Pervasive Computing MIT 6.883 SMA 5508 Spring 2006 Larry Rudolph 1 Location Again Location API’s and Room-Size Location Feb 28, 2006 Larry Rudolph.

Slides:



Advertisements
Similar presentations
Aspire Vertical Markets Law Office. Law Office Solutions.
Advertisements

Introducing The IP550 IP Telephone. Things you should know about an IP Telephone system The IPitomy system has many of the same features of traditional.
Recorder Selection Ask yourself 1. How many phones to record 2. How long do you want to save your recordings 3. How frequently do you want to search recordings.
MP3 proposal. Template  Title  Your group name and group members  Application overview  Main functions  Detail description  Timeline and task assignment.
The Cricket Compass for Context-Aware Mobile Applications Nissanka B. Priyantha.
H. 323 Chapter 4.
© 2006 Carnegie Mellon Robotics Academy Designed for use with the LEGO MINDSTORMS ® Education NXT Software and Base Set #9797 Mine Mapping Remote Communication.
How To Submit Loans to Flanagan State Bank a/k/a “you are going to love this system”a.
Green Computing Energy in Location-Based Mobile Value-Added Services Maziar Goudarzi.
Lecture 4. US Systems. Advanced Mobile Phone System Analog Signal Processing at the sender side Compress Pre Emphasize Limit Low Pass Filter + Frequency.
Location and Tracking Spring 2004: Location Recognition Larry Rudolph Location of what? Services applications, resources, sensors, actuators where.
Adviser’s Control Panel. Explanation of our “My Tracer” Control Panel for ABSA Advisers Let’s have a look at the Functionality.
Developers: Alexey Rastvortsev, Ilya Kolchinsky Supervisors: Roy Friedman, Alex Kogan.
Tracking & Login Data persistence User tracking.
Sensors. Point your phone at the sky, and Google Sky Map tells you which stars you’re looking at. Tilt your phone, and you can control the game you’re.
Wireless, Cellular, Geolocation Harry Lewis April 14, 20111Harvard Bits.
17 November Solving Problems. What is the problem? What are the constraints? What can be done to solve or mitigate the problem? How could computers help?
CSP: Commercials Service for Palm Zachi Sharvit, Elad Eldor PostPC [2003/2004]
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
BluEyes Bluetooth Localization and Tracking Ei Darli Aung Jonathan Yang Dae-Ki Cho Mario Gerla Ei Darli Aung Jonathan Yang Dae-Ki Cho Mario Gerla.
Election Algorithms. Topics r Issues r Detecting Failures r Bully algorithm r Ring algorithm.
Local Positioning Mike Overy Chair Local Positioning WG Local Positioning v5.ppt #1 Mike Overy.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
This is the way an organisation distributes the data across its network. It uses different types of networks to communicate the information across it.
MIT 6.894; SMA 5508 Fall 2004 Larry Rudolph OK-Net: An Oxygen Kiosk.
Mobile phone: A mobile phone (also known as a cellular phone, cell phone and a hand phone) is a device which can make and receive telephone calls over.
Finding Nearby Wireless Hotspots CSE 403 LCA Presentation Team Members: Chris Scoville Tessa MacDuff Matt Mohebbi Aiman Erbad Khalil El Haitami.
Wireless Networks. Why go wireless? C Don’t have to be tied to a N, furniture or infrastructure Can retrieve , access the Internet, a corporate database.
Introducing. Where do you find the internet link and more info about Family Access? Click on Parents.
MIT 6.893; SMA 5508 Spring 2004 Larry Rudolph Lecture Cricket tutorial Cricket Tutorial on using cricket location system.
Python and more Spring 2004: Intro & Python Larry Rudolph Administration Check the wiki daily; please contribute Pick.
How the Internet Works. The Internet and the Web The Web is actually just one of many computer applications that run on the Internet Among others are.
Location meets social networking Larry Magid co-director, ConnectSafely.org founder, SafeKids.com
Handheld Delivery Customer Feedback Survey March 2013.
All the components of network are connected to the central device called “hub” which may be a hub, a router or a switch. There is no direct traffic between.
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Bluetooth Larry Rudolph Feb 16, 2006.
Introducing The IP550 IP Telephone. What to expect from your new IPitomy IP telephone system The IPitomy system has many of the same features of traditional.
Unit 1 – Improving Productivity. 1.1Why did you use a computer? What other systems / resources could you have used? I used a computer for unit 10 and.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Beyond the PC Kiosks & Handhelds Albert Huang Larry Rudolph Oxygen Research Group MIT CSAIL.
2/26: Wide World of Modems Roll call. Video: modem Lecture: step- by-step
GPRS functionality overview in Horner OCS. GPRS functionality – Peer to Peer communication over GPRS – CSCAPE connectivity over GPRS – Data exchange using.
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 iPaq Intro, Python, and Connectivity Feb 13, 2006 Larry Rudolph.
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Location, Location, Location Larry Rudolph.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Purpose  The purpose of the cross box handoff feature is to make the.
The ambient light sensor in a smart phone is what measures how bright the light is. It’s the phones software that adjusts the brightness in the display.
Sensors For Mobile Phones  Ambient Light Sensor  Proximity Sensor  GPS Receiver Sensor  Gyroscope Sensor  Barometer Sensor  Accelerometer Sensor.
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Tracking Indoors.
The Cricket Location-Support System N. Priyantha, A. Chakraborty, and H. Balakrishnan MIT Lab for Computer Science MOBICOM 2000 Presenter: Kideok Cho
10/15: Lecture Topics Input/Output –Types of I/O Devices –How devices communicate with the rest of the system communicating with the processor communicating.
MY NEST A TECHNOLOGICAL OVERVIEW. NECKLACE Reason: Hidden Less like being tagged and branded (jail)
Using your ENA Connect Phone Polycom IP 321/331/335.
Using your ENA Connect Phone Polycom IP 650/ Getting to know your IP 650/670 Soft Keys Shortcut to call logs Menu navigation arrows = select X =
ICT Unit 4: Network and the effects of using them
1. 2 Android location services Determining a device’s current location Tracking device movements Proximity alerts.
Mobile Computing CSE 40814/60814 Spring 2017.
Networking Objectives
Introducing The IP550 IP Telephone
Ping™ 6.
How Data Flows through the Internet
Topic 5: Communication and the Internet
Chapter 6 Networks Communicating and Sharing Resources
ADVANCED KEY CONTROL TECHNOLOGY FOR NEW CAR DEALERSHIPS
An Infrastructure for Location Aware Computing
Tutorial on using cricket location system
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
DO NOW Come in get a calculator (you cannot use your phone calculator for the quiz). You will have 10 min to review before the quiz.
Developing a VHF+ Reverse Beacon Network
Presentation transcript:

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Location Again Location API’s and Room-Size Location Feb 28, 2006 Larry Rudolph

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph GPS & Cell Location

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Location Server’s Location Where should the server be located? On handset Respond to inquires about location with option to deny When handset lost or disconnected, cannot find it. In network Privacy concerns

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Client’s Role Ask server for location of handset Must know how to contact handset Long round-trip, so done asynchronously How to ensure privacy? emergency call --> always allow ask server’s owner when and how often?

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph What information? Current position (Cell or GPS or Other) How current? How precise? Request periodic updates what happens when client disconnects Heading and orientation information Waypoints (and associated notes) Lots of competing systems J2ME, Symbian, and each operator

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Lots more details Time, angle of arrival, speed, acceleration Type of location technology specs number of satellites, cell towers, weather pitch, roll, magnetic compass quality My strategy: first list all information you think is important and then check with standard

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph

(J2ME Packages)

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph How to spoof Borrow friends phone register it with tracking service (TS) TS sends msg to phone for confirmation Answer msg, delete it, return phone No need to borrow phone if know phone ID when phone is turned off, put its ID into a different phone, do the above steps, and then turn off.

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Larry’s Location Larceny How to foil tracking -- even when cell towers know your phone’s location Switch ID’s when near each other when Alice and Bob realize they’re in same cell

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Assumptions Phone can forward calls to another phone Phones can change their ID (also #, IP) Can detect ID & # of incoming call Can detect cell tower connection Can connect to any of a set of servers

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph LLL (cont) Alice & Bob switch When looking for Bob, you find Alice, and she forwards call to Bob. Bob accepts calls forwarded from Alice (the calls look like they came from Bob) Bob forwards all other call to Alice Bob and Charlie switch Look for Bob, find Alice who forwards to Charlie who forwards to Bob

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Graph View of LLL Nodes always in some cycle Forward thru whole cycle

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Bookkeeping View When switching, just exchange current id info How to know when to stop forwarding?

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Inverse links If a node is shut off rest will be unreachable Use servers to deal with reverse links Node chooses server at random, if two nodes contact same server and are both in same cell, then switch info, and tell server about switch. nodes periodically make sure partner alive with unsynchronized clocks and freq switching, cannot easily reconstruct cycle

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Landmark Databases Convert from location to known object how close is “nearby” Which databases of landmarks should be used Local override to database?

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 17 Indoor Tracking Proximity Events Room Level Tracking

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Beacons & Listeners Room-level tracking requires beacons & listeners Two choices: Scatter listeners throughout environment that detect your position & update server Server provides location info & alerts Scatter beacons throughout environment and your handheld is listener

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Tradeoffs Handheld is beacon better power usage better precision (precise listener location) less interference Handheld is listener Control over privacy (Can you suggest others)

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Bluetooth Beacons Bluetooth devices respond to inquires with BT-ID and Name range: 10 meters (room level) leakage through walls & floors hear floor 7, 8, and 9 --> you are on 8 Inexpensive ($20 / beacon) Handhelds have BT

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Bluetooth Beacons First decision -- Where to put beacons Put them in PC’s -- they are everywhere Unfortunately, they disappear :( Put them in powered usb hub, near AC outlet Initialize via laptop, then remove laptop BT Dongle will continue to respond to inquiry

When detect BT dongle update map location

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph What doesn’t work Signal strength does not work well need radio map Track while walking 10 sec to detect, walking rate ~ 1 m/s, easy to miss dongle altogether Embed location info in dongle name takes even longer to detect Cached BT names, must not use

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Several Hacks needed Takes too long to recognize dongles Faster if use two dongles Signal come and goes Incorporate model of human motion Probabilistic filtering

Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph More hacks If you know where you are, then know where you might go next can do inquiry of specific dongles