Computer for the 21st Century

advertisement
Pervasive & Ubiquitous
Computing
Hao Chu (朱浩華)
Lecture #2
3/1/2004
1
Reading list
• Still working on it
–
–
–
–
–
–
Indoor localization
Embedding computing into (everyday) objects
Interactions
Ubiquitous healthcare
Security and privacy protection
Skip systems and sensor networks & shorten the
overview
2
Project
• Project idea & scenario (week 5,
3/22/2005)
• Project proposal (week 9, 4/26/2005)
• Proposal progress (week 13, 5/24/2005)
• Final project presentation (week 16,
6/13/2005)
3
Course Wiki
• Add your WhoIsWho
• Add paper review (next week)
• Select papers
4
History
• Mark Weiser. "The Computer for the 21th Century."
Scientific American, September 1991.
• Mark Weiser. "Some computer science issues in
ubiquitous computing." Communications of the ACM,
36(7):75-85, July 1993.
• Mark Weiser, John S. Brown. "The Coming Age of Calm
Technology." 1996.
• M. Satyanarayanan. "Fundamental Challenges in Mobile
Computing." Fifteenth ACM Symposium on Principles of
Distributed Computing, May 1996.
• M. Satyanarayanan. "Pervasive Computing: Vision and
Challenges." IEEE Personal Communications, August,
2001.
5
M. Weiser. “The Computer for the
21th Century", Scientific
American, September 1991.
6
Two Key Points
• Ubiquitous computing = computing integrated
with physical environment
– Computing being everywhere, yet people do not take
notice of them
– Computing becoming disappearing and invisible
• Location and scale are important.
– Adapt their behavior intelligently without AI: call
forwarding, follow-me display, reminder, good
substitute for computer vision, etc.
– Scale suitable to different tasks (heterogeneous
systems and networks)
7
Examples of Disappearing
Technologies
• Writing
• Electric Motors
• They are everywhere (embedding & hidden into
physical objects), yet invisible.
• When a technology matures, they disappear!
– Maturity = cheap, small, widely applicable, good
usability, …
8
Why Good Technology Is Invisible?
• Good technology stays out of the way of task
– Like a good pencil stays out of the way of the writing
• Bad technology draws attention to itself:
– Like a broken, or skipping, or dull pencil
• Computers are mostly not invisible
– They dominate interaction with them.
• Ubicomp is about making computers invisible.
9
Ubicomp vs. Virtual Reality
• Should we live in virtual computing world? Or
should computing come out and live in our
physical world?
• VR simulates physical world & puts people
inside virtual computing world.
• Ubicomp is about bringing computing to people’s
physical world.
– Computing Embed into everyday objects (intelligent
objects)
– Integrate with social activities (social computing)
10
Ubicomp vs. Multimedia
• Multimedia grabs user attention for
entertainment purpose.
• Ubicomp reduces user distraction, allowing
people to focus on tasks.
– Alternative output display on periphery of user
attention: (ambient display)
11
Ubicomp Components
• Computing embedded and enhancing physical
objects
• Ubicomp = sensors + processors + networking
sensors + SW systems & middleware
– Example: Intelligent Transportation System (foreview
mirror)
12
PARC Ubicomp Work (1991)
• Focus on devices that
transmit & display information.
• Device scale targets different
tasks.
– Consider three sizes: tabs, pads,
boards.
13
Tabs
• Inch-scale Ubicomp devices
– Post-It notes
• Carried around by a person
• Hundreds in a room
–
–
–
–
–
–
Credit cards, ID cards
Remote controllers
Badges
Tags / Labels (RFID)
Locating system (tags as library catalogs)
Animate static physical objects (active calendar, active
map)
14
Pads
• Foot-scale Ubicomp
devices
– A sheet of paper / tablet PC
• Tens in a room
– Like scrap papers that can
be grabbed and used
anywhere, no unique ID.
• Like windows in Apple
Macintosh, but can spread
them out on a real desk.
15
Boards
• Yard-scale Ubicomp device
• One in a room
• White board with e-chalk
– Shared white board with remote participants
• Video screen
• Electronic Bookcases
16
Hardware Challenges (1991)
•
•
•
•
•
•
High resolution flat panel display (cheap)
High speed processor
High capability storage
High bandwidth wireless Network
Lower power consumption
How well do today’s HW technologies meet
these challenges?
17
Software Challenges (1991)
• Dynamic configuration of HW/SW in ubicomp
environments (dynamic systems)
• Application migration across heterogeneous
ubicomp environments
• Transparent linking of wired and wireless
networks (heterogeneous networks)
• How well do today’s SW technologies meet
these challenges?
18
Sal Scenario
• Proactively brew coffee
informed by alarm clock
• Electronic Trails of
neighbor coming and
going
• Automatic recording pen
• Paper display (e-ink)
• Email locates garbage
door opener (RFID &
object reminder)
• Window tells weather
(ambient display)
• Intelligent car navigation
(location-based services)
• Share location, tabs &
pads with Joe (CSCW)
• Gesture to project
blinking tab to projector
(multi-model UI)
• Memory augmentation on
meeting with Mary (lifelog)
19
Privacy
• Hundreds and thousands of invisible computers
sensing and watching people
• Ubiquitous camera recording
20
Is Weiser really Wise?
•
•
•
•
What is the problem that he wants to solve?
What is his proposed solution?
Any problems with the proposed solution?
Invisibility & Intelligence vs. privacy
– RFID in supermarket
– Hidden security camera
• Invisible vs. transparent
– Diagnose problems
21
M. Weiser. “Some computer
science issues in ubiquitous
computing.”Communications of
the ACM, 36(7):75-85, July 1993.
22
Key Point
• Based on their PARC experiments with tabs,
pads, and boards, this paper tries to define
some ubicomp challenges and where ubicomp is
going.
23
Ubicomp as Experimental CS
• Construct working prototype
• Evaluate working prototype in everyday use
• Find out real vs. imaginary issues
24
Hardware Issues
• Power consumption: impossible to change
batteries to many ubicomp devices frequently.
• Balance of HW/SW feature: display, network,
processing, memory, storage capability,
multitasking, etc.
• Ease of expansion & modification (integration vs.
modular design)
25
Network Issues
• Wireless Media Access (802.11, Bluetooth,
Cellular Networks)
• Quality of Services (RSVP, etc)
• Ubicomp devices changing network attachment
(Mobile IP)
26
UI Issues
• Multi-modal UI
– Handprinting recognition
– Voice recognition
• Display migration (follow-me display)
27
Application Issues
• “Applications are of course the whole point of
ubiquitous computing”.
• Locating people (active badges)
– Automated call forwarding
– Tracking down people for meeting
– Watching general activity in a building (feel in touch
with surrounding environments)
• Shared drawing in virtual meeting
– Scalability to 5000 peoples (multicast for bandwidth
efficiency)
28
Location Privacy
• Centralized location database as one possible
solution, but not scalable, vulnerable to single
point of attack, one break-in reveals all.
• Move toward more distributed approach.
29
Computational Method Issue
• Due to unpredictable network to ubicomp
devices, (file) caching can be used to improve
performance.
30
Discussion
• Open ….
31
M. Weiser, J. S. Brown. "The
Coming Age of Calm
Technology." 1996.
32
Key Points
• Why the need for calm technology?
– Computers everywhere
– Pay attention in order to use them
– Information overloading
• Solution for design of ubicomp technology
– Place information in periphery of user attention
– But allow fast & easy moving to center
33
34
Computing Trends
• These trends are results of computing getting
smaller, faster, and cheaper.
• Mainframe Era: many people sharing a
computer.
• PC Era: one computer per person
• Internet Era: (interconnecting PCs)
• Ubicomp Era:
– many computers (everyday objects) sharing one
person
– interconnecting everyday objects
35
Calm Technology
• Calm and uncalm technology differs how to
engage our attention.
– Divide our attention into two parts: periphery and
center.
• Periphery is informing without overburdening
– While driving a car, center = roads and radio,
periphery = engine noise
• Calm technology can move easily & quickly
between periphery and center.
• Calm requires good design affordance (visual
clue to the function of an object)
36
Three Signs of Calm Technology
• Move easily from center to periphery and
back
• Enhance “periphery reach” (more details in
the periphery)
– Video vs. voice conferencing
• Good information visualization
37
Examples of Calm Technology
• Inner Office Windows
– Extend periphery to what are going on the hallway
– E.g., notice lunch gathering, meeting, but not
distracting to work
• In comparison to open cubicles with low
partitions
– Force too much to the center
– E.g., noises in the hallway can become distracting to
work
38
Dangling String
• Represent bits flowing
over a wire through
motion and sound.
• The output is
(beautifully?) integrated
with our physical
environment.
39
Discussion
• Is Ubicomp defined by the devices or user
experience?
• Imbed vs. Embed?
• Are inner office window and dangling string
really calm and relaxing?
• Does Calm give more or less information?
• This is related to ambient display research. UI
People know more about this research area?
40
M. Satyanarayanan.
"Fundamental Challenges in
Mobile Computing", Fifteenth
ACM Symposium on Principles of
Distributed Computing, May 1996.
41
Key Points
• What are fundamental challenges in mobile
computing (What is so special about mobile
computing)?
–
–
–
–
Resource-limited mobile devices
Mobility is hazardous
Unpredictable wireless networks
Finite power source
• Adaptation is key to mobility.
42
Evolution from Distributed Systems
to Mobile Computing
• What are fundamental differences between
Distributed Systems and Mobile Computing?
– Distributed systems = Applications running over
Computers Connected Over Network
– Mobile systems = Applications running over mobile
devices connected over wireless networks
– Mobile devices constraints: resource-limited, finite
power source, easy-to-lose (weak security)
– Wireless network constraints: unpredictability
bandwidth and frequent disconnections
43
Adaptation is Key to Mobility
• Adapt applications to continuously changing
computing environment (due to mobility):
– Power, network bandwidth / availability, …
44
Adaptation Strategies
• Need resource management at the system layer to
allocate resources to different applications.
• Need application level semantics, e.g., frame-rate,
resolution, etc.
• The best approach is to have both application and
system supports.
45
Extended Client Server Model
• Traditional (thin) client (fat) server model in distributed
computing needed adjustments to address
unpredictable network, finite power, and performance.
• Extended client-server model (called smart client model)
places some server functionalities to client.
46
Coda & Odyssey
• Coda supports application-transparent
adaptation.
– It is distributed file system (FS).
– It can cache/hoard some parts of FS on client.
– It can support disconnected operations from FS
cache.
• Odyssey supports application-aware adaptation.
– Adapt application quality/fidelity (e.g., video
framework, resolution) based on dynamic network
condition, power saving, and processing loads.
47
Research Topics for Exploration
• Caching metrics (what to cache/hoard?)
• Caching coherence (Semantic callbacks and
validators)
• Algorithms for resource revocation
• Agility (靈敏) vs. stability
• (Global) Resource estimation from local
observations
48
M. Satyanarayanan. “Pervasive
Computing: Vision and
Challenges”, IEEE Personal
Communications, August, 2001.
49
Key Points
• What are fundamental challenges in
pervasive/ubicomp computing (What is so
special about pervasive computing)?
–
–
–
–
Effective use of smart spaces
Invisibility
Localized Scalability
Masking Uneven Conditioning
• We will hear a distinguished talk from author
directly.
– http://www.cs.uiuc.edu/news/dls/distlectpst.html
50
Discussion
• What exactly is proactivity? How does it differ
from adaptation?
• Is Ubicomp still about old technical issues ..
– Integrating different technologies, devices and
services.
– Resource discovery protocol
– Optimization (different parameters such as power)
– Adaptation (with environments)
51
Download