27
Introduction to Introduction to Pervasive and Pervasive and Ubiquitous Ubiquitous Computing Computing Dr. Tarek Sheltami Dr. Tarek Sheltami COE 482 COE 482

Introduction to Pervasive and Ubiquitous Computing

  • Upload
    krysta

  • View
    76

  • Download
    7

Embed Size (px)

DESCRIPTION

Introduction to Pervasive and Ubiquitous Computing. Dr. Tarek Sheltami COE 482. Outline. A technology trying to embed the PCs into everyday objects to make the PCs invisible. Ubiquitous: Being or seeming to be everywhere at the same time (omnipresent). - PowerPoint PPT Presentation

Citation preview

Page 1: Introduction to Pervasive and Ubiquitous Computing

Introduction to Introduction to Pervasive and Pervasive and

Ubiquitous Ubiquitous ComputingComputing

Dr. Tarek SheltamiDr. Tarek SheltamiCOE 482COE 482

Page 2: Introduction to Pervasive and Ubiquitous Computing

OutlineOutline A technology trying to embed the PCs into A technology trying to embed the PCs into

everyday objects to make the PCs invisible.everyday objects to make the PCs invisible. Ubiquitous: Being or seeming to be Ubiquitous: Being or seeming to be

everywhere at the same time (omnipresent). everywhere at the same time (omnipresent). Later this was renamed as pervasive Later this was renamed as pervasive

computing.computing. Pervasive: Capability to spread through ought.Pervasive: Capability to spread through ought. Meaning Spreading the computation power Meaning Spreading the computation power

into everything around us.into everything around us. The name ubiquitous computing was coined The name ubiquitous computing was coined

by Mark Weiser (Father of Ubiquitous by Mark Weiser (Father of Ubiquitous Computing).Computing).

04/21/23 A summary of PPTs in the web 2

Page 3: Introduction to Pervasive and Ubiquitous Computing

The Major Trends in The Major Trends in ComputingComputing

Mainframe Mainframe (Past) (Past) 1:N1:N one computer shared by many peopleone computer shared by many people

Personal Computer (Present) 1:1 one computer, one person

N:1 *Internet -

Widespread Distributed Computing*

Ubiquitous Nk:1

Computing

many computers shared by each one of us

04/21/23 A summary of PPTs in the web 3

Page 4: Introduction to Pervasive and Ubiquitous Computing

Phase I - The Mainframe Phase I - The Mainframe Era Era

Computers were a scarce resource Computers were a scarce resource run by experts behind closed doors. run by experts behind closed doors.

04/21/23 A summary of PPTs in the web 4

Page 5: Introduction to Pervasive and Ubiquitous Computing

Phase II - The PC Era Phase II - The PC Era

In 1984 the number of people using PCs In 1984 the number of people using PCs surpassed that of people using mainframe surpassed that of people using mainframe computers.computers.

PC Era:PC Era: YouYou have have youryour computer, it contains computer, it contains youryour stuff, and stuff, and youyou interact directly and interact directly and deeply with it. deeply with it.

The PC is most analogous to the automobile.The PC is most analogous to the automobile.

04/21/23 A summary of PPTs in the web 5

Page 6: Introduction to Pervasive and Ubiquitous Computing

Transition Phase - The Transition Phase - The InternetInternet

The Internet brings together The Internet brings together elements of the mainframe elements of the mainframe

era and the PC era.era and the PC era.

Client = PC

Server = Mainframe

04/21/23 A summary of PPTs in the web 6

Page 7: Introduction to Pervasive and Ubiquitous Computing

Phase III - The UC EraPhase III - The UC Era The UC era will have lots of computers The UC era will have lots of computers

shared by each one of us. shared by each one of us. UC is fundamentally characterized by the UC is fundamentally characterized by the

connection of things in the world with connection of things in the world with computation. computation.

Frequently used related terms: Pervasive computing, Wearable computers, Intelligent environment, Things That Think (T³),Wearware, Personal Area Networking (PAN).[3]

04/21/23 A summary of PPTs in the web 7

Page 8: Introduction to Pervasive and Ubiquitous Computing

UC - DefinitionUC - Definition

Elements that define ubiquitous computing:Elements that define ubiquitous computing:[4][4]

1)1) Ubiquity/PervasivenessUbiquity/Pervasiveness – lots of devices– lots of devices2)2) ConnectednessConnectedness – the devices are networked– the devices are networked3)3) Context-awarenessContext-awareness – the system is aware of – the system is aware of

the context of usersthe context of users4)4) InvisibilityInvisibility – device effectively becomes – device effectively becomes

invisibleinvisible

04/21/23 A summary of PPTs in the web 8

Page 9: Introduction to Pervasive and Ubiquitous Computing

UC – How To Understand UC – How To Understand ItIt

UC goal: enhancing computer use by making UC goal: enhancing computer use by making many computers available throughout the many computers available throughout the physical environment, but making them physical environment, but making them effectively invisible to the user. effectively invisible to the user.

UbiquityUbiquity

– – EverywhereEverywhere

– – Adaptation to environmentAdaptation to environment

– – Intuitive, transparent, natural interfacesIntuitive, transparent, natural interfaces

04/21/23 A summary of PPTs in the web 9

Page 10: Introduction to Pervasive and Ubiquitous Computing

04/21/23 A summary of PPTs in the web 10

Page 11: Introduction to Pervasive and Ubiquitous Computing

Pervasive/Ubiquitous Pervasive/Ubiquitous ComputingComputing

Pervasive (or ubiquitous)Pervasive (or ubiquitous) computing  computing which is a concept based on a vision which is a concept based on a vision described by described by Mark WeiserMark Weiser  in 1991.  in 1991.

Move beyond desktop machineMove beyond desktop machine Ubiquitous computing environments Ubiquitous computing environments

involve the interaction, coordination, involve the interaction, coordination, and cooperation of numerous, casually and cooperation of numerous, casually accessible, and often invisible accessible, and often invisible computing devices.computing devices.

Computing is embedded everywhere in Computing is embedded everywhere in the environmentthe environment

04/21/23 A summary of PPTs in the web 11

Page 12: Introduction to Pervasive and Ubiquitous Computing

Ubicomp NotionsUbicomp Notions

The "authorized access to anytime-anywhere-any device-any network-any data"

““Invisible” resourcesInvisible” resources it is computation that's freely

available everywhere Machines sense users’ presence and Machines sense users’ presence and

act accordinglyact accordingly

04/21/23 A summary of PPTs in the web 12

Page 13: Introduction to Pervasive and Ubiquitous Computing

BEGINNINGS OF UBIQUITOUS COMPUTING

While working atXEROX Palo Alto Research Center (PARC) as Chief Technologist, Weiser envisioned the third era of computing in 1985.

Weiser produced three types of wirelesscomputing devices

Tabs pads boards.04/21/23 A summary of PPTs in the web 13

Page 14: Introduction to Pervasive and Ubiquitous Computing

Pervasive computing technologiesPervasive computing involves three converging areas of

ICT computing (‘devices’) - PCS devices are likely to

assume many different forms and sizes, from handheld units (similar to mobile phones)to near-invisible devices set into ‘everyday’ objects (like furniture and clothing).

Communications (‘connectivity’)- This can be achieved via both wired (such as Broadband (ADSL) or Ethernet) and wireless networking technologies (such as WiFi or Bluetooth)

‘user interfaces’- new user interfaces are being developed that will be capable of sensing and supplying more information about users, and the broader environment, to the computer for processing

04/21/23 A summary of PPTs in the web 14

Page 15: Introduction to Pervasive and Ubiquitous Computing

04/21/23 A summary of PPTs in the web 15

Page 16: Introduction to Pervasive and Ubiquitous Computing

Embedded TechnologyEmbedded Technology

is the process of introducing computing is the process of introducing computing power to various appliances. power to various appliances.

Computers are hidden in numerous Computers are hidden in numerous information appliances which we use in information appliances which we use in our day-to-day life. our day-to-day life.

common scenario posits refrigerators common scenario posits refrigerators "aware" of their suitably-tagged "aware" of their suitably-tagged contents, able to both plan a variety of contents, able to both plan a variety of menus from the food actually on hand, and menus from the food actually on hand, and warn users of stale or spoiled food.warn users of stale or spoiled food.

04/21/23 A summary of PPTs in the web 16

Page 17: Introduction to Pervasive and Ubiquitous Computing

Applications of UbicompApplications of Ubicomp

Health care home care transport environmental monitoring

04/21/23 A summary of PPTs in the web 17

Page 18: Introduction to Pervasive and Ubiquitous Computing

1. Health care

Pervasive computing offers opportunities for future healthcare provision both for treating and managing disease, and for patient administration

remote sensors and monitoring technology might allow the continuous capture and analysis of patients’ physiological data

Medical staff could be immediately alerted to any detected irregularities

04/21/23 A summary of PPTs in the web 18

Page 19: Introduction to Pervasive and Ubiquitous Computing

04/21/23 A summary of PPTs in the web 19

Page 20: Introduction to Pervasive and Ubiquitous Computing

2. Environmental monitoring

Pervasive computing provides improved methods to monitor the environment

It will allow for continuous realtime data collection and analysis via remote, wireless devices

this poses significant challenges for PCS developers. Devices may be required to withstand harsh environmental conditions (such as heat, cold and humidity

04/21/23 A summary of PPTs in the web 20

Page 21: Introduction to Pervasive and Ubiquitous Computing

3. 3. Intelligent transport systems

Such systems seek to bring together information and telecommunications technologies in a collaborative scheme to improve the safety, efficiency and productivity of transport networks

Electronic devices could be directly integrated into the transport infrastructure, and into vehicles themselves, with the aim of better monitoring and managing the movement of vehicles within road, rail, air and sea transport systems.

04/21/23 A summary of PPTs in the web 21

Page 22: Introduction to Pervasive and Ubiquitous Computing

ChallengesChallenges

The “Accidentally” Smart Environment Impromptu Interoperability No Systems Administrator Social Implications of Aware

Technologies Reliability Inference in the Presence of Ambiguity

04/21/23 A summary of PPTs in the web 22

Page 23: Introduction to Pervasive and Ubiquitous Computing

1. 1. The “Accidentally” Smart Environment

If you walk into an environment anywhere in the world, you would probably not find an infrastructure suitable for ubiquitous computing

Instead, you would find an infrastructure suited towards established and well-grounded technologies

the environments of users must be “upgraded,” to support this new technology

04/21/23 A summary of PPTs in the web 23

Page 24: Introduction to Pervasive and Ubiquitous Computing

2. 2. Impromptu Interoperability

Ubiquitous computing must not just have interoperable devices, they must have impromptu interoperability – the ability to interconnect and communicate with little or no advance planning.

This presents a problem because every device must be written to understand the software of every other device

04/21/23 A summary of PPTs in the web 24

Page 25: Introduction to Pervasive and Ubiquitous Computing

3. 3. Social Implications of Aware Technologies

Pervasive computing systems may have implications for privacy, security and safety, as a result of their ability to: gather sensitive data, for example on users' everyday interactions, movements, preferences and attitudes, without user intervention or consent

The advent of pervasive computing may mean that data can be collected without a person’s knowledge or consent. Some argue that this could violate existing data protection law

04/21/23 A summary of PPTs in the web 25

Page 26: Introduction to Pervasive and Ubiquitous Computing

4. 4. Reliability

Since ubiquitous computing devices will be everywhere, it makes sense for them to be reliable.

Owners and developers will not want to be constantly bombarded by failing devices or insecure software.

04/21/23 A summary of PPTs in the web 26

Page 27: Introduction to Pervasive and Ubiquitous Computing

CONCEPTS AND CONCEPTS AND TECHNOLOGY FOR THE TECHNOLOGY FOR THE

FUTUREFUTURE Ubiquitous computing is the next Ubiquitous computing is the next

generation computing environments generation computing environments with information & communication with information & communication technology everywhere, for technology everywhere, for everyone, at all times.everyone, at all times.

Information and communication Information and communication technology will be an integrated part technology will be an integrated part of our environments of our environments

04/21/23 A summary of PPTs in the web 27