0% found this document useful (0 votes)
103 views11 pages

S.prathyusha Y6it889 RVR & JC College of Engineering Tejasvy.p Y6it883 RVR & JC College of Engineering

This document discusses ubiquitous computing and provides context on its evolution and challenges. Ubiquitous computing aims to integrate computing into everyday objects and activities. It has evolved from distributed systems and mobile computing, inheriting features like remote communication, fault tolerance, and location sensitivity. Key challenges include developing applications aware of user context, designing interfaces for diverse devices, addressing issues of networking, resource discovery, privacy, and security in a networked environment. Context-aware systems can adapt behavior based on physical context like location and nearby resources. Examples of ubiquitous computing devices discussed are active badges, PARCTabs, and shopping assistants.

Uploaded by

Anusha Ch
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views11 pages

S.prathyusha Y6it889 RVR & JC College of Engineering Tejasvy.p Y6it883 RVR & JC College of Engineering

This document discusses ubiquitous computing and provides context on its evolution and challenges. Ubiquitous computing aims to integrate computing into everyday objects and activities. It has evolved from distributed systems and mobile computing, inheriting features like remote communication, fault tolerance, and location sensitivity. Key challenges include developing applications aware of user context, designing interfaces for diverse devices, addressing issues of networking, resource discovery, privacy, and security in a networked environment. Context-aware systems can adapt behavior based on physical context like location and nearby resources. Examples of ubiquitous computing devices discussed are active badges, PARCTabs, and shopping assistants.

Uploaded by

Anusha Ch
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 11

S.

prathyusha
Y6it889 Tejasvy.p
RVR & JC College of y6it883
engineering
RVR & JC College of
[email protected] engineering
[email protected]

Abstraction
To done computations of humans the
era of mainframe computers was over, the era of
Contents personal computers is in disappearing stage,
distributed computing is running and ubiquitous
1. Abstraction computing is in progress to rule the world in
21th century. As opposed to the desktop
2. Introduction paradigm, in which a single user consciously
engages a single device for a specialized
3. The evolution of Ubiquitous
purpose, someone using ubiquitous computing
Computing
engages many computational devices and
systems simultaneously, in the course of
4. Challenges and requirements
ordinary activities, and may not necessarily
5. Context aware even be aware that they are doing so.

6. Some ubiquitous computing devices

7. Conclusion
Introduction
Mark Weiser coined the phrase "ubiquitous
computing" around 1988. It is a post-desktop
model of human computer interaction in which
information processing has been thoroughly
The evolution of Ubiquitous Computing:
integrated into everyday objects and activities.
Ubiquitous means: present everywhere,
It is basically developed on the basis of
simultaneously. Computers become a useful but following technologies builds on previous work
invisible force, assisting the user in meeting his in the areas of Distributed Systems
needs without getting lost in the way. And Mobile Computing It inherits the
encountered in numerous different instances.All following from Distributed system
models of ubiquitous computing share a vision
of small, inexpensive, robust networked  Remote communication (layering,
remote procedure call, etc.)
processing devices, distributed at all scales
 Fault tolerance (atomic transactions,
throughout everyday life and generally turned to
etc.)
distinctly quotidian ends. Because of ubiquitous  High availability (optimistic/pessimistic
computing we can move beyond desktop replica control, mirrored execution, etc.)
machine, and the Computing is embedded  Remote information access (caching,
everywhere in the environment. Ubiquitous distributed file systems, distributed
computing presents challenges across computer databases, etc.)
science: in systems design and engineering, in  Security (authentication, privacy, etc.)
systems modeling, and in user interface design. It inherits the following from Mobile computing
Ubiquitous computing encompasses a wide
 Mobile networking, e.g. ad-hoc
range of research topics, including distributed protocols
computing, mobile computing sensor  Mobile information access, e.g.
networking, human-computer interaction, and disconnected operation
artificial intelligence.  Support for adaptive applications, e.g.
proxy trans coding,
 Adaptive resource management–
system-level energy saving techniques,
e.g. variable-speed processor scheduling
 Location sensitivity, e.g. location-aware
system behavior.
interaction capabilities
represents another challenge we can
my use of wireless in efficient way.

• Mobility: Mobility is made possible


through wireless communication
technologies

• Scalability: Mobility is made possible


through wireless communication
technologies

• Reliability: In order to construct


reliable systems self-monitoring, self-
regulating and self-healing features like
they are found in biology might be a
solution

• Interoperability: This will probably be


Challenges and requirements one of the major factors for the success
or failure of the Ubicomp vision. Use of
• Hardware: The trend toward technology just existed:
miniaturization of computers JINI,CORBA,ecc…This diversity will
components down to an atomic scale is make it impossible that there is only one
known as nanotechnology. agreed standard

• Applications: This is the main • Resource Discovery: The ability of


motivation of ubiquitous computing. a devices to describe their behaviour to the
combination of several factors, including network is a key requirement. On the
the current location, the current user or if other hand, it cannot be assumed that
there are any other Unicom devices devices in a ubiquitous environment
present in the near surroundings. have prior knowledge of the capabilities
of other occupants
• User Interfaces: The multitude of
differrant Ubicomp devices with their • Privacy and Security: In a fully
differrant sizes of displays and networked world with ubiquitous,
interaction capabilities represents sensor-equipped devices several privacy
another challenge for it. and security issues arise. The people in
this environment will be worried about
• Networking: The multitude of their privacy since there is the
differrant Ubicomp devices with their potential of total monitoring.
differrant sizes of displays and must be understandable by the user
and it must be modelled into the system
architecture.

Some components of ubiquitous computing:


1. Context aware 2.
Wearable computers

Context aware:
Context aware application:

- is one which can capture the context


Examples:
- assign meaning to it
 Active Badge & PARCTab
- change behavior accordingly

It refers to a general class of mobile systems  Shopping assistant


that can sense their physical environment, i.e.,
 Cyberguide
their context of use, and adapt their behavior
accordingly. Such systems are a component of a
ubiquitous computing or pervasive computing
environment.

Three important aspects of context aware are:

(1) Where you are


Context Adaption
(2) Who you are with and
What: Compression, filtering, device specific,
(3) What resources are nearby? Transformations, information selection

It provides services like Where: Server, proxy or client?


Proxy
Client and server do not change
 Computing services sense aspects of
environment (location, user emotion,…) and
tailor provided services
User selection
 Walk into conference room, my email is
projected on a big screen there Proxy transforms as best as it can, but gives
users a way to force proxy to deliver original
content here, a simple client-side UI
enhancement is coupled with proxy-side
refinement intelligence.
3. Product quality monitoring –
vibration, humidity,
overheating
4. Car component monitoring

Transformed Local UI Smart dust technology


Refined content for
proxy interaction content
from proxy

Adapting vector mapping

Maps can be…


 Split into features and presented in
part
 Encoded at different scales –
different feature detail
 Selective adaptation can consider
content being degraded

Smart dust

 Autonomous sensing and Future smart dust


communication in a cubic
millimeter – “dust motes”  Intelligent paper with integrated
 Sensors for temperature, humidity, radio  replace current displays
light, motion ….  Smart paint monitors vibrations
 With bidirectional radio or laser + and detect intruders or changes
battery color to react to temperature,
 Costs soon < $1 lighting etc.
 Typical Applications  Intelligent glass can filter sunlight,
1. Defense related battlefield become opaque no need for
sensors, motion detectors etc. curtains
2. Inventory control on boxes  Smart garments or inject able
which communicate with sensors for people monitoring
crates, trucks, plane etc to tell  Download design and printable
you where they are motes for < 1c mote
 Printable batteries
Some devices of ubiquitous
computing

Scaling factors

 100K computers per person


 Self organizing and self configuring Tab
 Coherent behavior from vast
numbers of unreliable sensors,
actuators and comes. Devices
 Need new techniques for
interaction maybe based on
biological organisms?
 Exponential Growth? By 2100 ……

Intelligent environment

 Lights, air conditioning, TV


automatically switch on and off  prototype handheld computer
when you enter or leave rooms
 Sit on your favorite chair and TV  Was 2x3x0.5", had a 2 week
switches on to the program you battery life on rechargeable
usually watch at this time of the batteries, and weighed 7 oz
day
 Use communicator/PDA for phone,  Uused a Phillips 8051 processor
remote control, keys, payments, with 128k NVRAM
passport, health records, and
authenticator.  Ffeatured an external I2C external
 Route input from ‘virtual’ keyboard bus, a custom resistive touch
to nearest suitable display. screen, and a 128x64 mono display
 Automatic detection of new items
to control and physical layout in a  Iincluded an infrared base station
room or office, using computer in the ceiling for LAN connectivity
vision.
The Tab project is consider by many
to be the most significant of the three
prototyping efforts Universal computing environment
The infrastructure of the ubiquitous
computing environment may be organized
and structured as a cyber equivalent of an
ecosystem, a very complex, dynamic
infrastructure.

A ubiquitous computing system is a


integrated system of computing resources,
devices, services, and the ubiquitous
computing environment (UCE) that provides
a communication framework to connect all
of the components.

Classroom 2000

 Iinstructors are given the ability to present


more information during each lecture, with
the goal of providing a deeper

 As a result, sstudents are often


drowned with information and
forced into a “heads down”
• this architecture was used as the basis
approach to learning
for the implementation of BEACH
• it provides the functionality for
synchronous cooperation and
interaction with room ware
components

Conclusion
Strengths

• The paper identifies certain key features


of Ubiquitous applications

• Exemplifies these features with real-life


projects

• Correlates SE challenges pertaining to


such pattern of application development

• Accordingly, it proposes changes that


need to be inculcated in the stream of
Software Engineering

Weakness

- The paper only looks into ‘Rapid


Prototyping’ paradigm of application
development
Other devices ubiquitous devices
- It overlooks other models and
approaches available for UbiComp
application development.

Live board

You might also like