introduction to pervasive and ubiquitous computing
DESCRIPTION
Introduction to Pervasive and Ubiquitous Computing. Dr. Tarek Sheltami COE 482. Outline. A technology trying to embed the PCs into everyday objects to make the PCs invisible. Ubiquitous: Being or seeming to be everywhere at the same time (omnipresent). - PowerPoint PPT PresentationTRANSCRIPT
Introduction to Introduction to Pervasive and Pervasive and
Ubiquitous Ubiquitous ComputingComputing
Dr. Tarek SheltamiDr. Tarek SheltamiCOE 482COE 482
OutlineOutline A technology trying to embed the PCs into A technology trying to embed the PCs into
everyday objects to make the PCs invisible.everyday objects to make the PCs invisible. Ubiquitous: Being or seeming to be Ubiquitous: Being or seeming to be
everywhere at the same time (omnipresent). everywhere at the same time (omnipresent). Later this was renamed as pervasive Later this was renamed as pervasive
computing.computing. Pervasive: Capability to spread through ought.Pervasive: Capability to spread through ought. Meaning Spreading the computation power Meaning Spreading the computation power
into everything around us.into everything around us. The name ubiquitous computing was coined The name ubiquitous computing was coined
by Mark Weiser (Father of Ubiquitous by Mark Weiser (Father of Ubiquitous Computing).Computing).
04/21/23 A summary of PPTs in the web 2
The Major Trends in The Major Trends in ComputingComputing
Mainframe Mainframe (Past) (Past) 1:N1:N one computer shared by many peopleone computer shared by many people
Personal Computer (Present) 1:1 one computer, one person
N:1 *Internet -
Widespread Distributed Computing*
Ubiquitous Nk:1
Computing
many computers shared by each one of us
04/21/23 A summary of PPTs in the web 3
Phase I - The Mainframe Phase I - The Mainframe Era Era
Computers were a scarce resource Computers were a scarce resource run by experts behind closed doors. run by experts behind closed doors.
04/21/23 A summary of PPTs in the web 4
Phase II - The PC Era Phase II - The PC Era
In 1984 the number of people using PCs In 1984 the number of people using PCs surpassed that of people using mainframe surpassed that of people using mainframe computers.computers.
PC Era:PC Era: YouYou have have youryour computer, it contains computer, it contains youryour stuff, and stuff, and youyou interact directly and interact directly and deeply with it. deeply with it.
The PC is most analogous to the automobile.The PC is most analogous to the automobile.
04/21/23 A summary of PPTs in the web 5
Transition Phase - The Transition Phase - The InternetInternet
The Internet brings together The Internet brings together elements of the mainframe elements of the mainframe
era and the PC era.era and the PC era.
Client = PC
Server = Mainframe
04/21/23 A summary of PPTs in the web 6
Phase III - The UC EraPhase III - The UC Era The UC era will have lots of computers The UC era will have lots of computers
shared by each one of us. shared by each one of us. UC is fundamentally characterized by the UC is fundamentally characterized by the
connection of things in the world with connection of things in the world with computation. computation.
Frequently used related terms: Pervasive computing, Wearable computers, Intelligent environment, Things That Think (T³),Wearware, Personal Area Networking (PAN).[3]
04/21/23 A summary of PPTs in the web 7
UC - DefinitionUC - Definition
Elements that define ubiquitous computing:Elements that define ubiquitous computing:[4][4]
1)1) Ubiquity/PervasivenessUbiquity/Pervasiveness – lots of devices– lots of devices2)2) ConnectednessConnectedness – the devices are networked– the devices are networked3)3) Context-awarenessContext-awareness – the system is aware of – the system is aware of
the context of usersthe context of users4)4) InvisibilityInvisibility – device effectively becomes – device effectively becomes
invisibleinvisible
04/21/23 A summary of PPTs in the web 8
UC – How To Understand UC – How To Understand ItIt
UC goal: enhancing computer use by making UC goal: enhancing computer use by making many computers available throughout the many computers available throughout the physical environment, but making them physical environment, but making them effectively invisible to the user. effectively invisible to the user.
UbiquityUbiquity
– – EverywhereEverywhere
– – Adaptation to environmentAdaptation to environment
– – Intuitive, transparent, natural interfacesIntuitive, transparent, natural interfaces
04/21/23 A summary of PPTs in the web 9
04/21/23 A summary of PPTs in the web 10
Pervasive/Ubiquitous Pervasive/Ubiquitous ComputingComputing
Pervasive (or ubiquitous)Pervasive (or ubiquitous) computing computing which is a concept based on a vision which is a concept based on a vision described by described by Mark WeiserMark Weiser in 1991. in 1991.
Move beyond desktop machineMove beyond desktop machine Ubiquitous computing environments Ubiquitous computing environments
involve the interaction, coordination, involve the interaction, coordination, and cooperation of numerous, casually and cooperation of numerous, casually accessible, and often invisible accessible, and often invisible computing devices.computing devices.
Computing is embedded everywhere in Computing is embedded everywhere in the environmentthe environment
04/21/23 A summary of PPTs in the web 11
Ubicomp NotionsUbicomp Notions
The "authorized access to anytime-anywhere-any device-any network-any data"
““Invisible” resourcesInvisible” resources it is computation that's freely
available everywhere Machines sense users’ presence and Machines sense users’ presence and
act accordinglyact accordingly
04/21/23 A summary of PPTs in the web 12
BEGINNINGS OF UBIQUITOUS COMPUTING
While working atXEROX Palo Alto Research Center (PARC) as Chief Technologist, Weiser envisioned the third era of computing in 1985.
Weiser produced three types of wirelesscomputing devices
Tabs pads boards.04/21/23 A summary of PPTs in the web 13
Pervasive computing technologiesPervasive computing involves three converging areas of
ICT computing (‘devices’) - PCS devices are likely to
assume many different forms and sizes, from handheld units (similar to mobile phones)to near-invisible devices set into ‘everyday’ objects (like furniture and clothing).
Communications (‘connectivity’)- This can be achieved via both wired (such as Broadband (ADSL) or Ethernet) and wireless networking technologies (such as WiFi or Bluetooth)
‘user interfaces’- new user interfaces are being developed that will be capable of sensing and supplying more information about users, and the broader environment, to the computer for processing
04/21/23 A summary of PPTs in the web 14
04/21/23 A summary of PPTs in the web 15
Embedded TechnologyEmbedded Technology
is the process of introducing computing is the process of introducing computing power to various appliances. power to various appliances.
Computers are hidden in numerous Computers are hidden in numerous information appliances which we use in information appliances which we use in our day-to-day life. our day-to-day life.
common scenario posits refrigerators common scenario posits refrigerators "aware" of their suitably-tagged "aware" of their suitably-tagged contents, able to both plan a variety of contents, able to both plan a variety of menus from the food actually on hand, and menus from the food actually on hand, and warn users of stale or spoiled food.warn users of stale or spoiled food.
04/21/23 A summary of PPTs in the web 16
Applications of UbicompApplications of Ubicomp
Health care home care transport environmental monitoring
04/21/23 A summary of PPTs in the web 17
1. Health care
Pervasive computing offers opportunities for future healthcare provision both for treating and managing disease, and for patient administration
remote sensors and monitoring technology might allow the continuous capture and analysis of patients’ physiological data
Medical staff could be immediately alerted to any detected irregularities
04/21/23 A summary of PPTs in the web 18
04/21/23 A summary of PPTs in the web 19
2. Environmental monitoring
Pervasive computing provides improved methods to monitor the environment
It will allow for continuous realtime data collection and analysis via remote, wireless devices
this poses significant challenges for PCS developers. Devices may be required to withstand harsh environmental conditions (such as heat, cold and humidity
04/21/23 A summary of PPTs in the web 20
3. 3. Intelligent transport systems
Such systems seek to bring together information and telecommunications technologies in a collaborative scheme to improve the safety, efficiency and productivity of transport networks
Electronic devices could be directly integrated into the transport infrastructure, and into vehicles themselves, with the aim of better monitoring and managing the movement of vehicles within road, rail, air and sea transport systems.
04/21/23 A summary of PPTs in the web 21
ChallengesChallenges
The “Accidentally” Smart Environment Impromptu Interoperability No Systems Administrator Social Implications of Aware
Technologies Reliability Inference in the Presence of Ambiguity
04/21/23 A summary of PPTs in the web 22
1. 1. The “Accidentally” Smart Environment
If you walk into an environment anywhere in the world, you would probably not find an infrastructure suitable for ubiquitous computing
Instead, you would find an infrastructure suited towards established and well-grounded technologies
the environments of users must be “upgraded,” to support this new technology
04/21/23 A summary of PPTs in the web 23
2. 2. Impromptu Interoperability
Ubiquitous computing must not just have interoperable devices, they must have impromptu interoperability – the ability to interconnect and communicate with little or no advance planning.
This presents a problem because every device must be written to understand the software of every other device
04/21/23 A summary of PPTs in the web 24
3. 3. Social Implications of Aware Technologies
Pervasive computing systems may have implications for privacy, security and safety, as a result of their ability to: gather sensitive data, for example on users' everyday interactions, movements, preferences and attitudes, without user intervention or consent
The advent of pervasive computing may mean that data can be collected without a person’s knowledge or consent. Some argue that this could violate existing data protection law
04/21/23 A summary of PPTs in the web 25
4. 4. Reliability
Since ubiquitous computing devices will be everywhere, it makes sense for them to be reliable.
Owners and developers will not want to be constantly bombarded by failing devices or insecure software.
04/21/23 A summary of PPTs in the web 26
CONCEPTS AND CONCEPTS AND TECHNOLOGY FOR THE TECHNOLOGY FOR THE
FUTUREFUTURE Ubiquitous computing is the next Ubiquitous computing is the next
generation computing environments generation computing environments with information & communication with information & communication technology everywhere, for technology everywhere, for everyone, at all times.everyone, at all times.
Information and communication Information and communication technology will be an integrated part technology will be an integrated part of our environments of our environments
04/21/23 A summary of PPTs in the web 27