Title: A Talk on Ubiquitous Computing: Proposed Middleware For
1A Talk on
Ubiquitous Computing Proposed Middleware For
Immersive Network, Real Time Challenges and
Applications
Prepared By
Dhaval K. Patel ID No 08PGEC08 and EXAM
No5029 M.E.( Commu.System Engineering)
2Talk Organization
- Ubiquitous Computing
- UC with Other Terminology
- Middleware for Immersive Networks
- Ubiquitous Society A Case Study
- Real time Challenges
- Future Scope with Development of UC in India
- Conclusion
3What is Ubiquitous Computing ?
- Definitions
- Ubiquitous computing is the method of enhancing
computer use by making many computers available
throughout the physical environment, but making
them effectively invisible to the user - Mark Weiser
- Ubiquitous computing, or calm technology, is a
paradigm shift where technology becomes virtually
invisible in our lives. - - Marcia Riley
4Three Waves of Computing
- ? Mainframe computing (60s-70s)
- massive computers to execute big data
processing applications - very few computers in the world
- ? Desktop computing (80s-90s)
- one computer at every desk to help in business
related activities - computers connected in intranets to a massive
global network - (internet), all wired
- ? Ubiquitous computing (00s?)
- tens/hundreds of computing devices in every
room/person, becoming - invisible and part of the environment
5Ubiquitous/Pervasive Computing
- Calm technology embedded, invisible, seamlessly,
unobtrusive, intelligent.
Image source Friedemann Mattern (ETH Zürich)
6Real Life Example of Ubiquitous Computing
- Today You realize a block is too heavy to lift.
You whistle /call/ motion for your super-heavy
helper to assist you. - Ubiquitous Computing You go to lift the block,
and your - invisible computer agent detects you are not
strong enough to do so, - and automatically assists you without you even
asking for it. Perhaps not - even realizing
- A corridor or room automatically adjusts
heating, cooling and lighting levels - based on the occupants profile.
- Smartness may extend to individual objects
e.g. moldable handles that - reshape themselves, cars that automatically
adjust steering wheel and seat - placement regardless of the space they are in.
7Talk Organization
- Ubiquitous Computing
- UC with Other Terminology
- Middleware for Immersive Networks
- Ubiquitous Society A Case Study
- Real time Challenges
- Future Scope with Development of UC in India
- Conclusion
8UC Vs. VR
- Ubiquitous Computing is NOT
- Virtual reality - real world provides input,
- not computers!
- A PDA or PC Called an intimate compute, takes
your attention to get it to do the work -
- Ubiquitous Computing
- Supports a world of fully connected devices .
- Ensures information is accessible everywhere .
- Provides an intuitive, non intrusive interface,
feels like you are doing it - Ubiquitous computing requires extreme AI.
9Ubiquitous computing Vs. Mobile Computing
- ?Mobile computing
- Chicku owns Mobile phone with web access, voice
and - short messaging. Remains connected while he
drives from - Ahmedabad to CITC, Changa.
- ? Ubiquitous computing
- Chicku is leaving home to go and meet his
friends. While passing the fridge, the fridge
sends a message to his shoe that milk is almost
finished. - When Chicku is passing grocery store, shoe
sends message - to glasses which displays BUY milk message.
- Chicku buys milk, goes home.
10Context Awareness
- ? A Ubiquitous computing system that strives to
be minimally intrusive has to be context aware - i.e. aware of users state and surroundings
and modify its behavior based on this information - ? The situational conditions that are
associated with a user location,surrounding
conditions light, temperature, humidity, noise
level, etc), social activities, user
intentions,personal information, etc.
11(No Transcript)
12Talk Organization
- Ubiquitous Computing
- UC with Other Terminology
- Middleware for Immersive Networks
- Ubiquitous Society A Case Study
- Real time Challenges
- Future Scope with Development of UC in India
- Conclusion
13Problem Definition
Comparison of (a) existing environments with (b)
the scene abstraction
14What is Middleware ?
- Middleware is a somewhat overloaded term
- Generally speaking, middleware provides software
services for application programs above the basic
operating system and networking services - Accessed via an application program interface
(API), but more than an API
15Middleware for Immersive Network
- Typical middleware services include directory,
trading, and brokerage services for discovery
transactions, and different transparencies such
as location transparency, and failure
transparency. - Immersive sensor networks are essential to the
future success of ubiquitous computing. The
immersive sensor networks that combines
traditional sensor network technologies with the
vision of ubiquitous computing - In an immersive sensor network, a users
operational context is highly dynamic. As the
user moves through the environment, the set of
embedded devices he interacts with should change
accordingly.
16SCENE Abstraction
The programmer only needs to specify three
parameters to define a constraint Metric A
property of the network or environment that
defines the cost of a connection (i.e., a
property of hosts, links, or data) Path cost
function A function (such as sum, average,
minimum, maximum) that operates on a network path
to calculate the cost of the path Threshold The
value a paths cost must satisfy for that sensor
to be a member of the scene. Thus, a scene, S,
is specified by one or more constraints, C1, C2,
, Cn C1 ltM1, F1, T1gt, C2 ltM2, F2, T2gt, ,
Cn ltMn, Fn, Tngt where M denotes a metric, F
denotes a path cost function, and T denotes a
threshold.
17SCENE Abstraction (Continue..)
Scene construction can be formalized in the
following way Given a client node a, a metric M,
and a positive threshold T, find the set of all
hosts Sa such that all hosts in Sa are reachable
from a and, for all hosts ß in Sa, the cost of
applying the metric on some path from a to ß is
less than T. Specifically  Sa lt set ß M(a,
ß) lt T ß gt  In the three-part notation lt
op quantified_variables range expression gt,
the variables from quantified_variables take on
all possible values permitted by range.
Distributed scene computation
18EXAMPLE SCENE DEFINITIONS
As one example, SCENE_HOP_COUNT effectively
assigns a value of one to each network link.
Therefore, using the built-in SCENE_SUM path
cost function, the application can build a hop
count scene that sums the number of hops a
message takes and only includes nodes that are
within the number of hops as specified by the
threshold. The scene can be further restricted
using latency as a second constraint.
19Common Middleware Systems
20Establishment of UCRC
TinyOS GNU Linux Symbian Windows
CE UML QT LAMP Eclipse
NesC Perl Python Java J2ME XML C, C
PDA Mobile Phones Laptops Workstations Motes RFID
Gateways Access Points Bluetooth Kits WiFi
Kits Displays
21Talk Organization
- Ubiquitous Computing
- UC with Other Terminology
- Middleware for Immersive Networks
- Ubiquitous Society A Case Study
- Real time Challenges
- Future Scope with Development of UC in India
- Conclusion
22U-Sikshak
23RFID Enabled Learning _at_ U-Sikshak
24This vineyard is situated in Bristish Columbia
with special weather conditions. A wireless
sensor network will support farmers in decision
making Giving them data about temperature,
lighting levels. humidity, the movement and
presence of people, and many other aspects of the
environment . (Burell ea 2004 www.lofar.org)
25LOFAR Project for Agriculture Environment
Problem of Phytophthora is a fungal disease in
potatoes
The decision support system (DSS) which helps the
farmer to combat phytophtora in his crop, gathers
the information from the meteorological station
and the wireless sensors from the Agro Server.
Based on this information maps will be made of
the temperature distribution within the fields,
as well as other quantities. Together with the
weather forecast this information will be usedby
the DSS to develop a strategy on how the disease
can best be prevented or controlled. It will
alert the farmer of patches within his fields
which are most susceptible and can be used to
gauge the steps that need to be taken.
26The Prada stores in New York and Tokyo. The
full-block store is organized as an interior
street, called the Wave by the architect (see
above image), with a set of metal boxes floating
above for the few products displayed in this new
form of nomadic shop window.
The store has become a public event, aided by
in-store technology. This includes glass dressing
rooms that phase-change from transparent to
opaque, large video screens that replace store
mirrors to show your back and side views live,
data banks like ATM machines that check inventory
27Talk Organization
- Ubiquitous Computing
- UC with Other Terminology
- Middleware for Immersive Networks
- Ubiquitous Society A Case Study
- Real time Challenges
- Future Scope with Development of UC in India
- Conclusion
28- Still ! we are very far from vision of
Ubiquitous Computing - Let us join and try to resolve following
issues..
29Scalability
- Scalability which plays a significant role in
ubiquitous computing expansion - The ability to grow and remain usable in terms of
the handling cost or handling effort
associated this facet may refer to installation
efforts, to efforts needed for coping with the
growth itself (changing configurations, i.e.,
adding, removing, updating a component) - UC visionary Kevin Kelly mentioned that, the
complexity of the made approaches the complexity
of the born. This complexity comes from rather
simple smart devices, such as networked sensors,
being integrated into huge distributed solutions.
30Connectivity
- Ubiquitous computing does not build on a single
deviceits power emerges from the cooperation of
many devices, either carried by users or embedded
into our everyday environments. - Communication is a very fundamental requirement
in UC. The layer model described in the previous
section points out that connectivity is far more
than just interconnecting computers. Connectivity
is a major scalability issue in UC - As computers become ubiquitous and special
purpose, UC developers and applications want to
draw on the special abilities and knowledge of
the devices. This requires open and extensible
platforms. UC also needs to integrate very
resource-poor nodes, which contradicts the
resource requirements of todays platforms.
31Localization Issues
- Localization is the problem of determining the
position, of a mobile system, in the environment.
The widespread availability of small and
inexpensive mobile computing devices and the
desire to connect them at any time in any place
has driven the need to develop an accurate means
of self-localization. - The self-localization problem further requires
that the system should be able to determine its
position without being directly told its position
by an outside source. The most basic part of the
problem is the answer to the question where am
I? - Devices that typically operate outdoors use GPS
for localization. However, most mobile computing
devices operate not only outdoors but indoors
where GPS is typically unavailable . Therefore,
other localization techniques must be used.
32Liability
- As discussed with the issue more sensitivity,
less protection, IT security issues must be
revisited under UC requirements and constraints.
Moreover, the use of UC technology in everyday
life makes UC-based physical and digital
components an integral part of our societyand
consequently of our economy. - A majority of UC components or services will not
be available for free. Even if they are free of
charge to the end-user, someone will have to pay
for their development and execution. This means
that UC services will have to respond to a number
of market rules, - Its very difficult to resolved this issue..
33Talk Organization
- Ubiquitous Computing
- UC with Other Terminology
- Middleware for Immersive Networks
- Ubiquitous Society A Case Study
- Real time Challenges
- Future Scope with Development of UC in India
- Conclusion
34Now for U- India.????
35Strategic Challenges for u-India
- Ubiquitous Computing Research Initiatives
- Enabling technologies such as wireless sensor
networks, RFID, ad-hoc networks, middleware,
context-aware computing and human-computer
interaction - Deeper insights into issues of ubiquitous
information society - Needs of elders, trust privacy, natural
calamity forecast and management system - Building-up cooperation with countries
implementing u-Information Society
36UbiComp Applications U-Sikshak Learning
application utilizing GrUb Computing Intelligent
Room Health Application Intelligent Intrusion
Detection System (In2DS) Smart Parking
(SPark) UbiComp in Agriculture (U-Agri)
- UbiComp System Components
- U-Visvaas Security Framework for UbiComp
- UbiComp Semantic Space
- Context Aware Toolkit
- Adaptive Framework for WSN Applications
- Zigbee Stack
- UbiComp Hardware Development
- Sensor Node Hardware
- UWB and 802.15.4 MAC IP Core
- SoC (ARM, 802.15.4/UWB)
C-DACs contributions to DITs UbiComp Initiative
37Intelligent Medicare
- Objectives
- Target Primary Health Center in villages
- Technology for medical cost reduction
- Help Doctor/Nurse
- Health Care Monitoring
- Health History Database
- Application Scenario
- RFID for identification
- Registration/ Database creation
- Disabled friendly
- Consultation with specialist doctor - wireless
- Intelligent Medical jacket Non-invasive sensors
for glucose, pressure, body fat, temperature - Database retrieval from remote location
- Reminders for medicines/ health checkup
- Observatory room, lab, bloodbank
- RFID for medicines, blood group
- Ambulance
38(No Transcript)
39Talk Organization
- Ubiquitous Computing
- UC with Other Terminology
- Middleware for Immersive Networks
- Ubiquitous Society A Case Study
- Real time Challenges
- Future Scope with Development of UC in India
- Conclusion
40Conclusion
- UC is the key technology that will deeply
influence our society for three reasons - UC describes the next era of computing. Since we
live in the information (i.e., computer) society,
the influence will be at least as pervasive as
that of computer today. - 2. UC has potential impact on every facet of our
lives. Computing is no longer what we do when we
sit at the computer nor what is
encapsulated/hidden deep inside VCRs, and so
forth. - 3. UC is inevitable and impossible at the same
time the components are already developed and
massively deployed. Since UC use cases are
becoming increasingly profitable, for example,
the replacement of barcodes with RFIDs, the
industry will push the use of UC technology.
41References
- 1 M. Weiser. Hot topics - ubiquitous computing.
Computer, 26(10)7172, October 1993. - 2 T. E. Starner. Wearable computers no longer
science fiction. IEEE Pervasive
Computing,1(1)8688, Jan.-March 2002. - 3 M. Weiser, The Computer for the Twenty-First
Century,Scientific American, Sept. 1991, pp.
94-10. - 4 S. Vinoski, Service Discovery 101, IEEE
Internet Computing, Jan./Feb. 2003, pp. 69-71. - 5 Ashbrook, D., Starner, T. Using GPS to learn
significant locations and predict movement across
multiple users. Personal and Ubiquitous Computing
7 (2003) 275286
42References
- 6 Riva, G., Vatalaro, F., Davide, F.,
Alcañiz, M. (2005) Ambient intelligence.
Amsterdam IOS Press. - 7 Sharp, H., Rogers, Y., Preece, J. (2002).
Interaction design Beyond human-computer
interaction. J. Wiley Sons. - 8 Stajano, F. (2002). Security for ubiquitous
computing.Cambridge John Wiley Sons, Ltd. - 9 Weber, W., Rabaey, J. M., Aarts, E.
(Eds.).(2005). Ambient intelligence, Berlin,
Germany Springer.
43Thank you for your time and interest!
Email dhavalpatel.ec_at_ecchanga.ac.in