computing technologies
Post on 11-Feb-2022
1 Views
Preview:
TRANSCRIPT
Computing TechnologiesC iComputing
CPU, Memory, Communication
everywhere
UbiquitousCommunication
yindefinite number of times
Not really possible or desirable
th i t diti lmore than in traditional computingso widespread that
1
so widespread that unnoticed
Ubiquitous = More of the Same?
No new technical iissue
Except scalable networkingnetworking
IPV6
In ubiquitous computing we p gsee new kinds of computing
3
Interactive Mobile ComputersMotivation
Pervasive access to standalone appsPervasive access to standalone apps Calculator, Games, Music, Video
IssuesHardware realization (will be mostly ignored)
more robustlower-powerli ht i htlighter weight
4
Interactive MobileSoftware Issues
Resource-poorResource poorpower
• Scheduling, result accuracy
I/O devices • Speech, Handwriting recognition
StorageStorage• MEMS
Tiny OSySecurity
More vulnerable to theft and
5
destructionExposed to more people
Strongly-Connected MobileMotivation
Remote data accessweb, rlogin
CollaborationEmail, chat, application-sharing
Computation offloadingIInternet
6
Strongly-Connected MobileIIssues
Mobile IPAdd t i l ti b tAddress contains location but location variable
Adapting to mix of heavyweightAdapting to mix of heavyweight, lightweight computers
Dynamic application-sharing I architectures
Multi-device collaboration
Internet
7
Intermittent ConnectionDisconnected and strongly-connected states
Remote data accessed in disconnected state
MotivationWork in the offline mode
I Paper, spreadsheets
Issues
Internet
Local database smallerhoarding
8
gConflicts can arise
merging
Wireless (Weak) ConnectionAdditional weakly connected state
higher delay, error rateMotivation
Ubi it tUbiquitous remote access
N kNetwork
9
Wireless (Weak) ConnectionIssues
Physical LayerBluetooth, IEEE 802.11, Infrared
Optimizing weak connectionsBatching changes propagated for mergingTranscodingN k Transcoding
Adapting to multiple connection levels
Network
e e sAdaptive TCP/IPAdaptive Transcoding
10
Adaptive update propagation for merging
Networked Embedded ComputersConnected to network
send and/or receivesend and/or receive
May be embedded only for network access
N knetworked appliances
network access
Network sensorshistorical sites & other l tilocations
11
Peer of Networked Embedded Computer?p
Another embedded computercomputer
N kNetworkNon embedded Computer
12
Embedded PeerComposite devices
security system
Distributed composites vs. hardwired devices
N k
hardwired devices client-defined compositesreuse of constituents
extendibility & scalability
Network ease of changey y
13
“Smart Dust”
Late bindingMonitoring Temperatures in a Fire
Network Monitoring rain levels in a flood
14
Embedded Computer communicating with Non embedded Computerwith Non embedded Computer
Embedded is clientEmbedded is server
N kNetwork
15
Embedded is Client
i i / di t tMotivation
N k
viewing/recording statusimage from camerabody part dataNetwork body part datainstrument visualization
trigger orderstrigger ordersrefrigerator items
16
Embedded is ServerInteractive computer issues commands to embedded computercommands to embedded computer
N kNetwork
17
MotivationA t ti li
A single remote control for bit (di i il ) li
Automatic appliance-remote control binding
arbitrary (dissimilar) appliancesTVs, EKG machines, Water Sprinklers, Car Seats
Control appliance from arbitrary locations
Water sprinkler fromWater sprinkler from beachInternet
Interactive computer can offer different user interfaces from conventional controls
18
Per-User Control of Shared AppliancesAppliances
Mobile device knows owner’s info:
Favorite channelsVolume preferencesVolume preferencesCredit cardPINFil t b i t dFiles to be printedCar-seat tilt angle
Record/replayPin recorded first time and replayed later
19
and replayed later
More Powerful DeviceOutput Device
EKG resultsR f i t t tRefrigerator contentsSprinkler settings
Offline Mode
Enter arbitrary input
Offline ModeSynchronization
More computation power
y pWater sprinkler days
More computation powerUndo/Redo Cut/PasteS
20
SaveMacros
Control Appliance Collections
Multicast commandsMulticast commandsStart/stop recording images from all camerasSwitch off all lights in the roomSwitch of all appliances except the refrigeratorthe refrigerator
21
Control Appliance Collections
DistributedDistributed presentation
On projector, speakers computer
N k
speakers, computer screens
Network
22
Networked Embedded ComputersIssues
Late bindingNamingDiscoveryIPC
N k
IPCUser-interface deploymentMulti-appliance controlNetwork Multi-appliance control
Access controlExisting social protocols notExisting social protocols not supported by existing mechanisms
All l t d
24
• All co-located users can use appliance
• Children can see certain channels
Ad-Hoc NetworksPeer to peer connections among late bound computers
MotivationMotivationSpontaneous collaboration
classroom, war, airport , , pmeeting
Sensor networksdisaster recovery
• e.g. heat sensors thrown on fireNetwork
25
Location-aware computingoperations based on current, past, and future locations of
d d iusers and devices
27
Location-Aware ComputingMotivationMotivation
location-based action nearby local printer doctornearby local printer, doctornearby remote phonedirections/mapsp
location-based informationreal
• person’s location• history/sales/events
virtualvirtual• walkthrough• story of city
28
augmented• touring machine
Pose-Aware ComputingOperations based on locations and orientations of users and devicesM ti tiMotivation
Augmented realityM i LMagic Lens
29
Wearable Pose-Aware ComputersComputers on body
track body relative ymovements
monitor persontrain person
30
Location/Pose- Aware Computing
IssuesTracking algorithms
fine or coarse grained S ft hit tSoftware architectureMaintaining privacy
31
SummaryTraditional
Stationary desktops/servers and Embedded
UbiquitousInteractive mobile
resource-poorsecurity vulnerability
Strongly-connected mobilemobile IPadapting to heavyweight/lightweight mix
32
SummaryUbiquitous computing
Intermittently connected mobilehoardingsynchronization
Wireless (weak) communicationPhysical layerO ti i i k tiOptimizing weak connectionsAdaptations for multiple connection levels
33
SummaryUbiquitous computing
Networked embedded computersNamingNamingDiscoveryIPCUI deploymentUI deploymentAccess control
Ad-hoc networking with late bound devicesd h tiad-hoc routing
Location and Pose awareTrackingArchitecturePrivacy
Wearable
34
Avoid strong signalsDisplays
top related