Mobile and Ubiquitous Computing. Fundamental Concepts. George Roussos. Session Overview

Similar documents
Mobile and Ubiquitous Computing. Fundamental Concepts. George Roussos.

Mobile Computing Introduction

Watchdata SIMachine (M2M Solution)

Wireless Security Background

Introduction to Mobile Ubiquitous Computing Systems

Mobile and Ubiquitous Computing

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Multiple Dimensions in Convergence and Related Issues

A Survey of Context-Aware Mobile Computing Research

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services

CEN 538 Wireless LAN & MAN Networks

References. The vision of ambient intelligence. The missing component...

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Discovering Computers Chapter 9 Communications and Networks

Electrification of Mobility

Ubiquitous Computing. Ambient Intelligence

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

System Challenges for Pervasive and Ubiquitous Computing

5G radio access. ericsson White paper Uen June research and vision

Policy-Based Context-Management for Mobile Solutions

Chapter 7. Telecommunications, the Internet, and Wireless Technology

The Internet of Things

Networking Cyber-physical Applications in a Data-centric World

Wireless Ad-Hoc Networks

A Location Model for Ambient Intelligence

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl

It is the process of sharing data, programs, and information between two or more computers.

MODAInnovations Complete Academic Project Solutions

M2M for Smart Cities. Gerd Ascheid

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING

Wireless Transmission and Mobility

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38

HCI Lecture 14. Special Issues: Ubiquitous computing

COMPUTER SKILLS COMP101

Communications and Networks

Ad Hoc & Sensor Networks

Innovative M-Tech projects list IEEE papers

Innovative M-Tech projects list

Mobile and Sensor Systems

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis

Introduction to Networked Embedded Systems and Course Description. Song Han Office: ITEB 355

Case study of Wireless Technologies in Industrial Applications

Wireless Embedded Systems ( x) Ad hoc and Sensor Networks

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008

Overview. M-commerce vs. E-commerce

Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management

Wireless Attacks and Countermeasures

LTE : The Future of Mobile Broadband Technology

Pervasive Computing. OpenLab Jan 14 04pm L Institute of Networked and Embedded Systems

Mobility and Media. How mobile computing is evolving at HP. Mark Smith Mobile and Media Systems Lab Hewlett Packard Laboratories

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Ubiquitous and Context Aware Computing: Overview and Systems

Browsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments

Cellular Communication

Home-Mobile. The Cast Devices. The Cast Network Related (2) The Cast Network Related. Voice over IP (VoIP) Dr. Hayden Kwok-Hay So

INTERNET OF BIG THINGS : SMART INFRASTRUCTURES FOR IMPROVED MOBILITY. Sarah WELDON

Opening a New Era of IoT Opportunities and Solutions. Harrison Hsieh GM of Connectivity Technology Development

COPYRIGHTED MATERIAL. Index

Managed Wi-Fi. Connect whenever, wherever

History of Ubiquitous & Wearable Computing

Wireless Sensor Networks (WSN)

Broad Objectives/Outcomes of the course

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

What do we expect from Wireless in the Factory?

Ubiquitous Computing Introduction

Mobile Millennium Using Smartphones as Traffic Sensors

1 Wireless Network Architecture

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn...

Page 1. Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer. Topics for Today. Ubiquitous Computing Fundamentals

Using Mobile Computers Lesson 12

EMBEDDED MAJOR PROJECTS LIST

A Very Short Introduction to Pervasive Computing

Context Aware Computing

They avoid the cost, installation, and maintenance of network infrastructure.

Connected lifestyles: The next big wave

Smart Dust : Dispersed, Un-tethered Geospatial Monitoring. Dr. Raja R. Kadiyala Chief Technology Officer CH2M HILL - Oakland, CA

Core Embedded Systems

Wireless# Guide to Wireless Communications. Objectives

Vivato Based VoIP. Introduction. Open Platform. Scalable. Wireless LAN Components. Application: Wi-Fi Base Station

Mobile e-health with HL7

Internet of Things. Sungkyunkwan University. Mobile Computing. Hyunseung Choo

09. Mobile Commerce. Contents. Mobile Computing and Commerce

IOT Communications Network for Data

Introduction to Wireless Networking ECE 401WN Spring 2009

Wireless networks. Wireless Network Taxonomy

Wireless Sensor Networks CS742

Unit 2: Technology Systems

Terminology, Types of Computers & Computer Hardware

Turban and Volonino. Mobile Commerce. Information Technology for Management Improving Performance in the Digital Economy

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

CHAPTER 1 INTRODUCTION

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL.

Version 11

Ericsson networked society. 27 th of September 2017, Espoo

Define the term, computer, and describe the relationship between data and information

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

Cooperative Wireless Communications. Ashutosh Sabharwal

Blue3 A Programmable Remote MP3 Sensor

MOBILE COMPUTING 1/17/18. Course Overview. Course Goals

Applying Plantwide Industrial Wireless Communications for Cost Savings. Copyright 2012 Rockwell Automation, Inc. All rights reserved.

Transcription:

Mobile and Ubiquitous Computing Fundamental Concepts George Roussos g.roussos@dcs.bbk.ac.uk Session Overview The ubiquitous computing paradigm Elements of ubiquitous computing Applications and their role Evaluating progress in systems work In-depth: Implications of mobility Why mobile and ubiquitous today Computers camouflaged as non-computers, i.e. invisible computers Mobile and ubiquitous computers are orders of magnitude more than desktops and servers: 8 billion embedded processors 150 million desktops/servers Developments are coming from different disciplines: built environment, embedded systems, telephony, automotive, supply chain, security, appliances etc 1

Example BMW 745i 2,000,000 LOC Windows CE 53 8-bit processors 11 32-bit processors 7 16-bit processors Multiple networks What networks does this car have? What other networks can you think of? Mobile Computing The application of small, portable, and wireless computing and communication devices Being able to use a computing device even when being on the move (and thus changing location) Portability is one aspect of mobile computing portable vs. mobile Mobile telephony in particular allows you to make and receive voice calls on the move Mobile Computing Ingredients Device laptop, PDA, mobile phone, tablet, smart phone Network cellular telephony, data over cellular, wi-fi, Bluetooth, Zigbee, infra-red, 3G, 4G System support routing, billing, voice mail, data routing In-depth discussion of the issues raised by mobile systems architectures later today 2

What does ubiquitous mean? Dictionary definition: being or seeming to be everywhere at the same time; omnipresent; found in large quantities everywhere; "all over the place." Term introduced by Mark Weiser (but others have also described the vision, notably Ken Sakamura) The physical/digital discontinuity Physical Physical (real) resources: People Objects Places Digital Digital resources: Object info and location Maps Person info Activities Ubiquitous Computing Ubiquitous computing: activates the world, is invisible, everywhere computing that does not live on a personal device of any sort, but is in the woodwork everywhere, makes a computer so imbedded, so fitting, so natural, that we use it without even thinking about it. Also called: pervasive, deeply embedded, 4G mobile or sentient computing, and ambient intelligence. 3

Four Waves - Four Paradigms Mainframe computing (60 s-70 s) massive computers to execute big data processing applications very few computers in the world Desktop computing (80 s-90 s) one computer at every desk to help in business-related activities computers connected in intranets to a massive global network (internet), all wired Mobile computing (90 s-00 s) a few devices for every person, small enough to carry around devices connected to cellular networks or WLANs Ubiquitous computing (now) tens/hundreds of computing devices in every room/person, becoming invisible and part of the environment WANs, LANs, PANs networking in small spaces Enabling Technologies, Part 1 Wireless (data) communication higher bandwidth lower power commodity (readily available and secure) Small form factor devices shrinking electronics better displays new input methods Personalisation Machine learning Inference Enabling Technologies, Part 2 Automatic identification RFID, numbering schemes, network information services Sensing and actuation mechanical, chemical, electric, bio Context awareness physical: properties of objects Information: data, profile, provider social: identity, situation, role Ambient displays public screens, interaction Tangible interfaces 4

Extremely Varied Embedding for smart control Embedded systems for cars, airplanes, etc. Creating new computing devices Hi-tech, silicon-based gadgetry, e.g. PDAs, cell phones, mp3 players, active displays Connecting the existing physical world to a computational infrastructure Ordinary objects and tasks re-evaluated and extended with computational/communication capabilities Applications First How can we enhance [everyday] activities by connecting them to a computational infrastructure? What computational infrastructure do we need? Applications are a good way to explore a new paradigm before we have a complete specification of the problems/open questions Computer Science and Engineering Issues Interaction design Security + Privacy + Trust Communications and networks Operating systems Hardware design Software design The whole field! (and more: social science essential) 5

Interaction Design The interface Very small interface Tangible interface No interface Everywhere interface Overcoming real-estate shortage new devices, voice / video input (e.g gestures) intelligence How to address many systems rather than computers (without going insane) Context-awareness Trust wireless systems pervasive access points to network implementing surveillance overcoming surveillance control trust vs. trustworthiness Communications & Networking home networks, personal area networks, ad-hoc networks, consumer electronics networks, building networks, public access networks new media (e.g. sound, chemicals, biosensing, feelings) new ways of using existing media new metrics: bits/s/m 3 How to leverage all the available networks to provide global services (scope, scalability, standardization) 6

Operating Systems & Middleware Resources Limited resources Power-aware, heat dissipation Resource management Generic vs. specialized Dependable (complexity, validation, verification) Mobile (time, performance, location, disconnection) Real-time DSP Hardware Design Small size, low weight, low power May have to be deployed in harsh environments Production: extreme cost sensitivity Fast product cycles New sensing capabilities Software Design Must cope with large variation in hardware Must cope with rapidly changing requirements Programming the system, rather than the devices How to partition the code so that it can be easily customized in different environments New, hierarchical, multi-context architectures CISCO Application Oriented Networking 7

Auto-Identification Middleware for improved RFID reading accuracy Caching strategies for ONS performance Location tracking using WLAN and RFID data Systems architecture for ERP integration Context-Awareness The physical environment: user location, presence of other persons or objects in the same location, and the environmental conditions observed. Time for example, whether a particular person is occupied by professional or personal concerns. Device and network characteristics Information context is the semantic knowledge regarding the domain being investigated for example, the shortterm information needs of the user as they might be expressed in a query. Information context also includes the user profiles that reveal long-term interests Social context Applications 1 Active Theatre Aarhus University The project focuses on novel ways of using computers before, during and after surgery Ambient displays are used to support collaborative work http://www.pervasive-interaction.org/activetheatre/ 8

Applications 2 Aware Home Georgia Tech Addresses challenges facing the future of domestic technologies The Gesture Pendant allows ordinary household devices to be controlled with the wave of a hand http://www.awarehome.gatech.edu/ Applications 3 Urban Tapestries Proboscis An experimental software platform for knowledge mapping and sharing ie. public authoring It combines mobile and internet technologies with geographic information systems to allow people to build relationships between places and to associate stories, information, pictures, sounds and videos with them http://urbantapestries.net/ Applications 4 Feral Robots v2 Birkbeck and Proboscis To design and create practical applications from commercially available technologies for social and cultural public benefit such as adapting a remote control toy car into a powerful sensing device for locating and identifying chemical pollution and radiation http://socialtapestries.net/feralrobots/ 9

Applications 5 Uncle Roy All Around You Equator Street Players use handheld computers to search for Uncle Roy, using the map and incoming messages to move through the city. Online Players cruise through a virtual map of the same area, searching for Street Players to help them find a secret destination. http://www.uncleroyallaroundyou.co.uk/ Applications 6 Great Duck Island Project UC Berkeley Very large wireless sensor network deployment on Great Duck Island, Maine, aiming to monitor the microclimates in and around nesting burrows used by the Leach's Storm Petrel http://www.greatduckisland.net/ Mobile Computing in More Depth Wireless communication Disconnection Low bandwidth High bandwidth variability Heterogeneous networks Security Mobility Addressing and routing Location based information Migration Portability Low power Small interface Restricted storage Security 10

Wireless Characteristics Wireless is primary network interface, may attach via cable on and off Implication: signal interacts with the environment noise, echoes (multi-path, timing), blocking objects, walls, other sources, weather Implication: network topology very dynamic hosts come and go, loss of connectivity, variable density Result: degradation/variability of capability to communicate, errors Networks and applications must deal with this Communications Challenges 1 Disconnection autonomy of operation vs. centralized operation delay tolerance: asynchronous operation, prefetching, lazy write-back, caching execution quality guarantees Low bandwidth cellular 9-14 kbits, GPRS 171 kbits (theory), 40-60 kbits (real), infrared 1Mbits, Bluetooth 1-10 Mbits, Wi- Fi 2-57 Mbits shared between users! limited transmission range! Communications Challenges 2 High bandwidth variability adaptation move from area with GPRS to simple cellular Heterogeneous networks different (physical) interfaces different network structure (e.g. cellular vs. ad-hoc) Security eavesdropping on the air easy to move between security domains may have limited access to resources (e.g. software updates) 11

Mobility: Addressing and Routing Moving from access point to access point How do you handle the change How do you reroute data to the new location Who is responsible for maintaining correct operation These actions are mostly taken by persons on wired networks One solution: Mobile IP Will discuss in details Mobility: Location Based Computing How to take into account the location of the host and the user to access resources nearest to you more relevant, better performance local restaurant, closer data servers to modify the operation of software e.g. discover new services available localy Technology: many different depending on wireless system used, indoor-outdoor, type of location needed GPS, location tags, vision, triangulation etc A whole session will be on this! Mobility: Migration Device start work on a PDA and continue on a phone processes, data, state Location start work on the train and continue at home security, resources, preferred attachement Context use the same resource to work and then to entertain cost, security, resources, identity 12

Low power Mobile power source = battery Reduce processor and network power consumption on/off cycles reduce frequency Adaptation New: data harvesting solar power, vibration, thermal power Small Interface Small display/screen size need for interaction alternatives need for summarization Restricted input device no mouse, no full keyboard keypad or less, voice recognition Eternal devices Bluetooth headphones, printers, interaction with external displays Restricted Storage 13

Security The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats US INFOSEC Integrity, confidentiality, availability, non-repudiation Hostile environment One session dedicated to this Cellular System Architecture BSC HLR VLR AUC MSC Public Networks BSC MSC is Central Unit that controls all the traffic Home Location Register: Contains information of all users local to the MSC Visitor Location Register: Stores information pertaining to roaming Mobile Station currently in this MSC Authentication Center: Stores all the encryption keys Experimental Systems Research The scientific method hypothesis, experiment, validation and replication How to formulate a hypothesis What is the basis for your hypothesis? What are the implications of your hypothesis? What is the expected result Design experiment to show the causal effect Ensure correctness and replication 14

Summary The ubiquitous computing paradigm Challenges Novelty Elements of ubiquitous computing Technology and science Applications and their role Conducting experimental systems research 15