35
Computing Technologies C i Computing CPU, Memory, Communication everywhere Ubiquitous Communication indefinite number of times Not really possible or desirable th i t diti l more than in traditional computing so widespread that 1 so widespread that unnoticed

Computing Technologies

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Computing TechnologiesC iComputing

CPU, Memory, Communication

everywhere

UbiquitousCommunication

yindefinite number of times

Not really possible or desirable

th i t diti lmore than in traditional computingso widespread that

1

so widespread that unnoticed

Traditional Computing

Desktop C tComputers /Servers

Embedded Computers

2

Ubiquitous = More of the Same?

No new technical iissue

Except scalable networkingnetworking

IPV6

In ubiquitous computing we p gsee new kinds of computing

3

Interactive Mobile ComputersMotivation

Pervasive access to standalone appsPervasive access to standalone apps Calculator, Games, Music, Video

IssuesHardware realization (will be mostly ignored)

more robustlower-powerli ht i htlighter weight

4

Interactive MobileSoftware Issues

Resource-poorResource poorpower

• Scheduling, result accuracy

I/O devices • Speech, Handwriting recognition

StorageStorage• MEMS

Tiny OSySecurity

More vulnerable to theft and

5

destructionExposed to more people

Strongly-Connected MobileMotivation

Remote data accessweb, rlogin

CollaborationEmail, chat, application-sharing

Computation offloadingIInternet

6

Strongly-Connected MobileIIssues

Mobile IPAdd t i l ti b tAddress contains location but location variable

Adapting to mix of heavyweightAdapting to mix of heavyweight, lightweight computers

Dynamic application-sharing I architectures

Multi-device collaboration

Internet

7

Intermittent ConnectionDisconnected and strongly-connected states

Remote data accessed in disconnected state

MotivationWork in the offline mode

I Paper, spreadsheets

Issues

Internet

Local database smallerhoarding

8

gConflicts can arise

merging

Wireless (Weak) ConnectionAdditional weakly connected state

higher delay, error rateMotivation

Ubi it tUbiquitous remote access

N kNetwork

9

Wireless (Weak) ConnectionIssues

Physical LayerBluetooth, IEEE 802.11, Infrared

Optimizing weak connectionsBatching changes propagated for mergingTranscodingN k Transcoding

Adapting to multiple connection levels

Network

e e sAdaptive TCP/IPAdaptive Transcoding

10

Adaptive update propagation for merging

Networked Embedded ComputersConnected to network

send and/or receivesend and/or receive

May be embedded only for network access

N knetworked appliances

network access

Network sensorshistorical sites & other l tilocations

11

Peer of Networked Embedded Computer?p

Another embedded computercomputer

N kNetworkNon embedded Computer

12

Embedded PeerComposite devices

security system

Distributed composites vs. hardwired devices

N k

hardwired devices client-defined compositesreuse of constituents

extendibility & scalability

Network ease of changey y

13

“Smart Dust”

Late bindingMonitoring Temperatures in a Fire

Network Monitoring rain levels in a flood

14

Embedded Computer communicating with Non embedded Computerwith Non embedded Computer

Embedded is clientEmbedded is server

N kNetwork

15

Embedded is Client

i i / di t tMotivation

N k

viewing/recording statusimage from camerabody part dataNetwork body part datainstrument visualization

trigger orderstrigger ordersrefrigerator items

16

Embedded is ServerInteractive computer issues commands to embedded computercommands to embedded computer

N kNetwork

17

MotivationA t ti li

A single remote control for bit (di i il ) li

Automatic appliance-remote control binding

arbitrary (dissimilar) appliancesTVs, EKG machines, Water Sprinklers, Car Seats

Control appliance from arbitrary locations

Water sprinkler fromWater sprinkler from beachInternet

Interactive computer can offer different user interfaces from conventional controls

18

Per-User Control of Shared AppliancesAppliances

Mobile device knows owner’s info:

Favorite channelsVolume preferencesVolume preferencesCredit cardPINFil t b i t dFiles to be printedCar-seat tilt angle

Record/replayPin recorded first time and replayed later

19

and replayed later

More Powerful DeviceOutput Device

EKG resultsR f i t t tRefrigerator contentsSprinkler settings

Offline Mode

Enter arbitrary input

Offline ModeSynchronization

More computation power

y pWater sprinkler days

More computation powerUndo/Redo Cut/PasteS

20

SaveMacros

Control Appliance Collections

Multicast commandsMulticast commandsStart/stop recording images from all camerasSwitch off all lights in the roomSwitch of all appliances except the refrigeratorthe refrigerator

21

Control Appliance Collections

DistributedDistributed presentation

On projector, speakers computer

N k

speakers, computer screens

Network

22

Motivation SummaryMore universal

More remote

Internet

More control

23

Networked Embedded ComputersIssues

Late bindingNamingDiscoveryIPC

N k

IPCUser-interface deploymentMulti-appliance controlNetwork Multi-appliance control

Access controlExisting social protocols notExisting social protocols not supported by existing mechanisms

All l t d

24

• All co-located users can use appliance

• Children can see certain channels

Ad-Hoc NetworksPeer to peer connections among late bound computers

MotivationMotivationSpontaneous collaboration

classroom, war, airport , , pmeeting

Sensor networksdisaster recovery

• e.g. heat sensors thrown on fireNetwork

25

Ad-Hoc NetworksIssues

No Routerad-hoc routing

• Power-aware

Network

26

Location-aware computingoperations based on current, past, and future locations of

d d iusers and devices

27

Location-Aware ComputingMotivationMotivation

location-based action nearby local printer doctornearby local printer, doctornearby remote phonedirections/mapsp

location-based informationreal

• person’s location• history/sales/events

virtualvirtual• walkthrough• story of city

28

augmented• touring machine

Pose-Aware ComputingOperations based on locations and orientations of users and devicesM ti tiMotivation

Augmented realityM i LMagic Lens

29

Wearable Pose-Aware ComputersComputers on body

track body relative ymovements

monitor persontrain person

30

Location/Pose- Aware Computing

IssuesTracking algorithms

fine or coarse grained S ft hit tSoftware architectureMaintaining privacy

31

SummaryTraditional

Stationary desktops/servers and Embedded

UbiquitousInteractive mobile

resource-poorsecurity vulnerability

Strongly-connected mobilemobile IPadapting to heavyweight/lightweight mix

32

SummaryUbiquitous computing

Intermittently connected mobilehoardingsynchronization

Wireless (weak) communicationPhysical layerO ti i i k tiOptimizing weak connectionsAdaptations for multiple connection levels

33

SummaryUbiquitous computing

Networked embedded computersNamingNamingDiscoveryIPCUI deploymentUI deploymentAccess control

Ad-hoc networking with late bound devicesd h tiad-hoc routing

Location and Pose awareTrackingArchitecturePrivacy

Wearable

34

Avoid strong signalsDisplays

Beyond Desktops/Servers

b dd dEmbeddedMobile

Location

Interactive

Location

SensorFlight

Simulator

Wearable Active badge

35