Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of 1-1 HCI Human Computer Interaction Week 8.

Similar presentations


Presentation on theme: "© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of 1-1 HCI Human Computer Interaction Week 8."— Presentation transcript:

1 © 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of 1-1 HCI Human Computer Interaction Week 8

2 What is Ubiquitous Computing the method of enhancing computing use by making many devices (services) available throughout the physical environment, but making them effectively invisible to the user (Mark Weiser)

3 What is Ubiquitous Computing tries to construct a universal computing environment (UCE) that conceals:UCE computing instruments devices resources technology invisible to users from applications or customers

4 computing everywherecomputing everywhere many embedded, wearable, handheld devices communicate transparently to provide different services to the users devices mostly have low power and short- range wireless communication capabilities devices utilize multiple on-board sensors to gather information about surrounding environments What is Ubiquitous Computing

5 Mark Weiser: the father of ubiquitous computing researcher in the Computer Science Lab at Xerox’s PARC (Palo Alto Research Center) first articulated the idea of ubiquitous computing in 1988 has called UC “…highest ideal is to make a computer so imbedded, so fitting, so natural, that we use it without even thinking about it.”

6 Experiments Tabs Pads Boards Classroom 2000Classroom 2000 SAAMPad (Software Architecture Analysis Method Pad) The Conference Assistant 1988 – 1994 at PARC Xerox

7 Challenges and Requirements Hardware Applications User Interfaces Networking Mobility Scalability Reliability Interoperability Resource Discovery Privacy and Security

8 Nanotechnology (1/2) The trend toward miniaturization of computer components down to an atomic scale is known as nanotechnology

9 Nanotechnology (2/2) Mobile data technology – GSM, GPRS, UMTS, CDMA, WAP, Imode Wireless data technology – Bluetooth, 802.11b Internet data technology – IP over optical, Broadband Content services – Web & WAP Applications – Multimedia, Internet messaging

10 Users Interface The multitude of different Ubicomp devices with their different sizes of displays and interaction capabilities represents another challenge Pen Gesture recognition … Mouse keyboard

11 Networking WirelessWireless computing refers to the use of wireless technology to connect computers to a network Another key driver for the final transition will be the use of short-range wireless as well as traditional wired technologies

12 Mobility This behaviour is an inherent property of the ubicomp concept and it should not be treated as a failure Mobility is made possible through wireless communication technologies Problem of disconnectivity!!!

13 Scalability In a ubiquitous computing environment where possibly thousands and thousands of devices are part of scalability of the whole system is a key requirement All the devices are autonomous and must be able to operate independently a decentralized management will most likely be most suitable

14 Reliability Thus the reliability of ubiquitous services and devices is a crucial requirement In order to construct reliable systems self- monitoring, self-regulating and self-healing features like they are found in biology might be a solution

15 Interoperability This will probably be one of the major factors for the success or failure of the Ubicomp vision Use of technology just existed: JINI,CORBA,ecc… This diversity will make it impossible that there is only one agreed standard

16 Resource Discovery The ability of devices to describe their behaviour to the network is a key requirement. On the other hand, it can not be assumed that devices in a ubiquitous environment have prior knowledge of the capabilites of other occupants.

17 Privacy and Security In a fully networked world with ubiquitous, sensor-equipped devices several privacy and security issues arise the people in this environment will be worried about their privacy since there is the potential of total monitoring must be understandable by the user and it must be modelled into the system architecture

18 Comparison of Technologies Table shows a list of these APIs and technologies. The original comparison made by Olstad, Ramirez, Brady and McHollan. Without Bluetooth or IrDA.

19 Software Engineering research is inherently empirical and relies on a rapid prototyping development cycle information should be pushed to user based on current task, inferences made about user’s situation as user moves into different environments

20 Experiment at PARC – TAB TAB

21 Experiment at PARC - PAD Pad

22 Experiment at PARC – BOARD Liveboard

23 Tab prototype handheld computer was 2x3x0.5", had a 2 week battery life on rechargeable batteries, and weighed 7 oz used a Phillips 8051 processor with 128k NVRAM featured an external I 2 C external bus, a custom resistive touch screen, and a 128x64 mono display included an infrared base station in the ceiling for LAN connectivity The Tab project is consider by many to be the most significant of the three prototyping efforts

24 Classroom 2000 Instructors are given the ability to present more information during each lecture, with the goal of providing a deeper learning experience. As a result, students are often drowned with information and forced into a “heads down” approach to learning.

25 Computing Everywhere Ubiquitous means: present everywhere simultaneously encountered in numerous different instances computers become a useful but invisible force, assisting the user in meeting his needs without getting lost in the way

26 Wireless Infrastructure (1/2) Technology Advancement – Wide adoption of wireless technology: 67 million mobile professionals by 2002 – Cost for wireless access: comparable to wired networks What does the new Internet provide? – Mobility – Ubiquitous access

27 Wireless Infrastructure (2/2) What is mobile Internet? – Extension of Internet – Extension of Wireless Services

28 Wireless Infrastructure – Key Components Mobile data technology – GSM, GPRS, UMTS, CDMA, WAP, Imode Wireless data technology – Bluetooth, 802.11b Internet data technology – IP over optical, Broadband Content services – Web & WAP Applications – Multimedia, Internet messaging

29 Universal Computing Environment The infrastructure of the ubiquitous computing environment may be organized and structured as a cyber equivalent of an ecosystem, a very complex, dynamic infrastructure. A ubiquitous computing system is a integrated system of computing resources, devices, services, and the ubiquitous computing environment (UCE) that provides a communication framework to connect all of the components.

30 Universal Computing Environment Games Audio DVD PDA PC Wash Machine Lighting Cooker Digital Camera Printer Scanner Disk Drives NOTEBOOK

31 Universal Computing Environment this architecture was used as the basis for the implementation of BEACH it provides the functionality for synchronous cooperation and interaction with room ware components

32 Calm Technology (1/3) The Major Trends in Computing Mainframe Personal Computer Internet - Widespread Distributed Computing Ubiquitous Computing many people share a computer one computer, one person many computers share each of us... transition to...

33 Calm Technology (2/3)

34 Calm Technology (3/3) Today Internet is carrying us through an era of widespread distributed computing towards the relationship of ubiquitous computing, characterized by deeply embedding computation in the world. Ubiquitous computing will require a new approach to fitting technology to our life, an approach we call "calm technology".

35 Context-Awareness computers will be able to understand enough of a user’s current situation to offer services, resources, or information relevant to the particular context the attributes of context to a particular situation vary widely, and may include the user’s location, current role and other elements the application of context may include any combination of these elements


Download ppt "© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of 1-1 HCI Human Computer Interaction Week 8."

Similar presentations


Ads by Google