”
4.What is Ubiquitous Computing(3)? '
5.Virtual Reality
Some thought Virtual Reality was the ideal
UbiComp solution, but the technology was not
advanced enough
Virtual reality
puts people inside a computer-generated world
So, human move to computer not, computer move to human
VR is useful in scientific visualization and entertainment.
Two flaws for the challenge
Cannot produce simulation at reasonable cost.
It has the goal of fooling the user of leaving the everyday physical world behind.
Some thought Virtual Reality was the ideal
UbiComp solution, but the technology was not
advanced enough
Virtual reality
puts people inside a computer-generated world
So, human move to computer not, computer move to human
VR is useful in scientific visualization and entertainment.
Two flaws for the challenge
Cannot produce simulation at reasonable cost.
It has the goal of fooling the user of leaving the everyday physical world behind.
6.Virtual Reality VS Ubiquitous Computing
Ubiquitous computing is roughly the opposite of virtual reality
Ubiquitous computing is roughly the opposite of virtual reality
7.Early work in Ubiquitous Computing
The initial incarnation of ubiquitous computing was in the form of “tabs”, “pads”, and “boards” built at Xerox PARC, 1988-1994
Ubicom helped kick off the recent boom in mobile computing research
The initial incarnation of ubiquitous computing was in the form of “tabs”, “pads”, and “boards” built at Xerox PARC, 1988-1994
Ubicom helped kick off the recent boom in mobile computing research
8.Three Different Size of Devices
1.Liveboard (Large-Size Prototype)
Main idea was to simulate a office whiteboard
2.Pad (Medium-Size Prototype) :
Main goal was to simulate a personal notebook
3.Tab (Small-Size Prototype) : tiny computer,
Main goal was to simulate Post-it notes
1.Liveboard (Large-Size Prototype)
Main idea was to simulate a office whiteboard
2.Pad (Medium-Size Prototype) :
Main goal was to simulate a personal notebook
3.Tab (Small-Size Prototype) : tiny computer,
Main goal was to simulate Post-it notes
9.Liveboard
10.Pad
Require features of Pad for ubicomp
device communicate simultaneously along
multiple channels
O.S should support multiprocessing (like UNIX)
high-speed (>64kbps) wireless capability
high-speed expansion port for video in and out
Optional keyboard
Require features of Pad for ubicomp
device communicate simultaneously along
multiple channels
O.S should support multiprocessing (like UNIX)
high-speed (>64kbps) wireless capability
high-speed expansion port for video in and out
Optional keyboard
11.
Size 9x11x1”, 4 hour battery life
Weighted 5 pound
Motorola 683xx processor with 4MB ram
Communicate through infrared at 19.2kbs, through a unique near field radio at 240kbs, through a 1Mbs tether
Size 9x11x1”, 4 hour battery life
Weighted 5 pound
Motorola 683xx processor with 4MB ram
Communicate through infrared at 19.2kbs, through a unique near field radio at 240kbs, through a 1Mbs tether
12.Tab
Require feature of Tab for UbiComp
Small size
Low power consumption
IR bandwidth (4 frame/sec)
sufficient storage (non-volatile RAM 8k to 128k)
Require feature of Tab for UbiComp
Small size
Low power consumption
IR bandwidth (4 frame/sec)
sufficient storage (non-volatile RAM 8k to 128k)
13.ParcTab
A tiny information doorway
For user interaction it has a pressure-sensitive screen on the top of the display
Three buttons positioned underneath the natural finger position
The ability to sense its position within a building
For user interaction it has a pressure-sensitive screen on the top of the display
Three buttons positioned underneath the natural finger position
The ability to sense its position within a building
14.The CS of UbiComp
Issues of hardware components
Network Protocols
Interaction Substrates
Applications
Privacy of Location
Computational Methods
Issues of hardware components
Network Protocols
Interaction Substrates
Applications
Privacy of Location
Computational Methods
15.Issues of hardware components
Low Power
Power = CL * Vdd2 * f
Where CL is the gate capacitance, Vdd he supply voltage, and f the clocking frequency
Wireless
Bits/sec/meter3
Pens
For very large display
No tether
Back projection large display
Low Power
Power = CL * Vdd2 * f
Where CL is the gate capacitance, Vdd he supply voltage, and f the clocking frequency
Wireless
Bits/sec/meter3
Pens
For very large display
No tether
Back projection large display
16.Network protocols
Multiple Access Collision Detection
CSMA-CD is popular
MACA is almost same CSMA-CD
Remain quiet during others communication
Random back-off time for fair share
Guaranteed Bandwidth
Priority
Base station over the mobile unit
Attempt to eliminate bottlenecks at basestations
Mobile IP
Manage a unique name of mobile node over the network
Multiple Access Collision Detection
CSMA-CD is popular
MACA is almost same CSMA-CD
Remain quiet during others communication
Random back-off time for fair share
Guaranteed Bandwidth
Priority
Base station over the mobile unit
Attempt to eliminate bottlenecks at basestations
Mobile IP
Manage a unique name of mobile node over the network
17.Network Protocols Cont.
Real-Time Protocols
Focus on packet-switched networks
“Secondary” or “Virtual” IP
Adds a level of indirection to account for user mobility
Real-Time Protocols
Focus on packet-switched networks
“Secondary” or “Virtual” IP
Adds a level of indirection to account for user mobility
18.Interaction Substrates
IR Pens
“No look” touch screens
Palm size keyboard
Window migration tools
“Low Bandwidth X”
IR Pens
“No look” touch screens
Palm size keyboard
Window migration tools
“Low Bandwidth X”
19.Applications
Locating people
Shared drawing tools
1.Tivoli
2.Slate
Virtual community – Multi-User Dungeon
Information filtering
Locating people
Shared drawing tools
1.Tivoli
2.Slate
Virtual community – Multi-User Dungeon
Information filtering
20.Privacy of location
Preserving privacy of location
Access for attacking can be denied.
Long-term trend about individual
Short-term trend about individual
Social Issue not a technological one.
New technology must not harm our privacy.
Preserving privacy of location
Access for attacking can be denied.
Long-term trend about individual
Short-term trend about individual
Social Issue not a technological one.
New technology must not harm our privacy.
21.New Theoretical Problems
UbiComp has unveiled several new theoretical problems that need to be solved. For example:
Optimal Cache Sharing Problem
Optimal strategy for partitioning memory between
compressed and uncompressed pages
Led to the development of the Lower Bound
Theorem for Caches
c < MAX (1+CU/(CU+CC), 1+CC/(CU+CC))
UbiComp has unveiled several new theoretical problems that need to be solved. For example:
Optimal Cache Sharing Problem
Optimal strategy for partitioning memory between
compressed and uncompressed pages
Led to the development of the Lower Bound
Theorem for Caches
c < MAX (1+CU/(CU+CC), 1+CC/(CU+CC))
0 comments