WiFi, UbiComp Smart Mobs

advertisement
WiFi, Ubicomp & Smart Mobs
• Smart Mobs
• System Directions for Pervasive Computing
- Are we there yet?
• Unplugged U
- If not now, what’s changed?
• T-Spaces: The Next Wave
How do we recognize the future?
• Does it have to “land on you”?
• What role does experience (or inexperience) play in
adoption of ideas & technology?
• Analogies help
- “It’s like X, but with Y”
- It’s like radio, but with two-way communications
• What change doesn’t begin within a subculture?
- Early adopters (innovator’s Dilemma)
- “Ground truths” and working knowledge
• Nothing goes away, but it can get repurposed
• Technologies “enable people to act together in new
ways & in situations where collective action was not
before possible” p xviii
Smart Mobs
Chapter 1: Mobile/Context-Aware Computing
• “Texters” – European/Japanese youth
- Altered notions of home/place/time
- Presence uncoupled from physicality
• Addition of simple iconography (tools for social
interaction) improved marketability of mobile
computing devicces
• Device becomes “remote control” for your life
• Swarming: cyber-negotiated public flocking
behavior
• Location-sensitive technology gives locally
relevant information to citizens/travelers
Smart Mobs
• Short text messages (SMS) changing social
dynamics
- New terminology, customs, social norms
- Read together, composed together, passed around,
edited between users
- Broadcast messages for parties, fare jumpers, gathering
• Text messaging allows maintenance of social
relationships not amenable to “real-world”
relationships
• Continuous connections, regardless of place
• 2 simultaneous “spaces” of social
interaction: physical and virtual
- BUT, they also change “faces” depending on
which world they attend to
Smart Mobs
Chapter 2: Technologies of Cooperation
• Why choose to cooperate on line?
- Input a little knowledge to commons, but access larger
(better) collective knowledge
- Give to get, pay to play
• Design characteristics for self-governing & selforganizing groups
Clear boundaries
Rules match local needs/conditions
Most people affected by rules can also modify them
Right to design own rules respected by external
authorities
- Monitoring system for behavior
-
Smart Mobs
• Design characteristics for self-governing & self-organizing
groups
- Community members themselves do the monitoring
- Graduated system of sanctions
- Conflict-resolution mechanisms
• Mechanisms to overcome “tragedy of commons”
• Group = Game Theory Prisoners’ Dilemma – Titfor-Tat, Zero-sum
• Cooperators can thrive in population of defectors
if they can recognize each other (social network)
- Outperform non-cooperative/self-centered resource
consumption strategies
• Power of social network (not just a group)
- Metcalfe’s Law: total value of network of nodes grows
w/square of # of nodes
- Reed’s Law: total value grows at rate of 2 to power of #
nodes
Smart Mobs
Chapter 3: Computation Nations and Swarm
Supercomputers
• Distributed sharing of disc space – more storage
than single device
• Distributed sharing of CPU cycles – more
processing power than individual CPU
- SETI@home
- Distributed crack of RSA encryption
- Folding@home – examine medical data to devise better
disease treatment
• P2P – Every client is also a server
• Grid-computing
• “Node computing” or “Continuous Computing”
Smart Mobs
Chapter 4: Era of Sentient Things
• Information in places: media linked to
location
• Smart rooms: sensing and responsive
• Sentient objects: adding
info/communications to everyday objects
• Tangible bits: manipulating virtual world
through interaction w/physical
• Wearable computers
Smart Mobs
Chapter 4: Era of Sentient Things
• Intel adding radio transponder to every
chip
• Ubicomp: not just computing devices
everywhere, but invisible integration
w/environment
• “Augmented reality”—using computing
power to sense beyond limits of human
senses
• “Perceptual intelligence”—computers
responsive to characteristics of their
users
Smart Mobs
Cooltown
- virtual information overlays on real-world
objects/locations
- Seamless integration of computing devices
and file formats (print any document on any
device from any local printer)
• Attentive billboards: Minority Report
consumerism
• Code reading devices—click on object in
real world and expect something to
happen
• Google Maps, Satellite photos,
Ridesharing, Taxi availability
Smart Mobs
• RFID
- Track movement of objects, people,
information and how they are used
- “Smart money”
• Wheel of Zeus
- Radio tagging for keeping found things found
- Bookmarking your tennis shoes, loaning a
book
• Cyborgspace – Steve Mann
- Personally mediate reality on YOUR terms
- Record all your experiences from your PoV &
others
Smart Mobs
Chapter 5: Evolution of Reputation
• Overview of getting know-how on line
- Usenet
- Collaborative filtering
- FAQs
• Building trust along w/reputation
-
eBay
Epinions
Blogs
Slashdot
Smart Mobs
• Online anonymity can also be a shield for
irrational/unproductive behavior
- Drives away legitimate contributors if too many
“freeloaders” of freely accessible information
• Biological theories of cooperation
- “Restores shadow of future” to each transaction
- Threat of future consequences mediates present
behavior
• Reputation allows loosely related people to
cooperate and collectively create value beyond
capabilities of action on local/individual levels
Smart Mobs
Chapter 6: Wireless Quits
• LOTS of technology and spectrum management
review
- History of wireless infrastructure development
- Spectrum access methods
• Spread spectrum
• Frequency hopping
• “Mini-burst” transmissions
• What if every receiver is also a mini transmitter—
total production of ad-hoc networks
- WiFi, Bluetooth, low-power transmitters
Smart Mobs
Chapter 7: Smart Mobs - The Power of the Mobile
Many
• Less effort to perpetuate information movement
than information production
• Rise of P2P journalism
- Constant surveillance mitigates our social behavior
• Notion of personal area network – wearable
computers + context & location awareness
• New task-based economy (WALID)
- Agents exchange lists of personally relevant tasks
between actors in close proximity (see Good Old
Fashioned Future)
Smart Mobs
Chapter 7: Smart Mobs - The Power of the
Mobile Many
• Swarm intelligence: thresholds of
individual action actually a social function
• 4 characteristics of swarm systems
-
Absence of centralized control
Autonomous subunits
High connectivity between subunits
Peers influencing peers
Smart Mobs
Chapter 8: Always-On Panopticon
• Dangers of smart mob technologies
- Threats to liberty – ubiquitous surveillance
- Threats to quality of life – too much
information
• Digital neuroses: is someone constantly
watching me or piecing together a picture of
my activities?
- Threats to human dignity – are we becoming
too automated and tied to technology?
• Favor virtual relationships for face-to-face
• Lose social skills in “real” interaction
Smart Mobs
Chapter 8: Always-On Panopticon
• Key to influence in future: network capital
- Ability to use technical and social networking
resources to your advantage
• Smart mob technology may change how
we view the world and relate to each other
the way printing and literacy transformed
our society once before
Pervasive Computing
• Pervasive computing: focus on users & tasks
vs. computing devices & technology
- Seamless infrastructure
- Invisible technology
• HW is approaching, but little software
operates in this environment
• 3 primary problems to be solved in pervasive
computing system architecture
New Devices, Old Interfaces
• Each new device builds on the assumptions
of the previous devices & designs
- Who has read all of the documentation for their
phone, iPod, PDA, bluetooth device?
- Who can use all of the functions on any of these
devices?
• How many steps does it take to do a common
task?
- Infrequent tasks like configuration,
synchronization, sequential tasks need more
support, not less
Working with PVC Devices?
• Connections?
- How are the bits interlinked?
- How do they get into the PIM?
• All in one place?
- Is centralized necessarily better?
• Client or Server for storage & help?
• Integration among tools
- Formats
- Importing & Exporting
• Integration for tasks
- Sequences
- Automation
• Integration among users
- Shared contacts, bookmarks, lists, filters
- Common formats or meta information
Pervasive Computing
1: Objects don’t scale well in large networks
- Single abstraction for data AND function
- Assumes interfaces don’t change often
• WWWeb consortium standards driving
standardized data types/formats
• Private companies compete for functionality
making for many different interfaces
- Assumes we can design interfaces that handle
object implementations w/stability & over time
• Static data easy to handle (html, pdf, etc.)
• Active data harder to control/secure (active
content)
Pervasive Computing
2: Resource availability limited/intermittent
- Data/resource locations transparent in distributed
environment
- Programmer’s folly – applications assume
continuity of resource access
3: Program/distributing apps unmanageable
- No common platform
- Many “classes” of computing devices
- Installation/functionality differ between classes
Pervasive Computing
Solutions: one.world architecture
1. Keep data and functionality separate
-
Data = tuples (named & typed fields)
Functionality = components (units of functionality)
Both unified in environments = tuples + components +
other environments (nested data/functionality)
2. Program for change
-
-
Applications must acquire all resources (local and
distributed) incl. storage & communication channels
Store resources as primitives movable to other
devices (environment tree of all tuples + components
from execution state)
Constantly renew/refresh resources
Pervasive Computing
Solutions: one.world architecture
3. Common platform w/integrated API &
single binary format
-
Single instruction set implemented across
classes
Should be virtual machine-based technology
Smaller devices emulate networking
protocols or communicate through proxies
elsewhere on network
Unplugged U
• Wireless experiments/trendsetting @
Dartmouth
- Locators (laptops, PDAs, panic-button boxes)
• Where are your friends (or at least their
laptops)?
- In the classroom
• Aggregate responses – like a game show
• Avoids “performance anxiety”
• PDA appointment reminders adjusted!
- Social analysis (network traffic patterns)
- E-mail (“Blitzes”) for idle chat
T-Spaces: The Next Wave
• T-Spaces: combination of dbase, tuplespace, mobile
computing and Java
- Promises total internetworking for every/any computing
device on the network
- “Middleware” that manages data exchange between mobile
devices, PCs, mainframes, etc.
• Tuplespace: simple agents communicating through
tuples exchange asynchronously & anonymously
- Globally shared, visible and addressable memory space
- Allows number of agents to work simultaneously
- Allows variable receivers to register interest in message
T-Spaces: The Next Wave
• How they work
- Data generating programs create a tuple and pushes it out to
tuplespace (data store)
- Program requiring data requests some or all of the tuple for
its own purposes and reads it in
- Beyond simple message passing – addressing is associative
not determinative
• Early example – blackboard system (Hearsay II)
- Knowledge sources (agents) communicate through the
blackboard (a global database)
- Knowledge sources search blackboard for problem
descriptions matching their domains of expertise
- Write solutions for these problems back to the blackboard
T-Spaces: The Next Wave
• Evolution of Tuple-based systems included
database/query/join functions
• Renewed interest thanks to distributed applications
apps on WWW and platform-independent
environment of Java
• T-Space application:
- Tuplespace component = flexible communications model
- Dbase component adds stability, durability, advanced query
& data storage
- Java provides instant portability and instant download for
changes in functionality on the fly
What are the myths of new tech?
• We’ll automatically be better, smarter & faster
• Society will embrace the change
• Organizations will adapt
- Workers will like it
- Shareholders will be pleased (quarterly)
• Everyone gets a voice
• Coordination is easy, we just needed the tools
What’s next?
•
•
•
•
•
•
Personal Area Networks
Separating Space vs. Location
Phone as remote control for your life
Swarming technologies
Distributed computing
Keys, tunnels and tokens
Download