Ubiquitous Computing or Pervasive Computing
Ubiquitous Computing or Pervasive Computing
or
Pervasive Computing
• Invisible technology
• Integration of virtual and physical worlds
• Throughout desks, rooms, buildings, and life
• Mobile computing
• Intelligent environment
Distributed System
Ubiquitous Computing
Mobile Computing
Mobile Computing
• Mobile computing
• Computing & communication on the move
• Mostly voice based or embedded?
• Nomadic computing
• Intermittent connectivity
• Usual environment available
• Mobile agents
• Mobile code and data
Mobile Computing Vision
• Universal connectivity – anywhere, anytime
monitoring
Intelligent Environment, goes on…
• Lights, air-conditioners, TV’s automatically switch on and
off when you enter or leave rooms
• Sit on your favourite chair and TV switches on to the
program you usually watch at this time of the day
• Use communicator/PDA for phone, remote control, keys,
payments, passport, health records, authenticator.
• Route input from ‘virtual’ keyboard to nearest suitable
display.
• Automatic detection of new items to control and physical
layout in a room or office, using computer vision.
Adaptive Application Architecture
Remote
Application
Servers
Sensors
Local & Network
Intermediate Servers
Clients
Security
• Interactions cross multiple organisational boundaries
• Specification, analysis and integration for
heterogeneous OS, databases, firewalls, routers
• Lessons from history:
• Cell phones, IR garage doors, CATV decoders
• Everything worth hacking gets hacked
• Need for secure ‘out of the box’ set up
• Identify friend or foe level of trust
• Small communicators, with confidential data, are
easily lost or stolen – biometric authentication
• Necessary security technology exists
Privacy
• Location service tracks movement to within metres
(cf mobile phones but pay-as-you-go can be anonymous).
• Clearly indicate you are being sensed or recorded + user
control to stop recording or control distribution of information
• You are now predictable
• System can co-relate location, context and behaviour patterns
• Do you want employer, colleagues or insurance company to
know you carry a medical monitor?
• Tension between authentication and anonymity – business
want to authenticate you for financial transactions and to
provide
‘personalized’ service cf web sites
• Constant spam of context dependent advertising
Management
• Huge, complex systems
• Billions of processors
• Multiple organisations
• Managing physical world, controlling sensors, actuators
• Humans will be in the way
• Errors propagate to bring down complete regions
• Hacker and virus paradise
• System propagates false information about
individuals or organisation
• Complexity of s/w installation on a workstation or
server – how do you cope with billions?
UbiCare: Ubiquitous
computing for community care
• Applications
• Automated monitoring
• Implanted devices
• Smart clothing
• Swallow/inject intelligent sensors and actuators
• Accident and emergency support
• Patient record access and integration
• Benefits
• Lower risk monitoring
• Mobility for chronically ill Wireless video Camera Pill
• Greater out-of-hospital patient management
• Predictive care from mass data analysis
Some specs of neo inventions…..
Current incarnations
Consumer devices
More Consumer devices….
The i-band
I-band wearable social-networking bracelet
Context-activation triggers exchange of personal
information
Conclusion…
Questions if any???
Thanks…