1 / 43

Ubiquitous Computing: Proposed Middleware For Immersive Network, Real Time Challenges and Applications

A Talk on. Ubiquitous Computing: Proposed Middleware For Immersive Network, Real Time Challenges and Applications. Prepared By :. Dhaval K. Patel ID No: 08PGEC08 and EXAM No:5029 M.E.( Commu.System Engineering). Ubiquitous Computing UC with Other Terminology

naava
Télécharger la présentation

Ubiquitous Computing: Proposed Middleware For Immersive Network, Real Time Challenges and Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Talk on Ubiquitous Computing: Proposed Middleware For Immersive Network, Real Time Challenges and Applications Prepared By : Dhaval K. Patel ID No: 08PGEC08 and EXAM No:5029 M.E.( Commu.System Engineering)

  2. Ubiquitous Computing UC with Other Terminology Middleware for Immersive Networks Ubiquitous Society : A Case Study Real time Challenges Future Scope with Development of UC in India Conclusion Talk Organization

  3. What is Ubiquitous Computing ? Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user – Mark Weiser Ubiquitous computing, or calm technology, is a paradigm shift where technology becomes virtually invisible in our lives. - Marcia Riley

  4. Three Waves of Computing ● Mainframe computing (60’s-70’s) – massive computers to execute big data processing applications – very few computers in the world ● Desktop computing (80’s-90’s) – one computer at every desk to help in business related activities – computers connected in intranets to a massive global network (internet), all wired ● Ubiquitous computing (00’s?) – tens/hundreds of computing devices in every room/person, becoming “invisible” and part of the environment

  5. Ubiquitous/Pervasive Computing Calm technology: embedded, invisible, seamlessly, unobtrusive, intelligent. Image source: Friedemann Mattern (ETH Zürich)

  6. Real Life Example of Ubiquitous Computing Today: You realize a block is too heavy to lift. You whistle /call/ motion for your super-heavy helper to assist you. Ubiquitous Computing:You go to lift the block, and your invisible computer agent detects you are not strong enough to do so, and automatically assists you without you even asking for it. [Perhaps not even realizing] A corridor or room automatically adjusts heating, cooling and lighting levels based on the occupant’s profile. “Smartness” may extend to individual objects [e.g. moldable handles that reshape themselves, cars that automatically adjust steering wheel and seat placement] regardless of the space they are in.

  7. Ubiquitous Computing UC with Other Terminology Middleware for Immersive Networks Ubiquitous Society : A Case Study Real time Challenges Future Scope with Development of UC in India Conclusion Talk Organization

  8. UC Vs. VR Ubiquitous Computing is NOT: Virtual reality - real world provides input, not computers! A PDA or PC Called an intimate compute, takes your attention to get it to do the work Ubiquitous Computing : – Supports a world of fully connected devices . – Ensures information is accessible everywhere . – Provides an intuitive, non intrusive interface, feels like you are doing it Ubiquitous computing requires extreme AI.

  9. Ubiquitous computing Vs. Mobile Computing ●Mobile computing: – Chicku owns Mobile phone with web access, voice and short messaging. Remains connected while he drives from Ahmedabad to CITC, Changa. ● Ubiquitous computing: – Chicku is leaving home to go and meet his friends. While passing the fridge, the fridge sends a message to his shoe that milk is almost finished. – When Chicku is passing grocery store, shoe sends message to glasses which displays BUY milk message. – Chicku buys milk, goes home.

  10. Context Awareness ● A Ubiquitous computing system that strives to be minimally intrusive has to be context aware – i.e. aware of user’s state and surroundings and modify its behavior based on this information ● The situational conditions that are associated with a user location,surrounding conditions light, temperature, humidity, noise level, etc), social activities, user intentions,personal information, etc.

  11. Context Aware Applications Who is the User? Where is the User? What is he/she doing? What is his requirement? Context Aware Applications Input Output Context Toolkit

  12. Ubiquitous Computing UC with Other Terminology Middleware for Immersive Networks Ubiquitous Society : A Case Study Real time Challenges Future Scope with Development of UC in India Conclusion Talk Organization

  13. Problem Definition Comparison of (a) existing environments with (b) the scene abstraction

  14. What is Middleware ? • Middleware is a somewhat overloaded term • Generally speaking, middleware provides software services for application programs above the basic operating system and networking services • Accessed via an application program interface (API), but more than an API

  15. Middleware for Immersive Network • Typical middleware services include directory, trading, and brokerage services for discovery transactions, and different transparencies such as location transparency, and failure transparency. • Immersive sensor networks are essential to the future success of ubiquitous computing. The immersive sensor networks that combines traditional sensor network technologies with the vision of ubiquitous computing • In an immersive sensor network, a user’s operational context is highly dynamic. As the user moves through the environment, the set of embedded devices he interacts with should change accordingly.

  16. SCENE Abstraction The programmer only needs to specify three parameters to define a constraint: Metric: A property of the network or environment that defines the cost of a connection (i.e., a property of hosts, links, or data) Path cost function: A function (such as sum, average, minimum, maximum) that operates on a network path to calculate the cost of the path Threshold: The value a path’s cost must satisfy for that sensor to be a member of the scene. Thus, a scene, S, is specified by one or more constraints, C1, C2, …, Cn: C1 = <M1, F1, T1>, C2 = <M2, F2, T2>, …, Cn = <Mn, Fn, Tn> where M denotes a metric, F denotes a path cost function, and T denotes a threshold.

  17. SCENE Abstraction (Continue..) Scene construction can be formalized in the following way: Given a client node α, a metric M, and a positive threshold T, find the set of all hosts Sα such that all hosts in Sα are reachable from α and, for all hosts β in Sα, the cost of applying the metric on some path from α to β is less than T. Specifically: Sα = < set β : M(α, β) < T :: β > In the three-part notation: = < op quantified_variables : range :: expression >, the variables from quantified_variables take on all possible values permitted by range. Distributed scene computation

  18. EXAMPLE SCENE DEFINITIONS As one example, SCENE_HOP_COUNT effectively assigns a value of one to each network link. Therefore, using the built-in SCENE_SUM path cost function, the application can build a hop count scene that sums the number of hops a message takes and only includes nodes that are within the number of hops as specified by the threshold. The scene can be further restricted using latency as a second constraint.

  19. Common Middleware Systems

  20. Establishment of UCRC TinyOS GNU Linux Symbian Windows CE UML QT LAMP Eclipse NesC Perl Python Java J2ME XML C, C++ PDA Mobile Phones Laptops Workstations Motes RFID Gateways Access Points Bluetooth Kits WiFi Kits Displays

  21. Ubiquitous Computing UC with Other Terminology Middleware for Immersive Networks Ubiquitous Society : A Case Study Real time Challenges Future Scope with Development of UC in India Conclusion Talk Organization

  22. LAN / INTERNET Server and Grid Side U Environment-Client Side Database Centre sensors Storage Grid Learning History DB Learner’s Profile DB Content DB Support Rules DB Service Agents Sensor Network camera Microphone Content Mgmt Agent Presentation Agent Listener Agent Profiler Agent Context Aware Tool Kit LMS / Virtual Learning Environment Common Store Learning Objects Clients Learning Tasks Filtering Criteria Filtering Application Learning Exposition Laptop PDA Learning Communications Desktop Environment Mobile Environment Administrative Functions Rendering Criteria Rendering Application Smart Phones Desktop PC U-Sikshak

  23. Library in a campus with RFID tags Lab in a campus with RFID tags Info for botanical science students using RFID - Botanical environment Monument in a Museum environment with RFID RFID Enabled Learning @ U-Sikshak

  24. This vineyard is situated in Bristish Columbia with special weather conditions. A wireless sensor network will support farmers in decision making: Giving them data about temperature, lighting levels. humidity, the movement and presence of people, and many other aspects of the environment . (Burell ea 2004; www.lofar.org)

  25. LOFAR Project for Agriculture Environment Problem of Phytophthora is a fungal disease in potatoes The decision support system (DSS) which helps the farmer to combat phytophtora in his crop, gathers the information from the meteorological station and the wireless sensors from the Agro Server. Based on this information maps will be made of the temperature distribution within the fields, as well as other quantities. Together with the weather forecast this information will be usedby the DSS to develop a strategy on how the disease can best be prevented or controlled. It will alert the farmer of patches within his fields which are most susceptible and can be used to gauge the steps that need to be taken.

  26. The Prada stores in New York and Tokyo. The full-block store is organized as an interior street, called the Wave by the architect (see above image), with a set of metal boxes floating above for the few products displayed in this new form of nomadic shop window. The store has become a public event, aided by in-store technology. This includes glass dressing rooms that phase-change from transparent to opaque, large video screens that replace store mirrors to show your back and side views live, data banks like ATM machines that check inventory

  27. Ubiquitous Computing UC with Other Terminology Middleware for Immersive Networks Ubiquitous Society : A Case Study Real time Challenges Future Scope with Development of UC in India Conclusion Talk Organization

  28. Still ! we are very far from vision of Ubiquitous Computing • Let us join and try to resolve following issues……..

  29. Scalability • Scalability which plays a significant role in ubiquitous computing expansion • The ability to grow and remain usable in terms of the “handling cost” or “handling effort” associated; this facet may refer to installation efforts, to efforts needed for coping with the growth itself (changing configurations, i.e., adding, removing, updating a component) • UC visionary Kevin Kelly mentioned that, “the complexity of the made approaches the complexity of the born.” This complexity comes from rather simple‚ smart devices, such as networked sensors, being integrated into huge distributed solutions.

  30. Connectivity • Ubiquitous computing does not build on a single device—its power emerges from the cooperation of many devices, either carried by users or embedded into our everyday environments. • Communication is a very fundamental requirement in UC. The layer model described in the previous section points out that connectivity is far more than just interconnecting computers. Connectivity is a major scalability issue in UC • As computers become ubiquitous and special purpose, UC developers and applications want to draw on the special abilities and knowledge of the devices. This requires open and extensible platforms. UC also needs to integrate very resource-poor nodes, which contradicts the resource requirements of today’s platforms.

  31. Localization Issues • Localization is the problem of determining the position, of a mobile system, in the environment. The widespread availability of small and inexpensive mobile computing devices and the desire to connect them at any time in any place has driven the need to develop an accurate means of self-localization. • The self-localization problem further requires that the system should be able to determine its position without being directly told its position by an outside source. The most basic part of the problem is the answer to the question: “where am I?” • Devices that typically operate outdoors use GPS for localization. However, most mobile computing devices operate not only outdoors but indoors where GPS is typically unavailable . Therefore, other localization techniques must be used.

  32. Liability • As discussed with the issue “more sensitivity, less protection,” IT security issues must be revisited under UC requirements and constraints. Moreover, the use of UC technology in everyday life makes UC-based physical and digital components an integral part of our society—and consequently of our economy. • A majority of UC components or services will not be available for free. Even if they are free of charge to the end-user, someone will have to pay for their development and execution. This means that UC services will have to respond to a number of “market rules,” • Its very difficult to resolved this issue…..

  33. Ubiquitous Computing UC with Other Terminology Middleware for Immersive Networks Ubiquitous Society : A Case Study Real time Challenges Future Scope with Development of UC in India Conclusion Talk Organization

  34. Now for U- India…….????

  35. Strategic Challenges for u-India • Ubiquitous Computing Research Initiatives • Enabling technologies such as wireless sensor networks, RFID, ad-hoc networks, middleware, context-aware computing and human-computer interaction • Deeper insights into issues of ubiquitous information society • Needs of elders, trust & privacy, natural calamity forecast and management system • Building-up cooperation with countries implementing u-Information Society

  36. UbiComp Applications U-Sikshak: Learning application utilizing GrUb Computing Intelligent Room Health Application Intelligent Intrusion Detection System (In2DS) Smart Parking (SPark) UbiComp in Agriculture (U-Agri) Tangible Space Transit Coordinator Clientele Devices Service Provider Storage Grid • UbiComp System Components • U-Visvaas: Security Framework for UbiComp • UbiComp Semantic Space • Context Aware Toolkit • Adaptive Framework for WSN Applications • Zigbee Stack • UbiComp Hardware Development • Sensor Node Hardware • UWB and 802.15.4 MAC IP Core • SoC (ARM, 802.15.4/UWB) C-DAC’s contributions to DIT’s UbiComp Initiative

  37. Disabled friendly Consultation with specialist doctor - wireless Intelligent Medical jacket Non-invasive sensors for glucose, pressure, body fat, temperature Database retrieval from remote location Reminders for medicines/ health checkup Observatory room, lab, bloodbank RFID for medicines, blood group Ambulance Intelligent Medicare • Objectives • Target Primary Health Center in villages • Technology for medical cost reduction • Help Doctor/Nurse • Health Care & Monitoring • Health History Database • Application Scenario • RFID for identification • Registration/ Database creation

  38. Ubiquitous Computing UC with Other Terminology Middleware for Immersive Networks Ubiquitous Society : A Case Study Real time Challenges Future Scope with Development of UC in India Conclusion Talk Organization

  39. Conclusion • UC is the key technology that will deeply influence our society for three reasons: • UC describes the next era of computing. Since we live in the information (i.e., computer) society, the influence will be at least as pervasive as that of computer today. • 2. UC has potential impact on every facet of our lives. Computing is no longer “what we do when we sit at the computer” nor “what is encapsulated/hidden deep inside VCRs, and so forth.” • 3. UC is inevitable and “impossible” at the same time: the components are already developed and massively deployed. Since UC use cases are becoming increasingly profitable, for example, the replacement of barcodes with RFIDs, the industry will push the use of UC technology.

  40. References • [1] M. Weiser. Hot topics - ubiquitous computing. Computer, 26(10):71–72, October 1993. • [2] T. E. Starner. Wearable computers: no longer science fiction. IEEE Pervasive Computing,1(1):86–88, Jan.-March 2002. • [3] M. Weiser, “The Computer for the Twenty-First Century,”Scientific American, Sept. 1991, pp. 94-10. • [4] S. Vinoski, “Service Discovery 101,” IEEE Internet Computing, Jan./Feb. 2003, pp. 69-71. • [5] Ashbrook, D., Starner, T.: Using GPS to learn significant locations and predict movement across multiple users. Personal and Ubiquitous Computing 7 (2003) 275–286

  41. References • [6] Riva, G., Vatalaro, F., Davide, F., & Alcañiz, M. (2005): Ambient intelligence. Amsterdam: IOS Press. • [7] Sharp, H., Rogers, Y., Preece, J. (2002). Interaction design: Beyond human-computer interaction. J. Wiley & Sons. • [8] Stajano, F. (2002). Security for ubiquitous computing.Cambridge: John Wiley & Sons, Ltd. • [9] Weber, W., Rabaey, J. M., & Aarts, E. (Eds.).(2005). Ambient intelligence, Berlin, Germany: Springer.

  42. Thank you for your time and interest! Email: dhavalpatel.ec@ecchanga.ac.in

More Related