Computing Technologies Computing CPU, Memory, Communication Ubiquitous everywhere indefinite number of times Not really possible or desirable more than in traditional computing so widespread that unnoticed 1
Traditional Computing Desktop Computers /Servers Embedded Computers 2
Ubiquitous = More of the Same? No new technical issue Except scalable networking IPV6 In ubiquitous computing we see new kinds of computing 3
Interactive Mobile Computers Motivation Pervasive access to standalone apps Calculator, Games, Music, Video Issues Hardware realization (will be mostly ignored) more robust lower-power lighter weight 4
Interactive Mobile Software Issues Resource-poor power Scheduling, result accuracy I/O devices Speech, Handwriting recognition Storage MEMS Tiny OS Security More vulnerable to theft and destruction Exposed to more people 5
Strongly-Connected Mobile Motivation Internet Remote data access web, rlogin Collaboration Email, chat, application-sharing Computation offloading 6
Strongly-Connected Mobile Internet Issues Mobile IP Address contains location but location variable Adapting to mix of heavyweight, lightweight computers Dynamic application-sharing architectures Multi-device collaboration 7
Intermittent Connection Disconnected and stronglyconnected states Remote data accessed in disconnected state Motivation Internet Work in the offline mode Paper, spreadsheets Issues Local database smaller hoarding Conflicts can arise merging 8
Wireless (Weak) Connection Additional weakly connected state higher delay, error rate Motivation Ubiquitous it remote access Network 9
Wireless (Weak) Connection Issues Physical Layer Bluetooth, IEEE 802.11, Infrared Optimizing weak connections Network Transcoding Batching changes propagated for merging Transcoding Adapting to multiple connection levels es Adaptive TCP/IP Adaptive Transcoding Adaptive update propagation for merging 10
Networked Embedded Computers Connected to network send and/or receive Network May be embedded only for network access networked appliances sensors historical sites & other locations 11
Peer of Networked Embedded Computer? Another embedded computer Network Non embedded Computer 12
Embedded Peer Composite devices security system Network Distributed composites vs. hardwired devices client-defined composites reuse of constituents ease of change extendibility & scalability 13
Smart Dust Network Late binding Monitoring Temperatures in a Fire Monitoring rain levels in a flood 14
Embedded Computer communicating with Non embedded Computer Embedded is client Embedded is server Network 15
Embedded is Client Network Motivation viewing/recording i status t image from camera body part data instrument visualization trigger orders refrigerator items 16
Embedded is Server Interactive computer issues commands to embedded computer Network 17
Motivation Internet Automatic ti applianceremote control binding A single remote control for arbitrary (dissimilar) i il appliances TVs, EKG machines, Water Sprinklers, Car Seats Control appliance from arbitrary locations Water sprinkler from beach Interactive computer can offer different user interfaces from conventional controls 18
Per-User Control of Shared Appliances Mobile device knows owner s info: Favorite channels Volume preferences Credit card PIN Files to be printed Car-seat tilt angle Record/replay Pin recorded first time and replayed later 19
More Powerful Device Output Device EKG results Refrigerator contents t Sprinkler settings Offline Mode Synchronization Enter arbitrary input Water sprinkler days More computation power Undo/Redo Cut/Paste Save Macros 20
Control Appliance Collections Multicast commands Start/stop recording images from all cameras Switch off all lights in the room Switch of all appliances except the refrigerator 21
Control Appliance Collections Network Distributed presentation On projector, speakers, computer screens 22
Motivation Summary More universal More remote Internet More control 23
Networked Embedded Computers Network Issues Late binding Naming Discovery IPC User-interface deployment Multi-appliance control Access control Existing social protocols not supported by existing mechanisms All co-located users can use appliance Children can see certain channels 24
Ad-Hoc Networks Peer to peer connections among late bound computers Motivation Network Spontaneous collaboration classroom, war, airport meeting Sensor networks disaster recovery e.g. heat sensors thrown on fire 25
Ad-Hoc Networks Issues No Router ad-hoc routing Power-aware Network 26
Location-aware computing operations based on current, past, and future locations of users and ddevices 27
Location-Aware Computing Motivation location-based action nearby local printer, doctor nearby remote phone directions/maps location-based information real person s location history/sales/events virtual walkthrough story of city augmented touring machine 28
Pose-Aware Computing Operations based on locations and orientations of users and devices Motivation Augmented reality Magic Lens 29
Wearable Pose-Aware Computers Computers on body track body relative movements monitor person train person 30
Location/Pose- Aware Computing Issues Tracking algorithms fine or coarse grained Software architecture t Maintaining privacy 31
Summary Traditional Stationary desktops/servers and Embedded Ubiquitous Interactive mobile resource-poor security vulnerability Strongly-connected mobile mobile IP adapting to heavyweight/lightweight mix 32
Summary Ubiquitous computing Intermittently connected mobile hoarding synchronization Wireless (weak) communication Physical layer Optimizing i i weak connections Adaptations for multiple connection levels 33
Summary Ubiquitous computing Networked embedded computers Naming Discovery IPC UI deployment Access control Ad-hoc networking with late bound devices ad-hoc routing Location and Pose aware Tracking Architecture Privacy Wearable Avoid strong signals Displays 34
Beyond Desktops/Servers Sensor Embedded bddd Location Flight Simulator Wearable Interactive Mobile Active badge 35